IOC Report
dlawt.exe

loading gif

Files

File Path
Type
Category
Malicious
dlawt.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp7A08.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
ISO-8859 text, with no line terminators, with escape sequences
dropped
malicious
C:\Program Files (x86)\DSL Monitor\dslmon.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dslmon.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Overhumanise\Supplicatingly.exe
data
dropped
C:\Users\user\AppData\Local\Temp\nsb1C0A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmp7C99.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Algae62\plkkers\Reputation\network-cellular-4g-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Arbejdskraftproblemer\CoverEdCtrl.manifest
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Arbejdskraftproblemer\Lakridset.bmp
PC bitmap, Windows 3.x format, 72 x 399 x 24
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Bacin\Besjlings\network-wireless-connected-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Baggesen\audio-x-generic-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Baggesen\changes-prevent-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\dialog-information-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\drive-harddisk-solidstate-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-download.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-drag-accept-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-visiting.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\format-text-bold-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\format-text-direction-symbolic-rtl.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\go-previous-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\idxcaption.xsl
exported SGML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\media-playback-stop-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\media-playlist-repeat.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\mmapwarm.c
C source, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Isdkkede\Charterrejsens\phone-apple-iphone-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\preferences-desktop-theme.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\text-x-generic.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\user-offline.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\view-wrapped-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dlawt.exe
"C:\Users\user\Desktop\dlawt.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\dlawt.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7A08.tmp
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "DSL Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7C99.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\DSL Monitor\dslmon.exe
"C:\Program Files (x86)\DSL Monitor\dslmon.exe" 0
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\DSL Monitor\dslmon.exe
"C:\Program Files (x86)\DSL Monitor\dslmon.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://sun.com/2000/XMLSearch
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://openoffice.org/2000/chart
unknown
https://doc-0g-38-docs.googleusercontent.com/c
unknown
http://openoffice.org/2000/style
unknown
http://openoffice.org/2000/help
unknown
http://openoffice.org/2000/table
unknown
http://jimmac.musichall.czif
unknown
http://openoffice.org/2000/drawing
unknown
http://openoffice.org/2000/meta
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://openoffice.org/2000/text
unknown
https://doc-0g-38-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/7ccvegr5baur8gb8av4io695h7c3rd6h/1664343150000/14816144373961604306/*/12kdF3UKFZK3CB9va21Q67UlQDNdJJSzV?e=download&uuid=3cf3d666-d660-416c-bcce-539871aa28db
142.250.186.97
https://doc-0g-38-docs.googleusercontent.com/
unknown
https://doc-0g-38-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/7ccvegr5
unknown
http://openoffice.org/2000/datastyle
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://openoffice.org/2000/office
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.174
googlehosted.l.googleusercontent.com
142.250.186.97
doc-0g-38-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
137.63.71.51
unknown
Seychelles
malicious
142.250.186.174
drive.google.com
United States
142.250.186.97
googlehosted.l.googleusercontent.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Funklendes
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
DSL Monitor

Memdumps

Base Address
Regiontype
Protect
Malicious
F00000
remote allocation
page execute and read and write
malicious
3283000
trusted library allocation
page execute and read and write
malicious
1FAE5000
trusted library allocation
page read and write
13C4000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C46C000
heap
page read and write
138B000
heap
page read and write
1FE50000
unkown
page read and write
1FAFC000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1EC87000
trusted library allocation
page read and write
1C46F000
heap
page read and write
B97000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C472000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
8AF000
heap
page read and write
40A000
unkown
page write copy
1C451000
heap
page read and write
19725710000
unclassified section
page readonly
1FAD5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1500000
heap
page read and write
1C455000
heap
page read and write
30B0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1EC10000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
8AF000
heap
page read and write
1EAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1ECDB000
trusted library allocation
page read and write
1C46F000
heap
page read and write
3FE1000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1EC40000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46C000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1EB24000
trusted library allocation
page read and write
1C451000
heap
page read and write
2ADE000
stack
page read and write
1C472000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FADD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FD24000
trusted library allocation
page read and write
1C465000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C482000
heap
page read and write
1EBEF000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C473000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
680000
heap
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C48C000
heap
page read and write
16E0000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1399000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C477000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FD50000
trusted library allocation
page read and write
209B9000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1C46D000
heap
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
2910000
unclassified section
page readonly
1FACD000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
8AF000
heap
page read and write
1C451000
heap
page read and write
209C0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1EBBC000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
2AE0000
unkown
page readonly
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
164E000
stack
page read and write
3DA1000
trusted library allocation
page read and write
8B8000
heap
page read and write
19725871000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C47A000
heap
page read and write
1C472000
heap
page read and write
1C46F000
heap
page read and write
1C45A000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C47A000
heap
page read and write
4EDF000
trusted library allocation
page read and write
1C46F000
heap
page read and write
14FC000
trusted library allocation
page execute and read and write
1C493000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
42C000
unkown
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
C40000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1FADD000
trusted library allocation
page read and write
5E0000
unclassified section
page readonly
1FAE4000
trusted library allocation
page read and write
1EA95000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
19725871000
heap
page read and write
1C46F000
heap
page read and write
1EC66000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C493000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1800000
heap
page execute and read and write
1C451000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1FE56000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
209B0000
trusted library allocation
page read and write
1C46B000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1C455000
heap
page read and write
1EC69000
trusted library allocation
page read and write
2AE0000
unkown
page readonly
1C46F000
heap
page read and write
209C0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
E50000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
820000
heap
page read and write
14EA000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C485000
heap
page read and write
1C455000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1EC36000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EB04000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C471000
heap
page read and write
283F000
stack
page read and write
1FB16000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C471000
heap
page read and write
1C465000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1C465000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1FD20000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FADA000
trusted library allocation
page read and write
8CF000
heap
page read and write
1C470000
heap
page read and write
1C45A000
heap
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
2CA827F000
stack
page read and write
1C46F000
heap
page read and write
1FADE000
trusted library allocation
page read and write
1C451000
heap
page read and write
EF6000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
1D2A0000
remote allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
206D0000
trusted library allocation
page read and write
1EC50000
trusted library allocation
page read and write
1C455000
heap
page read and write
1EA66000
trusted library allocation
page read and write
50BE000
stack
page read and write
1C451000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FD30000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
13B4000
heap
page read and write
A6F000
stack
page read and write
1ECAD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FACD000
trusted library allocation
page read and write
13D9000
heap
page read and write
1EB03000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
B40000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
51BE000
stack
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FAD4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C472000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
8A3000
heap
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1EAD5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1EB8C000
trusted library allocation
page read and write
13AF000
heap
page read and write
8B8000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1AA0000
heap
page read and write
19725849000
heap
page read and write
1C455000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EB53000
trusted library allocation
page read and write
1D2A0000
remote allocation
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1C45A000
heap
page read and write
294A000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EB29000
trusted library allocation
page read and write
1C46C000
heap
page read and write
E4E000
stack
page read and write
1C46F000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1385000
heap
page read and write
1C46F000
heap
page read and write
1C45A000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C452000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
13E4000
heap
page read and write
1EBC1000
trusted library allocation
page read and write
14EA000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
2ADA000
stack
page read and write
1396000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
8B4000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
BA0000
unkown
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1170000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1FADA000
trusted library allocation
page read and write
2FB0000
heap
page read and write
34E1000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1396000
heap
page read and write
13B5000
heap
page read and write
8AF000
heap
page read and write
8A3000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
5070000
trusted library allocation
page read and write
8AF000
heap
page read and write
B5D000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1EBE1000
trusted library allocation
page read and write
1C470000
heap
page read and write
1FB80000
trusted library allocation
page read and write
8A3000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
136F000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
5700000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FADD000
trusted library allocation
page read and write
8CF000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1EC2E000
trusted library allocation
page read and write
1FADF000
trusted library allocation
page read and write
1FAD8000
trusted library allocation
page read and write
1C470000
heap
page read and write
1EC34000
trusted library allocation
page read and write
14F2000
trusted library allocation
page execute and read and write
1C455000
heap
page read and write
1FACC000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EC58000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1FACC000
trusted library allocation
page read and write
1C470000
heap
page read and write
1C451000
heap
page read and write
2A30000
heap
page read and write
1C477000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
8AF000
heap
page read and write
1C455000
heap
page read and write
8B4000
heap
page read and write
1FB80000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
20075000
trusted library allocation
page read and write
1C455000
heap
page read and write
2946000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1EAB8000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
CFA000
stack
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
234E000
stack
page read and write
1FAE4000
trusted library allocation
page read and write
1EBBC000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1EA8C000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
19725902000
heap
page read and write
8B4000
heap
page read and write
1C46C000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1C48C000
heap
page read and write
1C46C000
heap
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C472000
heap
page read and write
422000
unkown
page read and write
1C470000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1C46F000
heap
page read and write
1FAD7000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C46A000
heap
page read and write
8B8000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C465000
heap
page read and write
1C472000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1EC58000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
8B4000
heap
page read and write
1C451000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
11E4000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1EA67000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
197255A0000
heap
page read and write
1C46D000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FBA0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1EA85000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FADD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
19725720000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1EA85000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1EBC1000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
19725600000
heap
page read and write
1C48C000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
5010000
trusted library allocation
page read and write
10FA000
stack
page read and write
1C472000
heap
page read and write
1EB12000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1233000
heap
page read and write
1C46A000
heap
page read and write
10F0000
heap
page read and write
19A000
stack
page read and write
1C455000
heap
page read and write
8CF000
heap
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
16EB000
trusted library allocation
page execute and read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
23B0000
heap
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1EAA1000
trusted library allocation
page read and write
1FADF000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FB17000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C471000
heap
page read and write
1EB13000
trusted library allocation
page read and write
1FADA000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
10B0000
heap
page execute and read and write
1ED03000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FD65000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FADF000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EA66000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
1C45A000
heap
page read and write
190E000
stack
page read and write
1FAD0000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
138F000
heap
page read and write
3240000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46C000
heap
page read and write
1C46F000
heap
page read and write
1EB15000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
8A3000
heap
page read and write
1EBF4000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
13BF000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C46C000
heap
page read and write
1C451000
heap
page read and write
1EB73000
trusted library allocation
page read and write
1C480000
heap
page read and write
1C474000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C471000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1EC2C000
trusted library allocation
page read and write
1FAD8000
trusted library allocation
page read and write
1C451000
heap
page read and write
135F000
heap
page read and write
1C46D000
heap
page read and write
1C474000
heap
page read and write
1C46A000
heap
page read and write
A25000
heap
page read and write
1C451000
heap
page read and write
6EC41000
unkown
page execute read
1C46F000
heap
page read and write
1C472000
heap
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C46F000
heap
page read and write
459000
unkown
page readonly
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C474000
heap
page read and write
51F0000
trusted library allocation
page execute and read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
1ECBC000
trusted library allocation
page read and write
1EB6E000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C48C000
heap
page read and write
1C46A000
heap
page read and write
2B9E000
stack
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C47A000
heap
page read and write
1C477000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
2CA847A000
stack
page read and write
5050000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
8B8000
heap
page read and write
1C455000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
8B8000
heap
page read and write
13C7000
heap
page read and write
1C46C000
heap
page read and write
1EB21000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
2F8F000
stack
page read and write
1FAD0000
trusted library allocation
page read and write
1EA87000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1C455000
heap
page read and write
5300000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C470000
heap
page read and write
1C465000
heap
page read and write
1C474000
heap
page read and write
1C465000
heap
page read and write
2943000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
13EE000
heap
page read and write
1C46C000
heap
page read and write
1EBDB000
trusted library allocation
page read and write
19725869000
heap
page read and write
1C46C000
heap
page read and write
1C46F000
heap
page read and write
B6F000
stack
page read and write
2C8F000
stack
page read and write
1C46D000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
2A9D000
stack
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1EC88000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1FAD4000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EBA2000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C470000
heap
page read and write
1EC60000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FA99000
trusted library allocation
page read and write
1C451000
heap
page read and write
8B8000
heap
page read and write
1C451000
heap
page read and write
105C000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C475000
heap
page read and write
2B3A000
trusted library allocation
page execute and read and write
3C6D000
stack
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
5670000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD7000
trusted library allocation
page read and write
1EC11000
trusted library allocation
page read and write
1EBC8000
trusted library allocation
page read and write
2900000
unkown
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C465000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EB8A000
trusted library allocation
page read and write
1ECBC000
trusted library allocation
page read and write
1C47A000
heap
page read and write
1C472000
heap
page read and write
1C46F000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1EBBF000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FAD7000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C45A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
B90000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
8B4000
heap
page read and write
1C455000
heap
page read and write
1EB20000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
13D7000
heap
page read and write
1C46D000
heap
page read and write
2C58000
heap
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FACB000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C471000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1FAFA000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1C46F000
heap
page read and write
8B8000
heap
page read and write
14F0000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
13D2000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1EC6C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C485000
heap
page read and write
1C455000
heap
page read and write
1FD60000
trusted library allocation
page read and write
A20000
heap
page read and write
862000
unkown
page readonly
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C47A000
heap
page read and write
BA0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1C477000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1EB72000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
13F0000
heap
page read and write
1C46C000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
5040000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
8AF000
heap
page read and write
1EC0A000
trusted library allocation
page read and write
1C451000
heap
page read and write
620000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
1EC58000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C455000
heap
page read and write
2B10000
unclassified section
page readonly
1C451000
heap
page read and write
1C465000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EC6E000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
8B4000
heap
page read and write
A0E000
stack
page read and write
1ECE0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
7B0000
heap
page read and write
1EB23000
trusted library allocation
page read and write
1EA69000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C472000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1EB09000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page execute and read and write
13E2000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1EBBA000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C493000
heap
page read and write
1C472000
heap
page read and write
1C47A000
heap
page read and write
1EC1B000
trusted library allocation
page read and write
EF7000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C45C000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1ECBC000
trusted library allocation
page read and write
2B5E000
stack
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
5660000
trusted library allocation
page execute and read and write
1FAE5000
trusted library allocation
page read and write
1EC87000
trusted library allocation
page read and write
1FD20000
trusted library allocation
page read and write
1C452000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1ECAF000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1C493000
heap
page read and write
1C46C000
heap
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
2BEE000
stack
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1EB4E000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
1ECB9000
trusted library allocation
page read and write
8A3000
heap
page read and write
1C455000
heap
page read and write
1EAA5000
trusted library allocation
page read and write
1FACB000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
2B32000
trusted library allocation
page execute and read and write
1FACD000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C470000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C46A000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C474000
heap
page read and write
1EA38000
trusted library allocation
page read and write
19725820000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
2C50000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C472000
heap
page read and write
1E96B000
trusted library allocation
page read and write
E90000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FADD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
20070000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FAD2000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EBF0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
5290000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C475000
heap
page read and write
2FBA000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FADF000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46A000
heap
page read and write
8A3000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
2900000
unkown
page read and write
B48000
heap
page read and write
1C493000
heap
page read and write
34E0000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
BA0000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1052000
trusted library allocation
page execute and read and write
1C46D000
heap
page read and write
9B0000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
8B8000
heap
page read and write
1C45A000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C48C000
heap
page read and write
1C46A000
heap
page read and write
1EAB1000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1FD80000
trusted library allocation
page read and write
1C455000
heap
page read and write
10E0000
trusted library allocation
page execute and read and write
1FADD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C45A000
heap
page read and write
10D0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1EBBC000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FB80000
trusted library allocation
page read and write
1D2A0000
remote allocation
page read and write
1C451000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1972582A000
heap
page read and write
1C46A000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1C455000
heap
page read and write
8AF000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
8AF000
heap
page read and write
1FD65000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
8AF000
heap
page read and write
2AF0000
unkown
page readonly
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
2CA837E000
stack
page read and write
8B4000
heap
page read and write
1080000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
1ECC7000
trusted library allocation
page read and write
1C455000
heap
page read and write
2B00000
unkown
page read and write
1FAE4000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C477000
heap
page read and write
1C46A000
heap
page read and write
1C472000
heap
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1EBFF000
trusted library allocation
page read and write
1C46E000
heap
page read and write
1C455000
heap
page read and write
19725770000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
13C9000
heap
page read and write
1C451000
heap
page read and write
1C474000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
13BB000
heap
page read and write
3AB0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1EC1B000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C475000
heap
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C465000
heap
page read and write
13BB000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C472000
heap
page read and write
1C455000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1C46A000
heap
page read and write
13F3000
heap
page read and write
1C465000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1ECB5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C471000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FD66000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
3A70000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C470000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C470000
heap
page read and write
1C474000
heap
page read and write
1972586D000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2AF0000
unkown
page readonly
2948000
trusted library allocation
page read and write
1C451000
heap
page read and write
19725831000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1FD60000
trusted library allocation
page read and write
13F9000
heap
page read and write
1C485000
heap
page read and write
1C451000
heap
page read and write
1EB37000
trusted library allocation
page read and write
1C485000
heap
page read and write
1C46F000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
8B8000
heap
page read and write
1C46A000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
2B00000
unkown
page read and write
1FAE4000
trusted library allocation
page read and write
114F000
stack
page read and write
1FA9E000
trusted library allocation
page read and write
1C455000
heap
page read and write
4E7E000
stack
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1EA65000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1EABE000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
13E2000
heap
page read and write
1FAD1000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C477000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
139C000
heap
page read and write
2940000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
529C000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
1C451000
heap
page read and write
563E000
stack
page read and write
687000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
4501000
trusted library allocation
page read and write
1C472000
heap
page read and write
1FD20000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C485000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1ECB5000
trusted library allocation
page read and write
1FA7C000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1EB0C000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
40A000
unkown
page read and write
1FAE4000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1972585D000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FD66000
trusted library allocation
page read and write
1C46F000
heap
page read and write
90C000
stack
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C470000
heap
page read and write
1C466000
heap
page read and write
59E000
stack
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
2A50000
heap
page read and write
8A3000
heap
page read and write
1C455000
heap
page read and write
1C470000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FB85000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C46A000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C455000
heap
page read and write
2A20000
unclassified section
page readonly
1EBBC000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
23F5000
heap
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
9D0000
heap
page read and write
1C472000
heap
page read and write
1C46E000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1EA66000
trusted library allocation
page read and write
1EB52000
trusted library allocation
page read and write
1C471000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FACC000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1EC69000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1EA66000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1EB66000
trusted library allocation
page read and write
1C46C000
heap
page read and write
88C000
stack
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1EC14000
trusted library allocation
page read and write
1FADC000
trusted library allocation
page read and write
13A5000
heap
page read and write
1EC0A000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
5039000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
1EA6B000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1972586F000
heap
page read and write
1EAD3000
trusted library allocation
page read and write
1FAE0000
trusted library allocation
page read and write
2F0F000
stack
page read and write
1FAF6000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1EB78000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C474000
heap
page read and write
13EE000
heap
page read and write
1C451000
heap
page read and write
10F6000
stack
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C493000
heap
page read and write
8B4000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1330000
heap
page execute and read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
8A3000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
8AF000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
EF5000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
8B8000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1972587F000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46C000
heap
page read and write
28DA000
stack
page read and write
435000
unkown
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
102F000
stack
page read and write
1FAA0000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EC8F000
trusted library allocation
page read and write
1C485000
heap
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C477000
heap
page read and write
1C470000
heap
page read and write
1C455000
heap
page read and write
1EC3F000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EBA1000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
4F7E000
stack
page read and write
1C46D000
heap
page read and write
2D30000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1C455000
heap
page read and write
986000
stack
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C472000
heap
page read and write
1C46D000
heap
page read and write
1EA6C000
trusted library allocation
page read and write
1C455000
heap
page read and write
1ECA1000
trusted library allocation
page read and write
1EAD3000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
13DE000
heap
page read and write
1C46A000
heap
page read and write
8A3000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1C451000
heap
page read and write
BA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FACC000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FB80000
trusted library allocation
page read and write
1EC0E000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
5F0000
heap
page read and write
1C46F000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
E58000
heap
page read and write
5030000
trusted library allocation
page read and write
1C452000
heap
page read and write
1EB52000
trusted library allocation
page read and write
1C470000
heap
page read and write
1C470000
heap
page read and write
1C46A000
heap
page read and write
1C48A000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
13B1000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EAD7000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1EAB5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
8A3000
heap
page read and write
1EBFA000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
108B000
trusted library allocation
page execute and read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1700000
heap
page read and write
1208000
heap
page read and write
8B4000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C493000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C46D000
heap
page read and write
1EA47000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C45A000
heap
page read and write
8A3000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
8B8000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1237000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1FACC000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
13CE000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
52B9000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
401000
unkown
page execute read
2B4B000
trusted library allocation
page execute and read and write
1C46F000
heap
page read and write
860000
unkown
page readonly
1FB13000
trusted library allocation
page read and write
1EBA1000
trusted library allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1EB73000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1EB7A000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1FE50000
trusted library allocation
page read and write
1C46F000
heap
page read and write
2F4E000
stack
page read and write
1C46A000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EAD4000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
13AF000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1FD60000
trusted library allocation
page read and write
EE8000
trusted library allocation
page read and write
29EE000
stack
page read and write
1FAE8000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1C477000
heap
page read and write
2900000
unkown
page read and write
8B4000
heap
page read and write
138F000
heap
page read and write
1C46A000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
8B8000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C465000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1EC10000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
174E000
stack
page read and write
1C451000
heap
page read and write
52A0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1ECB7000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1ECD5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1C452000
heap
page read and write
1C451000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EABA000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C45A000
heap
page read and write
1FADE000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
8A3000
heap
page read and write
1C46A000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FD66000
trusted library allocation
page read and write
1FACA000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C474000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FB80000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
4F19000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
238E000
stack
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C474000
heap
page read and write
1FAFA000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1EBE0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
19725855000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1C477000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1EC03000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C472000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
2BAF000
unkown
page read and write
1C46D000
heap
page read and write
1C47A000
heap
page read and write
BC8000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1C472000
heap
page read and write
1C45A000
heap
page read and write
5290000
trusted library allocation
page read and write
1EB8C000
trusted library allocation
page read and write
1C465000
heap
page read and write
2947000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1EC0A000
trusted library allocation
page read and write
1C46C000
heap
page read and write
870000
heap
page read and write
1C46A000
heap
page read and write
23B4000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
1C46F000
heap
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
19725840000
heap
page read and write
1FAD4000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C472000
heap
page read and write
1C455000
heap
page read and write
8B8000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C470000
heap
page read and write
1EC04000
trusted library allocation
page read and write
89F000
heap
page read and write
1FADF000
trusted library allocation
page read and write
2AF0000
unkown
page readonly
1C455000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C471000
heap
page read and write
1C451000
heap
page read and write
30000
heap
page read and write
1C451000
heap
page read and write
1FAD2000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
8A3000
heap
page read and write
1EBCA000
trusted library allocation
page read and write
1160000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1EC19000
trusted library allocation
page read and write
1EA85000
trusted library allocation
page read and write
8B8000
heap
page read and write
1C46F000
heap
page read and write
1ECA6000
trusted library allocation
page read and write
19725802000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
113E000
stack
page read and write
1C473000
heap
page read and write
1C451000
heap
page read and write
1FA98000
trusted library allocation
page read and write
1C475000
heap
page read and write
1C475000
heap
page read and write
19725861000
heap
page read and write
459000
unkown
page readonly
1C455000
heap
page read and write
1EBC9000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1ECA7000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46A000
heap
page read and write
1EA66000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
F2F000
stack
page read and write
1C477000
heap
page read and write
1C455000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EBEA000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C477000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
2A2E000
unkown
page read and write
1EA6C000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1EB6E000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1EA6B000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1EB28000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1EB00000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1165000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
160E000
stack
page read and write
1EBCB000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C451000
heap
page read and write
28F0000
unkown
page readonly
8A3000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1EC6B000
trusted library allocation
page read and write
878000
heap
page read and write
8AF000
heap
page read and write
1EA57000
trusted library allocation
page read and write
1C46C000
heap
page read and write
8AF000
heap
page read and write
209B0000
trusted library allocation
page read and write
1C45B000
heap
page read and write
1C455000
heap
page read and write
2C00000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
5010000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1C455000
heap
page read and write
EE0000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
2AE0000
unkown
page readonly
1FAD3000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FACC000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD2000
trusted library allocation
page read and write
2B47000
trusted library allocation
page execute and read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
9D5000
heap
page read and write
1C46D000
heap
page read and write
1EC68000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
E5E000
heap
page read and write
1C46F000
heap
page read and write
1EA47000
trusted library allocation
page read and write
1C475000
heap
page read and write
1C46C000
heap
page read and write
1C477000
heap
page read and write
1C477000
heap
page read and write
501C000
trusted library allocation
page read and write
1C455000
heap
page read and write
1E9A2000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1200000
heap
page read and write
1C493000
heap
page read and write
1EC35000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C46F000
heap
page read and write
1190000
heap
page read and write
1C46F000
heap
page read and write
1C475000
heap
page read and write
1C46C000
heap
page read and write
1EC2B000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C472000
heap
page read and write
1C45A000
heap
page read and write
1FAD8000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
20B10000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
1C46F000
heap
page read and write
209B0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C472000
heap
page read and write
1C46D000
heap
page read and write
1200000
heap
page read and write
1C46C000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1C46C000
heap
page read and write
1FD20000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD2000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46F000
heap
page read and write
8B4000
heap
page read and write
8CF000
heap
page read and write
1972586F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
E77000
heap
page read and write
1C46F000
heap
page read and write
1C48C000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C465000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1EC6C000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
6EC40000
unkown
page readonly
19726002000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
8CF000
heap
page read and write
1C455000
heap
page read and write
1C45A000
heap
page read and write
1C470000
heap
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
8B8000
heap
page read and write
52D0000
trusted library allocation
page read and write
1C46C000
heap
page read and write
553E000
stack
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C451000
heap
page read and write
830000
heap
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C46C000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C45A000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1C455000
heap
page read and write
118E000
stack
page read and write
1C46C000
heap
page read and write
1FE50000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
13AF000
heap
page read and write
1C455000
heap
page read and write
1EAA4000
trusted library allocation
page read and write
1FB12000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C45A000
heap
page read and write
8A3000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EAB5000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C45A000
heap
page read and write
8B4000
heap
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
8B4000
heap
page read and write
1C46C000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1FB13000
trusted library allocation
page read and write
1C46F000
heap
page read and write
28E0000
unkown
page readonly
1C46D000
heap
page read and write
1C455000
heap
page read and write
1ECC5000
trusted library allocation
page read and write
1C477000
heap
page read and write
2948000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
CEE000
stack
page read and write
1FD26000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1EB03000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1EC5E000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C472000
heap
page read and write
400000
unkown
page readonly
2941000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FADA000
trusted library allocation
page read and write
8D5000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1EC82000
trusted library allocation
page read and write
1C46D000
heap
page read and write
209B0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C470000
heap
page read and write
1C451000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1FACC000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46C000
heap
page read and write
14E2000
trusted library allocation
page execute and read and write
1EBCA000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C472000
heap
page read and write
1C467000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
8AF000
heap
page read and write
1C451000
heap
page read and write
2B40000
trusted library allocation
page read and write
1C465000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1EB59000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C472000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C475000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
BA5000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
401000
unkown
page execute read
1EC0A000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1ECCD000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
87A000
unkown
page readonly
1EC62000
trusted library allocation
page read and write
1EA87000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1C472000
heap
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C477000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
104F000
stack
page read and write
206E0000
trusted library allocation
page read and write
1ECB8000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1087000
trusted library allocation
page execute and read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
52C0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46F000
heap
page read and write
2A9F000
unkown
page read and write
1EB68000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1ECD4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
8CF000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
5080000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1389000
heap
page read and write
1EBC2000
trusted library allocation
page read and write
1EAD8000
trusted library allocation
page read and write
1EAE1000
trusted library allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
DFE000
stack
page read and write
1C455000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1ECF5000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
8B8000
heap
page read and write
1C455000
heap
page read and write
1C474000
heap
page read and write
1C46F000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46C000
heap
page read and write
8CF000
heap
page read and write
4F80000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
28F0000
unkown
page readonly
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
14F0000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1EB8B000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FD67000
trusted library allocation
page read and write
1EC18000
trusted library allocation
page read and write
1EB7C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
19725700000
unclassified section
page readonly
1C455000
heap
page read and write
BF0000
remote allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
6EC45000
unkown
page readonly
1C455000
heap
page read and write
98000
stack
page read and write
1C451000
heap
page read and write
8A0000
heap
page read and write
1C477000
heap
page read and write
1C465000
heap
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
8B8000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C473000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C465000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
14D0000
trusted library allocation
page read and write
28EE000
stack
page read and write
1C474000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
1C485000
heap
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
1239000
heap
page read and write
1C474000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1ECB4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1FADE000
trusted library allocation
page read and write
1FAF6000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1EC5E000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C465000
heap
page read and write
1EAE1000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
8A3000
heap
page read and write
1C46F000
heap
page read and write
E0E000
stack
page read and write
1C46D000
heap
page read and write
1C46C000
heap
page read and write
D20000
heap
page read and write
2B00000
unkown
page read and write
1C470000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C465000
heap
page read and write
1C46D000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C465000
heap
page read and write
1C477000
heap
page read and write
685000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
2BA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16DA000
trusted library allocation
page execute and read and write
1C477000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1ECDF000
trusted library allocation
page read and write
1C465000
heap
page read and write
5200000
trusted library allocation
page read and write
1C455000
heap
page read and write
19725865000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C451000
heap
page read and write
19725800000
heap
page read and write
1FE55000
trusted library allocation
page read and write
137C000
heap
page read and write
1C46D000
heap
page read and write
5060000
trusted library allocation
page read and write
16E7000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FD66000
trusted library allocation
page read and write
2CA7CBB000
stack
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAD2000
trusted library allocation
page read and write
1C46D000
heap
page read and write
20000
unclassified section
page readonly
1C455000
heap
page read and write
1EB36000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
D10000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1EB5D000
trusted library allocation
page read and write
13A5000
heap
page read and write
1EC35000
trusted library allocation
page read and write
1C451000
heap
page read and write
8AF000
heap
page read and write
1EB21000
trusted library allocation
page read and write
1C46C000
heap
page read and write
2B5E000
unkown
page read and write
4FB0000
trusted library allocation
page read and write
1C474000
heap
page read and write
1FACC000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAA0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
8CF000
heap
page read and write
1FACB000
trusted library allocation
page read and write
2B8E000
stack
page read and write
1C455000
heap
page read and write
1D0000
unclassified section
page readonly
1C46D000
heap
page read and write
1C472000
heap
page read and write
1EAB2000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C472000
heap
page read and write
1C46A000
heap
page read and write
1C46D000
heap
page read and write
1C46A000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1EABF000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C473000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
3170000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
51E0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAFA000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1C46F000
heap
page read and write
121D000
heap
page read and write
1FAA3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FADC000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1FAD3000
trusted library allocation
page read and write
1C46A000
heap
page read and write
28E0000
unkown
page readonly
1FAD0000
trusted library allocation
page read and write
294C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1EAB4000
trusted library allocation
page read and write
1C46D000
heap
page read and write
EF0000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C46A000
heap
page read and write
289D000
stack
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C45A000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C465000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1ECA6000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C477000
heap
page read and write
1290000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
209B0000
trusted library allocation
page read and write
1FAD4000
trusted library allocation
page read and write
1EC58000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C477000
heap
page read and write
8B4000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C477000
heap
page read and write
1C455000
heap
page read and write
78E000
stack
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
1ECA5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
52B0000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
8B4000
heap
page read and write
1C46C000
heap
page read and write
1C46D000
heap
page read and write
2B60000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1C474000
heap
page read and write
28E0000
unkown
page readonly
1C46C000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C47A000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1042000
trusted library allocation
page execute and read and write
1FD78000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FD67000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C465000
heap
page read and write
1ECF4000
trusted library allocation
page read and write
1EBBC000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C45A000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46C000
heap
page read and write
408000
unkown
page readonly
1EC8B000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
1C455000
heap
page read and write
1EB6A000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
2B12000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FADA000
trusted library allocation
page read and write
1C455000
heap
page read and write
13D2000
heap
page read and write
1C455000
heap
page read and write
1ECBE000
trusted library allocation
page read and write
1EA57000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C451000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
B75000
heap
page read and write
130E000
stack
page read and write
1C451000
heap
page read and write
1EA94000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1C455000
heap
page read and write
D7C000
stack
page read and write
23F0000
heap
page read and write
1C455000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAA0000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FD40000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
14CE000
stack
page read and write
1FAD5000
trusted library allocation
page read and write
209C5000
trusted library allocation
page read and write
8AF000
heap
page read and write
1FAE0000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAF6000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FAD8000
trusted library allocation
page read and write
400000
unkown
page readonly
1FAE0000
trusted library allocation
page read and write
CF6000
stack
page read and write
1EA38000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EBAE000
trusted library allocation
page read and write
408000
unkown
page readonly
2946000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
19725839000
heap
page read and write
8B4000
heap
page read and write
1C46D000
heap
page read and write
1C46A000
heap
page read and write
8CF000
heap
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1EC78000
trusted library allocation
page read and write
1FAA3000
trusted library allocation
page read and write
1FACB000
trusted library allocation
page read and write
1C451000
heap
page read and write
28F0000
unkown
page readonly
B3E000
stack
page read and write
1C46D000
heap
page read and write
1C472000
heap
page read and write
209B0000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FAFC000
trusted library allocation
page read and write
1C451000
heap
page read and write
8CF000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1C472000
heap
page read and write
1FAFA000
trusted library allocation
page read and write
1EBF1000
trusted library allocation
page read and write
1FA98000
trusted library allocation
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C473000
heap
page read and write
1C46D000
heap
page read and write
1FADC000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C46A000
heap
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C46A000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
3B6C000
stack
page read and write
1FAA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16D2000
trusted library allocation
page execute and read and write
1C455000
heap
page read and write
1C465000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1650000
heap
page read and write
1C470000
heap
page read and write
1ECA2000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
8CC000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
8AF000
heap
page read and write
950000
trusted library allocation
page read and write
1072000
trusted library allocation
page execute and read and write
1C470000
heap
page read and write
1FAD8000
trusted library allocation
page read and write
1FE50000
trusted library allocation
page read and write
1FB80000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C474000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C48C000
heap
page read and write
1EB6E000
trusted library allocation
page read and write
8B4000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FAE8000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C470000
heap
page read and write
1EC8A000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
1C451000
heap
page read and write
2B1E000
stack
page read and write
1C455000
heap
page read and write
1FADA000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1FD66000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FAE4000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C477000
heap
page read and write
1FD66000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EC7A000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1EC1F000
trusted library allocation
page read and write
1FAD7000
trusted library allocation
page read and write
1C455000
heap
page read and write
13C0000
heap
page read and write
1C46A000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46C000
heap
page read and write
1399000
heap
page read and write
14D0000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C46A000
heap
page read and write
1FACD000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1EC1B000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C46D000
heap
page read and write
1FD60000
trusted library allocation
page read and write
8CD000
heap
page read and write
1C451000
heap
page read and write
1FAE5000
trusted library allocation
page read and write
1C46D000
heap
page read and write
31BE000
stack
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
E2F000
stack
page read and write
1FAA3000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
19725813000
heap
page read and write
1EAC1000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
293F000
stack
page read and write
98A000
stack
page read and write
1C46F000
heap
page read and write
1C46D000
heap
page read and write
1C46D000
heap
page read and write
1C451000
heap
page read and write
61E000
stack
page read and write
1C474000
heap
page read and write
1FAD5000
trusted library allocation
page read and write
1C46A000
heap
page read and write
1C455000
heap
page read and write
139D000
heap
page read and write
1C455000
heap
page read and write
1C46D000
heap
page read and write
5DE000
stack
page read and write
1FAE8000
trusted library allocation
page read and write
1ECAD000
trusted library allocation
page read and write
1FAE5000
trusted library allocation
page read and write
1FAD5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46F000
heap
page read and write
1FAFC000
trusted library allocation
page read and write
1C48C000
heap
page read and write
1C455000
heap
page read and write
1C46C000
heap
page read and write
1C455000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C46D000
heap
page read and write
1C46F000
heap
page read and write
1C477000
heap
page read and write
1FAD8000
trusted library allocation
page read and write
1FAD3000
trusted library allocation
page read and write
1C455000
heap
page read and write
1FAE8000
trusted library allocation
page read and write
1FAE4000
trusted library allocation
page read and write
1FAD0000
trusted library allocation
page read and write
6EC43000
unkown
page readonly
1FAD1000
trusted library allocation
page read and write
1C46A000
heap
page read and write
427000
unkown
page read and write
1C46F000
heap
page read and write
1FD6C000
trusted library allocation
page read and write
1C455000
heap
page read and write
1C455000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C46A000
heap
page read and write
1C465000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C45A000
heap
page read and write
1C46F000
heap
page read and write
1FAD7000
trusted library allocation
page read and write
There are 3001 hidden memdumps, click here to show them.