IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2f12ed7-736b-4fbc-9aa2-08a486a5801b.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2f12ed7-736b-4fbc-9aa2-08a486a5801b.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2104 -prefMapHandle 2092 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c968ab6d-da8c-4dbc-9e89-ea3d8f0274d1} 6768 "\\.\pipe\gecko-crash-server-pipe.6768" 263a126e710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4280 -parentBuildID 20230927232528 -prefsHandle 2716 -prefMapHandle 3832 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {09c3c9c5-5571-46ff-bc7b-a80d95cd88c9} 6768 "\\.\pipe\gecko-crash-server-pipe.6768" 263b9334610 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5052 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5044 -prefMapHandle 5036 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86c69027-e618-4c10-b81f-80290e995583} 6768 "\\.\pipe\gecko-crash-server-pipe.6768" 263bd15bf10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://www.amazon.com/P
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.206.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
248F2303000
trusted library allocation
page read and write
263AE5F9000
trusted library allocation
page read and write
263B9456000
trusted library allocation
page read and write
263BC74D000
trusted library allocation
page read and write
263B3CF9000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263BE3C8000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263BA7D9000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7F9B000
heap
page read and write
263B26B8000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
263B108A000
heap
page read and write
263A7FD7000
heap
page read and write
263BD69E000
trusted library allocation
page read and write
263B46EE000
trusted library allocation
page read and write
263B3BDD000
trusted library allocation
page read and write
263B0ABE000
trusted library allocation
page read and write
263B2FA0000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263BAEDD000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263A7F8D000
heap
page read and write
263B3C75000
trusted library allocation
page read and write
263BD172000
trusted library allocation
page read and write
263B4A9E000
trusted library allocation
page read and write
263BAD20000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263B48BC000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B15CC000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B31AC000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263A7F9E000
heap
page read and write
263BC898000
trusted library allocation
page read and write
263BD4D0000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263B2F74000
trusted library allocation
page read and write
263BAEDA000
trusted library allocation
page read and write
263B0DB1000
trusted library allocation
page read and write
263B0AFD000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263B26EF000
trusted library allocation
page read and write
263B2FC2000
trusted library allocation
page read and write
263A7F5F000
heap
page read and write
1A75FF70000
heap
page read and write
263A7F8D000
heap
page read and write
263B9625000
trusted library allocation
page read and write
B81000
unkown
page execute read
263B33C3000
trusted library allocation
page read and write
263BD61F000
trusted library allocation
page read and write
263BA695000
trusted library allocation
page read and write
2B099F69000
trusted library allocation
page read and write
263BADB7000
trusted library allocation
page read and write
263B2993000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
1509FD98000
heap
page read and write
8D4000
heap
page read and write
3084000
heap
page read and write
263B2628000
trusted library allocation
page read and write
263B1087000
heap
page read and write
263A7F87000
heap
page read and write
263B0DE2000
trusted library allocation
page read and write
263B2628000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263B2D41000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B10A1000
heap
page read and write
263A7F80000
heap
page read and write
263A7F8D000
heap
page read and write
263B141E000
trusted library allocation
page read and write
263BADED000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
263BD705000
trusted library allocation
page read and write
263BE52E000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B94E4000
trusted library allocation
page read and write
263B1CD4000
trusted library allocation
page read and write
EBF807B000
stack
page read and write
263BA8A6000
trusted library allocation
page read and write
263A7F67000
heap
page read and write
263A7F82000
heap
page read and write
263ADFCA000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B1289000
trusted library allocation
page read and write
263B2F74000
trusted library allocation
page read and write
263B2D8F000
trusted library allocation
page read and write
1509F0E8000
trusted library allocation
page read and write
263B127B000
trusted library allocation
page read and write
263BA661000
trusted library allocation
page read and write
263B1093000
heap
page read and write
263B26EF000
trusted library allocation
page read and write
263BD1C7000
trusted library allocation
page read and write
426EF524000
trusted library allocation
page read and write
263A7FAD000
heap
page read and write
263B94D3000
trusted library allocation
page read and write
263B8C7F000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2FED000
trusted library allocation
page read and write
263B2D59000
trusted library allocation
page read and write
263B94D3000
trusted library allocation
page read and write
263AE625000
trusted library allocation
page read and write
263B1093000
heap
page read and write
263B3CA3000
trusted library allocation
page read and write
263BA66F000
trusted library allocation
page read and write
263B2FFE000
trusted library allocation
page read and write
263B8CCC000
trusted library allocation
page read and write
263B2B3D000
trusted library allocation
page read and write
263BD2DA000
trusted library allocation
page read and write
263B18BF000
trusted library allocation
page read and write
263BCB81000
trusted library allocation
page read and write
263B2A65000
trusted library allocation
page read and write
2B099F03000
trusted library allocation
page read and write
263B3876000
trusted library allocation
page read and write
263AE590000
trusted library allocation
page read and write
263B12D8000
trusted library allocation
page read and write
263B955B000
trusted library allocation
page read and write
263B2D2E000
trusted library allocation
page read and write
263B185F000
trusted library allocation
page read and write
263A7F77000
heap
page read and write
263B3C61000
trusted library allocation
page read and write
263B26C6000
trusted library allocation
page read and write
263A8023000
heap
page read and write
248F1F30000
unclassified section
page read and write
263B14CC000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
263B2F4C000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263AC998000
trusted library allocation
page read and write
263B9458000
trusted library allocation
page read and write
263B19F5000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
1509FD21000
heap
page read and write
263B1085000
heap
page read and write
263B1200000
trusted library allocation
page read and write
263B0DC7000
trusted library allocation
page read and write
263BCBC0000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263A7F87000
heap
page read and write
263B26EC000
trusted library allocation
page read and write
263B8CD5000
trusted library allocation
page read and write
1509F722000
unkown
page execute read
263B1291000
trusted library allocation
page read and write
263BB305000
trusted library allocation
page read and write
263B2D57000
trusted library allocation
page read and write
263BDA49000
trusted library allocation
page read and write
263B2D80000
trusted library allocation
page read and write
263B2D59000
trusted library allocation
page read and write
B81000
unkown
page execute read
263B0DAE000
trusted library allocation
page read and write
263BD195000
trusted library allocation
page read and write
263BDD51000
heap
page read and write
263AD01E000
trusted library allocation
page read and write
263BC758000
trusted library allocation
page read and write
263B2DE1000
trusted library allocation
page read and write
248F21B2000
trusted library allocation
page read and write
263B32FB000
trusted library allocation
page read and write
263BE52C000
trusted library allocation
page read and write
263B10A5000
heap
page read and write
263B0DA8000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263BA6D3000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B2DD0000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
1509FDAC000
heap
page read and write
263AD0B7000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263BD2DF000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263B3CA3000
trusted library allocation
page read and write
263B4749000
trusted library allocation
page read and write
263B3CA3000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263B2B6C000
trusted library allocation
page read and write
263AE66B000
trusted library allocation
page read and write
33D1000
heap
page read and write
263A7FD7000
heap
page read and write
263B2A2A000
trusted library allocation
page read and write
1509FD6A000
heap
page read and write
263A7FCE000
heap
page read and write
263B2D51000
trusted library allocation
page read and write
1A760307000
trusted library allocation
page read and write
91E000
stack
page read and write
263B1FCD000
trusted library allocation
page read and write
248F1D75000
remote allocation
page execute read
263BD2DD000
trusted library allocation
page read and write
263B30E5000
trusted library allocation
page read and write
263B1F1B000
trusted library allocation
page read and write
263B8CD5000
trusted library allocation
page read and write
263B8CFA000
trusted library allocation
page read and write
263B108D000
heap
page read and write
263B299B000
trusted library allocation
page read and write
263B1C67000
trusted library allocation
page read and write
1509FD84000
heap
page read and write
263A7FA2000
heap
page read and write
263A7F79000
heap
page read and write
263B26BF000
trusted library allocation
page read and write
263BCC69000
trusted library allocation
page read and write
263B0DAE000
trusted library allocation
page read and write
263B26DE000
trusted library allocation
page read and write
263B26BC000
trusted library allocation
page read and write
263B9483000
trusted library allocation
page read and write
263B1280000
trusted library allocation
page read and write
EBF5DAE000
unkown
page readonly
263B3507000
trusted library allocation
page read and write
263B1D27000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B9328000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263A7F5E000
heap
page read and write
263BA7D7000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B185F000
trusted library allocation
page read and write
263B3C92000
trusted library allocation
page read and write
263B0AF7000
trusted library allocation
page read and write
263B1057000
heap
page read and write
263A7F97000
heap
page read and write
263B0D9F000
trusted library allocation
page read and write
248F218F000
trusted library allocation
page read and write
26810E1A000
heap
page read and write
263B478D000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
263AE5F9000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B1ED6000
trusted library allocation
page read and write
263B2CCE000
trusted library allocation
page read and write
263B2B0F000
trusted library allocation
page read and write
263B3995000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263A7F8D000
heap
page read and write
263BAD46000
trusted library allocation
page read and write
1509FD3D000
heap
page read and write
263A7F9F000
heap
page read and write
263B474E000
trusted library allocation
page read and write
263B30D2000
trusted library allocation
page read and write
263BCCD5000
trusted library allocation
page read and write
263ACF71000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7F85000
heap
page read and write
263B1EE1000
trusted library allocation
page read and write
263BA8F3000
trusted library allocation
page read and write
263A7F98000
heap
page read and write
263B946D000
trusted library allocation
page read and write
263BA71E000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BA7F1000
trusted library allocation
page read and write
263B2D8F000
trusted library allocation
page read and write
263AE69B000
trusted library allocation
page read and write
263B26EC000
trusted library allocation
page read and write
263BBF02000
trusted library allocation
page read and write
263B0ACC000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B2A2A000
trusted library allocation
page read and write
263B2F88000
trusted library allocation
page read and write
263B46DE000
trusted library allocation
page read and write
263B4698000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7FA5000
heap
page read and write
263BD2EF000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B3811000
trusted library allocation
page read and write
263A7F6E000
heap
page read and write
263B1092000
heap
page read and write
263A7FA5000
heap
page read and write
263A7F80000
heap
page read and write
263BD2DA000
trusted library allocation
page read and write
263AD0BF000
trusted library allocation
page read and write
263BA8B8000
trusted library allocation
page read and write
263B1AF9000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
2B099F2E000
trusted library allocation
page read and write
263BD689000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
263BB42C000
trusted library allocation
page read and write
263BD2E1000
trusted library allocation
page read and write
263B128E000
trusted library allocation
page read and write
263AE42C000
trusted library allocation
page read and write
263B94E4000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
263BC100000
trusted library allocation
page read and write
263B35ED000
trusted library allocation
page read and write
263A7FCF000
heap
page read and write
263A7F64000
heap
page read and write
263BD6C8000
trusted library allocation
page read and write
263BD195000
trusted library allocation
page read and write
2B09A200000
heap
page read and write
2B099BE0000
heap
page read and write
8D4000
heap
page read and write
263BD650000
trusted library allocation
page read and write
263BAECC000
trusted library allocation
page read and write
263B0D62000
trusted library allocation
page read and write
263BA8B8000
trusted library allocation
page read and write
263B125A000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B94AD000
trusted library allocation
page read and write
263B309D000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F75000
heap
page read and write
263A7F80000
heap
page read and write
263B1CEB000
trusted library allocation
page read and write
263B4693000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263B1A51000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B29B3000
trusted library allocation
page read and write
263BD1A7000
trusted library allocation
page read and write
263B9435000
trusted library allocation
page read and write
263BA8A8000
trusted library allocation
page read and write
263B19CA000
trusted library allocation
page read and write
263B2CB0000
trusted library allocation
page read and write
263B146F000
trusted library allocation
page read and write
263B0AEA000
trusted library allocation
page read and write
263B121E000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BA8F5000
trusted library allocation
page read and write
263B4652000
trusted library allocation
page read and write
263BD64B000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263A7FEB000
heap
page read and write
263A7F9E000
heap
page read and write
263B39E0000
trusted library allocation
page read and write
263BA7A0000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263BC7B8000
trusted library allocation
page read and write
263B94D3000
trusted library allocation
page read and write
263AE6FD000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F9E000
heap
page read and write
263BCCD5000
trusted library allocation
page read and write
263BA7CD000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A7F80000
heap
page read and write
263A7FA2000
heap
page read and write
263A7FA6000
heap
page read and write
263BA754000
trusted library allocation
page read and write
263B2620000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2FF6000
trusted library allocation
page read and write
248F2170000
trusted library allocation
page read and write
263BA666000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
1509EEB0000
heap
page read and write
426EF51E000
trusted library allocation
page read and write
263B2F73000
trusted library allocation
page read and write
263B946B000
trusted library allocation
page read and write
263AE17D000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263A7FC6000
heap
page read and write
263A7FA5000
heap
page read and write
1509F06F000
trusted library allocation
page read and write
263B32FB000
trusted library allocation
page read and write
263BDD51000
heap
page read and write
263B95A1000
trusted library allocation
page read and write
263BB348000
trusted library allocation
page read and write
263B9576000
trusted library allocation
page read and write
263B2F62000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BC741000
trusted library allocation
page read and write
263B128E000
trusted library allocation
page read and write
263B2A7C000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B1093000
heap
page read and write
263BC8AB000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BD1A3000
trusted library allocation
page read and write
263B2F43000
trusted library allocation
page read and write
263BE3A2000
trusted library allocation
page read and write
263A7F5D000
heap
page read and write
263B20D3000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263B2B22000
trusted library allocation
page read and write
263B3505000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263BD6CF000
trusted library allocation
page read and write
1509FCCA000
heap
page read and write
263AE1C0000
trusted library allocation
page read and write
263B46AC000
trusted library allocation
page read and write
263B1AD3000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263BCCC3000
trusted library allocation
page read and write
263BC720000
trusted library allocation
page read and write
1509F81E000
trusted library allocation
page read and write
263AD100000
trusted library allocation
page read and write
263B1842000
trusted library allocation
page read and write
263B1FF0000
trusted library allocation
page read and write
263B128C000
trusted library allocation
page read and write
263BD656000
trusted library allocation
page read and write
1509EF00000
trusted library allocation
page read and write
263B1481000
trusted library allocation
page read and write
263B9467000
trusted library allocation
page read and write
263B479B000
trusted library allocation
page read and write
263BDD51000
heap
page read and write
263A7FC6000
heap
page read and write
263A7F87000
heap
page read and write
263AE66F000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
1509FD84000
heap
page read and write
263BE4A3000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BA8D9000
trusted library allocation
page read and write
263B12FE000
trusted library allocation
page read and write
1509FD28000
heap
page read and write
263BADC5000
trusted library allocation
page read and write
263B2FFE000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263BA67E000
trusted library allocation
page read and write
263B946B000
trusted library allocation
page read and write
263B478B000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263AD026000
trusted library allocation
page read and write
263AE5DB000
trusted library allocation
page read and write
263B30C9000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263B2A5C000
trusted library allocation
page read and write
1509ED30000
heap
page read and write
263B0DE6000
trusted library allocation
page read and write
248F1D80000
unclassified section
page readonly
263B960A000
trusted library allocation
page read and write
263A7F7C000
heap
page read and write
263B47F0000
trusted library allocation
page read and write
263BAD15000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B3C8A000
trusted library allocation
page read and write
263B1D22000
trusted library allocation
page read and write
263B3BE9000
trusted library allocation
page read and write
263B29F6000
trusted library allocation
page read and write
263BCCA7000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263A7FA6000
heap
page read and write
263B3C80000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B31D3000
trusted library allocation
page read and write
263B2F36000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B12B6000
trusted library allocation
page read and write
263B1477000
trusted library allocation
page read and write
263A7FA6000
heap
page read and write
263B2FEF000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B94C6000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B1269000
trusted library allocation
page read and write
263B3B94000
trusted library allocation
page read and write
C42000
unkown
page readonly
263B1C87000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B3BF7000
trusted library allocation
page read and write
263B9489000
trusted library allocation
page read and write
263BC8F6000
trusted library allocation
page read and write
263B2632000
trusted library allocation
page read and write
263B127B000
trusted library allocation
page read and write
263B31D3000
trusted library allocation
page read and write
263BB2E5000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263BA616000
trusted library allocation
page read and write
263B3AF0000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B2B6C000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
1509EEF2000
unclassified section
page read and write
4EE01FC000
stack
page read and write
263BD2EF000
trusted library allocation
page read and write
263B31D3000
trusted library allocation
page read and write
263B3BA4000
trusted library allocation
page read and write
263BA8A4000
trusted library allocation
page read and write
263B2699000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263BC72C000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B127B000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B19F7000
trusted library allocation
page read and write
263B96EC000
trusted library allocation
page read and write
263B0DCE000
trusted library allocation
page read and write
263B2DBB000
trusted library allocation
page read and write
2B099FCB000
trusted library allocation
page read and write
263B32CF000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263BAED6000
trusted library allocation
page read and write
263B46A6000
trusted library allocation
page read and write
263B2DEB000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7FC8000
heap
page read and write
263A7F8D000
heap
page read and write
263B0AF2000
trusted library allocation
page read and write
263B2D4C000
trusted library allocation
page read and write
263B108B000
heap
page read and write
263BD669000
trusted library allocation
page read and write
263B9535000
trusted library allocation
page read and write
263BD2DD000
trusted library allocation
page read and write
263B3CB4000
trusted library allocation
page read and write
263B2F4C000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263A7FEB000
heap
page read and write
263AC9A9000
trusted library allocation
page read and write
263AE5F9000
trusted library allocation
page read and write
263B9340000
trusted library allocation
page read and write
7B58DFE000
stack
page read and write
263BC882000
trusted library allocation
page read and write
263AE43A000
trusted library allocation
page read and write
C4C000
unkown
page write copy
7B57DFA000
stack
page read and write
263BA8B0000
trusted library allocation
page read and write
263B3BED000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B3A29000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
2B099F6E000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B944F000
trusted library allocation
page read and write
263B95F1000
trusted library allocation
page read and write
263B46A0000
trusted library allocation
page read and write
263B4BAC000
trusted library allocation
page read and write
263B1291000
trusted library allocation
page read and write
263B3CAB000
trusted library allocation
page read and write
263B2FE5000
trusted library allocation
page read and write
1509F710000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BA73E000
trusted library allocation
page read and write
263B125A000
trusted library allocation
page read and write
263B94AD000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B12FA000
trusted library allocation
page read and write
263BD18B000
trusted library allocation
page read and write
263B9469000
trusted library allocation
page read and write
263BC741000
trusted library allocation
page read and write
263B8C89000
trusted library allocation
page read and write
7BF000
stack
page read and write
263BA8B6000
trusted library allocation
page read and write
263BADCC000
trusted library allocation
page read and write
F88AFBE000
unkown
page readonly
1509F074000
trusted library allocation
page read and write
263BAFC7000
trusted library allocation
page read and write
263B3C80000
trusted library allocation
page read and write
263B8D16000
trusted library allocation
page read and write
263B9521000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263B3363000
trusted library allocation
page read and write
263B46F6000
trusted library allocation
page read and write
263A8009000
heap
page read and write
263B3573000
trusted library allocation
page read and write
263A8029000
heap
page read and write
263A7F9B000
heap
page read and write
263A7F87000
heap
page read and write
1509FCCD000
heap
page read and write
263BD18A000
trusted library allocation
page read and write
263BB341000
trusted library allocation
page read and write
263B26EF000
trusted library allocation
page read and write
263BA8D0000
trusted library allocation
page read and write
263BD6A9000
trusted library allocation
page read and write
263B94C1000
trusted library allocation
page read and write
263AE156000
trusted library allocation
page read and write
263BADF6000
trusted library allocation
page read and write
263B29D7000
trusted library allocation
page read and write
263B4B93000
trusted library allocation
page read and write
263B32F8000
trusted library allocation
page read and write
1509FCA0000
heap
page read and write
263A7F9B000
heap
page read and write
263A7FEB000
heap
page read and write
263A7F7B000
heap
page read and write
263B357C000
trusted library allocation
page read and write
263B12C6000
trusted library allocation
page read and write
263B1E9C000
trusted library allocation
page read and write
263B3CCB000
trusted library allocation
page read and write
263BC8D1000
trusted library allocation
page read and write
263B2C88000
trusted library allocation
page read and write
263B15ED000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
1509FC8D000
heap
page read and write
263B2DF8000
trusted library allocation
page read and write
263BA8BB000
trusted library allocation
page read and write
263BD125000
trusted library allocation
page read and write
263BDDC1000
heap
page read and write
263B309D000
trusted library allocation
page read and write
263B2FF8000
trusted library allocation
page read and write
263B9469000
trusted library allocation
page read and write
263B12A6000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263A7F9B000
heap
page read and write
263B4713000
trusted library allocation
page read and write
263BAD96000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263BD6C8000
trusted library allocation
page read and write
263B4793000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B26DE000
trusted library allocation
page read and write
1509FCA0000
heap
page read and write
263AD0A9000
trusted library allocation
page read and write
263B0DC9000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7FEB000
heap
page read and write
263B2CF2000
trusted library allocation
page read and write
263B264C000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263A7FEB000
heap
page read and write
263A7FA6000
heap
page read and write
263B0DC7000
trusted library allocation
page read and write
263BA657000
trusted library allocation
page read and write
263BD658000
trusted library allocation
page read and write
263BB42E000
trusted library allocation
page read and write
263B4774000
trusted library allocation
page read and write
263BD6BE000
trusted library allocation
page read and write
263BA727000
trusted library allocation
page read and write
263B46CA000
trusted library allocation
page read and write
1509F010000
trusted library allocation
page read and write
1509F05F000
trusted library allocation
page read and write
263B2CCE000
trusted library allocation
page read and write
263B2FED000
trusted library allocation
page read and write
263B9462000
trusted library allocation
page read and write
7B57DFF000
stack
page read and write
1509ED10000
unclassified section
page readonly
1509FCA0000
heap
page read and write
263B2CA2000
trusted library allocation
page read and write
263BADC8000
trusted library allocation
page read and write
263B2D8F000
trusted library allocation
page read and write
263B3C48000
trusted library allocation
page read and write
263ACFF6000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7F80000
heap
page read and write
263A7F6B000
heap
page read and write
263B1085000
heap
page read and write
263AE524000
trusted library allocation
page read and write
1A760270000
heap
page read and write
263B0DB8000
trusted library allocation
page read and write
263B107D000
heap
page read and write
263BA8AA000
trusted library allocation
page read and write
263B9483000
trusted library allocation
page read and write
263BA8E5000
trusted library allocation
page read and write
263B2DFD000
trusted library allocation
page read and write
263BD2E3000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
F88AF3E000
unkown
page readonly
263B948D000
trusted library allocation
page read and write
263B2A9B000
trusted library allocation
page read and write
263B46AE000
trusted library allocation
page read and write
263B4681000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B472D000
trusted library allocation
page read and write
263AD090000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
F8895D8000
stack
page read and write
263B26A5000
trusted library allocation
page read and write
263B2CE7000
trusted library allocation
page read and write
263B2B3B000
trusted library allocation
page read and write
1509FD6A000
heap
page read and write
263B38C2000
trusted library allocation
page read and write
263BA6A7000
trusted library allocation
page read and write
263BD678000
trusted library allocation
page read and write
263BA8E7000
trusted library allocation
page read and write
263B3CA3000
trusted library allocation
page read and write
263B2F41000
trusted library allocation
page read and write
263B357C000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
263B3C23000
trusted library allocation
page read and write
263B941F000
trusted library allocation
page read and write
263B2FED000
trusted library allocation
page read and write
263B1299000
trusted library allocation
page read and write
263B9469000
trusted library allocation
page read and write
F88ADFE000
unkown
page readonly
263BDD51000
heap
page read and write
1509F012000
trusted library allocation
page read and write
263B1EC9000
trusted library allocation
page read and write
263B264C000
trusted library allocation
page read and write
263B1222000
trusted library allocation
page read and write
263BC87B000
trusted library allocation
page read and write
263B2AA0000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2DEF000
trusted library allocation
page read and write
263B127B000
trusted library allocation
page read and write
263BA8AA000
trusted library allocation
page read and write
263BD750000
trusted library allocation
page read and write
263B2F0B000
trusted library allocation
page read and write
263BC7CE000
trusted library allocation
page read and write
263B95CA000
trusted library allocation
page read and write
263B26B4000
trusted library allocation
page read and write
263B95EA000
trusted library allocation
page read and write
263B4793000
trusted library allocation
page read and write
263B2AC0000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B2FFE000
trusted library allocation
page read and write
263B156B000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
248F2300000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B48FE000
trusted library allocation
page read and write
263B0DF0000
trusted library allocation
page read and write
263B2A65000
trusted library allocation
page read and write
263AE677000
trusted library allocation
page read and write
263B15F8000
trusted library allocation
page read and write
263BD2B0000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263A7F81000
heap
page read and write
2B099F7A000
trusted library allocation
page read and write
1509FD61000
heap
page read and write
263B479B000
trusted library allocation
page read and write
263B2DF4000
trusted library allocation
page read and write
263BDDCE000
heap
page read and write
1A7600B7000
heap
page read and write
263A7F87000
heap
page read and write
263A8023000
heap
page read and write
263B0DC9000
trusted library allocation
page read and write
263BAF9F000
trusted library allocation
page read and write
263B3CF5000
trusted library allocation
page read and write
263BD6FB000
trusted library allocation
page read and write
263BD613000
trusted library allocation
page read and write
263B8CCC000
trusted library allocation
page read and write
263BAE49000
trusted library allocation
page read and write
263B31AC000
trusted library allocation
page read and write
263BC753000
trusted library allocation
page read and write
263B26A8000
trusted library allocation
page read and write
1509FD6A000
heap
page read and write
263BA8B0000
trusted library allocation
page read and write
263B1093000
heap
page read and write
263A7FC8000
heap
page read and write
263B39FE000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263A7FC6000
heap
page read and write
263BE386000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263A7F8D000
heap
page read and write
263B1A79000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263AE5C3000
trusted library allocation
page read and write
263B2DF6000
trusted library allocation
page read and write
263B1D0E000
trusted library allocation
page read and write
263B1F63000
trusted library allocation
page read and write
263BA686000
trusted library allocation
page read and write
263B0AEE000
trusted library allocation
page read and write
263AE6B2000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263BA6F5000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263A7FDA000
heap
page read and write
263A7F8D000
heap
page read and write
D30000
heap
page read and write
263B1F54000
trusted library allocation
page read and write
263B26F6000
trusted library allocation
page read and write
D2F000
heap
page read and write
263B8CF5000
trusted library allocation
page read and write
263BA69E000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B2A40000
trusted library allocation
page read and write
263B9606000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
248F1F20000
heap
page readonly
1CE000
stack
page read and write
263A7FEB000
heap
page read and write
263BAEA6000
trusted library allocation
page read and write
263AD0AB000
trusted library allocation
page read and write
263AE6A9000
trusted library allocation
page read and write
263BA67B000
trusted library allocation
page read and write
263BA739000
trusted library allocation
page read and write
263BAD6F000
trusted library allocation
page read and write
263BB343000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A7FC6000
heap
page read and write
263B0D95000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B2D7A000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B12B8000
trusted library allocation
page read and write
263B8CDF000
trusted library allocation
page read and write
263B1869000
trusted library allocation
page read and write
1509FD61000
heap
page read and write
263B1A85000
trusted library allocation
page read and write
263BD632000
trusted library allocation
page read and write
263B0D8B000
trusted library allocation
page read and write
263AE57E000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BADBD000
trusted library allocation
page read and write
263B1584000
trusted library allocation
page read and write
263BA751000
trusted library allocation
page read and write
263B2F41000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B2A62000
trusted library allocation
page read and write
263B96F4000
trusted library allocation
page read and write
263BAD7F000
trusted library allocation
page read and write
248F2166000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263A7FA5000
heap
page read and write
263B2D84000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263BAECC000
trusted library allocation
page read and write
263B121E000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263B31D5000
trusted library allocation
page read and write
263B9426000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BA8F3000
trusted library allocation
page read and write
263B2E4D000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263BAEC6000
trusted library allocation
page read and write
263BD652000
trusted library allocation
page read and write
263AE5DB000
trusted library allocation
page read and write
263B3300000
trusted library allocation
page read and write
263AE530000
trusted library allocation
page read and write
263B2DE6000
trusted library allocation
page read and write
263B2B6C000
trusted library allocation
page read and write
263BA7AC000
trusted library allocation
page read and write
263B128E000
trusted library allocation
page read and write
263B1EBA000
trusted library allocation
page read and write
263B1293000
trusted library allocation
page read and write
263B2FAA000
trusted library allocation
page read and write
263BD6F8000
trusted library allocation
page read and write
263B1D14000
trusted library allocation
page read and write
263B35F4000
trusted library allocation
page read and write
263BA68A000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
8D4000
heap
page read and write
263B2FE4000
trusted library allocation
page read and write
263B9458000
trusted library allocation
page read and write
263B8CE7000
trusted library allocation
page read and write
263B19E6000
trusted library allocation
page read and write
263B2CE9000
trusted library allocation
page read and write
263B2DEF000
trusted library allocation
page read and write
263B1831000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7F8D000
heap
page read and write
263B2F43000
trusted library allocation
page read and write
263BE486000
trusted library allocation
page read and write
263B2F1B000
trusted library allocation
page read and write
263BD698000
trusted library allocation
page read and write
263BE46D000
trusted library allocation
page read and write
263B2FE5000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B2DE6000
trusted library allocation
page read and write
26810E13000
heap
page read and write
263AE436000
trusted library allocation
page read and write
263B2DF4000
trusted library allocation
page read and write
263BA8B6000
trusted library allocation
page read and write
263BC720000
trusted library allocation
page read and write
1509FCA9000
heap
page read and write
263B14A3000
trusted library allocation
page read and write
263B155E000
trusted library allocation
page read and write
263B0D6F000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B1D0B000
trusted library allocation
page read and write
263B4725000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263AE5DB000
trusted library allocation
page read and write
263B8CE3000
trusted library allocation
page read and write
263B1D24000
trusted library allocation
page read and write
263B4657000
trusted library allocation
page read and write
263B2FEF000
trusted library allocation
page read and write
263A7F7D000
heap
page read and write
263BA866000
trusted library allocation
page read and write
263B1088000
heap
page read and write
263AD08D000
trusted library allocation
page read and write
263B1CD3000
trusted library allocation
page read and write
263B26D4000
trusted library allocation
page read and write
263B3C56000
trusted library allocation
page read and write
248F2307000
trusted library allocation
page read and write
1509FCA9000
heap
page read and write
263BB3A3000
trusted library allocation
page read and write
263AE1B2000
trusted library allocation
page read and write
263BCBAF000
trusted library allocation
page read and write
263B1D3B000
trusted library allocation
page read and write
263B2CC2000
trusted library allocation
page read and write
263B934A000
trusted library allocation
page read and write
263B15E9000
trusted library allocation
page read and write
263BA7AF000
trusted library allocation
page read and write
248F1F32000
unclassified section
page read and write
263BADFE000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B2DE1000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
1509F5D0000
heap
page read and write
263B1237000
trusted library allocation
page read and write
263B2971000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
1509FCEA000
heap
page read and write
263B94C1000
trusted library allocation
page read and write
263BC878000
trusted library allocation
page read and write
263A7FA6000
heap
page read and write
263B9640000
trusted library allocation
page read and write
263BC7CE000
trusted library allocation
page read and write
263B3564000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B94A5000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
2B099F81000
trusted library allocation
page read and write
263B0D1E000
trusted library allocation
page read and write
263B94D3000
trusted library allocation
page read and write
263B30C2000
trusted library allocation
page read and write
263B9538000
trusted library allocation
page read and write
263AE5C1000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B32DA000
trusted library allocation
page read and write
2681110A000
trusted library allocation
page read and write
263BC8A8000
trusted library allocation
page read and write
263B29C7000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B26AF000
trusted library allocation
page read and write
263B2DCD000
trusted library allocation
page read and write
1509FD98000
heap
page read and write
263B94B5000
trusted library allocation
page read and write
263B20B6000
trusted library allocation
page read and write
263BCB28000
trusted library allocation
page read and write
263BD6BE000
trusted library allocation
page read and write
263B8CAF000
trusted library allocation
page read and write
263B0AE6000
trusted library allocation
page read and write
263B2C17000
trusted library allocation
page read and write
263B1D5B000
trusted library allocation
page read and write
263B35A5000
trusted library allocation
page read and write
263B1093000
heap
page read and write
263BDDDD000
heap
page read and write
EBF7FFE000
unkown
page readonly
263B25FE000
trusted library allocation
page read and write
263AE1B1000
trusted library allocation
page read and write
263B12C2000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B95C8000
trusted library allocation
page read and write
263B1280000
trusted library allocation
page read and write
263B3575000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263A7F9B000
heap
page read and write
263BAEDD000
trusted library allocation
page read and write
263B4B37000
trusted library allocation
page read and write
263BDD51000
heap
page read and write
263B1092000
heap
page read and write
1509F0C6000
trusted library allocation
page read and write
248F21C4000
trusted library allocation
page read and write
263B0DAE000
trusted library allocation
page read and write
263B2FC0000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263A7F83000
heap
page read and write
263AE52E000
trusted library allocation
page read and write
263B35CE000
trusted library allocation
page read and write
263BD177000
trusted library allocation
page read and write
263BDA1B000
trusted library allocation
page read and write
263BA791000
trusted library allocation
page read and write
263B3C1A000
trusted library allocation
page read and write
263B94AD000
trusted library allocation
page read and write
263B2F94000
trusted library allocation
page read and write
263BD2DF000
trusted library allocation
page read and write
263B4783000
trusted library allocation
page read and write
263B3BAA000
trusted library allocation
page read and write
263A7F83000
heap
page read and write
263B2B32000
trusted library allocation
page read and write
263B4635000
trusted library allocation
page read and write
263B9469000
trusted library allocation
page read and write
263B9393000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BA760000
trusted library allocation
page read and write
263B2A98000
trusted library allocation
page read and write
263A7F67000
heap
page read and write
263B2FF8000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BDA3C000
trusted library allocation
page read and write
2B099BA9000
remote allocation
page execute read
263B2F23000
trusted library allocation
page read and write
1509FD28000
heap
page read and write
263B3579000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263AE5A4000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BD737000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B35E3000
trusted library allocation
page read and write
263B26A4000
trusted library allocation
page read and write
263B32EC000
trusted library allocation
page read and write
263B4751000
trusted library allocation
page read and write
263BAFC7000
trusted library allocation
page read and write
1509FD7B000
heap
page read and write
263A7F79000
heap
page read and write
263B94D8000
trusted library allocation
page read and write
263BC87D000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263BD2C8000
trusted library allocation
page read and write
1509F048000
trusted library allocation
page read and write
248F1FB0000
unclassified section
page readonly
D45000
heap
page read and write
1509FD98000
heap
page read and write
263B3CE0000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BA727000
trusted library allocation
page read and write
263B2F4C000
trusted library allocation
page read and write
263B3570000
trusted library allocation
page read and write
263AE6E1000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
248F2168000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
263AD0BF000
trusted library allocation
page read and write
248F2000000
trusted library allocation
page read and write
263B1CDB000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7FCE000
heap
page read and write
263A7FCE000
heap
page read and write
263BC8E9000
trusted library allocation
page read and write
263BA916000
trusted library allocation
page read and write
263B3A2E000
trusted library allocation
page read and write
248F1E90000
heap
page read and write
263B0DE2000
trusted library allocation
page read and write
248F1EF6000
heap
page read and write
263B2A9F000
trusted library allocation
page read and write
263AE56F000
trusted library allocation
page read and write
263BA8E3000
trusted library allocation
page read and write
263BCC8F000
trusted library allocation
page read and write
263BDD86000
heap
page read and write
263BD4D2000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
2B099F5B000
trusted library allocation
page read and write
263BC798000
trusted library allocation
page read and write
263B2E50000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B26A4000
trusted library allocation
page read and write
263B399C000
trusted library allocation
page read and write
263B12C8000
trusted library allocation
page read and write
263B185C000
trusted library allocation
page read and write
263BA77C000
trusted library allocation
page read and write
2FB8A121000
trusted library allocation
page execute read
263B38CC000
trusted library allocation
page read and write
263B961F000
trusted library allocation
page read and write
263B125A000
trusted library allocation
page read and write
1509FDB9000
heap
page read and write
263BCB76000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B357F000
trusted library allocation
page read and write
263B473E000
trusted library allocation
page read and write
263B1D88000
trusted library allocation
page read and write
263B0DB1000
trusted library allocation
page read and write
263B299B000
trusted library allocation
page read and write
263BD1A7000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263BC7D3000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
248F2124000
trusted library allocation
page read and write
263BD6F8000
trusted library allocation
page read and write
263BAD7F000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263A7F70000
heap
page read and write
263BD2AA000
trusted library allocation
page read and write
263B127B000
trusted library allocation
page read and write
263BD6F0000
trusted library allocation
page read and write
263B94E4000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
2B099F94000
trusted library allocation
page read and write
263AC9EF000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263AE170000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B1090000
heap
page read and write
263BD1D6000
trusted library allocation
page read and write
1509F601000
heap
page read and write
263B0D69000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F74000
heap
page read and write
263B39E2000
trusted library allocation
page read and write
D3F000
heap
page read and write
248F215F000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7FC6000
heap
page read and write
263B1852000
trusted library allocation
page read and write
263B26AB000
trusted library allocation
page read and write
263B2BD3000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F9B000
heap
page read and write
263BA664000
trusted library allocation
page read and write
263B471D000
trusted library allocation
page read and write
1A760080000
heap
page read and write
263B304A000
trusted library allocation
page read and write
263B2A40000
trusted library allocation
page read and write
263A8029000
heap
page read and write
263BAD2C000
trusted library allocation
page read and write
263B356D000
trusted library allocation
page read and write
263B2E49000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B1093000
heap
page read and write
263A7F6B000
heap
page read and write
263B0DB8000
trusted library allocation
page read and write
263BA656000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
EBFB1BE000
unkown
page readonly
4EE11FF000
stack
page read and write
263BD6AC000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263AE5B5000
trusted library allocation
page read and write
263BCCF3000
trusted library allocation
page read and write
263B9458000
trusted library allocation
page read and write
263B12C1000
trusted library allocation
page read and write
263B2D7A000
trusted library allocation
page read and write
263B2FA0000
trusted library allocation
page read and write
263B1237000
trusted library allocation
page read and write
263B3C0C000
trusted library allocation
page read and write
263B935C000
trusted library allocation
page read and write
26810D50000
heap
page read and write
263B30DE000
trusted library allocation
page read and write
263BA815000
trusted library allocation
page read and write
263B47DB000
trusted library allocation
page read and write
263B19F0000
trusted library allocation
page read and write
263A8029000
heap
page read and write
263BD616000
trusted library allocation
page read and write
263B8D1E000
trusted library allocation
page read and write
263B960C000
trusted library allocation
page read and write
263B31EE000
trusted library allocation
page read and write
263BD624000
trusted library allocation
page read and write
263A7F69000
heap
page read and write
263BD1E3000
trusted library allocation
page read and write
263B125A000
trusted library allocation
page read and write
263BD18B000
trusted library allocation
page read and write
1509FCDC000
heap
page read and write
263BDE21000
heap
page read and write
263B2F99000
trusted library allocation
page read and write
263B26B1000
trusted library allocation
page read and write
1509FD84000
heap
page read and write
263B32F3000
trusted library allocation
page read and write
D27000
heap
page read and write
263BD16E000
trusted library allocation
page read and write
263A7F69000
heap
page read and write
263BC838000
trusted library allocation
page read and write
263B12D1000
trusted library allocation
page read and write
263BD4CE000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B3C51000
trusted library allocation
page read and write
263BD2E1000
trusted library allocation
page read and write
D2A000
heap
page read and write
263B1F32000
trusted library allocation
page read and write
263BD2E3000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263BAD14000
trusted library allocation
page read and write
263B12D8000
trusted library allocation
page read and write
263B1482000
trusted library allocation
page read and write
263B1CEE000
trusted library allocation
page read and write
D22000
heap
page read and write
263B37A9000
trusted library allocation
page read and write
263B948D000
trusted library allocation
page read and write
263B37CC000
trusted library allocation
page read and write
263BE4C5000
trusted library allocation
page read and write
263B2DF6000
trusted library allocation
page read and write
263BA7CF000
trusted library allocation
page read and write
263B3CE7000
trusted library allocation
page read and write
263B9538000
trusted library allocation
page read and write
263B2DB0000
trusted library allocation
page read and write
263BA8F9000
trusted library allocation
page read and write
263A7F98000
heap
page read and write
263BD1E3000
trusted library allocation
page read and write
2B099D90000
heap
page readonly
263B2F13000
trusted library allocation
page read and write
263B94E4000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B8CDB000
trusted library allocation
page read and write
263B2CA5000
trusted library allocation
page read and write
263B46E7000
trusted library allocation
page read and write
263BDA10000
trusted library allocation
page read and write
263B3A43000
trusted library allocation
page read and write
263B26A4000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
248F215D000
trusted library allocation
page read and write
263AE59C000
trusted library allocation
page read and write
248F2115000
trusted library allocation
page read and write
263B2E97000
trusted library allocation
page read and write
49B9DCE000
unkown
page readonly
263A7F80000
heap
page read and write
263B355A000
trusted library allocation
page read and write
263AE1A8000
trusted library allocation
page read and write
263AD09D000
trusted library allocation
page read and write
263BD668000
trusted library allocation
page read and write
263B1257000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263B3BB5000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263AE660000
trusted library allocation
page read and write
263BA886000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263AC9CC000
trusted library allocation
page read and write
263BA8E7000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
26810D10000
heap
page read and write
1509F0BD000
trusted library allocation
page read and write
263B2DEF000
trusted library allocation
page read and write
263B3BD4000
trusted library allocation
page read and write
EBF91BE000
unkown
page readonly
263B2626000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263A7FB4000
heap
page read and write
263B125A000
trusted library allocation
page read and write
263BD2EF000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7FA5000
heap
page read and write
263A7FCF000
heap
page read and write
263B8C71000
trusted library allocation
page read and write
263BD1D6000
trusted library allocation
page read and write
263B1085000
heap
page read and write
263B15ED000
trusted library allocation
page read and write
263B3583000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
1509F5B0000
trusted library allocation
page read and write
263B2CDA000
trusted library allocation
page read and write
263B309D000
trusted library allocation
page read and write
263B462B000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B94D8000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263B1F7A000
trusted library allocation
page read and write
263B20C8000
trusted library allocation
page read and write
263B31A3000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BCB93000
trusted library allocation
page read and write
263B31FB000
trusted library allocation
page read and write
263B2D54000
trusted library allocation
page read and write
263B269A000
trusted library allocation
page read and write
263BAD59000
trusted library allocation
page read and write
263B146D000
trusted library allocation
page read and write
263B4729000
trusted library allocation
page read and write
14FE000
stack
page read and write
263B955B000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263BB307000
trusted library allocation
page read and write
263B157B000
trusted library allocation
page read and write
263B2A62000
trusted library allocation
page read and write
263B9461000
trusted library allocation
page read and write
1509FCA0000
heap
page read and write
263BC8AE000
trusted library allocation
page read and write
263BA8E1000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BD192000
trusted library allocation
page read and write
D47000
heap
page read and write
EBFA9BE000
stack
page read and write
263BA8AC000
trusted library allocation
page read and write
263B8C81000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263BA7B8000
trusted library allocation
page read and write
263B1280000
trusted library allocation
page read and write
1509FD28000
heap
page read and write
263B94F3000
trusted library allocation
page read and write
263B2BD3000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
263BCCEA000
trusted library allocation
page read and write
263BA7A3000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B2DEA000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263BE501000
trusted library allocation
page read and write
1509FD2D000
heap
page read and write
263B32F9000
trusted library allocation
page read and write
263BD136000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BA6C8000
trusted library allocation
page read and write
263A7F63000
heap
page read and write
7DB000
stack
page read and write
263B3A60000
trusted library allocation
page read and write
263B94B2000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B31D3000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B961B000
trusted library allocation
page read and write
263B3CC9000
trusted library allocation
page read and write
263BADE4000
trusted library allocation
page read and write
263B2DF4000
trusted library allocation
page read and write
263B2C72000
trusted library allocation
page read and write
263B3898000
trusted library allocation
page read and write
119000
stack
page read and write
263B2A29000
trusted library allocation
page read and write
263B9548000
trusted library allocation
page read and write
263B2DC6000
trusted library allocation
page read and write
263BDB6C000
trusted library allocation
page read and write
263B1D3E000
trusted library allocation
page read and write
263B1D2B000
trusted library allocation
page read and write
D32000
heap
page read and write
263BC748000
trusted library allocation
page read and write
263B3543000
trusted library allocation
page read and write
263B29A4000
trusted library allocation
page read and write
263BA8E1000
trusted library allocation
page read and write
263AD013000
trusted library allocation
page read and write
263BD15E000
trusted library allocation
page read and write
263B0DC9000
trusted library allocation
page read and write
248F2113000
trusted library allocation
page read and write
263B1562000
trusted library allocation
page read and write
263B0AE3000
trusted library allocation
page read and write
263BCC2F000
trusted library allocation
page read and write
263BC745000
trusted library allocation
page read and write
263BB386000
trusted library allocation
page read and write
263B8CE7000
trusted library allocation
page read and write
2FB8A081000
trusted library allocation
page execute read
263BC8BC000
trusted library allocation
page read and write
263B2C7F000
trusted library allocation
page read and write
1509FCBD000
heap
page read and write
263BA88A000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263B2F1B000
trusted library allocation
page read and write
263B29F3000
trusted library allocation
page read and write
263A7F5D000
heap
page read and write
7FE000
stack
page read and write
1509FC9C000
heap
page read and write
263B32DE000
trusted library allocation
page read and write
263B1285000
trusted library allocation
page read and write
263B1295000
trusted library allocation
page read and write
263AC9DF000
trusted library allocation
page read and write
263B30DE000
trusted library allocation
page read and write
263AD0E3000
trusted library allocation
page read and write
263BD678000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263BD6AD000
trusted library allocation
page read and write
1509F05C000
trusted library allocation
page read and write
263B2D26000
trusted library allocation
page read and write
263B1855000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B29A1000
trusted library allocation
page read and write
263A7F77000
heap
page read and write
263BC7D8000
trusted library allocation
page read and write
263BAD32000
trusted library allocation
page read and write
263BA8B2000
trusted library allocation
page read and write
1509F1D0000
heap
page read and write
263BADD6000
trusted library allocation
page read and write
263B31F9000
trusted library allocation
page read and write
8D4000
heap
page read and write
263BDA24000
trusted library allocation
page read and write
263BA632000
trusted library allocation
page read and write
263AE6E7000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263A7FCE000
heap
page read and write
263B1564000
trusted library allocation
page read and write
263BCCE3000
trusted library allocation
page read and write
1509F803000
trusted library allocation
page read and write
263B2F36000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B3ADC000
trusted library allocation
page read and write
263BC880000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263BA679000
trusted library allocation
page read and write
263B3821000
trusted library allocation
page read and write
263AD082000
trusted library allocation
page read and write
263BCC29000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
263B2AA2000
trusted library allocation
page read and write
263BA8F3000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B2632000
trusted library allocation
page read and write
263B26EC000
trusted library allocation
page read and write
263B37ED000
trusted library allocation
page read and write
263BB406000
trusted library allocation
page read and write
263B149D000
trusted library allocation
page read and write
263BA7D9000
trusted library allocation
page read and write
263BD6AC000
trusted library allocation
page read and write
263B2DA0000
trusted library allocation
page read and write
1509F730000
heap
page read and write
263AE57E000
trusted library allocation
page read and write
263BC730000
trusted library allocation
page read and write
263BC8C9000
trusted library allocation
page read and write
263B1578000
trusted library allocation
page read and write
263BD793000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
2B099FA6000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7FC6000
heap
page read and write
263B8CA7000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B3572000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
263AE544000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263BA8E3000
trusted library allocation
page read and write
263B3533000
trusted library allocation
page read and write
263B2A2F000
trusted library allocation
page read and write
263B1299000
trusted library allocation
page read and write
263A7FDA000
heap
page read and write
263BE3E5000
trusted library allocation
page read and write
263B2628000
trusted library allocation
page read and write
263BA6A2000
trusted library allocation
page read and write
263B2F33000
trusted library allocation
page read and write
263B2F36000
trusted library allocation
page read and write
263BC887000
trusted library allocation
page read and write
263B0DE6000
trusted library allocation
page read and write
263B1E9F000
trusted library allocation
page read and write
263B2CA2000
trusted library allocation
page read and write
263B19D6000
trusted library allocation
page read and write
263BADBC000
trusted library allocation
page read and write
263B0AE7000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B94C6000
trusted library allocation
page read and write
263AD0F5000
trusted library allocation
page read and write
263BC750000
trusted library allocation
page read and write
263B2DEB000
trusted library allocation
page read and write
263BDA1E000
trusted library allocation
page read and write
263B3575000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263B9438000
trusted library allocation
page read and write
263B1257000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
1509FD3D000
heap
page read and write
263A7F9B000
heap
page read and write
263A7F86000
heap
page read and write
49BC97E000
stack
page read and write
263A7F97000
heap
page read and write
263A7F6E000
heap
page read and write
263B945B000
trusted library allocation
page read and write
263B3CC5000
trusted library allocation
page read and write
263BDA1E000
trusted library allocation
page read and write
263B30F3000
trusted library allocation
page read and write
263B9483000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
263B1AD3000
trusted library allocation
page read and write
263B2FAF000
trusted library allocation
page read and write
C70000
heap
page read and write
263B2DA0000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
C50000
unkown
page write copy
263AE592000
trusted library allocation
page read and write
263BCCC5000
trusted library allocation
page read and write
263AE5C9000
trusted library allocation
page read and write
263B46E6000
trusted library allocation
page read and write
263BD6EA000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263AE17D000
trusted library allocation
page read and write
263BA8D3000
trusted library allocation
page read and write
263B2F9D000
trusted library allocation
page read and write
263B2FB5000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BA8E9000
trusted library allocation
page read and write
263B3557000
trusted library allocation
page read and write
263B147C000
trusted library allocation
page read and write
263B26DE000
trusted library allocation
page read and write
2B099BD0000
heap
page read and write
263A7F9B000
heap
page read and write
263B2DD0000
trusted library allocation
page read and write
263BCB41000
trusted library allocation
page read and write
263A7F7A000
heap
page read and write
263A7F98000
heap
page read and write
263B26BF000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BAED4000
trusted library allocation
page read and write
263B2D90000
trusted library allocation
page read and write
263BC88F000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
1509FDB7000
heap
page read and write
263B2A5D000
trusted library allocation
page read and write
263BDA54000
trusted library allocation
page read and write
263B15E9000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B3573000
trusted library allocation
page read and write
2B09A100000
trusted library allocation
page read and write
263B38D8000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263A7F81000
heap
page read and write
263B2F96000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263B32D5000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
49BD17E000
unkown
page readonly
263B474E000
trusted library allocation
page read and write
263BD2DF000
trusted library allocation
page read and write
D35000
heap
page read and write
263B0DA5000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
49BC0FE000
unkown
page readonly
263BA8F3000
trusted library allocation
page read and write
263B1468000
trusted library allocation
page read and write
263B94AF000
trusted library allocation
page read and write
263B266D000
trusted library allocation
page read and write
263B19D1000
trusted library allocation
page read and write
263B185F000
trusted library allocation
page read and write
2B099F72000
trusted library allocation
page read and write
263B3BA1000
trusted library allocation
page read and write
7B585FE000
stack
page read and write
263BA706000
trusted library allocation
page read and write
263B31F9000
trusted library allocation
page read and write
2B099D64000
heap
page read and write
263B3300000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BCCCF000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
2B09A114000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
1509FCBF000
heap
page read and write
263BA8D7000
trusted library allocation
page read and write
248F1F50000
heap
page read and write
263B4766000
trusted library allocation
page read and write
263B350D000
trusted library allocation
page read and write
263B0DF1000
trusted library allocation
page read and write
8D4000
heap
page read and write
263BC7C8000
trusted library allocation
page read and write
263BCBD4000
trusted library allocation
page read and write
263B1D10000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B2A7D000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BE4AC000
trusted library allocation
page read and write
263AD044000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B96E5000
trusted library allocation
page read and write
263BC7DE000
trusted library allocation
page read and write
EBF913E000
unkown
page readonly
F88AE7D000
stack
page read and write
263AC981000
trusted library allocation
page read and write
D32000
heap
page read and write
263BB30C000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BA7E2000
trusted library allocation
page read and write
263B2D59000
trusted library allocation
page read and write
9D0000
heap
page read and write
263B9585000
trusted library allocation
page read and write
263B2DEF000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F87000
heap
page read and write
263B1237000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B4681000
trusted library allocation
page read and write
263B12D8000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B463E000
trusted library allocation
page read and write
263B1EC5000
trusted library allocation
page read and write
263B12CC000
trusted library allocation
page read and write
263B9467000
trusted library allocation
page read and write
263BD692000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B2FE2000
trusted library allocation
page read and write
263B0DC2000
trusted library allocation
page read and write
263BA7CF000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BB401000
trusted library allocation
page read and write
263B2FA6000
trusted library allocation
page read and write
263B2613000
trusted library allocation
page read and write
263BD2E1000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
263BD4CA000
trusted library allocation
page read and write
263B26B8000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263AE530000
trusted library allocation
page read and write
263B8CC8000
trusted library allocation
page read and write
263B0DB1000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
F88A5FE000
stack
page read and write
263AE563000
trusted library allocation
page read and write
263B0D29000
trusted library allocation
page read and write
263BA8DD000
trusted library allocation
page read and write
263B1F3B000
trusted library allocation
page read and write
263B936F000
trusted library allocation
page read and write
263B946D000
trusted library allocation
page read and write
263B35E1000
trusted library allocation
page read and write
263B93B7000
trusted library allocation
page read and write
263BA8F5000
trusted library allocation
page read and write
263B4689000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263BAEC0000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
248F2175000
trusted library allocation
page read and write
26811107000
trusted library allocation
page read and write
263B9538000
trusted library allocation
page read and write
263B128E000
trusted library allocation
page read and write
263B8C7F000
trusted library allocation
page read and write
263B0D57000
trusted library allocation
page read and write
263B3C8A000
trusted library allocation
page read and write
263BC8D1000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B4620000
trusted library allocation
page read and write
1509FD6D000
heap
page read and write
263B1473000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263BC74B000
trusted library allocation
page read and write
263BA8E9000
trusted library allocation
page read and write
263B148D000
trusted library allocation
page read and write
263B2F6D000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B8D3C000
trusted library allocation
page read and write
263B948D000
trusted library allocation
page read and write
263B3570000
trusted library allocation
page read and write
263B945D000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B2632000
trusted library allocation
page read and write
263B3AF0000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B3583000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
248F1EC3000
heap
page read and write
263BDA42000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B46AE000
trusted library allocation
page read and write
263AE62C000
trusted library allocation
page read and write
263BBFA8000
trusted library allocation
page read and write
263BD161000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263A7F97000
heap
page read and write
263BD62F000
trusted library allocation
page read and write
263B0DE2000
trusted library allocation
page read and write
263B944F000
trusted library allocation
page read and write
263A7FCF000
heap
page read and write
263A7F97000
heap
page read and write
263BDA08000
trusted library allocation
page read and write
263BA6E4000
trusted library allocation
page read and write
263B2B59000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B9587000
trusted library allocation
page read and write
263B122C000
trusted library allocation
page read and write
263B32E0000
trusted library allocation
page read and write
F88B7BE000
stack
page read and write
263A7FCE000
heap
page read and write
263BAE46000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B26A8000
trusted library allocation
page read and write
263B4766000
trusted library allocation
page read and write
D44000
heap
page read and write
263B355A000
trusted library allocation
page read and write
263B3C75000
trusted library allocation
page read and write
263BD18A000
trusted library allocation
page read and write
C54000
unkown
page readonly
18FF000
stack
page read and write
263A7F7B000
heap
page read and write
263A7FD9000
heap
page read and write
1509FD7B000
heap
page read and write
263AD0B7000
trusted library allocation
page read and write
263B2F7F000
trusted library allocation
page read and write
263A7F98000
heap
page read and write
263B1087000
heap
page read and write
263AE5C9000
trusted library allocation
page read and write
263BCBD4000
trusted library allocation
page read and write
2B099F5D000
trusted library allocation
page read and write
263B4796000
trusted library allocation
page read and write
263B2B41000
trusted library allocation
page read and write
263BCCC5000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B0DDE000
trusted library allocation
page read and write
263B2C99000
trusted library allocation
page read and write
263B944F000
trusted library allocation
page read and write
263B30A7000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263BDD8F000
heap
page read and write
263BA8DD000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263BADF0000
trusted library allocation
page read and write
263BA6B0000
trusted library allocation
page read and write
263BAD59000
trusted library allocation
page read and write
263B4866000
trusted library allocation
page read and write
263B0DB1000
trusted library allocation
page read and write
263BDDBA000
heap
page read and write
2B099B20000
unclassified section
page readonly
263BA799000
trusted library allocation
page read and write
263B2D22000
trusted library allocation
page read and write
8D4000
heap
page read and write
263B0DAE000
trusted library allocation
page read and write
263B2DB0000
trusted library allocation
page read and write
263B156E000
trusted library allocation
page read and write
263B0D0C000
trusted library allocation
page read and write
263B2D99000
trusted library allocation
page read and write
263B26BC000
trusted library allocation
page read and write
263BA65B000
trusted library allocation
page read and write
263B2DF6000
trusted library allocation
page read and write
263B46E2000
trusted library allocation
page read and write
1509FCA4000
heap
page read and write
263B4783000
trusted library allocation
page read and write
263B35F9000
trusted library allocation
page read and write
263B0A83000
trusted library allocation
page read and write
263AE182000
trusted library allocation
page read and write
263BC7DE000
trusted library allocation
page read and write
263BCC55000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263B2EA4000
trusted library allocation
page read and write
263AE6F5000
trusted library allocation
page read and write
263B94B2000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B0DA0000
trusted library allocation
page read and write
263BA8B4000
trusted library allocation
page read and write
263B38A9000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263B3BBD000
trusted library allocation
page read and write
263B2F36000
trusted library allocation
page read and write
263BDA0D000
trusted library allocation
page read and write
1509FC41000
heap
page read and write
263B3557000
trusted library allocation
page read and write
263B8CEB000
trusted library allocation
page read and write
1509FCAC000
heap
page read and write
263B1567000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BAEE1000
trusted library allocation
page read and write
263BD6E5000
trusted library allocation
page read and write
263B1D17000
trusted library allocation
page read and write
263B2CE6000
trusted library allocation
page read and write
263BDD76000
heap
page read and write
263BA932000
trusted library allocation
page read and write
263BA89E000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
49BB7FE000
stack
page read and write
263A7F7C000
heap
page read and write
263A7F61000
heap
page read and write
263A7F64000
heap
page read and write
263BAFEB000
trusted library allocation
page read and write
26810DEA000
heap
page read and write
263BC7C4000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
8D0000
heap
page read and write
263B14CC000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B3CE0000
trusted library allocation
page read and write
263A7FA6000
heap
page read and write
2B099D66000
heap
page read and write
263BADFE000
trusted library allocation
page read and write
263B26A5000
trusted library allocation
page read and write
263BD692000
trusted library allocation
page read and write
263BDD51000
heap
page read and write
263B2D57000
trusted library allocation
page read and write
263B2FE2000
trusted library allocation
page read and write
263B2D88000
trusted library allocation
page read and write
263BAE2D000
trusted library allocation
page read and write
263B0DE6000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B0DA0000
trusted library allocation
page read and write
263B477F000
trusted library allocation
page read and write
263B149D000
trusted library allocation
page read and write
263B1574000
trusted library allocation
page read and write
263B9524000
trusted library allocation
page read and write
26810DE0000
heap
page read and write
248F1F3F000
unclassified section
page read and write
263AE68B000
trusted library allocation
page read and write
263B146B000
trusted library allocation
page read and write
263B3CC5000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263B2619000
trusted library allocation
page read and write
263BA8CB000
trusted library allocation
page read and write
263B959F000
trusted library allocation
page read and write
263B967C000
trusted library allocation
page read and write
263B94A5000
trusted library allocation
page read and write
263B1F70000
trusted library allocation
page read and write
263B2A7A000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B2FE2000
trusted library allocation
page read and write
263B1869000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
263B2A26000
trusted library allocation
page read and write
263BAF5E000
trusted library allocation
page read and write
263B1D60000
trusted library allocation
page read and write
263B1A4E000
trusted library allocation
page read and write
263BA864000
trusted library allocation
page read and write
263BC712000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263BD131000
trusted library allocation
page read and write
263B8CC8000
trusted library allocation
page read and write
263B1851000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
263BAFAC000
trusted library allocation
page read and write
263B30CE000
trusted library allocation
page read and write
263B32EC000
trusted library allocation
page read and write
263B4655000
trusted library allocation
page read and write
263BAD92000
trusted library allocation
page read and write
1509F570000
trusted library section
page readonly
263B4793000
trusted library allocation
page read and write
263B1586000
trusted library allocation
page read and write
2B09A11B000
trusted library allocation
page read and write
263B3561000
trusted library allocation
page read and write
263B2DC8000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BE443000
trusted library allocation
page read and write
2B099DAF000
unclassified section
page read and write
263B26F6000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BC706000
trusted library allocation
page read and write
263B35ED000
trusted library allocation
page read and write
263BA799000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263BA8D3000
trusted library allocation
page read and write
263BADC8000
trusted library allocation
page read and write
263B1CEE000
trusted library allocation
page read and write
263A7F74000
heap
page read and write
263B26AB000
trusted library allocation
page read and write
263B0D6F000
trusted library allocation
page read and write
1509EEF0000
unclassified section
page read and write
263B0DB8000
trusted library allocation
page read and write
263B9388000
trusted library allocation
page read and write
263B1D88000
trusted library allocation
page read and write
263B2DEA000
trusted library allocation
page read and write
263ACF76000
trusted library allocation
page read and write
263B0DC9000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
1509FC40000
heap
page read and write
263BA7BD000
trusted library allocation
page read and write
263B2E88000
trusted library allocation
page read and write
263AE583000
trusted library allocation
page read and write
263BA7D7000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263A7F97000
heap
page read and write
263B94F3000
trusted library allocation
page read and write
1509FCA0000
heap
page read and write
263A7F8D000
heap
page read and write
263BA647000
trusted library allocation
page read and write
263B479B000
trusted library allocation
page read and write
263B35E1000
trusted library allocation
page read and write
263BA8E5000
trusted library allocation
page read and write
263B1D1B000
trusted library allocation
page read and write
263B3947000
trusted library allocation
page read and write
263B3547000
trusted library allocation
page read and write
263AE665000
trusted library allocation
page read and write
263BC73B000
trusted library allocation
page read and write
263BD2E3000
trusted library allocation
page read and write
263B2CA5000
trusted library allocation
page read and write
263BAED8000
trusted library allocation
page read and write
263AE5AE000
trusted library allocation
page read and write
263ACFFB000
trusted library allocation
page read and write
263B2DFB000
trusted library allocation
page read and write
263B12FA000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
1509FD2D000
heap
page read and write
263A7F80000
heap
page read and write
263B2F0E000
trusted library allocation
page read and write
263B29A5000
trusted library allocation
page read and write
263BA8E7000
trusted library allocation
page read and write
263B9458000
trusted library allocation
page read and write
263B32E1000
trusted library allocation
page read and write
EBF5DEE000
stack
page read and write
263B3BA4000
trusted library allocation
page read and write
263B352E000
trusted library allocation
page read and write
2B099FC9000
trusted library allocation
page read and write
263B1A9B000
trusted library allocation
page read and write
263B3C0D000
trusted library allocation
page read and write
263B2B67000
trusted library allocation
page read and write
263B2A2F000
trusted library allocation
page read and write
248F2172000
trusted library allocation
page read and write
263A7F7F000
heap
page read and write
263B94F6000
trusted library allocation
page read and write
EBF90FE000
unkown
page readonly
263B2A78000
trusted library allocation
page read and write
263B9489000
trusted library allocation
page read and write
263B2FF8000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263BAFC2000
trusted library allocation
page read and write
263B478D000
trusted library allocation
page read and write
263BAFBD000
trusted library allocation
page read and write
263BCCC1000
trusted library allocation
page read and write
263B2632000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2DF9000
trusted library allocation
page read and write
263B0D69000
trusted library allocation
page read and write
263BDB76000
trusted library allocation
page read and write
263BA900000
trusted library allocation
page read and write
263BAEC3000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263B1D23000
trusted library allocation
page read and write
263B0D9F000
trusted library allocation
page read and write
263B3C0A000
trusted library allocation
page read and write
263B1E80000
trusted library allocation
page read and write
263B3343000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B9460000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263BD1C7000
trusted library allocation
page read and write
263BD689000
trusted library allocation
page read and write
D33000
heap
page read and write
263B2AE9000
trusted library allocation
page read and write
263BADED000
trusted library allocation
page read and write
2B099F65000
trusted library allocation
page read and write
263B2D7C000
trusted library allocation
page read and write
263B94AD000
trusted library allocation
page read and write
263B3567000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B2DEF000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B478D000
trusted library allocation
page read and write
263B269F000
trusted library allocation
page read and write
263B2E86000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BAD4B000
trusted library allocation
page read and write
1509ECA0000
unclassified section
page readonly
263B2FBE000
trusted library allocation
page read and write
1D0000
heap
page read and write
263BA718000
trusted library allocation
page read and write
263B3C8A000
trusted library allocation
page read and write
263B47DD000
trusted library allocation
page read and write
263B30D2000
trusted library allocation
page read and write
263BAD6D000
trusted library allocation
page read and write
263B31D5000
trusted library allocation
page read and write
263B94C1000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
1509FDAC000
heap
page read and write
263B26B8000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B9529000
trusted library allocation
page read and write
268110E0000
heap
page read and write
263BD120000
trusted library allocation
page read and write
263B3519000
trusted library allocation
page read and write
263B1A93000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263AE554000
trusted library allocation
page read and write
263B395D000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
26812AA0000
heap
page read and write
263A7F9B000
heap
page read and write
263B2FB1000
trusted library allocation
page read and write
263B1A9B000
trusted library allocation
page read and write
263B2624000
trusted library allocation
page read and write
263BC7DB000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263A7FC6000
heap
page read and write
263B4A2F000
trusted library allocation
page read and write
263B8CE3000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263BA73E000
trusted library allocation
page read and write
1509FCAC000
heap
page read and write
263BD6D9000
trusted library allocation
page read and write
263B47F1000
trusted library allocation
page read and write
263B1EFD000
trusted library allocation
page read and write
263BA8D3000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B9467000
trusted library allocation
page read and write
263B957A000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263B9619000
trusted library allocation
page read and write
263B47DB000
trusted library allocation
page read and write
1509FCE1000
heap
page read and write
263B32EC000
trusted library allocation
page read and write
263B30E1000
trusted library allocation
page read and write
263B2699000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F8D000
heap
page read and write
263B2CC1000
trusted library allocation
page read and write
263BA8F9000
trusted library allocation
page read and write
8D4000
heap
page read and write
263BA888000
trusted library allocation
page read and write
263B26EF000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263AD07D000
trusted library allocation
page read and write
1509EE20000
heap
page read and write
263B1A81000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F64000
heap
page read and write
263A7F8D000
heap
page read and write
263B2617000
trusted library allocation
page read and write
263B2DC5000
trusted library allocation
page read and write
263B3CF9000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263AE61F000
trusted library allocation
page read and write
263B1280000
trusted library allocation
page read and write
1509F078000
trusted library allocation
page read and write
263AD019000
trusted library allocation
page read and write
263BA7F6000
trusted library allocation
page read and write
263B1F3B000
trusted library allocation
page read and write
263B8C97000
trusted library allocation
page read and write
263BD1E3000
trusted library allocation
page read and write
263B3A5A000
trusted library allocation
page read and write
263BA6AD000
trusted library allocation
page read and write
263A7F7F000
heap
page read and write
263B1092000
heap
page read and write
263B1093000
heap
page read and write
263B0AAA000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2FB3000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
2B099F10000
trusted library allocation
page read and write
263A7FCF000
heap
page read and write
263B357F000
trusted library allocation
page read and write
263BC7E1000
trusted library allocation
page read and write
263B942B000
trusted library allocation
page read and write
263B2D88000
trusted library allocation
page read and write
263BC8F7000
trusted library allocation
page read and write
263B2DC8000
trusted library allocation
page read and write
263B46A8000
trusted library allocation
page read and write
263B3C46000
trusted library allocation
page read and write
263BAEC0000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B0DB8000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B31A3000
trusted library allocation
page read and write
263BC7C7000
trusted library allocation
page read and write
263B2B41000
trusted library allocation
page read and write
1A760300000
trusted library allocation
page read and write
263B32E7000
trusted library allocation
page read and write
263B1869000
trusted library allocation
page read and write
263A7FD6000
heap
page read and write
263BAD54000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B30F3000
trusted library allocation
page read and write
263BD2E1000
trusted library allocation
page read and write
263B0D9D000
trusted library allocation
page read and write
263B2DEA000
trusted library allocation
page read and write
263B1257000
trusted library allocation
page read and write
1509FDB7000
heap
page read and write
263B47E3000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263B0D9B000
trusted library allocation
page read and write
263B2A98000
trusted library allocation
page read and write
263A7F7C000
heap
page read and write
263B3C51000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
248F210C000
trusted library allocation
page read and write
263B946D000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B3C56000
trusted library allocation
page read and write
2B09A000000
unclassified section
page readonly
263A7FCE000
heap
page read and write
263B3955000
trusted library allocation
page read and write
263B1D6B000
trusted library allocation
page read and write
263BD2C2000
trusted library allocation
page read and write
263B0DA8000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B8CDF000
trusted library allocation
page read and write
263B3C26000
trusted library allocation
page read and write
263B1454000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B19C4000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
263BA8F5000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263BAD6D000
trusted library allocation
page read and write
263B32E7000
trusted library allocation
page read and write
263BD67D000
trusted library allocation
page read and write
263AE65E000
trusted library allocation
page read and write
263B2DEA000
trusted library allocation
page read and write
263B94C8000
trusted library allocation
page read and write
263BA7E8000
trusted library allocation
page read and write
263B2A6B000
trusted library allocation
page read and write
263B1EC5000
trusted library allocation
page read and write
263B0DB8000
trusted library allocation
page read and write
263B0DA5000
trusted library allocation
page read and write
263BAFC6000
trusted library allocation
page read and write
2B099DB0000
heap
page read and write
263A7FA5000
heap
page read and write
263BD18B000
trusted library allocation
page read and write
263B0AC3000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BD2F3000
trusted library allocation
page read and write
263BDA31000
trusted library allocation
page read and write
263B1480000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BD67F000
trusted library allocation
page read and write
263BD61D000
trusted library allocation
page read and write
263BA6C0000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B95EA000
trusted library allocation
page read and write
263B3C8A000
trusted library allocation
page read and write
263A8001000
heap
page read and write
248F1EC0000
heap
page read and write
263A7F9B000
heap
page read and write
263BD11B000
trusted library allocation
page read and write
EBF67D8000
stack
page read and write
263B8CAF000
trusted library allocation
page read and write
263B2DF4000
trusted library allocation
page read and write
263B2DE8000
trusted library allocation
page read and write
263BDE0C000
heap
page read and write
263A7FA5000
heap
page read and write
263B0DB8000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263A7F87000
heap
page read and write
263AE66F000
trusted library allocation
page read and write
263BD69E000
trusted library allocation
page read and write
263B3561000
trusted library allocation
page read and write
263B29FD000
trusted library allocation
page read and write
263B4B50000
trusted library allocation
page read and write
D2E000
heap
page read and write
263BA714000
trusted library allocation
page read and write
263BA66C000
trusted library allocation
page read and write
263B948D000
trusted library allocation
page read and write
263A8029000
heap
page read and write
263A7F64000
heap
page read and write
263B0AE2000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B2DFB000
trusted library allocation
page read and write
263BD65F000
trusted library allocation
page read and write
263B4783000
trusted library allocation
page read and write
263B1573000
trusted library allocation
page read and write
263B2FB9000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
D28000
heap
page read and write
263B30DE000
trusted library allocation
page read and write
263BD2DD000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263BA8CE000
trusted library allocation
page read and write
263B1A9B000
trusted library allocation
page read and write
263BDBC6000
trusted library allocation
page read and write
263B8CD5000
trusted library allocation
page read and write
263B1F9A000
trusted library allocation
page read and write
263B30C5000
trusted library allocation
page read and write
263AE5C3000
trusted library allocation
page read and write
263BA724000
trusted library allocation
page read and write
26812AB7000
heap
page read and write
263B2C15000
trusted library allocation
page read and write
263BAECA000
trusted library allocation
page read and write
263B3C48000
trusted library allocation
page read and write
263B12FE000
trusted library allocation
page read and write
263B94C6000
trusted library allocation
page read and write
263B8C97000
trusted library allocation
page read and write
263B26B4000
trusted library allocation
page read and write
263B94C1000
trusted library allocation
page read and write
263B3592000
trusted library allocation
page read and write
263B3575000
trusted library allocation
page read and write
263BCB7A000
trusted library allocation
page read and write
263BC380000
trusted library allocation
page read and write
263B2D44000
trusted library allocation
page read and write
1509FD2D000
heap
page read and write
263A7F61000
heap
page read and write
263B0DA8000
trusted library allocation
page read and write
263B954A000
trusted library allocation
page read and write
263BE405000
trusted library allocation
page read and write
263B2A35000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7F97000
heap
page read and write
263A7FCE000
heap
page read and write
263A7F65000
heap
page read and write
1509FDAC000
heap
page read and write
263AD08D000
trusted library allocation
page read and write
263B4637000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263BD7AC000
trusted library allocation
page read and write
263B3AB3000
trusted library allocation
page read and write
1509EE40000
heap
page read and write
263A7F97000
heap
page read and write
263B1295000
trusted library allocation
page read and write
263BA6BB000
trusted library allocation
page read and write
263BC7E9000
trusted library allocation
page read and write
263B1483000
trusted library allocation
page read and write
263BD2E1000
trusted library allocation
page read and write
263BDA1B000
trusted library allocation
page read and write
263BD192000
trusted library allocation
page read and write
263B2CBB000
trusted library allocation
page read and write
49B9D8B000
stack
page read and write
263AE5C1000
trusted library allocation
page read and write
1509F003000
trusted library allocation
page read and write
263B94A5000
trusted library allocation
page read and write
263B30ED000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BA8E1000
trusted library allocation
page read and write
263BC8DA000
trusted library allocation
page read and write
263B3567000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2AC3000
trusted library allocation
page read and write
263B8CF5000
trusted library allocation
page read and write
263B1E5E000
trusted library allocation
page read and write
49BC03C000
stack
page read and write
263BADB7000
trusted library allocation
page read and write
263BC85E000
trusted library allocation
page read and write
263B0D8D000
trusted library allocation
page read and write
263B2FAF000
trusted library allocation
page read and write
263B1473000
trusted library allocation
page read and write
263B2638000
trusted library allocation
page read and write
49BC07E000
unkown
page readonly
263B3564000
trusted library allocation
page read and write
263BA8F9000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A7F61000
heap
page read and write
263B2F96000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
263B961D000
trusted library allocation
page read and write
263BA8BD000
trusted library allocation
page read and write
263B0AA7000
trusted library allocation
page read and write
263B2F96000
trusted library allocation
page read and write
263B94E4000
trusted library allocation
page read and write
263A7F74000
heap
page read and write
263B2CE2000
trusted library allocation
page read and write
263B0DAE000
trusted library allocation
page read and write
263BCC71000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B0A9C000
trusted library allocation
page read and write
263B2B85000
trusted library allocation
page read and write
263B1214000
trusted library allocation
page read and write
1509FD23000
heap
page read and write
263B0AEE000
trusted library allocation
page read and write
263B15F2000
trusted library allocation
page read and write
263AD017000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B15E9000
trusted library allocation
page read and write
263B382A000
trusted library allocation
page read and write
263B2982000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B0DA5000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B1E9F000
trusted library allocation
page read and write
263B1224000
trusted library allocation
page read and write
263B2D78000
trusted library allocation
page read and write
263B355F000
trusted library allocation
page read and write
263B12C0000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B966D000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B9635000
trusted library allocation
page read and write
263B2E8F000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7FD2000
heap
page read and write
263B108D000
heap
page read and write
263B32DE000
trusted library allocation
page read and write
263B12D9000
trusted library allocation
page read and write
263BA666000
trusted library allocation
page read and write
263B355A000
trusted library allocation
page read and write
263B157E000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
1509FCA0000
heap
page read and write
8D4000
heap
page read and write
263B129B000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7FEB000
heap
page read and write
263BA68D000
trusted library allocation
page read and write
263AE582000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B2F3C000
trusted library allocation
page read and write
263B1213000
trusted library allocation
page read and write
263A7FDB000
heap
page read and write
263BDA31000
trusted library allocation
page read and write
263B26A4000
trusted library allocation
page read and write
263B946D000
trusted library allocation
page read and write
1509EE90000
heap
page readonly
263B185F000
trusted library allocation
page read and write
263B2D23000
trusted library allocation
page read and write
248F240C000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263BA6AB000
trusted library allocation
page read and write
263B26B1000
trusted library allocation
page read and write
263B125A000
trusted library allocation
page read and write
263BD2DF000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B96FC000
trusted library allocation
page read and write
263B30D6000
trusted library allocation
page read and write
2B099B90000
remote allocation
page read and write
263A7F85000
heap
page read and write
263BCCCF000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263AC990000
trusted library allocation
page read and write
263B1CEB000
trusted library allocation
page read and write
263BB36D000
trusted library allocation
page read and write
263B1457000
trusted library allocation
page read and write
3080000
heap
page read and write
1509FDB7000
heap
page read and write
263B1237000
trusted library allocation
page read and write
263B0D4E000
trusted library allocation
page read and write
263B2F33000
trusted library allocation
page read and write
263B0D6F000
trusted library allocation
page read and write
263B2A45000
trusted library allocation
page read and write
26810DFD000
heap
page read and write
263BC7B5000
trusted library allocation
page read and write
263A7FDA000
heap
page read and write
263BA7DB000
trusted library allocation
page read and write
8D4000
heap
page read and write
263A7F97000
heap
page read and write
49BE17E000
unkown
page readonly
263A7FA5000
heap
page read and write
248F2182000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
263BA7BB000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263A7F9F000
heap
page read and write
26810F00000
trusted library allocation
page read and write
263B2CE0000
trusted library allocation
page read and write
263B1D4B000
trusted library allocation
page read and write
263B46D3000
trusted library allocation
page read and write
263BD1C7000
trusted library allocation
page read and write
263B15F8000
trusted library allocation
page read and write
263B32FB000
trusted library allocation
page read and write
263B2FB6000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A8029000
heap
page read and write
263A7F77000
heap
page read and write
263B3BAD000
trusted library allocation
page read and write
263B8CD0000
trusted library allocation
page read and write
263B35B0000
trusted library allocation
page read and write
263BC8C0000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B1E8E000
trusted library allocation
page read and write
263B3089000
trusted library allocation
page read and write
263B1205000
trusted library allocation
page read and write
263BD192000
trusted library allocation
page read and write
263B26B8000
trusted library allocation
page read and write
49BD97E000
stack
page read and write
263A7F87000
heap
page read and write
263B1234000
trusted library allocation
page read and write
263B3CBB000
trusted library allocation
page read and write
263B0DA5000
trusted library allocation
page read and write
263B2F9C000
trusted library allocation
page read and write
263B2A5D000
trusted library allocation
page read and write
263B2F94000
trusted library allocation
page read and write
263B1085000
heap
page read and write
263B0D9A000
trusted library allocation
page read and write
263B8CDB000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BD1A7000
trusted library allocation
page read and write
263BE40C000
trusted library allocation
page read and write
263AE5C3000
trusted library allocation
page read and write
263B15E2000
trusted library allocation
page read and write
263B3C92000
trusted library allocation
page read and write
263B0DA5000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263B15F2000
trusted library allocation
page read and write
263BA760000
trusted library allocation
page read and write
263BA891000
trusted library allocation
page read and write
263B1CF2000
trusted library allocation
page read and write
263BC880000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263BAFEB000
trusted library allocation
page read and write
263B2D7C000
trusted library allocation
page read and write
263B3B7D000
trusted library allocation
page read and write
263AC9D3000
trusted library allocation
page read and write
263B95EE000
trusted library allocation
page read and write
263B4796000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
263B2D62000
trusted library allocation
page read and write
263B356E000
trusted library allocation
page read and write
263B2F4C000
trusted library allocation
page read and write
263BD192000
trusted library allocation
page read and write
263BA8B8000
trusted library allocation
page read and write
263B26EC000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
26810E1A000
heap
page read and write
263B2DB5000
trusted library allocation
page read and write
263B26B8000
trusted library allocation
page read and write
263B3C48000
trusted library allocation
page read and write
248F2111000
trusted library allocation
page read and write
F88C7BE000
stack
page read and write
263B3CC0000
trusted library allocation
page read and write
263BD6BE000
trusted library allocation
page read and write
263BC8A0000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263B0DAE000
trusted library allocation
page read and write
263B3567000
trusted library allocation
page read and write
263B46FA000
trusted library allocation
page read and write
263B0DA8000
trusted library allocation
page read and write
263BA676000
trusted library allocation
page read and write
263B2A25000
trusted library allocation
page read and write
263A7F86000
heap
page read and write
263B2E27000
trusted library allocation
page read and write
263B3C80000
trusted library allocation
page read and write
263B355A000
trusted library allocation
page read and write
263BA63C000
trusted library allocation
page read and write
263B30E5000
trusted library allocation
page read and write
263BA7A3000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B30D8000
trusted library allocation
page read and write
263BA675000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
263BCB2C000
trusted library allocation
page read and write
263B12BB000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
248F2200000
heap
page read and write
263B15DD000
trusted library allocation
page read and write
263B3BB5000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B3AF6000
trusted library allocation
page read and write
263B30EF000
trusted library allocation
page read and write
263B9621000
trusted library allocation
page read and write
263BD132000
trusted library allocation
page read and write
263B1EEE000
trusted library allocation
page read and write
263AE583000
trusted library allocation
page read and write
263B3CEE000
trusted library allocation
page read and write
263BA78D000
trusted library allocation
page read and write
263A7FE0000
heap
page read and write
263A7F9E000
heap
page read and write
263B96E5000
trusted library allocation
page read and write
263BD663000
trusted library allocation
page read and write
263B0DE6000
trusted library allocation
page read and write
263B0DE2000
trusted library allocation
page read and write
263BA7BF000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263B95D0000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263BA8BD000
trusted library allocation
page read and write
263BDDE9000
heap
page read and write
263B2E24000
trusted library allocation
page read and write
263AE59C000
trusted library allocation
page read and write
263B1D2B000
trusted library allocation
page read and write
263BCB8D000
trusted library allocation
page read and write
263B48A7000
trusted library allocation
page read and write
263B0AA3000
trusted library allocation
page read and write
1509FCF9000
heap
page read and write
263B4729000
trusted library allocation
page read and write
263AC9BF000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263A7F87000
heap
page read and write
263B8D00000
trusted library allocation
page read and write
263BC8A0000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B1869000
trusted library allocation
page read and write
263BD195000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
248F1D60000
remote allocation
page read and write
263A7FA5000
heap
page read and write
1509FCA3000
heap
page read and write
263B122C000
trusted library allocation
page read and write
263BD6DC000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263A7FA5000
heap
page read and write
263B3A58000
trusted library allocation
page read and write
263B3CC5000
trusted library allocation
page read and write
2B099F47000
trusted library allocation
page read and write
263B2F41000
trusted library allocation
page read and write
F88CFBE000
unkown
page readonly
F88AF7D000
stack
page read and write
263B149D000
trusted library allocation
page read and write
263BD195000
trusted library allocation
page read and write
263B2B85000
trusted library allocation
page read and write
1509FCA0000
heap
page read and write
263A7F87000
heap
page read and write
263B2F36000
trusted library allocation
page read and write
263BAE42000
trusted library allocation
page read and write
263B46C3000
trusted library allocation
page read and write
263B2A81000
trusted library allocation
page read and write
263BA6FC000
trusted library allocation
page read and write
263B2A45000
trusted library allocation
page read and write
263BD1C7000
trusted library allocation
page read and write
263B3C9A000
trusted library allocation
page read and write
263B0D72000
trusted library allocation
page read and write
8D4000
heap
page read and write
263B149D000
trusted library allocation
page read and write
263A7F75000
heap
page read and write
263A7F85000
heap
page read and write
263B3CEE000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263B1E6C000
trusted library allocation
page read and write
263BB287000
trusted library allocation
page read and write
263BADB9000
trusted library allocation
page read and write
263B47FC000
trusted library allocation
page read and write
26812AB6000
heap
page read and write
263B2DC8000
trusted library allocation
page read and write
263BA64F000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263BAEDA000
trusted library allocation
page read and write
263BA93C000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
D27000
heap
page read and write
263BA8CE000
trusted library allocation
page read and write
263B2983000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B2D0F000
trusted library allocation
page read and write
263BBD00000
trusted library allocation
page read and write
1509FD20000
heap
page read and write
263B26BC000
trusted library allocation
page read and write
1A7600B0000
heap
page read and write
263BE441000
trusted library allocation
page read and write
263AE423000
trusted library allocation
page read and write
263B2F4C000
trusted library allocation
page read and write
263B1D31000
trusted library allocation
page read and write
263BA8A0000
trusted library allocation
page read and write
263B3793000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263B96FE000
trusted library allocation
page read and write
263BD6FD000
trusted library allocation
page read and write
263BA84A000
trusted library allocation
page read and write
2B099C30000
heap
page read and write
263B0DA5000
trusted library allocation
page read and write
263A7F69000
heap
page read and write
26812ABC000
heap
page read and write
263A7FA0000
heap
page read and write
263B94B2000
trusted library allocation
page read and write
EBF917E000
stack
page read and write
2B099F23000
trusted library allocation
page read and write
263BAD96000
trusted library allocation
page read and write
263AD090000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B357F000
trusted library allocation
page read and write
263B2F41000
trusted library allocation
page read and write
263B47E3000
trusted library allocation
page read and write
263B29FE000
trusted library allocation
page read and write
263B2DBD000
trusted library allocation
page read and write
263B1EFD000
trusted library allocation
page read and write
263B31A3000
trusted library allocation
page read and write
263AD07F000
trusted library allocation
page read and write
263B1285000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263A7FC6000
heap
page read and write
263BA8F5000
trusted library allocation
page read and write
263BA8A2000
trusted library allocation
page read and write
263BC88F000
trusted library allocation
page read and write
263B35F4000
trusted library allocation
page read and write
263BA739000
trusted library allocation
page read and write
263B38D0000
trusted library allocation
page read and write
263BD767000
trusted library allocation
page read and write
263B0DA8000
trusted library allocation
page read and write
263BCC55000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
1509FC9C000
heap
page read and write
263B1A94000
trusted library allocation
page read and write
263B2EAB000
trusted library allocation
page read and write
263B29B3000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B0AB9000
trusted library allocation
page read and write
263BAF83000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B3CB4000
trusted library allocation
page read and write
263AE6C8000
trusted library allocation
page read and write
263B12A6000
trusted library allocation
page read and write
263B3575000
trusted library allocation
page read and write
263B3592000
trusted library allocation
page read and write
263B1E45000
trusted library allocation
page read and write
263B9489000
trusted library allocation
page read and write
263B2FA7000
trusted library allocation
page read and write
263AE670000
trusted library allocation
page read and write
263BA695000
trusted library allocation
page read and write
263BC7AA000
trusted library allocation
page read and write
263B1AE3000
trusted library allocation
page read and write
1509FD98000
heap
page read and write
263B2DA0000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
1509FD2D000
heap
page read and write
263BC730000
trusted library allocation
page read and write
1509ED0A000
remote allocation
page execute read
263B946B000
trusted library allocation
page read and write
263BC7A3000
trusted library allocation
page read and write
26810E1A000
heap
page read and write
263B3C75000
trusted library allocation
page read and write
263B96BF000
trusted library allocation
page read and write
263B0DCB000
trusted library allocation
page read and write
263BCBB8000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B9483000
trusted library allocation
page read and write
263BC8A0000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263BC898000
trusted library allocation
page read and write
263BA86F000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263A7F80000
heap
page read and write
263B3300000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
2B099F14000
trusted library allocation
page read and write
263B30F3000
trusted library allocation
page read and write
263BAFC9000
trusted library allocation
page read and write
1509FDB7000
heap
page read and write
263A7FA5000
heap
page read and write
C54000
unkown
page readonly
263B1285000
trusted library allocation
page read and write
263B2F80000
trusted library allocation
page read and write
263B3A8D000
trusted library allocation
page read and write
263B30DE000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
1509F0EF000
trusted library allocation
page read and write
1509FCAC000
heap
page read and write
1509FD7B000
heap
page read and write
263B932B000
trusted library allocation
page read and write
263B32FB000
trusted library allocation
page read and write
263BA71D000
trusted library allocation
page read and write
263AE1AD000
trusted library allocation
page read and write
1509F81B000
trusted library allocation
page read and write
263B4B1C000
trusted library allocation
page read and write
263B26DE000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263AE166000
trusted library allocation
page read and write
263AD0F5000
trusted library allocation
page read and write
263A7FDB000
heap
page read and write
263B2DB0000
trusted library allocation
page read and write
263B26BC000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
1509FCE8000
heap
page read and write
263BA848000
trusted library allocation
page read and write
8D4000
heap
page read and write
F88BFBE000
unkown
page readonly
263B2DE9000
trusted library allocation
page read and write
263AE66B000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A7F7B000
heap
page read and write
263A7FC6000
heap
page read and write
263AE578000
trusted library allocation
page read and write
263B93D0000
trusted library allocation
page read and write
263B30EF000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
2B09A107000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
263BD195000
trusted library allocation
page read and write
263BD2DF000
trusted library allocation
page read and write
263B3988000
trusted library allocation
page read and write
263B30FA000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263A7F61000
heap
page read and write
263B1099000
heap
page read and write
263B3CB4000
trusted library allocation
page read and write
263BD1C7000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263BD6EE000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263BC717000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7FA6000
heap
page read and write
263B30EF000
trusted library allocation
page read and write
263AC9EF000
trusted library allocation
page read and write
263BD637000
trusted library allocation
page read and write
263B2D2C000
trusted library allocation
page read and write
263BA68A000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B3547000
trusted library allocation
page read and write
263B3C51000
trusted library allocation
page read and write
263B1D2F000
trusted library allocation
page read and write
263BADE4000
trusted library allocation
page read and write
263B2FF6000
trusted library allocation
page read and write
263B31ED000
trusted library allocation
page read and write
263AE5C1000
trusted library allocation
page read and write
263B9581000
trusted library allocation
page read and write
263B3C61000
trusted library allocation
page read and write
263B46A6000
trusted library allocation
page read and write
263BCBAF000
trusted library allocation
page read and write
263BD6EA000
trusted library allocation
page read and write
263BCCD5000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B47DD000
trusted library allocation
page read and write
263B0DA0000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B35A5000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
263B1F38000
trusted library allocation
page read and write
263B2699000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B1AEE000
trusted library allocation
page read and write
263B2F9C000
trusted library allocation
page read and write
263AE5C3000
trusted library allocation
page read and write
4EE01FF000
stack
page read and write
263B12FA000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263B3AF3000
trusted library allocation
page read and write
263A7F9E000
heap
page read and write
263BA70D000
trusted library allocation
page read and write
D3F000
heap
page read and write
263B3C61000
trusted library allocation
page read and write
263BC74D000
trusted library allocation
page read and write
263B108A000
heap
page read and write
263B2D2E000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B26BF000
trusted library allocation
page read and write
263BD698000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7F87000
heap
page read and write
2B099D60000
heap
page read and write
2B099D40000
heap
page read and write
263B3569000
trusted library allocation
page read and write
263A7FE4000
heap
page read and write
263B2FE2000
trusted library allocation
page read and write
263B2E32000
trusted library allocation
page read and write
1509EEBA000
heap
page read and write
263BDA24000
trusted library allocation
page read and write
263AE160000
trusted library allocation
page read and write
263B4676000
trusted library allocation
page read and write
263B94FE000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
1509F800000
trusted library allocation
page read and write
C1C000
unkown
page readonly
263BD2C5000
trusted library allocation
page read and write
263B1E78000
trusted library allocation
page read and write
263B2641000
trusted library allocation
page read and write
263BD67F000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B0AF2000
trusted library allocation
page read and write
263B2D54000
trusted library allocation
page read and write
1509F01B000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263A7F9B000
heap
page read and write
263B0D99000
trusted library allocation
page read and write
263AD075000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B1E99000
trusted library allocation
page read and write
263B2B2D000
trusted library allocation
page read and write
263BDD41000
heap
page read and write
263AE665000
trusted library allocation
page read and write
263B355A000
trusted library allocation
page read and write
263B26EF000
trusted library allocation
page read and write
263B26A8000
trusted library allocation
page read and write
263B3BF2000
trusted library allocation
page read and write
263BD484000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2ADF000
trusted library allocation
page read and write
263B15F8000
trusted library allocation
page read and write
263BC834000
trusted library allocation
page read and write
263B3BA1000
trusted library allocation
page read and write
263B0DE6000
trusted library allocation
page read and write
263B0DC7000
trusted library allocation
page read and write
263B1097000
heap
page read and write
263BA6A7000
trusted library allocation
page read and write
263B15D9000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263A7F6B000
heap
page read and write
263B2A2F000
trusted library allocation
page read and write
263AE5C3000
trusted library allocation
page read and write
263B1AE3000
trusted library allocation
page read and write
263B47F0000
trusted library allocation
page read and write
D3F000
heap
page read and write
263B15C9000
trusted library allocation
page read and write
263BA71B000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263A7F61000
heap
page read and write
263B1F80000
trusted library allocation
page read and write
263BC882000
trusted library allocation
page read and write
263BC7E9000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B149D000
trusted library allocation
page read and write
263BDD97000
heap
page read and write
263B4691000
trusted library allocation
page read and write
263B2A9F000
trusted library allocation
page read and write
263B956A000
trusted library allocation
page read and write
248F2103000
trusted library allocation
page read and write
248F1F90000
heap
page read and write
263B2F33000
trusted library allocation
page read and write
263B9636000
trusted library allocation
page read and write
263B8D32000
trusted library allocation
page read and write
263B94B2000
trusted library allocation
page read and write
263B30D2000
trusted library allocation
page read and write
263BD2C2000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263BD685000
trusted library allocation
page read and write
263B149D000
trusted library allocation
page read and write
263B2DE6000
trusted library allocation
page read and write
D00000
heap
page read and write
263BD2DD000
trusted library allocation
page read and write
263B32E7000
trusted library allocation
page read and write
1509F02F000
trusted library allocation
page read and write
263B1586000
trusted library allocation
page read and write
263B2DE9000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B30D2000
trusted library allocation
page read and write
263B3A70000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263BA7A0000
trusted library allocation
page read and write
263BC7AA000
trusted library allocation
page read and write
263B1F91000
trusted library allocation
page read and write
263B357C000
trusted library allocation
page read and write
263B2A9F000
trusted library allocation
page read and write
263B4657000
trusted library allocation
page read and write
263B0DC9000
trusted library allocation
page read and write
263BD4D4000
trusted library allocation
page read and write
263B146E000
trusted library allocation
page read and write
1509FD2D000
heap
page read and write
263BB3E4000
trusted library allocation
page read and write
263B0D69000
trusted library allocation
page read and write
263BCBF8000
trusted library allocation
page read and write
263B47D3000
trusted library allocation
page read and write
1509FD99000
heap
page read and write
263BA68C000
trusted library allocation
page read and write
263B26EC000
trusted library allocation
page read and write
263AD066000
trusted library allocation
page read and write
1509EC90000
unclassified section
page readonly
263B1093000
heap
page read and write
263B0ADE000
trusted library allocation
page read and write
263AE5B5000
trusted library allocation
page read and write
263BCCB6000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B1855000
trusted library allocation
page read and write
263B0D62000
trusted library allocation
page read and write
263BCC31000
trusted library allocation
page read and write
263B948D000
trusted library allocation
page read and write
263BA8CA000
trusted library allocation
page read and write
263BD1D6000
trusted library allocation
page read and write
263BCB64000
trusted library allocation
page read and write
263B8CB6000
trusted library allocation
page read and write
263B946B000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7F97000
heap
page read and write
263B1488000
trusted library allocation
page read and write
263B0DCE000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263BB433000
trusted library allocation
page read and write
263BA8B4000
trusted library allocation
page read and write
263BD12D000
trusted library allocation
page read and write
263B2FE2000
trusted library allocation
page read and write
263BA8AE000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263A7F9E000
heap
page read and write
263B2C6E000
trusted library allocation
page read and write
2B099FB5000
trusted library allocation
page read and write
263B1289000
trusted library allocation
page read and write
F888BCE000
stack
page read and write
2B09A132000
trusted library allocation
page read and write
263B2E8A000
trusted library allocation
page read and write
263B9625000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B2DB0000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
248F21F6000
trusted library allocation
page read and write
263B15F2000
trusted library allocation
page read and write
263B12DF000
trusted library allocation
page read and write
263B26A4000
trusted library allocation
page read and write
263BC882000
trusted library allocation
page read and write
263B20DA000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263BDA2B000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263BE407000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B12AC000
trusted library allocation
page read and write
263A7F60000
heap
page read and write
263A7F8D000
heap
page read and write
263AD026000
trusted library allocation
page read and write
263B0DA5000
trusted library allocation
page read and write
263B2DC6000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B1083000
heap
page read and write
263B1488000
trusted library allocation
page read and write
263B8CFA000
trusted library allocation
page read and write
263B9632000
trusted library allocation
page read and write
263BD1D6000
trusted library allocation
page read and write
263B128E000
trusted library allocation
page read and write
263B26B4000
trusted library allocation
page read and write
263BC858000
trusted library allocation
page read and write
263B1DAA000
trusted library allocation
page read and write
263AE665000
trusted library allocation
page read and write
263BA73E000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BA698000
trusted library allocation
page read and write
263B478B000
trusted library allocation
page read and write
263B2D84000
trusted library allocation
page read and write
263B1093000
heap
page read and write
263A7F87000
heap
page read and write
263A7F82000
heap
page read and write
33D1000
heap
page read and write
EBF88FE000
stack
page read and write
263A8023000
heap
page read and write
263B15DF000
trusted library allocation
page read and write
263B94E4000
trusted library allocation
page read and write
263B94D3000
trusted library allocation
page read and write
263B9576000
trusted library allocation
page read and write
263BD2E3000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263BD499000
trusted library allocation
page read and write
263B94C1000
trusted library allocation
page read and write
263B1289000
trusted library allocation
page read and write
263B30E5000
trusted library allocation
page read and write
49BC0BE000
stack
page read and write
263BCCF3000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263B94F3000
trusted library allocation
page read and write
263B2E97000
trusted library allocation
page read and write
263B94D8000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B14A3000
trusted library allocation
page read and write
263BA6A7000
trusted library allocation
page read and write
263A8022000
heap
page read and write
263B307C000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
263B2FB9000
trusted library allocation
page read and write
26812A90000
heap
page read and write
263A7F5E000
heap
page read and write
263B269E000
trusted library allocation
page read and write
263B9489000
trusted library allocation
page read and write
263B472B000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B1463000
trusted library allocation
page read and write
263B2DEF000
trusted library allocation
page read and write
263B2FEC000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263AE5AE000
trusted library allocation
page read and write
263B1E64000
trusted library allocation
page read and write
263BA68D000
trusted library allocation
page read and write
263B108A000
heap
page read and write
263A7F61000
heap
page read and write
263A7F9E000
heap
page read and write
263BA6C3000
trusted library allocation
page read and write
263B8CA7000
trusted library allocation
page read and write
263BA8E9000
trusted library allocation
page read and write
263B2D6A000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7F5E000
heap
page read and write
263B1295000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B4B67000
trusted library allocation
page read and write
263B183E000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B9458000
trusted library allocation
page read and write
C4C000
unkown
page read and write
263B1E57000
trusted library allocation
page read and write
263AE692000
trusted library allocation
page read and write
263B3A35000
trusted library allocation
page read and write
263B2DFD000
trusted library allocation
page read and write
263BE506000
trusted library allocation
page read and write
1509FD2D000
heap
page read and write
263A7F9B000
heap
page read and write
263BD1E3000
trusted library allocation
page read and write
263B477F000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263B1AEA000
trusted library allocation
page read and write
263BD1E3000
trusted library allocation
page read and write
263BD1D6000
trusted library allocation
page read and write
EBF77FE000
stack
page read and write
263BD2DA000
trusted library allocation
page read and write
1509FDB7000
heap
page read and write
263BD2DA000
trusted library allocation
page read and write
263AE1C6000
trusted library allocation
page read and write
1509FC49000
heap
page read and write
263B2A35000
trusted library allocation
page read and write
263B2E75000
trusted library allocation
page read and write
263B1290000
trusted library allocation
page read and write
7B59DFE000
stack
page read and write
263B26AB000
trusted library allocation
page read and write
263BCB93000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263B9535000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BCCC5000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B1D69000
trusted library allocation
page read and write
263BA68A000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263AD09D000
trusted library allocation
page read and write
263A8009000
heap
page read and write
263AE5B5000
trusted library allocation
page read and write
263BD1D6000
trusted library allocation
page read and write
263B2A2D000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263BADC5000
trusted library allocation
page read and write
263B9483000
trusted library allocation
page read and write
263BA64B000
trusted library allocation
page read and write
263B2FC0000
trusted library allocation
page read and write
1509FDB7000
heap
page read and write
263A7FEB000
heap
page read and write
1A76030A000
trusted library allocation
page read and write
263B18B2000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B2AE4000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263BA67D000
trusted library allocation
page read and write
263A7F98000
heap
page read and write
2EAE49C03000
trusted library allocation
page read and write
263BDB76000
trusted library allocation
page read and write
263AE654000
trusted library allocation
page read and write
263B2D54000
trusted library allocation
page read and write
263BA7F5000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263BB3AC000
trusted library allocation
page read and write
263B1090000
heap
page read and write
263B108D000
heap
page read and write
263B2C17000
trusted library allocation
page read and write
263B94D3000
trusted library allocation
page read and write
263BDA2B000
trusted library allocation
page read and write
263B15E4000
trusted library allocation
page read and write
1509F6F0000
trusted library allocation
page read and write
263AE5C9000
trusted library allocation
page read and write
263BA8C6000
trusted library allocation
page read and write
263B1085000
heap
page read and write
263B2FB6000
trusted library allocation
page read and write
263B3C0C000
trusted library allocation
page read and write
263B149D000
trusted library allocation
page read and write
263BD6D9000
trusted library allocation
page read and write
263BA600000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
26812AAC000
heap
page read and write
263BC8FB000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263AE5C9000
trusted library allocation
page read and write
263B26BC000
trusted library allocation
page read and write
263B8CE7000
trusted library allocation
page read and write
263B2F88000
trusted library allocation
page read and write
1509F09F000
trusted library allocation
page read and write
2B099BB0000
unclassified section
page readonly
263BA8D7000
trusted library allocation
page read and write
263B3936000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263A7F80000
heap
page read and write
263B0DA8000
trusted library allocation
page read and write
263BC719000
trusted library allocation
page read and write
248F21DB000
trusted library allocation
page read and write
263B2D5E000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B1546000
trusted library allocation
page read and write
263B2B85000
trusted library allocation
page read and write
263B1487000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263B1260000
trusted library allocation
page read and write
263B2D5E000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263AE56F000
trusted library allocation
page read and write
263BC71B000
trusted library allocation
page read and write
263B3542000
trusted library allocation
page read and write
263B473E000
trusted library allocation
page read and write
263BAFB2000
trusted library allocation
page read and write
263B2D57000
trusted library allocation
page read and write
1509FD28000
heap
page read and write
263A7FEB000
heap
page read and write
263BE557000
trusted library allocation
page read and write
263B1EB1000
trusted library allocation
page read and write
263A7F74000
heap
page read and write
263B1E51000
trusted library allocation
page read and write
263BA71B000
trusted library allocation
page read and write
263ACF23000
trusted library allocation
page read and write
D3F000
heap
page read and write
263BD2DD000
trusted library allocation
page read and write
263B8CEB000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263B149D000
trusted library allocation
page read and write
263B3564000
trusted library allocation
page read and write
263B2FAF000
trusted library allocation
page read and write
263B3CBF000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263AE57E000
trusted library allocation
page read and write
263B35F4000
trusted library allocation
page read and write
263B1A9D000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BE4E4000
trusted library allocation
page read and write
263B4676000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263BA7E6000
trusted library allocation
page read and write
263B0DC7000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263B2DF6000
trusted library allocation
page read and write
263B0DAE000
trusted library allocation
page read and write
263B3AF3000
trusted library allocation
page read and write
263B2DFD000
trusted library allocation
page read and write
263B47E3000
trusted library allocation
page read and write
7CF000
stack
page read and write
263B108A000
heap
page read and write
263A7F65000
heap
page read and write
263B2DB0000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2A6C000
trusted library allocation
page read and write
1509FD98000
heap
page read and write
263AE5C3000
trusted library allocation
page read and write
263B2B39000
trusted library allocation
page read and write
263B0DC9000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B153C000
trusted library allocation
page read and write
263B2632000
trusted library allocation
page read and write
263B2D41000
trusted library allocation
page read and write
1509FD84000
heap
page read and write
1A760100000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B32E3000
trusted library allocation
page read and write
263BCB9D000
trusted library allocation
page read and write
263B956F000
trusted library allocation
page read and write
263B2D7C000
trusted library allocation
page read and write
1509FD29000
heap
page read and write
263B35F9000
trusted library allocation
page read and write
263B3542000
trusted library allocation
page read and write
263BA721000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B3579000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B1AD5000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B31B1000
trusted library allocation
page read and write
263AC99E000
trusted library allocation
page read and write
33D1000
heap
page read and write
263B2FEF000
trusted library allocation
page read and write
263B47DD000
trusted library allocation
page read and write
263B1F1E000
trusted library allocation
page read and write
263B30D2000
trusted library allocation
page read and write
263B12D5000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B2A74000
trusted library allocation
page read and write
263B3C5B000
trusted library allocation
page read and write
263BD4C6000
trusted library allocation
page read and write
EBF99BE000
stack
page read and write
263BB34D000
trusted library allocation
page read and write
263B2FB1000
trusted library allocation
page read and write
263B3B71000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B1280000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
180000
heap
page read and write
263B149D000
trusted library allocation
page read and write
263BD172000
trusted library allocation
page read and write
263B2E9B000
trusted library allocation
page read and write
263BA7E2000
trusted library allocation
page read and write
263B2D7C000
trusted library allocation
page read and write
263B3CAB000
trusted library allocation
page read and write
263B9598000
trusted library allocation
page read and write
263B2D3F000
trusted library allocation
page read and write
263B2661000
trusted library allocation
page read and write
263BAFFC000
trusted library allocation
page read and write
263B3766000
trusted library allocation
page read and write
263B4A6D000
trusted library allocation
page read and write
263B35E1000
trusted library allocation
page read and write
263B2DEB000
trusted library allocation
page read and write
263B96FC000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7F6B000
heap
page read and write
263B95F5000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B26DE000
trusted library allocation
page read and write
263BC500000
trusted library allocation
page read and write
263B2DCD000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BA8BD000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2A34000
trusted library allocation
page read and write
1509FCBD000
heap
page read and write
263BD6D5000
trusted library allocation
page read and write
263B380A000
trusted library allocation
page read and write
263B2FE5000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B8CD0000
trusted library allocation
page read and write
263BA683000
trusted library allocation
page read and write
263B2D0F000
trusted library allocation
page read and write
263A8001000
heap
page read and write
263A7F80000
heap
page read and write
263AE5F9000
trusted library allocation
page read and write
263B0DB8000
trusted library allocation
page read and write
263B1572000
trusted library allocation
page read and write
268110E5000
heap
page read and write
263A7F79000
heap
page read and write
263B1A94000
trusted library allocation
page read and write
263B1D2F000
trusted library allocation
page read and write
263B1E34000
trusted library allocation
page read and write
263B2F94000
trusted library allocation
page read and write
263BD11D000
trusted library allocation
page read and write
263B4B05000
trusted library allocation
page read and write
263B1DC2000
trusted library allocation
page read and write
263B3AB3000
trusted library allocation
page read and write
263B2F33000
trusted library allocation
page read and write
263BDA18000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263BC8F6000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B0ADA000
trusted library allocation
page read and write
263AE592000
trusted library allocation
page read and write
263B2F20000
trusted library allocation
page read and write
263BD1C2000
trusted library allocation
page read and write
263BA751000
trusted library allocation
page read and write
263B1285000
trusted library allocation
page read and write
263B946D000
trusted library allocation
page read and write
263B2D88000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
1509F023000
trusted library allocation
page read and write
263AE5C9000
trusted library allocation
page read and write
263BA7A5000
trusted library allocation
page read and write
263B3570000
trusted library allocation
page read and write
263AE590000
trusted library allocation
page read and write
263B2DBB000
trusted library allocation
page read and write
263B0DB1000
trusted library allocation
page read and write
263BD6F6000
trusted library allocation
page read and write
263A7FCF000
heap
page read and write
263AD04C000
trusted library allocation
page read and write
263B0DBE000
trusted library allocation
page read and write
263B9558000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263A7FC8000
heap
page read and write
263AE1F2000
trusted library allocation
page read and write
F88AEBE000
unkown
page readonly
263A7F8D000
heap
page read and write
263BD1A7000
trusted library allocation
page read and write
263AE6F7000
trusted library allocation
page read and write
263B109A000
heap
page read and write
263B1A90000
trusted library allocation
page read and write
263B122E000
trusted library allocation
page read and write
263B1487000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B1D58000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263ACFFE000
trusted library allocation
page read and write
263AE665000
trusted library allocation
page read and write
263BCB9D000
trusted library allocation
page read and write
263B1F38000
trusted library allocation
page read and write
263B960C000
trusted library allocation
page read and write
263AC9BF000
trusted library allocation
page read and write
263B3CD0000
trusted library allocation
page read and write
263B3C80000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B14A3000
trusted library allocation
page read and write
263B1A9B000
trusted library allocation
page read and write
263BA8FB000
trusted library allocation
page read and write
263BDA24000
trusted library allocation
page read and write
263B8CDF000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B0DB1000
trusted library allocation
page read and write
263BD6BE000
trusted library allocation
page read and write
263BCB18000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B32C3000
trusted library allocation
page read and write
263B15F8000
trusted library allocation
page read and write
263AE5AA000
trusted library allocation
page read and write
263B2E32000
trusted library allocation
page read and write
263B1488000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263BAD92000
trusted library allocation
page read and write
263BC88F000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B0AE7000
trusted library allocation
page read and write
263BDD86000
heap
page read and write
263B39A3000
trusted library allocation
page read and write
263BA8B2000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263A7F9B000
heap
page read and write
1509EEFF000
unclassified section
page read and write
263A7FC8000
heap
page read and write
263B35F6000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263BA7B1000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263B0D64000
trusted library allocation
page read and write
263AE1E2000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B2ECD000
trusted library allocation
page read and write
263B3843000
trusted library allocation
page read and write
263B2B37000
trusted library allocation
page read and write
263B3400000
trusted library allocation
page read and write
263B3243000
trusted library allocation
page read and write
263B31FB000
trusted library allocation
page read and write
263BDB2D000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263A7FEB000
heap
page read and write
263A7FC6000
heap
page read and write
263A7FA5000
heap
page read and write
263AE170000
trusted library allocation
page read and write
263B2A51000
trusted library allocation
page read and write
263B0D1B000
trusted library allocation
page read and write
263B0D87000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B2DC8000
trusted library allocation
page read and write
263BD2E3000
trusted library allocation
page read and write
263B9578000
trusted library allocation
page read and write
263B3ADC000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B153A000
trusted library allocation
page read and write
263B1F91000
trusted library allocation
page read and write
263B32EC000
trusted library allocation
page read and write
D1F000
heap
page read and write
263B935A000
trusted library allocation
page read and write
263BD6C8000
trusted library allocation
page read and write
263B2F21000
trusted library allocation
page read and write
263B2F1D000
trusted library allocation
page read and write
263B2A25000
trusted library allocation
page read and write
1509FDAC000
heap
page read and write
263B3563000
trusted library allocation
page read and write
263B2D51000
trusted library allocation
page read and write
263B108D000
heap
page read and write
263BC878000
trusted library allocation
page read and write
263BD12D000
trusted library allocation
page read and write
263B2FF6000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2A73000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B2662000
trusted library allocation
page read and write
263BAD71000
trusted library allocation
page read and write
263AE69F000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263B1285000
trusted library allocation
page read and write
263AE6FB000
trusted library allocation
page read and write
248F2100000
trusted library allocation
page read and write
1509F0BA000
trusted library allocation
page read and write
263B0D3B000
trusted library allocation
page read and write
7B595FE000
stack
page read and write
263B32E0000
trusted library allocation
page read and write
263B376B000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
263B4689000
trusted library allocation
page read and write
263B299E000
trusted library allocation
page read and write
263B94B2000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263A7F87000
heap
page read and write
2B09A120000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B2977000
trusted library allocation
page read and write
263B2DEA000
trusted library allocation
page read and write
1509F1D6000
heap
page read and write
263BCBF8000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263BC726000
trusted library allocation
page read and write
263AC9C8000
trusted library allocation
page read and write
263BD6EA000
trusted library allocation
page read and write
263B3547000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
263A7F65000
heap
page read and write
263B3047000
trusted library allocation
page read and write
1509FDAC000
heap
page read and write
263B1F80000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263A7F85000
heap
page read and write
263BDA20000
trusted library allocation
page read and write
2B099BE3000
heap
page read and write
263A7F7B000
heap
page read and write
2B099DA2000
unclassified section
page read and write
263B3572000
trusted library allocation
page read and write
1A7600BC000
heap
page read and write
263B2CCE000
trusted library allocation
page read and write
7B5A5FF000
stack
page read and write
7EF000
stack
page read and write
263B3C51000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B32D5000
trusted library allocation
page read and write
263B96F4000
trusted library allocation
page read and write
263B2699000
trusted library allocation
page read and write
1509FD40000
heap
page read and write
263B1E0D000
trusted library allocation
page read and write
263B1E91000
trusted library allocation
page read and write
263B94D8000
trusted library allocation
page read and write
263BCB8D000
trusted library allocation
page read and write
263B8CEB000
trusted library allocation
page read and write
263B46AC000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2DC5000
trusted library allocation
page read and write
263B29C7000
trusted library allocation
page read and write
263B2AFC000
trusted library allocation
page read and write
263B0DCD000
trusted library allocation
page read and write
263BDA4E000
trusted library allocation
page read and write
263BA8E9000
trusted library allocation
page read and write
263BCCFE000
trusted library allocation
page read and write
263B26C3000
trusted library allocation
page read and write
263B3CB4000
trusted library allocation
page read and write
1509FD62000
heap
page read and write
263B3579000
trusted library allocation
page read and write
263B1EBA000
trusted library allocation
page read and write
263B0AF0000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
2B099C66000
heap
page read and write
EBF80FE000
unkown
page readonly
263BDD51000
heap
page read and write
263B1EEE000
trusted library allocation
page read and write
263B2D84000
trusted library allocation
page read and write
263B94B5000
trusted library allocation
page read and write
263BD2DA000
trusted library allocation
page read and write
263B1291000
trusted library allocation
page read and write
263B1F29000
trusted library allocation
page read and write
263BD16E000
trusted library allocation
page read and write
263B0DA8000
trusted library allocation
page read and write
263B2DC1000
trusted library allocation
page read and write
263B1851000
trusted library allocation
page read and write
263B952F000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B145D000
trusted library allocation
page read and write
263B1FF0000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B30C2000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
263B0DE6000
trusted library allocation
page read and write
263AC9B3000
trusted library allocation
page read and write
248F1EF0000
heap
page read and write
263A7F97000
heap
page read and write
263A7F85000
heap
page read and write
263A7FC6000
heap
page read and write
263BAEC8000
trusted library allocation
page read and write
263A7F81000
heap
page read and write
263B9418000
trusted library allocation
page read and write
263B94D8000
trusted library allocation
page read and write
263BB2C8000
trusted library allocation
page read and write
2B099FB7000
trusted library allocation
page read and write
263B304A000
trusted library allocation
page read and write
263B9469000
trusted library allocation
page read and write
263B1216000
trusted library allocation
page read and write
263B3BE9000
trusted library allocation
page read and write
263B1D23000
trusted library allocation
page read and write
263B8CDB000
trusted library allocation
page read and write
263B1A41000
trusted library allocation
page read and write
263B4751000
trusted library allocation
page read and write
263BB3A7000
trusted library allocation
page read and write
263B357C000
trusted library allocation
page read and write
263B3C92000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7F87000
heap
page read and write
263B3CAB000
trusted library allocation
page read and write
1509FD29000
heap
page read and write
263BDA15000
trusted library allocation
page read and write
263B0DF1000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263BD16E000
trusted library allocation
page read and write
263B2DB8000
trusted library allocation
page read and write
263B1ED6000
trusted library allocation
page read and write
263B964A000
trusted library allocation
page read and write
263B2D99000
trusted library allocation
page read and write
2B099F12000
trusted library allocation
page read and write
263B9517000
trusted library allocation
page read and write
2B099C00000
heap
page read and write
263BA6CA000
trusted library allocation
page read and write
EBF5D6C000
stack
page read and write
263B2D7C000
trusted library allocation
page read and write
263B1D1F000
trusted library allocation
page read and write
263BA8C8000
trusted library allocation
page read and write
263BD1E3000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B26F6000
trusted library allocation
page read and write
263AE180000
trusted library allocation
page read and write
263A7F86000
heap
page read and write
263A7F60000
heap
page read and write
263BCCFE000
trusted library allocation
page read and write
263B3C56000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263B129A000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263B1092000
heap
page read and write
263B3569000
trusted library allocation
page read and write
263B0DCD000
trusted library allocation
page read and write
263B2F9C000
trusted library allocation
page read and write
263B0DC7000
trusted library allocation
page read and write
1509FD3D000
heap
page read and write
263B9535000
trusted library allocation
page read and write
263BA8C6000
trusted library allocation
page read and write
263B3C5B000
trusted library allocation
page read and write
263B1257000
trusted library allocation
page read and write
4EE09FE000
stack
page read and write
263B37DC000
trusted library allocation
page read and write
263B0DC7000
trusted library allocation
page read and write
263AE5F9000
trusted library allocation
page read and write
263B2E40000
trusted library allocation
page read and write
263BCCE3000
trusted library allocation
page read and write
263B26A4000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263B95C1000
trusted library allocation
page read and write
263BD1A7000
trusted library allocation
page read and write
263B1089000
heap
page read and write
263BD67D000
trusted library allocation
page read and write
263BD78A000
trusted library allocation
page read and write
263B1D27000
trusted library allocation
page read and write
263BD172000
trusted library allocation
page read and write
263B2D2C000
trusted library allocation
page read and write
263B2A35000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
263B143A000
trusted library allocation
page read and write
263BA7F5000
trusted library allocation
page read and write
263B5A02000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263A7F5D000
heap
page read and write
263B2D2A000
trusted library allocation
page read and write
263BD136000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B3BF0000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263BD6DD000
trusted library allocation
page read and write
263BD69E000
trusted library allocation
page read and write
263BA7DB000
trusted library allocation
page read and write
263B356F000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263B3C5B000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263B1D1B000
trusted library allocation
page read and write
263B1A93000
trusted library allocation
page read and write
263AE590000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B8CFE000
trusted library allocation
page read and write
263B2F5F000
trusted library allocation
page read and write
263B3AAB000
trusted library allocation
page read and write
263AE5C9000
trusted library allocation
page read and write
1509FC9C000
heap
page read and write
263BA7DD000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
1509F063000
trusted library allocation
page read and write
263B1842000
trusted library allocation
page read and write
263B2C6E000
trusted library allocation
page read and write
263A8001000
heap
page read and write
263A7F9B000
heap
page read and write
263B8CE3000
trusted library allocation
page read and write
263B3567000
trusted library allocation
page read and write
263AE6A5000
trusted library allocation
page read and write
263B3C9A000
trusted library allocation
page read and write
263B15E9000
trusted library allocation
page read and write
248F1CF0000
unclassified section
page readonly
263A7F82000
heap
page read and write
263BC8C9000
trusted library allocation
page read and write
263B3C05000
trusted library allocation
page read and write
1509F701000
unkown
page execute read
263B0DC7000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263BC87B000
trusted library allocation
page read and write
263A7F60000
heap
page read and write
263B464B000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263B2DF4000
trusted library allocation
page read and write
263B9613000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263B2CF2000
trusted library allocation
page read and write
263B3547000
trusted library allocation
page read and write
263A7F79000
heap
page read and write
263A7F5E000
heap
page read and write
263B3C1A000
trusted library allocation
page read and write
263BA67D000
trusted library allocation
page read and write
C1C000
unkown
page readonly
263B189D000
trusted library allocation
page read and write
263B32CF000
trusted library allocation
page read and write
263B4696000
trusted library allocation
page read and write
263B477F000
trusted library allocation
page read and write
263B3C2A000
trusted library allocation
page read and write
263B95FB000
trusted library allocation
page read and write
263BDDB1000
heap
page read and write
1509FD23000
heap
page read and write
49BBFFE000
unkown
page readonly
263BA6FA000
trusted library allocation
page read and write
263B8CD0000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B12D3000
trusted library allocation
page read and write
263B1463000
trusted library allocation
page read and write
263BE533000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263A7FE1000
heap
page read and write
263A7FCF000
heap
page read and write
263BAED2000
trusted library allocation
page read and write
263B122E000
trusted library allocation
page read and write
263B1F9A000
trusted library allocation
page read and write
263B26DF000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263A7FCF000
heap
page read and write
263BAE66000
trusted library allocation
page read and write
263BAF69000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263BA6AF000
trusted library allocation
page read and write
263B4B8A000
trusted library allocation
page read and write
263B1AE6000
trusted library allocation
page read and write
248F2130000
trusted library allocation
page read and write
263A7F64000
heap
page read and write
263AE57E000
trusted library allocation
page read and write
263BC734000
trusted library allocation
page read and write
263B1099000
heap
page read and write
263B2A13000
trusted library allocation
page read and write
263B2DF6000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263BC898000
trusted library allocation
page read and write
263B12DC000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2DC1000
trusted library allocation
page read and write
F88AE3E000
unkown
page readonly
263AC9F8000
trusted library allocation
page read and write
263BA754000
trusted library allocation
page read and write
263B2FB1000
trusted library allocation
page read and write
263B2632000
trusted library allocation
page read and write
263B4685000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B946B000
trusted library allocation
page read and write
263B3CD2000
trusted library allocation
page read and write
263A7FDB000
heap
page read and write
263A7FA5000
heap
page read and write
263B1F56000
trusted library allocation
page read and write
263BA754000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
1509FDB7000
heap
page read and write
263B2D29000
trusted library allocation
page read and write
263B2DFB000
trusted library allocation
page read and write
263B1AFE000
trusted library allocation
page read and write
263B3163000
trusted library allocation
page read and write
263BA669000
trusted library allocation
page read and write
263BC7C5000
trusted library allocation
page read and write
263B26BC000
trusted library allocation
page read and write
263B128C000
trusted library allocation
page read and write
263B93F9000
trusted library allocation
page read and write
B80000
unkown
page readonly
1509FD20000
heap
page read and write
263B1290000
trusted library allocation
page read and write
263B2DF4000
trusted library allocation
page read and write
263BA70F000
trusted library allocation
page read and write
263B0AE6000
trusted library allocation
page read and write
263B2DB8000
trusted library allocation
page read and write
263B1090000
heap
page read and write
263B187D000
trusted library allocation
page read and write
263BA714000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
263A7FD2000
heap
page read and write
263B15ED000
trusted library allocation
page read and write
263B12DF000
trusted library allocation
page read and write
1509F0B0000
trusted library allocation
page read and write
263B2DF1000
trusted library allocation
page read and write
263BD6AC000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263A7F9B000
heap
page read and write
263A7F8D000
heap
page read and write
263B1216000
trusted library allocation
page read and write
263BADF0000
trusted library allocation
page read and write
263B2CF2000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B0DDE000
trusted library allocation
page read and write
263B94A5000
trusted library allocation
page read and write
263BC8EA000
trusted library allocation
page read and write
263B1A89000
trusted library allocation
page read and write
263B37F7000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B26EF000
trusted library allocation
page read and write
263AD0BF000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B93D0000
trusted library allocation
page read and write
33D0000
heap
page read and write
263B1092000
heap
page read and write
263B26B8000
trusted library allocation
page read and write
263A7F83000
heap
page read and write
263AE5C3000
trusted library allocation
page read and write
2B09A139000
trusted library allocation
page read and write
263B3C4A000
trusted library allocation
page read and write
263AE5AE000
trusted library allocation
page read and write
263B2FCB000
trusted library allocation
page read and write
263A7FD2000
heap
page read and write
263B355F000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
1509FDAC000
heap
page read and write
263B3825000
trusted library allocation
page read and write
263B1226000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263B2991000
trusted library allocation
page read and write
248F1F5A000
heap
page read and write
263B3579000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B8D19000
trusted library allocation
page read and write
263B2A8F000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
248F2149000
trusted library allocation
page read and write
263B1CE7000
trusted library allocation
page read and write
263B3C92000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263BD4C4000
trusted library allocation
page read and write
263B2DA0000
trusted library allocation
page read and write
263A8029000
heap
page read and write
263B125A000
trusted library allocation
page read and write
263B3C1A000
trusted library allocation
page read and write
1A760050000
heap
page read and write
263B2638000
trusted library allocation
page read and write
263B26BF000
trusted library allocation
page read and write
C42000
unkown
page readonly
263B29B6000
trusted library allocation
page read and write
263B948D000
trusted library allocation
page read and write
263B3CA3000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B26DF000
trusted library allocation
page read and write
263BDDBB000
heap
page read and write
263A7FE1000
heap
page read and write
263B4AF1000
trusted library allocation
page read and write
263B35B0000
trusted library allocation
page read and write
263B94C6000
trusted library allocation
page read and write
263BC859000
trusted library allocation
page read and write
263B2DB0000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B3789000
trusted library allocation
page read and write
263B9467000
trusted library allocation
page read and write
263BA8D0000
trusted library allocation
page read and write
263B3CAB000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
26812AAA000
heap
page read and write
263B26AB000
trusted library allocation
page read and write
248F1DA0000
heap
page read and write
263B0AD2000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
1509FD98000
heap
page read and write
263B157E000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263B128C000
trusted library allocation
page read and write
263B26AE000
trusted library allocation
page read and write
2B099B30000
unclassified section
page readonly
263B0D9F000
trusted library allocation
page read and write
263B3AF6000
trusted library allocation
page read and write
263B1280000
trusted library allocation
page read and write
263B8C81000
trusted library allocation
page read and write
263B3570000
trusted library allocation
page read and write
263BAD6F000
trusted library allocation
page read and write
263AD0E3000
trusted library allocation
page read and write
263BC7A7000
trusted library allocation
page read and write
263B1C4F000
trusted library allocation
page read and write
263A8002000
heap
page read and write
263BAED8000
trusted library allocation
page read and write
263B148D000
trusted library allocation
page read and write
263B30C9000
trusted library allocation
page read and write
263BAB00000
trusted library allocation
page read and write
263B1087000
heap
page read and write
263A7F80000
heap
page read and write
263A7F7F000
heap
page read and write
263B94F3000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
263AD09A000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263A7FA5000
heap
page read and write
263BB2A3000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7F87000
heap
page read and write
263B2AA2000
trusted library allocation
page read and write
263A7FE1000
heap
page read and write
8D4000
heap
page read and write
263A7F7B000
heap
page read and write
263A7F87000
heap
page read and write
263B47FC000
trusted library allocation
page read and write
263BA7DD000
trusted library allocation
page read and write
2FB8A0EF000
trusted library allocation
page execute read
263B29B6000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263A7F64000
heap
page read and write
263A7FA5000
heap
page read and write
263B1EC9000
trusted library allocation
page read and write
49BA7D8000
stack
page read and write
263A7F5D000
heap
page read and write
263A7F79000
heap
page read and write
263A7F8D000
heap
page read and write
263B1AE6000
trusted library allocation
page read and write
1509FCA9000
heap
page read and write
263A7F80000
heap
page read and write
263BD132000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B9467000
trusted library allocation
page read and write
263B30C5000
trusted library allocation
page read and write
263B9489000
trusted library allocation
page read and write
263B3C48000
trusted library allocation
page read and write
263B2F7F000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263BA70B000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B1216000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263BA7E6000
trusted library allocation
page read and write
1509FD31000
heap
page read and write
263B26DE000
trusted library allocation
page read and write
263B3AF6000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263A7F6D000
heap
page read and write
2B099FE7000
trusted library allocation
page read and write
263B963D000
trusted library allocation
page read and write
263B2DF6000
trusted library allocation
page read and write
263B2A91000
trusted library allocation
page read and write
263BD6D9000
trusted library allocation
page read and write
263BA714000
trusted library allocation
page read and write
263B2B67000
trusted library allocation
page read and write
263B387E000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263B2D41000
trusted library allocation
page read and write
263B1DB8000
trusted library allocation
page read and write
263AE592000
trusted library allocation
page read and write
263BC79E000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
263B9645000
trusted library allocation
page read and write
263A7FAD000
heap
page read and write
263B15ED000
trusted library allocation
page read and write
263A7FD1000
heap
page read and write
263B0DCD000
trusted library allocation
page read and write
263A7FEA000
heap
page read and write
263B2A40000
trusted library allocation
page read and write
263BCBF8000
trusted library allocation
page read and write
263BA676000
trusted library allocation
page read and write
2B099F00000
trusted library allocation
page read and write
263B0DF1000
trusted library allocation
page read and write
263B3BFA000
trusted library allocation
page read and write
1509F1D4000
heap
page read and write
263B4ACE000
trusted library allocation
page read and write
263B0DDE000
trusted library allocation
page read and write
263AE596000
trusted library allocation
page read and write
2B099F7E000
trusted library allocation
page read and write
263B14A3000
trusted library allocation
page read and write
263BD1FE000
trusted library allocation
page read and write
263BA8AC000
trusted library allocation
page read and write
263B2F9D000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
8D4000
heap
page read and write
263B2DEF000
trusted library allocation
page read and write
263BB3C5000
trusted library allocation
page read and write
263BD161000
trusted library allocation
page read and write
263B1269000
trusted library allocation
page read and write
2B099F98000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263B2E81000
trusted library allocation
page read and write
263B1099000
heap
page read and write
263BDD51000
heap
page read and write
263B15E6000
trusted library allocation
page read and write
263BC738000
trusted library allocation
page read and write
263BDDAC000
heap
page read and write
263B2E7B000
trusted library allocation
page read and write
263B0DE2000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263B3838000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
263B2FB1000
trusted library allocation
page read and write
263BA8C8000
trusted library allocation
page read and write
263B960E000
trusted library allocation
page read and write
263BA7C2000
trusted library allocation
page read and write
263BA7AC000
trusted library allocation
page read and write
263B8CF5000
trusted library allocation
page read and write
263BDB76000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263B0DF1000
trusted library allocation
page read and write
263BCCCF000
trusted library allocation
page read and write
2B09A10C000
trusted library allocation
page read and write
263B26BF000
trusted library allocation
page read and write
263B2BCE000
trusted library allocation
page read and write
26811100000
trusted library allocation
page read and write
263B3C75000
trusted library allocation
page read and write
263B1A88000
trusted library allocation
page read and write
263A7F82000
heap
page read and write
263A7F5E000
heap
page read and write
263B30DE000
trusted library allocation
page read and write
263A8023000
heap
page read and write
263B96EC000
trusted library allocation
page read and write
263B4619000
trusted library allocation
page read and write
263B0DF0000
trusted library allocation
page read and write
263BAF59000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263BA667000
trusted library allocation
page read and write
248F217A000
trusted library allocation
page read and write
263AD09A000
trusted library allocation
page read and write
1509FD26000
heap
page read and write
263A7F80000
heap
page read and write
263B93C2000
trusted library allocation
page read and write
263A7F69000
heap
page read and write
263B1090000
heap
page read and write
263AD0E3000
trusted library allocation
page read and write
263B8CFE000
trusted library allocation
page read and write
263B2DC8000
trusted library allocation
page read and write
263B2FFE000
trusted library allocation
page read and write
248F1ED0000
heap
page read and write
263B2974000
trusted library allocation
page read and write
263B2FAF000
trusted library allocation
page read and write
1509FCCA000
heap
page read and write
263BAFEB000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263BD28F000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263A7FCE000
heap
page read and write
263B9657000
trusted library allocation
page read and write
263A7F80000
heap
page read and write
263BD6E3000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263BD120000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263B2B0B000
trusted library allocation
page read and write
263BA900000
trusted library allocation
page read and write
263A7FC7000
heap
page read and write
263B38E5000
trusted library allocation
page read and write
263B1DAA000
trusted library allocation
page read and write
263B4646000
trusted library allocation
page read and write
263B1DB3000
trusted library allocation
page read and write
263BD172000
trusted library allocation
page read and write
263B2F41000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
263A7FC6000
heap
page read and write
263B956A000
trusted library allocation
page read and write
263AE1A8000
trusted library allocation
page read and write
248F1EF4000
heap
page read and write
263B26B4000
trusted library allocation
page read and write
263A7F84000
heap
page read and write
263B9399000
trusted library allocation
page read and write
263A8021000
heap
page read and write
1509F817000
trusted library allocation
page read and write
1509FD26000
heap
page read and write
1509FCA9000
heap
page read and write
263B4A84000
trusted library allocation
page read and write
263A7FD7000
heap
page read and write
263A7F9B000
heap
page read and write
263A7FD2000
heap
page read and write
263B2FEF000
trusted library allocation
page read and write
263ACF2F000
trusted library allocation
page read and write
263BAD19000
trusted library allocation
page read and write
263B1DB6000
trusted library allocation
page read and write
263BE44D000
trusted library allocation
page read and write
26810E11000
heap
page read and write
263B1863000
trusted library allocation
page read and write
26810D30000
heap
page read and write
263BA8DD000
trusted library allocation
page read and write
263BA8DD000
trusted library allocation
page read and write
263B3976000
trusted library allocation
page read and write
263AE1F3000
trusted library allocation
page read and write
263B3C56000
trusted library allocation
page read and write
263B8CC8000
trusted library allocation
page read and write
EBFA1BE000
unkown
page readonly
263B31AC000
trusted library allocation
page read and write
263B107F000
heap
page read and write
263AD051000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B2D3F000
trusted library allocation
page read and write
263B0D33000
trusted library allocation
page read and write
263B46EE000
trusted library allocation
page read and write
263B32FB000
trusted library allocation
page read and write
263BDB3D000
trusted library allocation
page read and write
263B3CBF000
trusted library allocation
page read and write
263B2E63000
trusted library allocation
page read and write
263BAF57000
trusted library allocation
page read and write
263A7FC6000
heap
page read and write
263B2F33000
trusted library allocation
page read and write
263A7F61000
heap
page read and write
263B30EF000
trusted library allocation
page read and write
263BC73C000
trusted library allocation
page read and write
263B1EB1000
trusted library allocation
page read and write
263A800E000
heap
page read and write
263BD192000
trusted library allocation
page read and write
263B96C6000
trusted library allocation
page read and write
2660003F000
trusted library allocation
page read and write
263BD2D6000
trusted library allocation
page read and write
263BE448000
trusted library allocation
page read and write
263B3CAB000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
263BDE31000
heap
page read and write
263A7F5D000
heap
page read and write
263A7FEB000
heap
page read and write
263B31D5000
trusted library allocation
page read and write
263B3B94000
trusted library allocation
page read and write
263B94D8000
trusted library allocation
page read and write
263B1285000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263BD1A7000
trusted library allocation
page read and write
263BADB9000
trusted library allocation
page read and write
263B9621000
trusted library allocation
page read and write
263AE5AE000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
2B099C3A000
heap
page read and write
263BD4FA000
trusted library allocation
page read and write
1509FC9F000
heap
page read and write
263B127B000
trusted library allocation
page read and write
263B2F69000
trusted library allocation
page read and write
263B0A87000
trusted library allocation
page read and write
2B099DA0000
unclassified section
page read and write
263A7F65000
heap
page read and write
263BC8EC000
trusted library allocation
page read and write
263BA739000
trusted library allocation
page read and write
263BDA2B000
trusted library allocation
page read and write
2B099F44000
trusted library allocation
page read and write
D08000
heap
page read and write
263B3807000
trusted library allocation
page read and write
263B478B000
trusted library allocation
page read and write
263B2DFB000
trusted library allocation
page read and write
263B9617000
trusted library allocation
page read and write
263B46A8000
trusted library allocation
page read and write
1509F081000
trusted library allocation
page read and write
263B1E8A000
trusted library allocation
page read and write
263A7FEB000
heap
page read and write
263A7F64000
heap
page read and write
263B8C71000
trusted library allocation
page read and write
263B2AE8000
trusted library allocation
page read and write
263B0DDE000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263BC880000
trusted library allocation
page read and write
263A7F65000
heap
page read and write
263B26C3000
trusted library allocation
page read and write
F88AEFE000
stack
page read and write
263AD075000
trusted library allocation
page read and write
263B38AE000
trusted library allocation
page read and write
263B3573000
trusted library allocation
page read and write
263BA841000
trusted library allocation
page read and write
263B2EA7000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A800E000
heap
page read and write
263B0DE6000
trusted library allocation
page read and write
1509F000000
trusted library allocation
page read and write
263B46DB000
trusted library allocation
page read and write
263B4868000
trusted library allocation
page read and write
263B2EA7000
trusted library allocation
page read and write
263B2E45000
trusted library allocation
page read and write
263B2DFB000
trusted library allocation
page read and write
263B3ADC000
trusted library allocation
page read and write
263B3530000
trusted library allocation
page read and write
263AE6E1000
trusted library allocation
page read and write
D3F000
heap
page read and write
263A7F87000
heap
page read and write
263BA7F1000
trusted library allocation
page read and write
263A7FA6000
heap
page read and write
263B1EE1000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B3CDB000
trusted library allocation
page read and write
263B147D000
trusted library allocation
page read and write
263B3A6B000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
1509FD20000
heap
page read and write
263A7F87000
heap
page read and write
263B30F3000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
26812ABB000
heap
page read and write
263B46B7000
trusted library allocation
page read and write
263BD1EC000
trusted library allocation
page read and write
263B2CE5000
trusted library allocation
page read and write
263A7FCE000
heap
page read and write
248F2400000
trusted library allocation
page read and write
263B1FC8000
trusted library allocation
page read and write
263B32DA000
trusted library allocation
page read and write
1509F5E0000
heap
page read and write
263BD4C8000
trusted library allocation
page read and write
263B1257000
trusted library allocation
page read and write
263A7F87000
heap
page read and write
263B4685000
trusted library allocation
page read and write
263BC87B000
trusted library allocation
page read and write
26810E02000
heap
page read and write
263BA8E3000
trusted library allocation
page read and write
263B3AF3000
trusted library allocation
page read and write
263B3C5B000
trusted library allocation
page read and write
263A7F85000
heap
page read and write
263AE5B5000
trusted library allocation
page read and write
263BCCE3000
trusted library allocation
page read and write
263AE554000
trusted library allocation
page read and write
263B2F4C000
trusted library allocation
page read and write
263BC8EC000
trusted library allocation
page read and write
263B2CE0000
trusted library allocation
page read and write
263BAD8B000
trusted library allocation
page read and write
263BDD9D000
heap
page read and write
263B94A5000
trusted library allocation
page read and write
263B2681000
trusted library allocation
page read and write
263BD1C7000
trusted library allocation
page read and write
263B2632000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B3089000
trusted library allocation
page read and write
263B10B6000
heap
page read and write
263A7F7F000
heap
page read and write
263BC845000
trusted library allocation
page read and write
263B93D0000
trusted library allocation
page read and write
263BCB7E000
trusted library allocation
page read and write
263B18B6000
trusted library allocation
page read and write
263B3A31000
trusted library allocation
page read and write
2B099E00000
trusted library allocation
page read and write
1509F086000
trusted library allocation
page read and write
263B2DBB000
trusted library allocation
page read and write
263BD71C000
trusted library allocation
page read and write
263BCBD4000
trusted library allocation
page read and write
263B1CC0000
trusted library allocation
page read and write
263BD2EF000
trusted library allocation
page read and write
263B0AD6000
trusted library allocation
page read and write
263A7F7B000
heap
page read and write
263BDA31000
trusted library allocation
page read and write
2FB8A111000
trusted library allocation
page execute read
263B3567000
trusted library allocation
page read and write
263A7F74000
heap
page read and write
263BA679000
trusted library allocation
page read and write
263BE4A7000
trusted library allocation
page read and write
263BC851000
trusted library allocation
page read and write
263B3C61000
trusted library allocation
page read and write
263AE631000
trusted library allocation
page read and write
263A8001000
heap
page read and write
263BAE4D000
trusted library allocation
page read and write
263BC878000
trusted library allocation
page read and write
263A7FA0000
heap
page read and write
263B0DF1000
trusted library allocation
page read and write
263B26EC000
trusted library allocation
page read and write
263A7FA5000
heap
page read and write
263B2B3D000
trusted library allocation
page read and write
263A7F86000
heap
page read and write
263A7FC6000
heap
page read and write
263B47DB000
trusted library allocation
page read and write
1509F068000
trusted library allocation
page read and write
263B3CB4000
trusted library allocation
page read and write
263AD06A000
trusted library allocation
page read and write
263B2D72000
trusted library allocation
page read and write
263B3CE7000
trusted library allocation
page read and write
263BD131000
trusted library allocation
page read and write
263B94C6000
trusted library allocation
page read and write
263BD2EF000
trusted library allocation
page read and write
263B4796000
trusted library allocation
page read and write
263B2DE1000
trusted library allocation
page read and write
263B37B4000
trusted library allocation
page read and write
263A7F9F000
heap
page read and write
263BDD51000
heap
page read and write
263B350F000
trusted library allocation
page read and write
263A7FC8000
heap
page read and write
263B3567000
trusted library allocation
page read and write
263B2EFD000
trusted library allocation
page read and write
263BD63D000
trusted library allocation
page read and write
263B47D3000
trusted library allocation
page read and write
263B9461000
trusted library allocation
page read and write
B80000
unkown
page readonly
263BA7F1000
trusted library allocation
page read and write
263B127B000
trusted library allocation
page read and write
263BD4B5000
trusted library allocation
page read and write
263B2B67000
trusted library allocation
page read and write
248F1D00000
unclassified section
page readonly
263B0DBE000
trusted library allocation
page read and write
263B1260000
trusted library allocation
page read and write
263BA743000
trusted library allocation
page read and write
263B1E43000
trusted library allocation
page read and write
263BA8AE000
trusted library allocation
page read and write
263B2A40000
trusted library allocation
page read and write
EBF8078000
stack
page read and write
263B47D3000
trusted library allocation
page read and write
263BA8D0000
trusted library allocation
page read and write
263A7FE0000
heap
page read and write
263B19EC000
trusted library allocation
page read and write
263A7F97000
heap
page read and write
263B0DB6000
trusted library allocation
page read and write
263B30EF000
trusted library allocation
page read and write
1509FD32000
heap
page read and write
263A7F7D000
heap
page read and write
263A7F9B000
heap
page read and write
263B1D53000
trusted library allocation
page read and write
263B1AE6000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263BDE08000
heap
page read and write
263B128E000
trusted library allocation
page read and write
263BA8E5000
trusted library allocation
page read and write
263AD0A9000
trusted library allocation
page read and write
263B961D000
trusted library allocation
page read and write
263B32F9000
trusted library allocation
page read and write
263B1FCD000
trusted library allocation
page read and write
263B14CC000
trusted library allocation
page read and write
263A7F6D000
heap
page read and write
263B2BD3000
trusted library allocation
page read and write
263B3CF5000
trusted library allocation
page read and write
263A7F6B000
heap
page read and write
263BD125000
trusted library allocation
page read and write
263BB457000
trusted library allocation
page read and write
263A7F5E000
heap
page read and write
263B94A5000
trusted library allocation
page read and write
263AE583000
trusted library allocation
page read and write
263B0D8F000
trusted library allocation
page read and write
263B2A5D000
trusted library allocation
page read and write
D31000
heap
page read and write
263B8CCC000
trusted library allocation
page read and write
263BD4AB000
trusted library allocation
page read and write
263A7F9B000
heap
page read and write
263A7FC7000
heap
page read and write
263BD2C5000
trusted library allocation
page read and write
263BD6EA000
trusted library allocation
page read and write
263A7F8D000
heap
page read and write
There are 4046 hidden memdumps, click here to show them.