IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1c4f3e0a-cea6-4319-adc0-8d4560a6dc87.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1c4f3e0a-cea6-4319-adc0-8d4560a6dc87.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {797ad2a9-7652-4365-b951-42dbaabe223f} 7052 "\\.\pipe\gecko-crash-server-pipe.7052" 243ca86e910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1540 -parentBuildID 20230927232528 -prefsHandle 1032 -prefMapHandle 3920 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6929ae9b-4ac0-4d1f-949e-3479bc1d9858} 7052 "\\.\pipe\gecko-crash-server-pipe.7052" 243dbd03e10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5188 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4996 -prefMapHandle 5016 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccbe5282-8372-4565-9cda-2ef5da5efe79} 7052 "\\.\pipe\gecko-crash-server-pipe.7052" 243d87f7310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.110
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.212.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
142.250.185.110
youtube.com
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
243DD97D000
trusted library allocation
page read and write
17F8F5B0000
unclassified section
page read and write
243DB53B000
trusted library allocation
page read and write
243E3EAD000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243DDEA3000
trusted library allocation
page read and write
243D1584000
heap
page read and write
243DC84D000
trusted library allocation
page read and write
243D7BC2000
trusted library allocation
page read and write
243DA6DE000
trusted library allocation
page read and write
243DB568000
trusted library allocation
page read and write
243DA38C000
trusted library allocation
page read and write
17F8F7CF000
trusted library allocation
page read and write
17F90458000
heap
page read and write
243DB416000
trusted library allocation
page read and write
219329DB000
trusted library allocation
page read and write
243DA63B000
trusted library allocation
page read and write
243DC7CF000
trusted library allocation
page read and write
2314420F000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243D7B2C000
trusted library allocation
page read and write
243DE0F4000
trusted library allocation
page read and write
243E3EC4000
trusted library allocation
page read and write
243DA6F7000
trusted library allocation
page read and write
243DCCFA000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243DB49C000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
243DB43F000
trusted library allocation
page read and write
243D1539000
heap
page read and write
17F90360000
heap
page read and write
243DCCE5000
trusted library allocation
page read and write
243E26A9000
trusted library allocation
page read and write
17F903F1000
heap
page read and write
243DA6D6000
trusted library allocation
page read and write
243DC5D6000
trusted library allocation
page read and write
243D7BBF000
trusted library allocation
page read and write
243DC8B8000
trusted library allocation
page read and write
243DD92F000
trusted library allocation
page read and write
243E28D3000
trusted library allocation
page read and write
17F8F763000
trusted library allocation
page read and write
243E262A000
trusted library allocation
page read and write
243E6437000
trusted library allocation
page read and write
243DDEEE000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DC8AF000
trusted library allocation
page read and write
243DA688000
trusted library allocation
page read and write
243E4C1B000
trusted library allocation
page read and write
243DCBFE000
trusted library allocation
page read and write
243DCBC1000
trusted library allocation
page read and write
243E2C00000
trusted library allocation
page read and write
243D1584000
heap
page read and write
243D152A000
heap
page read and write
243D651E000
trusted library allocation
page read and write
243DB54F000
trusted library allocation
page read and write
243DA6EA000
trusted library allocation
page read and write
2DC6DB203000
trusted library allocation
page read and write
243E25D5000
trusted library allocation
page read and write
243D1552000
heap
page read and write
21932AA4000
heap
page read and write
243D6517000
trusted library allocation
page read and write
243D76B7000
trusted library allocation
page read and write
243D745C000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D1551000
heap
page read and write
330000
unkown
page readonly
243DA395000
trusted library allocation
page read and write
243DDA08000
trusted library allocation
page read and write
243D7687000
trusted library allocation
page read and write
243D1555000
heap
page read and write
243DA589000
trusted library allocation
page read and write
243DC8E2000
trusted library allocation
page read and write
243E24E7000
trusted library allocation
page read and write
243DA36E000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DC583000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243E6986000
trusted library allocation
page read and write
243DC837000
trusted library allocation
page read and write
243D1509000
heap
page read and write
243DB76A000
trusted library allocation
page read and write
243DD984000
trusted library allocation
page read and write
243DE078000
trusted library allocation
page read and write
243E40AA000
trusted library allocation
page read and write
243DC19E000
trusted library allocation
page read and write
243D7DC9000
trusted library allocation
page read and write
17F8FC8F000
heap
page read and write
243D1587000
heap
page read and write
243DC5CD000
trusted library allocation
page read and write
243DBE66000
trusted library allocation
page read and write
17F90469000
heap
page read and write
243DA16F000
heap
page read and write
243E3EAD000
trusted library allocation
page read and write
243DDB6F000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DCAC9000
trusted library allocation
page read and write
243E6D86000
heap
page read and write
243DC791000
trusted library allocation
page read and write
243E25F7000
trusted library allocation
page read and write
243DC73B000
trusted library allocation
page read and write
17F8F3D0000
unclassified section
page readonly
243D74C6000
trusted library allocation
page read and write
243DE074000
trusted library allocation
page read and write
243DDEFC000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DC110000
trusted library allocation
page read and write
243E284A000
trusted library allocation
page read and write
243E27E7000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DABF5000
trusted library allocation
page read and write
243E4C80000
trusted library allocation
page read and write
243DDA29000
trusted library allocation
page read and write
243E4C6C000
trusted library allocation
page read and write
243E6D09000
heap
page read and write
243D76B0000
trusted library allocation
page read and write
243D1532000
heap
page read and write
BFE000
stack
page read and write
243D1552000
heap
page read and write
243DC8A1000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DC92C000
trusted library allocation
page read and write
243DC946000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243D1583000
heap
page read and write
243E28AE000
trusted library allocation
page read and write
243E3E09000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DB4DF000
trusted library allocation
page read and write
243D1527000
heap
page read and write
243D7448000
trusted library allocation
page read and write
243DDEC8000
trusted library allocation
page read and write
243E26B4000
trusted library allocation
page read and write
243D1555000
heap
page read and write
243D157B000
heap
page read and write
243DC7CF000
trusted library allocation
page read and write
243DCBE1000
trusted library allocation
page read and write
243E6D25000
heap
page read and write
243D1581000
heap
page read and write
243DA6EC000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D1572000
heap
page read and write
243E404D000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1519000
heap
page read and write
243DB742000
trusted library allocation
page read and write
243D642F000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243DA6BE000
trusted library allocation
page read and write
243D1529000
heap
page read and write
243D1542000
heap
page read and write
243E5BC2000
trusted library allocation
page read and write
243DC5D6000
trusted library allocation
page read and write
21932903000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243E6D1B000
heap
page read and write
243E5ED9000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1551000
heap
page read and write
243DA6FC000
trusted library allocation
page read and write
243DE054000
trusted library allocation
page read and write
243DC82F000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1521000
heap
page read and write
243D158A000
heap
page read and write
243E4CFC000
trusted library allocation
page read and write
243D1523000
heap
page read and write
243E2524000
trusted library allocation
page read and write
2193295D000
trusted library allocation
page read and write
243DB75C000
trusted library allocation
page read and write
243DC598000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DCD98000
trusted library allocation
page read and write
243D154B000
heap
page read and write
330000
unkown
page readonly
17F90364000
heap
page read and write
243E25D7000
trusted library allocation
page read and write
243D1516000
heap
page read and write
243DC8E2000
trusted library allocation
page read and write
243DC777000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DCD3F000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1502000
heap
page read and write
243E24BB000
trusted library allocation
page read and write
243E61E5000
trusted library allocation
page read and write
243DC869000
trusted library allocation
page read and write
243DB49C000
trusted library allocation
page read and write
243D1555000
heap
page read and write
243D157F000
heap
page read and write
243DDB7A000
trusted library allocation
page read and write
243DBFE0000
trusted library allocation
page read and write
243D158A000
heap
page read and write
95E37FF000
stack
page read and write
243DC84B000
trusted library allocation
page read and write
243E3E64000
trusted library allocation
page read and write
243E25AD000
trusted library allocation
page read and write
6F32E3E000
unkown
page readonly
243D1532000
heap
page read and write
243DC848000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243DA547000
trusted library allocation
page read and write
243DB568000
trusted library allocation
page read and write
243DA6B6000
trusted library allocation
page read and write
243E24D1000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243D1560000
heap
page read and write
243E6D8C000
heap
page read and write
243DB568000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D153C000
heap
page read and write
243DB742000
trusted library allocation
page read and write
243DC143000
trusted library allocation
page read and write
243D7B76000
trusted library allocation
page read and write
243DB4AF000
trusted library allocation
page read and write
243E257B000
trusted library allocation
page read and write
243DCCFA000
trusted library allocation
page read and write
243DB774000
trusted library allocation
page read and write
23144094000
trusted library allocation
page read and write
17F9034D000
heap
page read and write
243E2539000
trusted library allocation
page read and write
23143D66000
heap
page read and write
243E4C4A000
trusted library allocation
page read and write
243D7BDE000
trusted library allocation
page read and write
243D1584000
heap
page read and write
243DC5B7000
trusted library allocation
page read and write
243E42A8000
trusted library allocation
page read and write
2193295F000
trusted library allocation
page read and write
243DCBE4000
trusted library allocation
page read and write
17F903A8000
heap
page read and write
243DC837000
trusted library allocation
page read and write
243D154A000
heap
page read and write
17F9043B000
heap
page read and write
243D1521000
heap
page read and write
243D157A000
heap
page read and write
243D1555000
heap
page read and write
243D153C000
heap
page read and write
243D1501000
heap
page read and write
243E2639000
trusted library allocation
page read and write
243DC156000
trusted library allocation
page read and write
243E2533000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
23143C20000
unclassified section
page readonly
243D151A000
heap
page read and write
243D7B1C000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DD9A4000
trusted library allocation
page read and write
243E28B5000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DA6F7000
trusted library allocation
page read and write
243DC98B000
trusted library allocation
page read and write
243DBF1C000
trusted library allocation
page read and write
243E26B5000
trusted library allocation
page read and write
17F8F590000
heap
page readonly
243DDEAE000
trusted library allocation
page read and write
243D1515000
heap
page read and write
243D1532000
heap
page read and write
23144079000
trusted library allocation
page read and write
243D76E9000
trusted library allocation
page read and write
243DA8BF000
trusted library allocation
page read and write
243E26A1000
trusted library allocation
page read and write
243DB742000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243E4CBF000
trusted library allocation
page read and write
243DDEEE000
trusted library allocation
page read and write
243DB5E7000
trusted library allocation
page read and write
243E24ED000
trusted library allocation
page read and write
243E3F87000
trusted library allocation
page read and write
243DDE59000
trusted library allocation
page read and write
243E6A57000
trusted library allocation
page read and write
243DC788000
trusted library allocation
page read and write
243DC9FE000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB78E000
trusted library allocation
page read and write
243DCCC9000
trusted library allocation
page read and write
243E2500000
trusted library allocation
page read and write
243DD92B000
trusted library allocation
page read and write
17F903A1000
heap
page read and write
243DDEE0000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DDB63000
trusted library allocation
page read and write
243DDBE5000
trusted library allocation
page read and write
243E3E9D000
trusted library allocation
page read and write
243DC123000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243E252F000
trusted library allocation
page read and write
6F305D8000
stack
page read and write
243E28D3000
trusted library allocation
page read and write
243DA6F7000
trusted library allocation
page read and write
243DA59E000
trusted library allocation
page read and write
243DA395000
trusted library allocation
page read and write
243D7BB8000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DB77F000
trusted library allocation
page read and write
141B0BB1000
trusted library allocation
page execute read
243D1576000
heap
page read and write
243DB728000
trusted library allocation
page read and write
243DC8AD000
trusted library allocation
page read and write
243E2ED5000
trusted library allocation
page read and write
243DC57C000
trusted library allocation
page read and write
243DC57C000
trusted library allocation
page read and write
243E28F3000
trusted library allocation
page read and write
243DA68F000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D7781000
trusted library allocation
page read and write
17F8F8D4000
heap
page read and write
243D151A000
heap
page read and write
243D1520000
heap
page read and write
243DAB6D000
trusted library allocation
page read and write
243DC149000
trusted library allocation
page read and write
243DA686000
trusted library allocation
page read and write
243D1579000
heap
page read and write
243DC5D3000
trusted library allocation
page read and write
243D1516000
heap
page read and write
243E6D09000
heap
page read and write
243DC95B000
trusted library allocation
page read and write
243E2826000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D152B000
heap
page read and write
243D1544000
heap
page read and write
243E3EFA000
trusted library allocation
page read and write
243DC767000
trusted library allocation
page read and write
243DC70A000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D1575000
heap
page read and write
243D1500000
heap
page read and write
243D1560000
heap
page read and write
243DC747000
trusted library allocation
page read and write
243E5EE6000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D77BE000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
21932640000
unclassified section
page readonly
243E2683000
trusted library allocation
page read and write
243DA889000
trusted library allocation
page read and write
243E690C000
trusted library allocation
page read and write
17F9038A000
heap
page read and write
243DB5B7000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243E6943000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243D1572000
heap
page read and write
243E61CB000
trusted library allocation
page read and write
243E4106000
trusted library allocation
page read and write
EB0000
heap
page read and write
F0F000
heap
page read and write
243D1540000
heap
page read and write
66A72FE000
stack
page read and write
243D1551000
heap
page read and write
296B53E000
unkown
page readonly
243D157D000
heap
page read and write
243D1535000
heap
page read and write
243DC149000
trusted library allocation
page read and write
243E6948000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243DAB56000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D151B000
heap
page read and write
243D1552000
heap
page read and write
243DC859000
trusted library allocation
page read and write
243DB53D000
trusted library allocation
page read and write
243E4C6C000
trusted library allocation
page read and write
243D152B000
heap
page read and write
17F8F786000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E283C000
trusted library allocation
page read and write
243DA691000
trusted library allocation
page read and write
243DA8B2000
trusted library allocation
page read and write
243DD700000
trusted library allocation
page read and write
243DDBEB000
trusted library allocation
page read and write
1CD451CA000
heap
page read and write
243D152B000
heap
page read and write
243E2532000
trusted library allocation
page read and write
243DC14E000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DA5CE000
trusted library allocation
page read and write
243DC9BA000
trusted library allocation
page read and write
243D77DD000
trusted library allocation
page read and write
17F90369000
heap
page read and write
243D15A6000
heap
page read and write
243DB684000
trusted library allocation
page read and write
243DA670000
trusted library allocation
page read and write
243D15A7000
heap
page read and write
17F90477000
heap
page read and write
1CD451F8000
heap
page read and write
243E5B4C000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243E259D000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D151A000
heap
page read and write
243D151A000
heap
page read and write
243D77C1000
trusted library allocation
page read and write
243D7D90000
trusted library allocation
page read and write
243DC726000
trusted library allocation
page read and write
243D1529000
heap
page read and write
243D6513000
trusted library allocation
page read and write
3CC000
unkown
page readonly
DDE000
stack
page read and write
243D7BB3000
trusted library allocation
page read and write
243E2836000
trusted library allocation
page read and write
243D1551000
heap
page read and write
28019800000
heap
page read and write
243DA655000
trusted library allocation
page read and write
243DC8BF000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DCBF1000
trusted library allocation
page read and write
243D77F0000
trusted library allocation
page read and write
17F90300000
heap
page read and write
243D1572000
heap
page read and write
243D1524000
heap
page read and write
243DC923000
trusted library allocation
page read and write
243DC115000
trusted library allocation
page read and write
243E68A2000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243D1572000
heap
page read and write
243D1551000
heap
page read and write
243DB4D1000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1539000
heap
page read and write
243D150D000
heap
page read and write
243DC886000
trusted library allocation
page read and write
243DC956000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DC133000
trusted library allocation
page read and write
243D1524000
heap
page read and write
1CD45300000
heap
page read and write
243DC5D3000
trusted library allocation
page read and write
243DDB15000
trusted library allocation
page read and write
17F8F775000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243E4005000
trusted library allocation
page read and write
17F90469000
heap
page read and write
243E5BD5000
trusted library allocation
page read and write
243DC859000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB4B2000
trusted library allocation
page read and write
17F9039C000
heap
page read and write
243D1572000
heap
page read and write
243D769C000
trusted library allocation
page read and write
243D7B86000
trusted library allocation
page read and write
17F8F75C000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243E4CD4000
trusted library allocation
page read and write
243D5EDF000
trusted library allocation
page read and write
243DC851000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
17F9043B000
heap
page read and write
243E5E33000
trusted library allocation
page read and write
243E2529000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DCDA7000
trusted library allocation
page read and write
23143EA2000
unclassified section
page read and write
17F8F600000
trusted library allocation
page read and write
243DB570000
trusted library allocation
page read and write
243DC17C000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243E251B000
trusted library allocation
page read and write
243DA8F2000
trusted library allocation
page read and write
243D7BD2000
trusted library allocation
page read and write
17F9038D000
heap
page read and write
243DDAE6000
trusted library allocation
page read and write
243D1589000
heap
page read and write
243DC9FE000
trusted library allocation
page read and write
243DAB7A000
trusted library allocation
page read and write
243DB45C000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1572000
heap
page read and write
243DC56A000
trusted library allocation
page read and write
243D1512000
heap
page read and write
243DDE34000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243D1500000
heap
page read and write
95E1FFA000
stack
page read and write
243D1501000
heap
page read and write
2193298F000
trusted library allocation
page read and write
243E3E12000
trusted library allocation
page read and write
243DB6DA000
trusted library allocation
page read and write
243D7BCE000
trusted library allocation
page read and write
243E26E3000
trusted library allocation
page read and write
243E27F3000
trusted library allocation
page read and write
243DDE97000
trusted library allocation
page read and write
243D77EB000
trusted library allocation
page read and write
243E25F1000
trusted library allocation
page read and write
243DB4A1000
trusted library allocation
page read and write
243D1522000
heap
page read and write
243DC9F0000
trusted library allocation
page read and write
2314421F000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1539000
heap
page read and write
243D7BC2000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D1521000
heap
page read and write
66A6A7B000
stack
page read and write
243E5EC4000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243DB54A000
trusted library allocation
page read and write
243D153A000
heap
page read and write
243DC98B000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D152F000
heap
page read and write
243E6D45000
heap
page read and write
243DA8B8000
trusted library allocation
page read and write
243DB570000
trusted library allocation
page read and write
243DA585000
trusted library allocation
page read and write
243DB7C2000
trusted library allocation
page read and write
243E4041000
trusted library allocation
page read and write
243DE0CA000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DA68A000
trusted library allocation
page read and write
243E24DF000
trusted library allocation
page read and write
243DB7AF000
trusted library allocation
page read and write
243DB54F000
trusted library allocation
page read and write
243DB755000
trusted library allocation
page read and write
243D152D000
heap
page read and write
243E4086000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243DB7C2000
trusted library allocation
page read and write
6F31DFE000
unkown
page readonly
243DA671000
trusted library allocation
page read and write
243DC131000
trusted library allocation
page read and write
243DB576000
trusted library allocation
page read and write
243E4CD3000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DC5F6000
trusted library allocation
page read and write
243DC14C000
trusted library allocation
page read and write
243DC82F000
trusted library allocation
page read and write
243E61A5000
trusted library allocation
page read and write
243E25D3000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243E4CB9000
trusted library allocation
page read and write
243D1531000
heap
page read and write
243D157B000
heap
page read and write
6F2FB1E000
unkown
page readonly
243D1532000
heap
page read and write
243DB5B7000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DA6B4000
trusted library allocation
page read and write
243DCD4A000
trusted library allocation
page read and write
243DC151000
trusted library allocation
page read and write
243DA68D000
trusted library allocation
page read and write
243D1516000
heap
page read and write
243D153D000
heap
page read and write
243D154B000
heap
page read and write
243E4C67000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
243E26F7000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DD9A0000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DAB7A000
trusted library allocation
page read and write
243DC722000
trusted library allocation
page read and write
243DB629000
trusted library allocation
page read and write
243D1537000
heap
page read and write
243DC8E4000
trusted library allocation
page read and write
243DA64A000
trusted library allocation
page read and write
243DCB06000
trusted library allocation
page read and write
243E6155000
trusted library allocation
page read and write
243DC121000
trusted library allocation
page read and write
243DA6EC000
trusted library allocation
page read and write
243E4CFE000
trusted library allocation
page read and write
243DB5B4000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D1542000
heap
page read and write
243D1522000
heap
page read and write
243E4CD3000
trusted library allocation
page read and write
243E4CD3000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DB480000
trusted library allocation
page read and write
243E26CB000
trusted library allocation
page read and write
243D7732000
trusted library allocation
page read and write
243D1589000
heap
page read and write
243D1551000
heap
page read and write
243E61C4000
trusted library allocation
page read and write
3314000
heap
page read and write
243DC131000
trusted library allocation
page read and write
243D152C000
heap
page read and write
243DC8AD000
trusted library allocation
page read and write
243D1577000
heap
page read and write
243E4C92000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DA6CA000
trusted library allocation
page read and write
243DB645000
trusted library allocation
page read and write
21932A2F000
unclassified section
page read and write
243D1532000
heap
page read and write
243D151A000
heap
page read and write
243DDEB0000
trusted library allocation
page read and write
17F90133000
unkown
page execute read
243E2942000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DA6FE000
trusted library allocation
page read and write
243DA63D000
trusted library allocation
page read and write
243DA179000
heap
page read and write
243DB541000
trusted library allocation
page read and write
243DCADF000
trusted library allocation
page read and write
243DC593000
trusted library allocation
page read and write
243DCBFE000
trusted library allocation
page read and write
243E281C000
trusted library allocation
page read and write
243D1525000
heap
page read and write
17F90369000
heap
page read and write
243DBFFD000
trusted library allocation
page read and write
3FC000
unkown
page read and write
243D155C000
heap
page read and write
243D1542000
heap
page read and write
243D1583000
heap
page read and write
1C25DE724000
trusted library allocation
page read and write
243D1522000
heap
page read and write
243DA16F000
heap
page read and write
296A4BE000
unkown
page readonly
243D1544000
heap
page read and write
243E5EE9000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DCD9D000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D7BAD000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243D1551000
heap
page read and write
17F90477000
heap
page read and write
243DC958000
trusted library allocation
page read and write
17F8FD70000
trusted library allocation
page read and write
243DC75A000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243D1551000
heap
page read and write
243D154B000
heap
page read and write
243DC8DA000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243E25AD000
trusted library allocation
page read and write
243E26C0000
trusted library allocation
page read and write
2193290C000
trusted library allocation
page read and write
243DC71C000
trusted library allocation
page read and write
243D742E000
trusted library allocation
page read and write
243E6D8D000
heap
page read and write
243DAB74000
trusted library allocation
page read and write
243DBFE7000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DCBDB000
trusted library allocation
page read and write
243DA6D2000
trusted library allocation
page read and write
17F9037F000
heap
page read and write
243E3E8F000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DB4BC000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E4157000
trusted library allocation
page read and write
17F8FC91000
heap
page read and write
243D152B000
heap
page read and write
243DB5A4000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D7B0E000
trusted library allocation
page read and write
243DC973000
trusted library allocation
page read and write
243DB4BB000
trusted library allocation
page read and write
243E6DD9000
heap
page read and write
243D7D45000
trusted library allocation
page read and write
243E283E000
trusted library allocation
page read and write
243E3E8F000
trusted library allocation
page read and write
243E26CB000
trusted library allocation
page read and write
66A69FE000
unkown
page readonly
243DC5E4000
trusted library allocation
page read and write
243DB755000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243DC5E7000
trusted library allocation
page read and write
243DC743000
trusted library allocation
page read and write
243DD919000
trusted library allocation
page read and write
243DC14C000
trusted library allocation
page read and write
243DB48E000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D1542000
heap
page read and write
243D76BA000
trusted library allocation
page read and write
243E405E000
trusted library allocation
page read and write
243DCD62000
trusted library allocation
page read and write
243DE0CF000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DC7CF000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC13B000
trusted library allocation
page read and write
243E2597000
trusted library allocation
page read and write
243DA54E000
trusted library allocation
page read and write
243D1540000
heap
page read and write
243DC824000
trusted library allocation
page read and write
243DCBDB000
trusted library allocation
page read and write
243E2757000
trusted library allocation
page read and write
243DBFD0000
trusted library allocation
page read and write
17F903FD000
heap
page read and write
243DB4B2000
trusted library allocation
page read and write
243DA6EF000
trusted library allocation
page read and write
243DC8A1000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D153D000
heap
page read and write
243D1579000
heap
page read and write
243DC5F6000
trusted library allocation
page read and write
243E28F3000
trusted library allocation
page read and write
F11000
heap
page read and write
243D1542000
heap
page read and write
243D151A000
heap
page read and write
243DB565000
trusted library allocation
page read and write
243DC586000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DB49F000
trusted library allocation
page read and write
243E2876000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DB499000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DB56E000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DC869000
trusted library allocation
page read and write
17F8F360000
unclassified section
page readonly
243D1552000
heap
page read and write
243D7752000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DB568000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DDEA5000
trusted library allocation
page read and write
243DCD0A000
trusted library allocation
page read and write
243E28EF000
trusted library allocation
page read and write
243DDAD4000
trusted library allocation
page read and write
243E405E000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243D65C0000
trusted library allocation
page read and write
243DC9DF000
trusted library allocation
page read and write
23143E90000
heap
page readonly
243DB562000
trusted library allocation
page read and write
243DC846000
trusted library allocation
page read and write
243DB51F000
trusted library allocation
page read and write
243D1529000
heap
page read and write
243D77A1000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DBFE7000
trusted library allocation
page read and write
243D1553000
heap
page read and write
243D1532000
heap
page read and write
243E40AC000
trusted library allocation
page read and write
243D5EEF000
trusted library allocation
page read and write
243D1519000
heap
page read and write
243D1576000
heap
page read and write
243D1551000
heap
page read and write
243E26F9000
trusted library allocation
page read and write
243D1535000
heap
page read and write
243DA6EA000
trusted library allocation
page read and write
243DC108000
trusted library allocation
page read and write
243DA3A6000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D154B000
heap
page read and write
243DA367000
trusted library allocation
page read and write
243E6D8C000
heap
page read and write
243DDABF000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D1538000
heap
page read and write
243E2576000
trusted library allocation
page read and write
243DC8A9000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243E3EE0000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DC840000
trusted library allocation
page read and write
243DC592000
trusted library allocation
page read and write
243DC8B5000
trusted library allocation
page read and write
243DB4B8000
trusted library allocation
page read and write
243DB5AF000
trusted library allocation
page read and write
243DA3D3000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D154B000
heap
page read and write
243D1521000
heap
page read and write
243DA58E000
trusted library allocation
page read and write
243E6A33000
trusted library allocation
page read and write
243DB6DE000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DA1E1000
heap
page read and write
17F9035C000
heap
page read and write
243DB4C2000
trusted library allocation
page read and write
243DC5CF000
trusted library allocation
page read and write
243DE0FD000
trusted library allocation
page read and write
243DB570000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E3E77000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243E2980000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DB57E000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1524000
heap
page read and write
243E61D7000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D7822000
trusted library allocation
page read and write
6F33E3E000
unkown
page readonly
243DDEE0000
trusted library allocation
page read and write
28019A00000
trusted library allocation
page read and write
243E2977000
trusted library allocation
page read and write
95E2FFE000
stack
page read and write
21932930000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DA585000
trusted library allocation
page read and write
243E6405000
trusted library allocation
page read and write
243DC5CD000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DC58E000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243D1551000
heap
page read and write
404000
unkown
page readonly
243DC767000
trusted library allocation
page read and write
243E2527000
trusted library allocation
page read and write
243DB765000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D1546000
heap
page read and write
243DC11A000
trusted library allocation
page read and write
243DDA36000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D1500000
heap
page read and write
243DB5A9000
trusted library allocation
page read and write
243DC1F7000
trusted library allocation
page read and write
243E4CFE000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
243E26A9000
trusted library allocation
page read and write
243DC5EE000
trusted library allocation
page read and write
243D1572000
heap
page read and write
6F31E3E000
unkown
page readonly
17F8F7BD000
trusted library allocation
page read and write
243DC55C000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243E4C87000
trusted library allocation
page read and write
243E4CC8000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243DC5D3000
trusted library allocation
page read and write
243DB566000
trusted library allocation
page read and write
219329B2000
trusted library allocation
page read and write
17F90469000
heap
page read and write
243E6D8C000
heap
page read and write
243E26B2000
trusted library allocation
page read and write
243E4038000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DD90C000
trusted library allocation
page read and write
243DC1D2000
trusted library allocation
page read and write
23143CF0000
heap
page read and write
243E2627000
trusted library allocation
page read and write
243DC191000
trusted library allocation
page read and write
243E2971000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DB71D000
trusted library allocation
page read and write
243D1538000
heap
page read and write
243E4012000
trusted library allocation
page read and write
243DA66D000
trusted library allocation
page read and write
243DA6F4000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243DA8E2000
trusted library allocation
page read and write
243DB576000
trusted library allocation
page read and write
243DC5A6000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243DC8E8000
trusted library allocation
page read and write
243E69A7000
trusted library allocation
page read and write
243E61C4000
trusted library allocation
page read and write
243DC5AA000
trusted library allocation
page read and write
219326C0000
heap
page read and write
243D77A5000
trusted library allocation
page read and write
243DCD42000
trusted library allocation
page read and write
243D7BD5000
trusted library allocation
page read and write
243DC302000
trusted library allocation
page read and write
243D7838000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DD920000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
17F8F71A000
trusted library allocation
page read and write
243E4047000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243DC5BC000
trusted library allocation
page read and write
243DB5AF000
trusted library allocation
page read and write
243DB530000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D1521000
heap
page read and write
243E27F3000
trusted library allocation
page read and write
243E26F5000
trusted library allocation
page read and write
243DC837000
trusted library allocation
page read and write
243DB4B2000
trusted library allocation
page read and write
243E27E5000
trusted library allocation
page read and write
243D76B1000
trusted library allocation
page read and write
243DCADF000
trusted library allocation
page read and write
243E4225000
trusted library allocation
page read and write
243E4101000
trusted library allocation
page read and write
243DB49C000
trusted library allocation
page read and write
243E259B000
trusted library allocation
page read and write
243DD948000
trusted library allocation
page read and write
243DD92B000
trusted library allocation
page read and write
243E6D8C000
heap
page read and write
243D151A000
heap
page read and write
243DDE57000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243DC97B000
trusted library allocation
page read and write
243DDEA9000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DC944000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DC8DA000
trusted library allocation
page read and write
66A47DE000
stack
page read and write
243E40A4000
trusted library allocation
page read and write
243DA89B000
trusted library allocation
page read and write
B2739FC000
stack
page read and write
243D1530000
heap
page read and write
243E6D47000
heap
page read and write
243E24B8000
trusted library allocation
page read and write
243DA6B6000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DC859000
trusted library allocation
page read and write
243DBC4D000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DCBDB000
trusted library allocation
page read and write
243DC8C6000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DDE41000
trusted library allocation
page read and write
243E2694000
trusted library allocation
page read and write
243D1506000
heap
page read and write
243E6D47000
heap
page read and write
17F8F710000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1551000
heap
page read and write
243D1522000
heap
page read and write
243E6D45000
heap
page read and write
243DDBB3000
trusted library allocation
page read and write
243DD919000
trusted library allocation
page read and write
17F903E9000
heap
page read and write
243E5B4C000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DCBD6000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D1563000
heap
page read and write
2314406E000
trusted library allocation
page read and write
17F90459000
heap
page read and write
243DE04F000
trusted library allocation
page read and write
243D7B9F000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243E4C67000
trusted library allocation
page read and write
243DC8C2000
trusted library allocation
page read and write
243E2527000
trusted library allocation
page read and write
243DCD81000
trusted library allocation
page read and write
243E61FE000
trusted library allocation
page read and write
1CD456D0000
heap
page read and write
243D1521000
heap
page read and write
243D1521000
heap
page read and write
243E5BCD000
trusted library allocation
page read and write
243DA38C000
trusted library allocation
page read and write
243DBFFD000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D155C000
heap
page read and write
243E24C9000
trusted library allocation
page read and write
EE0000
heap
page read and write
243D1542000
heap
page read and write
243D158A000
heap
page read and write
23143D10000
heap
page read and write
243DB45C000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243E400C000
trusted library allocation
page read and write
243DC840000
trusted library allocation
page read and write
F1E000
heap
page read and write
243D7B33000
trusted library allocation
page read and write
243D154B000
heap
page read and write
1ADE000
stack
page read and write
243E3E79000
trusted library allocation
page read and write
243DC8E8000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DA675000
trusted library allocation
page read and write
243DC9ED000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DBF2D000
trusted library allocation
page read and write
243DC835000
trusted library allocation
page read and write
243E26EE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D1539000
heap
page read and write
243D1535000
heap
page read and write
243D7BCE000
trusted library allocation
page read and write
243D158A000
heap
page read and write
1CD45320000
heap
page read and write
219329B5000
trusted library allocation
page read and write
243DA1A3000
heap
page read and write
D54000
heap
page read and write
243D7440000
trusted library allocation
page read and write
243DAB2D000
trusted library allocation
page read and write
243DC926000
trusted library allocation
page read and write
243DC8B5000
trusted library allocation
page read and write
243E24D7000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DC14E000
trusted library allocation
page read and write
243DDE31000
trusted library allocation
page read and write
243DC939000
trusted library allocation
page read and write
243DB75F000
trusted library allocation
page read and write
243DA6D2000
trusted library allocation
page read and write
243E24E3000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D157A000
heap
page read and write
243DE04A000
trusted library allocation
page read and write
243D1523000
heap
page read and write
243D1572000
heap
page read and write
243D1532000
heap
page read and write
243DA55A000
trusted library allocation
page read and write
243E5900000
trusted library allocation
page read and write
243E6146000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243E6D45000
heap
page read and write
243D1520000
heap
page read and write
243D1584000
heap
page read and write
243D1552000
heap
page read and write
243DB427000
trusted library allocation
page read and write
243DC8A3000
trusted library allocation
page read and write
243DC8FB000
trusted library allocation
page read and write
243DB76A000
trusted library allocation
page read and write
243E4284000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DB56D000
trusted library allocation
page read and write
243DA671000
trusted library allocation
page read and write
243DD932000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243E5B4F000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243DC827000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243DDEF8000
trusted library allocation
page read and write
243DB467000
trusted library allocation
page read and write
243D65BE000
trusted library allocation
page read and write
243DB47E000
trusted library allocation
page read and write
243DA56A000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D153C000
heap
page read and write
243DA1C3000
heap
page read and write
17F9042A000
heap
page read and write
243E3E49000
trusted library allocation
page read and write
243DC869000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB527000
trusted library allocation
page read and write
243E27FB000
trusted library allocation
page read and write
243E5BAE000
trusted library allocation
page read and write
243DABB4000
trusted library allocation
page read and write
D54000
heap
page read and write
243D1546000
heap
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
243DB787000
trusted library allocation
page read and write
243DDEA1000
trusted library allocation
page read and write
243D749C000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243E4CFE000
trusted library allocation
page read and write
243E6D0F000
heap
page read and write
243DB576000
trusted library allocation
page read and write
243DC52E000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243E25C7000
trusted library allocation
page read and write
243DC535000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D157B000
heap
page read and write
243D64FB000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DE057000
trusted library allocation
page read and write
243E6DFD000
heap
page read and write
243D1572000
heap
page read and write
243D152F000
heap
page read and write
243DCBFB000
trusted library allocation
page read and write
243DA3AD000
trusted library allocation
page read and write
243DC8E0000
trusted library allocation
page read and write
17F903E0000
heap
page read and write
243DC74A000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D7757000
trusted library allocation
page read and write
243E4C8D000
trusted library allocation
page read and write
243D1529000
heap
page read and write
296A47E000
stack
page read and write
243E3EFA000
trusted library allocation
page read and write
21932AB0000
heap
page read and write
1CD45400000
trusted library allocation
page read and write
1CD451F8000
heap
page read and write
243E5ED9000
trusted library allocation
page read and write
243DAB7A000
trusted library allocation
page read and write
243DA54F000
trusted library allocation
page read and write
243DB5EF000
trusted library allocation
page read and write
243E3E09000
trusted library allocation
page read and write
F0A000
heap
page read and write
243DB57E000
trusted library allocation
page read and write
243DC8AD000
trusted library allocation
page read and write
243DA6FC000
trusted library allocation
page read and write
243E252D000
trusted library allocation
page read and write
243E26D0000
trusted library allocation
page read and write
243DDE36000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D151E000
heap
page read and write
243DDE56000
trusted library allocation
page read and write
243DCD42000
trusted library allocation
page read and write
243E5EC2000
trusted library allocation
page read and write
243DC4EE000
trusted library allocation
page read and write
243E25CD000
trusted library allocation
page read and write
243E3EFE000
trusted library allocation
page read and write
243DB5B5000
trusted library allocation
page read and write
243D153F000
heap
page read and write
243D154B000
heap
page read and write
243E259F000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB4AF000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243D153C000
heap
page read and write
243E4C6C000
trusted library allocation
page read and write
243DE07A000
trusted library allocation
page read and write
243D7648000
trusted library allocation
page read and write
243DCB7F000
trusted library allocation
page read and write
243E61A7000
trusted library allocation
page read and write
243E27F9000
trusted library allocation
page read and write
243DB7E7000
trusted library allocation
page read and write
243D158F000
heap
page read and write
243DA8EC000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E6D8D000
heap
page read and write
243D1533000
heap
page read and write
243DB78B000
trusted library allocation
page read and write
243E4CEA000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DC58E000
trusted library allocation
page read and write
243DCCC0000
trusted library allocation
page read and write
243DC8C6000
trusted library allocation
page read and write
243DA675000
trusted library allocation
page read and write
243DB4C2000
trusted library allocation
page read and write
141B0B9C000
trusted library allocation
page execute read
243E2633000
trusted library allocation
page read and write
400000
unkown
page write copy
243DBD76000
trusted library allocation
page read and write
243D7DF4000
trusted library allocation
page read and write
243D153A000
heap
page read and write
243E4007000
trusted library allocation
page read and write
2314405B000
trusted library allocation
page read and write
243DABFC000
trusted library allocation
page read and write
243DB4EF000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243E28CC000
trusted library allocation
page read and write
243E6D8C000
heap
page read and write
243D154B000
heap
page read and write
243E40A6000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E5BB0000
trusted library allocation
page read and write
243E4214000
trusted library allocation
page read and write
243DB728000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243D154B000
heap
page read and write
243D153B000
heap
page read and write
243DB5EF000
trusted library allocation
page read and write
23144217000
trusted library allocation
page read and write
23143D70000
heap
page read and write
243D157F000
heap
page read and write
23143CA9000
remote allocation
page execute read
243D154A000
heap
page read and write
243DD991000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DA5A5000
trusted library allocation
page read and write
243DDB71000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243DBF11000
trusted library allocation
page read and write
243DCB47000
trusted library allocation
page read and write
243DE2CE000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D153B000
heap
page read and write
243E6D45000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243D15A0000
heap
page read and write
243D1532000
heap
page read and write
243D1531000
heap
page read and write
21932A50000
unclassified section
page readonly
243DB705000
trusted library allocation
page read and write
243E3E64000
trusted library allocation
page read and write
17F90360000
heap
page read and write
243DABEB000
trusted library allocation
page read and write
C40000
heap
page read and write
243DCDA1000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243E5E4D000
trusted library allocation
page read and write
17F90203000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1542000
heap
page read and write
243D1551000
heap
page read and write
243D1524000
heap
page read and write
243DC83E000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243E4C13000
trusted library allocation
page read and write
17F903E1000
heap
page read and write
243D1542000
heap
page read and write
243DCAA3000
trusted library allocation
page read and write
243D150D000
heap
page read and write
D54000
heap
page read and write
243D7BB2000
trusted library allocation
page read and write
243D1520000
heap
page read and write
21932966000
trusted library allocation
page read and write
243DDEEE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D1500000
heap
page read and write
243DCD59000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DCBFD000
trusted library allocation
page read and write
243DABAB000
trusted library allocation
page read and write
243DDEC6000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243E61A5000
trusted library allocation
page read and write
243DB570000
trusted library allocation
page read and write
243DDE5C000
trusted library allocation
page read and write
243D1539000
heap
page read and write
3FC000
unkown
page write copy
243DB720000
trusted library allocation
page read and write
243D7B95000
trusted library allocation
page read and write
243DA397000
trusted library allocation
page read and write
243DDD53000
trusted library allocation
page read and write
243D1522000
heap
page read and write
243D1522000
heap
page read and write
243DBFCA000
trusted library allocation
page read and write
243DDE56000
trusted library allocation
page read and write
243DC5E1000
trusted library allocation
page read and write
331000
unkown
page execute read
243DC871000
trusted library allocation
page read and write
243DA56A000
trusted library allocation
page read and write
243DA6D6000
trusted library allocation
page read and write
17F90458000
heap
page read and write
243DC588000
trusted library allocation
page read and write
243DB497000
trusted library allocation
page read and write
243DCD62000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243D7692000
trusted library allocation
page read and write
243D1546000
heap
page read and write
95E47FE000
stack
page read and write
3750000
heap
page read and write
243DC758000
trusted library allocation
page read and write
BCE000
stack
page read and write
243E2932000
trusted library allocation
page read and write
243D1514000
heap
page read and write
243E68E5000
trusted library allocation
page read and write
243DC117000
trusted library allocation
page read and write
243E619C000
trusted library allocation
page read and write
243DC168000
trusted library allocation
page read and write
243DA589000
trusted library allocation
page read and write
243D7BAD000
trusted library allocation
page read and write
17F9037D000
heap
page read and write
243E5E47000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243DBD95000
trusted library allocation
page read and write
243DC7FB000
trusted library allocation
page read and write
17F8F350000
unclassified section
page readonly
243DB49E000
trusted library allocation
page read and write
243D1525000
heap
page read and write
28019710000
heap
page read and write
243E27FB000
trusted library allocation
page read and write
243DDE53000
trusted library allocation
page read and write
243DC548000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243E26BA000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1531000
heap
page read and write
243DDEA1000
trusted library allocation
page read and write
243DB497000
trusted library allocation
page read and write
243DC8BF000
trusted library allocation
page read and write
243E24E7000
trusted library allocation
page read and write
243DA6FC000
trusted library allocation
page read and write
243E252D000
trusted library allocation
page read and write
243DBFE0000
trusted library allocation
page read and write
243DB47C000
trusted library allocation
page read and write
243DC5D8000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D151A000
heap
page read and write
243D1532000
heap
page read and write
243DC8FB000
trusted library allocation
page read and write
243DBFCA000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243DB562000
trusted library allocation
page read and write
243D154C000
heap
page read and write
243DC18C000
trusted library allocation
page read and write
243DA35C000
trusted library allocation
page read and write
243D1589000
heap
page read and write
243D7671000
trusted library allocation
page read and write
243E69E4000
trusted library allocation
page read and write
243DC9B3000
trusted library allocation
page read and write
243DAB63000
trusted library allocation
page read and write
243DC512000
trusted library allocation
page read and write
243DDA2E000
trusted library allocation
page read and write
243DB4A7000
trusted library allocation
page read and write
21932A22000
unclassified section
page read and write
243DB570000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DC5EE000
trusted library allocation
page read and write
243DBFD5000
trusted library allocation
page read and write
243E24E3000
trusted library allocation
page read and write
243DB541000
trusted library allocation
page read and write
243DA8AA000
trusted library allocation
page read and write
243DDECD000
trusted library allocation
page read and write
243D15A6000
heap
page read and write
243D1581000
heap
page read and write
243DE3AC000
trusted library allocation
page read and write
243DCD5E000
trusted library allocation
page read and write
243E28BA000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DCCD9000
trusted library allocation
page read and write
243DA3C1000
trusted library allocation
page read and write
243DC783000
trusted library allocation
page read and write
243DDEA9000
trusted library allocation
page read and write
17F903E6000
heap
page read and write
243D151B000
heap
page read and write
243D1521000
heap
page read and write
17F8FDA0000
heap
page read and write
17F90469000
heap
page read and write
1CD46E8F000
heap
page read and write
141B0C71000
trusted library allocation
page execute read
243E4CFE000
trusted library allocation
page read and write
243D64F6000
trusted library allocation
page read and write
243D7671000
trusted library allocation
page read and write
243DB623000
trusted library allocation
page read and write
243DC83A000
trusted library allocation
page read and write
243DA585000
trusted library allocation
page read and write
243D7BB8000
trusted library allocation
page read and write
243E2872000
trusted library allocation
page read and write
1CD4550A000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
66A7BBE000
unkown
page readonly
243E4029000
trusted library allocation
page read and write
243DC133000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DDB44000
trusted library allocation
page read and write
243DC5CF000
trusted library allocation
page read and write
243DC744000
trusted library allocation
page read and write
6F3363E000
stack
page read and write
17F90477000
heap
page read and write
243E25E1000
trusted library allocation
page read and write
243DA68D000
trusted library allocation
page read and write
243D1521000
heap
page read and write
17F8F700000
trusted library allocation
page read and write
17F8F7B0000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E26E2000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DC8FB000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243DD9A7000
trusted library allocation
page read and write
243DC123000
trusted library allocation
page read and write
296BD3E000
stack
page read and write
3CC000
unkown
page readonly
243D1552000
heap
page read and write
243D742E000
trusted library allocation
page read and write
2314409E000
trusted library allocation
page read and write
243DB4A7000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DE0EF000
trusted library allocation
page read and write
243D152B000
heap
page read and write
17F8F7F3000
trusted library allocation
page read and write
243D77F6000
trusted library allocation
page read and write
243D1551000
heap
page read and write
23143C30000
unclassified section
page readonly
243E648A000
trusted library allocation
page read and write
243D6423000
trusted library allocation
page read and write
D54000
heap
page read and write
243DC8F7000
trusted library allocation
page read and write
243DDE89000
trusted library allocation
page read and write
243DB5EF000
trusted library allocation
page read and write
243D154B000
heap
page read and write
D54000
heap
page read and write
243DC5CD000
trusted library allocation
page read and write
243DDAC8000
trusted library allocation
page read and write
243DB4DB000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DCBE6000
trusted library allocation
page read and write
243DDAF1000
trusted library allocation
page read and write
243DC736000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DC825000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DC8AD000
trusted library allocation
page read and write
243DB763000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E4C4A000
trusted library allocation
page read and write
243D152B000
heap
page read and write
296C53E000
unkown
page readonly
243DB756000
trusted library allocation
page read and write
243D7B05000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DCBAF000
trusted library allocation
page read and write
243DA6BE000
trusted library allocation
page read and write
243DB77B000
trusted library allocation
page read and write
243D1500000
heap
page read and write
66A479E000
unkown
page readonly
243D150D000
heap
page read and write
243DC781000
trusted library allocation
page read and write
243DC846000
trusted library allocation
page read and write
243E27F3000
trusted library allocation
page read and write
243E6D26000
heap
page read and write
243D151B000
heap
page read and write
243DC1A0000
trusted library allocation
page read and write
243DB4C2000
trusted library allocation
page read and write
243D7D43000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DA8E2000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
17F90421000
heap
page read and write
243D7B62000
trusted library allocation
page read and write
243DC121000
trusted library allocation
page read and write
243DAB30000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243E2539000
trusted library allocation
page read and write
243E26C8000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DDA83000
trusted library allocation
page read and write
243D1542000
heap
page read and write
23143CB0000
unclassified section
page readonly
243DB77B000
trusted library allocation
page read and write
21932970000
trusted library allocation
page read and write
243DBC7D000
trusted library allocation
page read and write
243DC5D6000
trusted library allocation
page read and write
243DC8E2000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DB7C3000
trusted library allocation
page read and write
F27000
heap
page read and write
243DC9F8000
trusted library allocation
page read and write
243DC949000
trusted library allocation
page read and write
243E3EE4000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DA6BF000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243DA63D000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DA547000
trusted library allocation
page read and write
243DCBE4000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC5F9000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC586000
trusted library allocation
page read and write
17F9043B000
heap
page read and write
243DA66D000
trusted library allocation
page read and write
243E6D1D000
heap
page read and write
243D6600000
trusted library allocation
page read and write
243DB574000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243DA6EF000
trusted library allocation
page read and write
243DDD0B000
trusted library allocation
page read and write
243DB542000
trusted library allocation
page read and write
243D743C000
trusted library allocation
page read and write
243D1516000
heap
page read and write
243DB4FD000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D152A000
heap
page read and write
243D152B000
heap
page read and write
17F90301000
heap
page read and write
23144061000
trusted library allocation
page read and write
243DB4B8000
trusted library allocation
page read and write
243DC815000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D152A000
heap
page read and write
243DC1A0000
trusted library allocation
page read and write
243DC55D000
trusted library allocation
page read and write
3751000
heap
page read and write
243D769C000
trusted library allocation
page read and write
243DA391000
trusted library allocation
page read and write
243D77E5000
trusted library allocation
page read and write
243DA680000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DC8C7000
trusted library allocation
page read and write
BDB000
stack
page read and write
243DC1D5000
trusted library allocation
page read and write
243DBFDD000
trusted library allocation
page read and write
243E6DE8000
heap
page read and write
243D1583000
heap
page read and write
243D1539000
heap
page read and write
243D153A000
heap
page read and write
21932620000
remote allocation
page read and write
243DC956000
trusted library allocation
page read and write
243E3FC8000
trusted library allocation
page read and write
243DC83F000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243D154B000
heap
page read and write
243E2533000
trusted library allocation
page read and write
243DAB51000
trusted library allocation
page read and write
243DA56A000
trusted library allocation
page read and write
243DCBF9000
trusted library allocation
page read and write
243D1509000
heap
page read and write
243DC8C2000
trusted library allocation
page read and write
17F903E8000
heap
page read and write
243DB577000
trusted library allocation
page read and write
243DBE53000
trusted library allocation
page read and write
243E6D47000
heap
page read and write
243E28D3000
trusted library allocation
page read and write
243DC9F8000
trusted library allocation
page read and write
243DC5F9000
trusted library allocation
page read and write
243DC5E7000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D76EB000
trusted library allocation
page read and write
243D7B63000
trusted library allocation
page read and write
243DE0BC000
trusted library allocation
page read and write
5DA000
stack
page read and write
243D153B000
heap
page read and write
243E5EF5000
trusted library allocation
page read and write
243DA16F000
heap
page read and write
243DDE59000
trusted library allocation
page read and write
243DC923000
trusted library allocation
page read and write
243DD98F000
trusted library allocation
page read and write
66A6AFE000
unkown
page readonly
243D1542000
heap
page read and write
243DB47C000
trusted library allocation
page read and write
243DDE41000
trusted library allocation
page read and write
243DC8D7000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243D7BF1000
trusted library allocation
page read and write
243D1572000
heap
page read and write
17F8F3E0000
heap
page read and write
17F903FD000
heap
page read and write
243E69C5000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DC576000
trusted library allocation
page read and write
243E6A01000
trusted library allocation
page read and write
243DC946000
trusted library allocation
page read and write
243E6493000
trusted library allocation
page read and write
243DCBE1000
trusted library allocation
page read and write
243E28E3000
trusted library allocation
page read and write
243E24C9000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB4B8000
trusted library allocation
page read and write
243D7781000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DC8C4000
trusted library allocation
page read and write
243DC143000
trusted library allocation
page read and write
243DE0F4000
trusted library allocation
page read and write
243E4400000
trusted library allocation
page read and write
3751000
heap
page read and write
243D1552000
heap
page read and write
243D151A000
heap
page read and write
243D7D63000
trusted library allocation
page read and write
243E25C7000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1551000
heap
page read and write
243DD999000
trusted library allocation
page read and write
243E4062000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243DB49C000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D152B000
heap
page read and write
243E2627000
trusted library allocation
page read and write
243D7DFE000
trusted library allocation
page read and write
3F2000
unkown
page readonly
243E5B8B000
trusted library allocation
page read and write
243DC8B2000
trusted library allocation
page read and write
243DC860000
trusted library allocation
page read and write
243D7798000
trusted library allocation
page read and write
243DC5E1000
trusted library allocation
page read and write
243DE0FC000
trusted library allocation
page read and write
243DB4BB000
trusted library allocation
page read and write
243E2836000
trusted library allocation
page read and write
243E27F9000
trusted library allocation
page read and write
243D778C000
trusted library allocation
page read and write
243D150F000
heap
page read and write
243D1531000
heap
page read and write
243DA887000
trusted library allocation
page read and write
243DA555000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243D1539000
heap
page read and write
243E24BA000
trusted library allocation
page read and write
243E5BB0000
trusted library allocation
page read and write
95E3FFF000
stack
page read and write
243E61DB000
trusted library allocation
page read and write
243D7BBC000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DABF8000
trusted library allocation
page read and write
243DA6D2000
trusted library allocation
page read and write
243DBCC0000
trusted library allocation
page read and write
243D7751000
trusted library allocation
page read and write
243E28F3000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243E28F5000
trusted library allocation
page read and write
243E27F3000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D151A000
heap
page read and write
17F8F79F000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D152F000
heap
page read and write
243DC8E9000
trusted library allocation
page read and write
6F2FBDE000
stack
page read and write
243DB745000
trusted library allocation
page read and write
243DC593000
trusted library allocation
page read and write
243DDAA7000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243DCCE4000
trusted library allocation
page read and write
243D1583000
heap
page read and write
243D77C7000
trusted library allocation
page read and write
243E2691000
trusted library allocation
page read and write
243DC886000
trusted library allocation
page read and write
243D1519000
heap
page read and write
23143D1A000
heap
page read and write
243D151B000
heap
page read and write
243DB72F000
trusted library allocation
page read and write
243D1529000
heap
page read and write
D54000
heap
page read and write
243D1542000
heap
page read and write
243DBCCF000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DB5EF000
trusted library allocation
page read and write
243E5E2F000
trusted library allocation
page read and write
243D7BA8000
trusted library allocation
page read and write
243DBEC8000
trusted library allocation
page read and write
243E2631000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DA1A3000
heap
page read and write
243D1521000
heap
page read and write
17F8F723000
trusted library allocation
page read and write
243DD700000
trusted library allocation
page read and write
243DDEA7000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243D154B000
heap
page read and write
243DC15F000
trusted library allocation
page read and write
243DA16F000
heap
page read and write
6F315FE000
stack
page read and write
243DA679000
trusted library allocation
page read and write
243DD920000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC18E000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1540000
heap
page read and write
243D1552000
heap
page read and write
243D7690000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243D7BD4000
trusted library allocation
page read and write
243DDBD2000
trusted library allocation
page read and write
243D1541000
heap
page read and write
243DB5AF000
trusted library allocation
page read and write
243E26CB000
trusted library allocation
page read and write
243DDEF1000
trusted library allocation
page read and write
243DC936000
trusted library allocation
page read and write
243DA1CE000
heap
page read and write
243D150D000
heap
page read and write
243D1539000
heap
page read and write
243DA65C000
trusted library allocation
page read and write
243D1583000
heap
page read and write
243DC8A1000
trusted library allocation
page read and write
243D15A0000
heap
page read and write
243D1572000
heap
page read and write
243D773E000
trusted library allocation
page read and write
243DE350000
trusted library allocation
page read and write
243D1577000
heap
page read and write
243D7749000
trusted library allocation
page read and write
23143F00000
trusted library allocation
page read and write
243DABA3000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DB774000
trusted library allocation
page read and write
243DC5C4000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D1539000
heap
page read and write
243DC8F2000
trusted library allocation
page read and write
23144023000
trusted library allocation
page read and write
243DA547000
trusted library allocation
page read and write
243DA56C000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DBFC3000
trusted library allocation
page read and write
243E28DA000
trusted library allocation
page read and write
243E25BB000
trusted library allocation
page read and write
243D1522000
heap
page read and write
243E40D9000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DA887000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243E2853000
trusted library allocation
page read and write
243E5B8B000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DB4C2000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DC145000
trusted library allocation
page read and write
243D74E1000
trusted library allocation
page read and write
243E6450000
trusted library allocation
page read and write
243D7B72000
trusted library allocation
page read and write
243DC59D000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D152A000
heap
page read and write
243E3E62000
trusted library allocation
page read and write
17F90458000
heap
page read and write
243DBD88000
trusted library allocation
page read and write
21932964000
trusted library allocation
page read and write
243DA3AA000
trusted library allocation
page read and write
243DDB5D000
trusted library allocation
page read and write
243DC5D3000
trusted library allocation
page read and write
243E26A1000
trusted library allocation
page read and write
95E27FD000
stack
page read and write
17F8F5C0000
trusted library section
page readonly
243D74F2000
trusted library allocation
page read and write
243DA3D7000
trusted library allocation
page read and write
17F90120000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DCBE1000
trusted library allocation
page read and write
243D1532000
heap
page read and write
66A6A78000
stack
page read and write
243D1581000
heap
page read and write
243D1542000
heap
page read and write
243DABB4000
trusted library allocation
page read and write
243DC117000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
243D1572000
heap
page read and write
243D1551000
heap
page read and write
243E69A3000
trusted library allocation
page read and write
17F9036C000
heap
page read and write
219326E3000
heap
page read and write
243D1572000
heap
page read and write
243DC5F6000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243DCB40000
trusted library allocation
page read and write
243DABBE000
trusted library allocation
page read and write
243D7714000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243D1539000
heap
page read and write
243DB5BA000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DD919000
trusted library allocation
page read and write
243D7D4F000
trusted library allocation
page read and write
3F2000
unkown
page readonly
243D1532000
heap
page read and write
243DA68A000
trusted library allocation
page read and write
243E3EBA000
trusted library allocation
page read and write
243DC145000
trusted library allocation
page read and write
243DC859000
trusted library allocation
page read and write
243D1586000
heap
page read and write
243E2680000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DB49C000
trusted library allocation
page read and write
243DC889000
trusted library allocation
page read and write
243E5EE9000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D1521000
heap
page read and write
243DD97D000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243D151A000
heap
page read and write
243D152B000
heap
page read and write
243E4CD6000
trusted library allocation
page read and write
243D1532000
heap
page read and write
F02000
heap
page read and write
243D154A000
heap
page read and write
243D152B000
heap
page read and write
243DE337000
trusted library allocation
page read and write
243DBFDD000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC5A6000
trusted library allocation
page read and write
243DBE82000
trusted library allocation
page read and write
243DDE41000
trusted library allocation
page read and write
243DC5E4000
trusted library allocation
page read and write
243DC4E7000
trusted library allocation
page read and write
243DDEEE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
2193263D000
remote allocation
page execute read
243D1546000
heap
page read and write
243D158A000
heap
page read and write
243DC889000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243E5E3D000
trusted library allocation
page read and write
243DCD08000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E253C000
trusted library allocation
page read and write
243DA682000
trusted library allocation
page read and write
243D7B9F000
trusted library allocation
page read and write
243E4C87000
trusted library allocation
page read and write
243DC5CD000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1551000
heap
page read and write
243E6D8C000
heap
page read and write
243DBF24000
trusted library allocation
page read and write
243DC88E000
trusted library allocation
page read and write
243DABA6000
trusted library allocation
page read and write
243E5580000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243DA16F000
heap
page read and write
243DB54F000
trusted library allocation
page read and write
243DC958000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D154B000
heap
page read and write
243E6D8D000
heap
page read and write
243D1579000
heap
page read and write
17F8F8D0000
heap
page read and write
243DC95B000
trusted library allocation
page read and write
231440C8000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1572000
heap
page read and write
243E268F000
trusted library allocation
page read and write
243DBFCE000
trusted library allocation
page read and write
243DB734000
trusted library allocation
page read and write
231440B7000
trusted library allocation
page read and write
243DC9B8000
trusted library allocation
page read and write
243E254C000
trusted library allocation
page read and write
243DABBE000
trusted library allocation
page read and write
243DBCB5000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243DB58F000
trusted library allocation
page read and write
243E28B8000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243DB763000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DBD65000
trusted library allocation
page read and write
243DCD5E000
trusted library allocation
page read and write
243DDEB0000
trusted library allocation
page read and write
243E6D70000
heap
page read and write
243DC73B000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1539000
heap
page read and write
243E28EA000
trusted library allocation
page read and write
243D1529000
heap
page read and write
243DC736000
trusted library allocation
page read and write
243E28DA000
trusted library allocation
page read and write
243DC8AD000
trusted library allocation
page read and write
243D153C000
heap
page read and write
23144203000
trusted library allocation
page read and write
243D7B86000
trusted library allocation
page read and write
243E3E6D000
trusted library allocation
page read and write
243DDEA1000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DA396000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243DBF23000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243D154B000
heap
page read and write
243E4CFE000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DC8F2000
trusted library allocation
page read and write
243DC706000
trusted library allocation
page read and write
243E40A2000
trusted library allocation
page read and write
243DC305000
trusted library allocation
page read and write
243D1502000
heap
page read and write
243E27FB000
trusted library allocation
page read and write
243DD9A4000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D154B000
heap
page read and write
17F8F72F000
trusted library allocation
page read and write
243E2936000
trusted library allocation
page read and write
243E267B000
trusted library allocation
page read and write
243DA6D6000
trusted library allocation
page read and write
243DC5A6000
trusted library allocation
page read and write
243E3FE5000
trusted library allocation
page read and write
243E267B000
trusted library allocation
page read and write
243D1553000
heap
page read and write
243DCCC9000
trusted library allocation
page read and write
243DA3D6000
trusted library allocation
page read and write
243DD938000
trusted library allocation
page read and write
243DE367000
trusted library allocation
page read and write
243DC5A2000
trusted library allocation
page read and write
243DD91E000
trusted library allocation
page read and write
6F2FADE000
stack
page read and write
243DC835000
trusted library allocation
page read and write
243DC759000
trusted library allocation
page read and write
243DC5A1000
trusted library allocation
page read and write
243D152A000
heap
page read and write
17F90444000
heap
page read and write
21932C07000
trusted library allocation
page read and write
17F903F2000
heap
page read and write
17F9035C000
heap
page read and write
243DC732000
trusted library allocation
page read and write
243DCB5F000
trusted library allocation
page read and write
243D1542000
heap
page read and write
D54000
heap
page read and write
141B0BAB000
trusted library allocation
page execute read
17F903F1000
heap
page read and write
243D74AA000
trusted library allocation
page read and write
243DB4C2000
trusted library allocation
page read and write
243E26BA000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1572000
heap
page read and write
243E6D8C000
heap
page read and write
243D1532000
heap
page read and write
243D1551000
heap
page read and write
243DBFB8000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E26B2000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243D151B000
heap
page read and write
243D151A000
heap
page read and write
243DB568000
trusted library allocation
page read and write
243DB595000
trusted library allocation
page read and write
243DC5AC000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DABB4000
trusted library allocation
page read and write
243E27E5000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DC138000
trusted library allocation
page read and write
243DB568000
trusted library allocation
page read and write
243DB728000
trusted library allocation
page read and write
243E6467000
trusted library allocation
page read and write
243E2820000
trusted library allocation
page read and write
243DC889000
trusted library allocation
page read and write
243DA675000
trusted library allocation
page read and write
21932650000
heap
page read and write
243D1538000
heap
page read and write
243D1519000
heap
page read and write
243DB49F000
trusted library allocation
page read and write
243E25BB000
trusted library allocation
page read and write
243D15A7000
heap
page read and write
331000
unkown
page execute read
243DB4C2000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1509000
heap
page read and write
17F90363000
heap
page read and write
243E3E70000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DDEDA000
trusted library allocation
page read and write
243DA889000
trusted library allocation
page read and write
243DB7C2000
trusted library allocation
page read and write
243DF202000
trusted library allocation
page read and write
243DC14C000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243D151B000
heap
page read and write
1CD46E80000
heap
page read and write
17F8F748000
trusted library allocation
page read and write
243DC5AA000
trusted library allocation
page read and write
243DDB74000
trusted library allocation
page read and write
243E3E75000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DC98B000
trusted library allocation
page read and write
243D155C000
heap
page read and write
243D1542000
heap
page read and write
243D1542000
heap
page read and write
243DB4B2000
trusted library allocation
page read and write
243D1542000
heap
page read and write
95E1FFF000
stack
page read and write
17F9011F000
unkown
page execute read
243E2848000
trusted library allocation
page read and write
243DDEA1000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243D152B000
heap
page read and write
404000
unkown
page readonly
243DB5AF000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E5B66000
trusted library allocation
page read and write
243DA89D000
trusted library allocation
page read and write
243DB705000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243D1584000
heap
page read and write
2314421C000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DCBDB000
trusted library allocation
page read and write
17F8F712000
trusted library allocation
page read and write
243DA89D000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D5EB3000
trusted library allocation
page read and write
243E6D8C000
heap
page read and write
243DB4DA000
trusted library allocation
page read and write
243D657E000
trusted library allocation
page read and write
243DB7FE000
trusted library allocation
page read and write
243E26EA000
trusted library allocation
page read and write
243DDBD6000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243DDA71000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DCD9E000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DA6EF000
trusted library allocation
page read and write
243D1520000
heap
page read and write
F0F000
heap
page read and write
243DB499000
trusted library allocation
page read and write
296AD3E000
stack
page read and write
243E2552000
trusted library allocation
page read and write
243DCBFE000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DC8DE000
trusted library allocation
page read and write
1CD451F2000
heap
page read and write
243DA6B4000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DBFFD000
trusted library allocation
page read and write
243E61ED000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243D1520000
heap
page read and write
243DAB26000
trusted library allocation
page read and write
243DC8E0000
trusted library allocation
page read and write
243E25C2000
trusted library allocation
page read and write
243D158F000
heap
page read and write
243DBF08000
trusted library allocation
page read and write
243E28D3000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D1553000
heap
page read and write
243DC8A1000
trusted library allocation
page read and write
243DC30A000
trusted library allocation
page read and write
243DB66D000
trusted library allocation
page read and write
243E2807000
trusted library allocation
page read and write
243E5EFC000
trusted library allocation
page read and write
243D7776000
trusted library allocation
page read and write
243D152F000
heap
page read and write
243DBEB9000
trusted library allocation
page read and write
243E286D000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1586000
heap
page read and write
243DB4B8000
trusted library allocation
page read and write
243DC559000
trusted library allocation
page read and write
243DDBF8000
trusted library allocation
page read and write
243DCD08000
trusted library allocation
page read and write
1CD451F0000
heap
page read and write
243D1500000
heap
page read and write
243DB54A000
trusted library allocation
page read and write
243DABA8000
trusted library allocation
page read and write
243DC822000
trusted library allocation
page read and write
17F90360000
heap
page read and write
243E3ED6000
trusted library allocation
page read and write
243E28D4000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D6577000
trusted library allocation
page read and write
243DC5A4000
trusted library allocation
page read and write
16DE000
stack
page read and write
243DD920000
trusted library allocation
page read and write
243DB4DF000
trusted library allocation
page read and write
243DA6EC000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1540000
heap
page read and write
243DC9BA000
trusted library allocation
page read and write
243E24D1000
trusted library allocation
page read and write
243E2516000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243DDAE4000
trusted library allocation
page read and write
243DB6B8000
trusted library allocation
page read and write
243DC8DE000
trusted library allocation
page read and write
243DC8D7000
trusted library allocation
page read and write
243E5BD5000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D7B34000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DB77B000
trusted library allocation
page read and write
243E3E33000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243E6D8D000
heap
page read and write
243DC573000
trusted library allocation
page read and write
243DC156000
trusted library allocation
page read and write
243DC732000
trusted library allocation
page read and write
243E4CB9000
trusted library allocation
page read and write
243DC842000
trusted library allocation
page read and write
243D157A000
heap
page read and write
243D743C000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D151B000
heap
page read and write
243DA5A5000
trusted library allocation
page read and write
1CD45210000
heap
page read and write
17F90369000
heap
page read and write
243E5BAE000
trusted library allocation
page read and write
243D7B34000
trusted library allocation
page read and write
243DE0EF000
trusted library allocation
page read and write
243DCBA8000
trusted library allocation
page read and write
243DDB46000
trusted library allocation
page read and write
243E4CC3000
trusted library allocation
page read and write
243D76BA000
trusted library allocation
page read and write
243E2548000
trusted library allocation
page read and write
243DA66A000
trusted library allocation
page read and write
243E53A8000
trusted library allocation
page read and write
66A61FE000
stack
page read and write
243DA5A5000
trusted library allocation
page read and write
243DA89F000
trusted library allocation
page read and write
243E28F3000
trusted library allocation
page read and write
243D1552000
heap
page read and write
17F90360000
heap
page read and write
21932976000
trusted library allocation
page read and write
243DB541000
trusted library allocation
page read and write
D54000
heap
page read and write
243DC807000
trusted library allocation
page read and write
243DC8B2000
trusted library allocation
page read and write
D50000
heap
page read and write
243E4133000
trusted library allocation
page read and write
243D1553000
heap
page read and write
243DB570000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243E61ED000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243D1539000
heap
page read and write
243E2578000
trusted library allocation
page read and write
17F8F430000
heap
page read and write
243E6D27000
heap
page read and write
243E4C87000
trusted library allocation
page read and write
243DBF1C000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DC524000
trusted library allocation
page read and write
2968BD8000
stack
page read and write
F0B000
heap
page read and write
243D1542000
heap
page read and write
243DCBFE000
trusted library allocation
page read and write
243E2843000
trusted library allocation
page read and write
21932A10000
heap
page readonly
243DE074000
trusted library allocation
page read and write
243DB76A000
trusted library allocation
page read and write
243DA8A4000
trusted library allocation
page read and write
243E6D09000
heap
page read and write
243DB574000
trusted library allocation
page read and write
243D7B75000
trusted library allocation
page read and write
243D1509000
heap
page read and write
243DC851000
trusted library allocation
page read and write
23143EAF000
unclassified section
page read and write
243D150D000
heap
page read and write
243DB755000
trusted library allocation
page read and write
243DB5CF000
trusted library allocation
page read and write
17F90477000
heap
page read and write
243D7B72000
trusted library allocation
page read and write
243DC774000
trusted library allocation
page read and write
243DC807000
trusted library allocation
page read and write
23144012000
trusted library allocation
page read and write
66A51D8000
stack
page read and write
243D1572000
heap
page read and write
243E5EA9000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DC18A000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D7DF5000
trusted library allocation
page read and write
243E6D27000
heap
page read and write
243D151A000
heap
page read and write
243E429D000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D152B000
heap
page read and write
243DCD16000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243D6566000
trusted library allocation
page read and write
243E409E000
trusted library allocation
page read and write
17F90477000
heap
page read and write
243DB5E5000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243DB4B2000
trusted library allocation
page read and write
243D1582000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DA810000
trusted library allocation
page read and write
243E24DB000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC593000
trusted library allocation
page read and write
243D1579000
heap
page read and write
243E26E6000
trusted library allocation
page read and write
243DC8AD000
trusted library allocation
page read and write
243D1573000
heap
page read and write
17F90360000
heap
page read and write
243DC9C3000
trusted library allocation
page read and write
243DA6EA000
trusted library allocation
page read and write
243DDEB0000
trusted library allocation
page read and write
243DA1E2000
heap
page read and write
243E6D7D000
heap
page read and write
243D152A000
heap
page read and write
243D1524000
heap
page read and write
243E256B000
trusted library allocation
page read and write
243DC5AA000
trusted library allocation
page read and write
243DA6C7000
trusted library allocation
page read and write
243DA16F000
heap
page read and write
243DDB69000
trusted library allocation
page read and write
17F9042A000
heap
page read and write
243DA6C7000
trusted library allocation
page read and write
243DC722000
trusted library allocation
page read and write
243D7BBF000
trusted library allocation
page read and write
243DC57C000
trusted library allocation
page read and write
17F903E8000
heap
page read and write
243E61D1000
trusted library allocation
page read and write
243DCAFE000
trusted library allocation
page read and write
17F903F1000
heap
page read and write
243DA6D6000
trusted library allocation
page read and write
243D77A6000
trusted library allocation
page read and write
21932A30000
heap
page read and write
243DA647000
trusted library allocation
page read and write
243D77C7000
trusted library allocation
page read and write
243DC831000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243DA6BE000
trusted library allocation
page read and write
243D1583000
heap
page read and write
243E2764000
trusted library allocation
page read and write
243DD948000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC951000
trusted library allocation
page read and write
243E26F5000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243E4258000
trusted library allocation
page read and write
243D5EBF000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D154B000
heap
page read and write
243D7BAC000
trusted library allocation
page read and write
17F90309000
heap
page read and write
243D65BE000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DE04A000
trusted library allocation
page read and write
243DB783000
trusted library allocation
page read and write
243DC973000
trusted library allocation
page read and write
243DCBF5000
trusted library allocation
page read and write
243E4CFE000
trusted library allocation
page read and write
243DC993000
trusted library allocation
page read and write
243E274C000
trusted library allocation
page read and write
243E6D01000
heap
page read and write
243DA3D3000
trusted library allocation
page read and write
17F9042D000
heap
page read and write
243E6905000
trusted library allocation
page read and write
243DB45D000
trusted library allocation
page read and write
66A7AFE000
unkown
page readonly
17F903E8000
heap
page read and write
243DDE2A000
trusted library allocation
page read and write
243D1519000
heap
page read and write
243D1500000
heap
page read and write
243E28BF000
trusted library allocation
page read and write
243DDEE0000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243E3E72000
trusted library allocation
page read and write
243DCBEF000
trusted library allocation
page read and write
243D7B86000
trusted library allocation
page read and write
243E4047000
trusted library allocation
page read and write
243DCAFD000
trusted library allocation
page read and write
243DE38A000
trusted library allocation
page read and write
243DABA8000
trusted library allocation
page read and write
243D7BE2000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243D1575000
heap
page read and write
17F90469000
heap
page read and write
243E2829000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243D1509000
heap
page read and write
243DC71C000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D153D000
heap
page read and write
243D152A000
heap
page read and write
23143EB0000
heap
page read and write
243E5302000
trusted library allocation
page read and write
23144010000
trusted library allocation
page read and write
243D154D000
heap
page read and write
219326E0000
heap
page read and write
243DB5E5000
trusted library allocation
page read and write
243DE29E000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1542000
heap
page read and write
243D1552000
heap
page read and write
243D7B34000
trusted library allocation
page read and write
243E3ED6000
trusted library allocation
page read and write
243E2764000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E5ED9000
trusted library allocation
page read and write
66A475C000
stack
page read and write
243DDBC9000
trusted library allocation
page read and write
243DB57C000
trusted library allocation
page read and write
243DB532000
trusted library allocation
page read and write
243DE393000
trusted library allocation
page read and write
243E27E5000
trusted library allocation
page read and write
243E3EFE000
trusted library allocation
page read and write
243D7655000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DC8E8000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D154B000
heap
page read and write
243DA547000
trusted library allocation
page read and write
243DC84D000
trusted library allocation
page read and write
243DDBDB000
trusted library allocation
page read and write
243D5EF9000
trusted library allocation
page read and write
243D1581000
heap
page read and write
243D1572000
heap
page read and write
243DABE9000
trusted library allocation
page read and write
243E420A000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D1552000
heap
page read and write
17F8FDB0000
trusted library allocation
page read and write
243DC583000
trusted library allocation
page read and write
243DC92B000
trusted library allocation
page read and write
243DBBD4000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DE05B000
trusted library allocation
page read and write
243E5B9E000
trusted library allocation
page read and write
243DA1CB000
heap
page read and write
243DC869000
trusted library allocation
page read and write
243DC865000
trusted library allocation
page read and write
243D1551000
heap
page read and write
D54000
heap
page read and write
243D1542000
heap
page read and write
243D6526000
trusted library allocation
page read and write
243DA6FC000
trusted library allocation
page read and write
17F903E0000
heap
page read and write
243DC5AC000
trusted library allocation
page read and write
243E274C000
trusted library allocation
page read and write
66A7B3E000
unkown
page readonly
243D1521000
heap
page read and write
243DC724000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DB49E000
trusted library allocation
page read and write
243DDE67000
trusted library allocation
page read and write
243E3E79000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D1546000
heap
page read and write
243D7440000
trusted library allocation
page read and write
243E5B9E000
trusted library allocation
page read and write
243DCBD6000
trusted library allocation
page read and write
243D6476000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243DA6FC000
trusted library allocation
page read and write
1CD45500000
trusted library allocation
page read and write
243DD920000
trusted library allocation
page read and write
243DC7CF000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DC5AC000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
243D1575000
heap
page read and write
243E26CF000
trusted library allocation
page read and write
243DB497000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1542000
heap
page read and write
243DC5F9000
trusted library allocation
page read and write
243DDEA3000
trusted library allocation
page read and write
243DAB97000
trusted library allocation
page read and write
243E27FB000
trusted library allocation
page read and write
243E412E000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DB4EE000
trusted library allocation
page read and write
243DA6D8000
trusted library allocation
page read and write
243E2694000
trusted library allocation
page read and write
243D152A000
heap
page read and write
141B0C61000
trusted library allocation
page execute read
243E69AC000
trusted library allocation
page read and write
243E40FE000
trusted library allocation
page read and write
243DDEEA000
trusted library allocation
page read and write
6F3263E000
stack
page read and write
243E261B000
trusted library allocation
page read and write
243DE305000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D7742000
trusted library allocation
page read and write
243E5E1A000
trusted library allocation
page read and write
243DB4A7000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DCAB3000
trusted library allocation
page read and write
243DDA5D000
trusted library allocation
page read and write
21932800000
trusted library allocation
page read and write
243DB465000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243D157D000
heap
page read and write
243DA670000
trusted library allocation
page read and write
243E40CE000
trusted library allocation
page read and write
243E5EFC000
trusted library allocation
page read and write
243DE31C000
trusted library allocation
page read and write
243D155C000
heap
page read and write
243DA16F000
heap
page read and write
243DC8B8000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243D1521000
heap
page read and write
243D1504000
heap
page read and write
243E61BA000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243E3E8F000
trusted library allocation
page read and write
243DC56A000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243E26EF000
trusted library allocation
page read and write
243DC559000
trusted library allocation
page read and write
243D1539000
heap
page read and write
17F90422000
heap
page read and write
243DC10A000
trusted library allocation
page read and write
243D151A000
heap
page read and write
23143CD0000
heap
page read and write
243DC172000
trusted library allocation
page read and write
243E4CC4000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DA36D000
trusted library allocation
page read and write
243E4040000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243DB63B000
trusted library allocation
page read and write
243E6DFD000
heap
page read and write
243DC1AA000
trusted library allocation
page read and write
17F8F540000
heap
page read and write
243DC5C4000
trusted library allocation
page read and write
243E5E2F000
trusted library allocation
page read and write
243DBFF7000
trusted library allocation
page read and write
243D77BE000
trusted library allocation
page read and write
243DC1CE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D153C000
heap
page read and write
243DDECD000
trusted library allocation
page read and write
243DA6C7000
trusted library allocation
page read and write
243D7448000
trusted library allocation
page read and write
243DDEE0000
trusted library allocation
page read and write
243D157F000
heap
page read and write
17F8F778000
trusted library allocation
page read and write
243E42A8000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243DABEB000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DB5EF000
trusted library allocation
page read and write
243D7653000
trusted library allocation
page read and write
243DB565000
trusted library allocation
page read and write
243D153B000
heap
page read and write
243E26F1000
trusted library allocation
page read and write
243E40E4000
trusted library allocation
page read and write
243DC944000
trusted library allocation
page read and write
243DDEA3000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D76F5000
trusted library allocation
page read and write
243D7448000
trusted library allocation
page read and write
243DA6BE000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243D1532000
heap
page read and write
243DB44F000
trusted library allocation
page read and write
243D7835000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DC596000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DB595000
trusted library allocation
page read and write
243D77F4000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243DC8B5000
trusted library allocation
page read and write
1CD46E84000
heap
page read and write
243DB527000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D77DE000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243D1542000
heap
page read and write
243E6D47000
heap
page read and write
243DB4A4000
trusted library allocation
page read and write
243DDECD000
trusted library allocation
page read and write
243DC8FB000
trusted library allocation
page read and write
243DC58E000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E5E40000
trusted library allocation
page read and write
243E5BDE000
trusted library allocation
page read and write
243DA589000
trusted library allocation
page read and write
243DD932000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
243DA56D000
trusted library allocation
page read and write
243DA59E000
trusted library allocation
page read and write
243D154A000
heap
page read and write
23144072000
trusted library allocation
page read and write
243DA354000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DDECD000
trusted library allocation
page read and write
243D152A000
heap
page read and write
F06000
heap
page read and write
243D15A6000
heap
page read and write
243E4CD3000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243E6D47000
heap
page read and write
243DC5F9000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243DC5E4000
trusted library allocation
page read and write
243D1525000
heap
page read and write
243DB6EE000
trusted library allocation
page read and write
243DB4BC000
trusted library allocation
page read and write
243DC8A9000
trusted library allocation
page read and write
243DC939000
trusted library allocation
page read and write
243E28C8000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D153C000
heap
page read and write
243D154C000
heap
page read and write
243E5B66000
trusted library allocation
page read and write
23144214000
trusted library allocation
page read and write
243D1529000
heap
page read and write
243D1532000
heap
page read and write
243DC8DA000
trusted library allocation
page read and write
243DD920000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243E25E1000
trusted library allocation
page read and write
243D77F6000
trusted library allocation
page read and write
243DB5BA000
trusted library allocation
page read and write
243DC951000
trusted library allocation
page read and write
243D152A000
heap
page read and write
219329C4000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DC8B2000
trusted library allocation
page read and write
243E5EA9000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DC826000
trusted library allocation
page read and write
243E6D8D000
heap
page read and write
243D7DCF000
trusted library allocation
page read and write
243DC5CD000
trusted library allocation
page read and write
243E6D7F000
heap
page read and write
17F903F1000
heap
page read and write
243DAB9E000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DB4DF000
trusted library allocation
page read and write
243DDEA7000
trusted library allocation
page read and write
243DCBD1000
trusted library allocation
page read and write
243D1500000
heap
page read and write
F1E000
heap
page read and write
243DBEAF000
trusted library allocation
page read and write
243DB78B000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1539000
heap
page read and write
243DBFB8000
trusted library allocation
page read and write
243DC5A4000
trusted library allocation
page read and write
243E25BB000
trusted library allocation
page read and write
243D1583000
heap
page read and write
D9D000
stack
page read and write
243DDE34000
trusted library allocation
page read and write
243E5B4F000
trusted library allocation
page read and write
243DCCD9000
trusted library allocation
page read and write
243E420C000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243D151A000
heap
page read and write
243D1542000
heap
page read and write
243DB7B2000
trusted library allocation
page read and write
243D1533000
heap
page read and write
243DC5F9000
trusted library allocation
page read and write
243E24ED000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243D152F000
heap
page read and write
243D151B000
heap
page read and write
243D1521000
heap
page read and write
243E5BDE000
trusted library allocation
page read and write
243DB4B9000
trusted library allocation
page read and write
243DB79E000
trusted library allocation
page read and write
243E2531000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D153C000
heap
page read and write
243E3E49000
trusted library allocation
page read and write
243D1533000
heap
page read and write
243DA16F000
heap
page read and write
6F2FB9E000
unkown
page readonly
243DB763000
trusted library allocation
page read and write
243DB4DF000
trusted library allocation
page read and write
243DC184000
trusted library allocation
page read and write
23143D60000
heap
page read and write
243E4253000
trusted library allocation
page read and write
243DA3D7000
trusted library allocation
page read and write
243D1544000
heap
page read and write
243D151A000
heap
page read and write
17F903E3000
heap
page read and write
243D1538000
heap
page read and write
243D1563000
heap
page read and write
243DBBF8000
trusted library allocation
page read and write
243DBEA0000
trusted library allocation
page read and write
243DBBEC000
trusted library allocation
page read and write
243E2832000
trusted library allocation
page read and write
243E257E000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D157C000
heap
page read and write
243DA68D000
trusted library allocation
page read and write
243DC5D6000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DB723000
trusted library allocation
page read and write
243DDEB0000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E6D45000
heap
page read and write
243DC956000
trusted library allocation
page read and write
243DA6C7000
trusted library allocation
page read and write
243DCDCB000
trusted library allocation
page read and write
243DA8BF000
trusted library allocation
page read and write
21932917000
trusted library allocation
page read and write
E80000
heap
page read and write
243DDAEC000
trusted library allocation
page read and write
243DB4C2000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1551000
heap
page read and write
243D7B2A000
trusted library allocation
page read and write
243DDE5C000
trusted library allocation
page read and write
243E2691000
trusted library allocation
page read and write
243DC5AC000
trusted library allocation
page read and write
2314405D000
trusted library allocation
page read and write
243DCB0E000
trusted library allocation
page read and write
243DA38D000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D157B000
heap
page read and write
243D1521000
heap
page read and write
243DD911000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DCB3E000
trusted library allocation
page read and write
243DC8F5000
trusted library allocation
page read and write
243E25E6000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243DC824000
trusted library allocation
page read and write
243DDA66000
trusted library allocation
page read and write
243DC573000
trusted library allocation
page read and write
243DCAB0000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243D1529000
heap
page read and write
219329A2000
trusted library allocation
page read and write
243E409C000
trusted library allocation
page read and write
243DD9A7000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1572000
heap
page read and write
243D154B000
heap
page read and write
243D7BDA000
trusted library allocation
page read and write
243E28D4000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243DA16F000
heap
page read and write
243DE2F1000
trusted library allocation
page read and write
243DC9F8000
trusted library allocation
page read and write
243D1521000
heap
page read and write
17F90360000
heap
page read and write
23144047000
trusted library allocation
page read and write
243E5EC4000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DC71B000
trusted library allocation
page read and write
1CD451F8000
heap
page read and write
243D151A000
heap
page read and write
243DA694000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D1521000
heap
page read and write
243E6886000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1521000
heap
page read and write
243E3E33000
trusted library allocation
page read and write
23144200000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243E3EC4000
trusted library allocation
page read and write
243DA667000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DC9DA000
trusted library allocation
page read and write
296A3FE000
unkown
page readonly
243D1576000
heap
page read and write
243E6D29000
heap
page read and write
21932924000
trusted library allocation
page read and write
243E3E72000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243DB62B000
trusted library allocation
page read and write
243D1542000
heap
page read and write
1CD451C0000
heap
page read and write
243D1551000
heap
page read and write
F1E000
heap
page read and write
243D158A000
heap
page read and write
243D1521000
heap
page read and write
243D74F2000
trusted library allocation
page read and write
243DC15F000
trusted library allocation
page read and write
243E64AC000
trusted library allocation
page read and write
219325C0000
unclassified section
page readonly
243E26C8000
trusted library allocation
page read and write
243DA3D7000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D154B000
heap
page read and write
243DC8B2000
trusted library allocation
page read and write
243DCD0A000
trusted library allocation
page read and write
243DC56E000
trusted library allocation
page read and write
243E274C000
trusted library allocation
page read and write
243DB6E4000
trusted library allocation
page read and write
6F2FB5D000
stack
page read and write
243E6D8D000
heap
page read and write
243DC826000
trusted library allocation
page read and write
243E4296000
trusted library allocation
page read and write
243E4296000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D15A6000
heap
page read and write
66A8BBE000
unkown
page readonly
243DB5C3000
trusted library allocation
page read and write
243E27F9000
trusted library allocation
page read and write
243DC5A4000
trusted library allocation
page read and write
17F8F8D6000
heap
page read and write
243DC8AD000
trusted library allocation
page read and write
243D1555000
heap
page read and write
17F90400000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243D5E81000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243DC9FB000
trusted library allocation
page read and write
F1E000
heap
page read and write
243DE0CF000
trusted library allocation
page read and write
243DDA5A000
trusted library allocation
page read and write
243E6A2C000
trusted library allocation
page read and write
243DB58F000
trusted library allocation
page read and write
21932911000
trusted library allocation
page read and write
243DBC91000
trusted library allocation
page read and write
243D1519000
heap
page read and write
243DAB5D000
trusted library allocation
page read and write
243E4C87000
trusted library allocation
page read and write
243DC845000
trusted library allocation
page read and write
17F90360000
heap
page read and write
243DD9A4000
trusted library allocation
page read and write
243DA6BE000
trusted library allocation
page read and write
F08000
heap
page read and write
243E6A06000
trusted library allocation
page read and write
243DD9A7000
trusted library allocation
page read and write
1CD451E2000
heap
page read and write
243D1520000
heap
page read and write
243DC5EE000
trusted library allocation
page read and write
243E257E000
trusted library allocation
page read and write
243D1579000
heap
page read and write
243D1560000
heap
page read and write
17F903E6000
heap
page read and write
243E2816000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D1551000
heap
page read and write
F1E000
heap
page read and write
243E40A0000
trusted library allocation
page read and write
243DDE24000
trusted library allocation
page read and write
243E26EA000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243DA6B4000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243DB41F000
trusted library allocation
page read and write
243DC956000
trusted library allocation
page read and write
243DB568000
trusted library allocation
page read and write
243DC17E000
trusted library allocation
page read and write
243E412C000
trusted library allocation
page read and write
243DB4A1000
trusted library allocation
page read and write
243DCADC000
trusted library allocation
page read and write
243DC5C0000
trusted library allocation
page read and write
2314407B000
trusted library allocation
page read and write
17F8F75F000
trusted library allocation
page read and write
243D1531000
heap
page read and write
243D153A000
heap
page read and write
243DBDCB000
trusted library allocation
page read and write
243E28A7000
trusted library allocation
page read and write
243DD90F000
trusted library allocation
page read and write
243E5EAB000
trusted library allocation
page read and write
243D7DF4000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1551000
heap
page read and write
243DC5CF000
trusted library allocation
page read and write
17F8F520000
heap
page read and write
243DC8F5000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DC8C4000
trusted library allocation
page read and write
243E61C7000
trusted library allocation
page read and write
243D1551000
heap
page read and write
17F90477000
heap
page read and write
243D1532000
heap
page read and write
243D1542000
heap
page read and write
243DBFB8000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DA6F7000
trusted library allocation
page read and write
243DC9F5000
trusted library allocation
page read and write
243DC82C000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D15A0000
heap
page read and write
243DC110000
trusted library allocation
page read and write
243E3EE4000
trusted library allocation
page read and write
231440E7000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DC9C7000
trusted library allocation
page read and write
243DB745000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D6519000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243E40A7000
trusted library allocation
page read and write
243E3E49000
trusted library allocation
page read and write
243DA6B6000
trusted library allocation
page read and write
243DDB27000
trusted library allocation
page read and write
243D1526000
heap
page read and write
243D152B000
heap
page read and write
243E2623000
trusted library allocation
page read and write
243D5E98000
trusted library allocation
page read and write
243E6D47000
heap
page read and write
23144232000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243DAB74000
trusted library allocation
page read and write
243DB574000
trusted library allocation
page read and write
21932913000
trusted library allocation
page read and write
243DC5AA000
trusted library allocation
page read and write
243DB4DF000
trusted library allocation
page read and write
243DA6D6000
trusted library allocation
page read and write
243E4296000
trusted library allocation
page read and write
243DC8AF000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1521000
heap
page read and write
243DC886000
trusted library allocation
page read and write
17F8F3EA000
heap
page read and write
243DC8A1000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243DC939000
trusted library allocation
page read and write
66A93BE000
stack
page read and write
243DC143000
trusted library allocation
page read and write
243DA6EC000
trusted library allocation
page read and write
243DC11A000
trusted library allocation
page read and write
243E4097000
trusted library allocation
page read and write
243E2618000
trusted library allocation
page read and write
23143DB3000
heap
page read and write
243E4CC8000
trusted library allocation
page read and write
243DD920000
trusted library allocation
page read and write
F13000
heap
page read and write
243DBE8E000
trusted library allocation
page read and write
243D7B0A000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243D154C000
heap
page read and write
243DC822000
trusted library allocation
page read and write
243E4249000
trusted library allocation
page read and write
243DB780000
trusted library allocation
page read and write
243DC9F3000
trusted library allocation
page read and write
243DDADF000
trusted library allocation
page read and write
243E2623000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243E6D47000
heap
page read and write
243D150D000
heap
page read and write
243D1556000
heap
page read and write
243DB5E5000
trusted library allocation
page read and write
243D1576000
heap
page read and write
243DCBD6000
trusted library allocation
page read and write
243D7825000
trusted library allocation
page read and write
243DA59E000
trusted library allocation
page read and write
243DD920000
trusted library allocation
page read and write
243DC948000
trusted library allocation
page read and write
243D7BB5000
trusted library allocation
page read and write
23144003000
trusted library allocation
page read and write
243DC851000
trusted library allocation
page read and write
243DB577000
trusted library allocation
page read and write
243DCD79000
trusted library allocation
page read and write
243D154A000
heap
page read and write
23144000000
trusted library allocation
page read and write
243E614B000
trusted library allocation
page read and write
243DC9FE000
trusted library allocation
page read and write
243D5EEF000
trusted library allocation
page read and write
243DE22F000
trusted library allocation
page read and write
243D745D000
trusted library allocation
page read and write
243DC5D3000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D154B000
heap
page read and write
243DCD4A000
trusted library allocation
page read and write
243DA6EC000
trusted library allocation
page read and write
21932C03000
trusted library allocation
page read and write
243D157E000
heap
page read and write
243DB5AF000
trusted library allocation
page read and write
243D1531000
heap
page read and write
BBF000
stack
page read and write
243E5EFC000
trusted library allocation
page read and write
243D77F6000
trusted library allocation
page read and write
243DB4DA000
trusted library allocation
page read and write
243E6D1B000
heap
page read and write
243DB734000
trusted library allocation
page read and write
243D1533000
heap
page read and write
243DBFEE000
trusted library allocation
page read and write
17F8F7E9000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243DABAB000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D651B000
trusted library allocation
page read and write
243DA6E0000
trusted library allocation
page read and write
243DC732000
trusted library allocation
page read and write
243DDE53000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC5B8000
trusted library allocation
page read and write
243DB765000
trusted library allocation
page read and write
243E26B4000
trusted library allocation
page read and write
243E5E4D000
trusted library allocation
page read and write
243D1546000
heap
page read and write
243D157F000
heap
page read and write
243DDB54000
trusted library allocation
page read and write
243DC83A000
trusted library allocation
page read and write
243E6D8D000
heap
page read and write
243D1581000
heap
page read and write
F10000
heap
page read and write
243E26BD000
trusted library allocation
page read and write
243E5700000
trusted library allocation
page read and write
243DB5B4000
trusted library allocation
page read and write
243E68C8000
trusted library allocation
page read and write
243DCADC000
trusted library allocation
page read and write
21932974000
trusted library allocation
page read and write
243DB465000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243D1572000
heap
page read and write
243DC889000
trusted library allocation
page read and write
243DA8C1000
trusted library allocation
page read and write
243DB69C000
trusted library allocation
page read and write
243D1552000
heap
page read and write
17F903AA000
heap
page read and write
243D5EA4000
trusted library allocation
page read and write
243DA53C000
trusted library allocation
page read and write
243DC93E000
trusted library allocation
page read and write
243DD99D000
trusted library allocation
page read and write
243E6D8C000
heap
page read and write
243D1572000
heap
page read and write
243DA6CA000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1539000
heap
page read and write
243DDE4B000
trusted library allocation
page read and write
243DB7AC000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DAB97000
trusted library allocation
page read and write
243DA6C7000
trusted library allocation
page read and write
243DDEE3000
trusted library allocation
page read and write
243DDEA5000
trusted library allocation
page read and write
243DC136000
trusted library allocation
page read and write
243DB562000
trusted library allocation
page read and write
243DC8E2000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D1532000
heap
page read and write
243DBC58000
trusted library allocation
page read and write
F1E000
heap
page read and write
243DDA51000
trusted library allocation
page read and write
243DC181000
trusted library allocation
page read and write
243DA89B000
trusted library allocation
page read and write
243DC5AC000
trusted library allocation
page read and write
243E289E000
trusted library allocation
page read and write
243DE0EF000
trusted library allocation
page read and write
243D1572000
heap
page read and write
17F903E8000
heap
page read and write
243D1521000
heap
page read and write
243D151B000
heap
page read and write
17F90479000
heap
page read and write
243DCD3F000
trusted library allocation
page read and write
243DC8A9000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243E3EBA000
trusted library allocation
page read and write
243DDE9E000
trusted library allocation
page read and write
243DA679000
trusted library allocation
page read and write
243DA6B6000
trusted library allocation
page read and write
243D1563000
heap
page read and write
243D7744000
trusted library allocation
page read and write
17F90444000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243D153A000
heap
page read and write
243DE078000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DA35B000
trusted library allocation
page read and write
23144100000
unclassified section
page readonly
243D153C000
heap
page read and write
243D154A000
heap
page read and write
243D7B2E000
trusted library allocation
page read and write
243E4064000
trusted library allocation
page read and write
243D74E9000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243DC900000
trusted library allocation
page read and write
243DA6DF000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243DD91B000
trusted library allocation
page read and write
1CD45507000
trusted library allocation
page read and write
243DDAD2000
trusted library allocation
page read and write
243E5BE2000
trusted library allocation
page read and write
243D77BC000
trusted library allocation
page read and write
243E5BE2000
trusted library allocation
page read and write
243DB57A000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243D5ECE000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D150D000
heap
page read and write
243E2744000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DB4EE000
trusted library allocation
page read and write
243DB47C000
trusted library allocation
page read and write
243DB4DF000
trusted library allocation
page read and write
243DC8E9000
trusted library allocation
page read and write
243E25AD000
trusted library allocation
page read and write
243DC5CF000
trusted library allocation
page read and write
243DDEA7000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1546000
heap
page read and write
243D158A000
heap
page read and write
243DCBD6000
trusted library allocation
page read and write
243DB763000
trusted library allocation
page read and write
243DC88E000
trusted library allocation
page read and write
243DBEE7000
trusted library allocation
page read and write
243E3E74000
trusted library allocation
page read and write
243DC13A000
trusted library allocation
page read and write
243E5BC2000
trusted library allocation
page read and write
243DA54E000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243E2EB2000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
243DC573000
trusted library allocation
page read and write
243E28E3000
trusted library allocation
page read and write
243DC726000
trusted library allocation
page read and write
243E27F9000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC9B8000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D770B000
trusted library allocation
page read and write
17F90444000
heap
page read and write
243DCBE1000
trusted library allocation
page read and write
D54000
heap
page read and write
243E6D1B000
heap
page read and write
243DB4F5000
trusted library allocation
page read and write
243E6941000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243DA56E000
trusted library allocation
page read and write
23143C90000
remote allocation
page read and write
243D1575000
heap
page read and write
243D1572000
heap
page read and write
243DB58F000
trusted library allocation
page read and write
243DC1A4000
trusted library allocation
page read and write
243DABBE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DA656000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D5ECA000
trusted library allocation
page read and write
243E28F5000
trusted library allocation
page read and write
243DC5CD000
trusted library allocation
page read and write
243DA6E7000
trusted library allocation
page read and write
17F903E0000
heap
page read and write
243DB4DF000
trusted library allocation
page read and write
243DA59E000
trusted library allocation
page read and write
141B0C71000
trusted library allocation
page execute read
243D151B000
heap
page read and write
21932982000
trusted library allocation
page read and write
243DB7C2000
trusted library allocation
page read and write
243D7BAD000
trusted library allocation
page read and write
243DAB51000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1551000
heap
page read and write
243DA56A000
trusted library allocation
page read and write
243DC5F6000
trusted library allocation
page read and write
243D1585000
heap
page read and write
243D5E90000
trusted library allocation
page read and write
243DAB9E000
trusted library allocation
page read and write
243DCD59000
trusted library allocation
page read and write
243DC5A6000
trusted library allocation
page read and write
243E2694000
trusted library allocation
page read and write
243DBEDC000
trusted library allocation
page read and write
243DA872000
trusted library allocation
page read and write
243E2570000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DA6BE000
trusted library allocation
page read and write
243DDBB0000
trusted library allocation
page read and write
243DB538000
trusted library allocation
page read and write
243D1527000
heap
page read and write
243E3EBA000
trusted library allocation
page read and write
1CD46E83000
heap
page read and write
243DB774000
trusted library allocation
page read and write
243DC5A4000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E2A00000
trusted library allocation
page read and write
243DC5A1000
trusted library allocation
page read and write
1CD456D5000
heap
page read and write
243D1551000
heap
page read and write
243DA6CC000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243D1572000
heap
page read and write
243D159E000
heap
page read and write
243DB40A000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243DDE34000
trusted library allocation
page read and write
243E406C000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243D1532000
heap
page read and write
243DB7C2000
trusted library allocation
page read and write
243D77AA000
trusted library allocation
page read and write
243D7757000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243E252F000
trusted library allocation
page read and write
243E3EFA000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1521000
heap
page read and write
219329F4000
trusted library allocation
page read and write
243E3E9D000
trusted library allocation
page read and write
243D77FE000
trusted library allocation
page read and write
243E26A1000
trusted library allocation
page read and write
243D1576000
heap
page read and write
243E40A8000
trusted library allocation
page read and write
243DA589000
trusted library allocation
page read and write
243D77EB000
trusted library allocation
page read and write
243DE26D000
trusted library allocation
page read and write
243D153F000
heap
page read and write
243DC5F6000
trusted library allocation
page read and write
243DAB6C000
trusted library allocation
page read and write
243D1573000
heap
page read and write
28019A0A000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DA54A000
trusted library allocation
page read and write
29681AE000
unkown
page readonly
243DB4DF000
trusted library allocation
page read and write
243D1551000
heap
page read and write
21932979000
trusted library allocation
page read and write
243DC5D0000
trusted library allocation
page read and write
243D1504000
heap
page read and write
243DB574000
trusted library allocation
page read and write
243DB49C000
trusted library allocation
page read and write
243DC5D6000
trusted library allocation
page read and write
243E5E47000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243E407A000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
23143D64000
heap
page read and write
243D1551000
heap
page read and write
243E2809000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC940000
trusted library allocation
page read and write
243DA6EF000
trusted library allocation
page read and write
243DE05B000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
23144063000
trusted library allocation
page read and write
243DD938000
trusted library allocation
page read and write
243D152C000
heap
page read and write
21932A20000
unclassified section
page read and write
243D1524000
heap
page read and write
D20000
heap
page read and write
243D778C000
trusted library allocation
page read and write
B2739FF000
stack
page read and write
243E6D8C000
heap
page read and write
17F90458000
heap
page read and write
243D7DC2000
trusted library allocation
page read and write
243E40C5000
trusted library allocation
page read and write
243DA36D000
trusted library allocation
page read and write
243DC8B2000
trusted library allocation
page read and write
243DB538000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D153C000
heap
page read and write
243DB416000
trusted library allocation
page read and write
243D77DD000
trusted library allocation
page read and write
243D153F000
heap
page read and write
243E24DB000
trusted library allocation
page read and write
243DA6B8000
trusted library allocation
page read and write
243DC539000
trusted library allocation
page read and write
243DB4C5000
trusted library allocation
page read and write
243D7BDE000
trusted library allocation
page read and write
1CD46E9E000
heap
page read and write
243DA6E8000
trusted library allocation
page read and write
243DD9A0000
trusted library allocation
page read and write
243DB530000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DDEA9000
trusted library allocation
page read and write
243DB7E5000
trusted library allocation
page read and write
243D152F000
heap
page read and write
243D1524000
heap
page read and write
243D7440000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243E694D000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E3EC4000
trusted library allocation
page read and write
243DB4CD000
trusted library allocation
page read and write
243E61B2000
trusted library allocation
page read and write
243DB57E000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243DB4EE000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243E26BD000
trusted library allocation
page read and write
243DB538000
trusted library allocation
page read and write
243DBFF4000
trusted library allocation
page read and write
21932AA6000
heap
page read and write
243D1521000
heap
page read and write
243D1551000
heap
page read and write
1CD46E9C000
heap
page read and write
243D1573000
heap
page read and write
1CD47010000
heap
page read and write
243DE0CF000
trusted library allocation
page read and write
243DA8E2000
trusted library allocation
page read and write
17F9037D000
heap
page read and write
243D152B000
heap
page read and write
243D1500000
heap
page read and write
243D158A000
heap
page read and write
243DDEA5000
trusted library allocation
page read and write
243DA8B2000
trusted library allocation
page read and write
243D1575000
heap
page read and write
243DA6EF000
trusted library allocation
page read and write
243D1581000
heap
page read and write
243D153F000
heap
page read and write
243D779A000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243DB562000
trusted library allocation
page read and write
243DC958000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243D7B33000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243D154A000
heap
page read and write
243DB49E000
trusted library allocation
page read and write
243DCBF5000
trusted library allocation
page read and write
243D7B62000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243DA35C000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243D7BE1000
trusted library allocation
page read and write
243E5BCD000
trusted library allocation
page read and write
243D1576000
heap
page read and write
280198D0000
heap
page read and write
243D65BE000
trusted library allocation
page read and write
243E2637000
trusted library allocation
page read and write
243DC8B2000
trusted library allocation
page read and write
243D1586000
heap
page read and write
141B0BAB000
trusted library allocation
page execute read
243DC84D000
trusted library allocation
page read and write
243DBFF7000
trusted library allocation
page read and write
28019820000
heap
page read and write
243DD923000
trusted library allocation
page read and write
243DBC75000
trusted library allocation
page read and write
243D152B000
heap
page read and write
243DA6F7000
trusted library allocation
page read and write
243DD987000
trusted library allocation
page read and write
243DC9F4000
trusted library allocation
page read and write
243DC940000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1519000
heap
page read and write
243DC14E000
trusted library allocation
page read and write
243D5EC6000
trusted library allocation
page read and write
243DB5B7000
trusted library allocation
page read and write
243DDA33000
trusted library allocation
page read and write
243DB5B4000
trusted library allocation
page read and write
243DC151000
trusted library allocation
page read and write
243DC9C3000
trusted library allocation
page read and write
2314420C000
trusted library allocation
page read and write
243DA66E000
trusted library allocation
page read and write
243DB5EF000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
243E6D8C000
heap
page read and write
243D154A000
heap
page read and write
243DC5E9000
trusted library allocation
page read and write
243DA679000
trusted library allocation
page read and write
243E28BF000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243DC829000
trusted library allocation
page read and write
243DC92C000
trusted library allocation
page read and write
243DABF0000
trusted library allocation
page read and write
243E6D14000
heap
page read and write
243D1516000
heap
page read and write
17F90369000
heap
page read and write
243DB5EF000
trusted library allocation
page read and write
243DA6EF000
trusted library allocation
page read and write
243D1531000
heap
page read and write
243DC8A1000
trusted library allocation
page read and write
243DBCA6000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D1532000
heap
page read and write
243DA1C2000
heap
page read and write
243DC8C2000
trusted library allocation
page read and write
243D1572000
heap
page read and write
23144300000
heap
page read and write
17F90458000
heap
page read and write
243D152B000
heap
page read and write
243DBF2B000
trusted library allocation
page read and write
243DC722000
trusted library allocation
page read and write
243E3E62000
trusted library allocation
page read and write
243DC593000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DA59E000
trusted library allocation
page read and write
243DC530000
trusted library allocation
page read and write
243DB54A000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1568000
heap
page read and write
243D6526000
trusted library allocation
page read and write
243DDEB0000
trusted library allocation
page read and write
243D1542000
heap
page read and write
66A83BE000
stack
page read and write
243E24D7000
trusted library allocation
page read and write
243DCABE000
trusted library allocation
page read and write
243E3E33000
trusted library allocation
page read and write
243DB734000
trusted library allocation
page read and write
243DC8E8000
trusted library allocation
page read and write
17F90209000
trusted library allocation
page read and write
243D159E000
heap
page read and write
231440A7000
trusted library allocation
page read and write
243D151A000
heap
page read and write
2314407D000
trusted library allocation
page read and write
243E2531000
trusted library allocation
page read and write
243D157B000
heap
page read and write
D54000
heap
page read and write
243E420F000
trusted library allocation
page read and write
243E3EAD000
trusted library allocation
page read and write
243DBBE0000
trusted library allocation
page read and write
243DABA8000
trusted library allocation
page read and write
243DC736000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DC8F7000
trusted library allocation
page read and write
280196D0000
heap
page read and write
243DA6B4000
trusted library allocation
page read and write
243DA3D3000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DC9FE000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243DB465000
trusted library allocation
page read and write
296A43E000
unkown
page readonly
17F8F5B2000
unclassified section
page read and write
243DA6F7000
trusted library allocation
page read and write
243DA6D2000
trusted library allocation
page read and write
243E3E9D000
trusted library allocation
page read and write
243DA6EA000
trusted library allocation
page read and write
243DB79E000
trusted library allocation
page read and write
243DC8DE000
trusted library allocation
page read and write
243DA577000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DDE88000
trusted library allocation
page read and write
243DB78F000
trusted library allocation
page read and write
243E2848000
trusted library allocation
page read and write
243DB5C3000
trusted library allocation
page read and write
243D1552000
heap
page read and write
243D15A0000
heap
page read and write
17F90458000
heap
page read and write
243DB46B000
trusted library allocation
page read and write
243DDE88000
trusted library allocation
page read and write
243DC9F3000
trusted library allocation
page read and write
243D15A8000
heap
page read and write
243DC1A7000
trusted library allocation
page read and write
243E267B000
trusted library allocation
page read and write
243DB4AF000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DBF20000
trusted library allocation
page read and write
17F90444000
heap
page read and write
243D1532000
heap
page read and write
243DC199000
trusted library allocation
page read and write
243DCB84000
trusted library allocation
page read and write
243DA6FE000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243E24DF000
trusted library allocation
page read and write
243DC70B000
trusted library allocation
page read and write
243DA6B6000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D77BC000
trusted library allocation
page read and write
243DB787000
trusted library allocation
page read and write
243DC951000
trusted library allocation
page read and write
243E25CD000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D1575000
heap
page read and write
243DC5EE000
trusted library allocation
page read and write
243DDE2A000
trusted library allocation
page read and write
243DBC0B000
trusted library allocation
page read and write
243DBFEE000
trusted library allocation
page read and write
243E28CC000
trusted library allocation
page read and write
243DB49E000
trusted library allocation
page read and write
243E3E64000
trusted library allocation
page read and write
243DA6EC000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
243D1521000
heap
page read and write
243DC5F6000
trusted library allocation
page read and write
243DB5EF000
trusted library allocation
page read and write
243DDEA9000
trusted library allocation
page read and write
243DC13A000
trusted library allocation
page read and write
243DC764000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1528000
heap
page read and write
243DC792000
trusted library allocation
page read and write
243DAB77000
trusted library allocation
page read and write
243D1540000
heap
page read and write
243DB4B8000
trusted library allocation
page read and write
243D65F0000
trusted library allocation
page read and write
243DB763000
trusted library allocation
page read and write
17F8F781000
trusted library allocation
page read and write
17F8F3C5000
remote allocation
page execute read
243DE04F000
trusted library allocation
page read and write
243DA6FC000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D1520000
heap
page read and write
243E2EF4000
trusted library allocation
page read and write
243E6D09000
heap
page read and write
243D1524000
heap
page read and write
243DC55C000
trusted library allocation
page read and write
243DC5B5000
trusted library allocation
page read and write
243DDE5C000
trusted library allocation
page read and write
243DB5E5000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1520000
heap
page read and write
243DDE5C000
trusted library allocation
page read and write
243D1535000
heap
page read and write
3751000
heap
page read and write
243DC8AF000
trusted library allocation
page read and write
243DC5AA000
trusted library allocation
page read and write
2969BFE000
stack
page read and write
243DCD16000
trusted library allocation
page read and write
243DA6E6000
trusted library allocation
page read and write
243DCBFE000
trusted library allocation
page read and write
243DDB40000
trusted library allocation
page read and write
243D1532000
heap
page read and write
17F8F768000
trusted library allocation
page read and write
243DC56A000
trusted library allocation
page read and write
243DC869000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243E4048000
trusted library allocation
page read and write
243E25D7000
trusted library allocation
page read and write
243DCBAF000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D7796000
trusted library allocation
page read and write
243E2691000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DDAB5000
trusted library allocation
page read and write
243DC8E8000
trusted library allocation
page read and write
243DD9A7000
trusted library allocation
page read and write
243D1535000
heap
page read and write
243D1572000
heap
page read and write
243D7B2C000
trusted library allocation
page read and write
243DABED000
trusted library allocation
page read and write
243DB77F000
trusted library allocation
page read and write
243D76F1000
trusted library allocation
page read and write
243DBC73000
trusted library allocation
page read and write
243D77BE000
trusted library allocation
page read and write
243DB78E000
trusted library allocation
page read and write
243DB5BA000
trusted library allocation
page read and write
243DC774000
trusted library allocation
page read and write
243E4CFE000
trusted library allocation
page read and write
243DB4EE000
trusted library allocation
page read and write
243DA6C4000
trusted library allocation
page read and write
243DC5A1000
trusted library allocation
page read and write
243DB7DD000
trusted library allocation
page read and write
23144092000
trusted library allocation
page read and write
17F90110000
unkown
page execute read
243D1572000
heap
page read and write
243DB51F000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DA5CE000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D152B000
heap
page read and write
243D154B000
heap
page read and write
243DC8AD000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC8B8000
trusted library allocation
page read and write
243DC9BA000
trusted library allocation
page read and write
243DA38D000
trusted library allocation
page read and write
243D151B000
heap
page read and write
243D6471000
trusted library allocation
page read and write
243D1581000
heap
page read and write
243DC84B000
trusted library allocation
page read and write
243DC5C4000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D157D000
heap
page read and write
243D157B000
heap
page read and write
243DB50F000
trusted library allocation
page read and write
243E3EE4000
trusted library allocation
page read and write
243D1572000
heap
page read and write
17F8F70A000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DA65D000
trusted library allocation
page read and write
243DA38D000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243DB76A000
trusted library allocation
page read and write
243D1526000
heap
page read and write
243D153D000
heap
page read and write
243DC9C3000
trusted library allocation
page read and write
219325B0000
unclassified section
page readonly
29681ED000
stack
page read and write
243D1572000
heap
page read and write
243D158A000
heap
page read and write
243E6D11000
heap
page read and write
1CD451DD000
heap
page read and write
243D1542000
heap
page read and write
243D151E000
heap
page read and write
243D153C000
heap
page read and write
243DC958000
trusted library allocation
page read and write
243E3E09000
trusted library allocation
page read and write
243D1532000
heap
page read and write
21932949000
trusted library allocation
page read and write
243DA6D6000
trusted library allocation
page read and write
243D7B82000
trusted library allocation
page read and write
243DC843000
trusted library allocation
page read and write
243DE0CA000
trusted library allocation
page read and write
17F9035C000
heap
page read and write
243DC889000
trusted library allocation
page read and write
243DC70A000
trusted library allocation
page read and write
243DA8BD000
trusted library allocation
page read and write
243D150D000
heap
page read and write
243D64FE000
trusted library allocation
page read and write
243DC71C000
trusted library allocation
page read and write
243D7B86000
trusted library allocation
page read and write
243D153D000
heap
page read and write
243D1575000
heap
page read and write
243DC5D3000
trusted library allocation
page read and write
243DB5EF000
trusted library allocation
page read and write
243DCBBF000
trusted library allocation
page read and write
66A9BBE000
unkown
page readonly
243D154B000
heap
page read and write
243DDABB000
trusted library allocation
page read and write
243DC145000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243D1523000
heap
page read and write
243D65C0000
trusted library allocation
page read and write
243E3E79000
trusted library allocation
page read and write
243E26BA000
trusted library allocation
page read and write
243DAB6A000
trusted library allocation
page read and write
243DE074000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243E2805000
trusted library allocation
page read and write
243DA5A5000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243DDE6E000
trusted library allocation
page read and write
243D152F000
heap
page read and write
243DB745000
trusted library allocation
page read and write
243DC7CF000
trusted library allocation
page read and write
243D158A000
heap
page read and write
243D1546000
heap
page read and write
28019900000
trusted library allocation
page read and write
243DA57E000
trusted library allocation
page read and write
243E3E12000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D157E000
heap
page read and write
243DB56D000
trusted library allocation
page read and write
243DC5CD000
trusted library allocation
page read and write
2193290E000
trusted library allocation
page read and write
243D1545000
heap
page read and write
3310000
heap
page read and write
17F903FD000
heap
page read and write
243D1539000
heap
page read and write
243E406E000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DC307000
trusted library allocation
page read and write
243E3E72000
trusted library allocation
page read and write
243DA6F7000
trusted library allocation
page read and write
243D7692000
trusted library allocation
page read and write
17F903E9000
heap
page read and write
243DA3C7000
trusted library allocation
page read and write
17F9038A000
heap
page read and write
243E4CC3000
trusted library allocation
page read and write
243DA51F000
trusted library allocation
page read and write
243E26EA000
trusted library allocation
page read and write
243DB746000
trusted library allocation
page read and write
243DDA1D000
trusted library allocation
page read and write
243DA57E000
trusted library allocation
page read and write
243DC948000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D153F000
heap
page read and write
243D150D000
heap
page read and write
243E406D000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243DA810000
trusted library allocation
page read and write
243DDAAD000
trusted library allocation
page read and write
243DA585000
trusted library allocation
page read and write
243DA1E0000
heap
page read and write
243D1572000
heap
page read and write
243D1572000
heap
page read and write
23144237000
trusted library allocation
page read and write
243DA1AD000
heap
page read and write
243DDA68000
trusted library allocation
page read and write
BEF000
stack
page read and write
243D150D000
heap
page read and write
243D1521000
heap
page read and write
243DA195000
heap
page read and write
243DC583000
trusted library allocation
page read and write
243DA66A000
trusted library allocation
page read and write
243DB726000
trusted library allocation
page read and write
243DBFE4000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D7BF2000
trusted library allocation
page read and write
17F90210000
trusted library allocation
page read and write
243DC745000
trusted library allocation
page read and write
243DC5E1000
trusted library allocation
page read and write
243DC17F000
trusted library allocation
page read and write
243E4043000
trusted library allocation
page read and write
243DDA80000
trusted library allocation
page read and write
280196D9000
heap
page read and write
28019A07000
trusted library allocation
page read and write
243DB783000
trusted library allocation
page read and write
17F8F76F000
trusted library allocation
page read and write
243DDE9E000
trusted library allocation
page read and write
243D76AD000
trusted library allocation
page read and write
243DA877000
trusted library allocation
page read and write
243D152F000
heap
page read and write
243D1576000
heap
page read and write
243DB72F000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
243E3EFE000
trusted library allocation
page read and write
243DDB1B000
trusted library allocation
page read and write
D54000
heap
page read and write
243DC8C4000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1532000
heap
page read and write
243DA5A5000
trusted library allocation
page read and write
243DBFF4000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D153E000
heap
page read and write
243E6155000
trusted library allocation
page read and write
243D152B000
heap
page read and write
21932AA0000
heap
page read and write
243DC5E7000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243DC88E000
trusted library allocation
page read and write
243DB497000
trusted library allocation
page read and write
243DBFFD000
trusted library allocation
page read and write
243E2979000
trusted library allocation
page read and write
243D764B000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DB54A000
trusted library allocation
page read and write
243E3E62000
trusted library allocation
page read and write
243DC5CF000
trusted library allocation
page read and write
243DBCD7000
trusted library allocation
page read and write
243E61B2000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
243DC949000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243D7D4B000
trusted library allocation
page read and write
17F9042A000
heap
page read and write
243DC17C000
trusted library allocation
page read and write
243DA8EF000
trusted library allocation
page read and write
243D6582000
trusted library allocation
page read and write
243D1583000
heap
page read and write
243DA5CE000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243E4C6C000
trusted library allocation
page read and write
243DC8F1000
trusted library allocation
page read and write
243DAB74000
trusted library allocation
page read and write
243D7BF2000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC8AF000
trusted library allocation
page read and write
243DC8A9000
trusted library allocation
page read and write
243E25F1000
trusted library allocation
page read and write
17F90421000
heap
page read and write
EE8000
heap
page read and write
243DB499000
trusted library allocation
page read and write
243D152E000
heap
page read and write
243D1552000
heap
page read and write
243DBE68000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1576000
heap
page read and write
23144098000
trusted library allocation
page read and write
243DA58E000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DB44F000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243E40A3000
trusted library allocation
page read and write
243E3FA3000
trusted library allocation
page read and write
17F9011B000
unkown
page execute read
243DDE41000
trusted library allocation
page read and write
243DBFB0000
trusted library allocation
page read and write
243E42A8000
trusted library allocation
page read and write
243DB4C2000
trusted library allocation
page read and write
243DB4A4000
trusted library allocation
page read and write
243DC82D000
trusted library allocation
page read and write
17F90360000
heap
page read and write
1C25DE71E000
trusted library allocation
page read and write
243DB722000
trusted library allocation
page read and write
243DA5CE000
trusted library allocation
page read and write
243D1532000
heap
page read and write
66A7B7E000
stack
page read and write
243D1551000
heap
page read and write
243D1576000
heap
page read and write
243D1521000
heap
page read and write
243D158A000
heap
page read and write
243DC5D0000
trusted library allocation
page read and write
243DA675000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243E2764000
trusted library allocation
page read and write
17F903F1000
heap
page read and write
243DD923000
trusted library allocation
page read and write
243DE0FC000
trusted library allocation
page read and write
243DC5A1000
trusted library allocation
page read and write
243D1572000
heap
page read and write
17F9036C000
heap
page read and write
243DA63B000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243D1521000
heap
page read and write
243DBF2F000
trusted library allocation
page read and write
243E2836000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243D1546000
heap
page read and write
243D1551000
heap
page read and write
243D1572000
heap
page read and write
243D1573000
heap
page read and write
2193296A000
trusted library allocation
page read and write
243E3E6D000
trusted library allocation
page read and write
243DC946000
trusted library allocation
page read and write
243DC8E8000
trusted library allocation
page read and write
243D7711000
trusted library allocation
page read and write
243D7B7A000
trusted library allocation
page read and write
243DA652000
trusted library allocation
page read and write
243D1539000
heap
page read and write
243DC8AD000
trusted library allocation
page read and write
243DA6D6000
trusted library allocation
page read and write
243DC5D3000
trusted library allocation
page read and write
243E6E42000
heap
page read and write
243DDE6B000
trusted library allocation
page read and write
243DA67C000
trusted library allocation
page read and write
243D1533000
heap
page read and write
243DC586000
trusted library allocation
page read and write
243DABD6000
trusted library allocation
page read and write
243DC5AC000
trusted library allocation
page read and write
23143EA0000
unclassified section
page read and write
243E26BD000
trusted library allocation
page read and write
17F90200000
trusted library allocation
page read and write
243DDB20000
trusted library allocation
page read and write
B2741FE000
stack
page read and write
243D158A000
heap
page read and write
243E5EC2000
trusted library allocation
page read and write
243D154B000
heap
page read and write
17F8FDC0000
heap
page read and write
243DA3D6000
trusted library allocation
page read and write
219326A0000
heap
page read and write
243DE0CA000
trusted library allocation
page read and write
F11000
heap
page read and write
243D1532000
heap
page read and write
17F90477000
heap
page read and write
243D1589000
heap
page read and write
243D1519000
heap
page read and write
243D779D000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243E4CD3000
trusted library allocation
page read and write
17F90469000
heap
page read and write
EFF000
heap
page read and write
243D76CB000
trusted library allocation
page read and write
243DE07A000
trusted library allocation
page read and write
243DC59D000
trusted library allocation
page read and write
243DDBB6000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DCBE6000
trusted library allocation
page read and write
243DB763000
trusted library allocation
page read and write
243D7BB2000
trusted library allocation
page read and write
23144081000
trusted library allocation
page read and write
243D151A000
heap
page read and write
17F9036C000
heap
page read and write
243D1555000
heap
page read and write
B2749FF000
stack
page read and write
243D1524000
heap
page read and write
243D151A000
heap
page read and write
243DD989000
trusted library allocation
page read and write
243D1504000
heap
page read and write
243DC530000
trusted library allocation
page read and write
243DC8B2000
trusted library allocation
page read and write
243DB5BA000
trusted library allocation
page read and write
243D769C000
trusted library allocation
page read and write
243DC88E000
trusted library allocation
page read and write
243D1544000
heap
page read and write
243E5EE9000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243D1546000
heap
page read and write
243DA6DD000
trusted library allocation
page read and write
243E6D45000
heap
page read and write
2193265A000
heap
page read and write
243D154D000
heap
page read and write
17F8F7C7000
trusted library allocation
page read and write
243D779D000
trusted library allocation
page read and write
243E2695000
trusted library allocation
page read and write
243DA6EF000
trusted library allocation
page read and write
243DA8E2000
trusted library allocation
page read and write
243D7BA8000
trusted library allocation
page read and write
243E2764000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DCBF5000
trusted library allocation
page read and write
243E4C67000
trusted library allocation
page read and write
243D773E000
trusted library allocation
page read and write
243E3EE0000
trusted library allocation
page read and write
243D1532000
heap
page read and write
21932900000
trusted library allocation
page read and write
243DA16B000
heap
page read and write
243E4CC1000
trusted library allocation
page read and write
243E28F3000
trusted library allocation
page read and write
243E2EE4000
trusted library allocation
page read and write
243DC724000
trusted library allocation
page read and write
243D151A000
heap
page read and write
1CD46E8C000
heap
page read and write
243D7BD4000
trusted library allocation
page read and write
243E6907000
trusted library allocation
page read and write
243D1541000
heap
page read and write
243DC869000
trusted library allocation
page read and write
243E4CD3000
trusted library allocation
page read and write
243D153C000
heap
page read and write
243DC1CA000
trusted library allocation
page read and write
243DABD1000
trusted library allocation
page read and write
243DA16F000
heap
page read and write
243D152A000
heap
page read and write
243D1542000
heap
page read and write
17F903E3000
heap
page read and write
243DC7CF000
trusted library allocation
page read and write
296816B000
stack
page read and write
141B0C86000
trusted library allocation
page execute read
243D1542000
heap
page read and write
243E25F7000
trusted library allocation
page read and write
243DC5D3000
trusted library allocation
page read and write
243E3EE0000
trusted library allocation
page read and write
243DBFB0000
trusted library allocation
page read and write
243DCDE9000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243E4C1B000
trusted library allocation
page read and write
17F8F5BF000
unclassified section
page read and write
243DDE9E000
trusted library allocation
page read and write
243E61C7000
trusted library allocation
page read and write
243DA36E000
trusted library allocation
page read and write
243D1519000
heap
page read and write
243E3ED6000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243DB4B2000
trusted library allocation
page read and write
243D1551000
heap
page read and write
243DC5AC000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243D1552000
heap
page read and write
243DB4A7000
trusted library allocation
page read and write
243D150D000
heap
page read and write
23143DB0000
heap
page read and write
243D77EB000
trusted library allocation
page read and write
243E696D000
trusted library allocation
page read and write
243D1500000
heap
page read and write
243D65F0000
trusted library allocation
page read and write
243D1520000
heap
page read and write
243DB4DF000
trusted library allocation
page read and write
243DC149000
trusted library allocation
page read and write
243D151A000
heap
page read and write
243E25C2000
trusted library allocation
page read and write
243DC951000
trusted library allocation
page read and write
243D157F000
heap
page read and write
243DC1FB000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243D1521000
heap
page read and write
243E5EAB000
trusted library allocation
page read and write
243E61BA000
trusted library allocation
page read and write
243DB5A2000
trusted library allocation
page read and write
243DC747000
trusted library allocation
page read and write
243D1573000
heap
page read and write
243D1521000
heap
page read and write
243D151A000
heap
page read and write
243E26E6000
trusted library allocation
page read and write
243D77C7000
trusted library allocation
page read and write
243D1583000
heap
page read and write
243D154C000
heap
page read and write
17F8FC70000
heap
page read and write
219327C0000
heap
page read and write
243E42FE000
trusted library allocation
page read and write
243DDBE3000
trusted library allocation
page read and write
243DDAFD000
trusted library allocation
page read and write
243D154B000
heap
page read and write
2314402E000
trusted library allocation
page read and write
23144066000
trusted library allocation
page read and write
243DC56A000
trusted library allocation
page read and write
243DE284000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D5E9E000
trusted library allocation
page read and write
243D1572000
heap
page read and write
243DC184000
trusted library allocation
page read and write
243DDA3A000
trusted library allocation
page read and write
21932C00000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243DC181000
trusted library allocation
page read and write
243D7433000
trusted library allocation
page read and write
243D1542000
heap
page read and write
243DA1C0000
heap
page read and write
243D7733000
trusted library allocation
page read and write
243DBE70000
trusted library allocation
page read and write
243D1500000
heap
page read and write
17F8F7C2000
trusted library allocation
page read and write
243DB4AB000
trusted library allocation
page read and write
243E28BC000
trusted library allocation
page read and write
243E6A2E000
trusted library allocation
page read and write
243D157B000
heap
page read and write
243DC724000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D6471000
trusted library allocation
page read and write
243E4CFC000
trusted library allocation
page read and write
243D154A000
heap
page read and write
243D1521000
heap
page read and write
243D157E000
heap
page read and write
243D153A000
heap
page read and write
243D7D60000
trusted library allocation
page read and write
243DA670000
trusted library allocation
page read and write
21932D0C000
trusted library allocation
page read and write
D54000
heap
page read and write
243DA300000
trusted library allocation
page read and write
243D1544000
heap
page read and write
243E6D14000
heap
page read and write
243DDAD9000
trusted library allocation
page read and write
243D7DF5000
trusted library allocation
page read and write
243D1521000
heap
page read and write
243D65F0000
trusted library allocation
page read and write
243DDE59000
trusted library allocation
page read and write
17F903F1000
heap
page read and write
243E2612000
trusted library allocation
page read and write
21932D00000
trusted library allocation
page read and write
243D152A000
heap
page read and write
243DC5CD000
trusted library allocation
page read and write
243D154B000
heap
page read and write
243D1542000
heap
page read and write
243DB530000
trusted library allocation
page read and write
243DB72B000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
17F903B9000
heap
page read and write
243DC878000
trusted library allocation
page read and write
243D7466000
trusted library allocation
page read and write
243E5EE3000
trusted library allocation
page read and write
243D1524000
heap
page read and write
243D159E000
heap
page read and write
243D77A8000
trusted library allocation
page read and write
243DD9A0000
trusted library allocation
page read and write
243DB78F000
trusted library allocation
page read and write
243E28F5000
trusted library allocation
page read and write
17F8F703000
trusted library allocation
page read and write
243DA89F000
trusted library allocation
page read and write
243D1532000
heap
page read and write
243D1521000
heap
page read and write
243D1551000
heap
page read and write
243DDE9E000
trusted library allocation
page read and write
243E641C000
trusted library allocation
page read and write
243D1501000
heap
page read and write
243D7659000
trusted library allocation
page read and write
243DC843000
trusted library allocation
page read and write
There are 3805 hidden memdumps, click here to show them.