IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f4ce2b07-ad53-468c-be2b-7715259a0f2b.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f4ce2b07-ad53-468c-be2b-7715259a0f2b.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cbab370-b115-42fc-bacc-0286b7b92315} 3852 "\\.\pipe\gecko-crash-server-pipe.3852" 248aa56d710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4248 -parentBuildID 20230927232528 -prefsHandle 4264 -prefMapHandle 3964 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e061d91a-bad4-4a50-b376-15899a92a8fa} 3852 "\\.\pipe\gecko-crash-server-pipe.3852" 248bc173e10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5144 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5112 -prefMapHandle 5136 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {70e5e620-fb56-4db4-8713-c501d9e9c338} 3852 "\\.\pipe\gecko-crash-server-pipe.3852" 248c3ad6d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1616739The
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.80
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
bg.microsoft.map.fastly.net
199.232.214.172
youtube-ui.l.google.com
142.250.185.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.65.174
unknown
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
52.222.236.80
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
139F000
heap
page read and write
malicious
248C3926000
trusted library allocation
page read and write
248B12C1000
heap
page read and write
248C393E000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB38A000
trusted library allocation
page read and write
19F8292A000
unkown
page execute read
248C35FD000
trusted library allocation
page read and write
248C52CB000
trusted library allocation
page read and write
19F8353B000
heap
page read and write
248C3D10000
trusted library allocation
page read and write
19F83568000
heap
page read and write
248BDC9A000
trusted library allocation
page read and write
248C525A000
trusted library allocation
page read and write
248BAC6C000
trusted library allocation
page read and write
248BB1A0000
trusted library allocation
page read and write
248BA14A000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12EB000
heap
page read and write
248C3578000
trusted library allocation
page read and write
248BB18B000
trusted library allocation
page read and write
248C2962000
trusted library allocation
page read and write
13AA000
heap
page read and write
248B12AD000
heap
page read and write
248B12BD000
heap
page read and write
19F83308000
trusted library allocation
page read and write
248B12C5000
heap
page read and write
248B12AB000
heap
page read and write
248B7C5A000
trusted library allocation
page read and write
248BDCD9000
trusted library allocation
page read and write
248BB939000
trusted library allocation
page read and write
248C58DD000
trusted library allocation
page read and write
248BA4EA000
trusted library allocation
page read and write
248BCB10000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C5288000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248B12B9000
heap
page read and write
248BBA23000
trusted library allocation
page read and write
248BA180000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
1FF5FF07000
trusted library allocation
page read and write
1F120067000
trusted library allocation
page read and write
248B7AB9000
heap
page read and write
248C2E76000
trusted library allocation
page read and write
248C35AE000
trusted library allocation
page read and write
248BB19B000
trusted library allocation
page read and write
248C2EDD000
trusted library allocation
page read and write
248BB9A8000
trusted library allocation
page read and write
248C2EA0000
trusted library allocation
page read and write
248BB90D000
trusted library allocation
page read and write
248B75A8000
trusted library allocation
page read and write
248BB75E000
trusted library allocation
page read and write
11FE000
stack
page read and write
1F120078000
trusted library allocation
page read and write
248C299C000
trusted library allocation
page read and write
248C3758000
trusted library allocation
page read and write
248C2537000
trusted library allocation
page read and write
19F8345C000
heap
page read and write
248C37DE000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248C27CC000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248C2671000
trusted library allocation
page read and write
248C2E26000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B9DBF000
trusted library allocation
page read and write
248C35DD000
trusted library allocation
page read and write
248BBFBA000
trusted library allocation
page read and write
248BB994000
trusted library allocation
page read and write
248BCBCF000
trusted library allocation
page read and write
248B1299000
heap
page read and write
248C5A68000
trusted library allocation
page read and write
248BDBFB000
trusted library allocation
page read and write
21564996000
trusted library allocation
page read and write
1F11FD38000
heap
page read and write
248C529F000
trusted library allocation
page read and write
3FF1000
heap
page read and write
248C376A000
trusted library allocation
page read and write
248C2382000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
714000
unkown
page readonly
248BD8DD000
trusted library allocation
page read and write
248BA17B000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248BE183000
trusted library allocation
page read and write
248C5552000
trusted library allocation
page read and write
248B72DD000
trusted library allocation
page read and write
248BE901000
trusted library allocation
page read and write
248BB5D8000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12BD000
heap
page read and write
248B12AD000
heap
page read and write
248C27EA000
trusted library allocation
page read and write
248C5870000
trusted library allocation
page read and write
248C55E4000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248BB19F000
trusted library allocation
page read and write
248C5832000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248B12B4000
heap
page read and write
248C2D20000
trusted library allocation
page read and write
248BCDEB000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B12A5000
heap
page read and write
6EE367E000
unkown
page readonly
248C5894000
trusted library allocation
page read and write
248BBA63000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248C35EB000
trusted library allocation
page read and write
13C0000
heap
page read and write
1FF5FC0E000
heap
page read and write
21564780000
heap
page readonly
248B129C000
heap
page read and write
248C298A000
trusted library allocation
page read and write
248BA479000
trusted library allocation
page read and write
248BB983000
trusted library allocation
page read and write
248B6313000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C375C000
trusted library allocation
page read and write
248BB65F000
trusted library allocation
page read and write
248C29ED000
trusted library allocation
page read and write
248BA097000
trusted library allocation
page read and write
248B75F6000
trusted library allocation
page read and write
248C5872000
trusted library allocation
page read and write
248C3758000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248BC396000
trusted library allocation
page read and write
248BCCD6000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B12C9000
heap
page read and write
19F83469000
heap
page read and write
248C5B61000
trusted library allocation
page read and write
248C27E1000
trusted library allocation
page read and write
248C25AB000
trusted library allocation
page read and write
19F82878000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BBFF2000
trusted library allocation
page read and write
248BA4F5000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B12D5000
heap
page read and write
248C27B7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB1D9000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B12A2000
heap
page read and write
19F834E9000
heap
page read and write
248C2EEC000
trusted library allocation
page read and write
248C3523000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
21564560000
unclassified section
page readonly
6EE147E000
unkown
page readonly
248C4D21000
heap
page read and write
248BDC7E000
trusted library allocation
page read and write
248B9D4E000
trusted library allocation
page read and write
248B12C7000
heap
page read and write
248B12A3000
heap
page read and write
248C69B1000
trusted library allocation
page read and write
248BB4B5000
trusted library allocation
page read and write
248C2EA4000
trusted library allocation
page read and write
248C52EC000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248BAB96000
trusted library allocation
page read and write
248B63B4000
trusted library allocation
page read and write
248C2638000
trusted library allocation
page read and write
248BCBD3000
trusted library allocation
page read and write
248C393E000
trusted library allocation
page read and write
248BC6BE000
trusted library allocation
page read and write
248BDC9F000
trusted library allocation
page read and write
248C552B000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B7451000
trusted library allocation
page read and write
248BABDC000
trusted library allocation
page read and write
248BABED000
trusted library allocation
page read and write
248BB683000
trusted library allocation
page read and write
19F82FB0000
heap
page read and write
248C2EBA000
trusted library allocation
page read and write
248BA178000
trusted library allocation
page read and write
248BB8F2000
trusted library allocation
page read and write
248C27CE000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C529E000
trusted library allocation
page read and write
248BBFEC000
trusted library allocation
page read and write
248C23FD000
trusted library allocation
page read and write
248C23DF000
trusted library allocation
page read and write
248BC4A0000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248B5CC0000
trusted library allocation
page read and write
248C24F7000
trusted library allocation
page read and write
248C2E57000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C376A000
trusted library allocation
page read and write
248C371B000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B12FC000
heap
page read and write
21564F40000
heap
page read and write
248C43DA000
trusted library allocation
page read and write
248BB1C5000
trusted library allocation
page read and write
248BB39F000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C263D000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B1304000
heap
page read and write
248B12AB000
heap
page read and write
248BCCAF000
trusted library allocation
page read and write
248C4800000
trusted library allocation
page read and write
1F1200B8000
trusted library allocation
page read and write
248B6276000
trusted library allocation
page read and write
248BB3B1000
trusted library allocation
page read and write
248C2717000
trusted library allocation
page read and write
248C3D7F000
trusted library allocation
page read and write
248B7AB0000
heap
page read and write
248B128D000
heap
page read and write
248C3D23000
trusted library allocation
page read and write
1FF5FF0A000
trusted library allocation
page read and write
248C4CBC000
heap
page read and write
248BABAF000
trusted library allocation
page read and write
248C237B000
trusted library allocation
page read and write
21564B37000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BD75E000
trusted library allocation
page read and write
248BDC92000
trusted library allocation
page read and write
248BD7FD000
trusted library allocation
page read and write
771FFFE000
stack
page read and write
248B9D4E000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C58E5000
trusted library allocation
page read and write
248C2D8D000
trusted library allocation
page read and write
248B129F000
heap
page read and write
248C35AE000
trusted library allocation
page read and write
248C27B8000
trusted library allocation
page read and write
248BD843000
trusted library allocation
page read and write
248BB28A000
trusted library allocation
page read and write
21564912000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
1324000
heap
page read and write
248C35AA000
trusted library allocation
page read and write
248BC6B0000
trusted library allocation
page read and write
248B7547000
trusted library allocation
page read and write
248B5C81000
trusted library allocation
page read and write
6EE3E7E000
stack
page read and write
248BA5EC000
trusted library allocation
page read and write
248C37B9000
trusted library allocation
page read and write
248C35D2000
trusted library allocation
page read and write
248B12AA000
heap
page read and write
248B6366000
trusted library allocation
page read and write
248BAB40000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
19F82800000
trusted library allocation
page read and write
248BCBAD000
trusted library allocation
page read and write
248B9D33000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248C299C000
trusted library allocation
page read and write
248BB792000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BE1DB000
trusted library allocation
page read and write
248BE496000
trusted library allocation
page read and write
248C27AD000
trusted library allocation
page read and write
248BDC48000
trusted library allocation
page read and write
248B128D000
heap
page read and write
248B1285000
heap
page read and write
248C2DF5000
trusted library allocation
page read and write
1FF617A0000
heap
page read and write
248C2D37000
trusted library allocation
page read and write
248C268D000
trusted library allocation
page read and write
19F82924000
unkown
page execute read
248C25AD000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B127E000
heap
page read and write
248B12FD000
heap
page read and write
248BBFC6000
trusted library allocation
page read and write
248BD722000
trusted library allocation
page read and write
248C2E70000
trusted library allocation
page read and write
248BCDDE000
trusted library allocation
page read and write
248C2591000
trusted library allocation
page read and write
248C297D000
trusted library allocation
page read and write
248B788B000
trusted library allocation
page read and write
248C2E76000
trusted library allocation
page read and write
248B7472000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
E9CBFFB000
stack
page read and write
248B12C4000
heap
page read and write
248C277B000
trusted library allocation
page read and write
248B74A3000
trusted library allocation
page read and write
248BCB84000
trusted library allocation
page read and write
248C35AE000
trusted library allocation
page read and write
248BB8B0000
trusted library allocation
page read and write
19F83460000
heap
page read and write
248B12C9000
heap
page read and write
A8F94BE000
unkown
page readonly
248B12C9000
heap
page read and write
248C291F000
trusted library allocation
page read and write
248BB98A000
trusted library allocation
page read and write
248ABE19000
heap
page read and write
248C438C000
trusted library allocation
page read and write
248B62FE000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB1A0000
trusted library allocation
page read and write
248C2E53000
trusted library allocation
page read and write
248B75A6000
trusted library allocation
page read and write
248C27DE000
trusted library allocation
page read and write
248B12C1000
heap
page read and write
248C35D6000
trusted library allocation
page read and write
248C5A76000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BBF56000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C3553000
trusted library allocation
page read and write
248BBF56000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248B12A1000
heap
page read and write
248B12FC000
heap
page read and write
248C355A000
trusted library allocation
page read and write
248C5AD6000
trusted library allocation
page read and write
1E792111000
trusted library allocation
page execute read
248BB3D8000
trusted library allocation
page read and write
248C3A00000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C3536000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C233B000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248C2216000
trusted library allocation
page read and write
248BB174000
trusted library allocation
page read and write
248BB606000
trusted library allocation
page read and write
248BB427000
trusted library allocation
page read and write
248BB189000
trusted library allocation
page read and write
248C4CCD000
heap
page read and write
248BB9AC000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
771EFD8000
stack
page read and write
248C37F3000
trusted library allocation
page read and write
248C3944000
trusted library allocation
page read and write
248B1295000
heap
page read and write
19F834F2000
heap
page read and write
248BB63E000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B9D39000
trusted library allocation
page read and write
248C2EF8000
trusted library allocation
page read and write
248B9DB9000
trusted library allocation
page read and write
248ABE2C000
heap
page read and write
248BB9FD000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
248B9D0C000
trusted library allocation
page read and write
1F11FD41000
heap
page read and write
248BA455000
trusted library allocation
page read and write
248C2EDF000
trusted library allocation
page read and write
248C24ED000
trusted library allocation
page read and write
248BB853000
trusted library allocation
page read and write
248B753E000
trusted library allocation
page read and write
248BBAB3000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248B129B000
heap
page read and write
248C68AE000
trusted library allocation
page read and write
248BBFB4000
trusted library allocation
page read and write
19F826E0000
trusted library allocation
page read and write
248BD758000
trusted library allocation
page read and write
248BB968000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
19F82690000
unclassified section
page read and write
248B1294000
heap
page read and write
248BCB68000
trusted library allocation
page read and write
248BB50A000
trusted library allocation
page read and write
248B7AD0000
heap
page read and write
248BBF43000
trusted library allocation
page read and write
248C2EE9000
trusted library allocation
page read and write
248B75EB000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248B12C2000
heap
page read and write
248B12A3000
heap
page read and write
248B74FD000
trusted library allocation
page read and write
248C3530000
trusted library allocation
page read and write
248C5EC7000
trusted library allocation
page read and write
248C5A84000
trusted library allocation
page read and write
248BD886000
trusted library allocation
page read and write
248BE7B1000
trusted library allocation
page read and write
248C3764000
trusted library allocation
page read and write
248BCB0D000
trusted library allocation
page read and write
248BB22A000
trusted library allocation
page read and write
248BBAD5000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B6400000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248B1295000
heap
page read and write
248C35AA000
trusted library allocation
page read and write
248BD7CA000
trusted library allocation
page read and write
248B129D000
heap
page read and write
248C3543000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
6EE143D000
stack
page read and write
248BBFAB000
trusted library allocation
page read and write
19F834B9000
heap
page read and write
19F83500000
heap
page read and write
248B12C2000
heap
page read and write
248B12A2000
heap
page read and write
1F11FC60000
heap
page read and write
248C37F7000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248C3547000
trusted library allocation
page read and write
248BB16D000
trusted library allocation
page read and write
248B1302000
heap
page read and write
1FF5FBC0000
heap
page read and write
248B1304000
heap
page read and write
248BD77B000
trusted library allocation
page read and write
248C58A1000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C2E50000
trusted library allocation
page read and write
248BD7F8000
trusted library allocation
page read and write
248B74A3000
trusted library allocation
page read and write
248C35AE000
trusted library allocation
page read and write
248C58AC000
trusted library allocation
page read and write
248C27AD000
trusted library allocation
page read and write
1330000
heap
page read and write
248BB922000
trusted library allocation
page read and write
248BE7D4000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248B12A3000
heap
page read and write
248C5568000
trusted library allocation
page read and write
248B12AA000
heap
page read and write
248C233B000
trusted library allocation
page read and write
248BD8D6000
trusted library allocation
page read and write
248BB15F000
trusted library allocation
page read and write
248B78D5000
trusted library allocation
page read and write
248BA0AF000
trusted library allocation
page read and write
248B75DC000
trusted library allocation
page read and write
248C43D2000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C250B000
trusted library allocation
page read and write
248BC4CF000
trusted library allocation
page read and write
248C298A000
trusted library allocation
page read and write
248B745B000
trusted library allocation
page read and write
248C5A6B000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248C5ADD000
trusted library allocation
page read and write
1F12008F000
trusted library allocation
page read and write
248BA065000
trusted library allocation
page read and write
21564726000
heap
page read and write
248B1304000
heap
page read and write
248B12C9000
heap
page read and write
248B12F4000
heap
page read and write
248B7A90000
heap
page read and write
248BB1AF000
trusted library allocation
page read and write
248C2833000
trusted library allocation
page read and write
248C27E1000
trusted library allocation
page read and write
248C274B000
trusted library allocation
page read and write
248B63A1000
trusted library allocation
page read and write
248B7ABA000
heap
page read and write
1334000
heap
page read and write
248B12D5000
heap
page read and write
248B12FC000
heap
page read and write
21564B16000
trusted library allocation
page read and write
248BB971000
trusted library allocation
page read and write
248B7A90000
heap
page read and write
248C2777000
trusted library allocation
page read and write
13B0000
heap
page read and write
248B127E000
heap
page read and write
248B12AB000
heap
page read and write
248BB263000
trusted library allocation
page read and write
248C2E0C000
trusted library allocation
page read and write
248B7478000
trusted library allocation
page read and write
248BA194000
trusted library allocation
page read and write
248BB8F7000
trusted library allocation
page read and write
248BB9D3000
trusted library allocation
page read and write
248BE889000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248BDCBB000
trusted library allocation
page read and write
248C5874000
trusted library allocation
page read and write
248B7890000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C2E6D000
trusted library allocation
page read and write
1F11FB30000
unclassified section
page readonly
248C5E0B000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB30B000
trusted library allocation
page read and write
248C5244000
trusted library allocation
page read and write
E9CBFFF000
stack
page read and write
248BB983000
trusted library allocation
page read and write
248BB683000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248B129B000
heap
page read and write
248B7CCE000
trusted library allocation
page read and write
248BB8E6000
trusted library allocation
page read and write
248C27B8000
trusted library allocation
page read and write
248BB994000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
641000
unkown
page execute read
248C5E87000
trusted library allocation
page read and write
248C5A9D000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C3A9A000
trusted library allocation
page read and write
248BA4C1000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C35DD000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12EB000
heap
page read and write
248BA06D000
trusted library allocation
page read and write
248C555A000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
215646F0000
heap
page read and write
248B12C9000
heap
page read and write
248C35B3000
trusted library allocation
page read and write
215647D0000
unclassified section
page read and write
21564B07000
trusted library allocation
page read and write
248C52EC000
trusted library allocation
page read and write
19F834AA000
heap
page read and write
248BB965000
trusted library allocation
page read and write
19F83558000
heap
page read and write
248C5A90000
trusted library allocation
page read and write
248B5CEF000
trusted library allocation
page read and write
19F82864000
trusted library allocation
page read and write
248C2E82000
trusted library allocation
page read and write
248C27F5000
trusted library allocation
page read and write
248BD779000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
77229FE000
unkown
page readonly
248BBAD4000
trusted library allocation
page read and write
248C5AC3000
trusted library allocation
page read and write
19F8346C000
heap
page read and write
248BD771000
trusted library allocation
page read and write
248B12FD000
heap
page read and write
248BA09A000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248B12C9000
heap
page read and write
248C5565000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C270B000
trusted library allocation
page read and write
248C29F1000
trusted library allocation
page read and write
248B75A6000
trusted library allocation
page read and write
19F82986000
heap
page read and write
248BA1DB000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B12C7000
heap
page read and write
248BB9A8000
trusted library allocation
page read and write
248B9D5B000
trusted library allocation
page read and write
248C29E0000
trusted library allocation
page read and write
19F834E6000
heap
page read and write
248B12B4000
heap
page read and write
248B129B000
heap
page read and write
248BB7BB000
trusted library allocation
page read and write
248C529E000
trusted library allocation
page read and write
248C58DF000
trusted library allocation
page read and write
248B6317000
trusted library allocation
page read and write
1FF617BA000
heap
page read and write
248BC6CB000
trusted library allocation
page read and write
19F834E9000
heap
page read and write
19F82440000
unclassified section
page readonly
248B129B000
heap
page read and write
248BE1C5000
trusted library allocation
page read and write
248B785C000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C52CD000
trusted library allocation
page read and write
248C2E24000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B7AF2000
heap
page read and write
248C258F000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BA417000
trusted library allocation
page read and write
248C2329000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C3733000
trusted library allocation
page read and write
1F11FE44000
heap
page read and write
1F120107000
trusted library allocation
page read and write
248C29E2000
trusted library allocation
page read and write
248C2E24000
trusted library allocation
page read and write
248BB1A6000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248C231B000
trusted library allocation
page read and write
19F834F1000
heap
page read and write
248BA1EA000
trusted library allocation
page read and write
248BCB16000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248B12AB000
heap
page read and write
248B12EB000
heap
page read and write
248BCD81000
trusted library allocation
page read and write
248B7622000
trusted library allocation
page read and write
19F83558000
heap
page read and write
248BDCA9000
trusted library allocation
page read and write
248C35FD000
trusted library allocation
page read and write
19F83568000
heap
page read and write
248BCBF5000
trusted library allocation
page read and write
19F82670000
heap
page readonly
248B12A5000
heap
page read and write
19F8353B000
heap
page read and write
248C2375000
trusted library allocation
page read and write
E9CCFFE000
stack
page read and write
19F834E1000
heap
page read and write
248C2727000
trusted library allocation
page read and write
248C3935000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BA1AC000
trusted library allocation
page read and write
248C37D8000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248BB6BD000
trusted library allocation
page read and write
248C3D9D000
trusted library allocation
page read and write
248C2EA4000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248BD741000
trusted library allocation
page read and write
248B756E000
trusted library allocation
page read and write
248C587C000
trusted library allocation
page read and write
248C25DD000
trusted library allocation
page read and write
248BBF4E000
trusted library allocation
page read and write
248BBAB7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB7F6000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C3784000
trusted library allocation
page read and write
248C35DF000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C3D5A000
trusted library allocation
page read and write
248C2786000
trusted library allocation
page read and write
19F834E8000
heap
page read and write
248C2382000
trusted library allocation
page read and write
1F120011000
trusted library allocation
page read and write
248BE866000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248C2985000
trusted library allocation
page read and write
248C29EF000
trusted library allocation
page read and write
248B7AAC000
heap
page read and write
248BA174000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C3517000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B1295000
heap
page read and write
248B7AF2000
heap
page read and write
248B12A1000
heap
page read and write
248C2662000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
248C2EEC000
trusted library allocation
page read and write
248B5C9E000
trusted library allocation
page read and write
248C35FD000
trusted library allocation
page read and write
19F82953000
unkown
page execute read
248C2EF8000
trusted library allocation
page read and write
248BA065000
trusted library allocation
page read and write
248BB5B2000
trusted library allocation
page read and write
248BBAB0000
trusted library allocation
page read and write
248BCB12000
trusted library allocation
page read and write
19F83469000
heap
page read and write
19F834FD000
heap
page read and write
248C27E4000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248B7596000
trusted library allocation
page read and write
248BD7CD000
trusted library allocation
page read and write
248B74B4000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248C35A0000
trusted library allocation
page read and write
A8F51DE000
stack
page read and write
248BB698000
trusted library allocation
page read and write
248C3D7F000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BBF41000
trusted library allocation
page read and write
248BB28C000
trusted library allocation
page read and write
248C4E5C000
trusted library allocation
page read and write
248B12BF000
heap
page read and write
248C2D15000
trusted library allocation
page read and write
248C5568000
trusted library allocation
page read and write
248B1304000
heap
page read and write
1334000
heap
page read and write
248BA4FC000
trusted library allocation
page read and write
215649A2000
trusted library allocation
page read and write
248BB327000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BBA3D000
trusted library allocation
page read and write
248B637D000
trusted library allocation
page read and write
248C581B000
trusted library allocation
page read and write
1F11FD33000
heap
page read and write
248BD7D0000
trusted library allocation
page read and write
248C2EB4000
trusted library allocation
page read and write
248C43B5000
trusted library allocation
page read and write
248C35D2000
trusted library allocation
page read and write
248C5817000
trusted library allocation
page read and write
248C2856000
trusted library allocation
page read and write
19F8348D000
heap
page read and write
248B12D7000
heap
page read and write
248C27C1000
trusted library allocation
page read and write
248BA081000
trusted library allocation
page read and write
248BBAD7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C2775000
trusted library allocation
page read and write
248B740F000
trusted library allocation
page read and write
248C371D000
trusted library allocation
page read and write
1F120070000
trusted library allocation
page read and write
248BB895000
trusted library allocation
page read and write
248B7CA5000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248ABE10000
heap
page read and write
248B12A5000
heap
page read and write
248C29F3000
trusted library allocation
page read and write
248BB97D000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C291F000
trusted library allocation
page read and write
248B74E1000
trusted library allocation
page read and write
248C5815000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248BD7FD000
trusted library allocation
page read and write
248C35B3000
trusted library allocation
page read and write
248BD731000
trusted library allocation
page read and write
248C5A55000
trusted library allocation
page read and write
248C37FD000
trusted library allocation
page read and write
248C35DF000
trusted library allocation
page read and write
248C3787000
trusted library allocation
page read and write
248C2584000
trusted library allocation
page read and write
1FF617A4000
heap
page read and write
248B12A5000
heap
page read and write
248B12AB000
heap
page read and write
248C52EE000
trusted library allocation
page read and write
248C374F000
trusted library allocation
page read and write
248B127E000
heap
page read and write
19F83544000
heap
page read and write
248C27CB000
trusted library allocation
page read and write
248BA1AF000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C4C01000
heap
page read and write
248C3714000
trusted library allocation
page read and write
248BBADE000
trusted library allocation
page read and write
248C6985000
trusted library allocation
page read and write
248BDCD7000
trusted library allocation
page read and write
248C2EDD000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
248C4E85000
trusted library allocation
page read and write
1380000
heap
page read and write
248C353F000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248B7291000
trusted library allocation
page read and write
248BDC52000
trusted library allocation
page read and write
248C5E11000
trusted library allocation
page read and write
248C24A9000
trusted library allocation
page read and write
248BB772000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248C268B000
trusted library allocation
page read and write
248B6375000
trusted library allocation
page read and write
248C27E1000
trusted library allocation
page read and write
248BCB91000
trusted library allocation
page read and write
248BB3A2000
trusted library allocation
page read and write
1F120074000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BDCE7000
trusted library allocation
page read and write
1F11FCCF000
unclassified section
page read and write
248BD77B000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BDBFB000
trusted library allocation
page read and write
248BB628000
trusted library allocation
page read and write
13C9000
heap
page read and write
248B12F4000
heap
page read and write
248C279C000
trusted library allocation
page read and write
19F834F1000
heap
page read and write
248C52B2000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248B12BE000
heap
page read and write
248BDCB0000
trusted library allocation
page read and write
6EE14F8000
stack
page read and write
13A2000
heap
page read and write
248B12FC000
heap
page read and write
19F8348A000
heap
page read and write
248C55E4000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C6483000
trusted library allocation
page read and write
248C5A31000
trusted library allocation
page read and write
248C27BB000
trusted library allocation
page read and write
248BB193000
trusted library allocation
page read and write
248C27C1000
trusted library allocation
page read and write
248BE885000
trusted library allocation
page read and write
248BA1C5000
trusted library allocation
page read and write
248BB9CD000
trusted library allocation
page read and write
248BDC6B000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
215645C0000
remote allocation
page read and write
1F11FD36000
heap
page read and write
248BA56B000
trusted library allocation
page read and write
248C3D3C000
trusted library allocation
page read and write
248C3B80000
trusted library allocation
page read and write
248BAEC6000
trusted library allocation
page read and write
248BB14C000
trusted library allocation
page read and write
19F83521000
heap
page read and write
248C5288000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248BCBD3000
trusted library allocation
page read and write
248B7823000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248C2337000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C2E26000
trusted library allocation
page read and write
248BD7A5000
trusted library allocation
page read and write
248BB9F8000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C29F3000
trusted library allocation
page read and write
248C2E26000
trusted library allocation
page read and write
248BD7E7000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248BCB91000
trusted library allocation
page read and write
248C2560000
trusted library allocation
page read and write
248C29D1000
trusted library allocation
page read and write
248C2671000
trusted library allocation
page read and write
19F82881000
trusted library allocation
page read and write
248BA194000
trusted library allocation
page read and write
248BA074000
trusted library allocation
page read and write
248C3553000
trusted library allocation
page read and write
248C68FC000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB96C000
trusted library allocation
page read and write
248C24F1000
trusted library allocation
page read and write
248C2D37000
trusted library allocation
page read and write
248BDCD1000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248C4814000
trusted library allocation
page read and write
27FC9607000
trusted library allocation
page read and write
248C27ED000
trusted library allocation
page read and write
248BB883000
trusted library allocation
page read and write
248BD7E7000
trusted library allocation
page read and write
248C4D16000
heap
page read and write
248BA1EA000
trusted library allocation
page read and write
DE93921E000
trusted library allocation
page read and write
27FC9440000
heap
page read and write
248BC5BF000
trusted library allocation
page read and write
215647DF000
unclassified section
page read and write
77208FE000
unkown
page readonly
248C2E26000
trusted library allocation
page read and write
19F834F1000
heap
page read and write
248BDCBB000
trusted library allocation
page read and write
248C56B4000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C28FD000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B1295000
heap
page read and write
248C695C000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248BABD4000
trusted library allocation
page read and write
248B7A97000
heap
page read and write
248B759A000
trusted library allocation
page read and write
248B1286000
heap
page read and write
248BABD7000
trusted library allocation
page read and write
248BDCC7000
trusted library allocation
page read and write
248BB97F000
trusted library allocation
page read and write
248C5272000
trusted library allocation
page read and write
248C6961000
trusted library allocation
page read and write
248B7265000
trusted library allocation
page read and write
248BB694000
trusted library allocation
page read and write
248BB15A000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB49D000
trusted library allocation
page read and write
248B12C5000
heap
page read and write
248C2EF8000
trusted library allocation
page read and write
248BCDE3000
trusted library allocation
page read and write
248C37D8000
trusted library allocation
page read and write
248C2DED000
trusted library allocation
page read and write
248C2EF3000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BCB8B000
trusted library allocation
page read and write
248B12B6000
heap
page read and write
248C6918000
trusted library allocation
page read and write
248BB986000
trusted library allocation
page read and write
248C2917000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BCB10000
trusted library allocation
page read and write
248C37B2000
trusted library allocation
page read and write
248BB9D3000
trusted library allocation
page read and write
248BDC72000
trusted library allocation
page read and write
248C37E4000
trusted library allocation
page read and write
248B72C3000
trusted library allocation
page read and write
248BA188000
trusted library allocation
page read and write
248BBF3B000
trusted library allocation
page read and write
248C371D000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248BBA4C000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
640000
unkown
page readonly
248B12B5000
heap
page read and write
248BA051000
trusted library allocation
page read and write
1F120200000
trusted library allocation
page read and write
248C2751000
trusted library allocation
page read and write
1F1200B1000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
DE939224000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
19F82875000
trusted library allocation
page read and write
248B1274000
heap
page read and write
248C55A8000
trusted library allocation
page read and write
248BB5F0000
trusted library allocation
page read and write
248B75BE000
trusted library allocation
page read and write
248BBA22000
trusted library allocation
page read and write
248C2EB1000
trusted library allocation
page read and write
248C37F7000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248B12EB000
heap
page read and write
248BABD7000
trusted library allocation
page read and write
215647D2000
unclassified section
page read and write
248BA1CB000
trusted library allocation
page read and write
248BA4C8000
trusted library allocation
page read and write
248BA1A7000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BDBE2000
trusted library allocation
page read and write
248BECA3000
trusted library allocation
page read and write
248B12AC000
heap
page read and write
248C35B7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
19F83317000
trusted library allocation
page read and write
248C23CB000
trusted library allocation
page read and write
248BB990000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248C35B3000
trusted library allocation
page read and write
248C266D000
trusted library allocation
page read and write
1AC80FA03000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
2156495B000
trusted library allocation
page read and write
248BB4D5000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248B12C9000
heap
page read and write
248B129B000
heap
page read and write
248C2964000
trusted library allocation
page read and write
248C35D6000
trusted library allocation
page read and write
248C3784000
trusted library allocation
page read and write
248C2379000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C2353000
trusted library allocation
page read and write
A8F743E000
unkown
page readonly
248C3553000
trusted library allocation
page read and write
248BCD59000
trusted library allocation
page read and write
248C257E000
trusted library allocation
page read and write
248C58E7000
trusted library allocation
page read and write
248B74FD000
trusted library allocation
page read and write
248BCD8D000
trusted library allocation
page read and write
E9CC7FE000
stack
page read and write
248BD728000
trusted library allocation
page read and write
248C2461000
trusted library allocation
page read and write
248BE1E9000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248C646A000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C3528000
trusted library allocation
page read and write
710000
unkown
page write copy
248B12AE000
heap
page read and write
248C355C000
trusted library allocation
page read and write
215649A9000
trusted library allocation
page read and write
248C2928000
trusted library allocation
page read and write
248C2734000
trusted library allocation
page read and write
248C2EF8000
trusted library allocation
page read and write
248C2928000
trusted library allocation
page read and write
248C2EDD000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248C582E000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248BB80E000
trusted library allocation
page read and write
248BCD79000
trusted library allocation
page read and write
248BB4CF000
trusted library allocation
page read and write
248BA19A000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248C37C8000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BD72C000
trusted library allocation
page read and write
19F834A8000
heap
page read and write
248BB1FE000
trusted library allocation
page read and write
248B1296000
heap
page read and write
248BA1E5000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B1294000
heap
page read and write
248C3D23000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BC4F8000
trusted library allocation
page read and write
248C2EF8000
trusted library allocation
page read and write
248C2779000
trusted library allocation
page read and write
248BBA07000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C5A13000
trusted library allocation
page read and write
248C268D000
trusted library allocation
page read and write
248C3AC3000
trusted library allocation
page read and write
248B1283000
heap
page read and write
248BB1A1000
trusted library allocation
page read and write
248ABE01000
heap
page read and write
248B127E000
heap
page read and write
248B74E4000
trusted library allocation
page read and write
248C587A000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248C35FC000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BABBE000
trusted library allocation
page read and write
248BE7FC000
trusted library allocation
page read and write
248C28FD000
trusted library allocation
page read and write
248B9D33000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BBF97000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C272A000
trusted library allocation
page read and write
19F8344D000
heap
page read and write
248B128E000
heap
page read and write
248B7C82000
trusted library allocation
page read and write
1FF5FEE0000
heap
page read and write
248BB6A7000
trusted library allocation
page read and write
248C587C000
trusted library allocation
page read and write
248BE7AE000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BB6B0000
trusted library allocation
page read and write
248BA16F000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C296F000
trusted library allocation
page read and write
248C29BD000
trusted library allocation
page read and write
248B7813000
trusted library allocation
page read and write
248BB60A000
trusted library allocation
page read and write
248C5548000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
248C2D2C000
trusted library allocation
page read and write
248BB29A000
trusted library allocation
page read and write
248C5227000
trusted library allocation
page read and write
19F83460000
heap
page read and write
248BD7A5000
trusted library allocation
page read and write
248BBA4E000
trusted library allocation
page read and write
248BA1C5000
trusted library allocation
page read and write
248C35A0000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248C2988000
trusted library allocation
page read and write
248C2E50000
trusted library allocation
page read and write
248C52EE000
trusted library allocation
page read and write
248BD7F8000
trusted library allocation
page read and write
248BB99C000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BC485000
trusted library allocation
page read and write
248C55CC000
trusted library allocation
page read and write
248C52AB000
trusted library allocation
page read and write
248BA093000
trusted library allocation
page read and write
1FF5FEE5000
heap
page read and write
248B75A1000
trusted library allocation
page read and write
248C29B1000
trusted library allocation
page read and write
248C274E000
trusted library allocation
page read and write
19F83577000
heap
page read and write
1FF5FB40000
heap
page read and write
248B127E000
heap
page read and write
248BCB47000
trusted library allocation
page read and write
248B7629000
trusted library allocation
page read and write
248C2730000
trusted library allocation
page read and write
248C2983000
trusted library allocation
page read and write
248BB9FA000
trusted library allocation
page read and write
248C3726000
trusted library allocation
page read and write
248C2327000
trusted library allocation
page read and write
248C37A3000
trusted library allocation
page read and write
248BC6E8000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C5284000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248BBA6C000
trusted library allocation
page read and write
248C5E0B000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C2533000
trusted library allocation
page read and write
248BB9AC000
trusted library allocation
page read and write
248C552B000
trusted library allocation
page read and write
248B129A000
heap
page read and write
40F0000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B127B000
heap
page read and write
248BA43D000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BABCC000
trusted library allocation
page read and write
248C3736000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248BABD9000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B75BE000
trusted library allocation
page read and write
248C2656000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248BDC9F000
trusted library allocation
page read and write
248BBAF9000
trusted library allocation
page read and write
248B7544000
trusted library allocation
page read and write
248BDC6B000
trusted library allocation
page read and write
248C35D7000
trusted library allocation
page read and write
248C29DC000
trusted library allocation
page read and write
248C2666000
trusted library allocation
page read and write
248BA4F5000
trusted library allocation
page read and write
248BE1E9000
trusted library allocation
page read and write
248C2860000
trusted library allocation
page read and write
248B12BA000
heap
page read and write
11EF000
stack
page read and write
248C2625000
trusted library allocation
page read and write
248B7853000
trusted library allocation
page read and write
248C246D000
trusted library allocation
page read and write
248BA183000
trusted library allocation
page read and write
248BC584000
trusted library allocation
page read and write
248C266F000
trusted library allocation
page read and write
248B12B6000
heap
page read and write
248BB99C000
trusted library allocation
page read and write
248C371B000
trusted library allocation
page read and write
248BB165000
trusted library allocation
page read and write
248C27F5000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BCDF9000
trusted library allocation
page read and write
19F8345C000
heap
page read and write
248B12A5000
heap
page read and write
248B12BD000
heap
page read and write
248BE861000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B12B9000
heap
page read and write
248B12A2000
heap
page read and write
248BB184000
trusted library allocation
page read and write
248BE18F000
trusted library allocation
page read and write
248C35F8000
trusted library allocation
page read and write
248C55FE000
trusted library allocation
page read and write
248C391F000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248C52AB000
trusted library allocation
page read and write
248BA476000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
1F11FCDA000
heap
page read and write
248B7545000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248BB95A000
trusted library allocation
page read and write
248BDCD5000
trusted library allocation
page read and write
13A6000
heap
page read and write
248B1286000
heap
page read and write
248BB1D1000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C43CC000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12D5000
heap
page read and write
248B12C7000
heap
page read and write
A8F7CBE000
stack
page read and write
248BCB12000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
70C000
unkown
page read and write
21564790000
heap
page read and write
248C2767000
trusted library allocation
page read and write
19F83577000
heap
page read and write
248C27ED000
trusted library allocation
page read and write
248C29F3000
trusted library allocation
page read and write
248BB673000
trusted library allocation
page read and write
248BBAE8000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248B12ED000
heap
page read and write
1F120000000
trusted library allocation
page read and write
248B7884000
trusted library allocation
page read and write
248C37EB000
trusted library allocation
page read and write
248C2D0C000
trusted library allocation
page read and write
248B631E000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
19F83544000
heap
page read and write
248C2656000
trusted library allocation
page read and write
248BDCE3000
trusted library allocation
page read and write
248BC4DE000
trusted library allocation
page read and write
248C27C1000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB6A4000
trusted library allocation
page read and write
248BB9FD000
trusted library allocation
page read and write
248BCDF0000
trusted library allocation
page read and write
248BCC53000
trusted library allocation
page read and write
248C2660000
trusted library allocation
page read and write
248BB9E2000
trusted library allocation
page read and write
248B12FD000
heap
page read and write
248B12F4000
heap
page read and write
248BA4DA000
trusted library allocation
page read and write
3FF1000
heap
page read and write
248C5A13000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248BB928000
trusted library allocation
page read and write
248C37B9000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C2E57000
trusted library allocation
page read and write
248B7594000
trusted library allocation
page read and write
248C2327000
trusted library allocation
page read and write
248C2660000
trusted library allocation
page read and write
248BABD9000
trusted library allocation
page read and write
248BB22A000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C2864000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B7C1F000
trusted library allocation
page read and write
248BC48A000
trusted library allocation
page read and write
248BECE3000
trusted library allocation
page read and write
248BB8AC000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C27EA000
trusted library allocation
page read and write
19F834E0000
heap
page read and write
248B788B000
trusted library allocation
page read and write
248C2D33000
trusted library allocation
page read and write
248BDC90000
trusted library allocation
page read and write
248B7C6B000
trusted library allocation
page read and write
248B12C1000
heap
page read and write
19F826A0000
trusted library section
page readonly
248BBFB2000
trusted library allocation
page read and write
248BE1CC000
trusted library allocation
page read and write
19F8352A000
heap
page read and write
248C271C000
trusted library allocation
page read and write
248BB9D6000
trusted library allocation
page read and write
248BABF0000
trusted library allocation
page read and write
248B128D000
heap
page read and write
248C392D000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248BA46C000
trusted library allocation
page read and write
248C35AE000
trusted library allocation
page read and write
248B7821000
trusted library allocation
page read and write
248BBF95000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
77207FE000
unkown
page readonly
248C353F000
trusted library allocation
page read and write
21564947000
trusted library allocation
page read and write
248C37B9000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248BD7CA000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248B1295000
heap
page read and write
248C37D8000
trusted library allocation
page read and write
248B74A8000
trusted library allocation
page read and write
248C3953000
trusted library allocation
page read and write
21564B32000
trusted library allocation
page read and write
248BB9A3000
trusted library allocation
page read and write
19F83577000
heap
page read and write
248B12A3000
heap
page read and write
248C2EB1000
trusted library allocation
page read and write
19F83558000
heap
page read and write
248C2D1E000
trusted library allocation
page read and write
19F8269F000
unclassified section
page read and write
248C374D000
trusted library allocation
page read and write
248C291D000
trusted library allocation
page read and write
215645D3000
remote allocation
page execute read
248C2DF8000
trusted library allocation
page read and write
1FF617AC000
heap
page read and write
248BB9A3000
trusted library allocation
page read and write
248BB248000
trusted library allocation
page read and write
248BC678000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C3782000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248B12FD000
heap
page read and write
248C2EEC000
trusted library allocation
page read and write
248B129F000
heap
page read and write
248BCDAB000
trusted library allocation
page read and write
248C2200000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248BCBDD000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B1295000
heap
page read and write
19F834F1000
heap
page read and write
248B129B000
heap
page read and write
248B12D5000
heap
page read and write
248C4DFC000
trusted library allocation
page read and write
248B12A0000
heap
page read and write
248B129B000
heap
page read and write
248BE1A4000
trusted library allocation
page read and write
248BBF8C000
trusted library allocation
page read and write
248BB17F000
trusted library allocation
page read and write
248C29E4000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C5870000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BA0CC000
trusted library allocation
page read and write
248BB851000
trusted library allocation
page read and write
21564800000
trusted library allocation
page read and write
248C68D4000
trusted library allocation
page read and write
248B12AA000
heap
page read and write
248C2917000
trusted library allocation
page read and write
19F83568000
heap
page read and write
248B1295000
heap
page read and write
248B7848000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C37DE000
trusted library allocation
page read and write
248BDCBD000
trusted library allocation
page read and write
6EE13FE000
unkown
page readonly
248BB972000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248B1295000
heap
page read and write
248C247F000
trusted library allocation
page read and write
248C2DFB000
trusted library allocation
page read and write
248BB8F4000
trusted library allocation
page read and write
248C6396000
trusted library allocation
page read and write
1334000
heap
page read and write
248B1294000
heap
page read and write
248C355F000
trusted library allocation
page read and write
248B12C6000
heap
page read and write
1FF5FA30000
heap
page read and write
248C35D6000
trusted library allocation
page read and write
248C3935000
trusted library allocation
page read and write
248C3D36000
trusted library allocation
page read and write
248BCBCF000
trusted library allocation
page read and write
248B75C7000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BCBCB000
trusted library allocation
page read and write
248C523A000
trusted library allocation
page read and write
248BB782000
trusted library allocation
page read and write
248C237D000
trusted library allocation
page read and write
248C266D000
trusted library allocation
page read and write
248C2375000
trusted library allocation
page read and write
248C3AD0000
trusted library allocation
page read and write
248C2E24000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248BB2AC000
trusted library allocation
page read and write
248C27AD000
trusted library allocation
page read and write
11CF000
stack
page read and write
248C2966000
trusted library allocation
page read and write
248C29AB000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248C55AC000
trusted library allocation
page read and write
248C4D4A000
heap
page read and write
248B127E000
heap
page read and write
1F11FF00000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248B1274000
heap
page read and write
248BCB14000
trusted library allocation
page read and write
248C4E61000
trusted library allocation
page read and write
248B9DC9000
trusted library allocation
page read and write
248BDC5A000
trusted library allocation
page read and write
215647E0000
heap
page read and write
248B127E000
heap
page read and write
248C2838000
trusted library allocation
page read and write
248C58E1000
trusted library allocation
page read and write
248BC7F7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B1295000
heap
page read and write
248B12C9000
heap
page read and write
248C2772000
trusted library allocation
page read and write
19F82630000
heap
page read and write
248B12D5000
heap
page read and write
248BABCE000
trusted library allocation
page read and write
248C4DF8000
heap
page read and write
248B12A5000
heap
page read and write
248C282A000
trusted library allocation
page read and write
248BDC7A000
trusted library allocation
page read and write
248B130D000
heap
page read and write
1334000
heap
page read and write
248B12A1000
heap
page read and write
248C25DA000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BB44E000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12EB000
heap
page read and write
248B1294000
heap
page read and write
248BB98A000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248BB9DE000
trusted library allocation
page read and write
248C436E000
trusted library allocation
page read and write
248BBF8F000
trusted library allocation
page read and write
248BB1C0000
trusted library allocation
page read and write
248BA03F000
trusted library allocation
page read and write
248C354C000
trusted library allocation
page read and write
248C556D000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BB1D1000
trusted library allocation
page read and write
248C43C4000
trusted library allocation
page read and write
248BDCBD000
trusted library allocation
page read and write
248BD735000
trusted library allocation
page read and write
248BABE2000
trusted library allocation
page read and write
248BE8F9000
trusted library allocation
page read and write
27FC9600000
trusted library allocation
page read and write
248BB948000
trusted library allocation
page read and write
2156492E000
trusted library allocation
page read and write
248C4D15000
heap
page read and write
248BB2C3000
trusted library allocation
page read and write
248C35D9000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
A8F519E000
unkown
page readonly
19F8345F000
heap
page read and write
248C27F8000
trusted library allocation
page read and write
248C3D85000
trusted library allocation
page read and write
248B7CCE000
trusted library allocation
page read and write
248C5ADB000
trusted library allocation
page read and write
248BCB84000
trusted library allocation
page read and write
248B12B5000
heap
page read and write
248C5502000
trusted library allocation
page read and write
1F120103000
trusted library allocation
page read and write
248B1295000
heap
page read and write
1340000
heap
page read and write
248BB6B3000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C643B000
trusted library allocation
page read and write
248BE7B6000
trusted library allocation
page read and write
248B9D72000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BE4AD000
trusted library allocation
page read and write
248C283F000
trusted library allocation
page read and write
248C3718000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248BA4FC000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C4C35000
heap
page read and write
248C6427000
trusted library allocation
page read and write
248C4C52000
heap
page read and write
248BB6D4000
trusted library allocation
page read and write
248ABE10000
heap
page read and write
248BA4D8000
trusted library allocation
page read and write
248C3AD2000
trusted library allocation
page read and write
248C2E5F000
trusted library allocation
page read and write
248B12C7000
heap
page read and write
248BB1FA000
trusted library allocation
page read and write
248C52CD000
trusted library allocation
page read and write
248B12B5000
heap
page read and write
248C35B3000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248BE1C5000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248B12C2000
heap
page read and write
1F11FB25000
remote allocation
page execute read
248C2981000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B12FD000
heap
page read and write
248BD706000
trusted library allocation
page read and write
248B7AD0000
heap
page read and write
19F8286F000
trusted library allocation
page read and write
248C29D1000
trusted library allocation
page read and write
248BB2A0000
trusted library allocation
page read and write
248C4DF8000
heap
page read and write
248C2EC8000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BA1CE000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248BB8EC000
trusted library allocation
page read and write
1F120017000
trusted library allocation
page read and write
6EE267E000
unkown
page readonly
248BB7CC000
trusted library allocation
page read and write
248BB93B000
trusted library allocation
page read and write
248BA5E4000
trusted library allocation
page read and write
21564720000
heap
page read and write
248B12A2000
heap
page read and write
248C2EF3000
trusted library allocation
page read and write
248BA4F0000
trusted library allocation
page read and write
248B1274000
heap
page read and write
248B12A5000
heap
page read and write
248BC7EB000
trusted library allocation
page read and write
248C3D32000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C35D2000
trusted library allocation
page read and write
248BAB36000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
248C2EA0000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248BA1CB000
trusted library allocation
page read and write
248B7ABA000
heap
page read and write
248B750F000
trusted library allocation
page read and write
248C35A4000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB615000
trusted library allocation
page read and write
248C375C000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248B129B000
heap
page read and write
248C3530000
trusted library allocation
page read and write
248BB818000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248BB178000
trusted library allocation
page read and write
21564963000
trusted library allocation
page read and write
2156490D000
trusted library allocation
page read and write
248B75C7000
trusted library allocation
page read and write
248BC6B5000
trusted library allocation
page read and write
248B74F6000
trusted library allocation
page read and write
248B75F6000
trusted library allocation
page read and write
248BB606000
trusted library allocation
page read and write
248B7CA5000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C29EF000
trusted library allocation
page read and write
248C27E4000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B1297000
heap
page read and write
248C29E8000
trusted library allocation
page read and write
248BABD7000
trusted library allocation
page read and write
248B130D000
heap
page read and write
248C24F1000
trusted library allocation
page read and write
248BA074000
trusted library allocation
page read and write
248C35A0000
trusted library allocation
page read and write
248C25AB000
trusted library allocation
page read and write
248BA087000
trusted library allocation
page read and write
248BA05F000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248C2E24000
trusted library allocation
page read and write
1F1200C4000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C5A4B000
trusted library allocation
page read and write
248BB227000
trusted library allocation
page read and write
248BB9A6000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C277E000
trusted library allocation
page read and write
248BBFBF000
trusted library allocation
page read and write
248C5692000
trusted library allocation
page read and write
248C37C8000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
40F0000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248C37B9000
trusted library allocation
page read and write
248C5A31000
trusted library allocation
page read and write
248ABE01000
heap
page read and write
248C37CA000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12B9000
heap
page read and write
248C266D000
trusted library allocation
page read and write
248BCBB9000
trusted library allocation
page read and write
248C3752000
trusted library allocation
page read and write
248B12C4000
heap
page read and write
248BA58B000
trusted library allocation
page read and write
248BB1DC000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
A8F73FE000
unkown
page readonly
248C2964000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248BC472000
trusted library allocation
page read and write
248C2EDD000
trusted library allocation
page read and write
248BBF8F000
trusted library allocation
page read and write
248BA06D000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BABED000
trusted library allocation
page read and write
248C35A0000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BCBBD000
trusted library allocation
page read and write
248C27A2000
trusted library allocation
page read and write
248BA08D000
trusted library allocation
page read and write
248C29BD000
trusted library allocation
page read and write
248C581B000
trusted library allocation
page read and write
248C27C1000
trusted library allocation
page read and write
248C43B5000
trusted library allocation
page read and write
248C35F2000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248C63AD000
trusted library allocation
page read and write
248C254F000
trusted library allocation
page read and write
248C2DFB000
trusted library allocation
page read and write
248B1304000
heap
page read and write
11DB000
stack
page read and write
11BF000
stack
page read and write
248B12BA000
heap
page read and write
248B7AB5000
heap
page read and write
248C2E5F000
trusted library allocation
page read and write
19F82980000
heap
page read and write
248BB99C000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
1FF5FD00000
trusted library allocation
page read and write
248C4836000
trusted library allocation
page read and write
248BC7E1000
trusted library allocation
page read and write
248C2EC4000
trusted library allocation
page read and write
248BCD73000
trusted library allocation
page read and write
248B7ADE000
heap
page read and write
248BB94C000
trusted library allocation
page read and write
248C264E000
trusted library allocation
page read and write
248BC4CB000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248BA08D000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C52CD000
trusted library allocation
page read and write
248BC382000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12A5000
heap
page read and write
19F82803000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248B12A5000
heap
page read and write
248BB2A0000
trusted library allocation
page read and write
248C24ED000
trusted library allocation
page read and write
248B75D6000
trusted library allocation
page read and write
248C37FD000
trusted library allocation
page read and write
248BB28C000
trusted library allocation
page read and write
248BB334000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
6EDFBD8000
stack
page read and write
248B12A1000
heap
page read and write
248C268B000
trusted library allocation
page read and write
19F82886000
trusted library allocation
page read and write
248C27F5000
trusted library allocation
page read and write
248C25A7000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C3D1C000
trusted library allocation
page read and write
1F11FE40000
heap
page read and write
248B12A3000
heap
page read and write
248BD8BE000
trusted library allocation
page read and write
248C2E9D000
trusted library allocation
page read and write
248BB676000
trusted library allocation
page read and write
248BDCE3000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
6EE14FB000
stack
page read and write
248B12C3000
heap
page read and write
248B12D5000
heap
page read and write
248C35DF000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B9DBF000
trusted library allocation
page read and write
248B12BB000
heap
page read and write
127D000
stack
page read and write
248B786B000
trusted library allocation
page read and write
248C35FD000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
1F120003000
trusted library allocation
page read and write
248C5244000
trusted library allocation
page read and write
248ABE10000
heap
page read and write
248BB928000
trusted library allocation
page read and write
248C5A84000
trusted library allocation
page read and write
248C2322000
trusted library allocation
page read and write
248B7533000
trusted library allocation
page read and write
248BB3DA000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B128E000
heap
page read and write
19F834E8000
heap
page read and write
248C2777000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12B0000
heap
page read and write
248B127B000
heap
page read and write
248C2962000
trusted library allocation
page read and write
248B1308000
heap
page read and write
248BCC49000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248BB2D3000
trusted library allocation
page read and write
19F8346C000
heap
page read and write
248B12D5000
heap
page read and write
248B129B000
heap
page read and write
248C5548000
trusted library allocation
page read and write
248BA46E000
trusted library allocation
page read and write
248C27CE000
trusted library allocation
page read and write
248BABAC000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C3A4C000
trusted library allocation
page read and write
248C4E66000
trusted library allocation
page read and write
248BAB93000
trusted library allocation
page read and write
248BD7E7000
trusted library allocation
page read and write
248B1290000
heap
page read and write
248B74B9000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B127E000
heap
page read and write
248C27FB000
trusted library allocation
page read and write
248B63E4000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
21564B22000
trusted library allocation
page read and write
248BB507000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248B12EB000
heap
page read and write
248C55FE000
trusted library allocation
page read and write
248C2620000
trusted library allocation
page read and write
248BB73E000
trusted library allocation
page read and write
248C2584000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BB58F000
trusted library allocation
page read and write
1F1200F0000
trusted library allocation
page read and write
248C279D000
trusted library allocation
page read and write
248BB15F000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C27AB000
trusted library allocation
page read and write
248C27A4000
trusted library allocation
page read and write
248B12AC000
heap
page read and write
248B128E000
heap
page read and write
248C297D000
trusted library allocation
page read and write
248BA15B000
trusted library allocation
page read and write
248C356B000
trusted library allocation
page read and write
248BB20B000
trusted library allocation
page read and write
248BABBB000
trusted library allocation
page read and write
248BCD98000
trusted library allocation
page read and write
248C29DA000
trusted library allocation
page read and write
248BDC7E000
trusted library allocation
page read and write
248BB923000
trusted library allocation
page read and write
248C58A1000
trusted library allocation
page read and write
1FF5FC24000
heap
page read and write
248B9D79000
trusted library allocation
page read and write
248BB3EC000
trusted library allocation
page read and write
248BCB3E000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248B12AB000
heap
page read and write
248BB4AF000
trusted library allocation
page read and write
248C3758000
trusted library allocation
page read and write
248C356B000
trusted library allocation
page read and write
19F83568000
heap
page read and write
248C236C000
trusted library allocation
page read and write
248C2966000
trusted library allocation
page read and write
248BC5FB000
trusted library allocation
page read and write
21564B0C000
trusted library allocation
page read and write
248BA1D6000
trusted library allocation
page read and write
248B7CA5000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B1275000
heap
page read and write
248C5ADD000
trusted library allocation
page read and write
248BB198000
trusted library allocation
page read and write
248C297A000
trusted library allocation
page read and write
248BA4D8000
trusted library allocation
page read and write
19F83544000
heap
page read and write
248C3909000
trusted library allocation
page read and write
248BB613000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C29A1000
trusted library allocation
page read and write
19F828C5000
trusted library allocation
page read and write
13AC000
heap
page read and write
248C2EF3000
trusted library allocation
page read and write
248BCBF5000
trusted library allocation
page read and write
19F834A1000
heap
page read and write
248C29DC000
trusted library allocation
page read and write
248BBF88000
trusted library allocation
page read and write
27FC9360000
heap
page read and write
248C2EF3000
trusted library allocation
page read and write
248BB5E6000
trusted library allocation
page read and write
248C4856000
trusted library allocation
page read and write
248B12B6000
heap
page read and write
248C4E89000
trusted library allocation
page read and write
248BCBEE000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248B1295000
heap
page read and write
248BA063000
trusted library allocation
page read and write
248BA1BC000
trusted library allocation
page read and write
248BB935000
trusted library allocation
page read and write
248BA16F000
trusted library allocation
page read and write
248C2964000
trusted library allocation
page read and write
248BB9DE000
trusted library allocation
page read and write
248BA1C5000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248C37DE000
trusted library allocation
page read and write
248BA1C3000
trusted library allocation
page read and write
27FC9500000
trusted library allocation
page read and write
248C2722000
trusted library allocation
page read and write
248BDC7E000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
248C2ED7000
trusted library allocation
page read and write
248BC495000
trusted library allocation
page read and write
248BB9FA000
trusted library allocation
page read and write
248BDCBB000
trusted library allocation
page read and write
248C55AC000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12A2000
heap
page read and write
248C5AC3000
trusted library allocation
page read and write
248C27A6000
trusted library allocation
page read and write
248BA1DD000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248BB256000
trusted library allocation
page read and write
248B7CCE000
trusted library allocation
page read and write
248B1308000
heap
page read and write
248C58E7000
trusted library allocation
page read and write
248C5894000
trusted library allocation
page read and write
248BB823000
trusted library allocation
page read and write
19F834E0000
heap
page read and write
248BB649000
trusted library allocation
page read and write
248C258F000
trusted library allocation
page read and write
248C3923000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BABED000
trusted library allocation
page read and write
248C35D4000
trusted library allocation
page read and write
248C29E8000
trusted library allocation
page read and write
248BAB60000
trusted library allocation
page read and write
248C353F000
trusted library allocation
page read and write
248C5579000
trusted library allocation
page read and write
248B12C1000
heap
page read and write
248BABBE000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12BB000
heap
page read and write
248B7227000
trusted library allocation
page read and write
248C29EB000
trusted library allocation
page read and write
248BC7E1000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C5540000
trusted library allocation
page read and write
248C3543000
trusted library allocation
page read and write
248C56AF000
trusted library allocation
page read and write
248BB9FD000
trusted library allocation
page read and write
248C2E0D000
trusted library allocation
page read and write
248BE4E1000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248B129B000
heap
page read and write
E9CD7FE000
stack
page read and write
248C4EB4000
trusted library allocation
page read and write
248C3DC8000
trusted library allocation
page read and write
248C37B2000
trusted library allocation
page read and write
248C3D9E000
trusted library allocation
page read and write
248BA09D000
trusted library allocation
page read and write
248B763A000
trusted library allocation
page read and write
248C3782000
trusted library allocation
page read and write
248B9D63000
trusted library allocation
page read and write
248B1295000
heap
page read and write
19F8280A000
trusted library allocation
page read and write
248C264E000
trusted library allocation
page read and write
248C3D86000
trusted library allocation
page read and write
248C55E4000
trusted library allocation
page read and write
248BCDA0000
trusted library allocation
page read and write
248C251C000
trusted library allocation
page read and write
248BC56F000
trusted library allocation
page read and write
248BB263000
trusted library allocation
page read and write
248C5A24000
trusted library allocation
page read and write
248BB60D000
trusted library allocation
page read and write
248BD777000
trusted library allocation
page read and write
248C2D27000
trusted library allocation
page read and write
248C35A4000
trusted library allocation
page read and write
1F120013000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
AA9000
stack
page read and write
248C5548000
trusted library allocation
page read and write
19F828AF000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C43D2000
trusted library allocation
page read and write
248BB2D3000
trusted library allocation
page read and write
248BB8B9000
trusted library allocation
page read and write
248BA431000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C5281000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C2EB4000
trusted library allocation
page read and write
248BBF93000
trusted library allocation
page read and write
248BCB68000
trusted library allocation
page read and write
248C5A90000
trusted library allocation
page read and write
248BB28C000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
248B9D4E000
trusted library allocation
page read and write
248C2EA0000
trusted library allocation
page read and write
248C2981000
trusted library allocation
page read and write
1F11FE46000
heap
page read and write
248BDCE7000
trusted library allocation
page read and write
248BB4D3000
trusted library allocation
page read and write
248C526C000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12C9000
heap
page read and write
248BB2A0000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248B12A2000
heap
page read and write
248C69B4000
trusted library allocation
page read and write
248BA4F3000
trusted library allocation
page read and write
19F82940000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C2983000
trusted library allocation
page read and write
248C2E76000
trusted library allocation
page read and write
21564730000
heap
page read and write
248BE8FC000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
19F824B0000
unclassified section
page readonly
248B12A1000
heap
page read and write
248C3577000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248B7C7C000
trusted library allocation
page read and write
248C2730000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248BE8B1000
trusted library allocation
page read and write
248B62FB000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BA067000
trusted library allocation
page read and write
248C29BD000
trusted library allocation
page read and write
248B63E0000
trusted library allocation
page read and write
248B7890000
trusted library allocation
page read and write
248C3718000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C27CE000
trusted library allocation
page read and write
248B7CCE000
trusted library allocation
page read and write
248BA099000
trusted library allocation
page read and write
248C23CB000
trusted library allocation
page read and write
248C2EDF000
trusted library allocation
page read and write
6DC000
unkown
page readonly
248B12B3000
heap
page read and write
248B12A5000
heap
page read and write
248BD7C7000
trusted library allocation
page read and write
248B7C3C000
trusted library allocation
page read and write
248B6382000
trusted library allocation
page read and write
248B7579000
trusted library allocation
page read and write
248C350B000
trusted library allocation
page read and write
248BE1F2000
trusted library allocation
page read and write
248B723C000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248C354C000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
248B12D5000
heap
page read and write
248BBA68000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
248BB9AC000
trusted library allocation
page read and write
248BB6CE000
trusted library allocation
page read and write
21564966000
trusted library allocation
page read and write
248B6223000
trusted library allocation
page read and write
248B7C81000
trusted library allocation
page read and write
248BD73B000
trusted library allocation
page read and write
248BB9BD000
trusted library allocation
page read and write
248BBA3A000
trusted library allocation
page read and write
248BBF51000
trusted library allocation
page read and write
248C37E4000
trusted library allocation
page read and write
248BABDC000
trusted library allocation
page read and write
248BB990000
trusted library allocation
page read and write
248C5820000
trusted library allocation
page read and write
248C27DC000
trusted library allocation
page read and write
248B128E000
heap
page read and write
E9CDFFE000
stack
page read and write
248C27E6000
trusted library allocation
page read and write
248C2777000
trusted library allocation
page read and write
248BD81E000
trusted library allocation
page read and write
248C2936000
trusted library allocation
page read and write
248BB9E4000
trusted library allocation
page read and write
248B128D000
heap
page read and write
248C29F5000
trusted library allocation
page read and write
248C29AD000
trusted library allocation
page read and write
248B7AD2000
heap
page read and write
248C52EC000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248C35AA000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B129B000
heap
page read and write
248B74A1000
trusted library allocation
page read and write
248C2743000
trusted library allocation
page read and write
248BA4FC000
trusted library allocation
page read and write
248B9D62000
trusted library allocation
page read and write
248BABB7000
trusted library allocation
page read and write
19F8347F000
heap
page read and write
248BAB99000
trusted library allocation
page read and write
248C285D000
trusted library allocation
page read and write
19F8292D000
unkown
page execute read
248C3A94000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248BD7E7000
trusted library allocation
page read and write
248B7291000
trusted library allocation
page read and write
248BA0F6000
trusted library allocation
page read and write
A8F6BFE000
stack
page read and write
1F11FEE3000
heap
page read and write
248BB18B000
trusted library allocation
page read and write
248C2379000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C2E24000
trusted library allocation
page read and write
248BB9F0000
trusted library allocation
page read and write
248BCBC7000
trusted library allocation
page read and write
248BBFC3000
trusted library allocation
page read and write
19F83521000
heap
page read and write
248B12C7000
heap
page read and write
248BD7D2000
trusted library allocation
page read and write
248BB161000
trusted library allocation
page read and write
248BABE0000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248B12A1000
heap
page read and write
21564770000
heap
page read and write
248C2662000
trusted library allocation
page read and write
248BB2AC000
trusted library allocation
page read and write
1F11FAB0000
unclassified section
page readonly
248C271A000
trusted library allocation
page read and write
248BB946000
trusted library allocation
page read and write
248BCBCB000
trusted library allocation
page read and write
248B12C6000
heap
page read and write
248C2EF3000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB21F000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12B9000
heap
page read and write
19F82812000
trusted library allocation
page read and write
248C52AB000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12EB000
heap
page read and write
248C356B000
trusted library allocation
page read and write
248C35B3000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248C4EFC000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C37B2000
trusted library allocation
page read and write
1F1200DB000
trusted library allocation
page read and write
248B12D7000
heap
page read and write
248BB198000
trusted library allocation
page read and write
1334000
heap
page read and write
248BB45B000
trusted library allocation
page read and write
248B5CEF000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12BD000
heap
page read and write
248B1275000
heap
page read and write
1F12000E000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B745F000
trusted library allocation
page read and write
248C277E000
trusted library allocation
page read and write
A8F5BD8000
stack
page read and write
248B12B5000
heap
page read and write
248B1275000
heap
page read and write
1FF617B0000
heap
page read and write
248B12AB000
heap
page read and write
248C2382000
trusted library allocation
page read and write
248B129C000
heap
page read and write
248BDCCA000
trusted library allocation
page read and write
19F8280C000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C2ECD000
trusted library allocation
page read and write
248BD773000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C371D000
trusted library allocation
page read and write
19F825DA000
heap
page read and write
248C2E5F000
trusted library allocation
page read and write
248BB16D000
trusted library allocation
page read and write
19F834E3000
heap
page read and write
248B12FC000
heap
page read and write
248BDCD9000
trusted library allocation
page read and write
248C52CB000
trusted library allocation
page read and write
248C5244000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB193000
trusted library allocation
page read and write
248C58E9000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248BC7ED000
trusted library allocation
page read and write
248B9DDC000
trusted library allocation
page read and write
248C371B000
trusted library allocation
page read and write
248C371D000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12EB000
heap
page read and write
248BA1B2000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BCD52000
trusted library allocation
page read and write
248BB945000
trusted library allocation
page read and write
248C2ED7000
trusted library allocation
page read and write
248BC693000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248B1295000
heap
page read and write
248B756E000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248C2D4C000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C248C000
trusted library allocation
page read and write
248BA440000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
21564B1B000
trusted library allocation
page read and write
248C27C1000
trusted library allocation
page read and write
248BB7D9000
trusted library allocation
page read and write
248BA1E5000
trusted library allocation
page read and write
248C4E18000
trusted library allocation
page read and write
248BD8DD000
trusted library allocation
page read and write
248B74D0000
trusted library allocation
page read and write
248ABE1B000
heap
page read and write
248C27F5000
trusted library allocation
page read and write
248C23CB000
trusted library allocation
page read and write
248B7C9E000
trusted library allocation
page read and write
248C2E50000
trusted library allocation
page read and write
248C3510000
trusted library allocation
page read and write
248BC6D7000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C355C000
trusted library allocation
page read and write
248BC4E9000
trusted library allocation
page read and write
248BABFC000
trusted library allocation
page read and write
248BA1AF000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B1295000
heap
page read and write
248B1304000
heap
page read and write
248C376A000
trusted library allocation
page read and write
19F828C7000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B7AF2000
heap
page read and write
248C5540000
trusted library allocation
page read and write
248BD7CD000
trusted library allocation
page read and write
248C586E000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
19F83544000
heap
page read and write
248B12C2000
heap
page read and write
248C2930000
trusted library allocation
page read and write
248BABD7000
trusted library allocation
page read and write
248B12BB000
heap
page read and write
248C27E6000
trusted library allocation
page read and write
248C5577000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248C35AE000
trusted library allocation
page read and write
248BB1DD000
trusted library allocation
page read and write
248C2EF3000
trusted library allocation
page read and write
248B754E000
trusted library allocation
page read and write
248C37D8000
trusted library allocation
page read and write
1F11FCD0000
heap
page read and write
248C29AB000
trusted library allocation
page read and write
248BC3B1000
trusted library allocation
page read and write
248BB9D3000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248BDCD7000
trusted library allocation
page read and write
248C35D2000
trusted library allocation
page read and write
248B9D7B000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BB96C000
trusted library allocation
page read and write
1F11FD30000
heap
page read and write
248C37FD000
trusted library allocation
page read and write
248C5579000
trusted library allocation
page read and write
248B12B1000
heap
page read and write
248B7A97000
heap
page read and write
248C266D000
trusted library allocation
page read and write
248C2582000
trusted library allocation
page read and write
248C52CD000
trusted library allocation
page read and write
248C35F8000
trusted library allocation
page read and write
248BB2D9000
trusted library allocation
page read and write
13B1000
heap
page read and write
248B12A2000
heap
page read and write
248C2E53000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248C223C000
trusted library allocation
page read and write
248C2988000
trusted library allocation
page read and write
248C25A7000
trusted library allocation
page read and write
248C2E53000
trusted library allocation
page read and write
248BB98A000
trusted library allocation
page read and write
248BB676000
trusted library allocation
page read and write
27FC9730000
heap
page read and write
248B7C9E000
trusted library allocation
page read and write
248C552E000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
248B1294000
heap
page read and write
248BBAF1000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248BBFBF000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248B12AB000
heap
page read and write
248BB9F8000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248B12FC000
heap
page read and write
19F83568000
heap
page read and write
248C4C89000
heap
page read and write
248C25AB000
trusted library allocation
page read and write
248C2ED4000
trusted library allocation
page read and write
248BABC2000
trusted library allocation
page read and write
248C247D000
trusted library allocation
page read and write
21564B14000
trusted library allocation
page read and write
19F82869000
trusted library allocation
page read and write
248C2492000
trusted library allocation
page read and write
6EE157E000
unkown
page readonly
248B9DDB000
trusted library allocation
page read and write
248BB5BF000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248C35C7000
trusted library allocation
page read and write
248B128D000
heap
page read and write
248BB1A9000
trusted library allocation
page read and write
248BA07B000
trusted library allocation
page read and write
248BBA73000
trusted library allocation
page read and write
248C29BB000
trusted library allocation
page read and write
248BA1A9000
trusted library allocation
page read and write
248C43B9000
trusted library allocation
page read and write
248ABE29000
heap
page read and write
248C35DF000
trusted library allocation
page read and write
248BA17E000
trusted library allocation
page read and write
19F834FD000
heap
page read and write
248B1294000
heap
page read and write
6EE2E7E000
stack
page read and write
248B1277000
heap
page read and write
248B12B3000
heap
page read and write
248C43BD000
trusted library allocation
page read and write
248BB9A3000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B12D5000
heap
page read and write
248B129B000
heap
page read and write
248C35F8000
trusted library allocation
page read and write
19F834E3000
heap
page read and write
248BB9A6000
trusted library allocation
page read and write
70C000
unkown
page write copy
248BA4EA000
trusted library allocation
page read and write
248C5272000
trusted library allocation
page read and write
248BCBAD000
trusted library allocation
page read and write
248ABE1B000
heap
page read and write
248B1295000
heap
page read and write
248C26EA000
trusted library allocation
page read and write
13BF000
heap
page read and write
248B7CA5000
trusted library allocation
page read and write
248C5B27000
trusted library allocation
page read and write
248C35D6000
trusted library allocation
page read and write
248BB1D1000
trusted library allocation
page read and write
248C5AC3000
trusted library allocation
page read and write
19F82818000
trusted library allocation
page read and write
248C4F24000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248C3AE8000
trusted library allocation
page read and write
248BB9D6000
trusted library allocation
page read and write
248C37A8000
trusted library allocation
page read and write
248C35FD000
trusted library allocation
page read and write
248BBFEC000
trusted library allocation
page read and write
248C356B000
trusted library allocation
page read and write
248BB9DE000
trusted library allocation
page read and write
248B75E6000
trusted library allocation
page read and write
248BC5ED000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB9BB000
trusted library allocation
page read and write
248C2978000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248BD781000
trusted library allocation
page read and write
248C2E26000
trusted library allocation
page read and write
248BB1D1000
trusted library allocation
page read and write
248BBF8F000
trusted library allocation
page read and write
248C266F000
trusted library allocation
page read and write
248C5552000
trusted library allocation
page read and write
248B12FD000
heap
page read and write
248B78F4000
trusted library allocation
page read and write
248BA13D000
trusted library allocation
page read and write
19F8345C000
heap
page read and write
248B127F000
heap
page read and write
641000
unkown
page execute read
248B6326000
trusted library allocation
page read and write
248BB184000
trusted library allocation
page read and write
248B9DCD000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248BD779000
trusted library allocation
page read and write
248C29E4000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C4EF9000
trusted library allocation
page read and write
248BABCE000
trusted library allocation
page read and write
248C4E59000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C2713000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C3545000
trusted library allocation
page read and write
248C5AB1000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248C27ED000
trusted library allocation
page read and write
248B7863000
trusted library allocation
page read and write
248B753E000
trusted library allocation
page read and write
248C2D25000
trusted library allocation
page read and write
248BDCE3000
trusted library allocation
page read and write
248C3553000
trusted library allocation
page read and write
248BB697000
trusted library allocation
page read and write
248BB261000
trusted library allocation
page read and write
248C3787000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248C5300000
trusted library allocation
page read and write
248C27C5000
trusted library allocation
page read and write
248BB9FA000
trusted library allocation
page read and write
248C3553000
trusted library allocation
page read and write
248BBA3A000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248BB8A0000
trusted library allocation
page read and write
248B12EC000
heap
page read and write
248B12C9000
heap
page read and write
248B12F4000
heap
page read and write
248C3953000
trusted library allocation
page read and write
248C5AA9000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248C35FD000
trusted library allocation
page read and write
248C52AB000
trusted library allocation
page read and write
248C37E4000
trusted library allocation
page read and write
248BABB7000
trusted library allocation
page read and write
248C523A000
trusted library allocation
page read and write
248C26E3000
trusted library allocation
page read and write
248C2E53000
trusted library allocation
page read and write
248BB437000
trusted library allocation
page read and write
12BE000
stack
page read and write
248BB9B9000
trusted library allocation
page read and write
248BBF95000
trusted library allocation
page read and write
248C25AD000
trusted library allocation
page read and write
215645E0000
unclassified section
page readonly
248C4DBA000
trusted library allocation
page read and write
248B7A97000
heap
page read and write
248BB9F4000
trusted library allocation
page read and write
248B12DF000
heap
page read and write
248C297A000
trusted library allocation
page read and write
248C3DC5000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C27D6000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248B12A2000
heap
page read and write
248C2EE4000
trusted library allocation
page read and write
248C25AD000
trusted library allocation
page read and write
248B9DC9000
trusted library allocation
page read and write
248BB502000
trusted library allocation
page read and write
248BBF8C000
trusted library allocation
page read and write
248C2DFC000
trusted library allocation
page read and write
248B9D62000
trusted library allocation
page read and write
248BCB36000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248B12BA000
heap
page read and write
248BA4FC000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248BDCBD000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248B12AD000
heap
page read and write
248BDC9A000
trusted library allocation
page read and write
248BC686000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B12AB000
heap
page read and write
248B12C9000
heap
page read and write
248BA1D6000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB94A000
trusted library allocation
page read and write
248BA1E1000
trusted library allocation
page read and write
248BA188000
trusted library allocation
page read and write
248C552E000
trusted library allocation
page read and write
248C3D85000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C2D33000
trusted library allocation
page read and write
248BEC83000
trusted library allocation
page read and write
248BBAD7000
trusted library allocation
page read and write
248C4C4D000
heap
page read and write
248B12B0000
heap
page read and write
248BBF79000
trusted library allocation
page read and write
248BB9F4000
trusted library allocation
page read and write
248BB228000
trusted library allocation
page read and write
248C55FE000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BCBFB000
trusted library allocation
page read and write
248BB8D4000
trusted library allocation
page read and write
248B75F6000
trusted library allocation
page read and write
215649EB000
trusted library allocation
page read and write
248BABFC000
trusted library allocation
page read and write
248C5878000
trusted library allocation
page read and write
248B783E000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248BB6DB000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C525A000
trusted library allocation
page read and write
2156479A000
heap
page read and write
1FF617BF000
heap
page read and write
248C5282000
trusted library allocation
page read and write
A8F50DE000
stack
page read and write
123E000
stack
page read and write
248C2775000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C58AC000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248BA091000
trusted library allocation
page read and write
248BCBBD000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248B1295000
heap
page read and write
248C52EE000
trusted library allocation
page read and write
248C24AD000
trusted library allocation
page read and write
A8F84BE000
unkown
page readonly
1FF5FBF0000
heap
page read and write
248C37F3000
trusted library allocation
page read and write
248C5878000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
248B1298000
heap
page read and write
248B1295000
heap
page read and write
248BB7B5000
trusted library allocation
page read and write
248BBAD1000
trusted library allocation
page read and write
248C3536000
trusted library allocation
page read and write
248C43FD000
trusted library allocation
page read and write
248B12C7000
heap
page read and write
248B1294000
heap
page read and write
248B12A1000
heap
page read and write
248B75F1000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248BA13B000
trusted library allocation
page read and write
1334000
heap
page read and write
248C4D6D000
heap
page read and write
248C3538000
trusted library allocation
page read and write
248BB98A000
trusted library allocation
page read and write
248BBF9C000
trusted library allocation
page read and write
248C5817000
trusted library allocation
page read and write
248BDCD7000
trusted library allocation
page read and write
772083B000
stack
page read and write
248BD795000
trusted library allocation
page read and write
248B1286000
heap
page read and write
248BB968000
trusted library allocation
page read and write
248BCC67000
trusted library allocation
page read and write
248BB7BB000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C37DE000
trusted library allocation
page read and write
A8F74BE000
unkown
page readonly
248BA4FC000
trusted library allocation
page read and write
248C29E4000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
19F828BB000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248B6326000
trusted library allocation
page read and write
248C3DC5000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
19F83577000
heap
page read and write
248C5EE7000
trusted library allocation
page read and write
248C43CC000
trusted library allocation
page read and write
21564903000
trusted library allocation
page read and write
19F82610000
heap
page read and write
248BDCC7000
trusted library allocation
page read and write
248BB18E000
trusted library allocation
page read and write
6EE25BE000
stack
page read and write
248B12B9000
heap
page read and write
248B12AE000
heap
page read and write
248BD752000
trusted library allocation
page read and write
248BB9B8000
trusted library allocation
page read and write
13AE000
heap
page read and write
248B12ED000
heap
page read and write
19F834FD000
heap
page read and write
248B127B000
heap
page read and write
248B1295000
heap
page read and write
248B12A3000
heap
page read and write
248C2E82000
trusted library allocation
page read and write
248B12AD000
heap
page read and write
248B12C1000
heap
page read and write
248B129B000
heap
page read and write
248BD714000
trusted library allocation
page read and write
248B74BC000
trusted library allocation
page read and write
248C37F3000
trusted library allocation
page read and write
248C29BB000
trusted library allocation
page read and write
248C353F000
trusted library allocation
page read and write
248BB1A6000
trusted library allocation
page read and write
248B74AA000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C35F8000
trusted library allocation
page read and write
248BA45A000
trusted library allocation
page read and write
248C394D000
trusted library allocation
page read and write
248C376A000
trusted library allocation
page read and write
248B9D33000
trusted library allocation
page read and write
248C5579000
trusted library allocation
page read and write
19F82810000
trusted library allocation
page read and write
248C6959000
trusted library allocation
page read and write
248BDCB7000
trusted library allocation
page read and write
248B9DB9000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
248C2EDF000
trusted library allocation
page read and write
248C2492000
trusted library allocation
page read and write
248BA0B6000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
19F83460000
heap
page read and write
248B1295000
heap
page read and write
248B12A8000
heap
page read and write
248B12B0000
heap
page read and write
702000
unkown
page readonly
248B127B000
heap
page read and write
248B12B3000
heap
page read and write
248C5A9D000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C356B000
trusted library allocation
page read and write
248C292D000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB259000
trusted library allocation
page read and write
248BB1DC000
trusted library allocation
page read and write
248BABD0000
trusted library allocation
page read and write
248BDC9F000
trusted library allocation
page read and write
248ABE05000
heap
page read and write
6DC000
unkown
page readonly
248C35B3000
trusted library allocation
page read and write
248C4CCD000
heap
page read and write
248BB439000
trusted library allocation
page read and write
248BB769000
trusted library allocation
page read and write
248C2584000
trusted library allocation
page read and write
248C55AC000
trusted library allocation
page read and write
248BB179000
trusted library allocation
page read and write
248BABD9000
trusted library allocation
page read and write
248C3D23000
trusted library allocation
page read and write
248BCB16000
trusted library allocation
page read and write
248C395A000
trusted library allocation
page read and write
21564550000
unclassified section
page readonly
248BAED7000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248B7AD2000
heap
page read and write
248BB9D3000
trusted library allocation
page read and write
248BB290000
trusted library allocation
page read and write
248C27A6000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB608000
trusted library allocation
page read and write
248B12A8000
heap
page read and write
248BC5E3000
trusted library allocation
page read and write
248BB386000
trusted library allocation
page read and write
248C5692000
trusted library allocation
page read and write
248C298A000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
248C37C8000
trusted library allocation
page read and write
248BB2FE000
trusted library allocation
page read and write
248C37E4000
trusted library allocation
page read and write
248BD7CD000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248BB228000
trusted library allocation
page read and write
248B12BA000
heap
page read and write
248BCD73000
trusted library allocation
page read and write
19F8353B000
heap
page read and write
248C529E000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248BB263000
trusted library allocation
page read and write
248C392D000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248B7575000
trusted library allocation
page read and write
248B9D62000
trusted library allocation
page read and write
248BD777000
trusted library allocation
page read and write
248BB1A3000
trusted library allocation
page read and write
19F83558000
heap
page read and write
248BB3D6000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248C27B0000
trusted library allocation
page read and write
248B9D4E000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248C291D000
trusted library allocation
page read and write
248B12C7000
heap
page read and write
248C2978000
trusted library allocation
page read and write
248C2666000
trusted library allocation
page read and write
248C5820000
trusted library allocation
page read and write
248BAEF2000
trusted library allocation
page read and write
248B1306000
heap
page read and write
248B1275000
heap
page read and write
19F83400000
heap
page read and write
248C2936000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
1FF5FC22000
heap
page read and write
248BABD2000
trusted library allocation
page read and write
248BD7F8000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C266F000
trusted library allocation
page read and write
248BA1E1000
trusted library allocation
page read and write
640000
unkown
page readonly
248BA43B000
trusted library allocation
page read and write
248B7A90000
heap
page read and write
248B12FE000
heap
page read and write
248BB820000
trusted library allocation
page read and write
21564960000
trusted library allocation
page read and write
248C35F2000
trusted library allocation
page read and write
248BB69A000
trusted library allocation
page read and write
248BA09D000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BB6DE000
trusted library allocation
page read and write
248BC7D5000
trusted library allocation
page read and write
77219FE000
unkown
page readonly
248B12A2000
heap
page read and write
248C58E9000
trusted library allocation
page read and write
248C25A7000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248B12AE000
heap
page read and write
19F834E8000
heap
page read and write
248BA1AC000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C2591000
trusted library allocation
page read and write
248BBAFC000
trusted library allocation
page read and write
248C35DE000
trusted library allocation
page read and write
248BB649000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248BB581000
trusted library allocation
page read and write
248C35D2000
trusted library allocation
page read and write
248BB1FA000
trusted library allocation
page read and write
248B1296000
heap
page read and write
248B1275000
heap
page read and write
248BABC3000
trusted library allocation
page read and write
248BD7D0000
trusted library allocation
page read and write
248C29A1000
trusted library allocation
page read and write
248BB184000
trusted library allocation
page read and write
1FF617BA000
heap
page read and write
248BBACB000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248B7499000
trusted library allocation
page read and write
248B72EE000
trusted library allocation
page read and write
248C2E57000
trusted library allocation
page read and write
248BC38A000
trusted library allocation
page read and write
248C3D38000
trusted library allocation
page read and write
248C37A8000
trusted library allocation
page read and write
248C35B3000
trusted library allocation
page read and write
248C2375000
trusted library allocation
page read and write
248BDCC7000
trusted library allocation
page read and write
248BB94A000
trusted library allocation
page read and write
248B759D000
trusted library allocation
page read and write
248BB6B0000
trusted library allocation
page read and write
248C58FD000
trusted library allocation
page read and write
248C3536000
trusted library allocation
page read and write
248C521B000
trusted library allocation
page read and write
248BCB34000
trusted library allocation
page read and write
248C2871000
trusted library allocation
page read and write
248BA4F5000
trusted library allocation
page read and write
248BD766000
trusted library allocation
page read and write
248B1286000
heap
page read and write
248B12B6000
heap
page read and write
B8553FC000
stack
page read and write
248BBF93000
trusted library allocation
page read and write
248C35A1000
trusted library allocation
page read and write
248BB8C0000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248C58FD000
trusted library allocation
page read and write
248BCDE9000
trusted library allocation
page read and write
248BCB2C000
trusted library allocation
page read and write
248C27B8000
trusted library allocation
page read and write
248C2EEC000
trusted library allocation
page read and write
248C351A000
trusted library allocation
page read and write
21564773000
heap
page read and write
248B12EB000
heap
page read and write
248BB192000
trusted library allocation
page read and write
248BB945000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248B12EB000
heap
page read and write
248B12A2000
heap
page read and write
248B1295000
heap
page read and write
248BE458000
trusted library allocation
page read and write
248BE1DE000
trusted library allocation
page read and write
19F83469000
heap
page read and write
248C5244000
trusted library allocation
page read and write
248BA089000
trusted library allocation
page read and write
248BC4E9000
trusted library allocation
page read and write
2156496E000
trusted library allocation
page read and write
248BBFF2000
trusted library allocation
page read and write
248C262F000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B78C4000
trusted library allocation
page read and write
6EE263E000
stack
page read and write
248BB646000
trusted library allocation
page read and write
248BD79C000
trusted library allocation
page read and write
248C27D0000
trusted library allocation
page read and write
248B7498000
trusted library allocation
page read and write
19F83460000
heap
page read and write
248BD7FD000
trusted library allocation
page read and write
248C58DF000
trusted library allocation
page read and write
19F82920000
unkown
page execute read
248C58DB000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B7C6C000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248C3530000
trusted library allocation
page read and write
248B5CB3000
trusted library allocation
page read and write
248BB3E0000
trusted library allocation
page read and write
248BBB00000
trusted library allocation
page read and write
248C2582000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B12F4000
heap
page read and write
248C3784000
trusted library allocation
page read and write
248BCBEE000
trusted library allocation
page read and write
248C4381000
trusted library allocation
page read and write
248BCD71000
trusted library allocation
page read and write
248B74A3000
trusted library allocation
page read and write
E9CEFFF000
stack
page read and write
248C2EA0000
trusted library allocation
page read and write
248C354C000
trusted library allocation
page read and write
248B7886000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B63EF000
trusted library allocation
page read and write
248BB75A000
trusted library allocation
page read and write
19F834F1000
heap
page read and write
248BDCCA000
trusted library allocation
page read and write
248C27AD000
trusted library allocation
page read and write
248C29B1000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B1275000
heap
page read and write
248B12D5000
heap
page read and write
248BCC1A000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248B12BC000
heap
page read and write
248BB435000
trusted library allocation
page read and write
248BB1A3000
trusted library allocation
page read and write
248BDCD1000
trusted library allocation
page read and write
248BDCB0000
trusted library allocation
page read and write
248BB4B4000
trusted library allocation
page read and write
248BB1DC000
trusted library allocation
page read and write
248C35B3000
trusted library allocation
page read and write
248BB2FA000
trusted library allocation
page read and write
248C555A000
trusted library allocation
page read and write
248C2985000
trusted library allocation
page read and write
248C5A5D000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B12FE000
heap
page read and write
248BC457000
trusted library allocation
page read and write
248C552E000
trusted library allocation
page read and write
248BB9F0000
trusted library allocation
page read and write
248B74EC000
trusted library allocation
page read and write
248BB916000
trusted library allocation
page read and write
248BE818000
trusted library allocation
page read and write
248B75BC000
trusted library allocation
page read and write
6EE1D7E000
stack
page read and write
248C583F000
trusted library allocation
page read and write
248C5E11000
trusted library allocation
page read and write
248BB22A000
trusted library allocation
page read and write
248C4C01000
heap
page read and write
248BA19D000
trusted library allocation
page read and write
248C5900000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248C255E000
trusted library allocation
page read and write
248B1285000
heap
page read and write
248B12FD000
heap
page read and write
248B7542000
trusted library allocation
page read and write
248B7C9E000
trusted library allocation
page read and write
248B75BC000
trusted library allocation
page read and write
248C5A76000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248BA4BD000
trusted library allocation
page read and write
248BCBC7000
trusted library allocation
page read and write
248B1305000
heap
page read and write
19F83460000
heap
page read and write
248C43C4000
trusted library allocation
page read and write
248BABD4000
trusted library allocation
page read and write
248C2473000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BD7D0000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248B12CE000
heap
page read and write
248BD7C7000
trusted library allocation
page read and write
248C586E000
trusted library allocation
page read and write
248C2EF3000
trusted library allocation
page read and write
248BC56B000
trusted library allocation
page read and write
248BDC27000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C35DE000
trusted library allocation
page read and write
248BABCC000
trusted library allocation
page read and write
248BDC32000
trusted library allocation
page read and write
248BB9F6000
trusted library allocation
page read and write
248C35B2000
trusted library allocation
page read and write
248C3726000
trusted library allocation
page read and write
248BDC60000
trusted library allocation
page read and write
248BB945000
trusted library allocation
page read and write
21564923000
trusted library allocation
page read and write
248BABB2000
trusted library allocation
page read and write
248B7598000
trusted library allocation
page read and write
248BA4F5000
trusted library allocation
page read and write
248BB994000
trusted library allocation
page read and write
248BB291000
trusted library allocation
page read and write
248C29E2000
trusted library allocation
page read and write
248BD7A6000
trusted library allocation
page read and write
248B12EC000
heap
page read and write
248BA1C5000
trusted library allocation
page read and write
19F82848000
trusted library allocation
page read and write
248B130B000
heap
page read and write
248C2335000
trusted library allocation
page read and write
248BB9FD000
trusted library allocation
page read and write
248BBF46000
trusted library allocation
page read and write
248C29E2000
trusted library allocation
page read and write
248C2E50000
trusted library allocation
page read and write
19F8292F000
unkown
page execute read
248BA18F000
trusted library allocation
page read and write
248C2EF1000
trusted library allocation
page read and write
248C52EC000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C56F6000
trusted library allocation
page read and write
702000
unkown
page readonly
1F120024000
trusted library allocation
page read and write
248BBAB0000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B12ED000
heap
page read and write
248C35C7000
trusted library allocation
page read and write
248BABCE000
trusted library allocation
page read and write
248C3543000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248BB94C000
trusted library allocation
page read and write
248C5874000
trusted library allocation
page read and write
248C27CC000
trusted library allocation
page read and write
248BCB88000
trusted library allocation
page read and write
248C3C00000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12A1000
heap
page read and write
248B12AA000
heap
page read and write
248BB1FE000
trusted library allocation
page read and write
248BB629000
trusted library allocation
page read and write
248BBAE7000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BDCAA000
trusted library allocation
page read and write
19F83401000
heap
page read and write
248B12C6000
heap
page read and write
1FF5FC2C000
heap
page read and write
248BB1D3000
trusted library allocation
page read and write
248C37C8000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248B12AB000
heap
page read and write
19F82692000
unclassified section
page read and write
248C35BA000
trusted library allocation
page read and write
248C5579000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248B12A0000
heap
page read and write
19F83464000
heap
page read and write
248BA1E1000
trusted library allocation
page read and write
248C2990000
trusted library allocation
page read and write
1334000
heap
page read and write
248BB62C000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248B7C9E000
trusted library allocation
page read and write
248C236C000
trusted library allocation
page read and write
248BB17D000
trusted library allocation
page read and write
248B9DBF000
trusted library allocation
page read and write
248C35D9000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248ABE1B000
heap
page read and write
248B1295000
heap
page read and write
248C52EE000
trusted library allocation
page read and write
1F120076000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C52CD000
trusted library allocation
page read and write
248C4395000
trusted library allocation
page read and write
248B1305000
heap
page read and write
248B1286000
heap
page read and write
248C35A4000
trusted library allocation
page read and write
248BB92C000
trusted library allocation
page read and write
248B9DDB000
trusted library allocation
page read and write
248BB694000
trusted library allocation
page read and write
248BC4E5000
trusted library allocation
page read and write
248BB15F000
trusted library allocation
page read and write
248C29B8000
trusted library allocation
page read and write
248C245E000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12BE000
heap
page read and write
248BA1C1000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C4C01000
heap
page read and write
248B12EB000
heap
page read and write
248C29AD000
trusted library allocation
page read and write
248C3756000
trusted library allocation
page read and write
248C4A00000
trusted library allocation
page read and write
248B62F6000
trusted library allocation
page read and write
248B5C98000
trusted library allocation
page read and write
248C29E0000
trusted library allocation
page read and write
248C63E1000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
1FF617C1000
heap
page read and write
2156497A000
trusted library allocation
page read and write
1334000
heap
page read and write
248C264E000
trusted library allocation
page read and write
248BDCE3000
trusted library allocation
page read and write
E9CE7FF000
stack
page read and write
248C4C71000
heap
page read and write
248BC7F9000
trusted library allocation
page read and write
248C5832000
trusted library allocation
page read and write
248BA194000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12EB000
heap
page read and write
248B12FD000
heap
page read and write
248C5876000
trusted library allocation
page read and write
248BC4BE000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BCC2A000
trusted library allocation
page read and write
248BB96C000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BB7CC000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248C3944000
trusted library allocation
page read and write
248BB9FD000
trusted library allocation
page read and write
248C298F000
trusted library allocation
page read and write
248C4CCD000
heap
page read and write
248B127B000
heap
page read and write
248B7AF0000
heap
page read and write
248C2751000
trusted library allocation
page read and write
248C29EF000
trusted library allocation
page read and write
19F82700000
trusted library allocation
page read and write
248BC478000
trusted library allocation
page read and write
248BB17B000
trusted library allocation
page read and write
1F120049000
trusted library allocation
page read and write
248B12AD000
heap
page read and write
248C4381000
trusted library allocation
page read and write
248C29F1000
trusted library allocation
page read and write
248C4D16000
heap
page read and write
248BA488000
trusted library allocation
page read and write
248C43D6000
trusted library allocation
page read and write
248B6271000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B1295000
heap
page read and write
1FF5FB20000
heap
page read and write
248BB227000
trusted library allocation
page read and write
21564981000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248BA087000
trusted library allocation
page read and write
248BDC72000
trusted library allocation
page read and write
248BA147000
trusted library allocation
page read and write
248BB21C000
trusted library allocation
page read and write
248B7AB0000
heap
page read and write
248B12EB000
heap
page read and write
B10000
heap
page read and write
248C4CB9000
heap
page read and write
248BB43B000
trusted library allocation
page read and write
248C25E4000
trusted library allocation
page read and write
248C249D000
trusted library allocation
page read and write
248BA924000
trusted library allocation
page read and write
248C2662000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C5A6B000
trusted library allocation
page read and write
248BB2FA000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B12A5000
heap
page read and write
248BDC7E000
trusted library allocation
page read and write
248BA4F0000
trusted library allocation
page read and write
248C237B000
trusted library allocation
page read and write
248C268B000
trusted library allocation
page read and write
1FF5FBFA000
heap
page read and write
248B9D13000
trusted library allocation
page read and write
248C5288000
trusted library allocation
page read and write
248BCBA5000
trusted library allocation
page read and write
248C5A24000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
248C233B000
trusted library allocation
page read and write
248B75C7000
trusted library allocation
page read and write
248C3D7F000
trusted library allocation
page read and write
248BB1DA000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB9F4000
trusted library allocation
page read and write
248C5281000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12AE000
heap
page read and write
248C371B000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B12B3000
heap
page read and write
248B1294000
heap
page read and write
248BB488000
trusted library allocation
page read and write
19F83469000
heap
page read and write
248B12AB000
heap
page read and write
248B1304000
heap
page read and write
248C2E50000
trusted library allocation
page read and write
248C2E79000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248BD781000
trusted library allocation
page read and write
248C23F5000
trusted library allocation
page read and write
248C27E1000
trusted library allocation
page read and write
248ABE33000
heap
page read and write
248BDC95000
trusted library allocation
page read and write
248C272D000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C4C45000
heap
page read and write
1F11FD47000
heap
page read and write
248B12F4000
heap
page read and write
248B63DB000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248B7C8E000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248B12A2000
heap
page read and write
248C37A8000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BB467000
trusted library allocation
page read and write
248B783C000
trusted library allocation
page read and write
248C37F3000
trusted library allocation
page read and write
248C29BB000
trusted library allocation
page read and write
248C2978000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248C29FA000
trusted library allocation
page read and write
248C2985000
trusted library allocation
page read and write
248C3543000
trusted library allocation
page read and write
248C2660000
trusted library allocation
page read and write
248BA451000
trusted library allocation
page read and write
248BB906000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248B75EB000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248B12BF000
heap
page read and write
1F120082000
trusted library allocation
page read and write
248C2E10000
trusted library allocation
page read and write
248B78CF000
trusted library allocation
page read and write
248BCBDD000
trusted library allocation
page read and write
248BB18E000
trusted library allocation
page read and write
248BB9DE000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
6EE25FE000
unkown
page readonly
248B12C9000
heap
page read and write
248C25A9000
trusted library allocation
page read and write
248C2988000
trusted library allocation
page read and write
A8F747D000
stack
page read and write
248BB244000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BBFB2000
trusted library allocation
page read and write
248ABE29000
heap
page read and write
248C29A1000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C526C000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248BBAB0000
trusted library allocation
page read and write
248BD7F8000
trusted library allocation
page read and write
1F11FE50000
unclassified section
page readonly
248B12BA000
heap
page read and write
248B12A3000
heap
page read and write
248C297A000
trusted library allocation
page read and write
248BBAE0000
trusted library allocation
page read and write
248B12AC000
heap
page read and write
248C5A68000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BB78A000
trusted library allocation
page read and write
248C2751000
trusted library allocation
page read and write
248B12BE000
heap
page read and write
248C35F8000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C6404000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B129B000
heap
page read and write
248C269B000
trusted library allocation
page read and write
248BAB7B000
trusted library allocation
page read and write
248C2EEC000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248C35A0000
trusted library allocation
page read and write
248C3DC8000
trusted library allocation
page read and write
248C2990000
trusted library allocation
page read and write
248C35AE000
trusted library allocation
page read and write
19F834E0000
heap
page read and write
248BDC72000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B75BE000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B7C8C000
trusted library allocation
page read and write
248BB9FD000
trusted library allocation
page read and write
248C371D000
trusted library allocation
page read and write
248BB17D000
trusted library allocation
page read and write
248C35FE000
trusted library allocation
page read and write
248C3913000
trusted library allocation
page read and write
27FC960A000
trusted library allocation
page read and write
248BABD9000
trusted library allocation
page read and write
248B12FD000
heap
page read and write
248C2990000
trusted library allocation
page read and write
248C3907000
trusted library allocation
page read and write
248C2379000
trusted library allocation
page read and write
248C248C000
trusted library allocation
page read and write
248C5A61000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BBFF2000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12BD000
heap
page read and write
19F82936000
unkown
page execute read
248C5B04000
trusted library allocation
page read and write
248BB2AC000
trusted library allocation
page read and write
248C5ADB000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
1F11FB50000
heap
page read and write
248C5A55000
trusted library allocation
page read and write
248BBAD1000
trusted library allocation
page read and write
248C29F5000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248B129B000
heap
page read and write
248BB2FA000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248B12A1000
heap
page read and write
248C5EA7000
trusted library allocation
page read and write
248BB1C3000
trusted library allocation
page read and write
248C3DC5000
trusted library allocation
page read and write
248BD7C7000
trusted library allocation
page read and write
1FF617A6000
heap
page read and write
248BB6B3000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248C3523000
trusted library allocation
page read and write
248BC581000
trusted library allocation
page read and write
248BB964000
trusted library allocation
page read and write
1E792131000
trusted library allocation
page execute read
248B12AB000
heap
page read and write
248C583F000
trusted library allocation
page read and write
248BCB2C000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BDCE3000
trusted library allocation
page read and write
248BB6BC000
trusted library allocation
page read and write
248BB1AD000
trusted library allocation
page read and write
248C35F2000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BCB56000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B12C2000
heap
page read and write
248B129B000
heap
page read and write
248C552B000
trusted library allocation
page read and write
248BB918000
trusted library allocation
page read and write
248C2232000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248B12B4000
heap
page read and write
248C27E6000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248C3553000
trusted library allocation
page read and write
248BBF41000
trusted library allocation
page read and write
248BA1AC000
trusted library allocation
page read and write
248BBAF9000
trusted library allocation
page read and write
248BB9A8000
trusted library allocation
page read and write
248BBA71000
trusted library allocation
page read and write
B8553FF000
stack
page read and write
248BB65F000
trusted library allocation
page read and write
77211FE000
stack
page read and write
248B1275000
heap
page read and write
248B7838000
trusted library allocation
page read and write
1B7D000
stack
page read and write
248B1295000
heap
page read and write
248BCDBB000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BDCE7000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C29F1000
trusted library allocation
page read and write
19F82F50000
heap
page read and write
248BB2FE000
trusted library allocation
page read and write
248BDCE1000
trusted library allocation
page read and write
248C6358000
trusted library allocation
page read and write
248BDCD7000
trusted library allocation
page read and write
248BE8CA000
trusted library allocation
page read and write
3FF0000
heap
page read and write
248BCBA5000
trusted library allocation
page read and write
248BDCB7000
trusted library allocation
page read and write
248C5281000
trusted library allocation
page read and write
248BB6E5000
trusted library allocation
page read and write
248B9DDB000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248C55FE000
trusted library allocation
page read and write
248B12BC000
heap
page read and write
248B12F4000
heap
page read and write
248BB2FA000
trusted library allocation
page read and write
1E7920C1000
trusted library allocation
page execute read
248B12F4000
heap
page read and write
248C354D000
trusted library allocation
page read and write
248C5E67000
trusted library allocation
page read and write
248C3DC8000
trusted library allocation
page read and write
1F11FCC2000
unclassified section
page read and write
248BB470000
trusted library allocation
page read and write
248C297D000
trusted library allocation
page read and write
248C5288000
trusted library allocation
page read and write
248B130E000
heap
page read and write
248B1304000
heap
page read and write
248B12EB000
heap
page read and write
248B1295000
heap
page read and write
248B12C9000
heap
page read and write
248C2EC8000
trusted library allocation
page read and write
248BB5C9000
trusted library allocation
page read and write
248BBAE7000
trusted library allocation
page read and write
248C2544000
trusted library allocation
page read and write
248BE198000
trusted library allocation
page read and write
1F11FAA0000
unclassified section
page readonly
248B12A5000
heap
page read and write
248C37EB000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
19F83558000
heap
page read and write
248C4ECA000
trusted library allocation
page read and write
77221FE000
stack
page read and write
248B12D5000
heap
page read and write
248C68B6000
trusted library allocation
page read and write
248BB256000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248BB69A000
trusted library allocation
page read and write
248B622F000
trusted library allocation
page read and write
248BB22A000
trusted library allocation
page read and write
248BB9AC000
trusted library allocation
page read and write
248B7C66000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248B12FC000
heap
page read and write
248B12BB000
heap
page read and write
248C5A76000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B7AF2000
heap
page read and write
19F83409000
heap
page read and write
248C2511000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12B3000
heap
page read and write
248BDCF0000
trusted library allocation
page read and write
248C37A3000
trusted library allocation
page read and write
248C2717000
trusted library allocation
page read and write
19F82823000
trusted library allocation
page read and write
248C5B6A000
trusted library allocation
page read and write
248C3718000
trusted library allocation
page read and write
248B12BA000
heap
page read and write
248BDCE1000
trusted library allocation
page read and write
248C58E3000
trusted library allocation
page read and write
248C43FD000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B12B4000
heap
page read and write
248B12EB000
heap
page read and write
772087E000
unkown
page readonly
248C55E4000
trusted library allocation
page read and write
248C3D26000
trusted library allocation
page read and write
248B12AD000
heap
page read and write
248BDCD7000
trusted library allocation
page read and write
248B5C90000
trusted library allocation
page read and write
248B1295000
heap
page read and write
19F825D0000
heap
page read and write
248C439C000
trusted library allocation
page read and write
248C29DA000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248BE904000
trusted library allocation
page read and write
248C2EE9000
trusted library allocation
page read and write
248BDCA8000
trusted library allocation
page read and write
19F824A8000
remote allocation
page execute read
248B9F00000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BECA3000
trusted library allocation
page read and write
248C5806000
trusted library allocation
page read and write
248BBFBA000
trusted library allocation
page read and write
248BB467000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C2662000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C37CA000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
1F120030000
trusted library allocation
page read and write
248C2EEC000
trusted library allocation
page read and write
19F8352A000
heap
page read and write
248BDCC7000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248C27C1000
trusted library allocation
page read and write
248C35C7000
trusted library allocation
page read and write
248BB30D000
trusted library allocation
page read and write
248C37EB000
trusted library allocation
page read and write
248C237D000
trusted library allocation
page read and write
248BABD2000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248B12A2000
heap
page read and write
248B7863000
trusted library allocation
page read and write
248C3D9D000
trusted library allocation
page read and write
248B7461000
trusted library allocation
page read and write
248C2962000
trusted library allocation
page read and write
248BC392000
trusted library allocation
page read and write
248BDCCA000
trusted library allocation
page read and write
248C6A04000
trusted library allocation
page read and write
248B129C000
heap
page read and write
248B12FC000
heap
page read and write
248C2671000
trusted library allocation
page read and write
248BA4C5000
trusted library allocation
page read and write
248BB617000
trusted library allocation
page read and write
248BA180000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B1294000
heap
page read and write
248BA06D000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248C278E000
trusted library allocation
page read and write
248C265D000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BB281000
trusted library allocation
page read and write
248C24F7000
trusted library allocation
page read and write
248BB697000
trusted library allocation
page read and write
248BB24F000
trusted library allocation
page read and write
19F824D0000
heap
page read and write
248C552E000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248BB23C000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248BB23C000
trusted library allocation
page read and write
248C5A0E000
trusted library allocation
page read and write
248B72EE000
trusted library allocation
page read and write
248BB252000
trusted library allocation
page read and write
248C4C6A000
heap
page read and write
19F82910000
trusted library allocation
page read and write
248C29D1000
trusted library allocation
page read and write
248C29E0000
trusted library allocation
page read and write
248BABCE000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C353F000
trusted library allocation
page read and write
248C299C000
trusted library allocation
page read and write
248BBFEC000
trusted library allocation
page read and write
19F828E9000
trusted library allocation
page read and write
248B72C7000
trusted library allocation
page read and write
248C4EB1000
trusted library allocation
page read and write
248BA1E5000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248B12C9000
heap
page read and write
248B12EB000
heap
page read and write
248C35D4000
trusted library allocation
page read and write
19F82DF0000
heap
page read and write
248C3AC7000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BD7B1000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C43F0000
trusted library allocation
page read and write
248C58DD000
trusted library allocation
page read and write
19F82984000
heap
page read and write
248B12B9000
heap
page read and write
248BE7D9000
trusted library allocation
page read and write
248C522E000
trusted library allocation
page read and write
248C27E4000
trusted library allocation
page read and write
248BA1E1000
trusted library allocation
page read and write
248BA490000
trusted library allocation
page read and write
248C35F2000
trusted library allocation
page read and write
248BB6D1000
trusted library allocation
page read and write
248C3513000
trusted library allocation
page read and write
248BC491000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
27FC9453000
heap
page read and write
248BBA2A000
trusted library allocation
page read and write
248BB80B000
trusted library allocation
page read and write
248C5872000
trusted library allocation
page read and write
248C2724000
trusted library allocation
page read and write
248BBF5C000
trusted library allocation
page read and write
BF0000
heap
page read and write
248B129B000
heap
page read and write
248C274B000
trusted library allocation
page read and write
248C35B6000
trusted library allocation
page read and write
248BDC59000
trusted library allocation
page read and write
19F8352D000
heap
page read and write
248C2983000
trusted library allocation
page read and write
248C37CA000
trusted library allocation
page read and write
248C37B2000
trusted library allocation
page read and write
248C2E24000
trusted library allocation
page read and write
248BABD7000
trusted library allocation
page read and write
248BB5A1000
trusted library allocation
page read and write
248C2353000
trusted library allocation
page read and write
248C35FE000
trusted library allocation
page read and write
248BA19A000
trusted library allocation
page read and write
248BB1A9000
trusted library allocation
page read and write
248BC3F4000
trusted library allocation
page read and write
248C2335000
trusted library allocation
page read and write
1334000
heap
page read and write
248B754D000
trusted library allocation
page read and write
21564600000
heap
page read and write
248BB1D6000
trusted library allocation
page read and write
248BB78A000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248B7CCE000
trusted library allocation
page read and write
248C29DC000
trusted library allocation
page read and write
248C3538000
trusted library allocation
page read and write
248BB968000
trusted library allocation
page read and write
248C5281000
trusted library allocation
page read and write
248C236C000
trusted library allocation
page read and write
248B72C7000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12C5000
heap
page read and write
248B5CC8000
trusted library allocation
page read and write
248C482D000
trusted library allocation
page read and write
1FF5FC1C000
heap
page read and write
248BB165000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248C371B000
trusted library allocation
page read and write
19F8289F000
trusted library allocation
page read and write
248C29ED000
trusted library allocation
page read and write
248BA457000
trusted library allocation
page read and write
248C35D6000
trusted library allocation
page read and write
248C5A36000
trusted library allocation
page read and write
248B1306000
heap
page read and write
248C5B3B000
trusted library allocation
page read and write
248B7AB0000
heap
page read and write
248B12A1000
heap
page read and write
248B1295000
heap
page read and write
248B7CA5000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
21564724000
heap
page read and write
248B12A2000
heap
page read and write
248C525A000
trusted library allocation
page read and write
248C29EB000
trusted library allocation
page read and write
248BA1DE000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248BB18B000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248C3D7F000
trusted library allocation
page read and write
248B12C5000
heap
page read and write
248C35FD000
trusted library allocation
page read and write
248C2E6D000
trusted library allocation
page read and write
248C58E1000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248B12A1000
heap
page read and write
248C2ED8000
trusted library allocation
page read and write
248BA1CB000
trusted library allocation
page read and write
248B12AC000
heap
page read and write
248C526E000
trusted library allocation
page read and write
248BB96A000
trusted library allocation
page read and write
248C231E000
trusted library allocation
page read and write
248BA1F5000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248B12F4000
heap
page read and write
248C27EF000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248C52EE000
trusted library allocation
page read and write
248C4C7E000
heap
page read and write
248B1294000
heap
page read and write
248B12C9000
heap
page read and write
248C37A3000
trusted library allocation
page read and write
248C2966000
trusted library allocation
page read and write
248C25A2000
trusted library allocation
page read and write
248C295E000
trusted library allocation
page read and write
248ABE19000
heap
page read and write
248C27D0000
trusted library allocation
page read and write
248BA1AF000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248C2EF8000
trusted library allocation
page read and write
248ABE29000
heap
page read and write
248BB8D7000
trusted library allocation
page read and write
248BCBA7000
trusted library allocation
page read and write
248C2E80000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248BBA3F000
trusted library allocation
page read and write
248C5288000
trusted library allocation
page read and write
248C2E57000
trusted library allocation
page read and write
248BB782000
trusted library allocation
page read and write
248C4D89000
heap
page read and write
248C2EE9000
trusted library allocation
page read and write
248BB18E000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248C2666000
trusted library allocation
page read and write
248C354C000
trusted library allocation
page read and write
248BB9A3000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248C4D86000
heap
page read and write
248B12F4000
heap
page read and write
248B7638000
trusted library allocation
page read and write
248B1307000
heap
page read and write
248B12EB000
heap
page read and write
248B12EB000
heap
page read and write
248C2EEC000
trusted library allocation
page read and write
248C2E5D000
trusted library allocation
page read and write
248BB248000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
19F83577000
heap
page read and write
248B12AB000
heap
page read and write
248C292D000
trusted library allocation
page read and write
248C27DC000
trusted library allocation
page read and write
248BB9F0000
trusted library allocation
page read and write
248B12ED000
heap
page read and write
248C3517000
trusted library allocation
page read and write
248B9D13000
trusted library allocation
page read and write
248C35D4000
trusted library allocation
page read and write
248C5AB7000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248B12FC000
heap
page read and write
248C52EE000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C2EB7000
trusted library allocation
page read and write
19F8285C000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C4C01000
heap
page read and write
248BB2FE000
trusted library allocation
page read and write
248BBA0A000
trusted library allocation
page read and write
248C3782000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C3787000
trusted library allocation
page read and write
248BABFC000
trusted library allocation
page read and write
248C2EF3000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B12D5000
heap
page read and write
19F83300000
trusted library allocation
page read and write
248BBF80000
trusted library allocation
page read and write
248C2E5D000
trusted library allocation
page read and write
772093E000
stack
page read and write
248BB82B000
trusted library allocation
page read and write
248C24ED000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248B12FD000
heap
page read and write
248B12AB000
heap
page read and write
248B12A5000
heap
page read and write
248C2617000
trusted library allocation
page read and write
248BA1B0000
trusted library allocation
page read and write
248C5A61000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C58DB000
trusted library allocation
page read and write
248BB697000
trusted library allocation
page read and write
248C27E6000
trusted library allocation
page read and write
248BA4CE000
trusted library allocation
page read and write
248B1283000
heap
page read and write
248C2878000
trusted library allocation
page read and write
248BDCD1000
trusted library allocation
page read and write
248B75DC000
trusted library allocation
page read and write
19F83568000
heap
page read and write
248B1294000
heap
page read and write
248C2EF4000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB97F000
trusted library allocation
page read and write
19F834E6000
heap
page read and write
248BC550000
trusted library allocation
page read and write
248C27CC000
trusted library allocation
page read and write
248C523A000
trusted library allocation
page read and write
248C43F0000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B12AA000
heap
page read and write
248B12EB000
heap
page read and write
248C3782000
trusted library allocation
page read and write
248BB18B000
trusted library allocation
page read and write
248C2981000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12D5000
heap
page read and write
248B1275000
heap
page read and write
248C3538000
trusted library allocation
page read and write
248C27A9000
trusted library allocation
page read and write
248B1285000
heap
page read and write
248BDC95000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248C58E5000
trusted library allocation
page read and write
248BC4A4000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
19F8282F000
trusted library allocation
page read and write
248BB9A8000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BB830000
trusted library allocation
page read and write
248B1286000
heap
page read and write
248BC5D9000
trusted library allocation
page read and write
248C5552000
trusted library allocation
page read and write
248B1273000
heap
page read and write
248BB8FD000
trusted library allocation
page read and write
248C37F7000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BB914000
trusted library allocation
page read and write
248C29E8000
trusted library allocation
page read and write
248C4D16000
heap
page read and write
27FC9449000
heap
page read and write
248C2823000
trusted library allocation
page read and write
248C29EB000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248C3554000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248C35A4000
trusted library allocation
page read and write
237E000
stack
page read and write
248C580B000
trusted library allocation
page read and write
248C29AD000
trusted library allocation
page read and write
1F12000C000
trusted library allocation
page read and write
248B756E000
trusted library allocation
page read and write
248BD7FD000
trusted library allocation
page read and write
248BB943000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B12C4000
heap
page read and write
248B75DD000
trusted library allocation
page read and write
248C353C000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BE85C000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
248B12C4000
heap
page read and write
248B1304000
heap
page read and write
248B12B3000
heap
page read and write
248BBF37000
trusted library allocation
page read and write
248BB97F000
trusted library allocation
page read and write
248C52EC000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C6461000
trusted library allocation
page read and write
248BB217000
trusted library allocation
page read and write
1FF5FF00000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B1295000
heap
page read and write
248B128D000
heap
page read and write
248BA07B000
trusted library allocation
page read and write
248B747D000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248C2E9D000
trusted library allocation
page read and write
248C37EB000
trusted library allocation
page read and write
248BE178000
trusted library allocation
page read and write
248C2522000
trusted library allocation
page read and write
248B7ABA000
heap
page read and write
2156495D000
trusted library allocation
page read and write
248BDC2C000
trusted library allocation
page read and write
248C56B4000
trusted library allocation
page read and write
248BABD0000
trusted library allocation
page read and write
19F83577000
heap
page read and write
248C3533000
trusted library allocation
page read and write
248BBF79000
trusted library allocation
page read and write
248C43D6000
trusted library allocation
page read and write
248BD7CA000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248B12A3000
heap
page read and write
A8F8CBE000
stack
page read and write
248BBA66000
trusted library allocation
page read and write
248C5EE7000
trusted library allocation
page read and write
248BB8A6000
trusted library allocation
page read and write
248C3DC5000
trusted library allocation
page read and write
248C355F000
trusted library allocation
page read and write
248C237D000
trusted library allocation
page read and write
248BCB14000
trusted library allocation
page read and write
248BB609000
trusted library allocation
page read and write
248BB772000
trusted library allocation
page read and write
248C394D000
trusted library allocation
page read and write
248C2EF3000
trusted library allocation
page read and write
248B7C55000
trusted library allocation
page read and write
248C375C000
trusted library allocation
page read and write
248C3D7F000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248BB34E000
trusted library allocation
page read and write
248C2734000
trusted library allocation
page read and write
248C286F000
trusted library allocation
page read and write
248C4D16000
heap
page read and write
248BB337000
trusted library allocation
page read and write
248B9D9F000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248B1294000
heap
page read and write
248C29AB000
trusted library allocation
page read and write
248BB629000
trusted library allocation
page read and write
248B7AB0000
heap
page read and write
1F1200F4000
trusted library allocation
page read and write
248BA1E5000
trusted library allocation
page read and write
248C5288000
trusted library allocation
page read and write
248B1283000
heap
page read and write
248C2E9D000
trusted library allocation
page read and write
19F8346C000
heap
page read and write
248B759D000
trusted library allocation
page read and write
248BB1C3000
trusted library allocation
page read and write
248C35B3000
trusted library allocation
page read and write
248B74A8000
trusted library allocation
page read and write
248C2671000
trusted library allocation
page read and write
248BDCD5000
trusted library allocation
page read and write
248C2999000
trusted library allocation
page read and write
248C2E5F000
trusted library allocation
page read and write
248B12C2000
heap
page read and write
248BA4D8000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12BD000
heap
page read and write
248BDC9F000
trusted library allocation
page read and write
248C2E69000
trusted library allocation
page read and write
248BB778000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BB94C000
trusted library allocation
page read and write
248C4C3F000
heap
page read and write
248B12AE000
heap
page read and write
248C25A2000
trusted library allocation
page read and write
248C2EE9000
trusted library allocation
page read and write
248C5A5D000
trusted library allocation
page read and write
248B753E000
trusted library allocation
page read and write
248C2582000
trusted library allocation
page read and write
248BB38D000
trusted library allocation
page read and write
248C2706000
trusted library allocation
page read and write
1334000
heap
page read and write
248C4840000
trusted library allocation
page read and write
A8F511E000
unkown
page readonly
248C27FB000
trusted library allocation
page read and write
248BB948000
trusted library allocation
page read and write
248BB6E5000
trusted library allocation
page read and write
248BABFC000
trusted library allocation
page read and write
248BD773000
trusted library allocation
page read and write
248BB358000
trusted library allocation
page read and write
19F83460000
heap
page read and write
248BB5AD000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248B12A5000
heap
page read and write
248C68D9000
trusted library allocation
page read and write
248C374F000
trusted library allocation
page read and write
248BCB8B000
trusted library allocation
page read and write
248BB9DE000
trusted library allocation
page read and write
248BBF9E000
trusted library allocation
page read and write
1388000
heap
page read and write
248B128D000
heap
page read and write
248B129B000
heap
page read and write
248BABC2000
trusted library allocation
page read and write
248B1304000
heap
page read and write
248BB1D1000
trusted library allocation
page read and write
248B7542000
trusted library allocation
page read and write
21564B00000
trusted library allocation
page read and write
19F8349C000
heap
page read and write
248B7635000
trusted library allocation
page read and write
248C2786000
trusted library allocation
page read and write
248BA1F3000
trusted library allocation
page read and write
248BA1C3000
trusted library allocation
page read and write
248C43B9000
trusted library allocation
page read and write
248BB2FA000
trusted library allocation
page read and write
248B12ED000
heap
page read and write
248C25DD000
trusted library allocation
page read and write
248BB2AC000
trusted library allocation
page read and write
248BA1E1000
trusted library allocation
page read and write
248BB4B9000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248C356B000
trusted library allocation
page read and write
248B12AC000
heap
page read and write
248BA412000
trusted library allocation
page read and write
1F12005F000
trusted library allocation
page read and write
248C529E000
trusted library allocation
page read and write
248B9DDC000
trusted library allocation
page read and write
248B12B3000
heap
page read and write
248B127B000
heap
page read and write
248B12A5000
heap
page read and write
248BBFB2000
trusted library allocation
page read and write
19F834F1000
heap
page read and write
248C2D09000
trusted library allocation
page read and write
248C43BD000
trusted library allocation
page read and write
248BA091000
trusted library allocation
page read and write
6EE467E000
unkown
page readonly
248C582E000
trusted library allocation
page read and write
248B74C5000
trusted library allocation
page read and write
248C52CD000
trusted library allocation
page read and write
248C2EDD000
trusted library allocation
page read and write
19F82926000
unkown
page execute read
248BB94C000
trusted library allocation
page read and write
248C3726000
trusted library allocation
page read and write
248BB9B1000
trusted library allocation
page read and write
248BDC7A000
trusted library allocation
page read and write
1F11FD10000
heap
page read and write
248B12A2000
heap
page read and write
248C24A9000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248BB98A000
trusted library allocation
page read and write
248B1302000
heap
page read and write
3FF1000
heap
page read and write
1F120100000
trusted library allocation
page read and write
19F828F3000
trusted library allocation
page read and write
248BB2D3000
trusted library allocation
page read and write
248B5CDF000
trusted library allocation
page read and write
248B12BA000
heap
page read and write
248BABCC000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248BB9BD000
trusted library allocation
page read and write
248BB7FE000
trusted library allocation
page read and write
248C2E10000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B7512000
trusted library allocation
page read and write
248BD70B000
trusted library allocation
page read and write
248B7839000
trusted library allocation
page read and write
248BB642000
trusted library allocation
page read and write
248C2DF8000
trusted library allocation
page read and write
248BB8CB000
trusted library allocation
page read and write
248C2999000
trusted library allocation
page read and write
248BDCE1000
trusted library allocation
page read and write
248BB7B5000
trusted library allocation
page read and write
248C266F000
trusted library allocation
page read and write
248C52EC000
trusted library allocation
page read and write
248BB9E4000
trusted library allocation
page read and write
248B12FE000
heap
page read and write
248BE8B4000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BE859000
trusted library allocation
page read and write
248C5237000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C58E3000
trusted library allocation
page read and write
248C3AA0000
trusted library allocation
page read and write
248BC49A000
trusted library allocation
page read and write
248BBFE4000
trusted library allocation
page read and write
248C68B1000
trusted library allocation
page read and write
248BDCDD000
trusted library allocation
page read and write
1F11FB10000
remote allocation
page read and write
19F83577000
heap
page read and write
1334000
heap
page read and write
248C529E000
trusted library allocation
page read and write
248BBFE4000
trusted library allocation
page read and write
248B75C1000
trusted library allocation
page read and write
248BB792000
trusted library allocation
page read and write
248BB3F8000
trusted library allocation
page read and write
248C268F000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BA1C5000
trusted library allocation
page read and write
248B78F4000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248B12AB000
heap
page read and write
19F83558000
heap
page read and write
248ABE19000
heap
page read and write
248BDCD7000
trusted library allocation
page read and write
248C5565000
trusted library allocation
page read and write
772097E000
unkown
page readonly
19F82E12000
heap
page read and write
248C3AEF000
trusted library allocation
page read and write
248C555A000
trusted library allocation
page read and write
248C3D86000
trusted library allocation
page read and write
1F12005D000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248B72C3000
trusted library allocation
page read and write
248C5B83000
trusted library allocation
page read and write
248B12C6000
heap
page read and write
248C5806000
trusted library allocation
page read and write
248C3795000
trusted library allocation
page read and write
1F12020C000
trusted library allocation
page read and write
248BD762000
trusted library allocation
page read and write
248C587A000
trusted library allocation
page read and write
248C3553000
trusted library allocation
page read and write
248C27BB000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B1275000
heap
page read and write
248BABC2000
trusted library allocation
page read and write
248C3565000
trusted library allocation
page read and write
248BB242000
trusted library allocation
page read and write
248BDCCA000
trusted library allocation
page read and write
248BC455000
trusted library allocation
page read and write
248BBA4B000
trusted library allocation
page read and write
21564900000
trusted library allocation
page read and write
248C27EA000
trusted library allocation
page read and write
248BA422000
trusted library allocation
page read and write
248BD79F000
trusted library allocation
page read and write
248BBFE4000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C3787000
trusted library allocation
page read and write
248B128E000
heap
page read and write
248BB9E4000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BE1E3000
trusted library allocation
page read and write
248B12B4000
heap
page read and write
248BE924000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BDCD7000
trusted library allocation
page read and write
248BA1E5000
trusted library allocation
page read and write
248B74D7000
trusted library allocation
page read and write
248C2EE4000
trusted library allocation
page read and write
248C2EA4000
trusted library allocation
page read and write
248C52AB000
trusted library allocation
page read and write
248BBF4A000
trusted library allocation
page read and write
248BA1E1000
trusted library allocation
page read and write
248C2638000
trusted library allocation
page read and write
248C5A36000
trusted library allocation
page read and write
248BB505000
trusted library allocation
page read and write
248BCDF4000
trusted library allocation
page read and write
248BD835000
trusted library allocation
page read and write
248C5A0E000
trusted library allocation
page read and write
215649C8000
trusted library allocation
page read and write
248C556D000
trusted library allocation
page read and write
19F8352A000
heap
page read and write
248B7CCE000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248B7ADE000
heap
page read and write
248C2775000
trusted library allocation
page read and write
248BA1CB000
trusted library allocation
page read and write
1FF5FC1D000
heap
page read and write
248BB9C9000
trusted library allocation
page read and write
248C4CE1000
heap
page read and write
248B5CBF000
trusted library allocation
page read and write
248C29DA000
trusted library allocation
page read and write
248C525A000
trusted library allocation
page read and write
248BB599000
trusted library allocation
page read and write
248BB263000
trusted library allocation
page read and write
248C5876000
trusted library allocation
page read and write
248B7833000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248BB98A000
trusted library allocation
page read and write
19F83522000
heap
page read and write
248BB891000
trusted library allocation
page read and write
248C354C000
trusted library allocation
page read and write
1320000
heap
page read and write
248B12A1000
heap
page read and write
248BB4D5000
trusted library allocation
page read and write
248BB939000
trusted library allocation
page read and write
248C55CC000
trusted library allocation
page read and write
248C6A01000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
248BB972000
trusted library allocation
page read and write
248C5E17000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12C9000
heap
page read and write
248BABCE000
trusted library allocation
page read and write
248C27E4000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248BABC2000
trusted library allocation
page read and write
248C6A24000
trusted library allocation
page read and write
248B74B4000
trusted library allocation
page read and write
248BB78F000
trusted library allocation
page read and write
248BD7EC000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BB9CD000
trusted library allocation
page read and write
19F83460000
heap
page read and write
248BABD2000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C355F000
trusted library allocation
page read and write
248B721F000
trusted library allocation
page read and write
19F8347D000
heap
page read and write
248C2591000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12A0000
heap
page read and write
248BD8E2000
trusted library allocation
page read and write
13AB000
heap
page read and write
248B12B0000
heap
page read and write
248C2EA4000
trusted library allocation
page read and write
248C2EE9000
trusted library allocation
page read and write
248B1275000
heap
page read and write
248B12BD000
heap
page read and write
248C2DED000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248C35AA000
trusted library allocation
page read and write
248C37CA000
trusted library allocation
page read and write
248BDC92000
trusted library allocation
page read and write
248C2666000
trusted library allocation
page read and write
248B75AA000
trusted library allocation
page read and write
248C69F9000
trusted library allocation
page read and write
248C6966000
trusted library allocation
page read and write
248B128D000
heap
page read and write
248BB47B000
trusted library allocation
page read and write
248C43DA000
trusted library allocation
page read and write
21564910000
trusted library allocation
page read and write
248BA0B6000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248C4C0B000
heap
page read and write
248C29B1000
trusted library allocation
page read and write
19F8285F000
trusted library allocation
page read and write
248C3538000
trusted library allocation
page read and write
1FF617B8000
heap
page read and write
21564A00000
unclassified section
page readonly
248B12C9000
heap
page read and write
248BCD8B000
trusted library allocation
page read and write
248B7C77000
trusted library allocation
page read and write
248BB1C0000
trusted library allocation
page read and write
248B9D62000
trusted library allocation
page read and write
248C29F5000
trusted library allocation
page read and write
248B7C9E000
trusted library allocation
page read and write
248C56A2000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C25A2000
trusted library allocation
page read and write
248C27FB000
trusted library allocation
page read and write
248C2322000
trusted library allocation
page read and write
248B130E000
heap
page read and write
248B1295000
heap
page read and write
248BCBA7000
trusted library allocation
page read and write
248BB811000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C6989000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
19F83559000
heap
page read and write
248BCC86000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248C43C8000
trusted library allocation
page read and write
248B12BD000
heap
page read and write
248B12F4000
heap
page read and write
248C257E000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B12A5000
heap
page read and write
248C3727000
trusted library allocation
page read and write
248BC6DF000
trusted library allocation
page read and write
248B75EB000
trusted library allocation
page read and write
248B129C000
heap
page read and write
248C69CA000
trusted library allocation
page read and write
248B127B000
heap
page read and write
248B127E000
heap
page read and write
248C29ED000
trusted library allocation
page read and write
248B78F4000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BAB96000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BB911000
trusted library allocation
page read and write
248C37A8000
trusted library allocation
page read and write
19F83579000
heap
page read and write
248BB28A000
trusted library allocation
page read and write
21564972000
trusted library allocation
page read and write
248BBA60000
trusted library allocation
page read and write
19F8348A000
heap
page read and write
248BD79C000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248B1295000
heap
page read and write
248BB18E000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248C37F8000
trusted library allocation
page read and write
1F11FCB0000
heap
page readonly
248B12C9000
heap
page read and write
248B9D5B000
trusted library allocation
page read and write
248BABFC000
trusted library allocation
page read and write
27FC9270000
heap
page read and write
248C2353000
trusted library allocation
page read and write
248C2E70000
trusted library allocation
page read and write
248BB17F000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BA1F3000
trusted library allocation
page read and write
248C27AD000
trusted library allocation
page read and write
248BCCD2000
trusted library allocation
page read and write
248BABB6000
trusted library allocation
page read and write
1F11FC40000
heap
page read and write
248B12F4000
heap
page read and write
248C4DC1000
trusted library allocation
page read and write
248BABD9000
trusted library allocation
page read and write
248C2EEC000
trusted library allocation
page read and write
248BDCB0000
trusted library allocation
page read and write
248B1294000
heap
page read and write
248BB1FE000
trusted library allocation
page read and write
248BB1A1000
trusted library allocation
page read and write
248C249D000
trusted library allocation
page read and write
248BB228000
trusted library allocation
page read and write
248BB230000
trusted library allocation
page read and write
248BB9D3000
trusted library allocation
page read and write
248C3D36000
trusted library allocation
page read and write
248BBA3A000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248C43C8000
trusted library allocation
page read and write
248BDCE3000
trusted library allocation
page read and write
248C2EA0000
trusted library allocation
page read and write
248BB46E000
trusted library allocation
page read and write
248BB6F0000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
21564974000
trusted library allocation
page read and write
248BB6A8000
trusted library allocation
page read and write
248BB2FA000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B1295000
heap
page read and write
248BB9F0000
trusted library allocation
page read and write
248C27DC000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248C2478000
trusted library allocation
page read and write
248C2795000
trusted library allocation
page read and write
248BA1EA000
trusted library allocation
page read and write
248C69FC000
trusted library allocation
page read and write
1334000
heap
page read and write
248C5225000
trusted library allocation
page read and write
248C4F01000
trusted library allocation
page read and write
248BA437000
trusted library allocation
page read and write
248BD8A3000
trusted library allocation
page read and write
248B127E000
heap
page read and write
248C3929000
trusted library allocation
page read and write
248BB13D000
trusted library allocation
page read and write
248B9D10000
trusted library allocation
page read and write
248B1304000
heap
page read and write
19F83463000
heap
page read and write
248C5A4B000
trusted library allocation
page read and write
248BC7D5000
trusted library allocation
page read and write
248B7AF2000
heap
page read and write
248BB9C9000
trusted library allocation
page read and write
248C35F3000
trusted library allocation
page read and write
248BCBB9000
trusted library allocation
page read and write
248B9D39000
trusted library allocation
page read and write
248C35B6000
trusted library allocation
page read and write
248BCB0D000
trusted library allocation
page read and write
248BBABB000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
248B1290000
heap
page read and write
248B1307000
heap
page read and write
248BCDBD000
trusted library allocation
page read and write
248C4384000
trusted library allocation
page read and write
248BC7C9000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B129A000
heap
page read and write
19F8347D000
heap
page read and write
248BA1CB000
trusted library allocation
page read and write
248C268D000
trusted library allocation
page read and write
248C274B000
trusted library allocation
page read and write
248C2E5F000
trusted library allocation
page read and write
248BB224000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12C9000
heap
page read and write
248C3784000
trusted library allocation
page read and write
248BBF51000
trusted library allocation
page read and write
248B12B9000
heap
page read and write
2520000
heap
page read and write
248BC800000
trusted library allocation
page read and write
248B12C5000
heap
page read and write
248BD79C000
trusted library allocation
page read and write
248B12A5000
heap
page read and write
19F82430000
unclassified section
page readonly
248BCBFB000
trusted library allocation
page read and write
248C2999000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
248BB121000
trusted library allocation
page read and write
248C55AC000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248BA4DA000
trusted library allocation
page read and write
248BC47F000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
1FF5FC13000
heap
page read and write
248B12D5000
heap
page read and write
248C3565000
trusted library allocation
page read and write
248C5565000
trusted library allocation
page read and write
13BF000
heap
page read and write
248C277A000
trusted library allocation
page read and write
248C4D63000
heap
page read and write
B855BFE000
stack
page read and write
248C439C000
trusted library allocation
page read and write
248BAC77000
trusted library allocation
page read and write
248BBF3C000
trusted library allocation
page read and write
248BB6AC000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BDCD5000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12B9000
heap
page read and write
248C4C01000
heap
page read and write
248BB28C000
trusted library allocation
page read and write
248BB906000
trusted library allocation
page read and write
248BA194000
trusted library allocation
page read and write
215649B9000
trusted library allocation
page read and write
248B12EB000
heap
page read and write
248BCB34000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248B12AB000
heap
page read and write
248BDCE1000
trusted library allocation
page read and write
248B7C82000
trusted library allocation
page read and write
248BB834000
trusted library allocation
page read and write
248B12B6000
heap
page read and write
1F7F000
stack
page read and write
248B729C000
trusted library allocation
page read and write
248BB96A000
trusted library allocation
page read and write
248B12AD000
heap
page read and write
248B128D000
heap
page read and write
248C392F000
trusted library allocation
page read and write
248C2E26000
trusted library allocation
page read and write
248B1297000
heap
page read and write
248C5540000
trusted library allocation
page read and write
248B12A3000
heap
page read and write
248BA4F5000
trusted library allocation
page read and write
248BDD02000
trusted library allocation
page read and write
248B7C9E000
trusted library allocation
page read and write
248B1295000
heap
page read and write
248B1275000
heap
page read and write
248C2EDF000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
248BB1D3000
trusted library allocation
page read and write
248B756C000
trusted library allocation
page read and write
248C5A6B000
trusted library allocation
page read and write
248B129C000
heap
page read and write
248B1295000
heap
page read and write
248C55CC000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB4B9000
trusted library allocation
page read and write
248B12AE000
heap
page read and write
248C35F2000
trusted library allocation
page read and write
248C35AA000
trusted library allocation
page read and write
248B12A1000
heap
page read and write
248BCDDC000
trusted library allocation
page read and write
248C4D6D000
heap
page read and write
248BBFC3000
trusted library allocation
page read and write
248BD8E2000
trusted library allocation
page read and write
248B1298000
heap
page read and write
248B12A3000
heap
page read and write
248B12AD000
heap
page read and write
248C2830000
trusted library allocation
page read and write
19F82861000
trusted library allocation
page read and write
19F82816000
trusted library allocation
page read and write
248BB339000
trusted library allocation
page read and write
248BB6CC000
trusted library allocation
page read and write
248C2DFC000
trusted library allocation
page read and write
248C5700000
trusted library allocation
page read and write
248BDBCD000
trusted library allocation
page read and write
27FC9380000
heap
page read and write
248C2EE4000
trusted library allocation
page read and write
248C37A3000
trusted library allocation
page read and write
248BB928000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
1F11FEE0000
heap
page read and write
248C2DF5000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12A5000
heap
page read and write
248B12BD000
heap
page read and write
248C52B6000
trusted library allocation
page read and write
248BB17F000
trusted library allocation
page read and write
248BB6A7000
trusted library allocation
page read and write
714000
unkown
page readonly
248BB193000
trusted library allocation
page read and write
19F834E8000
heap
page read and write
248BB193000
trusted library allocation
page read and write
248B12AA000
heap
page read and write
77208BD000
stack
page read and write
1F11FCC0000
unclassified section
page read and write
248B12F4000
heap
page read and write
248B12AD000
heap
page read and write
248BB751000
trusted library allocation
page read and write
248C3D09000
trusted library allocation
page read and write
248BA1D1000
trusted library allocation
page read and write
248B129B000
heap
page read and write
248BB2D9000
trusted library allocation
page read and write
248C2D2F000
trusted library allocation
page read and write
248B9DF2000
trusted library allocation
page read and write
248BC45F000
trusted library allocation
page read and write
248BA4F0000
trusted library allocation
page read and write
248BA4FA000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
1F12007C000
trusted library allocation
page read and write
6EE0BFE000
stack
page read and write
248C4F04000
trusted library allocation
page read and write
248BBF7B000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
248BB15A000
trusted library allocation
page read and write
248BCDFD000
trusted library allocation
page read and write
248B7CA5000
trusted library allocation
page read and write
248B72DD000
trusted library allocation
page read and write
13A7000
heap
page read and write
248BBA46000
trusted library allocation
page read and write
A8F515D000
stack
page read and write
248C2D4C000
trusted library allocation
page read and write
248B12D5000
heap
page read and write
B8563FF000
stack
page read and write
1334000
heap
page read and write
248B12A6000
heap
page read and write
248C2825000
trusted library allocation
page read and write
248BBF9C000
trusted library allocation
page read and write
248BC4B1000
trusted library allocation
page read and write
248BB17F000
trusted library allocation
page read and write
248C279D000
trusted library allocation
page read and write
248B631B000
trusted library allocation
page read and write
248BDCE7000
trusted library allocation
page read and write
248C2EEC000
trusted library allocation
page read and write
248BB20E000
trusted library allocation
page read and write
248B12FC000
heap
page read and write
248C2D15000
trusted library allocation
page read and write
248C4C5C000
heap
page read and write
248C27FB000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248B12EB000
heap
page read and write
248C237B000
trusted library allocation
page read and write
248C2EA4000
trusted library allocation
page read and write
248B12C9000
heap
page read and write
248BB911000
trusted library allocation
page read and write
248B12AA000
heap
page read and write
248BDC3C000
trusted library allocation
page read and write
248BB8AE000
trusted library allocation
page read and write
248C5268000
trusted library allocation
page read and write
248C2EFD000
trusted library allocation
page read and write
248BB6E5000
trusted library allocation
page read and write
248C3536000
trusted library allocation
page read and write
248C25C9000
trusted library allocation
page read and write
248B12A2000
heap
page read and write
248C3D9D000
trusted library allocation
page read and write
248BA09F000
trusted library allocation
page read and write
248C355A000
trusted library allocation
page read and write
248B12AB000
heap
page read and write
248BBF84000
trusted library allocation
page read and write
248C56F6000
trusted library allocation
page read and write
248B12F4000
heap
page read and write
There are 4070 hidden memdumps, click here to show them.