IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_583749b1-4fef-47bf-b3b8-0068aafd6966.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_583749b1-4fef-47bf-b3b8-0068aafd6966.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e43e39a0-cc16-484a-9b18-44609e3e176e} 5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224ca56e310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=948 -parentBuildID 20230927232528 -prefsHandle 4104 -prefMapHandle 4180 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28e99635-fe3b-45d9-8cee-0516a7b7dc3a} 5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224ca57d810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3948 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4532 -prefMapHandle 4540 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e63adc83-332e-472f-8367-08683521a553} 5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224dc47e510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.18.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
224E24AB000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224E27D3000
trusted library allocation
page read and write
224E3800000
trusted library allocation
page read and write
224DC390000
trusted library allocation
page read and write
224DBB5D000
trusted library allocation
page read and write
224E3ACF000
trusted library allocation
page read and write
3B90000
heap
page read and write
224E4D54000
trusted library allocation
page read and write
224E3746000
trusted library allocation
page read and write
20A2405F000
unclassified section
page read and write
224E26C8000
trusted library allocation
page read and write
224D73C7000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DC5D0000
trusted library allocation
page read and write
224DB8BF000
trusted library allocation
page read and write
1BA07119000
trusted library allocation
page read and write
224DAAF2000
trusted library allocation
page read and write
224DA5B4000
trusted library allocation
page read and write
2BBC3386000
trusted library allocation
page read and write
224DB945000
trusted library allocation
page read and write
224DB627000
trusted library allocation
page read and write
224E4DDD000
trusted library allocation
page read and write
224E2525000
trusted library allocation
page read and write
224DBB45000
trusted library allocation
page read and write
224DB647000
trusted library allocation
page read and write
224DA75B000
trusted library allocation
page read and write
224E29A0000
trusted library allocation
page read and write
224DB7D4000
trusted library allocation
page read and write
224E5B6A000
trusted library allocation
page read and write
224DDD87000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224E3AC9000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DA285000
heap
page read and write
224E23EC000
trusted library allocation
page read and write
224DBA51000
trusted library allocation
page read and write
224DAAFA000
trusted library allocation
page read and write
1FAB6A90000
heap
page read and write
224E24AF000
trusted library allocation
page read and write
224DC320000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E2E6F000
trusted library allocation
page read and write
224DA034000
trusted library allocation
page read and write
224DC38F000
trusted library allocation
page read and write
224DBBFD000
trusted library allocation
page read and write
224E26B1000
trusted library allocation
page read and write
224E21C8000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224DB8AC000
trusted library allocation
page read and write
224E6B7E000
heap
page read and write
224E3A5E000
trusted library allocation
page read and write
2BBC3F29000
heap
page read and write
224D12FF000
heap
page read and write
224E3A34000
trusted library allocation
page read and write
224E4DEC000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
14578C00000
trusted library allocation
page read and write
224DA58A000
trusted library allocation
page read and write
1FAB86B0000
heap
page read and write
20A246B7000
trusted library allocation
page read and write
224E2989000
trusted library allocation
page read and write
224DC943000
trusted library allocation
page read and write
224E2644000
trusted library allocation
page read and write
5F9DC3E000
stack
page read and write
224E2985000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224E244A000
trusted library allocation
page read and write
2BBC3E06000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DA2D4000
heap
page read and write
224E2631000
trusted library allocation
page read and write
20A24050000
unclassified section
page read and write
2BBC392C000
heap
page read and write
224DBFD4000
trusted library allocation
page read and write
224DB6BF000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224E2EE3000
trusted library allocation
page read and write
224DC93E000
trusted library allocation
page read and write
2BBC39B0000
heap
page read and write
224D12D2000
heap
page read and write
224E263E000
trusted library allocation
page read and write
224DDDB0000
trusted library allocation
page read and write
224D73D3000
trusted library allocation
page read and write
224E3720000
trusted library allocation
page read and write
224DB457000
trusted library allocation
page read and write
224DA544000
trusted library allocation
page read and write
224D6326000
trusted library allocation
page read and write
224D9D5A000
trusted library allocation
page read and write
224DBFE4000
trusted library allocation
page read and write
224E6478000
trusted library allocation
page read and write
1FAB6ADD000
heap
page read and write
B61000
unkown
page execute read
224DBB56000
trusted library allocation
page read and write
224DA2D5000
heap
page read and write
224DBFB9000
trusted library allocation
page read and write
224DB942000
trusted library allocation
page read and write
224E3A97000
trusted library allocation
page read and write
224DAA88000
trusted library allocation
page read and write
224DB599000
trusted library allocation
page read and write
224E2371000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E298B000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224D12FE000
heap
page read and write
224DB986000
trusted library allocation
page read and write
224DC581000
trusted library allocation
page read and write
224E3AF6000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224DB31B000
trusted library allocation
page read and write
224D12CF000
heap
page read and write
224DA015000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224E264A000
trusted library allocation
page read and write
1FAB86A0000
heap
page read and write
224D7EA0000
trusted library allocation
page read and write
224DB96D000
trusted library allocation
page read and write
224E5141000
trusted library allocation
page read and write
224DA0C3000
trusted library allocation
page read and write
224E525D000
trusted library allocation
page read and write
224DA0C3000
trusted library allocation
page read and write
224DCDAE000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224D12F5000
heap
page read and write
224D7382000
trusted library allocation
page read and write
2BBC33BC000
trusted library allocation
page read and write
224E2718000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224E290F000
trusted library allocation
page read and write
224E3A1A000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224DBD41000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
B7FB92E000
stack
page read and write
224E524A000
trusted library allocation
page read and write
224E6718000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224DCDFE000
trusted library allocation
page read and write
224E4E82000
trusted library allocation
page read and write
224DD19D000
trusted library allocation
page read and write
224E2611000
trusted library allocation
page read and write
224DA7BB000
trusted library allocation
page read and write
224DC929000
trusted library allocation
page read and write
224DC87E000
trusted library allocation
page read and write
224DBFE4000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224DC3FB000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
224E66FC000
trusted library allocation
page read and write
2BBC392F000
heap
page read and write
B60000
unkown
page readonly
224DB8D9000
trusted library allocation
page read and write
224E26F4000
trusted library allocation
page read and write
2BBC3F23000
heap
page read and write
224E22E3000
trusted library allocation
page read and write
224DB6BF000
trusted library allocation
page read and write
224E372C000
trusted library allocation
page read and write
224DB934000
trusted library allocation
page read and write
224D12C8000
heap
page read and write
224E3AF3000
trusted library allocation
page read and write
224DA7BE000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224E22BB000
trusted library allocation
page read and write
224D7EC2000
trusted library allocation
page read and write
3C7BFC000
stack
page read and write
224DBA87000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224E2473000
trusted library allocation
page read and write
224DA68C000
trusted library allocation
page read and write
224DBDF8000
trusted library allocation
page read and write
224DB64A000
trusted library allocation
page read and write
224DCD9A000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E22F5000
trusted library allocation
page read and write
224E3A1E000
trusted library allocation
page read and write
224DB322000
trusted library allocation
page read and write
224D9DF6000
trusted library allocation
page read and write
224DC8AC000
trusted library allocation
page read and write
224DBDCB000
trusted library allocation
page read and write
224E2922000
trusted library allocation
page read and write
224DBDE9000
trusted library allocation
page read and write
224E2989000
trusted library allocation
page read and write
224DA2E4000
heap
page read and write
2BBC38B0000
unkown
page execute read
224D12A6000
heap
page read and write
224DC484000
trusted library allocation
page read and write
224DB9AC000
trusted library allocation
page read and write
224E2197000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
E6D983E000
unkown
page readonly
224D12F5000
heap
page read and write
224D12EF000
heap
page read and write
2BBC331A000
trusted library allocation
page read and write
224DA0FB000
trusted library allocation
page read and write
224DB3BB000
trusted library allocation
page read and write
224DB844000
trusted library allocation
page read and write
B7FE47E000
stack
page read and write
224D12A6000
heap
page read and write
224D12EF000
heap
page read and write
B14000
heap
page read and write
2BBC39C1000
heap
page read and write
224DB77D000
trusted library allocation
page read and write
2BBC3930000
heap
page read and write
224E3AF3000
trusted library allocation
page read and write
224DD107000
trusted library allocation
page read and write
1FAB6A50000
heap
page read and write
224DDCF8000
trusted library allocation
page read and write
224DCCCC000
trusted library allocation
page read and write
20A2406A000
heap
page read and write
224D12FE000
heap
page read and write
1FAB6AFA000
heap
page read and write
2BBC39B8000
heap
page read and write
224DBDF0000
trusted library allocation
page read and write
224E525D000
trusted library allocation
page read and write
224DBDF8000
trusted library allocation
page read and write
224E296F000
trusted library allocation
page read and write
224DDCF4000
trusted library allocation
page read and write
20A24666000
trusted library allocation
page read and write
224E2375000
trusted library allocation
page read and write
224DC3E5000
trusted library allocation
page read and write
1FAB6AE2000
heap
page read and write
224D12C5000
heap
page read and write
20A24411000
trusted library allocation
page read and write
224E4DCD000
trusted library allocation
page read and write
224DA0EB000
trusted library allocation
page read and write
224E4C42000
trusted library allocation
page read and write
224DA246000
heap
page read and write
224DC3F1000
trusted library allocation
page read and write
224DB7B8000
trusted library allocation
page read and write
224D7EB6000
trusted library allocation
page read and write
224DBDE9000
trusted library allocation
page read and write
224DB632000
trusted library allocation
page read and write
224E5296000
trusted library allocation
page read and write
224D12C8000
heap
page read and write
B14000
heap
page read and write
224DBC75000
trusted library allocation
page read and write
224E4ECE000
trusted library allocation
page read and write
224E27BF000
trusted library allocation
page read and write
20A246A7000
trusted library allocation
page read and write
224DBCFC000
trusted library allocation
page read and write
224D12B1000
heap
page read and write
224D876B000
trusted library allocation
page read and write
224D737D000
trusted library allocation
page read and write
224DBDA4000
trusted library allocation
page read and write
224D7EC7000
trusted library allocation
page read and write
224E26E0000
trusted library allocation
page read and write
224E2314000
trusted library allocation
page read and write
224E3A4E000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224DC862000
trusted library allocation
page read and write
224E293F000
trusted library allocation
page read and write
224E228D000
trusted library allocation
page read and write
224DBD53000
trusted library allocation
page read and write
224DB5E7000
trusted library allocation
page read and write
224E516D000
trusted library allocation
page read and write
224DC564000
trusted library allocation
page read and write
20A2466A000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224DBFF0000
trusted library allocation
page read and write
224E2565000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E27EC000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224DBD4A000
trusted library allocation
page read and write
224DB925000
trusted library allocation
page read and write
224DC560000
trusted library allocation
page read and write
224E3A28000
trusted library allocation
page read and write
224DA2C6000
heap
page read and write
224E4102000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DD104000
trusted library allocation
page read and write
224DDD0B000
trusted library allocation
page read and write
224D7EDE000
trusted library allocation
page read and write
224DB787000
trusted library allocation
page read and write
224E2231000
trusted library allocation
page read and write
224DA27E000
heap
page read and write
224D6271000
trusted library allocation
page read and write
224E25CA000
trusted library allocation
page read and write
224E3A23000
trusted library allocation
page read and write
224DDDF6000
trusted library allocation
page read and write
224DA2E9000
heap
page read and write
224DCDE3000
trusted library allocation
page read and write
224D1308000
heap
page read and write
224DA295000
heap
page read and write
224DBBFA000
trusted library allocation
page read and write
224DC486000
trusted library allocation
page read and write
B60000
unkown
page readonly
224DA282000
heap
page read and write
224E2DFA000
trusted library allocation
page read and write
224DC456000
trusted library allocation
page read and write
FFD06603000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DDD87000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E22D7000
trusted library allocation
page read and write
224DBA7E000
trusted library allocation
page read and write
224DB7D8000
trusted library allocation
page read and write
224D12C7000
heap
page read and write
224E2660000
trusted library allocation
page read and write
224DBD4A000
trusted library allocation
page read and write
1BA06F6A000
heap
page read and write
2BBC3F3B000
heap
page read and write
224E23D6000
trusted library allocation
page read and write
224E243C000
trusted library allocation
page read and write
224E22D7000
trusted library allocation
page read and write
224E27EA000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224E265C000
trusted library allocation
page read and write
224E264A000
trusted library allocation
page read and write
224E2473000
trusted library allocation
page read and write
224DBDC6000
trusted library allocation
page read and write
224DA65D000
trusted library allocation
page read and write
224DB6B4000
trusted library allocation
page read and write
224DB77C000
trusted library allocation
page read and write
224DC564000
trusted library allocation
page read and write
5F9C23E000
unkown
page readonly
224DB723000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224DBDCB000
trusted library allocation
page read and write
224E3A3A000
trusted library allocation
page read and write
224DBF1F000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224E67FC000
trusted library allocation
page read and write
224D12C6000
heap
page read and write
224D12FF000
heap
page read and write
224E52CC000
trusted library allocation
page read and write
224D87B3000
trusted library allocation
page read and write
224DCD8B000
trusted library allocation
page read and write
224D1302000
heap
page read and write
99A000
stack
page read and write
224E45AC000
trusted library allocation
page read and write
224E2646000
trusted library allocation
page read and write
224DBDCB000
trusted library allocation
page read and write
E6D75FE000
stack
page read and write
224DA2E9000
heap
page read and write
224DB6F9000
trusted library allocation
page read and write
224DBDB4000
trusted library allocation
page read and write
224E5265000
trusted library allocation
page read and write
224DBBF4000
trusted library allocation
page read and write
224DC885000
trusted library allocation
page read and write
224DB3ED000
trusted library allocation
page read and write
224DDC47000
trusted library allocation
page read and write
224DB66F000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
1BA06D90000
heap
page read and write
224D12B1000
heap
page read and write
224DA661000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224E273D000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
1FAB6D75000
heap
page read and write
224D12B6000
heap
page read and write
224DBBF4000
trusted library allocation
page read and write
224DC547000
trusted library allocation
page read and write
224DB5C3000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DBB64000
trusted library allocation
page read and write
224D12C7000
heap
page read and write
224E4BE7000
trusted library allocation
page read and write
224DB684000
trusted library allocation
page read and write
224DD19F000
trusted library allocation
page read and write
224E4FF9000
trusted library allocation
page read and write
224E5296000
trusted library allocation
page read and write
224E4528000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224D130D000
heap
page read and write
224D6313000
trusted library allocation
page read and write
224DCAF1000
trusted library allocation
page read and write
224DBFDE000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DC463000
trusted library allocation
page read and write
224DB484000
trusted library allocation
page read and write
224D12C8000
heap
page read and write
224DBFCB000
trusted library allocation
page read and write
224E216C000
trusted library allocation
page read and write
224DB616000
trusted library allocation
page read and write
224E2688000
trusted library allocation
page read and write
13EF000
stack
page read and write
224DA2E5000
heap
page read and write
20A24190000
unclassified section
page readonly
224D7396000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224DC80C000
trusted library allocation
page read and write
224E4DF5000
trusted library allocation
page read and write
224E29E3000
trusted library allocation
page read and write
224DB95F000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224DBBDB000
trusted library allocation
page read and write
224D62FE000
trusted library allocation
page read and write
224D7E6F000
trusted library allocation
page read and write
224DDDBE000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224DC8D4000
trusted library allocation
page read and write
224DAAE0000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224DB545000
trusted library allocation
page read and write
224E2375000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224DBCEE000
trusted library allocation
page read and write
224DC9C0000
trusted library allocation
page read and write
20A2467E000
trusted library allocation
page read and write
224DDCDC000
trusted library allocation
page read and write
20A24170000
heap
page read and write
224DB9A1000
trusted library allocation
page read and write
224E251A000
trusted library allocation
page read and write
224E22BB000
trusted library allocation
page read and write
224E26CC000
trusted library allocation
page read and write
224DC381000
trusted library allocation
page read and write
224DC579000
trusted library allocation
page read and write
224DD139000
trusted library allocation
page read and write
224DA2D5000
heap
page read and write
224DB7E6000
trusted library allocation
page read and write
224DB86A000
trusted library allocation
page read and write
224DBBEE000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DB962000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224E253D000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E23CF000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
20A24415000
trusted library allocation
page read and write
224D1309000
heap
page read and write
224DBD17000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
2BBC39B8000
heap
page read and write
224D7366000
trusted library allocation
page read and write
224D12A7000
heap
page read and write
224E450F000
trusted library allocation
page read and write
224DBFD4000
trusted library allocation
page read and write
224E293C000
trusted library allocation
page read and write
224DBDBB000
trusted library allocation
page read and write
224D7EE6000
trusted library allocation
page read and write
224D12B0000
heap
page read and write
224E4C27000
trusted library allocation
page read and write
224D63B7000
trusted library allocation
page read and write
224DA282000
heap
page read and write
224E4D34000
trusted library allocation
page read and write
2BBC3989000
heap
page read and write
224DB665000
trusted library allocation
page read and write
224D5CB3000
trusted library allocation
page read and write
224DAADC000
trusted library allocation
page read and write
224DB731000
trusted library allocation
page read and write
224DB646000
trusted library allocation
page read and write
1BA06DD0000
heap
page read and write
224DDDB0000
trusted library allocation
page read and write
224DBBA7000
trusted library allocation
page read and write
224D6326000
trusted library allocation
page read and write
224E4E94000
trusted library allocation
page read and write
224DB676000
trusted library allocation
page read and write
224E2475000
trusted library allocation
page read and write
224DA258000
heap
page read and write
B14000
heap
page read and write
224E23C4000
trusted library allocation
page read and write
224E22E0000
trusted library allocation
page read and write
224E2375000
trusted library allocation
page read and write
224E3A37000
trusted library allocation
page read and write
224DDDA6000
trusted library allocation
page read and write
224DB7A5000
trusted library allocation
page read and write
224E3A19000
trusted library allocation
page read and write
224D129E000
heap
page read and write
2BBC38A0000
trusted library allocation
page read and write
224D7E1C000
trusted library allocation
page read and write
224E3AC9000
trusted library allocation
page read and write
224D7EE2000
trusted library allocation
page read and write
224DB4BC000
trusted library allocation
page read and write
224DCDC0000
trusted library allocation
page read and write
224DBF27000
trusted library allocation
page read and write
224E6412000
trusted library allocation
page read and write
224E4FCA000
trusted library allocation
page read and write
224DB780000
trusted library allocation
page read and write
224DBFDC000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
B14000
heap
page read and write
224D12F9000
heap
page read and write
224D12B6000
heap
page read and write
5F9A9D8000
stack
page read and write
224D9D68000
trusted library allocation
page read and write
224E22D7000
trusted library allocation
page read and write
224E2EE1000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
151F000
heap
page read and write
224DA2F2000
heap
page read and write
224DB5C3000
trusted library allocation
page read and write
224DB31B000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DBFDE000
trusted library allocation
page read and write
224DB49B000
trusted library allocation
page read and write
224E2370000
trusted library allocation
page read and write
224D7E6F000
trusted library allocation
page read and write
1BA07500000
trusted library allocation
page read and write
224DDC13000
trusted library allocation
page read and write
224E37B6000
trusted library allocation
page read and write
224E23B7000
trusted library allocation
page read and write
224DB986000
trusted library allocation
page read and write
224D7E8D000
trusted library allocation
page read and write
224E37CD000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224D12B6000
heap
page read and write
224E2443000
trusted library allocation
page read and write
224DC8CD000
trusted library allocation
page read and write
224E2569000
trusted library allocation
page read and write
224E263A000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E227F000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DB53D000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224E64AA000
trusted library allocation
page read and write
224DA2CA000
heap
page read and write
2BBC39B8000
heap
page read and write
2BBC3F58000
heap
page read and write
224DA25F000
heap
page read and write
20A2469E000
trusted library allocation
page read and write
224DDC37000
trusted library allocation
page read and write
224DA681000
trusted library allocation
page read and write
224DBDD6000
trusted library allocation
page read and write
224DDCFB000
trusted library allocation
page read and write
224E4D61000
trusted library allocation
page read and write
224D73E2000
trusted library allocation
page read and write
2BBC39E9000
unkown
page execute read
224DA0A8000
trusted library allocation
page read and write
2BBC3939000
heap
page read and write
224D12ED000
heap
page read and write
224DBF22000
trusted library allocation
page read and write
224DBDE4000
trusted library allocation
page read and write
224E525B000
trusted library allocation
page read and write
224DBC19000
trusted library allocation
page read and write
224D7382000
trusted library allocation
page read and write
224E26E2000
trusted library allocation
page read and write
224DA68A000
trusted library allocation
page read and write
1BA07000000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
3CBBC6424000
trusted library allocation
page read and write
224E4DF5000
trusted library allocation
page read and write
224E3A16000
trusted library allocation
page read and write
224DC3F3000
trusted library allocation
page read and write
331B2DB1000
trusted library allocation
page execute read
224DC865000
trusted library allocation
page read and write
1508000
heap
page read and write
224D12EF000
heap
page read and write
224D12DB000
heap
page read and write
224D12EE000
heap
page read and write
224DDD30000
trusted library allocation
page read and write
224DC862000
trusted library allocation
page read and write
2BBC39C1000
heap
page read and write
2BBC391D000
heap
page read and write
224DCDD6000
trusted library allocation
page read and write
224E379F000
trusted library allocation
page read and write
224DDDB5000
trusted library allocation
page read and write
224DBD27000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA747000
trusted library allocation
page read and write
224DB593000
trusted library allocation
page read and write
2BBC392C000
heap
page read and write
224DC32C000
trusted library allocation
page read and write
224DA28E000
heap
page read and write
224DB5ED000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DD115000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224DC36F000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DC557000
trusted library allocation
page read and write
224DA023000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224E64AA000
trusted library allocation
page read and write
224E25D7000
trusted library allocation
page read and write
224E2981000
trusted library allocation
page read and write
224DCDFA000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DB9AC000
trusted library allocation
page read and write
224DC581000
trusted library allocation
page read and write
224E27FD000
trusted library allocation
page read and write
224D131B000
heap
page read and write
224E52AD000
trusted library allocation
page read and write
224DC7AC000
trusted library allocation
page read and write
224E6824000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224DBBDD000
trusted library allocation
page read and write
1BA07149000
trusted library allocation
page read and write
224DBC07000
trusted library allocation
page read and write
224DB8D2000
trusted library allocation
page read and write
224E264F000
trusted library allocation
page read and write
224DB7B8000
trusted library allocation
page read and write
1BA07100000
trusted library allocation
page read and write
224D1308000
heap
page read and write
224DBC16000
trusted library allocation
page read and write
224E23EA000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224E2430000
trusted library allocation
page read and write
224E4DCD000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
2BBC3930000
heap
page read and write
2BBC3F58000
heap
page read and write
2BBC395D000
heap
page read and write
224DB78F000
trusted library allocation
page read and write
224E25FC000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E6B5B000
heap
page read and write
224DC4AE000
trusted library allocation
page read and write
224DDCA9000
trusted library allocation
page read and write
224D7EDE000
trusted library allocation
page read and write
224DC806000
trusted library allocation
page read and write
224DCDF0000
trusted library allocation
page read and write
224E5024000
trusted library allocation
page read and write
224DA686000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224D12F5000
heap
page read and write
224E2647000
trusted library allocation
page read and write
224D12DB000
heap
page read and write
224D63D2000
trusted library allocation
page read and write
224DBB12000
trusted library allocation
page read and write
224E29EC000
trusted library allocation
page read and write
224E2322000
trusted library allocation
page read and write
331B2D1C000
trusted library allocation
page execute read
224DB88B000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
224D12C4000
heap
page read and write
224E262E000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224D7386000
trusted library allocation
page read and write
224DCCF0000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DA275000
heap
page read and write
224E3A28000
trusted library allocation
page read and write
224DB524000
trusted library allocation
page read and write
224DB3A6000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DA64C000
trusted library allocation
page read and write
224E6B45000
heap
page read and write
224E299E000
trusted library allocation
page read and write
224DC311000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224D12F8000
heap
page read and write
224DBD32000
trusted library allocation
page read and write
224E26E0000
trusted library allocation
page read and write
224DB659000
trusted library allocation
page read and write
224D6393000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224E27EC000
trusted library allocation
page read and write
224DDCBA000
trusted library allocation
page read and write
224DC3B0000
trusted library allocation
page read and write
224E37C4000
trusted library allocation
page read and write
224D6400000
trusted library allocation
page read and write
224DA739000
trusted library allocation
page read and write
224DB917000
trusted library allocation
page read and write
224DBFB9000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224E25ED000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D7EE9000
trusted library allocation
page read and write
21183FE000
stack
page read and write
224DBBC0000
trusted library allocation
page read and write
224E26ED000
trusted library allocation
page read and write
224DBC2B000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D12AC000
heap
page read and write
2BBC3A70000
heap
page read and write
224E2471000
trusted library allocation
page read and write
224DBAA4000
trusted library allocation
page read and write
1FAB6D40000
heap
page read and write
224E37BE000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DBBCA000
trusted library allocation
page read and write
224DBFDF000
trusted library allocation
page read and write
224DA27F000
heap
page read and write
224E27E0000
trusted library allocation
page read and write
224DD2B4000
trusted library allocation
page read and write
224DA296000
heap
page read and write
224E21FB000
trusted library allocation
page read and write
224D130D000
heap
page read and write
224DA272000
heap
page read and write
1BA071B5000
trusted library allocation
page read and write
20A23F70000
remote allocation
page read and write
224E22EB000
trusted library allocation
page read and write
224DB71F000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224DB91B000
trusted library allocation
page read and write
224E298F000
trusted library allocation
page read and write
2BBC392C000
heap
page read and write
224DCCE1000
trusted library allocation
page read and write
224DB627000
trusted library allocation
page read and write
1BA07168000
trusted library allocation
page read and write
224DB653000
trusted library allocation
page read and write
224E2229000
trusted library allocation
page read and write
224DB510000
trusted library allocation
page read and write
224E6B03000
heap
page read and write
224DA282000
heap
page read and write
224D12F5000
heap
page read and write
5F9C2BB000
stack
page read and write
2BBC33AD000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224DBD32000
trusted library allocation
page read and write
2BBC39B8000
heap
page read and write
2BBC3F21000
heap
page read and write
224E3720000
trusted library allocation
page read and write
224DB633000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DA7FB000
trusted library allocation
page read and write
224E2641000
trusted library allocation
page read and write
224D876E000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224DB569000
trusted library allocation
page read and write
224DB5A7000
trusted library allocation
page read and write
224D631E000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
1BA07124000
trusted library allocation
page read and write
B7FDBFE000
unkown
page readonly
224E4518000
trusted library allocation
page read and write
2319DD03000
trusted library allocation
page read and write
224DC84F000
trusted library allocation
page read and write
224DA285000
heap
page read and write
224E4CAC000
trusted library allocation
page read and write
224D7E27000
trusted library allocation
page read and write
224DDDAE000
trusted library allocation
page read and write
224D7EF1000
trusted library allocation
page read and write
224DB983000
trusted library allocation
page read and write
224DC4B2000
trusted library allocation
page read and write
224DBA72000
trusted library allocation
page read and write
2BBC3930000
heap
page read and write
224E2631000
trusted library allocation
page read and write
224DBC3F000
trusted library allocation
page read and write
224D6223000
trusted library allocation
page read and write
224E29AE000
trusted library allocation
page read and write
1500000
heap
page read and write
224D7EBE000
trusted library allocation
page read and write
224DE658000
trusted library allocation
page read and write
224DBDA4000
trusted library allocation
page read and write
224DD1BE000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E643B000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224E4D3E000
trusted library allocation
page read and write
224DC3AF000
trusted library allocation
page read and write
224DB3A3000
trusted library allocation
page read and write
224E37D5000
trusted library allocation
page read and write
224E26D5000
trusted library allocation
page read and write
224DDD35000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224DA27F000
heap
page read and write
224DBD16000
trusted library allocation
page read and write
224DBBC0000
trusted library allocation
page read and write
224DC3E8000
trusted library allocation
page read and write
2BBC3930000
heap
page read and write
B7FF47E000
stack
page read and write
224DB6B4000
trusted library allocation
page read and write
224E223F000
trusted library allocation
page read and write
224E2529000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
224DBCE9000
trusted library allocation
page read and write
224DA296000
heap
page read and write
224DBAC2000
trusted library allocation
page read and write
1FAB6A70000
heap
page read and write
224DC30B000
trusted library allocation
page read and write
224E21AF000
trusted library allocation
page read and write
224DA7DB000
trusted library allocation
page read and write
224D7E3B000
trusted library allocation
page read and write
2BBC39C1000
heap
page read and write
224DB922000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DC370000
trusted library allocation
page read and write
224E222D000
trusted library allocation
page read and write
224DB681000
trusted library allocation
page read and write
2BBC3F59000
heap
page read and write
224E3A20000
trusted library allocation
page read and write
224DBABF000
trusted library allocation
page read and write
224DC46E000
trusted library allocation
page read and write
224DBDC6000
trusted library allocation
page read and write
224DBB58000
trusted library allocation
page read and write
224DBBEC000
trusted library allocation
page read and write
224DB87D000
trusted library allocation
page read and write
224D7396000
trusted library allocation
page read and write
224DC4CC000
trusted library allocation
page read and write
1FAB86B9000
heap
page read and write
224DBF13000
trusted library allocation
page read and write
224E4EC2000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224E29A4000
trusted library allocation
page read and write
224DBBBC000
trusted library allocation
page read and write
1BA0715F000
trusted library allocation
page read and write
224DBC0A000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E29B6000
trusted library allocation
page read and write
224E67B1000
trusted library allocation
page read and write
224E2EB2000
trusted library allocation
page read and write
224D7ECD000
trusted library allocation
page read and write
224DAAEB000
trusted library allocation
page read and write
14578AD0000
heap
page read and write
224DBFFD000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DAABB000
trusted library allocation
page read and write
224DBF23000
trusted library allocation
page read and write
224DBFA4000
trusted library allocation
page read and write
224DC369000
trusted library allocation
page read and write
224DCDAA000
trusted library allocation
page read and write
224DBA8B000
trusted library allocation
page read and write
224D12A8000
heap
page read and write
224E25FC000
trusted library allocation
page read and write
2BBC2F30000
heap
page read and write
224D7ECD000
trusted library allocation
page read and write
224E2D43000
trusted library allocation
page read and write
224DBD88000
trusted library allocation
page read and write
224E23C7000
trusted library allocation
page read and write
224DBDB4000
trusted library allocation
page read and write
224DB67E000
trusted library allocation
page read and write
224E3A96000
trusted library allocation
page read and write
224E4BE3000
trusted library allocation
page read and write
224E6449000
trusted library allocation
page read and write
224E2E4F000
trusted library allocation
page read and write
224DB95B000
trusted library allocation
page read and write
224E21BA000
trusted library allocation
page read and write
331B2DC1000
trusted library allocation
page execute read
224E24CD000
trusted library allocation
page read and write
224D130A000
heap
page read and write
224DAA1E000
trusted library allocation
page read and write
20A2441E000
trusted library allocation
page read and write
224DBD3F000
trusted library allocation
page read and write
224DA59B000
trusted library allocation
page read and write
224E3A26000
trusted library allocation
page read and write
224DB96F000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
224D1307000
heap
page read and write
224D12B0000
heap
page read and write
224DDD25000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
23408B03000
trusted library allocation
page read and write
224E23CF000
trusted library allocation
page read and write
224E2522000
trusted library allocation
page read and write
224DBBDD000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
2BBC3F44000
heap
page read and write
224D12C5000
heap
page read and write
224DBB64000
trusted library allocation
page read and write
224DA27E000
heap
page read and write
224E263B000
trusted library allocation
page read and write
224E4FB1000
trusted library allocation
page read and write
224DA774000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224D12C1000
heap
page read and write
224DCDC3000
trusted library allocation
page read and write
224DBFD6000
trusted library allocation
page read and write
224E298A000
trusted library allocation
page read and write
224DB9A6000
trusted library allocation
page read and write
224DBD45000
trusted library allocation
page read and write
224DC7D9000
trusted library allocation
page read and write
224DB9D3000
trusted library allocation
page read and write
224E256D000
trusted library allocation
page read and write
224DC865000
trusted library allocation
page read and write
224E6476000
trusted library allocation
page read and write
224E24D0000
trusted library allocation
page read and write
224DBFE7000
trusted library allocation
page read and write
224DC89F000
trusted library allocation
page read and write
1FAB86BB000
heap
page read and write
20A246CB000
trusted library allocation
page read and write
224DA661000
trusted library allocation
page read and write
224DC5A1000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
2BBC3F3B000
heap
page read and write
224D7EA5000
trusted library allocation
page read and write
224DDDB5000
trusted library allocation
page read and write
224DDDFE000
trusted library allocation
page read and write
224DC48D000
trusted library allocation
page read and write
20A24432000
trusted library allocation
page read and write
224E2985000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224E643D000
trusted library allocation
page read and write
224DD18C000
trusted library allocation
page read and write
224E67B4000
trusted library allocation
page read and write
224D63C5000
trusted library allocation
page read and write
224E2EE1000
trusted library allocation
page read and write
224DA285000
heap
page read and write
224DB8CA000
trusted library allocation
page read and write
224D12CB000
heap
page read and write
224E2367000
trusted library allocation
page read and write
224D622F000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DBDD6000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224E22D1000
trusted library allocation
page read and write
224DB88F000
trusted library allocation
page read and write
224E298F000
trusted library allocation
page read and write
224E4EA7000
trusted library allocation
page read and write
224E2DF0000
trusted library allocation
page read and write
224D8724000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224E3A20000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
2BBC3F58000
heap
page read and write
224D12F9000
heap
page read and write
224E52DB000
trusted library allocation
page read and write
224DB80B000
trusted library allocation
page read and write
224DB6FE000
trusted library allocation
page read and write
150E000
heap
page read and write
224D12A0000
heap
page read and write
224DBB16000
trusted library allocation
page read and write
224DA2DF000
heap
page read and write
224DBF1F000
trusted library allocation
page read and write
2BBC397A000
heap
page read and write
224DBDA4000
trusted library allocation
page read and write
224DD1D2000
trusted library allocation
page read and write
224DC3E8000
trusted library allocation
page read and write
224E265F000
trusted library allocation
page read and write
224DBFA3000
trusted library allocation
page read and write
224DA5D2000
trusted library allocation
page read and write
1BA07404000
trusted library allocation
page read and write
224E64C1000
trusted library allocation
page read and write
224E2509000
trusted library allocation
page read and write
224E4DB3000
trusted library allocation
page read and write
224E2EE1000
trusted library allocation
page read and write
224DBD45000
trusted library allocation
page read and write
224DBC4A000
trusted library allocation
page read and write
224E2938000
trusted library allocation
page read and write
224E2375000
trusted library allocation
page read and write
224DDDA6000
trusted library allocation
page read and write
224DB659000
trusted library allocation
page read and write
151F000
heap
page read and write
224D12B7000
heap
page read and write
224D63B0000
trusted library allocation
page read and write
2BBC3368000
trusted library allocation
page read and write
224DB6EE000
trusted library allocation
page read and write
224DB961000
trusted library allocation
page read and write
224E6761000
trusted library allocation
page read and write
224DB9FC000
trusted library allocation
page read and write
224E4F85000
trusted library allocation
page read and write
1FAB6AD0000
heap
page read and write
1FAB6AFA000
heap
page read and write
224DCDCB000
trusted library allocation
page read and write
224E3A35000
trusted library allocation
page read and write
224E24AF000
trusted library allocation
page read and write
224DB90F000
trusted library allocation
page read and write
224D7356000
trusted library allocation
page read and write
224E264D000
trusted library allocation
page read and write
224DBAB2000
trusted library allocation
page read and write
224E225A000
trusted library allocation
page read and write
224D7EE9000
trusted library allocation
page read and write
224D7382000
trusted library allocation
page read and write
224E24D0000
trusted library allocation
page read and write
224DA2D6000
heap
page read and write
224DA575000
trusted library allocation
page read and write
224DBBF4000
trusted library allocation
page read and write
224DB5D7000
trusted library allocation
page read and write
224DA686000
trusted library allocation
page read and write
224D7E26000
trusted library allocation
page read and write
224DAAE7000
trusted library allocation
page read and write
5F9D3BE000
unkown
page readonly
224E4D18000
trusted library allocation
page read and write
E6DB0BE000
stack
page read and write
2117BFE000
stack
page read and write
224DBFDC000
trusted library allocation
page read and write
224DC39F000
trusted library allocation
page read and write
224E26C8000
trusted library allocation
page read and write
224DA59D000
trusted library allocation
page read and write
3A01000
heap
page read and write
224D12AF000
heap
page read and write
224DB84D000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
224E2115000
trusted library allocation
page read and write
224DBBC4000
trusted library allocation
page read and write
224DA792000
trusted library allocation
page read and write
224DB66F000
trusted library allocation
page read and write
224E2DDD000
trusted library allocation
page read and write
224DA272000
heap
page read and write
224E3AA4000
trusted library allocation
page read and write
224DB465000
trusted library allocation
page read and write
224DBF27000
trusted library allocation
page read and write
224DBDFD000
trusted library allocation
page read and write
224DBF1F000
trusted library allocation
page read and write
B7FDC3E000
stack
page read and write
150F000
heap
page read and write
224DA5BB000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E27FD000
trusted library allocation
page read and write
2BBC38D1000
heap
page read and write
224D73A3000
trusted library allocation
page read and write
224DA2F1000
heap
page read and write
224DA275000
heap
page read and write
224D9DDF000
trusted library allocation
page read and write
224D7EDE000
trusted library allocation
page read and write
224DA7D4000
trusted library allocation
page read and write
224DB8AC000
trusted library allocation
page read and write
224DBFF8000
trusted library allocation
page read and write
224E2479000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224DDDB0000
trusted library allocation
page read and write
224E2463000
trusted library allocation
page read and write
224DB798000
trusted library allocation
page read and write
224DB5F9000
trusted library allocation
page read and write
20A24681000
trusted library allocation
page read and write
224E3A37000
trusted library allocation
page read and write
224DBDF8000
trusted library allocation
page read and write
224DE73B000
trusted library allocation
page read and write
224DB928000
trusted library allocation
page read and write
224DBDB4000
trusted library allocation
page read and write
224E2376000
trusted library allocation
page read and write
224DB96A000
trusted library allocation
page read and write
224D9D2D000
trusted library allocation
page read and write
224E4D61000
trusted library allocation
page read and write
224DBBD7000
trusted library allocation
page read and write
B14000
heap
page read and write
224D12F5000
heap
page read and write
224DBD4C000
trusted library allocation
page read and write
224D130D000
heap
page read and write
224D7EBE000
trusted library allocation
page read and write
224E23CF000
trusted library allocation
page read and write
224DC370000
trusted library allocation
page read and write
224E433C000
trusted library allocation
page read and write
224DBDFD000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E27DA000
trusted library allocation
page read and write
224E2DFB000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
1BA06CE0000
unclassified section
page readonly
224DCDCD000
trusted library allocation
page read and write
224E67F9000
trusted library allocation
page read and write
224DC845000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DC3FB000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224E459A000
trusted library allocation
page read and write
224DB5C9000
trusted library allocation
page read and write
20A245B4000
heap
page read and write
224E4D6F000
trusted library allocation
page read and write
224E24D4000
trusted library allocation
page read and write
1BA0717A000
trusted library allocation
page read and write
224D7EC7000
trusted library allocation
page read and write
224DA283000
heap
page read and write
224DDE02000
trusted library allocation
page read and write
224DC591000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224D12FF000
heap
page read and write
224E4D98000
trusted library allocation
page read and write
224DBFF7000
trusted library allocation
page read and write
224E37C4000
trusted library allocation
page read and write
224E3797000
trusted library allocation
page read and write
2BBC3F77000
heap
page read and write
224DBDDA000
trusted library allocation
page read and write
224DA65D000
trusted library allocation
page read and write
224E2ECD000
trusted library allocation
page read and write
224DBBFD000
trusted library allocation
page read and write
224DBB80000
trusted library allocation
page read and write
224DA064000
trusted library allocation
page read and write
224DAA99000
trusted library allocation
page read and write
224D7EF0000
trusted library allocation
page read and write
224DA65D000
trusted library allocation
page read and write
224E3765000
trusted library allocation
page read and write
224DA023000
trusted library allocation
page read and write
224DBDBB000
trusted library allocation
page read and write
224DBDC4000
trusted library allocation
page read and write
224DBF1F000
trusted library allocation
page read and write
224E2200000
trusted library allocation
page read and write
224DC339000
trusted library allocation
page read and write
224DB31D000
trusted library allocation
page read and write
224DDD7C000
trusted library allocation
page read and write
224D1310000
heap
page read and write
224DA69C000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DB4CE000
trusted library allocation
page read and write
2BBC3F2D000
heap
page read and write
2BBC32D4000
heap
page read and write
224E3A37000
trusted library allocation
page read and write
224E23B7000
trusted library allocation
page read and write
20A24400000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224E2981000
trusted library allocation
page read and write
224E27C8000
trusted library allocation
page read and write
224E2660000
trusted library allocation
page read and write
224E251F000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224DBB8B000
trusted library allocation
page read and write
224DA78C000
trusted library allocation
page read and write
224E2638000
trusted library allocation
page read and write
224DB968000
trusted library allocation
page read and write
224E29A4000
trusted library allocation
page read and write
224DDDBA000
trusted library allocation
page read and write
E6DA0BE000
stack
page read and write
224E24B2000
trusted library allocation
page read and write
2BBC3F29000
heap
page read and write
224DBF13000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224DB6EB000
trusted library allocation
page read and write
224E234A000
trusted library allocation
page read and write
224E2644000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E52AD000
trusted library allocation
page read and write
224DB6F6000
trusted library allocation
page read and write
224DBD80000
trusted library allocation
page read and write
224E37C8000
trusted library allocation
page read and write
224DBB5A000
trusted library allocation
page read and write
224D9D4A000
trusted library allocation
page read and write
224E22AF000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224DC957000
trusted library allocation
page read and write
224DB695000
trusted library allocation
page read and write
224DBBEE000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224DBBF5000
trusted library allocation
page read and write
224D1308000
heap
page read and write
224DC3B8000
trusted library allocation
page read and write
224DA556000
trusted library allocation
page read and write
224DB90D000
trusted library allocation
page read and write
1513000
heap
page read and write
224E640E000
trusted library allocation
page read and write
224E26FD000
trusted library allocation
page read and write
224D12B1000
heap
page read and write
224E25B3000
trusted library allocation
page read and write
5F9C33E000
unkown
page readonly
224DB9FE000
trusted library allocation
page read and write
224E264A000
trusted library allocation
page read and write
224DC7CA000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224DB9A3000
trusted library allocation
page read and write
224DC4A8000
trusted library allocation
page read and write
224E4BE5000
trusted library allocation
page read and write
224DB5C3000
trusted library allocation
page read and write
224E22F6000
trusted library allocation
page read and write
224E4C18000
trusted library allocation
page read and write
224DDD81000
trusted library allocation
page read and write
224D5CDF000
trusted library allocation
page read and write
224E37C8000
trusted library allocation
page read and write
224DB52F000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
224DB69A000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
224E293A000
trusted library allocation
page read and write
224DDDFE000
trusted library allocation
page read and write
224D1301000
heap
page read and write
224DA752000
trusted library allocation
page read and write
224E21C0000
trusted library allocation
page read and write
224DAADD000
trusted library allocation
page read and write
224DAA8B000
trusted library allocation
page read and write
224E21B3000
trusted library allocation
page read and write
224E251C000
trusted library allocation
page read and write
224DC804000
trusted library allocation
page read and write
224DCDC9000
trusted library allocation
page read and write
224DA556000
trusted library allocation
page read and write
224E26D8000
trusted library allocation
page read and write
224D1308000
heap
page read and write
224DB4A6000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
224D12B1000
heap
page read and write
20A23FF0000
heap
page read and write
224D129E000
heap
page read and write
224DBD4A000
trusted library allocation
page read and write
224DB7A2000
trusted library allocation
page read and write
224E3A96000
trusted library allocation
page read and write
AE0000
heap
page read and write
224DAAB7000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
224DAAFA000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
1513000
heap
page read and write
224DB5F9000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA556000
trusted library allocation
page read and write
224E263E000
trusted library allocation
page read and write
224DC390000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DD180000
trusted library allocation
page read and write
224D73F3000
trusted library allocation
page read and write
224DBD5F000
trusted library allocation
page read and write
224D6276000
trusted library allocation
page read and write
224DB6BF000
trusted library allocation
page read and write
224E263A000
trusted library allocation
page read and write
224CA1EF000
heap
page read and write
224E4EEB000
trusted library allocation
page read and write
224DBDAE000
trusted library allocation
page read and write
2BBC38D9000
heap
page read and write
224E4DF3000
trusted library allocation
page read and write
224D12F6000
heap
page read and write
224DA5F4000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224E26B5000
trusted library allocation
page read and write
224DB96D000
trusted library allocation
page read and write
224DBD32000
trusted library allocation
page read and write
224E4EFC000
trusted library allocation
page read and write
224E6B8C000
heap
page read and write
224E2641000
trusted library allocation
page read and write
224DCD87000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
2BBC33BA000
trusted library allocation
page read and write
224E263A000
trusted library allocation
page read and write
224E23EC000
trusted library allocation
page read and write
224E22EB000
trusted library allocation
page read and write
224E293C000
trusted library allocation
page read and write
224E45CA000
trusted library allocation
page read and write
224D12B0000
heap
page read and write
14578D0A000
trusted library allocation
page read and write
224E26C1000
trusted library allocation
page read and write
224DA272000
heap
page read and write
224DA56D000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBAB9000
trusted library allocation
page read and write
2BBC3F44000
heap
page read and write
224E4DEC000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DBD0A000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E27EA000
trusted library allocation
page read and write
224DB81B000
trusted library allocation
page read and write
224DA556000
trusted library allocation
page read and write
224E3AD3000
trusted library allocation
page read and write
224DA755000
trusted library allocation
page read and write
224DA27E000
heap
page read and write
224DB91F000
trusted library allocation
page read and write
224DD120000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224DDC28000
trusted library allocation
page read and write
224DA0C7000
trusted library allocation
page read and write
224E52B7000
trusted library allocation
page read and write
224D7EE9000
trusted library allocation
page read and write
224DB88F000
trusted library allocation
page read and write
224DBC1A000
trusted library allocation
page read and write
224E2286000
trusted library allocation
page read and write
224DBC29000
trusted library allocation
page read and write
224DDC13000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
224DB5E7000
trusted library allocation
page read and write
224DDC42000
trusted library allocation
page read and write
2BBC3381000
trusted library allocation
page read and write
224E372F000
trusted library allocation
page read and write
2BBC39D0000
trusted library allocation
page read and write
2BBC39B6000
heap
page read and write
224DA0EB000
trusted library allocation
page read and write
224E27FA000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DA2CA000
heap
page read and write
224DCDB9000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224E3799000
trusted library allocation
page read and write
224E22D1000
trusted library allocation
page read and write
224E25D1000
trusted library allocation
page read and write
224DB569000
trusted library allocation
page read and write
224DC55E000
trusted library allocation
page read and write
224DB9A8000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DB5D7000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224E26EB000
trusted library allocation
page read and write
224DBDD6000
trusted library allocation
page read and write
224E2E2F000
trusted library allocation
page read and write
224DBDF8000
trusted library allocation
page read and write
224DB6ED000
trusted library allocation
page read and write
224DAA9F000
trusted library allocation
page read and write
224DBA6C000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224E2911000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
13BF000
stack
page read and write
224D12A6000
heap
page read and write
224E4BF5000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DB545000
trusted library allocation
page read and write
2BBC3978000
heap
page read and write
1BA07407000
trusted library allocation
page read and write
1BA06D69000
remote allocation
page execute read
224E66BA000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224E52DB000
trusted library allocation
page read and write
224DCDC3000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224E6426000
trusted library allocation
page read and write
224DA75B000
trusted library allocation
page read and write
224DCD76000
trusted library allocation
page read and write
224D872A000
trusted library allocation
page read and write
224E4C1D000
trusted library allocation
page read and write
2BBC395A000
heap
page read and write
224D737D000
trusted library allocation
page read and write
224DB6B4000
trusted library allocation
page read and write
20A24623000
trusted library allocation
page read and write
224DE543000
trusted library allocation
page read and write
224D7EC7000
trusted library allocation
page read and write
224E5265000
trusted library allocation
page read and write
224DA27F000
heap
page read and write
224DC467000
trusted library allocation
page read and write
224DBDE4000
trusted library allocation
page read and write
224DC5A3000
trusted library allocation
page read and write
224DC856000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DB7AA000
trusted library allocation
page read and write
224E2985000
trusted library allocation
page read and write
224E2236000
trusted library allocation
page read and write
224DA56B000
trusted library allocation
page read and write
224DBF65000
trusted library allocation
page read and write
224DDC09000
trusted library allocation
page read and write
224E5290000
trusted library allocation
page read and write
224E2E7F000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
224E26ED000
trusted library allocation
page read and write
224DA28E000
heap
page read and write
224E2DFA000
trusted library allocation
page read and write
224DDC19000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224E266F000
trusted library allocation
page read and write
224E4DEC000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBBEC000
trusted library allocation
page read and write
224DBFDA000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224E3759000
trusted library allocation
page read and write
20A24600000
trusted library allocation
page read and write
224E2276000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224E3A28000
trusted library allocation
page read and write
224D63C5000
trusted library allocation
page read and write
2BBC396C000
heap
page read and write
224DDD4A000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224DC5E9000
trusted library allocation
page read and write
224D1304000
heap
page read and write
224DDDBA000
trusted library allocation
page read and write
224D5C90000
trusted library allocation
page read and write
224E26C1000
trusted library allocation
page read and write
A00000
heap
page read and write
224D12A0000
heap
page read and write
224E4D98000
trusted library allocation
page read and write
224E23B7000
trusted library allocation
page read and write
224DBC66000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224D12EF000
heap
page read and write
224DB91F000
trusted library allocation
page read and write
224DB5C3000
trusted library allocation
page read and write
224DB60B000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DDD81000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DD1BB000
trusted library allocation
page read and write
224DC380000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224D12EF000
heap
page read and write
224DBCD8000
trusted library allocation
page read and write
224DBFAA000
trusted library allocation
page read and write
224DB354000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224E52B7000
trusted library allocation
page read and write
224DB668000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224DC3E8000
trusted library allocation
page read and write
331B2DDB000
trusted library allocation
page execute read
2BBC38C0000
heap
page read and write
224DDCA3000
trusted library allocation
page read and write
2119BFE000
stack
page read and write
224DB922000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224E2628000
trusted library allocation
page read and write
224D738A000
trusted library allocation
page read and write
224DA2E4000
heap
page read and write
224DDCAF000
trusted library allocation
page read and write
224DCDAE000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
2BBC2F80000
heap
page readonly
224D12B0000
heap
page read and write
224DB924000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
20A24673000
trusted library allocation
page read and write
224E27E0000
trusted library allocation
page read and write
224E451E000
trusted library allocation
page read and write
224DDC65000
trusted library allocation
page read and write
224D7360000
trusted library allocation
page read and write
224DDC20000
trusted library allocation
page read and write
224DBCBA000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DBF13000
trusted library allocation
page read and write
224DA282000
heap
page read and write
224DBDF8000
trusted library allocation
page read and write
224DBFDC000
trusted library allocation
page read and write
224DB772000
trusted library allocation
page read and write
224E26D5000
trusted library allocation
page read and write
224E3A99000
trusted library allocation
page read and write
224E29A0000
trusted library allocation
page read and write
224DB763000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
224E3790000
trusted library allocation
page read and write
224DBBD7000
trusted library allocation
page read and write
224DBBEC000
trusted library allocation
page read and write
224DBBAC000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224DA5F5000
trusted library allocation
page read and write
224D5CCD000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
1BA07111000
trusted library allocation
page read and write
224E26ED000
trusted library allocation
page read and write
224DB66B000
trusted library allocation
page read and write
224DAAF2000
trusted library allocation
page read and write
224DBBAC000
trusted library allocation
page read and write
224E2985000
trusted library allocation
page read and write
224DB75D000
trusted library allocation
page read and write
B14000
heap
page read and write
224E23E2000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
1BA07130000
trusted library allocation
page read and write
2BBC395A000
heap
page read and write
224D8765000
trusted library allocation
page read and write
2BBC3934000
heap
page read and write
224DC378000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E6BE1000
heap
page read and write
224D637D000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DA74D000
trusted library allocation
page read and write
224E52B0000
trusted library allocation
page read and write
150B000
heap
page read and write
224DB893000
trusted library allocation
page read and write
224DA284000
heap
page read and write
224DA556000
trusted library allocation
page read and write
224E25DC000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
224E5B61000
trusted library allocation
page read and write
224DB977000
trusted library allocation
page read and write
20A246A3000
trusted library allocation
page read and write
224E4D67000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DA681000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DC3F1000
trusted library allocation
page read and write
224DA7B1000
trusted library allocation
page read and write
1512000
heap
page read and write
224DA285000
heap
page read and write
224DBD5F000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DBF1F000
trusted library allocation
page read and write
1FAB6AFA000
heap
page read and write
224DA54D000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224DC32C000
trusted library allocation
page read and write
224DE500000
trusted library allocation
page read and write
224E3A96000
trusted library allocation
page read and write
5F9D33E000
unkown
page readonly
224E25ED000
trusted library allocation
page read and write
224DBD27000
trusted library allocation
page read and write
224DA0C3000
trusted library allocation
page read and write
224E6B3F000
heap
page read and write
224DCDCD000
trusted library allocation
page read and write
224E2DC6000
trusted library allocation
page read and write
224E6789000
trusted library allocation
page read and write
224D7EAE000
trusted library allocation
page read and write
224DB86B000
trusted library allocation
page read and write
224E5157000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E2ED8000
trusted library allocation
page read and write
224D12C2000
heap
page read and write
224E3A3E000
trusted library allocation
page read and write
224E24CD000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DBB9F000
trusted library allocation
page read and write
224DDCEB000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E4EC1000
trusted library allocation
page read and write
224DB9D3000
trusted library allocation
page read and write
224E27C7000
trusted library allocation
page read and write
224E2723000
trusted library allocation
page read and write
224DBB5C000
trusted library allocation
page read and write
224E3A6C000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
1BA0718F000
trusted library allocation
page read and write
224E26EB000
trusted library allocation
page read and write
224E24AF000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E51A8000
trusted library allocation
page read and write
224DC7FB000
trusted library allocation
page read and write
224DA58E000
trusted library allocation
page read and write
224DA787000
trusted library allocation
page read and write
224DDD2A000
trusted library allocation
page read and write
224DA284000
heap
page read and write
224E2238000
trusted library allocation
page read and write
224DBABA000
trusted library allocation
page read and write
2BBC3939000
heap
page read and write
211A3FE000
stack
page read and write
224DB79C000
trusted library allocation
page read and write
224DBDDA000
trusted library allocation
page read and write
224DB5D7000
trusted library allocation
page read and write
224DBBFB000
trusted library allocation
page read and write
224E4C20000
trusted library allocation
page read and write
224E37BB000
trusted library allocation
page read and write
224DBFD6000
trusted library allocation
page read and write
224E26E0000
trusted library allocation
page read and write
224E262E000
trusted library allocation
page read and write
224E5B83000
trusted library allocation
page read and write
224E52A4000
trusted library allocation
page read and write
224E219F000
trusted library allocation
page read and write
224D7EE9000
trusted library allocation
page read and write
224E4C91000
trusted library allocation
page read and write
224DC443000
trusted library allocation
page read and write
224DBD5F000
trusted library allocation
page read and write
224DB676000
trusted library allocation
page read and write
224DA07C000
trusted library allocation
page read and write
224E23EA000
trusted library allocation
page read and write
224D7EC7000
trusted library allocation
page read and write
224DBCF3000
trusted library allocation
page read and write
224DBFFD000
trusted library allocation
page read and write
1BA06CF0000
unclassified section
page readonly
1BA0710C000
trusted library allocation
page read and write
224D12CB000
heap
page read and write
20A24679000
trusted library allocation
page read and write
224E4DB3000
trusted library allocation
page read and write
224E26ED000
trusted library allocation
page read and write
224D7EA5000
trusted library allocation
page read and write
1BA071C4000
trusted library allocation
page read and write
224D8765000
trusted library allocation
page read and write
224E296F000
trusted library allocation
page read and write
2BBC393C000
heap
page read and write
224DBBFB000
trusted library allocation
page read and write
224DA653000
trusted library allocation
page read and write
224DB5F9000
trusted library allocation
page read and write
224DA03C000
trusted library allocation
page read and write
224DA03F000
trusted library allocation
page read and write
224E25BE000
trusted library allocation
page read and write
224DA2D6000
heap
page read and write
20A2441B000
trusted library allocation
page read and write
224DBDA7000
trusted library allocation
page read and write
20A24710000
heap
page read and write
224E2665000
trusted library allocation
page read and write
224E245B000
trusted library allocation
page read and write
224E4D5D000
trusted library allocation
page read and write
20A24300000
trusted library allocation
page read and write
224DC579000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224D129E000
heap
page read and write
14578A90000
heap
page read and write
2BBC30B0000
unclassified section
page read and write
224DC4F9000
trusted library allocation
page read and write
224DC7CE000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224DA020000
trusted library allocation
page read and write
224DBC3C000
trusted library allocation
page read and write
1FAB86AC000
heap
page read and write
224DA7A3000
trusted library allocation
page read and write
224DB653000
trusted library allocation
page read and write
224E37BE000
trusted library allocation
page read and write
1FAB6E00000
trusted library allocation
page read and write
2BBC33F3000
trusted library allocation
page read and write
20A246C9000
trusted library allocation
page read and write
20A2465D000
trusted library allocation
page read and write
224DB6B1000
trusted library allocation
page read and write
224D7EBE000
trusted library allocation
page read and write
224E26E4000
trusted library allocation
page read and write
224DBDFB000
trusted library allocation
page read and write
224D73B2000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D7EA7000
trusted library allocation
page read and write
224E2983000
trusted library allocation
page read and write
224DDD95000
trusted library allocation
page read and write
B7FDC7E000
unkown
page readonly
224DBBFE000
trusted library allocation
page read and write
224E2473000
trusted library allocation
page read and write
224DB81D000
trusted library allocation
page read and write
224E29F7000
trusted library allocation
page read and write
145789A0000
heap
page read and write
224D12C5000
heap
page read and write
224DDD7A000
trusted library allocation
page read and write
224DB545000
trusted library allocation
page read and write
224DBB6F000
trusted library allocation
page read and write
224DD1BB000
trusted library allocation
page read and write
224E2471000
trusted library allocation
page read and write
224DA245000
heap
page read and write
224DC89D000
trusted library allocation
page read and write
224DDDA6000
trusted library allocation
page read and write
224DBABC000
trusted library allocation
page read and write
224DC305000
trusted library allocation
page read and write
224DB961000
trusted library allocation
page read and write
20A23F10000
unclassified section
page readonly
224E2631000
trusted library allocation
page read and write
224DB6E0000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DA57B000
trusted library allocation
page read and write
224E3790000
trusted library allocation
page read and write
2BBC3E14000
trusted library allocation
page read and write
2BBC3933000
heap
page read and write
224DDC32000
trusted library allocation
page read and write
224E3790000
trusted library allocation
page read and write
224DB765000
trusted library allocation
page read and write
224DBDC3000
trusted library allocation
page read and write
224DBB5D000
trusted library allocation
page read and write
224D73A8000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224E3A4E000
trusted library allocation
page read and write
1BA06FA0000
unclassified section
page readonly
224E2367000
trusted library allocation
page read and write
224DD13E000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
224DBFD7000
trusted library allocation
page read and write
224DD1BE000
trusted library allocation
page read and write
224DA68B000
trusted library allocation
page read and write
224E4C75000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
2BBC3F45000
heap
page read and write
224E23EC000
trusted library allocation
page read and write
224DBDC6000
trusted library allocation
page read and write
224DBC50000
trusted library allocation
page read and write
224DB7FB000
trusted library allocation
page read and write
224DB6EB000
trusted library allocation
page read and write
224E64F8000
trusted library allocation
page read and write
224D7E0A000
trusted library allocation
page read and write
224DE453000
trusted library allocation
page read and write
224DBDDA000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224E6B07000
heap
page read and write
224DA2D4000
heap
page read and write
224D12ED000
heap
page read and write
224DBF19000
trusted library allocation
page read and write
224DB73A000
trusted library allocation
page read and write
224DC87E000
trusted library allocation
page read and write
2BBC3930000
heap
page read and write
20A24052000
unclassified section
page read and write
224DA2D4000
heap
page read and write
224E26E4000
trusted library allocation
page read and write
224DBD32000
trusted library allocation
page read and write
224DB989000
trusted library allocation
page read and write
224DDD1B000
trusted library allocation
page read and write
224D12C5000
heap
page read and write
224E643B000
trusted library allocation
page read and write
224DB9AC000
trusted library allocation
page read and write
224DA0FB000
trusted library allocation
page read and write
224DB540000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224D12A6000
heap
page read and write
224D73D9000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224E524A000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224DDC4E000
trusted library allocation
page read and write
224E52DB000
trusted library allocation
page read and write
224E224A000
trusted library allocation
page read and write
224DA2BA000
heap
page read and write
224DBF1F000
trusted library allocation
page read and write
224E2EF1000
trusted library allocation
page read and write
224D1300000
heap
page read and write
224E374E000
trusted library allocation
page read and write
224D7E77000
trusted library allocation
page read and write
224DCCCC000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224D129F000
heap
page read and write
3CBBC641E000
trusted library allocation
page read and write
224DDCFB000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E6B07000
heap
page read and write
2BBC33E9000
trusted library allocation
page read and write
2BBC3E00000
trusted library allocation
page read and write
224DBC8B000
trusted library allocation
page read and write
224E2660000
trusted library allocation
page read and write
224E4D3E000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DB3A6000
trusted library allocation
page read and write
224DA7D8000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E6B26000
heap
page read and write
2BBC3F77000
heap
page read and write
224E24AB000
trusted library allocation
page read and write
224E376B000
trusted library allocation
page read and write
224DB3ED000
trusted library allocation
page read and write
224E4FB4000
trusted library allocation
page read and write
224E27BF000
trusted library allocation
page read and write
1BA07177000
trusted library allocation
page read and write
224DC484000
trusted library allocation
page read and write
151F000
heap
page read and write
224DC344000
trusted library allocation
page read and write
224DC339000
trusted library allocation
page read and write
224D7ECB000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
224E5289000
trusted library allocation
page read and write
224DCCC5000
trusted library allocation
page read and write
224E4F61000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224DB9A6000
trusted library allocation
page read and write
B7FFC7E000
unkown
page readonly
224E5E80000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DCE00000
trusted library allocation
page read and write
224DBD45000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DB5C3000
trusted library allocation
page read and write
224DB5E7000
trusted library allocation
page read and write
224DB7A5000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224E26E7000
trusted library allocation
page read and write
224E22EB000
trusted library allocation
page read and write
224DB6A8000
trusted library allocation
page read and write
224D12C5000
heap
page read and write
224D1330000
heap
page read and write
224D12C7000
heap
page read and write
224D12CB000
heap
page read and write
224D73AD000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA684000
trusted library allocation
page read and write
224E22E0000
trusted library allocation
page read and write
224DBBDB000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224D130D000
heap
page read and write
224DB95F000
trusted library allocation
page read and write
151F000
heap
page read and write
224DA28E000
heap
page read and write
224DB668000
trusted library allocation
page read and write
224DDCE9000
trusted library allocation
page read and write
224DB7BA000
trusted library allocation
page read and write
224DA272000
heap
page read and write
224DC5CC000
trusted library allocation
page read and write
224DA0FB000
trusted library allocation
page read and write
224DDDAE000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224D87A9000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224E51FE000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224E2EE6000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DD1F7000
trusted library allocation
page read and write
224E2E2F000
trusted library allocation
page read and write
224E27FD000
trusted library allocation
page read and write
224DB30A000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224E2DF6000
trusted library allocation
page read and write
224E2267000
trusted library allocation
page read and write
224DBA82000
trusted library allocation
page read and write
224DC367000
trusted library allocation
page read and write
224E3F00000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
2BBC2ED0000
unclassified section
page readonly
224DB859000
trusted library allocation
page read and write
224D7EBE000
trusted library allocation
page read and write
224DC7F3000
trusted library allocation
page read and write
224DA400000
trusted library allocation
page read and write
224E4D2C000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DA57B000
trusted library allocation
page read and write
224DCD78000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
B10000
heap
page read and write
224E4BF4000
trusted library allocation
page read and write
224DB6BF000
trusted library allocation
page read and write
224E29AB000
trusted library allocation
page read and write
224DCDC5000
trusted library allocation
page read and write
224E25F6000
trusted library allocation
page read and write
224DBDA4000
trusted library allocation
page read and write
20A24603000
trusted library allocation
page read and write
224DB91B000
trusted library allocation
page read and write
224DCDA2000
trusted library allocation
page read and write
224DBC1E000
trusted library allocation
page read and write
224DC467000
trusted library allocation
page read and write
224E4F18000
trusted library allocation
page read and write
224DA794000
trusted library allocation
page read and write
224DC55E000
trusted library allocation
page read and write
224D63A5000
trusted library allocation
page read and write
2BBC394F000
heap
page read and write
224DA03C000
trusted library allocation
page read and write
224E6B71000
heap
page read and write
224DBAE3000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DC49E000
trusted library allocation
page read and write
224E22D7000
trusted library allocation
page read and write
224DBB0E000
trusted library allocation
page read and write
224DBACC000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DA56D000
trusted library allocation
page read and write
224E52B7000
trusted library allocation
page read and write
2BBC39B3000
heap
page read and write
224DB397000
trusted library allocation
page read and write
224DB6E0000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
3C8BFE000
stack
page read and write
224E27D1000
trusted library allocation
page read and write
224DA063000
trusted library allocation
page read and write
224DC486000
trusted library allocation
page read and write
224E2644000
trusted library allocation
page read and write
224DA27F000
heap
page read and write
224DBCF8000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
224E24A3000
trusted library allocation
page read and write
224E643D000
trusted library allocation
page read and write
224E37C4000
trusted library allocation
page read and write
224E22ED000
trusted library allocation
page read and write
224DA7C9000
trusted library allocation
page read and write
B7FEC7E000
unkown
page readonly
3A01000
heap
page read and write
20A24610000
trusted library allocation
page read and write
224DBBC4000
trusted library allocation
page read and write
224E647B000
trusted library allocation
page read and write
224DB394000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224DA75D000
trusted library allocation
page read and write
2BBC3F58000
heap
page read and write
224DA28E000
heap
page read and write
224DC8A6000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224E37FA000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224DB5F9000
trusted library allocation
page read and write
224DA296000
heap
page read and write
224DCDCD000
trusted library allocation
page read and write
224E3AF7000
trusted library allocation
page read and write
224D12C7000
heap
page read and write
224DB8A0000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224E37CD000
trusted library allocation
page read and write
224E4D10000
trusted library allocation
page read and write
224E4D52000
trusted library allocation
page read and write
224DC7C8000
trusted library allocation
page read and write
2BBC335C000
trusted library allocation
page read and write
224D12C7000
heap
page read and write
224E4E6C000
trusted library allocation
page read and write
224D7E33000
trusted library allocation
page read and write
2BBC3F58000
heap
page read and write
224E29BC000
trusted library allocation
page read and write
224D73B1000
trusted library allocation
page read and write
224E4D2C000
trusted library allocation
page read and write
224DBBC5000
trusted library allocation
page read and write
224DBDA7000
trusted library allocation
page read and write
5F9E43E000
unkown
page readonly
2BBC3F58000
heap
page read and write
224E6B01000
heap
page read and write
224DA660000
trusted library allocation
page read and write
224E235B000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DC46E000
trusted library allocation
page read and write
20DE000
stack
page read and write
224DB621000
trusted library allocation
page read and write
224E52A4000
trusted library allocation
page read and write
224DC7CC000
trusted library allocation
page read and write
224DB76A000
trusted library allocation
page read and write
224E21CC000
trusted library allocation
page read and write
224DB968000
trusted library allocation
page read and write
2BBC3F77000
heap
page read and write
20A24700000
heap
page read and write
224DA787000
trusted library allocation
page read and write
224DC5C7000
trusted library allocation
page read and write
224E2619000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DA0AB000
trusted library allocation
page read and write
224DB964000
trusted library allocation
page read and write
224E52DB000
trusted library allocation
page read and write
224DB95D000
trusted library allocation
page read and write
224DBD3E000
trusted library allocation
page read and write
224DBD37000
trusted library allocation
page read and write
224E37F3000
trusted library allocation
page read and write
2BBC32D0000
heap
page read and write
224DBBF4000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224E4D5D000
trusted library allocation
page read and write
224DBB54000
trusted library allocation
page read and write
224E3797000
trusted library allocation
page read and write
20A24060000
heap
page read and write
224D6271000
trusted library allocation
page read and write
224DBF65000
trusted library allocation
page read and write
224E3A23000
trusted library allocation
page read and write
224DBDAE000
trusted library allocation
page read and write
224DBDFD000
trusted library allocation
page read and write
224DA283000
heap
page read and write
224DB93C000
trusted library allocation
page read and write
224DB922000
trusted library allocation
page read and write
224DCDAC000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224D129E000
heap
page read and write
224E3A28000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DC339000
trusted library allocation
page read and write
5F9D3FE000
stack
page read and write
224DB51E000
trusted library allocation
page read and write
224E2455000
trusted library allocation
page read and write
2BBC39B1000
heap
page read and write
224DA5BB000
trusted library allocation
page read and write
224E5B27000
trusted library allocation
page read and write
224D7EE6000
trusted library allocation
page read and write
224DC4CC000
trusted library allocation
page read and write
224DB593000
trusted library allocation
page read and write
224DB5D7000
trusted library allocation
page read and write
224DB3E6000
trusted library allocation
page read and write
224D7EA0000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224DA688000
trusted library allocation
page read and write
224DB721000
trusted library allocation
page read and write
224E372C000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DA05A000
trusted library allocation
page read and write
224D1308000
heap
page read and write
5F9F43E000
unkown
page readonly
224D12ED000
heap
page read and write
224D73D9000
trusted library allocation
page read and write
224DCDD6000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DC4FB000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DBBEE000
trusted library allocation
page read and write
224DBFF0000
trusted library allocation
page read and write
224D5CC7000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224E26C8000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224DBC89000
trusted library allocation
page read and write
224DC367000
trusted library allocation
page read and write
224DBD3E000
trusted library allocation
page read and write
224E211D000
trusted library allocation
page read and write
224DA272000
heap
page read and write
224E4D47000
trusted library allocation
page read and write
2BBC3F29000
heap
page read and write
224DB69A000
trusted library allocation
page read and write
224DD161000
trusted library allocation
page read and write
224E2DF4000
trusted library allocation
page read and write
224D132E000
heap
page read and write
224E29E3000
trusted library allocation
page read and write
224E51F8000
trusted library allocation
page read and write
224DB381000
trusted library allocation
page read and write
224DA29C000
heap
page read and write
224DBDDA000
trusted library allocation
page read and write
2BBC3374000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E3A30000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D12A0000
heap
page read and write
5F9C1FE000
unkown
page readonly
224D1308000
heap
page read and write
224D12EF000
heap
page read and write
224DB61D000
trusted library allocation
page read and write
224DBD4A000
trusted library allocation
page read and write
224DC7D9000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DBB5A000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DB79F000
trusted library allocation
page read and write
BFC000
unkown
page readonly
224DC3F8000
trusted library allocation
page read and write
224DBCB5000
trusted library allocation
page read and write
224DD1DF000
trusted library allocation
page read and write
224D7360000
trusted library allocation
page read and write
224DBBD7000
trusted library allocation
page read and write
224DC5CC000
trusted library allocation
page read and write
224E37BE000
trusted library allocation
page read and write
224E23E2000
trusted library allocation
page read and write
224DA2E4000
heap
page read and write
2BBC39B3000
heap
page read and write
224DA2D4000
heap
page read and write
224DA06D000
trusted library allocation
page read and write
224DC7F0000
trusted library allocation
page read and write
224D7EA7000
trusted library allocation
page read and write
224D8755000
trusted library allocation
page read and write
224DC348000
trusted library allocation
page read and write
224D1300000
heap
page read and write
224D1310000
heap
page read and write
224DBDFD000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224DBF1F000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
2BBC3971000
heap
page read and write
224DBDD3000
trusted library allocation
page read and write
224DBB74000
trusted library allocation
page read and write
224D12AE000
heap
page read and write
224E2549000
trusted library allocation
page read and write
224E3A93000
trusted library allocation
page read and write
20A24694000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224E29AE000
trusted library allocation
page read and write
224E2477000
trusted library allocation
page read and write
224E29B9000
trusted library allocation
page read and write
224E2E6F000
trusted library allocation
page read and write
224E25D0000
trusted library allocation
page read and write
B14000
heap
page read and write
224D130D000
heap
page read and write
224DA027000
trusted library allocation
page read and write
224E2696000
trusted library allocation
page read and write
224E27FD000
trusted library allocation
page read and write
224DCDE3000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224DBBCA000
trusted library allocation
page read and write
224DBB58000
trusted library allocation
page read and write
224E2922000
trusted library allocation
page read and write
224DD1A7000
trusted library allocation
page read and write
224DA27E000
heap
page read and write
224DBB6A000
trusted library allocation
page read and write
224E3A92000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224DBD5F000
trusted library allocation
page read and write
224DA685000
trusted library allocation
page read and write
224E4D2C000
trusted library allocation
page read and write
224DDDB5000
trusted library allocation
page read and write
224DC4D6000
trusted library allocation
page read and write
E6D97FE000
unkown
page readonly
224DB9A6000
trusted library allocation
page read and write
224D7ECE000
trusted library allocation
page read and write
224E247B000
trusted library allocation
page read and write
224E3A26000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DA06D000
trusted library allocation
page read and write
B14000
heap
page read and write
224E2DFA000
trusted library allocation
page read and write
224DB540000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
2BBC393C000
heap
page read and write
224DA27E000
heap
page read and write
224DBFDE000
trusted library allocation
page read and write
224DB66F000
trusted library allocation
page read and write
224DB674000
trusted library allocation
page read and write
224E29A2000
trusted library allocation
page read and write
1FAB6AC0000
heap
page read and write
224E2EFB000
trusted library allocation
page read and write
224DBFC5000
trusted library allocation
page read and write
224E5250000
trusted library allocation
page read and write
224E2644000
trusted library allocation
page read and write
224DB30D000
trusted library allocation
page read and write
224DC367000
trusted library allocation
page read and write
224D1304000
heap
page read and write
224DBDAE000
trusted library allocation
page read and write
224DBC8B000
trusted library allocation
page read and write
224E4332000
trusted library allocation
page read and write
224DB6C3000
trusted library allocation
page read and write
224D7E62000
trusted library allocation
page read and write
224DB447000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
1BA071A6000
trusted library allocation
page read and write
224DDD6E000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224D1335000
heap
page read and write
224E2626000
trusted library allocation
page read and write
224DB970000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224D12FE000
heap
page read and write
1BA0750C000
trusted library allocation
page read and write
224E26D5000
trusted library allocation
page read and write
224DBC3A000
trusted library allocation
page read and write
224DD1D7000
trusted library allocation
page read and write
B7FB96E000
unkown
page readonly
224DDCCB000
trusted library allocation
page read and write
14E0000
heap
page read and write
224DDD84000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224DA0A8000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DB87D000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA556000
trusted library allocation
page read and write
224D7EE2000
trusted library allocation
page read and write
2BBC3300000
trusted library allocation
page read and write
224E26ED000
trusted library allocation
page read and write
224DDCEB000
trusted library allocation
page read and write
2BBC39B6000
heap
page read and write
224DBA78000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DA584000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
2BBC3930000
heap
page read and write
224E6423000
trusted library allocation
page read and write
224E4300000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224DB6E0000
trusted library allocation
page read and write
224E215E000
trusted library allocation
page read and write
224E4316000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
224DA296000
heap
page read and write
224DCDCB000
trusted library allocation
page read and write
20A24419000
trusted library allocation
page read and write
224DB638000
trusted library allocation
page read and write
224DBA4C000
trusted library allocation
page read and write
1BA06D50000
remote allocation
page read and write
224DA54A000
trusted library allocation
page read and write
1BA06F1F000
unclassified section
page read and write
1BA07172000
trusted library allocation
page read and write
224DB5D7000
trusted library allocation
page read and write
224DB983000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224D12F5000
heap
page read and write
224DBAE5000
trusted library allocation
page read and write
224DA798000
trusted library allocation
page read and write
224DB91F000
trusted library allocation
page read and write
224D73CE000
trusted library allocation
page read and write
224DC3B8000
trusted library allocation
page read and write
224DA285000
heap
page read and write
224DB76C000
trusted library allocation
page read and write
20A24407000
trusted library allocation
page read and write
224DA06F000
trusted library allocation
page read and write
224E26C8000
trusted library allocation
page read and write
224DBD27000
trusted library allocation
page read and write
2BBC335F000
trusted library allocation
page read and write
224DA25F000
heap
page read and write
224E51FC000
trusted library allocation
page read and write
224D7EC7000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
20A24660000
trusted library allocation
page read and write
224E4CFD000
trusted library allocation
page read and write
224DAAF3000
trusted library allocation
page read and write
224E37BB000
trusted library allocation
page read and write
224E2505000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224DB52F000
trusted library allocation
page read and write
224DBFB1000
trusted library allocation
page read and write
224DDDBE000
trusted library allocation
page read and write
224DBF20000
trusted library allocation
page read and write
3C7BFF000
stack
page read and write
224DB67E000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224D7E64000
trusted library allocation
page read and write
224E4FFC000
trusted library allocation
page read and write
224E22A7000
trusted library allocation
page read and write
224DB8D2000
trusted library allocation
page read and write
2BBC332F000
trusted library allocation
page read and write
224DBFD9000
trusted library allocation
page read and write
224DBDCB000
trusted library allocation
page read and write
1BA06D70000
unclassified section
page readonly
2BBC33C7000
trusted library allocation
page read and write
224E24FD000
trusted library allocation
page read and write
224D12A2000
heap
page read and write
224D87C4000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
2BBC3F77000
heap
page read and write
224E29BD000
trusted library allocation
page read and write
224DEF01000
trusted library allocation
page read and write
224DAAE2000
trusted library allocation
page read and write
224E2668000
trusted library allocation
page read and write
224DA7FB000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DD14C000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224E2DE6000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
224DC4E1000
trusted library allocation
page read and write
224E51FA000
trusted library allocation
page read and write
224E298B000
trusted library allocation
page read and write
331B2D41000
trusted library allocation
page execute read
224DB529000
trusted library allocation
page read and write
224DC7F6000
trusted library allocation
page read and write
224E4CAC000
trusted library allocation
page read and write
224DB917000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224D12EF000
heap
page read and write
224DBC3C000
trusted library allocation
page read and write
2BBC3F58000
heap
page read and write
224DB526000
trusted library allocation
page read and write
224E4BEF000
trusted library allocation
page read and write
224DA285000
heap
page read and write
224DA79A000
trusted library allocation
page read and write
20A246E8000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224D12FF000
heap
page read and write
224D12AF000
heap
page read and write
224D7EE2000
trusted library allocation
page read and write
224E2989000
trusted library allocation
page read and write
224E6478000
trusted library allocation
page read and write
224E3797000
trusted library allocation
page read and write
1FAB6E0A000
trusted library allocation
page read and write
224DCDD8000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224E2626000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224DB6FA000
trusted library allocation
page read and write
224E2233000
trusted library allocation
page read and write
2BBC3303000
trusted library allocation
page read and write
224E2610000
trusted library allocation
page read and write
224E25DE000
trusted library allocation
page read and write
224E6470000
trusted library allocation
page read and write
224D7EAE000
trusted library allocation
page read and write
224E299E000
trusted library allocation
page read and write
224E4BFC000
trusted library allocation
page read and write
224DBDC6000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DA69C000
trusted library allocation
page read and write
224D9D93000
trusted library allocation
page read and write
224DCDAC000
trusted library allocation
page read and write
2118BFF000
stack
page read and write
224DBC02000
trusted library allocation
page read and write
224DA275000
heap
page read and write
224DBDDA000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
5F9C2B8000
stack
page read and write
224DB819000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E2739000
trusted library allocation
page read and write
14578B41000
heap
page read and write
224E5250000
trusted library allocation
page read and write
224E26CC000
trusted library allocation
page read and write
224DA073000
trusted library allocation
page read and write
224D12FF000
heap
page read and write
224D12A0000
heap
page read and write
2BBC2F90000
heap
page read and write
224DC5C7000
trusted library allocation
page read and write
224DB69A000
trusted library allocation
page read and write
224E29AD000
trusted library allocation
page read and write
224DB6AD000
trusted library allocation
page read and write
224E6B8C000
heap
page read and write
224DA682000
trusted library allocation
page read and write
224DA275000
heap
page read and write
224DB8D9000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224D63A0000
trusted library allocation
page read and write
224DCCD7000
trusted library allocation
page read and write
224DBCCC000
trusted library allocation
page read and write
224E2DF1000
trusted library allocation
page read and write
224E236B000
trusted library allocation
page read and write
224DE761000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
1FAB6D70000
heap
page read and write
224E29A5000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DB958000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DB737000
trusted library allocation
page read and write
224E2353000
trusted library allocation
page read and write
224DA66F000
trusted library allocation
page read and write
224D876E000
trusted library allocation
page read and write
224E3A20000
trusted library allocation
page read and write
C22000
unkown
page readonly
2BBC3348000
trusted library allocation
page read and write
224DD1EF000
trusted library allocation
page read and write
224E6785000
trusted library allocation
page read and write
224E4DDD000
trusted library allocation
page read and write
224DB56F000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224E4F5C000
trusted library allocation
page read and write
1FAB6AF2000
heap
page read and write
224E3AA2000
trusted library allocation
page read and write
224DBBD7000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224DB32B000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DBF9F000
trusted library allocation
page read and write
224E4BA1000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
224E25F6000
trusted library allocation
page read and write
224DC3AF000
trusted library allocation
page read and write
224D7E1D000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DC3B0000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DB5E7000
trusted library allocation
page read and write
224E2567000
trusted library allocation
page read and write
224DBC13000
trusted library allocation
page read and write
224DCDC3000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DB695000
trusted library allocation
page read and write
224DA285000
heap
page read and write
20A2467B000
trusted library allocation
page read and write
224DBCE9000
trusted library allocation
page read and write
224DBB58000
trusted library allocation
page read and write
224DBF20000
trusted library allocation
page read and write
B7FB9AD000
stack
page read and write
224E25ED000
trusted library allocation
page read and write
224DC385000
trusted library allocation
page read and write
224E3797000
trusted library allocation
page read and write
E6DB8BE000
unkown
page readonly
21A9C5703000
trusted library allocation
page read and write
224DC88E000
trusted library allocation
page read and write
224E29A4000
trusted library allocation
page read and write
224D1314000
heap
page read and write
224D12A0000
heap
page read and write
224E297B000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224D63C2000
trusted library allocation
page read and write
1527000
heap
page read and write
B14000
heap
page read and write
224DBC82000
trusted library allocation
page read and write
224DA2D4000
heap
page read and write
224DDCD8000
trusted library allocation
page read and write
1BA07166000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
224DA272000
heap
page read and write
224DC560000
trusted library allocation
page read and write
224E4D6F000
trusted library allocation
page read and write
224DCDAA000
trusted library allocation
page read and write
224DB4D0000
trusted library allocation
page read and write
224D7EE2000
trusted library allocation
page read and write
224D631A000
trusted library allocation
page read and write
224E23EA000
trusted library allocation
page read and write
224E3B00000
trusted library allocation
page read and write
224D5C84000
trusted library allocation
page read and write
224E22ED000
trusted library allocation
page read and write
2BBC3F44000
heap
page read and write
1FAB6AF3000
heap
page read and write
224D12F6000
heap
page read and write
224DB95F000
trusted library allocation
page read and write
224D9DA7000
trusted library allocation
page read and write
224D9DF3000
trusted library allocation
page read and write
20A24283000
heap
page read and write
2BBC38BB000
unkown
page execute read
224D12F8000
heap
page read and write
2BBC394D000
heap
page read and write
224E2EE3000
trusted library allocation
page read and write
224E647A000
trusted library allocation
page read and write
1BA07117000
trusted library allocation
page read and write
224DA73B000
trusted library allocation
page read and write
224E22EB000
trusted library allocation
page read and write
224DC5D0000
trusted library allocation
page read and write
224E29EC000
trusted library allocation
page read and write
224DBD7E000
trusted library allocation
page read and write
224DA2D6000
heap
page read and write
E6D8FFE000
stack
page read and write
224E29AF000
trusted library allocation
page read and write
2BBC2F9A000
heap
page read and write
224DDDF6000
trusted library allocation
page read and write
224E2361000
trusted library allocation
page read and write
224D9DFB000
trusted library allocation
page read and write
21173FF000
stack
page read and write
224E64E1000
trusted library allocation
page read and write
224E2475000
trusted library allocation
page read and write
20A24614000
trusted library allocation
page read and write
224CA1EF000
heap
page read and write
2BBC3F21000
heap
page read and write
224DB53B000
trusted library allocation
page read and write
224E6449000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
224E5001000
trusted library allocation
page read and write
224DB9FC000
trusted library allocation
page read and write
224D638D000
trusted library allocation
page read and write
224D7EAE000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
20A23F00000
unclassified section
page readonly
224D12ED000
heap
page read and write
224DBBC5000
trusted library allocation
page read and write
224DA660000
trusted library allocation
page read and write
224D9D8A000
trusted library allocation
page read and write
2BBC2E50000
unclassified section
page readonly
224E24A3000
trusted library allocation
page read and write
224DA2EB000
heap
page read and write
224E23B7000
trusted library allocation
page read and write
224E52AD000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DB6AD000
trusted library allocation
page read and write
224DBDE9000
trusted library allocation
page read and write
224D5C9E000
trusted library allocation
page read and write
224D7EF1000
trusted library allocation
page read and write
224DB99D000
trusted library allocation
page read and write
224DAAB7000
trusted library allocation
page read and write
224DBFDC000
trusted library allocation
page read and write
224E37BB000
trusted library allocation
page read and write
224DBBAC000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
2BBC3F44000
heap
page read and write
224E273B000
trusted library allocation
page read and write
2BBC336F000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DBFE5000
trusted library allocation
page read and write
1BA06F12000
unclassified section
page read and write
224DC4BC000
trusted library allocation
page read and write
224DBCEE000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DCD78000
trusted library allocation
page read and write
224E52CC000
trusted library allocation
page read and write
3B94000
heap
page read and write
224E26CC000
trusted library allocation
page read and write
224E26F0000
trusted library allocation
page read and write
224E21D0000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224DA745000
trusted library allocation
page read and write
224DB681000
trusted library allocation
page read and write
224DA06B000
trusted library allocation
page read and write
224E4513000
trusted library allocation
page read and write
224D73A8000
trusted library allocation
page read and write
224DBD85000
trusted library allocation
page read and write
224E22EB000
trusted library allocation
page read and write
224E4C1B000
trusted library allocation
page read and write
224DBBDB000
trusted library allocation
page read and write
224DB95D000
trusted library allocation
page read and write
224DA68C000
trusted library allocation
page read and write
224DB6F9000
trusted library allocation
page read and write
224E52DB000
trusted library allocation
page read and write
224E45EC000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224DC8D7000
trusted library allocation
page read and write
21193FF000
stack
page read and write
224E4C75000
trusted library allocation
page read and write
224DBDA4000
trusted library allocation
page read and write
224DB925000
trusted library allocation
page read and write
224DB856000
trusted library allocation
page read and write
224D12B3000
heap
page read and write
224DB968000
trusted library allocation
page read and write
224E2660000
trusted library allocation
page read and write
224E37CD000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224DA6A2000
trusted library allocation
page read and write
224D1310000
heap
page read and write
224E66D6000
trusted library allocation
page read and write
224D63AD000
trusted library allocation
page read and write
224DC32C000
trusted library allocation
page read and write
224E22ED000
trusted library allocation
page read and write
224DA59B000
trusted library allocation
page read and write
2BBC3323000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224DC806000
trusted library allocation
page read and write
224DB593000
trusted library allocation
page read and write
224DC463000
trusted library allocation
page read and write
1507000
heap
page read and write
224DB46F000
trusted library allocation
page read and write
224E254D000
trusted library allocation
page read and write
14578B30000
heap
page read and write
224D12B3000
heap
page read and write
224D7EE2000
trusted library allocation
page read and write
224E45A3000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224E21EB000
trusted library allocation
page read and write
224DB5F9000
trusted library allocation
page read and write
224E224E000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224DBD15000
trusted library allocation
page read and write
224DB983000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224E2644000
trusted library allocation
page read and write
20A2443C000
trusted library allocation
page read and write
224E2EFB000
trusted library allocation
page read and write
224DB6E0000
trusted library allocation
page read and write
E6D74FB000
stack
page read and write
224E5B04000
trusted library allocation
page read and write
224DC370000
trusted library allocation
page read and write
224DC351000
trusted library allocation
page read and write
224DB533000
trusted library allocation
page read and write
224DCCDA000
trusted library allocation
page read and write
20A2466E000
trusted library allocation
page read and write
224E517A000
trusted library allocation
page read and write
224E52A4000
trusted library allocation
page read and write
224E2317000
trusted library allocation
page read and write
224DCCC5000
trusted library allocation
page read and write
224DDCF8000
trusted library allocation
page read and write
224DB856000
trusted library allocation
page read and write
224D12AA000
heap
page read and write
224D12CB000
heap
page read and write
224E25FC000
trusted library allocation
page read and write
224DBB64000
trusted library allocation
page read and write
224DBAC2000
trusted library allocation
page read and write
224DA7DB000
trusted library allocation
page read and write
2BBC39C1000
heap
page read and write
224E2983000
trusted library allocation
page read and write
224E21C4000
trusted library allocation
page read and write
224D12C0000
heap
page read and write
224E64BC000
trusted library allocation
page read and write
224DBD5F000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DB79A000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224E2DED000
trusted library allocation
page read and write
224DB490000
trusted library allocation
page read and write
2BBC2EF0000
heap
page read and write
21173FA000
stack
page read and write
1508000
heap
page read and write
224DCCF5000
trusted library allocation
page read and write
224DC5A3000
trusted library allocation
page read and write
224E2646000
trusted library allocation
page read and write
224DB354000
trusted library allocation
page read and write
224D9D35000
trusted library allocation
page read and write
224DBDD3000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
14578B39000
heap
page read and write
224E4D67000
trusted library allocation
page read and write
224E2646000
trusted library allocation
page read and write
224DC4B8000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224DCAC4000
trusted library allocation
page read and write
224DB865000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DCDBA000
trusted library allocation
page read and write
224E4DDF000
trusted library allocation
page read and write
2BBC3F77000
heap
page read and write
224DD2A4000
trusted library allocation
page read and write
224E262B000
trusted library allocation
page read and write
224DA2C9000
heap
page read and write
224DBBEE000
trusted library allocation
page read and write
224DBAF0000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224D8123000
trusted library allocation
page read and write
224DA0F1000
trusted library allocation
page read and write
224DC397000
trusted library allocation
page read and write
1507000
heap
page read and write
224DBBD4000
trusted library allocation
page read and write
224D12B0000
heap
page read and write
224DCADD000
trusted library allocation
page read and write
224D5CCA000
trusted library allocation
page read and write
224DBDC4000
trusted library allocation
page read and write
224DAAB4000
trusted library allocation
page read and write
224DBAA4000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
224E4E82000
trusted library allocation
page read and write
224DBC38000
trusted library allocation
page read and write
224DBDE9000
trusted library allocation
page read and write
224DA0FB000
trusted library allocation
page read and write
224DBBCA000
trusted library allocation
page read and write
E6D75BE000
unkown
page readonly
224E3A35000
trusted library allocation
page read and write
224DC4BC000
trusted library allocation
page read and write
224E2DC8000
trusted library allocation
page read and write
224D63A5000
trusted library allocation
page read and write
224DD19F000
trusted library allocation
page read and write
224E6431000
trusted library allocation
page read and write
C8E000
stack
page read and write
224D12F9000
heap
page read and write
224DBD3F000
trusted library allocation
page read and write
224DB53D000
trusted library allocation
page read and write
2BBC3939000
heap
page read and write
224DBBF5000
trusted library allocation
page read and write
224DBCD8000
trusted library allocation
page read and write
224E2EE3000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224DB849000
trusted library allocation
page read and write
224DD122000
trusted library allocation
page read and write
224E244A000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
2BBC3F2B000
heap
page read and write
224DB67E000
trusted library allocation
page read and write
224DC5E9000
trusted library allocation
page read and write
224E2981000
trusted library allocation
page read and write
224E3A96000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224DD1CD000
trusted library allocation
page read and write
224DBB78000
trusted library allocation
page read and write
224E29A2000
trusted library allocation
page read and write
224DBB4D000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
2BBC3F77000
heap
page read and write
224D5CEF000
trusted library allocation
page read and write
224DBD2F000
trusted library allocation
page read and write
5F9D43E000
unkown
page readonly
224E6470000
trusted library allocation
page read and write
224DB7E5000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224D7EAE000
trusted library allocation
page read and write
224DA7DB000
trusted library allocation
page read and write
E6D757C000
stack
page read and write
224E6801000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224E227A000
trusted library allocation
page read and write
2BBC39C2000
heap
page read and write
224E3A2E000
trusted library allocation
page read and write
224DB58D000
trusted library allocation
page read and write
224D7EF0000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
1BA06E23000
heap
page read and write
224D12C5000
heap
page read and write
224E4557000
trusted library allocation
page read and write
224E4D66000
trusted library allocation
page read and write
224DA5D5000
trusted library allocation
page read and write
20A23FD0000
heap
page read and write
224DA6A2000
trusted library allocation
page read and write
224DB6B1000
trusted library allocation
page read and write
224DBC7B000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224E26ED000
trusted library allocation
page read and write
224DA5D2000
trusted library allocation
page read and write
224DE6AD000
trusted library allocation
page read and write
C2C000
unkown
page read and write
D50000
heap
page read and write
224DB3AF000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DB559000
trusted library allocation
page read and write
224DB569000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
224D12F9000
heap
page read and write
224D12A0000
heap
page read and write
224DBD3D000
trusted library allocation
page read and write
224DBDC4000
trusted library allocation
page read and write
224E4D47000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E4F66000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DA0AB000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
224D12CB000
heap
page read and write
224D12F6000
heap
page read and write
224DB66B000
trusted library allocation
page read and write
224E23EC000
trusted library allocation
page read and write
224D9DAF000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBF15000
trusted library allocation
page read and write
224DB761000
trusted library allocation
page read and write
224D12B0000
heap
page read and write
224D7382000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
BFC000
unkown
page readonly
224DBD2D000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DB92F000
trusted library allocation
page read and write
224D12AE000
heap
page read and write
224DBFC1000
trusted library allocation
page read and write
C34000
unkown
page readonly
224D7E69000
trusted library allocation
page read and write
224E4D2C000
trusted library allocation
page read and write
224E22D1000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224DBF33000
trusted library allocation
page read and write
224E2628000
trusted library allocation
page read and write
224D12A8000
heap
page read and write
224D7EA7000
trusted library allocation
page read and write
224DBCB5000
trusted library allocation
page read and write
224E51AF000
trusted library allocation
page read and write
224D62FB000
trusted library allocation
page read and write
224DB668000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224DBDA7000
trusted library allocation
page read and write
B14000
heap
page read and write
224D12C7000
heap
page read and write
2BBC3E17000
trusted library allocation
page read and write
224E266C000
trusted library allocation
page read and write
1512000
heap
page read and write
224DA739000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DBF33000
trusted library allocation
page read and write
224DB7D4000
trusted library allocation
page read and write
224DA0D2000
trusted library allocation
page read and write
224DA735000
trusted library allocation
page read and write
224D12C8000
heap
page read and write
224DC7F6000
trusted library allocation
page read and write
224E379F000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DC7FB000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBC05000
trusted library allocation
page read and write
224E4BF2000
trusted library allocation
page read and write
224E4584000
trusted library allocation
page read and write
224DBDBB000
trusted library allocation
page read and write
224D738A000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E27D5000
trusted library allocation
page read and write
224DA0A8000
trusted library allocation
page read and write
224DBDF8000
trusted library allocation
page read and write
224D8765000
trusted library allocation
page read and write
B14000
heap
page read and write
224DBC55000
trusted library allocation
page read and write
224E3A5E000
trusted library allocation
page read and write
224DCD8B000
trusted library allocation
page read and write
224DC899000
trusted library allocation
page read and write
224D5CEF000
trusted library allocation
page read and write
224DC885000
trusted library allocation
page read and write
224DC390000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D7EE6000
trusted library allocation
page read and write
C2C000
unkown
page write copy
224DA09E000
trusted library allocation
page read and write
224DC3EA000
trusted library allocation
page read and write
2BBC3F58000
heap
page read and write
224DC8A2000
trusted library allocation
page read and write
224DCDE3000
trusted library allocation
page read and write
224DC5A1000
trusted library allocation
page read and write
224D7E19000
trusted library allocation
page read and write
2BBC3379000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224E27C7000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224D129E000
heap
page read and write
224E67CA000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224DBBDD000
trusted library allocation
page read and write
224DB90D000
trusted library allocation
page read and write
224D6318000
trusted library allocation
page read and write
224DB75E000
trusted library allocation
page read and write
224E2668000
trusted library allocation
page read and write
224DA02D000
trusted library allocation
page read and write
224DB6A8000
trusted library allocation
page read and write
224E525B000
trusted library allocation
page read and write
20A24040000
heap
page readonly
224DB3C3000
trusted library allocation
page read and write
224D7396000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
2BBC3F00000
heap
page read and write
1BA06F60000
heap
page read and write
14578D07000
trusted library allocation
page read and write
224DCDE9000
trusted library allocation
page read and write
224E22F6000
trusted library allocation
page read and write
224DD1CD000
trusted library allocation
page read and write
2BBC39B9000
heap
page read and write
224DD1D2000
trusted library allocation
page read and write
224DB6BD000
trusted library allocation
page read and write
224DB53D000
trusted library allocation
page read and write
5F9CB3E000
stack
page read and write
224E4BAC000
trusted library allocation
page read and write
224D12F6000
heap
page read and write
224D7E12000
trusted library allocation
page read and write
224E2557000
trusted library allocation
page read and write
224D63C2000
trusted library allocation
page read and write
224DA25F000
heap
page read and write
224DB961000
trusted library allocation
page read and write
224E2216000
trusted library allocation
page read and write
224DC3F8000
trusted library allocation
page read and write
224D12F6000
heap
page read and write
224D12A2000
heap
page read and write
224DA591000
trusted library allocation
page read and write
224DB665000
trusted library allocation
page read and write
224DA06A000
trusted library allocation
page read and write
224E25DC000
trusted library allocation
page read and write
224E5265000
trusted library allocation
page read and write
224DB725000
trusted library allocation
page read and write
224E26CE000
trusted library allocation
page read and write
224DB52A000
trusted library allocation
page read and write
224D5C81000
trusted library allocation
page read and write
224E2655000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224DA295000
heap
page read and write
224D12CB000
heap
page read and write
224E4F89000
trusted library allocation
page read and write
224E25DF000
trusted library allocation
page read and write
224DBD53000
trusted library allocation
page read and write
B61000
unkown
page execute read
224DA2EE000
heap
page read and write
224E2991000
trusted library allocation
page read and write
224E2DFA000
trusted library allocation
page read and write
224DA73B000
trusted library allocation
page read and write
1BA07103000
trusted library allocation
page read and write
224E2668000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBDFD000
trusted library allocation
page read and write
224E2ECD000
trusted library allocation
page read and write
224DB37B000
trusted library allocation
page read and write
224DC84B000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224DB417000
trusted library allocation
page read and write
2BBC3361000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224DB569000
trusted library allocation
page read and write
224D638D000
trusted library allocation
page read and write
224DB9B5000
trusted library allocation
page read and write
224DA5B8000
trusted library allocation
page read and write
224DCDC6000
trusted library allocation
page read and write
224D7350000
trusted library allocation
page read and write
224E2556000
trusted library allocation
page read and write
224DC591000
trusted library allocation
page read and write
B5D000
stack
page read and write
224E2121000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224D12EF000
heap
page read and write
224DB8B2000
trusted library allocation
page read and write
224D131E000
heap
page read and write
224DB989000
trusted library allocation
page read and write
2BBC2F10000
heap
page read and write
224DBCB3000
trusted library allocation
page read and write
224E27E5000
trusted library allocation
page read and write
224E2367000
trusted library allocation
page read and write
224E2475000
trusted library allocation
page read and write
3A01000
heap
page read and write
224DC4F9000
trusted library allocation
page read and write
224E264F000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224E3AF3000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224E262B000
trusted library allocation
page read and write
224E2187000
trusted library allocation
page read and write
224D5CA9000
trusted library allocation
page read and write
224DA681000
trusted library allocation
page read and write
224E29AE000
trusted library allocation
page read and write
1CDF000
stack
page read and write
224DA05A000
trusted library allocation
page read and write
224E2471000
trusted library allocation
page read and write
224E25C2000
trusted library allocation
page read and write
224E22ED000
trusted library allocation
page read and write
224E525F000
trusted library allocation
page read and write
1BA071B1000
trusted library allocation
page read and write
224E3AFD000
trusted library allocation
page read and write
224DCDD6000
trusted library allocation
page read and write
224DA75E000
trusted library allocation
page read and write
224DA78D000
trusted library allocation
page read and write
224E22ED000
trusted library allocation
page read and write
224DDDAE000
trusted library allocation
page read and write
224D7EC9000
trusted library allocation
page read and write
224DBFFD000
trusted library allocation
page read and write
224D7EE6000
trusted library allocation
page read and write
224DC4D6000
trusted library allocation
page read and write
224DA7FB000
trusted library allocation
page read and write
224DB785000
trusted library allocation
page read and write
224E529C000
trusted library allocation
page read and write
224DA285000
heap
page read and write
224D12F5000
heap
page read and write
224E298F000
trusted library allocation
page read and write
2BBC3F3B000
heap
page read and write
224DA640000
trusted library allocation
page read and write
224D63F6000
trusted library allocation
page read and write
224DA088000
trusted library allocation
page read and write
224DBC55000
trusted library allocation
page read and write
224E4D98000
trusted library allocation
page read and write
224E52B7000
trusted library allocation
page read and write
224DA05A000
trusted library allocation
page read and write
224DBF65000
trusted library allocation
page read and write
224D7E1D000
trusted library allocation
page read and write
224E2651000
trusted library allocation
page read and write
2BBC38BF000
unkown
page execute read
224DC3F8000
trusted library allocation
page read and write
224DC200000
trusted library allocation
page read and write
2BBC3F44000
heap
page read and write
224D876B000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DB865000
trusted library allocation
page read and write
224D12FE000
heap
page read and write
224DD2DD000
trusted library allocation
page read and write
224DB88B000
trusted library allocation
page read and write
20A2462E000
trusted library allocation
page read and write
224DC364000
trusted library allocation
page read and write
224DA655000
trusted library allocation
page read and write
224E2668000
trusted library allocation
page read and write
224D12F7000
heap
page read and write
224D12EF000
heap
page read and write
224DA61D000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224DC4FE000
trusted library allocation
page read and write
224DBC4A000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224DA7CE000
trusted library allocation
page read and write
224E4D26000
trusted library allocation
page read and write
224DA638000
trusted library allocation
page read and write
224DBB80000
trusted library allocation
page read and write
224DC355000
trusted library allocation
page read and write
5F9B9FE000
stack
page read and write
224E2430000
trusted library allocation
page read and write
224E4D52000
trusted library allocation
page read and write
224E2631000
trusted library allocation
page read and write
3C83FE000
stack
page read and write
224DA6CB000
trusted library allocation
page read and write
224DA7FB000
trusted library allocation
page read and write
224DBDA7000
trusted library allocation
page read and write
13DB000
stack
page read and write
2BBC3F44000
heap
page read and write
224E3A1E000
trusted library allocation
page read and write
224E25BA000
trusted library allocation
page read and write
224DA597000
trusted library allocation
page read and write
224DBDE4000
trusted library allocation
page read and write
224E25FC000
trusted library allocation
page read and write
224E2468000
trusted library allocation
page read and write
2BBC38D0000
heap
page read and write
20A24647000
trusted library allocation
page read and write
224E2429000
trusted library allocation
page read and write
224DA7BB000
trusted library allocation
page read and write
224E26E0000
trusted library allocation
page read and write
224E261E000
trusted library allocation
page read and write
3A00000
heap
page read and write
224D7365000
trusted library allocation
page read and write
2BBC3F79000
heap
page read and write
224D12F5000
heap
page read and write
224D12F5000
heap
page read and write
224E23CF000
trusted library allocation
page read and write
2BBC3F6A000
heap
page read and write
224DA58A000
trusted library allocation
page read and write
224E2638000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
224DCD87000
trusted library allocation
page read and write
224DBACF000
trusted library allocation
page read and write
224DB531000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224E6B01000
heap
page read and write
224D12CB000
heap
page read and write
224DBBBD000
trusted library allocation
page read and write
224E6476000
trusted library allocation
page read and write
224DA5D5000
trusted library allocation
page read and write
224E26F0000
trusted library allocation
page read and write
224E293A000
trusted library allocation
page read and write
224DCCEB000
trusted library allocation
page read and write
224E3792000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DB73C000
trusted library allocation
page read and write
224DB859000
trusted library allocation
page read and write
224DA283000
heap
page read and write
224E2EBA000
trusted library allocation
page read and write
224E5135000
trusted library allocation
page read and write
224DD178000
trusted library allocation
page read and write
224DB47E000
trusted library allocation
page read and write
224DB56F000
trusted library allocation
page read and write
224D6366000
trusted library allocation
page read and write
224DB593000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224D1316000
heap
page read and write
224E2518000
trusted library allocation
page read and write
224D7EC9000
trusted library allocation
page read and write
224E233A000
trusted library allocation
page read and write
224DB653000
trusted library allocation
page read and write
224E26AA000
trusted library allocation
page read and write
20A24706000
heap
page read and write
5F9EC3E000
stack
page read and write
224D879B000
trusted library allocation
page read and write
224E51B2000
trusted library allocation
page read and write
224E2641000
trusted library allocation
page read and write
224DA685000
trusted library allocation
page read and write
224DBBDD000
trusted library allocation
page read and write
224E51C6000
trusted library allocation
page read and write
2BBC30C0000
trusted library section
page readonly
224DBBC5000
trusted library allocation
page read and write
2BBC39B0000
heap
page read and write
224DA57B000
trusted library allocation
page read and write
224DB7FB000
trusted library allocation
page read and write
224DBB9F000
trusted library allocation
page read and write
224DC845000
trusted library allocation
page read and write
224DBBEC000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224E4D52000
trusted library allocation
page read and write
224DA245000
heap
page read and write
224E64BC000
trusted library allocation
page read and write
224D6223000
trusted library allocation
page read and write
224E64E1000
trusted library allocation
page read and write
224DB9FE000
trusted library allocation
page read and write
224DB536000
trusted library allocation
page read and write
224D63A0000
trusted library allocation
page read and write
224E6B01000
heap
page read and write
1BA07250000
heap
page read and write
224DA246000
heap
page read and write
224D7369000
trusted library allocation
page read and write
224DBBA2000
trusted library allocation
page read and write
224DA03F000
trusted library allocation
page read and write
224DE76A000
trusted library allocation
page read and write
224DC367000
trusted library allocation
page read and write
224DBDAE000
trusted library allocation
page read and write
1BA07170000
trusted library allocation
page read and write
B7FD3FE000
stack
page read and write
224DA567000
trusted library allocation
page read and write
224E2983000
trusted library allocation
page read and write
224E2638000
trusted library allocation
page read and write
224E6B52000
heap
page read and write
E6DA8BE000
unkown
page readonly
224DA69C000
trusted library allocation
page read and write
224D73EA000
trusted library allocation
page read and write
224DA56D000
trusted library allocation
page read and write
224D12C4000
heap
page read and write
224D7EB8000
trusted library allocation
page read and write
224E23E2000
trusted library allocation
page read and write
224D8128000
trusted library allocation
page read and write
224DD16F000
trusted library allocation
page read and write
14E8000
heap
page read and write
224D12AF000
heap
page read and write
2BBC3F2B000
heap
page read and write
224E3A34000
trusted library allocation
page read and write
224DBD25000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DAA0F000
trusted library allocation
page read and write
224DB917000
trusted library allocation
page read and write
224DA684000
trusted library allocation
page read and write
224E4DF5000
trusted library allocation
page read and write
224DDCBF000
trusted library allocation
page read and write
224DC8C3000
trusted library allocation
page read and write
224DCAC2000
trusted library allocation
page read and write
1BA06F10000
unclassified section
page read and write
224DB96D000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224E2141000
trusted library allocation
page read and write
224DB627000
trusted library allocation
page read and write
224E4BA8000
trusted library allocation
page read and write
224E243C000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224D129E000
heap
page read and write
224CA1EF000
heap
page read and write
224DBD3C000
trusted library allocation
page read and write
224E5004000
trusted library allocation
page read and write
224E262E000
trusted library allocation
page read and write
224E2361000
trusted library allocation
page read and write
151F000
heap
page read and write
1BA06DB0000
heap
page read and write
224D73F3000
trusted library allocation
page read and write
224E3799000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
224DBB8B000
trusted library allocation
page read and write
224DE704000
trusted library allocation
page read and write
224DA076000
trusted library allocation
page read and write
224DB633000
trusted library allocation
page read and write
224E263E000
trusted library allocation
page read and write
224E2DCE000
trusted library allocation
page read and write
224DCD84000
trusted library allocation
page read and write
224DC3B8000
trusted library allocation
page read and write
224DA033000
trusted library allocation
page read and write
224E4300000
trusted library allocation
page read and write
224DB6F6000
trusted library allocation
page read and write
224E52B0000
trusted library allocation
page read and write
224DC85B000
trusted library allocation
page read and write
224DBF36000
trusted library allocation
page read and write
224DC49E000
trusted library allocation
page read and write
224D12BE000
heap
page read and write
224DA56D000
trusted library allocation
page read and write
2BBC30BF000
unclassified section
page read and write
224DC319000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
224E263A000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224D12EF000
heap
page read and write
224E2653000
trusted library allocation
page read and write
224DA643000
trusted library allocation
page read and write
224DA2DB000
heap
page read and write
224DBBBC000
trusted library allocation
page read and write
224D12CF000
heap
page read and write
1FAB6ACA000
heap
page read and write
224E2479000
trusted library allocation
page read and write
224DBC21000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DBD27000
trusted library allocation
page read and write
224DB95F000
trusted library allocation
page read and write
224E52CC000
trusted library allocation
page read and write
224E29F7000
trusted library allocation
page read and write
224DB593000
trusted library allocation
page read and write
224DB6A8000
trusted library allocation
page read and write
224DBDBB000
trusted library allocation
page read and write
224D7E3B000
trusted library allocation
page read and write
224E4C8F000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224DB95B000
trusted library allocation
page read and write
224D6382000
trusted library allocation
page read and write
224DBB5E000
trusted library allocation
page read and write
224DBAFB000
trusted library allocation
page read and write
224E2EC3000
trusted library allocation
page read and write
224E24D4000
trusted library allocation
page read and write
224DA655000
trusted library allocation
page read and write
224DCDC0000
trusted library allocation
page read and write
1BA06E20000
heap
page read and write
224DB8BF000
trusted library allocation
page read and write
224DB557000
trusted library allocation
page read and write
224DBDE4000
trusted library allocation
page read and write
2BBC39C1000
heap
page read and write
224DB96D000
trusted library allocation
page read and write
224DA5D0000
trusted library allocation
page read and write
224D130D000
heap
page read and write
224DBC3F000
trusted library allocation
page read and write
224DDD95000
trusted library allocation
page read and write
224E26AA000
trusted library allocation
page read and write
224DB6E0000
trusted library allocation
page read and write
224DBFF0000
trusted library allocation
page read and write
224DCDD3000
trusted library allocation
page read and write
224DB7A2000
trusted library allocation
page read and write
224E37F3000
trusted library allocation
page read and write
224DBD5F000
trusted library allocation
page read and write
20A24612000
trusted library allocation
page read and write
224DC4B8000
trusted library allocation
page read and write
224E222F000
trusted library allocation
page read and write
224E297F000
trusted library allocation
page read and write
224DB772000
trusted library allocation
page read and write
224E2620000
trusted library allocation
page read and write
224E2647000
trusted library allocation
page read and write
5F9D37E000
stack
page read and write
224DB579000
trusted library allocation
page read and write
224E26C1000
trusted library allocation
page read and write
224E23B7000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
224E2647000
trusted library allocation
page read and write
224E52D1000
trusted library allocation
page read and write
224E3A2E000
trusted library allocation
page read and write
224D9DE4000
trusted library allocation
page read and write
224DA036000
trusted library allocation
page read and write
224E2565000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
2BBC3F2B000
heap
page read and write
224DC31E000
trusted library allocation
page read and write
224DDD8C000
trusted library allocation
page read and write
224DB9FC000
trusted library allocation
page read and write
224DB8CA000
trusted library allocation
page read and write
224D12F6000
heap
page read and write
224D62F6000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E2988000
trusted library allocation
page read and write
224DB6F3000
trusted library allocation
page read and write
224DA792000
trusted library allocation
page read and write
224DE727000
trusted library allocation
page read and write
224E2516000
trusted library allocation
page read and write
224DBC13000
trusted library allocation
page read and write
224E23F6000
trusted library allocation
page read and write
224D12C5000
heap
page read and write
224D9D33000
trusted library allocation
page read and write
224DBC45000
trusted library allocation
page read and write
224E3A15000
trusted library allocation
page read and write
224DA282000
heap
page read and write
224DB983000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224DC491000
trusted library allocation
page read and write
224E298B000
trusted library allocation
page read and write
224DDC6D000
trusted library allocation
page read and write
224DB859000
trusted library allocation
page read and write
224D73D3000
trusted library allocation
page read and write
E6D753E000
unkown
page readonly
224E299E000
trusted library allocation
page read and write
224E24AB000
trusted library allocation
page read and write
224D7EA5000
trusted library allocation
page read and write
C34000
unkown
page readonly
2BBC39C1000
heap
page read and write
224D63C2000
trusted library allocation
page read and write
224DA556000
trusted library allocation
page read and write
224DC814000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
224D1308000
heap
page read and write
224D12ED000
heap
page read and write
224E2527000
trusted library allocation
page read and write
224E378B000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224DA7BE000
trusted library allocation
page read and write
224D12B1000
heap
page read and write
224E3799000
trusted library allocation
page read and write
224DA07A000
trusted library allocation
page read and write
224E6766000
trusted library allocation
page read and write
224DB5E7000
trusted library allocation
page read and write
224E26E7000
trusted library allocation
page read and write
2BBC39CD000
heap
page read and write
224DBC0E000
trusted library allocation
page read and write
224E247B000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA0D2000
trusted library allocation
page read and write
224D9D5A000
trusted library allocation
page read and write
224E3A28000
trusted library allocation
page read and write
224DB928000
trusted library allocation
page read and write
224DBFE7000
trusted library allocation
page read and write
224E52B0000
trusted library allocation
page read and write
224DBBFD000
trusted library allocation
page read and write
224DB856000
trusted library allocation
page read and write
2BBC3310000
trusted library allocation
page read and write
224DBF22000
trusted library allocation
page read and write
2BBC39B9000
heap
page read and write
1FAB86B1000
heap
page read and write
224E27C3000
trusted library allocation
page read and write
224DD2AF000
trusted library allocation
page read and write
2BBC32D6000
heap
page read and write
224E5B3B000
trusted library allocation
page read and write
224DA02F000
trusted library allocation
page read and write
224E2234000
trusted library allocation
page read and write
224DDCB3000
trusted library allocation
page read and write
224D9D5D000
trusted library allocation
page read and write
224E22D7000
trusted library allocation
page read and write
224DB998000
trusted library allocation
page read and write
224D638D000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
20A24697000
trusted library allocation
page read and write
224E4D47000
trusted library allocation
page read and write
224D7366000
trusted library allocation
page read and write
224DA068000
trusted library allocation
page read and write
2BBC3100000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224DA034000
trusted library allocation
page read and write
224DA6CB000
trusted library allocation
page read and write
224E2477000
trusted library allocation
page read and write
224E4D3E000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
1BA071DB000
trusted library allocation
page read and write
224DBDD6000
trusted library allocation
page read and write
224DB6AD000
trusted library allocation
page read and write
224DB4C6000
trusted library allocation
page read and write
224DBB83000
trusted library allocation
page read and write
224E27DA000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224DBBFD000
trusted library allocation
page read and write
224D12FA000
heap
page read and write
224E2641000
trusted library allocation
page read and write
224E52CC000
trusted library allocation
page read and write
20A23F8E000
remote allocation
page execute read
224E26C1000
trusted library allocation
page read and write
224DC426000
trusted library allocation
page read and write
224E647A000
trusted library allocation
page read and write
224DBCBA000
trusted library allocation
page read and write
224DA5D5000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224DA0AB000
trusted library allocation
page read and write
224E5900000
trusted library allocation
page read and write
224DB96F000
trusted library allocation
page read and write
1BA07260000
heap
page read and write
224E247B000
trusted library allocation
page read and write
224DBB38000
trusted library allocation
page read and write
224DBBFE000
trusted library allocation
page read and write
224DB96F000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
1FAB6E07000
trusted library allocation
page read and write
20A2465B000
trusted library allocation
page read and write
224DB653000
trusted library allocation
page read and write
224DA798000
trusted library allocation
page read and write
224DCDB9000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224DDCE9000
trusted library allocation
page read and write
224DDE00000
trusted library allocation
page read and write
14578D00000
trusted library allocation
page read and write
224DBFF4000
trusted library allocation
page read and write
2BBC3F77000
heap
page read and write
224DB695000
trusted library allocation
page read and write
224DB7DA000
trusted library allocation
page read and write
224DDD95000
trusted library allocation
page read and write
224E26E4000
trusted library allocation
page read and write
224DB816000
trusted library allocation
page read and write
224E2DCA000
trusted library allocation
page read and write
224DC397000
trusted library allocation
page read and write
224E3AE7000
trusted library allocation
page read and write
B7FB9EE000
unkown
page readonly
224D63E1000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224DA7FB000
trusted library allocation
page read and write
224DA7B7000
trusted library allocation
page read and write
224DB96F000
trusted library allocation
page read and write
C22000
unkown
page readonly
224DBAFD000
trusted library allocation
page read and write
224DBAC2000
trusted library allocation
page read and write
224DB945000
trusted library allocation
page read and write
224DC7EE000
trusted library allocation
page read and write
224E4CFB000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DB99D000
trusted library allocation
page read and write
224DB65D000
trusted library allocation
page read and write
224DA286000
heap
page read and write
224E26D5000
trusted library allocation
page read and write
224DBB36000
trusted library allocation
page read and write
224DE696000
trusted library allocation
page read and write
224DCAE1000
trusted library allocation
page read and write
224E3A2E000
trusted library allocation
page read and write
224D12C8000
heap
page read and write
224DC31C000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
224DA295000
heap
page read and write
224DBA7C000
trusted library allocation
page read and write
224DA2D4000
heap
page read and write
224DBB31000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
224DA686000
trusted library allocation
page read and write
224E2479000
trusted library allocation
page read and write
224DC456000
trusted library allocation
page read and write
224DBBFD000
trusted library allocation
page read and write
224E6BE3000
heap
page read and write
224DD1A7000
trusted library allocation
page read and write
224E3A92000
trusted library allocation
page read and write
224E2178000
trusted library allocation
page read and write
224DB56F000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224DBFDA000
trusted library allocation
page read and write
1BA07256000
heap
page read and write
224E26DD000
trusted library allocation
page read and write
224D9D22000
trusted library allocation
page read and write
224DB9A3000
trusted library allocation
page read and write
224DB9A3000
trusted library allocation
page read and write
224DD2AC000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
2BBC393C000
heap
page read and write
224DA2CA000
heap
page read and write
224DB6EB000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224D12DB000
heap
page read and write
224DC8FA000
trusted library allocation
page read and write
224DC308000
trusted library allocation
page read and write
224E4E9C000
trusted library allocation
page read and write
224DC37A000
trusted library allocation
page read and write
224E265F000
trusted library allocation
page read and write
224DA2E4000
heap
page read and write
224E26F4000
trusted library allocation
page read and write
20A24280000
heap
page read and write
224DBFF0000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E25ED000
trusted library allocation
page read and write
224DBB64000
trusted library allocation
page read and write
224DB865000
trusted library allocation
page read and write
224E29A0000
trusted library allocation
page read and write
224E24A3000
trusted library allocation
page read and write
224E2DF4000
trusted library allocation
page read and write
224E263E000
trusted library allocation
page read and write
224D7380000
trusted library allocation
page read and write
224E2477000
trusted library allocation
page read and write
224DC3EA000
trusted library allocation
page read and write
224E6445000
trusted library allocation
page read and write
224E37F3000
trusted library allocation
page read and write
224E264F000
trusted library allocation
page read and write
224DBC0F000
trusted library allocation
page read and write
224DA296000
heap
page read and write
224DBDE4000
trusted library allocation
page read and write
224DDDBE000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224DA584000
trusted library allocation
page read and write
224DBC91000
trusted library allocation
page read and write
224DA69C000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224E3A37000
trusted library allocation
page read and write
224DB557000
trusted library allocation
page read and write
224DC3F1000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
224DBD15000
trusted library allocation
page read and write
224DBAA7000
trusted library allocation
page read and write
224E2668000
trusted library allocation
page read and write
224DBDB4000
trusted library allocation
page read and write
224DB65E000
trusted library allocation
page read and write
224DD187000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E64F8000
trusted library allocation
page read and write
224DBDE9000
trusted library allocation
page read and write
224DBDD3000
trusted library allocation
page read and write
224D5C98000
trusted library allocation
page read and write
224E3D00000
trusted library allocation
page read and write
13FE000
stack
page read and write
2BBC37B6000
heap
page read and write
224DB7AA000
trusted library allocation
page read and write
20A24663000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224D12A0000
heap
page read and write
224D12B1000
heap
page read and write
224E240C000
trusted library allocation
page read and write
224E244A000
trusted library allocation
page read and write
224E5250000
trusted library allocation
page read and write
224E3739000
trusted library allocation
page read and write
224DC316000
trusted library allocation
page read and write
224D12F5000
heap
page read and write
224D12A0000
heap
page read and write
224D12F9000
heap
page read and write
224DA74C000
trusted library allocation
page read and write
224DBDD3000
trusted library allocation
page read and write
224E2971000
trusted library allocation
page read and write
224E2963000
trusted library allocation
page read and write
224DA0C7000
trusted library allocation
page read and write
224E2616000
trusted library allocation
page read and write
224E23EA000
trusted library allocation
page read and write
224DCDCD000
trusted library allocation
page read and write
224DBCB3000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
B14000
heap
page read and write
2BBC3312000
trusted library allocation
page read and write
224DB52C000
trusted library allocation
page read and write
224E372C000
trusted library allocation
page read and write
224DBC52000
trusted library allocation
page read and write
224DA661000
trusted library allocation
page read and write
2BBC32E0000
trusted library allocation
page read and write
224DBF13000
trusted library allocation
page read and write
224DB684000
trusted library allocation
page read and write
224DB40D000
trusted library allocation
page read and write
224D7EA7000
trusted library allocation
page read and write
224D12F6000
heap
page read and write
224E25DC000
trusted library allocation
page read and write
224E2129000
trusted library allocation
page read and write
224DC3FB000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DBCCC000
trusted library allocation
page read and write
224D631D000
trusted library allocation
page read and write
224E3790000
trusted library allocation
page read and write
224DDD6E000
trusted library allocation
page read and write
224D12C1000
heap
page read and write
224DA04E000
trusted library allocation
page read and write
224E29A2000
trusted library allocation
page read and write
224E4DCD000
trusted library allocation
page read and write
2BBC3939000
heap
page read and write
224DA567000
trusted library allocation
page read and write
224E252D000
trusted library allocation
page read and write
224E3765000
trusted library allocation
page read and write
224DBDBB000
trusted library allocation
page read and write
224E64E1000
trusted library allocation
page read and write
224D1335000
heap
page read and write
224D12EF000
heap
page read and write
224E2549000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E2532000
trusted library allocation
page read and write
224DCDAE000
trusted library allocation
page read and write
224D7EB8000
trusted library allocation
page read and write
224DB7AA000
trusted library allocation
page read and write
224E4D73000
trusted library allocation
page read and write
224E6B71000
heap
page read and write
224DA6A2000
trusted library allocation
page read and write
224E6804000
trusted library allocation
page read and write
224E4EBA000
trusted library allocation
page read and write
224DBB74000
trusted library allocation
page read and write
224E2E8F000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224E4E94000
trusted library allocation
page read and write
224E2567000
trusted library allocation
page read and write
224E64D9000
trusted library allocation
page read and write
224DA64C000
trusted library allocation
page read and write
224E26CC000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DA7BB000
trusted library allocation
page read and write
224D6375000
trusted library allocation
page read and write
224DC557000
trusted library allocation
page read and write
224E3A37000
trusted library allocation
page read and write
224D7EA5000
trusted library allocation
page read and write
224DBC62000
trusted library allocation
page read and write
1BA07400000
trusted library allocation
page read and write
224DB80E000
trusted library allocation
page read and write
224DB99D000
trusted library allocation
page read and write
224DA645000
trusted library allocation
page read and write
224DBBBD000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E525B000
trusted library allocation
page read and write
224D876B000
trusted library allocation
page read and write
224E2712000
trusted library allocation
page read and write
224D63F6000
trusted library allocation
page read and write
224DBC63000
trusted library allocation
page read and write
224E2569000
trusted library allocation
page read and write
224E51D1000
trusted library allocation
page read and write
5F99FED000
stack
page read and write
224DBDE4000
trusted library allocation
page read and write
224DBBDF000
trusted library allocation
page read and write
224D63AD000
trusted library allocation
page read and write
1BA071F6000
trusted library allocation
page read and write
224DB665000
trusted library allocation
page read and write
224DA686000
trusted library allocation
page read and write
224E2E0B000
trusted library allocation
page read and write
1BA07182000
trusted library allocation
page read and write
224D9DE9000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224E2135000
trusted library allocation
page read and write
224D12C4000
heap
page read and write
224E2718000
trusted library allocation
page read and write
224D63E4000
trusted library allocation
page read and write
224DBFFB000
trusted library allocation
page read and write
224D73C7000
trusted library allocation
page read and write
224DBDCB000
trusted library allocation
page read and write
224DBBC1000
trusted library allocation
page read and write
224DBF15000
trusted library allocation
page read and write
224DB32F000
trusted library allocation
page read and write
224E3746000
trusted library allocation
page read and write
2250000
heap
page read and write
224DCD93000
trusted library allocation
page read and write
224DE6E1000
trusted library allocation
page read and write
224DA594000
trusted library allocation
page read and write
224DB676000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224D7EA5000
trusted library allocation
page read and write
224DB545000
trusted library allocation
page read and write
224DBCF5000
trusted library allocation
page read and write
224D63B0000
trusted library allocation
page read and write
224E2638000
trusted library allocation
page read and write
224DB98D000
trusted library allocation
page read and write
1BA07113000
trusted library allocation
page read and write
224DBDB4000
trusted library allocation
page read and write
224DB53D000
trusted library allocation
page read and write
224D12A6000
heap
page read and write
224D73A8000
trusted library allocation
page read and write
224DB968000
trusted library allocation
page read and write
224DB7B8000
trusted library allocation
page read and write
224E23FB000
trusted library allocation
page read and write
224DA681000
trusted library allocation
page read and write
224E37C8000
trusted library allocation
page read and write
224DB849000
trusted library allocation
page read and write
224E265F000
trusted library allocation
page read and write
224DC3AF000
trusted library allocation
page read and write
224E45EC000
trusted library allocation
page read and write
224D7EF1000
trusted library allocation
page read and write
224DB8A0000
trusted library allocation
page read and write
224E37A3000
trusted library allocation
page read and write
224DD143000
trusted library allocation
page read and write
1BA06F00000
heap
page readonly
224E675C000
trusted library allocation
page read and write
224DCCC1000
trusted library allocation
page read and write
224DB6F3000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
224D12B6000
heap
page read and write
224D622F000
trusted library allocation
page read and write
224DBBCA000
trusted library allocation
page read and write
224DB9AC000
trusted library allocation
page read and write
2BBC39CD000
heap
page read and write
224DC7CE000
trusted library allocation
page read and write
224E372C000
trusted library allocation
page read and write
E6D7FD8000
stack
page read and write
224DA666000
trusted library allocation
page read and write
224DBBCA000
trusted library allocation
page read and write
224DA563000
trusted library allocation
page read and write
224DA276000
heap
page read and write
224E3AA8000
trusted library allocation
page read and write
224DC547000
trusted library allocation
page read and write
224DC4AE000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DC48D000
trusted library allocation
page read and write
224DBDDA000
trusted library allocation
page read and write
224DB5F9000
trusted library allocation
page read and write
224E52B7000
trusted library allocation
page read and write
224DC7D1000
trusted library allocation
page read and write
224DA57B000
trusted library allocation
page read and write
C30000
unkown
page write copy
224D12EF000
heap
page read and write
224E64BC000
trusted library allocation
page read and write
224DB90F000
trusted library allocation
page read and write
224E2628000
trusted library allocation
page read and write
224DC4B2000
trusted library allocation
page read and write
224DB646000
trusted library allocation
page read and write
224D9DA9000
trusted library allocation
page read and write
224E3AF3000
trusted library allocation
page read and write
224DCDD6000
trusted library allocation
page read and write
224DBDAE000
trusted library allocation
page read and write
224D1301000
heap
page read and write
224DB893000
trusted library allocation
page read and write
224D12F9000
heap
page read and write
224DA7D8000
trusted library allocation
page read and write
224D1302000
heap
page read and write
151F000
heap
page read and write
224DB968000
trusted library allocation
page read and write
224E3799000
trusted library allocation
page read and write
224E2971000
trusted library allocation
page read and write
1508000
heap
page read and write
20A23F90000
unclassified section
page readonly
224DC860000
trusted library allocation
page read and write
224DDDFE000
trusted library allocation
page read and write
224E6759000
trusted library allocation
page read and write
224E2DEB000
trusted library allocation
page read and write
224E3A26000
trusted library allocation
page read and write
14578AC0000
heap
page read and write
224D876E000
trusted library allocation
page read and write
224E22F6000
trusted library allocation
page read and write
224D6271000
trusted library allocation
page read and write
224DBFC7000
trusted library allocation
page read and write
224DB6B4000
trusted library allocation
page read and write
224DB7A1000
trusted library allocation
page read and write
224DBD4A000
trusted library allocation
page read and write
224DA0AF000
trusted library allocation
page read and write
224DBDD3000
trusted library allocation
page read and write
224E29BA000
trusted library allocation
page read and write
224E3A20000
trusted library allocation
page read and write
224D73C2000
trusted library allocation
page read and write
224DBB2C000
trusted library allocation
page read and write
224DB3A1000
trusted library allocation
page read and write
224D1302000
heap
page read and write
224E4576000
trusted library allocation
page read and write
224E23CF000
trusted library allocation
page read and write
224E525B000
trusted library allocation
page read and write
224E3A2E000
trusted library allocation
page read and write
224E3A5E000
trusted library allocation
page read and write
224E223F000
trusted library allocation
page read and write
224DBB26000
trusted library allocation
page read and write
224DBAAB000
trusted library allocation
page read and write
224DB96D000
trusted library allocation
page read and write
224D9D91000
trusted library allocation
page read and write
224DB674000
trusted library allocation
page read and write
13CF000
stack
page read and write
224DA276000
heap
page read and write
224DBB9F000
trusted library allocation
page read and write
224DE783000
trusted library allocation
page read and write
224DDDBA000
trusted library allocation
page read and write
224D7E69000
trusted library allocation
page read and write
224E29B3000
trusted library allocation
page read and write
224DBBEE000
trusted library allocation
page read and write
224D12A0000
heap
page read and write
224D7EE6000
trusted library allocation
page read and write
224E25F6000
trusted library allocation
page read and write
224DD1FD000
trusted library allocation
page read and write
224E41A8000
trusted library allocation
page read and write
224D7EC9000
trusted library allocation
page read and write
224DBB29000
trusted library allocation
page read and write
224E26E4000
trusted library allocation
page read and write
224E2644000
trusted library allocation
page read and write
224E2232000
trusted library allocation
page read and write
224E262B000
trusted library allocation
page read and write
224E4F59000
trusted library allocation
page read and write
1BA0715D000
trusted library allocation
page read and write
224DB6B1000
trusted library allocation
page read and write
224E2549000
trusted library allocation
page read and write
224DBF19000
trusted library allocation
page read and write
224DDCF4000
trusted library allocation
page read and write
1515000
heap
page read and write
224D7E1F000
trusted library allocation
page read and write
224D12B7000
heap
page read and write
2BBC3930000
heap
page read and write
224D7EC9000
trusted library allocation
page read and write
2BBC2EC0000
remote allocation
page execute read
224DB8B2000
trusted library allocation
page read and write
224DDD68000
trusted library allocation
page read and write
224E4573000
trusted library allocation
page read and write
2BBC394D000
heap
page read and write
2BBC39B0000
heap
page read and write
224E64BE000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224E6B89000
heap
page read and write
224E26FD000
trusted library allocation
page read and write
20A245B0000
heap
page read and write
224E3756000
trusted library allocation
page read and write
224DB827000
trusted library allocation
page read and write
224DB531000
trusted library allocation
page read and write
224D129E000
heap
page read and write
224DB7A5000
trusted library allocation
page read and write
224DBB5A000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
1FAB86AD000
heap
page read and write
224D7EAE000
trusted library allocation
page read and write
224DCDF7000
trusted library allocation
page read and write
224DA246000
heap
page read and write
224D6271000
trusted library allocation
page read and write
224E25F6000
trusted library allocation
page read and write
224DA03C000
trusted library allocation
page read and write
224DBC94000
trusted library allocation
page read and write
1BA07254000
heap
page read and write
224DCDFC000
trusted library allocation
page read and write
224E3AE2000
trusted library allocation
page read and write
224D1314000
heap
page read and write
20A23FB0000
heap
page read and write
224D9D62000
trusted library allocation
page read and write
B14000
heap
page read and write
224E26E7000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DAA1A000
trusted library allocation
page read and write
224D7EBE000
trusted library allocation
page read and write
224DBDC4000
trusted library allocation
page read and write
224DAAF0000
trusted library allocation
page read and write
224D12F8000
heap
page read and write
2BBC3376000
trusted library allocation
page read and write
224D9DED000
trusted library allocation
page read and write
224DA282000
heap
page read and write
224D12F5000
heap
page read and write
224DB93C000
trusted library allocation
page read and write
224E2183000
trusted library allocation
page read and write
224E6B47000
heap
page read and write
224D63AC000
trusted library allocation
page read and write
224E513C000
trusted library allocation
page read and write
224DA567000
trusted library allocation
page read and write
224DB6EB000
trusted library allocation
page read and write
224DBF1F000
trusted library allocation
page read and write
224DA6A2000
trusted library allocation
page read and write
224DA2CA000
heap
page read and write
224DBDC6000
trusted library allocation
page read and write
224D73E2000
trusted library allocation
page read and write
224E379F000
trusted library allocation
page read and write
224DBBD7000
trusted library allocation
page read and write
224DA7B1000
trusted library allocation
page read and write
224DBDC4000
trusted library allocation
page read and write
224D12C5000
heap
page read and write
224DB977000
trusted library allocation
page read and write
224DDD84000
trusted library allocation
page read and write
224D12ED000
heap
page read and write
224DA068000
trusted library allocation
page read and write
1FAB6C00000
trusted library allocation
page read and write
2BBC2E60000
unclassified section
page readonly
224E29B1000
trusted library allocation
page read and write
224E272B000
trusted library allocation
page read and write
2BBC3365000
trusted library allocation
page read and write
2BBC33CE000
trusted library allocation
page read and write
224DBA63000
trusted library allocation
page read and write
224E21D4000
trusted library allocation
page read and write
224DB310000
trusted library allocation
page read and write
224DBDA7000
trusted library allocation
page read and write
224D12AC000
heap
page read and write
2BBC39CD000
heap
page read and write
224D1330000
heap
page read and write
224E4D5D000
trusted library allocation
page read and write
B7FC3D8000
stack
page read and write
224DBD5F000
trusted library allocation
page read and write
224D5CF5000
trusted library allocation
page read and write
224E379F000
trusted library allocation
page read and write
1513000
heap
page read and write
224DB4A0000
trusted library allocation
page read and write
224DB9BB000
trusted library allocation
page read and write
1502000
heap
page read and write
224E3AF1000
trusted library allocation
page read and write
224DC4A8000
trusted library allocation
page read and write
224DDD42000
trusted library allocation
page read and write
224DBBFA000
trusted library allocation
page read and write
224E3734000
trusted library allocation
page read and write
224D12B5000
heap
page read and write
224E3AC9000
trusted library allocation
page read and write
2BBC3790000
heap
page read and write
224DDCBC000
trusted library allocation
page read and write
331B2DC1000
trusted library allocation
page execute read
224D12A6000
heap
page read and write
224DA2F2000
heap
page read and write
224DB56F000
trusted library allocation
page read and write
224DC491000
trusted library allocation
page read and write
224E4C26000
trusted library allocation
page read and write
224D12AF000
heap
page read and write
224DBDD6000
trusted library allocation
page read and write
1BA06F20000
heap
page read and write
224DC7E6000
trusted library allocation
page read and write
224DB830000
trusted library allocation
page read and write
20A245B6000
heap
page read and write
224E4C42000
trusted library allocation
page read and write
224DCDC0000
trusted library allocation
page read and write
2BBC30B2000
unclassified section
page read and write
224DB9D3000
trusted library allocation
page read and write
224DB620000
trusted library allocation
page read and write
20A24702000
heap
page read and write
224D1335000
heap
page read and write
224DA567000
trusted library allocation
page read and write
224DB659000
trusted library allocation
page read and write
224E4DB3000
trusted library allocation
page read and write
224E3A26000
trusted library allocation
page read and write
224DA575000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DDDF6000
trusted library allocation
page read and write
224DA0AB000
trusted library allocation
page read and write
224DDCC6000
trusted library allocation
page read and write
224DBF65000
trusted library allocation
page read and write
224D12EF000
heap
page read and write
224E26DA000
trusted library allocation
page read and write
224D12B6000
heap
page read and write
224DBBEC000
trusted library allocation
page read and write
There are 3649 hidden memdumps, click here to show them.