IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_06bcc6ba-0eed-4f41-9fa2-71ddb700b597.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_06bcc6ba-0eed-4f41-9fa2-71ddb700b597.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9WYF47P3HQA1VRBF374S.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AKWC79HN4QQ0U56C9U99.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bdb6cb1-7dc1-4911-ac4c-bfb5f1e5f2e5} 7868 "\\.\pipe\gecko-crash-server-pipe.7868" 24d72a6d910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -parentBuildID 20230927232528 -prefsHandle 3812 -prefMapHandle 3584 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb42aa61-4454-4ee0-acce-73b006d0329d} 7868 "\\.\pipe\gecko-crash-server-pipe.7868" 24d04ee4310 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4980 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5040 -prefMapHandle 5036 -prefsLen 32993 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40aa82e2-f3c8-416a-a76a-fd595b206e92} 7868 "\\.\pipe\gecko-crash-server-pipe.7868" 24d046e8710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/connection-not-secure
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
http://exslt.org/dates-and-times$
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.208.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
24D0319F000
trusted library allocation
page read and write
F17E47E000
unkown
page readonly
2078A800000
trusted library allocation
page read and write
24D034E6000
trusted library allocation
page read and write
2078A700000
trusted library allocation
page read and write
242727ED000
heap
page read and write
24D797B4000
heap
page read and write
24D7E826000
trusted library allocation
page read and write
24D044CD000
trusted library allocation
page read and write
24D0AFA0000
trusted library allocation
page read and write
24D04569000
trusted library allocation
page read and write
24D7F8DD000
trusted library allocation
page read and write
24D0AFA2000
trusted library allocation
page read and write
24D7F7D3000
trusted library allocation
page read and write
24D03BD6000
trusted library allocation
page read and write
2078A67F000
unclassified section
page read and write
24D051F4000
trusted library allocation
page read and write
24D0C4AA000
trusted library allocation
page read and write
24D0C7B4000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0611C000
trusted library allocation
page read and write
15C000
unkown
page read and write
24D0AEFB000
trusted library allocation
page read and write
24D03B75000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0AD8E000
trusted library allocation
page read and write
24D0AAA3000
trusted library allocation
page read and write
F17DBFE000
stack
page read and write
24D047D2000
trusted library allocation
page read and write
24D7F8D5000
trusted library allocation
page read and write
24D0AACB000
trusted library allocation
page read and write
24D0AAFE000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D05559000
trusted library allocation
page read and write
24D7FAA1000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D79786000
heap
page read and write
24D0B4CE000
trusted library allocation
page read and write
24D03ED2000
trusted library allocation
page read and write
24D0B4D9000
trusted library allocation
page read and write
24D0AD75000
trusted library allocation
page read and write
24D034C3000
trusted library allocation
page read and write
24D05064000
trusted library allocation
page read and write
24D049B6000
trusted library allocation
page read and write
14C8000
heap
page read and write
24D0AB46000
trusted library allocation
page read and write
24D0EDE0000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D797D7000
heap
page read and write
24D044B6000
trusted library allocation
page read and write
24D7F9D5000
trusted library allocation
page read and write
24D0AFF9000
trusted library allocation
page read and write
24D04388000
trusted library allocation
page read and write
24D034C3000
trusted library allocation
page read and write
24D7E3F6000
trusted library allocation
page read and write
24D04393000
trusted library allocation
page read and write
24D031BA000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D050E6000
trusted library allocation
page read and write
24D0C7F9000
trusted library allocation
page read and write
24D026A9000
trusted library allocation
page read and write
24D7EBEC000
trusted library allocation
page read and write
73F7C3E000
unkown
page readonly
24D047AB000
trusted library allocation
page read and write
24D03EA0000
trusted library allocation
page read and write
24D02BD2000
trusted library allocation
page read and write
24D0ABF0000
trusted library allocation
page read and write
BCEFFFC000
stack
page read and write
24D7977A000
heap
page read and write
24D03432000
trusted library allocation
page read and write
24FEA300000
trusted library allocation
page read and write
24D79785000
heap
page read and write
2078A48A000
remote allocation
page execute read
24D0C6BA000
trusted library allocation
page read and write
24271A2F000
trusted library allocation
page read and write
24D047AE000
trusted library allocation
page read and write
24D0E5E9000
trusted library allocation
page read and write
24271A10000
trusted library allocation
page read and write
24D7E151000
trusted library allocation
page read and write
24D031C1000
trusted library allocation
page read and write
14F2000
heap
page read and write
24D0ECD3000
trusted library allocation
page read and write
24D002A9000
heap
page read and write
24D79751000
heap
page read and write
242727ED000
heap
page read and write
24D002F5000
heap
page read and write
24D0FEE1000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D049FC000
trusted library allocation
page read and write
24D7FAE5000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D79762000
heap
page read and write
24D0AD46000
trusted library allocation
page read and write
24D002B2000
heap
page read and write
24D04545000
trusted library allocation
page read and write
24D055D2000
trusted library allocation
page read and write
24D7F8F7000
trusted library allocation
page read and write
24D041B3000
trusted library allocation
page read and write
24D0555D000
trusted library allocation
page read and write
24D0EE9B000
trusted library allocation
page read and write
24D0ABA8000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D79757000
heap
page read and write
24D7F8DD000
trusted library allocation
page read and write
24D0AD0D000
trusted library allocation
page read and write
24D04511000
trusted library allocation
page read and write
242727AA000
heap
page read and write
2078A9B0000
heap
page read and write
24D7975F000
heap
page read and write
24D7F780000
trusted library allocation
page read and write
24D7F8B9000
trusted library allocation
page read and write
24D0455D000
trusted library allocation
page read and write
24D040EB000
trusted library allocation
page read and write
24D065BD000
trusted library allocation
page read and write
24D03E70000
trusted library allocation
page read and write
24D049F3000
trusted library allocation
page read and write
24D04545000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0E8A9000
trusted library allocation
page read and write
24D7F7BD000
trusted library allocation
page read and write
24D0AFBC000
trusted library allocation
page read and write
24D041AA000
trusted library allocation
page read and write
24D79756000
heap
page read and write
24D04569000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D061B7000
trusted library allocation
page read and write
24D0C4AA000
trusted library allocation
page read and write
F17CBD8000
stack
page read and write
24D031F3000
trusted library allocation
page read and write
24D035B5000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0B490000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
2078A8B6000
trusted library allocation
page read and write
24D0CB89000
trusted library allocation
page read and write
24D05623000
trusted library allocation
page read and write
24D0612F000
trusted library allocation
page read and write
24D002C3000
heap
page read and write
24D03EB3000
trusted library allocation
page read and write
24D065E2000
trusted library allocation
page read and write
24D043D4000
trusted library allocation
page read and write
24D04455000
trusted library allocation
page read and write
24FEA452000
unclassified section
page read and write
24D7E198000
trusted library allocation
page read and write
24D041FE000
trusted library allocation
page read and write
24D7F8A1000
trusted library allocation
page read and write
24D0AB21000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D79798000
heap
page read and write
24D7977A000
heap
page read and write
24D02BA2000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D7977C000
heap
page read and write
24D79751000
heap
page read and write
24D7F8C9000
trusted library allocation
page read and write
24D043F3000
trusted library allocation
page read and write
24D0FB18000
trusted library allocation
page read and write
24D0C804000
trusted library allocation
page read and write
24D0AFBC000
trusted library allocation
page read and write
24D0AC99000
trusted library allocation
page read and write
24272700000
heap
page read and write
24D044B8000
trusted library allocation
page read and write
24D031D4000
trusted library allocation
page read and write
BCEFFFF000
stack
page read and write
24D79785000
heap
page read and write
24D0553E000
trusted library allocation
page read and write
24D02B54000
trusted library allocation
page read and write
24D7977F000
heap
page read and write
24D061F0000
trusted library allocation
page read and write
24D0B4C1000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D047A9000
trusted library allocation
page read and write
24271ABA000
trusted library allocation
page read and write
24D041DA000
trusted library allocation
page read and write
24D79782000
heap
page read and write
24D7977A000
heap
page read and write
24D0413A000
trusted library allocation
page read and write
24D7E240000
trusted library allocation
page read and write
24D0FC2D000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7977E000
heap
page read and write
24D03E58000
trusted library allocation
page read and write
24D02B44000
trusted library allocation
page read and write
24D797BC000
heap
page read and write
24D7976D000
heap
page read and write
24271A0A000
trusted library allocation
page read and write
24D02BA2000
trusted library allocation
page read and write
24D05589000
trusted library allocation
page read and write
24D02D7C000
trusted library allocation
page read and write
24D044CB000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D049E5000
trusted library allocation
page read and write
24D0CB34000
trusted library allocation
page read and write
24D0556B000
trusted library allocation
page read and write
1D311D96000
heap
page read and write
2C6EDFE000
stack
page read and write
24D044D9000
trusted library allocation
page read and write
24D03498000
trusted library allocation
page read and write
24FEA3CB000
trusted library allocation
page read and write
24D05589000
trusted library allocation
page read and write
24D7E176000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24272091000
heap
page read and write
24D02CB3000
trusted library allocation
page read and write
24D044B6000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79751000
heap
page read and write
24D79771000
heap
page read and write
24D002A1000
heap
page read and write
24D0433C000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D026FB000
trusted library allocation
page read and write
24D0AFE9000
trusted library allocation
page read and write
24D0AFE6000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D04F8E000
trusted library allocation
page read and write
24D797AF000
heap
page read and write
24D034F1000
trusted library allocation
page read and write
24D044DB000
trusted library allocation
page read and write
24D041E1000
trusted library allocation
page read and write
24FEA310000
trusted library allocation
page read and write
24D79798000
heap
page read and write
2078A670000
unclassified section
page read and write
24D0447D000
trusted library allocation
page read and write
24D797AD000
heap
page read and write
24D0C6D6000
trusted library allocation
page read and write
24D0AEEB000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79771000
heap
page read and write
24D7E1CE000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D041D3000
trusted library allocation
page read and write
24D0E99C000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7F8F3000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0ACE8000
trusted library allocation
page read and write
24D02C41000
trusted library allocation
page read and write
24D0C7FC000
trusted library allocation
page read and write
24D065E5000
trusted library allocation
page read and write
24D7F8F7000
trusted library allocation
page read and write
24D02C4A000
trusted library allocation
page read and write
24D03E82000
trusted library allocation
page read and write
24D0DE80000
trusted library allocation
page read and write
24D02B6B000
trusted library allocation
page read and write
24D7F8DD000
trusted library allocation
page read and write
24D041B6000
trusted library allocation
page read and write
13BF000
stack
page read and write
24D7F8FA000
trusted library allocation
page read and write
24D7F8B9000
trusted library allocation
page read and write
2427276C000
heap
page read and write
24D04FBA000
trusted library allocation
page read and write
24D0B4D4000
trusted library allocation
page read and write
24D0AF5D000
trusted library allocation
page read and write
24D7E8F0000
trusted library allocation
page read and write
24D0AC0E000
trusted library allocation
page read and write
24D7F8E1000
trusted library allocation
page read and write
24D05258000
trusted library allocation
page read and write
24D04294000
trusted library allocation
page read and write
24D0AEE9000
trusted library allocation
page read and write
24D0ACDE000
trusted library allocation
page read and write
24D0AFD8000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D79762000
heap
page read and write
24D043B1000
trusted library allocation
page read and write
24D0428E000
trusted library allocation
page read and write
242727E8000
heap
page read and write
1CA60280000
heap
page read and write
24D79785000
heap
page read and write
24D79758000
heap
page read and write
24D79754000
heap
page read and write
24D79762000
heap
page read and write
24D7975D000
heap
page read and write
24D0E98C000
trusted library allocation
page read and write
24D0ACF7000
trusted library allocation
page read and write
24D0AF10000
trusted library allocation
page read and write
24D041FE000
trusted library allocation
page read and write
24D0D1A4000
trusted library allocation
page read and write
152000
unkown
page readonly
24D79777000
heap
page read and write
24D7977E000
heap
page read and write
24272844000
heap
page read and write
24D026C7000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D05560000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0E83B000
trusted library allocation
page read and write
24D02C56000
trusted library allocation
page read and write
24D065D4000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D7975F000
heap
page read and write
24D052DD000
trusted library allocation
page read and write
24D0C766000
trusted library allocation
page read and write
24D04EC0000
trusted library allocation
page read and write
24D0EE72000
trusted library allocation
page read and write
24271A5F000
trusted library allocation
page read and write
24D7F8E1000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7FAE5000
trusted library allocation
page read and write
24D797BE000
heap
page read and write
24D0D1A4000
trusted library allocation
page read and write
24D031FE000
trusted library allocation
page read and write
24D03549000
trusted library allocation
page read and write
24D7F9EA000
trusted library allocation
page read and write
24D040F8000
trusted library allocation
page read and write
3DC1000
heap
page read and write
24D03E90000
trusted library allocation
page read and write
24271880000
heap
page read and write
24D0E8FC000
trusted library allocation
page read and write
24D04932000
trusted library allocation
page read and write
24D041FE000
trusted library allocation
page read and write
24D034E6000
trusted library allocation
page read and write
24D03151000
trusted library allocation
page read and write
24D7E14D000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D031F1000
trusted library allocation
page read and write
24D0EDF9000
trusted library allocation
page read and write
24D0E9BD000
trusted library allocation
page read and write
24D79763000
heap
page read and write
24D0658E000
trusted library allocation
page read and write
24D034F7000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D797AC000
heap
page read and write
24D0566B000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D04946000
trusted library allocation
page read and write
24D0EDB1000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D049B6000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D7975E000
heap
page read and write
24D026CF000
trusted library allocation
page read and write
2078A879000
trusted library allocation
page read and write
24D7F845000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0523E000
trusted library allocation
page read and write
24D03164000
trusted library allocation
page read and write
24D03E9E000
trusted library allocation
page read and write
24D049C3000
trusted library allocation
page read and write
2427286A000
heap
page read and write
24D7974E000
heap
page read and write
24D7977E000
heap
page read and write
24D035EE000
trusted library allocation
page read and write
24D049B6000
trusted library allocation
page read and write
24D031B2000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D051EF000
trusted library allocation
page read and write
24D0492C000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
73F59FE000
unkown
page readonly
24D049EA000
trusted library allocation
page read and write
2427279C000
heap
page read and write
24D02C61000
trusted library allocation
page read and write
24D03544000
trusted library allocation
page read and write
24D02BA9000
trusted library allocation
page read and write
24D047B2000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7F87E000
trusted library allocation
page read and write
24D02B92000
trusted library allocation
page read and write
24D046DA000
trusted library allocation
page read and write
24D79788000
heap
page read and write
24D0EE8E000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0AB08000
trusted library allocation
page read and write
24D04491000
trusted library allocation
page read and write
24D0DC00000
trusted library allocation
page read and write
24D0C7CA000
trusted library allocation
page read and write
24D00282000
heap
page read and write
24D031D4000
trusted library allocation
page read and write
24D02D88000
trusted library allocation
page read and write
24D055D7000
trusted library allocation
page read and write
24D065BA000
trusted library allocation
page read and write
24D026D1000
trusted library allocation
page read and write
24D056AF000
trusted library allocation
page read and write
24D02CD3000
trusted library allocation
page read and write
24D0E8FD000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D03581000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0E9F1000
trusted library allocation
page read and write
24D0B4A6000
trusted library allocation
page read and write
24D04576000
trusted library allocation
page read and write
24D0AC95000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7974F000
heap
page read and write
24D79765000
heap
page read and write
24272760000
heap
page read and write
24D0FB0D000
trusted library allocation
page read and write
24D04457000
trusted library allocation
page read and write
24D041E3000
trusted library allocation
page read and write
24D041A7000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0AFFB000
trusted library allocation
page read and write
24D047ED000
trusted library allocation
page read and write
D44000
heap
page read and write
24D7E72F000
trusted library allocation
page read and write
24D041DE000
trusted library allocation
page read and write
24D0414F000
trusted library allocation
page read and write
24FEA070000
heap
page read and write
24D0B4C3000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24272859000
heap
page read and write
24D797DD000
heap
page read and write
24D7F836000
trusted library allocation
page read and write
24D7F8E1000
trusted library allocation
page read and write
24D042B9000
trusted library allocation
page read and write
24D7F85C000
trusted library allocation
page read and write
24D797AD000
heap
page read and write
24D79762000
heap
page read and write
24D0C785000
trusted library allocation
page read and write
24D7F8EB000
trusted library allocation
page read and write
24272020000
trusted library allocation
page read and write
2427278D000
heap
page read and write
24D0654B000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0ACCD000
trusted library allocation
page read and write
24D0654D000
trusted library allocation
page read and write
24D05641000
trusted library allocation
page read and write
24D7F87E000
trusted library allocation
page read and write
24D02C8F000
trusted library allocation
page read and write
24271AC7000
trusted library allocation
page read and write
24D05557000
trusted library allocation
page read and write
24D0EF99000
heap
page read and write
24D0AE7E000
trusted library allocation
page read and write
24D03EB3000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D79751000
heap
page read and write
24D031C1000
trusted library allocation
page read and write
24D7EBE4000
trusted library allocation
page read and write
24D047B2000
trusted library allocation
page read and write
24D7E8A2000
trusted library allocation
page read and write
24D044DB000
trusted library allocation
page read and write
24D061FD000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D797AC000
heap
page read and write
24D79785000
heap
page read and write
24D03E90000
trusted library allocation
page read and write
1D31021D000
heap
page read and write
24D02900000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79762000
heap
page read and write
24D02C9D000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D7975D000
heap
page read and write
24D041F6000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79771000
heap
page read and write
24D797AC000
heap
page read and write
24D03EB6000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D7976D000
heap
page read and write
24D797AF000
heap
page read and write
24D797AF000
heap
page read and write
24D061D3000
trusted library allocation
page read and write
24D044FB000
trusted library allocation
page read and write
24D7E22D000
trusted library allocation
page read and write
24D002A3000
heap
page read and write
24D02D53000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D02C3B000
trusted library allocation
page read and write
24D049B6000
trusted library allocation
page read and write
24D002C3000
heap
page read and write
24D0AFD5000
trusted library allocation
page read and write
73F5BBE000
unkown
page readonly
24D0AF5B000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0ACBE000
trusted library allocation
page read and write
24D055DB000
trusted library allocation
page read and write
24D0AEC3000
trusted library allocation
page read and write
24D7F99F000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0B4C3000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0D1D8000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
14F2000
heap
page read and write
24D79785000
heap
page read and write
24D0EF01000
heap
page read and write
24D797B4000
heap
page read and write
24D028F9000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D79745000
heap
page read and write
24D0AF65000
trusted library allocation
page read and write
24D0AFF9000
trusted library allocation
page read and write
24D7F80D000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D79785000
heap
page read and write
24D050A8000
trusted library allocation
page read and write
24FEA323000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D062D2000
trusted library allocation
page read and write
24D0C7B1000
trusted library allocation
page read and write
24D79778000
heap
page read and write
24D0B43A000
trusted library allocation
page read and write
24272858000
heap
page read and write
24D7977E000
heap
page read and write
24D046DA000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0FEAD000
trusted library allocation
page read and write
24D0ABA8000
trusted library allocation
page read and write
24D7E222000
trusted library allocation
page read and write
24D0EDEB000
trusted library allocation
page read and write
24D0AB71000
trusted library allocation
page read and write
24D04949000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7E269000
trusted library allocation
page read and write
24D0AFE6000
trusted library allocation
page read and write
D44000
heap
page read and write
24D02C83000
trusted library allocation
page read and write
24D0CB5C000
trusted library allocation
page read and write
24D797B8000
heap
page read and write
24D79769000
heap
page read and write
24D797D5000
heap
page read and write
24D79762000
heap
page read and write
24D0352D000
trusted library allocation
page read and write
24D0AFC3000
trusted library allocation
page read and write
24D044DD000
trusted library allocation
page read and write
24D7FA88000
trusted library allocation
page read and write
24D7F8D5000
trusted library allocation
page read and write
24D04F7F000
trusted library allocation
page read and write
24D797AF000
heap
page read and write
24D0C766000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D02C9D000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D03413000
trusted library allocation
page read and write
68FD67E000
unkown
page readonly
24D047BC000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D7F817000
trusted library allocation
page read and write
24D79766000
heap
page read and write
24D044DD000
trusted library allocation
page read and write
1D310232000
heap
page read and write
24FEA100000
heap
page read and write
24D79778000
heap
page read and write
24D79751000
heap
page read and write
24D0AD4C000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D79785000
heap
page read and write
24D0AEAD000
trusted library allocation
page read and write
24D03EFA000
trusted library allocation
page read and write
24D04545000
trusted library allocation
page read and write
24D04259000
trusted library allocation
page read and write
24D0E5D7000
trusted library allocation
page read and write
24D0ACF2000
trusted library allocation
page read and write
24D7F8FA000
trusted library allocation
page read and write
24D79798000
heap
page read and write
D44000
heap
page read and write
24D0AD9B000
trusted library allocation
page read and write
24D02CA7000
trusted library allocation
page read and write
24D7974D000
heap
page read and write
24D7F8E6000
trusted library allocation
page read and write
24D797B2000
heap
page read and write
24D062B4000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D797AE000
heap
page read and write
24D002C3000
heap
page read and write
24D05232000
trusted library allocation
page read and write
24D04E82000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0421B000
trusted library allocation
page read and write
24D0C4EF000
trusted library allocation
page read and write
14E5000
heap
page read and write
24D79762000
heap
page read and write
2078A849000
trusted library allocation
page read and write
24D051EF000
trusted library allocation
page read and write
24D0AABA000
trusted library allocation
page read and write
24D0ACEC000
trusted library allocation
page read and write
242727E9000
heap
page read and write
24D055BC000
trusted library allocation
page read and write
24D002A1000
heap
page read and write
24D0AF16000
trusted library allocation
page read and write
24D0EDF2000
trusted library allocation
page read and write
24D0ACF7000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D031BA000
trusted library allocation
page read and write
24D02B65000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D04433000
trusted library allocation
page read and write
24D031E3000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D00296000
heap
page read and write
24D043AC000
trusted library allocation
page read and write
24272877000
heap
page read and write
24D0027D000
heap
page read and write
24D050AB000
trusted library allocation
page read and write
24D797B8000
heap
page read and write
24D0E86B000
trusted library allocation
page read and write
24D0353A000
trusted library allocation
page read and write
24D0B455000
trusted library allocation
page read and write
24D79757000
heap
page read and write
2078A8A2000
trusted library allocation
page read and write
24271830000
heap
page read and write
242727F1000
heap
page read and write
24D04913000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D03E4B000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D797B2000
heap
page read and write
24D031B2000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D02C61000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D051EC000
trusted library allocation
page read and write
24D0AD8D000
trusted library allocation
page read and write
24D06590000
trusted library allocation
page read and write
24D042C1000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D02BA2000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0AFD5000
trusted library allocation
page read and write
15C000
unkown
page write copy
24D797BC000
heap
page read and write
24D7974F000
heap
page read and write
24D79785000
heap
page read and write
24D0ADE0000
trusted library allocation
page read and write
24D0FC23000
trusted library allocation
page read and write
24D047B2000
trusted library allocation
page read and write
24D7E265000
trusted library allocation
page read and write
24D041D5000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0AAFE000
trusted library allocation
page read and write
24D05557000
trusted library allocation
page read and write
242727B9000
heap
page read and write
24D0CB48000
trusted library allocation
page read and write
24D0AF95000
trusted library allocation
page read and write
24D05560000
trusted library allocation
page read and write
24D0AEFB000
trusted library allocation
page read and write
1450000
heap
page read and write
24D044FB000
trusted library allocation
page read and write
24D0ABDF000
trusted library allocation
page read and write
24D049F1000
trusted library allocation
page read and write
24D0ACDC000
trusted library allocation
page read and write
24272879000
heap
page read and write
24D02B59000
trusted library allocation
page read and write
24D0E5A9000
trusted library allocation
page read and write
24D79757000
heap
page read and write
90000
unkown
page readonly
24D79798000
heap
page read and write
24D0CB2A000
trusted library allocation
page read and write
24D0C4DE000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D7E166000
trusted library allocation
page read and write
24D041C7000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24D0EC73000
trusted library allocation
page read and write
24D79788000
heap
page read and write
242727FD000
heap
page read and write
24D06127000
trusted library allocation
page read and write
24D0B44C000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D04237000
trusted library allocation
page read and write
24D051F2000
trusted library allocation
page read and write
24D02CA3000
trusted library allocation
page read and write
24D03E40000
trusted library allocation
page read and write
24D03E8C000
trusted library allocation
page read and write
242727E8000
heap
page read and write
24D02BA2000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D051F2000
trusted library allocation
page read and write
24D002A7000
heap
page read and write
D30000
heap
page read and write
24D0FB18000
trusted library allocation
page read and write
24FEA200000
trusted library allocation
page read and write
13FE000
stack
page read and write
24D7F9EA000
trusted library allocation
page read and write
24D0ACF7000
trusted library allocation
page read and write
24D0AD25000
trusted library allocation
page read and write
24D0C759000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D79771000
heap
page read and write
24D0AF18000
trusted library allocation
page read and write
24D0356F000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79766000
heap
page read and write
24D02D7F000
trusted library allocation
page read and write
24D031CD000
trusted library allocation
page read and write
24D04E98000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D04EB6000
trusted library allocation
page read and write
2078A9C0000
heap
page read and write
24D03ED2000
trusted library allocation
page read and write
24D79765000
heap
page read and write
24D797D7000
heap
page read and write
24D034E0000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D0286B000
trusted library allocation
page read and write
24D0ED85000
trusted library allocation
page read and write
24D002F5000
heap
page read and write
24D03585000
trusted library allocation
page read and write
2427286A000
heap
page read and write
24D03E3D000
trusted library allocation
page read and write
24D7FA51000
trusted library allocation
page read and write
24D0E5E9000
trusted library allocation
page read and write
24D031B2000
trusted library allocation
page read and write
24D0C488000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D0AB6B000
trusted library allocation
page read and write
24D035FE000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0445A000
trusted library allocation
page read and write
24D0B49D000
trusted library allocation
page read and write
24D0C6FC000
trusted library allocation
page read and write
24D00275000
heap
page read and write
24D03BC7000
trusted library allocation
page read and write
24D7F8FA000
trusted library allocation
page read and write
24D7976B000
heap
page read and write
24D7974E000
heap
page read and write
24D049E5000
trusted library allocation
page read and write
24D79764000
heap
page read and write
2078A9B6000
heap
page read and write
24D04994000
trusted library allocation
page read and write
24D79745000
heap
page read and write
24D7E3E3000
trusted library allocation
page read and write
24D0552B000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D031A7000
trusted library allocation
page read and write
24D03E4D000
trusted library allocation
page read and write
24272060000
heap
page read and write
24FEA3A0000
trusted library allocation
page read and write
24D0ACAA000
trusted library allocation
page read and write
24D0B4E5000
trusted library allocation
page read and write
24D0AEF8000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0B4A6000
trusted library allocation
page read and write
24D02C8A000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24D0FB27000
trusted library allocation
page read and write
24D026C9000
trusted library allocation
page read and write
24D797BE000
heap
page read and write
24D045BF000
trusted library allocation
page read and write
13CF000
stack
page read and write
24D05511000
trusted library allocation
page read and write
1D310090000
heap
page read and write
24D0E98A000
trusted library allocation
page read and write
24D041D5000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D79757000
heap
page read and write
2078A85F000
trusted library allocation
page read and write
24D03156000
trusted library allocation
page read and write
24D7E24C000
trusted library allocation
page read and write
24D79790000
heap
page read and write
24D7F8C5000
trusted library allocation
page read and write
24D0C718000
trusted library allocation
page read and write
24D0F978000
trusted library allocation
page read and write
24D05533000
trusted library allocation
page read and write
24D79771000
heap
page read and write
2078A870000
trusted library allocation
page read and write
24D040FC000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D79776000
heap
page read and write
24D0AAD5000
trusted library allocation
page read and write
24271A6F000
trusted library allocation
page read and write
24D055F2000
trusted library allocation
page read and write
24D0CB34000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D03E8B000
trusted library allocation
page read and write
24D02DE8000
trusted library allocation
page read and write
24D0E96C000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D04994000
trusted library allocation
page read and write
24D052EC000
trusted library allocation
page read and write
24D7E17F000
trusted library allocation
page read and write
24D047AB000
trusted library allocation
page read and write
24D0027D000
heap
page read and write
24D031F3000
trusted library allocation
page read and write
24D03EF7000
trusted library allocation
page read and write
24D0B48D000
trusted library allocation
page read and write
24271AC2000
trusted library allocation
page read and write
24D7976D000
heap
page read and write
24D04983000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0EDBD000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0ED6A000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D7974F000
heap
page read and write
24D0319F000
trusted library allocation
page read and write
24D041C4000
trusted library allocation
page read and write
24D0AAC3000
trusted library allocation
page read and write
24D7E188000
trusted library allocation
page read and write
24D04386000
trusted library allocation
page read and write
24D0B44C000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D034B4000
trusted library allocation
page read and write
24D026CD000
trusted library allocation
page read and write
24D0435E000
trusted library allocation
page read and write
24D0AD8A000
trusted library allocation
page read and write
24D0C4AC000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D03185000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0E994000
trusted library allocation
page read and write
24D0AAC3000
trusted library allocation
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D79750000
heap
page read and write
24D79776000
heap
page read and write
24D797AC000
heap
page read and write
24D7975D000
heap
page read and write
24D0562C000
trusted library allocation
page read and write
24D7E283000
trusted library allocation
page read and write
24D04273000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D79785000
heap
page read and write
24D047AB000
trusted library allocation
page read and write
24D03529000
trusted library allocation
page read and write
14F2000
heap
page read and write
24D7F7FB000
trusted library allocation
page read and write
24D0ABAD000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D044D9000
trusted library allocation
page read and write
24D06159000
trusted library allocation
page read and write
24D040E3000
trusted library allocation
page read and write
24D79758000
heap
page read and write
24D050C7000
trusted library allocation
page read and write
73F5ABB000
stack
page read and write
24D797AC000
heap
page read and write
24D044B2000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D79763000
heap
page read and write
24D79785000
heap
page read and write
24D05295000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D7FA47000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D797AC000
heap
page read and write
24D0EE9B000
trusted library allocation
page read and write
24D04234000
trusted library allocation
page read and write
1ADDB0F1000
trusted library allocation
page execute read
2427183A000
heap
page read and write
24D00278000
heap
page read and write
24D79798000
heap
page read and write
2C6DDFE000
stack
page read and write
24D03E6D000
trusted library allocation
page read and write
24D0E536000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0AFF3000
trusted library allocation
page read and write
24D0E961000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
24D0491A000
trusted library allocation
page read and write
24D79798000
heap
page read and write
216F000
stack
page read and write
24D0426F000
trusted library allocation
page read and write
24D047FE000
trusted library allocation
page read and write
73F6BFE000
stack
page read and write
24D047E2000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0FC7F000
trusted library allocation
page read and write
24D044CB000
trusted library allocation
page read and write
24D0EF35000
heap
page read and write
24D0AE92000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D02B0B000
trusted library allocation
page read and write
24D79768000
heap
page read and write
24D049B6000
trusted library allocation
page read and write
24D002B0000
heap
page read and write
24D0E830000
trusted library allocation
page read and write
24D041EE000
trusted library allocation
page read and write
24D0449A000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D03EB3000
trusted library allocation
page read and write
24D056A2000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7F8FA000
trusted library allocation
page read and write
24D7E826000
trusted library allocation
page read and write
24271A68000
trusted library allocation
page read and write
24D0ECC5000
trusted library allocation
page read and write
24271AB3000
trusted library allocation
page read and write
24D0AEFB000
trusted library allocation
page read and write
24D0ACA6000
trusted library allocation
page read and write
1D6E000
stack
page read and write
3DC1000
heap
page read and write
2078A811000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D79757000
heap
page read and write
24D035E4000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D04404000
trusted library allocation
page read and write
24D0E9C6000
trusted library allocation
page read and write
24D79785000
heap
page read and write
5764DC03000
trusted library allocation
page read and write
24D0AF65000
trusted library allocation
page read and write
24D79754000
heap
page read and write
2C6FDFF000
stack
page read and write
24D79784000
heap
page read and write
24D797B8000
heap
page read and write
24D7F8EB000
trusted library allocation
page read and write
24D046C8000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D03B9D000
trusted library allocation
page read and write
24272769000
heap
page read and write
24D02CB6000
trusted library allocation
page read and write
24D79764000
heap
page read and write
D20000
heap
page read and write
24D79776000
heap
page read and write
24D031C6000
trusted library allocation
page read and write
24D0428B000
trusted library allocation
page read and write
24D04547000
trusted library allocation
page read and write
14D5000
heap
page read and write
24D7975D000
heap
page read and write
24D797AC000
heap
page read and write
24D797B2000
heap
page read and write
24D79785000
heap
page read and write
2078A410000
unclassified section
page readonly
24D7F9EA000
trusted library allocation
page read and write
24D041DA000
trusted library allocation
page read and write
24D04248000
trusted library allocation
page read and write
24D03ED3000
trusted library allocation
page read and write
24FEA312000
trusted library allocation
page read and write
24D002A3000
heap
page read and write
24D002B2000
heap
page read and write
24D0AFB8000
trusted library allocation
page read and write
24D00281000
heap
page read and write
24D02B6E000
trusted library allocation
page read and write
24D031F3000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0557E000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0E99C000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D026B5000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D02D1F000
trusted library allocation
page read and write
24D0ED37000
trusted library allocation
page read and write
24D03498000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D02C5C000
trusted library allocation
page read and write
24D0354D000
trusted library allocation
page read and write
24272012000
unkown
page execute read
24D041B6000
trusted library allocation
page read and write
24D7E258000
trusted library allocation
page read and write
24D047D2000
trusted library allocation
page read and write
24D02B87000
trusted library allocation
page read and write
24D002A3000
heap
page read and write
24272844000
heap
page read and write
24D0479D000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D7F8B9000
trusted library allocation
page read and write
24271FB0000
trusted library section
page readonly
24D7E2B5000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D044C2000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D79754000
heap
page read and write
24D79785000
heap
page read and write
24D0ECBD000
trusted library allocation
page read and write
24D047A3000
trusted library allocation
page read and write
24D0E944000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D797B4000
heap
page read and write
24D05533000
trusted library allocation
page read and write
24D06133000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D03541000
trusted library allocation
page read and write
24D0C45A000
trusted library allocation
page read and write
24D04189000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D79762000
heap
page read and write
24D79777000
heap
page read and write
24D0455F000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D79762000
heap
page read and write
24D049C3000
trusted library allocation
page read and write
24D0AFCF000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D797AC000
heap
page read and write
24D02C95000
trusted library allocation
page read and write
24D79788000
heap
page read and write
24D031BA000
trusted library allocation
page read and write
24D0EC97000
trusted library allocation
page read and write
24D02C95000
trusted library allocation
page read and write
24D7F8EB000
trusted library allocation
page read and write
24D049F1000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79785000
heap
page read and write
24D79762000
heap
page read and write
24D7975D000
heap
page read and write
24D02C57000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D79798000
heap
page read and write
24D03E93000
trusted library allocation
page read and write
24D04FD3000
trusted library allocation
page read and write
1D311DAD000
heap
page read and write
24D0AF65000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0497F000
trusted library allocation
page read and write
24D0AFEF000
trusted library allocation
page read and write
24D0B4C3000
trusted library allocation
page read and write
24D7E81E000
trusted library allocation
page read and write
24D0B461000
trusted library allocation
page read and write
24D041AA000
trusted library allocation
page read and write
24D7F8F3000
trusted library allocation
page read and write
24FEA040000
remote allocation
page read and write
24D79798000
heap
page read and write
24D044FB000
trusted library allocation
page read and write
24D042CF000
trusted library allocation
page read and write
24D0499A000
trusted library allocation
page read and write
24D0EF4D000
heap
page read and write
24D0FB20000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D797C0000
heap
page read and write
24D02D1B000
trusted library allocation
page read and write
24D056E6000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D7974E000
heap
page read and write
24D045F9000
trusted library allocation
page read and write
24271A65000
trusted library allocation
page read and write
24D04213000
trusted library allocation
page read and write
24D03E90000
trusted library allocation
page read and write
24D79784000
heap
page read and write
24D79785000
heap
page read and write
24D7F8C5000
trusted library allocation
page read and write
24D02C50000
trusted library allocation
page read and write
24D0C6BA000
trusted library allocation
page read and write
24D03E53000
trusted library allocation
page read and write
1D310407000
trusted library allocation
page read and write
24D7F88F000
trusted library allocation
page read and write
24D0AED3000
trusted library allocation
page read and write
24D7E233000
trusted library allocation
page read and write
24D05519000
trusted library allocation
page read and write
24D0528C000
trusted library allocation
page read and write
24D031C6000
trusted library allocation
page read and write
24D031E2000
trusted library allocation
page read and write
24D062BC000
trusted library allocation
page read and write
24D0C4EB000
trusted library allocation
page read and write
24D0EE84000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
D44000
heap
page read and write
24D050AB000
trusted library allocation
page read and write
24D79778000
heap
page read and write
68FBDD8000
stack
page read and write
2427283B000
heap
page read and write
24D0EF01000
heap
page read and write
24D797D4000
heap
page read and write
24D04941000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
14C9000
heap
page read and write
24D797AE000
heap
page read and write
24D026B5000
trusted library allocation
page read and write
24D0AF18000
trusted library allocation
page read and write
24D7F89D000
trusted library allocation
page read and write
1ADDB0F1000
trusted library allocation
page execute read
24FEA360000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0B4F6000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D7F91E000
trusted library allocation
page read and write
24D035F7000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7E20A000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D03E93000
trusted library allocation
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D0AFB3000
trusted library allocation
page read and write
24D03E9D000
trusted library allocation
page read and write
24D02685000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D79771000
heap
page read and write
24D0E939000
trusted library allocation
page read and write
24D0AFC3000
trusted library allocation
page read and write
24D0EE5B000
trusted library allocation
page read and write
24D79758000
heap
page read and write
24D79751000
heap
page read and write
24D7975F000
heap
page read and write
24D797AC000
heap
page read and write
24D79785000
heap
page read and write
24D0AB3C000
trusted library allocation
page read and write
24D035EC000
trusted library allocation
page read and write
24D7F8FA000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D797AC000
heap
page read and write
24D02D3E000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D7977C000
heap
page read and write
24D04199000
trusted library allocation
page read and write
24D0ACC5000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7976D000
heap
page read and write
24D044E2000
trusted library allocation
page read and write
D44000
heap
page read and write
24D7974F000
heap
page read and write
24D0AFF1000
trusted library allocation
page read and write
24D055FD000
trusted library allocation
page read and write
24D0AE84000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D02CB1000
trusted library allocation
page read and write
24D0455F000
trusted library allocation
page read and write
24D05091000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D047DF000
trusted library allocation
page read and write
24D0AF98000
trusted library allocation
page read and write
24D0E99A000
trusted library allocation
page read and write
24D79758000
heap
page read and write
24D03E88000
trusted library allocation
page read and write
24D04299000
trusted library allocation
page read and write
24D0AB68000
trusted library allocation
page read and write
24D7976B000
heap
page read and write
24D797AE000
heap
page read and write
24D046C6000
trusted library allocation
page read and write
24D041EE000
trusted library allocation
page read and write
24D0ACEE000
trusted library allocation
page read and write
24D031A7000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0E93D000
trusted library allocation
page read and write
24D04950000
trusted library allocation
page read and write
24D0555B000
trusted library allocation
page read and write
24D0499C000
trusted library allocation
page read and write
24D041BB000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0319F000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D7E1CE000
trusted library allocation
page read and write
24D061A3000
trusted library allocation
page read and write
24D04239000
trusted library allocation
page read and write
24D0027D000
heap
page read and write
24D7F8FD000
trusted library allocation
page read and write
24D04259000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0D1C1000
trusted library allocation
page read and write
24D0AFC1000
trusted library allocation
page read and write
24D047A3000
trusted library allocation
page read and write
24D049A7000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24FEA07A000
heap
page read and write
24D03EB3000
trusted library allocation
page read and write
24D79762000
heap
page read and write
1D310300000
trusted library allocation
page read and write
24272769000
heap
page read and write
24D0D121000
trusted library allocation
page read and write
24271A12000
trusted library allocation
page read and write
24D0C434000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7F7E6000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0AEDC000
trusted library allocation
page read and write
24D03DE9000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D79785000
heap
page read and write
24D044FD000
trusted library allocation
page read and write
1CA60400000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0D1CE000
trusted library allocation
page read and write
24D0E9A0000
trusted library allocation
page read and write
24D0ACF3000
trusted library allocation
page read and write
24D0AF95000
trusted library allocation
page read and write
242727A8000
heap
page read and write
24D0FC9F000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D031DF000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D79764000
heap
page read and write
24D0C489000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D002A3000
heap
page read and write
24D797AC000
heap
page read and write
24D04994000
trusted library allocation
page read and write
24D0419A000
trusted library allocation
page read and write
24D05295000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D7976D000
heap
page read and write
24D0CB92000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0ACF2000
trusted library allocation
page read and write
24D06587000
trusted library allocation
page read and write
14C3000
heap
page read and write
24D0EFBC000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24D0E9CB000
trusted library allocation
page read and write
24D031AA000
trusted library allocation
page read and write
24D7E243000
trusted library allocation
page read and write
24D02CB6000
trusted library allocation
page read and write
24D7FA51000
trusted library allocation
page read and write
24D04994000
trusted library allocation
page read and write
24D797B6000
heap
page read and write
24D0AE43000
trusted library allocation
page read and write
24D002B2000
heap
page read and write
24D7976F000
heap
page read and write
24FEA3B9000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0AFEE000
trusted library allocation
page read and write
24D05560000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D045B7000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D04167000
trusted library allocation
page read and write
24D0E944000
trusted library allocation
page read and write
24D06843000
trusted library allocation
page read and write
24D00299000
heap
page read and write
24D7974F000
heap
page read and write
24D061EB000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D79785000
heap
page read and write
24D0AB68000
trusted library allocation
page read and write
24D0AED7000
trusted library allocation
page read and write
24D044AD000
trusted library allocation
page read and write
24D031E2000
trusted library allocation
page read and write
24D7F852000
trusted library allocation
page read and write
24272858000
heap
page read and write
24D79785000
heap
page read and write
24D043E6000
trusted library allocation
page read and write
24D79766000
heap
page read and write
24D7977C000
heap
page read and write
24D79762000
heap
page read and write
24D00281000
heap
page read and write
24D79771000
heap
page read and write
24D0B4F6000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D02CA3000
trusted library allocation
page read and write
24D04511000
trusted library allocation
page read and write
24D04489000
trusted library allocation
page read and write
24D0495F000
trusted library allocation
page read and write
24D052BD000
trusted library allocation
page read and write
24D061BA000
trusted library allocation
page read and write
24D0421F000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79798000
heap
page read and write
24D0AE9A000
trusted library allocation
page read and write
24D03E4F000
trusted library allocation
page read and write
73F41D8000
stack
page read and write
24D797AC000
heap
page read and write
24D797AD000
heap
page read and write
24D055BC000
trusted library allocation
page read and write
24D042DA000
trusted library allocation
page read and write
24D06151000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79778000
heap
page read and write
24D04347000
trusted library allocation
page read and write
2078A4F0000
heap
page read and write
24D065C2000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D026B5000
trusted library allocation
page read and write
24D03E7D000
trusted library allocation
page read and write
1D3101A0000
heap
page read and write
24D04243000
trusted library allocation
page read and write
24D0ED59000
trusted library allocation
page read and write
2078AB00000
trusted library allocation
page read and write
24D040DE000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7E268000
trusted library allocation
page read and write
F17C10B000
stack
page read and write
24D0ACB8000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79798000
heap
page read and write
24FEA45F000
unclassified section
page read and write
24D79769000
heap
page read and write
24D7F826000
trusted library allocation
page read and write
24D79764000
heap
page read and write
2078A490000
unclassified section
page readonly
24D044B8000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D052BD000
trusted library allocation
page read and write
24D06547000
trusted library allocation
page read and write
24D0C4F7000
trusted library allocation
page read and write
24D0B4C1000
trusted library allocation
page read and write
24D0315B000
trusted library allocation
page read and write
24D0DA02000
trusted library allocation
page read and write
24D062B6000
trusted library allocation
page read and write
24D0569A000
trusted library allocation
page read and write
24D0F9E1000
trusted library allocation
page read and write
24D02866000
trusted library allocation
page read and write
90000
unkown
page readonly
24D79764000
heap
page read and write
24D047BB000
trusted library allocation
page read and write
24D0ECB3000
trusted library allocation
page read and write
24D7F8CC000
trusted library allocation
page read and write
24D035BE000
trusted library allocation
page read and write
24D7E813000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D7974E000
heap
page read and write
24D03E8B000
trusted library allocation
page read and write
24D0C45D000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0ECF9000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D7F8CC000
trusted library allocation
page read and write
24D031F1000
trusted library allocation
page read and write
24D0490E000
trusted library allocation
page read and write
24D0319B000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D047F4000
trusted library allocation
page read and write
24D0E8DE000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
24D79778000
heap
page read and write
24D7F8C9000
trusted library allocation
page read and write
24D0EDBC000
trusted library allocation
page read and write
24D061E8000
trusted library allocation
page read and write
24D79777000
heap
page read and write
24D055D2000
trusted library allocation
page read and write
24D0EE84000
trusted library allocation
page read and write
24D05565000
trusted library allocation
page read and write
24FE9FD0000
unclassified section
page readonly
24D797B6000
heap
page read and write
24D797AC000
heap
page read and write
24D031C6000
trusted library allocation
page read and write
24D049BE000
trusted library allocation
page read and write
24D79766000
heap
page read and write
24D79777000
heap
page read and write
24D056FC000
trusted library allocation
page read and write
24D034E6000
trusted library allocation
page read and write
24D05579000
trusted library allocation
page read and write
24D02BA9000
trusted library allocation
page read and write
24D055FE000
trusted library allocation
page read and write
24D04215000
trusted library allocation
page read and write
24D79761000
heap
page read and write
24D79762000
heap
page read and write
24D79785000
heap
page read and write
24D040F2000
trusted library allocation
page read and write
24D7E1F9000
trusted library allocation
page read and write
24D056CC000
trusted library allocation
page read and write
24D02C95000
trusted library allocation
page read and write
24D0AD3E000
trusted library allocation
page read and write
24D02CBC000
trusted library allocation
page read and write
2427275C000
heap
page read and write
24D7F8B9000
trusted library allocation
page read and write
24D02DAE000
trusted library allocation
page read and write
24D06122000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D031B2000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D046AA000
trusted library allocation
page read and write
24D041E3000
trusted library allocation
page read and write
24D049F3000
trusted library allocation
page read and write
24D03EFE000
trusted library allocation
page read and write
24D05646000
trusted library allocation
page read and write
24D0EE68000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
14C2000
heap
page read and write
24D79769000
heap
page read and write
24D0555D000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D7FA54000
trusted library allocation
page read and write
24D041CB000
trusted library allocation
page read and write
24D0E9DD000
trusted library allocation
page read and write
24D7EBF0000
trusted library allocation
page read and write
24D7F8F3000
trusted library allocation
page read and write
24D0AAD5000
trusted library allocation
page read and write
24D797AD000
heap
page read and write
24FEA367000
trusted library allocation
page read and write
14ED000
heap
page read and write
14D2000
heap
page read and write
24D797DD000
heap
page read and write
1CA605F0000
heap
page read and write
24D02BA9000
trusted library allocation
page read and write
DCE000
stack
page read and write
2078AB07000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D04783000
trusted library allocation
page read and write
24D051F4000
trusted library allocation
page read and write
24D002B2000
heap
page read and write
24D035F8000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7975D000
heap
page read and write
24D0478B000
trusted library allocation
page read and write
24D03E5A000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D797AC000
heap
page read and write
1D3105E0000
heap
page read and write
24D055C7000
trusted library allocation
page read and write
24D026D6000
trusted library allocation
page read and write
24D028CB000
trusted library allocation
page read and write
24D02884000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D72AFE000
trusted library allocation
page read and write
24D0605A000
trusted library allocation
page read and write
24D026AD000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D04FB4000
trusted library allocation
page read and write
24D026AA000
trusted library allocation
page read and write
24D0418A000
trusted library allocation
page read and write
24D044C2000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
F17E43E000
stack
page read and write
24D7E7FB000
trusted library allocation
page read and write
24D03C24000
trusted library allocation
page read and write
24D031BA000
trusted library allocation
page read and write
24D79754000
heap
page read and write
2427275F000
heap
page read and write
24D0B461000
trusted library allocation
page read and write
24D0CBE7000
trusted library allocation
page read and write
24D04381000
trusted library allocation
page read and write
24D02BA9000
trusted library allocation
page read and write
24D047DB000
trusted library allocation
page read and write
24D0437C000
trusted library allocation
page read and write
24D0AC31000
trusted library allocation
page read and write
24D0E862000
trusted library allocation
page read and write
24D7976B000
heap
page read and write
24D79769000
heap
page read and write
24272858000
heap
page read and write
24D7F856000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D041B6000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D05533000
trusted library allocation
page read and write
24D062BE000
trusted library allocation
page read and write
24D04939000
trusted library allocation
page read and write
24D0557E000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7977E000
heap
page read and write
24D026D1000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D002AB000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24FEA0C0000
heap
page read and write
24D0555D000
trusted library allocation
page read and write
2078A873000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D060C9000
trusted library allocation
page read and write
24D04934000
trusted library allocation
page read and write
24D02B89000
trusted library allocation
page read and write
24D04EF5000
trusted library allocation
page read and write
24272844000
heap
page read and write
24D79757000
heap
page read and write
24D03E9D000
trusted library allocation
page read and write
24D0AD7A000
trusted library allocation
page read and write
24D07802000
trusted library allocation
page read and write
24D0AACF000
trusted library allocation
page read and write
24FEA440000
heap
page readonly
24D797AF000
heap
page read and write
24FEA058000
remote allocation
page execute read
24D79745000
heap
page read and write
24D7975B000
heap
page read and write
24D0AD9B000
trusted library allocation
page read and write
24D0AFAF000
trusted library allocation
page read and write
24D0EF71000
heap
page read and write
24D79757000
heap
page read and write
24D0AB16000
trusted library allocation
page read and write
24D049A2000
trusted library allocation
page read and write
24D7977F000
heap
page read and write
24D052DD000
trusted library allocation
page read and write
24D049F3000
trusted library allocation
page read and write
24D79798000
heap
page read and write
2078A830000
trusted library allocation
page read and write
24D03EAA000
trusted library allocation
page read and write
24D79785000
heap
page read and write
2078A400000
unclassified section
page readonly
24D05568000
trusted library allocation
page read and write
24D0ECF7000
trusted library allocation
page read and write
24D0D1CA000
trusted library allocation
page read and write
24D041B3000
trusted library allocation
page read and write
24D002C3000
heap
page read and write
24D7F9D0000
trusted library allocation
page read and write
24D0EDD6000
trusted library allocation
page read and write
24D79778000
heap
page read and write
24D79785000
heap
page read and write
24D026BC000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79757000
heap
page read and write
24D042B4000
trusted library allocation
page read and write
24D034C3000
trusted library allocation
page read and write
24D797D5000
heap
page read and write
24D0AEE0000
trusted library allocation
page read and write
24D0AFF5000
trusted library allocation
page read and write
24D0ACC5000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D03E99000
trusted library allocation
page read and write
24D0495E000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0CB76000
trusted library allocation
page read and write
24D052A1000
trusted library allocation
page read and write
24D0EF62000
heap
page read and write
24D04FF4000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D0499A000
trusted library allocation
page read and write
24D0ACBA000
trusted library allocation
page read and write
24D7FA42000
trusted library allocation
page read and write
24D02B8D000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D797AC000
heap
page read and write
24D034FB000
trusted library allocation
page read and write
24D7F9BB000
trusted library allocation
page read and write
24D05565000
trusted library allocation
page read and write
24D02DAE000
trusted library allocation
page read and write
24D055D7000
trusted library allocation
page read and write
24D7E251000
trusted library allocation
page read and write
24D041A7000
trusted library allocation
page read and write
1CA60600000
trusted library allocation
page read and write
24D0E819000
trusted library allocation
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D7F849000
trusted library allocation
page read and write
24D056C8000
trusted library allocation
page read and write
24D03E9D000
trusted library allocation
page read and write
24D797BC000
heap
page read and write
2427286A000
heap
page read and write
24D0AEE9000
trusted library allocation
page read and write
24D034BD000
trusted library allocation
page read and write
24D04461000
trusted library allocation
page read and write
242727E8000
heap
page read and write
24D0EE5B000
trusted library allocation
page read and write
24D7E89D000
trusted library allocation
page read and write
24D7F841000
trusted library allocation
page read and write
14EB000
heap
page read and write
73F63BE000
stack
page read and write
24D79745000
heap
page read and write
24D7974F000
heap
page read and write
73F5B7E000
stack
page read and write
24D7975E000
heap
page read and write
1D311DA9000
heap
page read and write
24D0AFF3000
trusted library allocation
page read and write
D44000
heap
page read and write
24D7E771000
trusted library allocation
page read and write
24D04E98000
trusted library allocation
page read and write
24D03E80000
trusted library allocation
page read and write
24D0AE9E000
trusted library allocation
page read and write
24D02D93000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D7977D000
heap
page read and write
24D0494D000
trusted library allocation
page read and write
24D0ACA6000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0EE20000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D797B6000
heap
page read and write
24D047F0000
trusted library allocation
page read and write
24D7F8CC000
trusted library allocation
page read and write
2078A824000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D7FA40000
trusted library allocation
page read and write
24D002A4000
heap
page read and write
24D7977D000
heap
page read and write
24D79750000
heap
page read and write
24D03EAA000
trusted library allocation
page read and write
24D051EC000
trusted library allocation
page read and write
24D05095000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D04522000
trusted library allocation
page read and write
24D065F5000
trusted library allocation
page read and write
24D026D6000
trusted library allocation
page read and write
24D0E8EC000
trusted library allocation
page read and write
24D051CE000
trusted library allocation
page read and write
24D0B4D4000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0615B000
trusted library allocation
page read and write
24D002A6000
heap
page read and write
24D7977A000
heap
page read and write
14E5000
heap
page read and write
24D04449000
trusted library allocation
page read and write
1CA602B0000
heap
page read and write
24D7E1CE000
trusted library allocation
page read and write
24D03DB5000
trusted library allocation
page read and write
24D035AE000
trusted library allocation
page read and write
24D0B4BC000
trusted library allocation
page read and write
24D031A2000
trusted library allocation
page read and write
24D050B2000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7F93D000
trusted library allocation
page read and write
24D046AA000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D047A3000
trusted library allocation
page read and write
24D0C801000
trusted library allocation
page read and write
24D797BC000
heap
page read and write
24D02BA2000
trusted library allocation
page read and write
24D0AFA5000
trusted library allocation
page read and write
24D0E8FC000
trusted library allocation
page read and write
24D05089000
trusted library allocation
page read and write
24D04950000
trusted library allocation
page read and write
24D0479D000
trusted library allocation
page read and write
24D03E8E000
trusted library allocation
page read and write
24D0498B000
trusted library allocation
page read and write
1D31040A000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D79764000
heap
page read and write
24D0B461000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D05564000
trusted library allocation
page read and write
2427282A000
heap
page read and write
24D0AE94000
trusted library allocation
page read and write
24D0AD77000
trusted library allocation
page read and write
24D03482000
trusted library allocation
page read and write
24D79766000
heap
page read and write
242727ED000
heap
page read and write
24D7F8C5000
trusted library allocation
page read and write
24D7F9D9000
trusted library allocation
page read and write
24D02C3B000
trusted library allocation
page read and write
24D0E93B000
trusted library allocation
page read and write
24D7EBB7000
trusted library allocation
page read and write
24D7F97A000
trusted library allocation
page read and write
24D0AFC3000
trusted library allocation
page read and write
24D062DA000
trusted library allocation
page read and write
24D05587000
trusted library allocation
page read and write
24D0E9A0000
trusted library allocation
page read and write
24D031BA000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D031D4000
trusted library allocation
page read and write
24D0C4AF000
trusted library allocation
page read and write
24D0027A000
heap
page read and write
24D0FB20000
trusted library allocation
page read and write
24D0AC1D000
trusted library allocation
page read and write
24D7F889000
trusted library allocation
page read and write
24D00282000
heap
page read and write
24D051E8000
trusted library allocation
page read and write
24D79754000
heap
page read and write
2427282D000
heap
page read and write
24D0455F000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D0AF5D000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0CB69000
trusted library allocation
page read and write
24D0450F000
trusted library allocation
page read and write
24D79770000
heap
page read and write
24D7974F000
heap
page read and write
24D0AFEB000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D79785000
heap
page read and write
24D79785000
heap
page read and write
24D79758000
heap
page read and write
24D002A2000
heap
page read and write
24D7F9D0000
trusted library allocation
page read and write
24D0AEF8000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D797B8000
heap
page read and write
24D0358B000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D002A6000
heap
page read and write
24D7E19E000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
24D0F962000
trusted library allocation
page read and write
24D7F8F7000
trusted library allocation
page read and write
24D049EA000
trusted library allocation
page read and write
1ADDB1B1000
trusted library allocation
page execute read
24D002A1000
heap
page read and write
24D049A7000
trusted library allocation
page read and write
24D049EA000
trusted library allocation
page read and write
24D0497A000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0AABE000
trusted library allocation
page read and write
24D002A3000
heap
page read and write
24D0E9AD000
trusted library allocation
page read and write
242727F1000
heap
page read and write
24D0E5FD000
trusted library allocation
page read and write
24D0ABA8000
trusted library allocation
page read and write
24272822000
heap
page read and write
24D02B23000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D79771000
heap
page read and write
24D79785000
heap
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D026A6000
trusted library allocation
page read and write
2078A8DB000
trusted library allocation
page read and write
1D31020A000
heap
page read and write
24D02BA9000
trusted library allocation
page read and write
24D031D9000
trusted library allocation
page read and write
24D03E37000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D79798000
heap
page read and write
24D7FA88000
trusted library allocation
page read and write
24D79757000
heap
page read and write
242721D0000
heap
page read and write
24D052A1000
trusted library allocation
page read and write
24D04376000
trusted library allocation
page read and write
24D0AFFD000
trusted library allocation
page read and write
2427276C000
heap
page read and write
24D0EDEB000
trusted library allocation
page read and write
242727F1000
heap
page read and write
24D031FE000
trusted library allocation
page read and write
24D041D7000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D03B7B000
trusted library allocation
page read and write
24D0E99C000
trusted library allocation
page read and write
24D03BEA000
trusted library allocation
page read and write
24D7F89D000
trusted library allocation
page read and write
24D04299000
trusted library allocation
page read and write
24272844000
heap
page read and write
24D79785000
heap
page read and write
24D0B4F6000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
24D0ED65000
trusted library allocation
page read and write
24D041F6000
trusted library allocation
page read and write
24D0B4AE000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D044CD000
trusted library allocation
page read and write
24272760000
heap
page read and write
24D79785000
heap
page read and write
24D79776000
heap
page read and write
24D79764000
heap
page read and write
24D02CAF000
trusted library allocation
page read and write
24D00281000
heap
page read and write
24D79798000
heap
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D03E93000
trusted library allocation
page read and write
24D0ED20000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D79757000
heap
page read and write
24D79770000
heap
page read and write
24D00299000
heap
page read and write
24D79798000
heap
page read and write
24D061BD000
trusted library allocation
page read and write
24D0EDE8000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D049EA000
trusted library allocation
page read and write
24D0478B000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D02DD1000
trusted library allocation
page read and write
24D0529C000
trusted library allocation
page read and write
24D03147000
trusted library allocation
page read and write
24D0498E000
trusted library allocation
page read and write
24D047B4000
trusted library allocation
page read and write
24D0DAA8000
trusted library allocation
page read and write
24D7E190000
trusted library allocation
page read and write
24D0B4FB000
trusted library allocation
page read and write
24D0567F000
trusted library allocation
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D7977F000
heap
page read and write
24D031D4000
trusted library allocation
page read and write
24D050A1000
trusted library allocation
page read and write
24D797AD000
heap
page read and write
24D79798000
heap
page read and write
24D79762000
heap
page read and write
24D7FA56000
trusted library allocation
page read and write
24D002AB000
heap
page read and write
24D035BE000
trusted library allocation
page read and write
24D0EE68000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D0AF5B000
trusted library allocation
page read and write
24D002AA000
heap
page read and write
24271A00000
trusted library allocation
page read and write
24D0E5D1000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D79771000
heap
page read and write
24D0ABD2000
trusted library allocation
page read and write
24D7E8E3000
trusted library allocation
page read and write
24D044FB000
trusted library allocation
page read and write
24D002AB000
heap
page read and write
24D05095000
trusted library allocation
page read and write
CBA000
stack
page read and write
24D79754000
heap
page read and write
24D79757000
heap
page read and write
24D031F1000
trusted library allocation
page read and write
24D0E839000
trusted library allocation
page read and write
24D03E87000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7974F000
heap
page read and write
242727E8000
heap
page read and write
24272800000
heap
page read and write
24D0494B000
trusted library allocation
page read and write
24D056D4000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D0EDD4000
trusted library allocation
page read and write
24D0AEF6000
trusted library allocation
page read and write
24D031F1000
trusted library allocation
page read and write
24D79798000
heap
page read and write
2078A660000
heap
page readonly
24D79785000
heap
page read and write
24D047B4000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D03E8E000
trusted library allocation
page read and write
2078A680000
heap
page read and write
24D79769000
heap
page read and write
24D79757000
heap
page read and write
24D0C789000
trusted library allocation
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D0434A000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0AC95000
trusted library allocation
page read and write
24D0E8B9000
trusted library allocation
page read and write
24D7F88F000
trusted library allocation
page read and write
24D0ED7D000
trusted library allocation
page read and write
24D0EFE1000
heap
page read and write
13DB000
stack
page read and write
24D044BF000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D0421F000
trusted library allocation
page read and write
24271A9F000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D0497A000
trusted library allocation
page read and write
24D04565000
trusted library allocation
page read and write
73F5A3E000
unkown
page readonly
24271AC4000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D035F3000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0E9BD000
trusted library allocation
page read and write
24D0AF59000
trusted library allocation
page read and write
24D7F8F3000
trusted library allocation
page read and write
242727E6000
heap
page read and write
24D04965000
trusted library allocation
page read and write
24D031C1000
trusted library allocation
page read and write
24D0AD4E000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D03142000
trusted library allocation
page read and write
24D0265F000
trusted library allocation
page read and write
24271A03000
trusted library allocation
page read and write
24D031CD000
trusted library allocation
page read and write
2427286A000
heap
page read and write
24D79769000
heap
page read and write
24D0FCBF000
trusted library allocation
page read and write
24D0C4AF000
trusted library allocation
page read and write
24D0C4AF000
trusted library allocation
page read and write
24D0286B000
trusted library allocation
page read and write
24D02C90000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79771000
heap
page read and write
24D0B49D000
trusted library allocation
page read and write
24D7F93D000
trusted library allocation
page read and write
24D7976D000
heap
page read and write
24D79785000
heap
page read and write
24D035A7000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D0D1A0000
trusted library allocation
page read and write
24D03151000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
24D79771000
heap
page read and write
24D046D0000
trusted library allocation
page read and write
24D0424D000
trusted library allocation
page read and write
24D046D7000
trusted library allocation
page read and write
12C000
unkown
page readonly
24D02CB4000
trusted library allocation
page read and write
24D00299000
heap
page read and write
24D05047000
trusted library allocation
page read and write
24D0AD73000
trusted library allocation
page read and write
24D0C42C000
trusted library allocation
page read and write
24272000000
trusted library allocation
page read and write
242718A0000
heap
page read and write
24D79798000
heap
page read and write
24D0358B000
trusted library allocation
page read and write
24D0AE4D000
trusted library allocation
page read and write
24D04191000
trusted library allocation
page read and write
24D062D4000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D0447A000
trusted library allocation
page read and write
164000
unkown
page readonly
24D0AEC5000
trusted library allocation
page read and write
24D0B200000
trusted library allocation
page read and write
24D7975C000
heap
page read and write
24D0449A000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D043AC000
trusted library allocation
page read and write
24D0EFE1000
heap
page read and write
24D7FA88000
trusted library allocation
page read and write
24D797B1000
heap
page read and write
24D0457F000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
24D7E281000
trusted library allocation
page read and write
24D040E5000
trusted library allocation
page read and write
73F5B3E000
unkown
page readonly
1D310180000
heap
page read and write
24D79766000
heap
page read and write
24D0AB00000
trusted library allocation
page read and write
24D041DE000
trusted library allocation
page read and write
24D0AE34000
trusted library allocation
page read and write
24FEA940000
heap
page read and write
24D002A1000
heap
page read and write
24D0027E000
heap
page read and write
F17C1CE000
unkown
page readonly
24272070000
heap
page read and write
24D03E49000
trusted library allocation
page read and write
24D7F8DD000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24272760000
heap
page read and write
24D79771000
heap
page read and write
24D049B6000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0FB20000
trusted library allocation
page read and write
24D79751000
heap
page read and write
242718F0000
heap
page readonly
24D7FB35000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0564F000
trusted library allocation
page read and write
24D06294000
trusted library allocation
page read and write
24D0EEFC000
trusted library allocation
page read and write
14CD000
heap
page read and write
24D0AD73000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D7974F000
heap
page read and write
24D0D800000
trusted library allocation
page read and write
24D02D68000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
24D79780000
heap
page read and write
24D79785000
heap
page read and write
24D049B1000
trusted library allocation
page read and write
24D049AC000
trusted library allocation
page read and write
24D0E8DA000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0AFD8000
trusted library allocation
page read and write
1D311DAF000
heap
page read and write
24D0AFF3000
trusted library allocation
page read and write
24D044DA000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D03BBD000
trusted library allocation
page read and write
24D028D1000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D041FE000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D7974E000
heap
page read and write
24D04949000
trusted library allocation
page read and write
24D03196000
trusted library allocation
page read and write
24D04982000
trusted library allocation
page read and write
24D0ACB1000
trusted library allocation
page read and write
24D0C7B4000
trusted library allocation
page read and write
24D03EE0000
trusted library allocation
page read and write
24D0614C000
trusted library allocation
page read and write
24D0F9AD000
trusted library allocation
page read and write
24D035F7000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D031FE000
trusted library allocation
page read and write
24D046C6000
trusted library allocation
page read and write
24D7F817000
trusted library allocation
page read and write
24D035BE000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D050CE000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0550F000
trusted library allocation
page read and write
24D031C1000
trusted library allocation
page read and write
24D04250000
trusted library allocation
page read and write
2427283B000
heap
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D041B3000
trusted library allocation
page read and write
24D049B9000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D7977C000
heap
page read and write
24D79762000
heap
page read and write
24D0552D000
trusted library allocation
page read and write
24D0AB6B000
trusted library allocation
page read and write
24D06284000
trusted library allocation
page read and write
24D0ACF7000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D060A7000
trusted library allocation
page read and write
24D052C1000
trusted library allocation
page read and write
24D03E9D000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0319B000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D0424D000
trusted library allocation
page read and write
24D04500000
trusted library allocation
page read and write
24D04288000
trusted library allocation
page read and write
24D031DD000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D051EF000
trusted library allocation
page read and write
24FEA3C8000
trusted library allocation
page read and write
24D04215000
trusted library allocation
page read and write
24D041D5000
trusted library allocation
page read and write
24D79765000
heap
page read and write
24D0AFAC000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D797B2000
heap
page read and write
24D0EC78000
trusted library allocation
page read and write
24D047AE000
trusted library allocation
page read and write
24D7F8CC000
trusted library allocation
page read and write
24D04170000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D0ED65000
trusted library allocation
page read and write
24D7F8EB000
trusted library allocation
page read and write
24D0528C000
trusted library allocation
page read and write
24D0451E000
trusted library allocation
page read and write
24D0E568000
trusted library allocation
page read and write
24D0FC1B000
trusted library allocation
page read and write
24D031DD000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
24D79751000
heap
page read and write
242727E0000
heap
page read and write
24D79741000
heap
page read and write
24D79785000
heap
page read and write
24D002B2000
heap
page read and write
24D04292000
trusted library allocation
page read and write
24D0ACF2000
trusted library allocation
page read and write
24D04457000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D0EF01000
heap
page read and write
24D79764000
heap
page read and write
24D035A8000
trusted library allocation
page read and write
24D056F5000
trusted library allocation
page read and write
24D7976D000
heap
page read and write
24D7E240000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D79798000
heap
page read and write
24D797AC000
heap
page read and write
24D052B5000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0ECCD000
trusted library allocation
page read and write
24D049AC000
trusted library allocation
page read and write
24D04446000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D04970000
trusted library allocation
page read and write
24D05553000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D79785000
heap
page read and write
24D0319B000
trusted library allocation
page read and write
24D04325000
trusted library allocation
page read and write
24D0CB69000
trusted library allocation
page read and write
24D02BA2000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24D05533000
trusted library allocation
page read and write
24D0C75C000
trusted library allocation
page read and write
24D0AACB000
trusted library allocation
page read and write
24271750000
heap
page read and write
24D7977A000
heap
page read and write
24D79770000
heap
page read and write
24D7974F000
heap
page read and write
24D79751000
heap
page read and write
24D0027E000
heap
page read and write
24D0ACF1000
trusted library allocation
page read and write
24D7FB22000
trusted library allocation
page read and write
160000
unkown
page write copy
24D044BB000
trusted library allocation
page read and write
24D0523E000
trusted library allocation
page read and write
24D041E1000
trusted library allocation
page read and write
24D0EE48000
trusted library allocation
page read and write
24D035FE000
trusted library allocation
page read and write
24D031F7000
trusted library allocation
page read and write
24D04246000
trusted library allocation
page read and write
24D0AEF8000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D05638000
trusted library allocation
page read and write
24D051F4000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D79762000
heap
page read and write
24D7975F000
heap
page read and write
24D04213000
trusted library allocation
page read and write
2427278A000
heap
page read and write
24D04561000
trusted library allocation
page read and write
2427275C000
heap
page read and write
24D034F5000
trusted library allocation
page read and write
24D0D1D8000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D051D3000
trusted library allocation
page read and write
24272858000
heap
page read and write
24D0498B000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D05288000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D060C5000
trusted library allocation
page read and write
24D051F6000
trusted library allocation
page read and write
24D04481000
trusted library allocation
page read and write
24D046D0000
trusted library allocation
page read and write
2078A4BA000
heap
page read and write
24D034C0000
trusted library allocation
page read and write
24D04329000
trusted library allocation
page read and write
24D031E5000
trusted library allocation
page read and write
24D7F8E6000
trusted library allocation
page read and write
73F6C3E000
unkown
page readonly
24D05589000
trusted library allocation
page read and write
24FEA450000
unclassified section
page read and write
24FEA0E0000
heap
page read and write
24D031AA000
trusted library allocation
page read and write
3DC0000
heap
page read and write
24D79757000
heap
page read and write
24D062B2000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D031D4000
trusted library allocation
page read and write
24D0E5C3000
trusted library allocation
page read and write
1CA602F7000
heap
page read and write
24D79785000
heap
page read and write
24D79754000
heap
page read and write
24D79785000
heap
page read and write
24D7E2F1000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0450B000
trusted library allocation
page read and write
24D79769000
heap
page read and write
2427277F000
heap
page read and write
24D7976B000
heap
page read and write
24D0565F000
trusted library allocation
page read and write
D44000
heap
page read and write
24D046DF000
trusted library allocation
page read and write
24D0ACBE000
trusted library allocation
page read and write
24D79757000
heap
page read and write
F100FFE000
stack
page readonly
24272821000
heap
page read and write
24D044B2000
trusted library allocation
page read and write
24D04457000
trusted library allocation
page read and write
2427283B000
heap
page read and write
24D03E4B000
trusted library allocation
page read and write
24D04951000
trusted library allocation
page read and write
24D0E5FE000
trusted library allocation
page read and write
24D044DD000
trusted library allocation
page read and write
24D7976D000
heap
page read and write
24D7977A000
heap
page read and write
24D79757000
heap
page read and write
24D02874000
trusted library allocation
page read and write
24D0348C000
trusted library allocation
page read and write
24D002C6000
heap
page read and write
24D7FB27000
trusted library allocation
page read and write
24D03EAA000
trusted library allocation
page read and write
24D7F9FB000
trusted library allocation
page read and write
24D7974D000
heap
page read and write
24D02B65000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D002B2000
heap
page read and write
24D7E198000
trusted library allocation
page read and write
24D0449A000
trusted library allocation
page read and write
24D79770000
heap
page read and write
24D79751000
heap
page read and write
24D79769000
heap
page read and write
24D7975F000
heap
page read and write
24D797B0000
heap
page read and write
24D034FD000
trusted library allocation
page read and write
24D002C3000
heap
page read and write
24D00296000
heap
page read and write
24272877000
heap
page read and write
24D0B4D9000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D03E6A000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24D797B4000
heap
page read and write
24D7F831000
trusted library allocation
page read and write
24D041DE000
trusted library allocation
page read and write
24D797B6000
heap
page read and write
24D797AF000
heap
page read and write
24D002A3000
heap
page read and write
24D04290000
trusted library allocation
page read and write
14CB000
heap
page read and write
24D047E2000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D0ED6A000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0ACD9000
trusted library allocation
page read and write
24D0ED7A000
trusted library allocation
page read and write
24FEA503000
trusted library allocation
page read and write
24D03549000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D79785000
heap
page read and write
24D7974F000
heap
page read and write
2078A813000
trusted library allocation
page read and write
24D0EF26000
heap
page read and write
24D0353A000
trusted library allocation
page read and write
F1007FE000
stack
page read and write
24FEA500000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D04946000
trusted library allocation
page read and write
24D0E8DE000
trusted library allocation
page read and write
24D7E1A1000
trusted library allocation
page read and write
24D043CF000
trusted library allocation
page read and write
24D043D6000
trusted library allocation
page read and write
24D047E6000
trusted library allocation
page read and write
24D041D5000
trusted library allocation
page read and write
24D035E4000
trusted library allocation
page read and write
24D0E96C000
trusted library allocation
page read and write
1D311D90000
heap
page read and write
24D03E5A000
trusted library allocation
page read and write
24D055C7000
trusted library allocation
page read and write
24D02B6B000
trusted library allocation
page read and write
24D79778000
heap
page read and write
24D05553000
trusted library allocation
page read and write
24D7F8E6000
trusted library allocation
page read and write
24D035ED000
trusted library allocation
page read and write
24D79768000
heap
page read and write
24D04946000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0ACC8000
trusted library allocation
page read and write
24D03193000
trusted library allocation
page read and write
24D046C6000
trusted library allocation
page read and write
24D051EF000
trusted library allocation
page read and write
24D03142000
trusted library allocation
page read and write
24D026AA000
trusted library allocation
page read and write
24D060E3000
trusted library allocation
page read and write
24D0D118000
trusted library allocation
page read and write
24D035EF000
trusted library allocation
page read and write
24D0319B000
trusted library allocation
page read and write
24D0AFC7000
trusted library allocation
page read and write
2C6E5FF000
stack
page read and write
24D797D7000
heap
page read and write
24D02BA9000
trusted library allocation
page read and write
24D7F72A000
trusted library allocation
page read and write
24D04991000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0B49D000
trusted library allocation
page read and write
24D0AAB2000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D04A79000
trusted library allocation
page read and write
24D0AD8A000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7976D000
heap
page read and write
24D79757000
heap
page read and write
24D0ACA8000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D02C3F000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D797AC000
heap
page read and write
24D0AE5B000
trusted library allocation
page read and write
24D0C4F7000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D0D183000
trusted library allocation
page read and write
24D0496C000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D797B8000
heap
page read and write
24D04E5B000
trusted library allocation
page read and write
24D7E198000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0ED59000
trusted library allocation
page read and write
24FEA3A9000
trusted library allocation
page read and write
24D02BA9000
trusted library allocation
page read and write
24D0C761000
trusted library allocation
page read and write
24D0E8A9000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D047FE000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0CB89000
trusted library allocation
page read and write
24D7E181000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D031D4000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
24D0AF59000
trusted library allocation
page read and write
24D0AABA000
trusted library allocation
page read and write
24D031E3000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
73F743E000
stack
page read and write
24D79798000
heap
page read and write
24D7F831000
trusted library allocation
page read and write
24D79778000
heap
page read and write
24D03561000
trusted library allocation
page read and write
24D002B2000
heap
page read and write
24D0C42C000
trusted library allocation
page read and write
24D0EC65000
trusted library allocation
page read and write
24D04196000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D79771000
heap
page read and write
24D04543000
trusted library allocation
page read and write
24D03E5D000
trusted library allocation
page read and write
24D035E6000
trusted library allocation
page read and write
24D0EDE8000
trusted library allocation
page read and write
24D031DB000
trusted library allocation
page read and write
24D00277000
heap
page read and write
2427277D000
heap
page read and write
24D031F3000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D797AC000
heap
page read and write
24D7975B000
heap
page read and write
24272877000
heap
page read and write
24D031C6000
trusted library allocation
page read and write
24D00282000
heap
page read and write
24D79762000
heap
page read and write
24D0AD9D000
trusted library allocation
page read and write
24D0AED3000
trusted library allocation
page read and write
24D79768000
heap
page read and write
24D0C7B1000
trusted library allocation
page read and write
24D0358B000
trusted library allocation
page read and write
2078A803000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D79798000
heap
page read and write
24D05689000
trusted library allocation
page read and write
24D040F5000
trusted library allocation
page read and write
24D044FB000
trusted library allocation
page read and write
24D052C1000
trusted library allocation
page read and write
24D0CB78000
trusted library allocation
page read and write
24D0AAC7000
trusted library allocation
page read and write
24D79772000
heap
page read and write
24D7975E000
heap
page read and write
24D0FB10000
trusted library allocation
page read and write
2078A563000
heap
page read and write
24D7E723000
trusted library allocation
page read and write
24D002F5000
heap
page read and write
24D7977D000
heap
page read and write
24D7FA9E000
trusted library allocation
page read and write
24D026D6000
trusted library allocation
page read and write
24D0E8F7000
trusted library allocation
page read and write
14F2000
heap
page read and write
24D0E000000
trusted library allocation
page read and write
24D0ED7A000
trusted library allocation
page read and write
24D002B4000
heap
page read and write
24D056CE000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D7974F000
heap
page read and write
14D5000
heap
page read and write
2078A80C000
trusted library allocation
page read and write
24D031EE000
trusted library allocation
page read and write
24D04250000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D0AF16000
trusted library allocation
page read and write
24D79793000
heap
page read and write
24D046D7000
trusted library allocation
page read and write
24D031CD000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D7975C000
heap
page read and write
24D002BA000
heap
page read and write
24D049F3000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0B4D9000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D797B8000
heap
page read and write
24D04142000
trusted library allocation
page read and write
24D03DCA000
trusted library allocation
page read and write
24D03183000
trusted library allocation
page read and write
24D7976A000
heap
page read and write
24D79767000
heap
page read and write
24D79751000
heap
page read and write
24D79757000
heap
page read and write
24D79771000
heap
page read and write
24D7975B000
heap
page read and write
24D03E58000
trusted library allocation
page read and write
24D047B2000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D0EE8E000
trusted library allocation
page read and write
24D03EB6000
trusted library allocation
page read and write
24D7975A000
heap
page read and write
24D79798000
heap
page read and write
24D04142000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0AB21000
trusted library allocation
page read and write
24D0EE3A000
trusted library allocation
page read and write
24D0ACE8000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0507E000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0C434000
trusted library allocation
page read and write
24D0555B000
trusted library allocation
page read and write
24D046D7000
trusted library allocation
page read and write
24D0AF5D000
trusted library allocation
page read and write
24D7F8E1000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D0EDB1000
trusted library allocation
page read and write
24D7EBD3000
trusted library allocation
page read and write
24D02CA7000
trusted library allocation
page read and write
24D0C718000
trusted library allocation
page read and write
24D0AFF1000
trusted library allocation
page read and write
24D0316F000
trusted library allocation
page read and write
24D041CA000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0AFF1000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D7974E000
heap
page read and write
24D79757000
heap
page read and write
14EF000
heap
page read and write
24D03BD8000
trusted library allocation
page read and write
24D0657F000
trusted library allocation
page read and write
24D046DF000
trusted library allocation
page read and write
24D7E3DB000
trusted library allocation
page read and write
24D04A67000
trusted library allocation
page read and write
2078A869000
trusted library allocation
page read and write
24D0ABED000
trusted library allocation
page read and write
24FEA372000
trusted library allocation
page read and write
24D047F4000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D797B4000
heap
page read and write
24D0AF10000
trusted library allocation
page read and write
24D02DEC000
trusted library allocation
page read and write
24D03144000
trusted library allocation
page read and write
24D02C41000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D043EB000
trusted library allocation
page read and write
24D79754000
heap
page read and write
1D3105E5000
heap
page read and write
24D7EBAE000
trusted library allocation
page read and write
24D79760000
heap
page read and write
24D0479B000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0AED7000
trusted library allocation
page read and write
24D0AFFB000
trusted library allocation
page read and write
24D055D2000
trusted library allocation
page read and write
24D05559000
trusted library allocation
page read and write
1D311EE0000
heap
page read and write
24D0AFEB000
trusted library allocation
page read and write
24D79790000
heap
page read and write
24D03E5A000
trusted library allocation
page read and write
24D0FC12000
trusted library allocation
page read and write
24D0ADE1000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
24FEA347000
trusted library allocation
page read and write
24FEA396000
trusted library allocation
page read and write
24D0316F000
trusted library allocation
page read and write
24D0494D000
trusted library allocation
page read and write
24D04215000
trusted library allocation
page read and write
24D062BA000
trusted library allocation
page read and write
24D79765000
heap
page read and write
24D044FB000
trusted library allocation
page read and write
24D049A7000
trusted library allocation
page read and write
24272769000
heap
page read and write
24D7F8FD000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D7977E000
heap
page read and write
24D044D2000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D047F0000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7FA84000
trusted library allocation
page read and write
24D0347F000
trusted library allocation
page read and write
24D7F8A1000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79757000
heap
page read and write
24D7977A000
heap
page read and write
24D0438E000
trusted library allocation
page read and write
24D7976B000
heap
page read and write
24D05579000
trusted library allocation
page read and write
24D03549000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0451C000
trusted library allocation
page read and write
24D7F74B000
trusted library allocation
page read and write
24D79777000
heap
page read and write
24D7F9C7000
trusted library allocation
page read and write
24D04974000
trusted library allocation
page read and write
2C6CDFF000
stack
page read and write
24D00299000
heap
page read and write
24D0496C000
trusted library allocation
page read and write
24D04FED000
trusted library allocation
page read and write
24D04974000
trusted library allocation
page read and write
24D051EC000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0EF6A000
heap
page read and write
24D7975D000
heap
page read and write
24D0C434000
trusted library allocation
page read and write
24D7F89D000
trusted library allocation
page read and write
24D042CF000
trusted library allocation
page read and write
24D0AD7D000
trusted library allocation
page read and write
24D0319F000
trusted library allocation
page read and write
2078A560000
heap
page read and write
24FEA30D000
trusted library allocation
page read and write
24D026C5000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7974E000
heap
page read and write
24D061B4000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D0AB71000
trusted library allocation
page read and write
24D7E1EF000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D7F831000
trusted library allocation
page read and write
24D035E4000
trusted library allocation
page read and write
24D0AACB000
trusted library allocation
page read and write
24D0EDE2000
trusted library allocation
page read and write
24D049B9000
trusted library allocation
page read and write
24D0E8D8000
trusted library allocation
page read and write
24D0E9DD000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D046D0000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79751000
heap
page read and write
24D79764000
heap
page read and write
24D0E5F3000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D7FA56000
trusted library allocation
page read and write
24D7F8D5000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D06168000
trusted library allocation
page read and write
24D056F3000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D797B6000
heap
page read and write
24D0ACE0000
trusted library allocation
page read and write
24D062D2000
trusted library allocation
page read and write
24D7EBE0000
trusted library allocation
page read and write
24D0B463000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79757000
heap
page read and write
24D0479D000
trusted library allocation
page read and write
24D0508D000
trusted library allocation
page read and write
2078A882000
trusted library allocation
page read and write
24D052EC000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D7E243000
trusted library allocation
page read and write
24D7F88F000
trusted library allocation
page read and write
24D044D9000
trusted library allocation
page read and write
F17E3FE000
unkown
page readonly
24D7977B000
heap
page read and write
24D79757000
heap
page read and write
24D04156000
trusted library allocation
page read and write
24D02863000
trusted library allocation
page read and write
24D0ACF7000
trusted library allocation
page read and write
24D04EF5000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D797AF000
heap
page read and write
24D0FC23000
trusted library allocation
page read and write
24D79762000
heap
page read and write
2078A818000
trusted library allocation
page read and write
24D0C488000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7F8DD000
trusted library allocation
page read and write
24D797D7000
heap
page read and write
24D0EED2000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D035FB000
trusted library allocation
page read and write
24D0AE97000
trusted library allocation
page read and write
24D7E818000
trusted library allocation
page read and write
1D7C0E11E000
trusted library allocation
page read and write
24D7976A000
heap
page read and write
24D79785000
heap
page read and write
24D0EDA9000
trusted library allocation
page read and write
24D797C0000
heap
page read and write
24D02B4F000
trusted library allocation
page read and write
24D0C7FC000
trusted library allocation
page read and write
24D03193000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0FE58000
trusted library allocation
page read and write
24D002F5000
heap
page read and write
24D0AAFE000
trusted library allocation
page read and write
24D05576000
trusted library allocation
page read and write
24D0ECA6000
trusted library allocation
page read and write
1D7C0E124000
trusted library allocation
page read and write
24D79785000
heap
page read and write
68FD63E000
stack
page read and write
24D031EC000
trusted library allocation
page read and write
24D79763000
heap
page read and write
24D79754000
heap
page read and write
24D0AFF5000
trusted library allocation
page read and write
24D0C804000
trusted library allocation
page read and write
24D041B3000
trusted library allocation
page read and write
24D031AA000
trusted library allocation
page read and write
24D0C4DD000
trusted library allocation
page read and write
24D0E94F000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
242727E3000
heap
page read and write
24D7977D000
heap
page read and write
24D79785000
heap
page read and write
24D055C7000
trusted library allocation
page read and write
24271AE9000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0437F000
trusted library allocation
page read and write
24271A86000
trusted library allocation
page read and write
24D026A1000
trusted library allocation
page read and write
24D05058000
trusted library allocation
page read and write
24D051F6000
trusted library allocation
page read and write
24D0319F000
trusted library allocation
page read and write
24D0AFF9000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79778000
heap
page read and write
24D002CC000
heap
page read and write
24D002F5000
heap
page read and write
24D041DE000
trusted library allocation
page read and write
24D028CB000
trusted library allocation
page read and write
24D0AF18000
trusted library allocation
page read and write
24D0ACE0000
trusted library allocation
page read and write
2427282A000
heap
page read and write
24D7976B000
heap
page read and write
24D0527A000
trusted library allocation
page read and write
68FB37E000
unkown
page readonly
24D0432B000
trusted library allocation
page read and write
24D0D12B000
trusted library allocation
page read and write
24D0AB42000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D7975F000
heap
page read and write
24D055BF000
trusted library allocation
page read and write
24D026E5000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0C4F2000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D02B4D000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
73F6BBE000
unkown
page readonly
24D0527A000
trusted library allocation
page read and write
24D031C6000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D7977E000
heap
page read and write
24D79765000
heap
page read and write
24D7F8E1000
trusted library allocation
page read and write
24D046C8000
trusted library allocation
page read and write
24D0E9A0000
trusted library allocation
page read and write
24D03139000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24FEA480000
unclassified section
page readonly
24D0424D000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D0B4BC000
trusted library allocation
page read and write
24D040D3000
trusted library allocation
page read and write
24D0C4DE000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
24D7F9FE000
trusted library allocation
page read and write
D44000
heap
page read and write
24D79798000
heap
page read and write
24D035FA000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0CB3E000
trusted library allocation
page read and write
24D03EB6000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D0E8FC000
trusted library allocation
page read and write
24D7EBDB000
trusted library allocation
page read and write
BCF0FFF000
stack
page read and write
24D0E8F7000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D0E9C6000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0419A000
trusted library allocation
page read and write
24D79750000
heap
page read and write
24D7F9C7000
trusted library allocation
page read and write
24D0C789000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D797B4000
heap
page read and write
24D7E3C6000
trusted library allocation
page read and write
24D042C1000
trusted library allocation
page read and write
24D0562E000
trusted library allocation
page read and write
14E5000
heap
page read and write
24D7EBE7000
trusted library allocation
page read and write
24D7FA54000
trusted library allocation
page read and write
24D7E81B000
trusted library allocation
page read and write
24D7FA8B000
trusted library allocation
page read and write
24D0556B000
trusted library allocation
page read and write
68FB33E000
stack
page read and write
24D79798000
heap
page read and write
24D04193000
trusted library allocation
page read and write
24D03F05000
trusted library allocation
page read and write
24D044FB000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79788000
heap
page read and write
24D7974F000
heap
page read and write
24D7E1B3000
trusted library allocation
page read and write
24D0C42A000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7F88F000
trusted library allocation
page read and write
24D0FB10000
trusted library allocation
page read and write
24D0AFC1000
trusted library allocation
page read and write
24D0314C000
trusted library allocation
page read and write
24D0497A000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0498B000
trusted library allocation
page read and write
24D049B1000
trusted library allocation
page read and write
24D03F07000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0C761000
trusted library allocation
page read and write
24D02D93000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D797AC000
heap
page read and write
24D034E6000
trusted library allocation
page read and write
24D044BE000
trusted library allocation
page read and write
24D0E9B2000
trusted library allocation
page read and write
24D7976B000
heap
page read and write
24D7976D000
heap
page read and write
24D03E8C000
trusted library allocation
page read and write
24FEA532000
trusted library allocation
page read and write
24D046AA000
trusted library allocation
page read and write
68FDE7E000
stack
page read and write
24271B46000
heap
page read and write
24D02D82000
trusted library allocation
page read and write
24D0E89B000
trusted library allocation
page read and write
24D035B7000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D7FA88000
trusted library allocation
page read and write
24D049EA000
trusted library allocation
page read and write
24D06564000
trusted library allocation
page read and write
24D041AC000
trusted library allocation
page read and write
24D031AA000
trusted library allocation
page read and write
24D02B3F000
trusted library allocation
page read and write
24D044BB000
trusted library allocation
page read and write
24D0ABFD000
trusted library allocation
page read and write
24D04597000
trusted library allocation
page read and write
24D049E5000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D7976F000
heap
page read and write
24D0CBF2000
trusted library allocation
page read and write
24D7F92B000
trusted library allocation
page read and write
24D044CB000
trusted library allocation
page read and write
24D02D4C000
trusted library allocation
page read and write
24D031AA000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D02B54000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D031DD000
trusted library allocation
page read and write
24272760000
heap
page read and write
24D7F93A000
trusted library allocation
page read and write
24D0432C000
trusted library allocation
page read and write
24D7F9EA000
trusted library allocation
page read and write
24D002A2000
heap
page read and write
24D7974F000
heap
page read and write
24D79771000
heap
page read and write
24D7E287000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D049F3000
trusted library allocation
page read and write
D40000
heap
page read and write
1D310400000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D04214000
trusted library allocation
page read and write
24D797B4000
heap
page read and write
24D0AC0B000
trusted library allocation
page read and write
24D0B489000
trusted library allocation
page read and write
24D0B4C6000
trusted library allocation
page read and write
24D0447A000
trusted library allocation
page read and write
24D79753000
heap
page read and write
24D7F9D8000
trusted library allocation
page read and write
24D02B4B000
trusted library allocation
page read and write
24D0ACC2000
trusted library allocation
page read and write
24D049B9000
trusted library allocation
page read and write
24D0AF67000
trusted library allocation
page read and write
24D03139000
trusted library allocation
page read and write
73F37EE000
stack
page read and write
24D79757000
heap
page read and write
24D04199000
trusted library allocation
page read and write
24D0AAB2000
trusted library allocation
page read and write
24D00299000
heap
page read and write
24D0528F000
trusted library allocation
page read and write
24D06547000
trusted library allocation
page read and write
2078A8B2000
trusted library allocation
page read and write
242727F1000
heap
page read and write
24D052B5000
trusted library allocation
page read and write
24D04EB6000
trusted library allocation
page read and write
24D0ABDA000
trusted library allocation
page read and write
24D02D9D000
trusted library allocation
page read and write
24D0457F000
trusted library allocation
page read and write
24D045F9000
trusted library allocation
page read and write
24D05300000
trusted library allocation
page read and write
2C6CDFA000
stack
page read and write
24D047E2000
trusted library allocation
page read and write
24272877000
heap
page read and write
2C6F5FE000
stack
page read and write
24D0ABD4000
trusted library allocation
page read and write
24D0428B000
trusted library allocation
page read and write
24D049B9000
trusted library allocation
page read and write
24D79756000
heap
page read and write
24D04545000
trusted library allocation
page read and write
24D047E4000
trusted library allocation
page read and write
24D046DF000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D04129000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D049EA000
trusted library allocation
page read and write
24D0ECE2000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D03B5E000
trusted library allocation
page read and write
24271AF3000
trusted library allocation
page read and write
24D7FA44000
trusted library allocation
page read and write
24D0AEE0000
trusted library allocation
page read and write
24D03E53000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D055FD000
trusted library allocation
page read and write
24D79734000
heap
page read and write
24D0CB99000
trusted library allocation
page read and write
24D0416A000
trusted library allocation
page read and write
24D0439B000
trusted library allocation
page read and write
24D7F8F7000
trusted library allocation
page read and write
24D0B4BC000
trusted library allocation
page read and write
24D031EE000
trusted library allocation
page read and write
2078A6A0000
unclassified section
page readonly
24D7FA8F000
trusted library allocation
page read and write
24D03B96000
trusted library allocation
page read and write
24D04243000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24D797AD000
heap
page read and write
24D060D2000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D002C6000
heap
page read and write
24D797AE000
heap
page read and write
68FE67E000
unkown
page readonly
24D0E8C2000
trusted library allocation
page read and write
24271A78000
trusted library allocation
page read and write
24D041DA000
trusted library allocation
page read and write
24D04135000
trusted library allocation
page read and write
24D797BD000
heap
page read and write
24D79785000
heap
page read and write
24D03480000
trusted library allocation
page read and write
24D031FE000
trusted library allocation
page read and write
24D0550B000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D035C3000
trusted library allocation
page read and write
24D0553F000
trusted library allocation
page read and write
24D04545000
trusted library allocation
page read and write
24D0AC15000
trusted library allocation
page read and write
24D0315C000
trusted library allocation
page read and write
24D068C3000
trusted library allocation
page read and write
BCF07FD000
stack
page read and write
24272858000
heap
page read and write
24D7974F000
heap
page read and write
24D79785000
heap
page read and write
24D79751000
heap
page read and write
24D04991000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24271B1F000
unclassified section
page read and write
24D02D1B000
trusted library allocation
page read and write
24D04970000
trusted library allocation
page read and write
24D0AD97000
trusted library allocation
page read and write
24D00277000
heap
page read and write
24D79764000
heap
page read and write
24D002C3000
heap
page read and write
24D79785000
heap
page read and write
24D062D2000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24271730000
unclassified section
page readonly
24D03DA5000
trusted library allocation
page read and write
24D0450F000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0AAB2000
trusted library allocation
page read and write
24D7F8FD000
trusted library allocation
page read and write
24D0AE7B000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D797AC000
heap
page read and write
24D02DCC000
trusted library allocation
page read and write
24D0EDEB000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79798000
heap
page read and write
24D04457000
trusted library allocation
page read and write
24D0027D000
heap
page read and write
24D041C4000
trusted library allocation
page read and write
24D79760000
heap
page read and write
24D0AFD5000
trusted library allocation
page read and write
24D0B4C1000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79751000
heap
page read and write
24D0AF27000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7E876000
trusted library allocation
page read and write
24D7F9D0000
trusted library allocation
page read and write
24D047DF000
trusted library allocation
page read and write
24D0ECA6000
trusted library allocation
page read and write
24D79760000
heap
page read and write
24D062C6000
trusted library allocation
page read and write
24FEA460000
heap
page read and write
24D051EC000
trusted library allocation
page read and write
24D041DB000
trusted library allocation
page read and write
24D042D4000
trusted library allocation
page read and write
24D03E62000
trusted library allocation
page read and write
24D03533000
trusted library allocation
page read and write
24D0B4FB000
trusted library allocation
page read and write
24D041DE000
trusted library allocation
page read and write
24D035F2000
trusted library allocation
page read and write
24272016000
unkown
page execute read
24D0457F000
trusted library allocation
page read and write
24D7F88F000
trusted library allocation
page read and write
24D046DA000
trusted library allocation
page read and write
24D02D86000
trusted library allocation
page read and write
24D06120000
trusted library allocation
page read and write
24FEA512000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D7FAA1000
trusted library allocation
page read and write
24D0B4DB000
trusted library allocation
page read and write
24D79757000
heap
page read and write
242727E9000
heap
page read and write
24D7977C000
heap
page read and write
24D0AE34000
trusted library allocation
page read and write
2427282A000
heap
page read and write
24D0EF01000
heap
page read and write
24D79738000
heap
page read and write
24D049B1000
trusted library allocation
page read and write
24D0492F000
trusted library allocation
page read and write
24D0654B000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
2078AC00000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D026D6000
trusted library allocation
page read and write
24D04970000
trusted library allocation
page read and write
24D0493E000
trusted library allocation
page read and write
24D797B6000
heap
page read and write
24D7FAA1000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D002C6000
heap
page read and write
24D02D7F000
trusted library allocation
page read and write
24D79785000
heap
page read and write
2078A530000
heap
page read and write
24D7FAE6000
trusted library allocation
page read and write
24D7977D000
heap
page read and write
242727E3000
heap
page read and write
24FEA303000
trusted library allocation
page read and write
24D04FC7000
trusted library allocation
page read and write
24D02D7C000
trusted library allocation
page read and write
24D7E87E000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D00281000
heap
page read and write
24D79764000
heap
page read and write
24271B20000
trusted library allocation
page read and write
24D0E9BD000
trusted library allocation
page read and write
24D79770000
heap
page read and write
24D797AF000
heap
page read and write
24D7F8E6000
trusted library allocation
page read and write
2C6D5FE000
stack
page read and write
24D0AB3B000
trusted library allocation
page read and write
24D0ACCE000
trusted library allocation
page read and write
24272606000
trusted library allocation
page read and write
24D02CC4000
trusted library allocation
page read and write
24D041D7000
trusted library allocation
page read and write
24D0419A000
trusted library allocation
page read and write
24D028F8000
trusted library allocation
page read and write
24D0EE05000
trusted library allocation
page read and write
242727FD000
heap
page read and write
24D79757000
heap
page read and write
24D0EDF2000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D79798000
heap
page read and write
24D047B4000
trusted library allocation
page read and write
24D7F9A7000
trusted library allocation
page read and write
24D05538000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D041D3000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D002C6000
heap
page read and write
24D7F884000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D03E99000
trusted library allocation
page read and write
24D0AAC3000
trusted library allocation
page read and write
24D02CBF000
trusted library allocation
page read and write
24D02DEE000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
242727A1000
heap
page read and write
24D797AC000
heap
page read and write
242727F1000
heap
page read and write
24D02B52000
trusted library allocation
page read and write
24D031A7000
trusted library allocation
page read and write
24D7976E000
heap
page read and write
24D0CB50000
trusted library allocation
page read and write
24D0CB26000
trusted library allocation
page read and write
24271A81000
trusted library allocation
page read and write
24D04281000
trusted library allocation
page read and write
24D05568000
trusted library allocation
page read and write
24D034E0000
trusted library allocation
page read and write
24272617000
trusted library allocation
page read and write
24D056F7000
trusted library allocation
page read and write
24D0C824000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D7E1C6000
trusted library allocation
page read and write
24D0319B000
trusted library allocation
page read and write
24D72AEC000
trusted library allocation
page read and write
24D0CB2A000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D79757000
heap
page read and write
24D79764000
heap
page read and write
24D79757000
heap
page read and write
24D7974F000
heap
page read and write
24D0CB1F000
trusted library allocation
page read and write
24D797B8000
heap
page read and write
24D02C97000
trusted library allocation
page read and write
24D0EDE8000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0450F000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D031BA000
trusted library allocation
page read and write
24D02B8E000
trusted library allocation
page read and write
1D310231000
heap
page read and write
24D7977D000
heap
page read and write
24D031EE000
trusted library allocation
page read and write
24D049F3000
trusted library allocation
page read and write
24D0609A000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0AFC1000
trusted library allocation
page read and write
24D031CD000
trusted library allocation
page read and write
24D03187000
trusted library allocation
page read and write
24D7F8F3000
trusted library allocation
page read and write
24D0C488000
trusted library allocation
page read and write
24D7F9EA000
trusted library allocation
page read and write
24D0F996000
trusted library allocation
page read and write
24D0EF7E000
heap
page read and write
24D797AD000
heap
page read and write
24D03E85000
trusted library allocation
page read and write
24D04663000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24D0C4DE000
trusted library allocation
page read and write
24D7976A000
heap
page read and write
24D797AC000
heap
page read and write
73F5AB8000
stack
page read and write
24D044E2000
trusted library allocation
page read and write
24D03E80000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24271A75000
trusted library allocation
page read and write
24D0AE8F000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0AAB6000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D031FE000
trusted library allocation
page read and write
24D0D1AF000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D797B2000
heap
page read and write
242727E0000
heap
page read and write
24D79751000
heap
page read and write
24D042B4000
trusted library allocation
page read and write
24FEA35B000
trusted library allocation
page read and write
24D0ED48000
trusted library allocation
page read and write
24D0AFB8000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D034F5000
trusted library allocation
page read and write
24D79790000
heap
page read and write
24D047DF000
trusted library allocation
page read and write
2078A88F000
trusted library allocation
page read and write
24D0B4D4000
trusted library allocation
page read and write
24272821000
heap
page read and write
24D0C75C000
trusted library allocation
page read and write
24D0ADA7000
trusted library allocation
page read and write
24D0AECD000
trusted library allocation
page read and write
24D0E94E000
trusted library allocation
page read and write
152000
unkown
page readonly
24D051F2000
trusted library allocation
page read and write
24D04245000
trusted library allocation
page read and write
24D002F5000
heap
page read and write
24D79798000
heap
page read and write
24D0CB12000
trusted library allocation
page read and write
24D7F9A3000
trusted library allocation
page read and write
24D79777000
heap
page read and write
2078A862000
trusted library allocation
page read and write
24D049B6000
trusted library allocation
page read and write
24271B12000
unclassified section
page read and write
D8E000
stack
page read and write
24D0E5F3000
trusted library allocation
page read and write
D44000
heap
page read and write
24D79764000
heap
page read and write
24D79760000
heap
page read and write
24D79798000
heap
page read and write
1D310222000
heap
page read and write
24D7977F000
heap
page read and write
24D049F3000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D06084000
trusted library allocation
page read and write
24D0AF5B000
trusted library allocation
page read and write
24D00277000
heap
page read and write
24272763000
heap
page read and write
91000
unkown
page execute read
24D028CB000
trusted library allocation
page read and write
24D7E152000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7974F000
heap
page read and write
24D0AB87000
trusted library allocation
page read and write
24D7E8F8000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24D0ACAE000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0D1D8000
trusted library allocation
page read and write
24D7F8EB000
trusted library allocation
page read and write
24D0438A000
trusted library allocation
page read and write
24D7F8C9000
trusted library allocation
page read and write
24D04243000
trusted library allocation
page read and write
24D035F3000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D04535000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D03E8E000
trusted library allocation
page read and write
24D79761000
heap
page read and write
24D046CA000
trusted library allocation
page read and write
2078A877000
trusted library allocation
page read and write
24D7F849000
trusted library allocation
page read and write
24D0AC99000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D0AFFB000
trusted library allocation
page read and write
24D0AE2A000
trusted library allocation
page read and write
24D0AE54000
trusted library allocation
page read and write
24D7E25E000
trusted library allocation
page read and write
24D061E0000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D06553000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D79757000
heap
page read and write
24D046CA000
trusted library allocation
page read and write
24D0EC6A000
trusted library allocation
page read and write
24D0AAA3000
trusted library allocation
page read and write
24D041DA000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D797B7000
heap
page read and write
24D05551000
trusted library allocation
page read and write
24D0AB87000
trusted library allocation
page read and write
24D7FAE5000
trusted library allocation
page read and write
24D0C7CA000
trusted library allocation
page read and write
24D7E26D000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D031EE000
trusted library allocation
page read and write
24D0AAA2000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79778000
heap
page read and write
24D0CBA1000
trusted library allocation
page read and write
2078A672000
unclassified section
page read and write
24D79785000
heap
page read and write
24D028A6000
trusted library allocation
page read and write
24D0C4DB000
trusted library allocation
page read and write
24D02BD2000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0AF67000
trusted library allocation
page read and write
24271A5C000
trusted library allocation
page read and write
24D0AB71000
trusted library allocation
page read and write
24272701000
heap
page read and write
24D0289A000
trusted library allocation
page read and write
24D044DD000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D7F9C7000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D79771000
heap
page read and write
24D02B6B000
trusted library allocation
page read and write
2078A8D7000
trusted library allocation
page read and write
24D0AEA7000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D05582000
trusted library allocation
page read and write
24D0AB33000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D79771000
heap
page read and write
24D02D6E000
trusted library allocation
page read and write
24D047E9000
trusted library allocation
page read and write
24D7F886000
trusted library allocation
page read and write
24D797AE000
heap
page read and write
24D797AF000
heap
page read and write
24D04FE7000
trusted library allocation
page read and write
24D0AFC7000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D049E5000
trusted library allocation
page read and write
24D7F7E0000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D0E554000
trusted library allocation
page read and write
24D0029B000
heap
page read and write
24D0479D000
trusted library allocation
page read and write
242727ED000
heap
page read and write
24D0616E000
trusted library allocation
page read and write
24FEA51B000
trusted library allocation
page read and write
24D7E7F6000
trusted library allocation
page read and write
24D0AD4C000
trusted library allocation
page read and write
24D0FE96000
trusted library allocation
page read and write
24D002D4000
heap
page read and write
24D0EF06000
heap
page read and write
24D79764000
heap
page read and write
24D0FB10000
trusted library allocation
page read and write
24D031EE000
trusted library allocation
page read and write
24D7F8CC000
trusted library allocation
page read and write
24D7E26D000
trusted library allocation
page read and write
24D0E9AD000
trusted library allocation
page read and write
24D062D2000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
24D797B8000
heap
page read and write
24D79762000
heap
page read and write
24D047AE000
trusted library allocation
page read and write
24D0354D000
trusted library allocation
page read and write
24D02D88000
trusted library allocation
page read and write
D44000
heap
page read and write
24D79757000
heap
page read and write
24D7E185000
trusted library allocation
page read and write
24D79753000
heap
page read and write
24D0504D000
trusted library allocation
page read and write
24D0ED85000
trusted library allocation
page read and write
24D7E1BF000
trusted library allocation
page read and write
24D041D5000
trusted library allocation
page read and write
24D05576000
trusted library allocation
page read and write
24D06058000
trusted library allocation
page read and write
24D7F9EF000
trusted library allocation
page read and write
24D04972000
trusted library allocation
page read and write
24D79785000
heap
page read and write
3DC1000
heap
page read and write
24FEA363000
trusted library allocation
page read and write
24D0027A000
heap
page read and write
24D04457000
trusted library allocation
page read and write
24D79757000
heap
page read and write
1CA60607000
trusted library allocation
page read and write
24D7F849000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D797D7000
heap
page read and write
24D02BD2000
trusted library allocation
page read and write
24D0AE15000
trusted library allocation
page read and write
24D04565000
trusted library allocation
page read and write
24D0AE48000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24271A48000
trusted library allocation
page read and write
24D0B4CE000
trusted library allocation
page read and write
24D7975A000
heap
page read and write
24D0E933000
trusted library allocation
page read and write
24D03468000
trusted library allocation
page read and write
24D05300000
trusted library allocation
page read and write
24D72AF0000
trusted library allocation
page read and write
24272769000
heap
page read and write
91000
unkown
page execute read
24D0ABC7000
trusted library allocation
page read and write
24D0555B000
trusted library allocation
page read and write
24D002AA000
heap
page read and write
24D0ACF5000
trusted library allocation
page read and write
24D7F8C5000
trusted library allocation
page read and write
24D03BB5000
trusted library allocation
page read and write
24D049B9000
trusted library allocation
page read and write
91000
unkown
page execute read
24D79798000
heap
page read and write
24D79737000
heap
page read and write
24D7E246000
trusted library allocation
page read and write
24D7F8A1000
trusted library allocation
page read and write
24D06581000
trusted library allocation
page read and write
24D04524000
trusted library allocation
page read and write
24D0EED0000
trusted library allocation
page read and write
24D0ADA7000
trusted library allocation
page read and write
24D0EFBC000
heap
page read and write
24D0AFF5000
trusted library allocation
page read and write
24D049AE000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D7F7DE000
trusted library allocation
page read and write
24D02BD2000
trusted library allocation
page read and write
24D02BD2000
trusted library allocation
page read and write
24D0AFCF000
trusted library allocation
page read and write
24D7F9BF000
trusted library allocation
page read and write
1D311D97000
heap
page read and write
24D06116000
trusted library allocation
page read and write
24D7FA4B000
trusted library allocation
page read and write
24D0AF8F000
trusted library allocation
page read and write
24D031CD000
trusted library allocation
page read and write
24D0EF71000
heap
page read and write
24D0EDF9000
trusted library allocation
page read and write
24D79770000
heap
page read and write
24D00281000
heap
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D0E5E1000
trusted library allocation
page read and write
24D02B49000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D002CC000
heap
page read and write
24D7977A000
heap
page read and write
24D7F9D0000
trusted library allocation
page read and write
24D0E9B0000
trusted library allocation
page read and write
24D0493B000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D047E6000
trusted library allocation
page read and write
24D79778000
heap
page read and write
2427277D000
heap
page read and write
24D79764000
heap
page read and write
24D00277000
heap
page read and write
24D03E5D000
trusted library allocation
page read and write
24D7F85C000
trusted library allocation
page read and write
24D0EC97000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D034F5000
trusted library allocation
page read and write
24D044BE000
trusted library allocation
page read and write
24D0628B000
trusted library allocation
page read and write
2078AB03000
trusted library allocation
page read and write
24D0AD97000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0657C000
trusted library allocation
page read and write
24D0617A000
trusted library allocation
page read and write
24D0AB32000
trusted library allocation
page read and write
24D79777000
heap
page read and write
24D0EE2A000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24D0AD29000
trusted library allocation
page read and write
24D0FB18000
trusted library allocation
page read and write
24D04281000
trusted library allocation
page read and write
24271900000
trusted library allocation
page read and write
24D0AF8C000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24FEA383000
trusted library allocation
page read and write
24D0509B000
trusted library allocation
page read and write
24D7F97A000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0D11B000
trusted library allocation
page read and write
242727E0000
heap
page read and write
24D797AD000
heap
page read and write
24D03ED2000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0AD7D000
trusted library allocation
page read and write
24271B10000
unclassified section
page read and write
24D7977C000
heap
page read and write
24D0FCDF000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7F826000
trusted library allocation
page read and write
24D042B9000
trusted library allocation
page read and write
24D0450B000
trusted library allocation
page read and write
24D047C0000
trusted library allocation
page read and write
24D03144000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0FC0E000
trusted library allocation
page read and write
24D041C7000
trusted library allocation
page read and write
24FEA37A000
trusted library allocation
page read and write
2427286A000
heap
page read and write
24D0498B000
trusted library allocation
page read and write
24D0CBE7000
trusted library allocation
page read and write
24D0AF27000
trusted library allocation
page read and write
24D79778000
heap
page read and write
24D7F856000
trusted library allocation
page read and write
24D0EE72000
trusted library allocation
page read and write
14A0000
heap
page read and write
24D79785000
heap
page read and write
24D797B4000
heap
page read and write
24D02BA2000
trusted library allocation
page read and write
24D03DAB000
trusted library allocation
page read and write
24D04174000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D047FE000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D7F8FD000
trusted library allocation
page read and write
24D0AC71000
trusted library allocation
page read and write
24D7E900000
trusted library allocation
page read and write
24D05582000
trusted library allocation
page read and write
24FEA50C000
trusted library allocation
page read and write
24D002C5000
heap
page read and write
24D02BA9000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D06173000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D02B08000
trusted library allocation
page read and write
24D0E891000
trusted library allocation
page read and write
24D0451F000
trusted library allocation
page read and write
24D02BD2000
trusted library allocation
page read and write
24D00299000
heap
page read and write
24D05576000
trusted library allocation
page read and write
24D026BC000
trusted library allocation
page read and write
1D310200000
heap
page read and write
24D79768000
heap
page read and write
24D79785000
heap
page read and write
24D041CB000
trusted library allocation
page read and write
24D0557B000
trusted library allocation
page read and write
24D041D7000
trusted library allocation
page read and write
24D0027D000
heap
page read and write
24D04441000
trusted library allocation
page read and write
24D79767000
heap
page read and write
24D0AE59000
trusted library allocation
page read and write
24D79734000
heap
page read and write
24D031E7000
trusted library allocation
page read and write
24D05628000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24D035AE000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D02C68000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D055FE000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D049F1000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D797AF000
heap
page read and write
24D026D6000
trusted library allocation
page read and write
24D03537000
trusted library allocation
page read and write
24D79777000
heap
page read and write
24D797AC000
heap
page read and write
24D034C3000
trusted library allocation
page read and write
24D7F8C9000
trusted library allocation
page read and write
24D02CFC000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D04FA0000
trusted library allocation
page read and write
24D055D7000
trusted library allocation
page read and write
24D0AABE000
trusted library allocation
page read and write
24D0319F000
trusted library allocation
page read and write
24D03147000
trusted library allocation
page read and write
24D0D1A6000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0AADB000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0AABE000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D7F9E8000
trusted library allocation
page read and write
1CA601A0000
heap
page read and write
24D03183000
trusted library allocation
page read and write
24D0AC73000
trusted library allocation
page read and write
24D7975F000
heap
page read and write
24D04178000
trusted library allocation
page read and write
14F0000
heap
page read and write
24D797B4000
heap
page read and write
24D0EED8000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D79751000
heap
page read and write
24D7975D000
heap
page read and write
24D7E2DC000
trusted library allocation
page read and write
24271A23000
trusted library allocation
page read and write
24D0413E000
trusted library allocation
page read and write
24D0AE7E000
trusted library allocation
page read and write
24D0AAA1000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D02B8E000
trusted library allocation
page read and write
24D05589000
trusted library allocation
page read and write
24D7E23D000
trusted library allocation
page read and write
24D034BD000
trusted library allocation
page read and write
24D002C3000
heap
page read and write
24D0EDD1000
trusted library allocation
page read and write
24D002A6000
heap
page read and write
24D7974E000
heap
page read and write
24D0EF48000
heap
page read and write
24D0E885000
trusted library allocation
page read and write
24D0E9AD000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
24271A0C000
trusted library allocation
page read and write
24D04177000
trusted library allocation
page read and write
24D044DB000
trusted library allocation
page read and write
24D0AB30000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D002AA000
heap
page read and write
24D7975B000
heap
page read and write
24D7E86D000
trusted library allocation
page read and write
24D031B2000
trusted library allocation
page read and write
24D0FC2D000
trusted library allocation
page read and write
24D79771000
heap
page read and write
2078A9B4000
heap
page read and write
24FEA1E0000
heap
page read and write
24D03E4D000
trusted library allocation
page read and write
14BF000
heap
page read and write
24FEA32E000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79757000
heap
page read and write
24D0C824000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24271B44000
heap
page read and write
24D0ECE9000
trusted library allocation
page read and write
24D035E4000
trusted library allocation
page read and write
1D310210000
heap
page read and write
24D7E207000
trusted library allocation
page read and write
24D7F8B9000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D7EBFC000
trusted library allocation
page read and write
24D04404000
trusted library allocation
page read and write
24D03B88000
trusted library allocation
page read and write
24D7F9A9000
trusted library allocation
page read and write
24D00281000
heap
page read and write
24D7FB38000
trusted library allocation
page read and write
24D0E826000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D79770000
heap
page read and write
24D02D7F000
trusted library allocation
page read and write
24D0EEDA000
trusted library allocation
page read and write
24D0319B000
trusted library allocation
page read and write
24D0AF16000
trusted library allocation
page read and write
24D034A3000
trusted library allocation
page read and write
164000
unkown
page readonly
24D7976A000
heap
page read and write
24D00277000
heap
page read and write
F17C14E000
unkown
page readonly
24272877000
heap
page read and write
24D7F9EA000
trusted library allocation
page read and write
2427286A000
heap
page read and write
24D05067000
trusted library allocation
page read and write
24D0CBAF000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D0445A000
trusted library allocation
page read and write
24D044AD000
trusted library allocation
page read and write
24D0AEEB000
trusted library allocation
page read and write
24D02D63000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0AFFD000
trusted library allocation
page read and write
24D0AE76000
trusted library allocation
page read and write
24D0442F000
trusted library allocation
page read and write
24D034E0000
trusted library allocation
page read and write
14D2000
heap
page read and write
24D0AEE4000
trusted library allocation
page read and write
12C000
unkown
page readonly
D44000
heap
page read and write
24D02CFE000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D7976B000
heap
page read and write
24D0C432000
trusted library allocation
page read and write
24D79765000
heap
page read and write
24D0C440000
trusted library allocation
page read and write
24D0AB87000
trusted library allocation
page read and write
24D044B6000
trusted library allocation
page read and write
24D0EF01000
heap
page read and write
24D79785000
heap
page read and write
24D03E4B000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7974F000
heap
page read and write
242727ED000
heap
page read and write
24D79762000
heap
page read and write
14CF000
heap
page read and write
24D79770000
heap
page read and write
24D055D7000
trusted library allocation
page read and write
24D0563D000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0E95A000
trusted library allocation
page read and write
24FEA36E000
trusted library allocation
page read and write
24D7F8C9000
trusted library allocation
page read and write
24D7E211000
trusted library allocation
page read and write
24D04565000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24272877000
heap
page read and write
24D035A7000
trusted library allocation
page read and write
24D02D38000
trusted library allocation
page read and write
24D7F8D5000
trusted library allocation
page read and write
24D7FAF6000
trusted library allocation
page read and write
24D7E286000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
1430000
heap
page read and write
24D0AD75000
trusted library allocation
page read and write
24FEA436000
heap
page read and write
24D79757000
heap
page read and write
24D0EDE8000
trusted library allocation
page read and write
24D0C801000
trusted library allocation
page read and write
24D03413000
trusted library allocation
page read and write
24D0E961000
trusted library allocation
page read and write
24D031AA000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D7F836000
trusted library allocation
page read and write
24D0AB69000
trusted library allocation
page read and write
24D797B2000
heap
page read and write
24D031DF000
trusted library allocation
page read and write
24D03DFD000
trusted library allocation
page read and write
24D0AEAF000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D79776000
heap
page read and write
24D03169000
trusted library allocation
page read and write
24D03F02000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7974E000
heap
page read and write
24D79762000
heap
page read and write
24D7F8A1000
trusted library allocation
page read and write
24D03AC5000
trusted library allocation
page read and write
24FEA520000
trusted library allocation
page read and write
24D0AAC7000
trusted library allocation
page read and write
24D04942000
trusted library allocation
page read and write
24D04E5B000
trusted library allocation
page read and write
24D0C7F9000
trusted library allocation
page read and write
D44000
heap
page read and write
24D0439B000
trusted library allocation
page read and write
1CA6060A000
trusted library allocation
page read and write
24D0AAC7000
trusted library allocation
page read and write
24D0556A000
trusted library allocation
page read and write
24D05288000
trusted library allocation
page read and write
24D0AD37000
trusted library allocation
page read and write
24D7E1C1000
trusted library allocation
page read and write
24D0B4FB000
trusted library allocation
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D0417B000
trusted library allocation
page read and write
24D0E58A000
trusted library allocation
page read and write
2427172B000
remote allocation
page execute read
24D7E1DF000
trusted library allocation
page read and write
24D7F867000
trusted library allocation
page read and write
24D0ACEC000
trusted library allocation
page read and write
24D0AE17000
trusted library allocation
page read and write
24D0EDF2000
trusted library allocation
page read and write
24D7E24E000
trusted library allocation
page read and write
24D0EED4000
trusted library allocation
page read and write
24D7F89D000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0C4D4000
trusted library allocation
page read and write
24D0ABAF000
trusted library allocation
page read and write
24D031DB000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D044BB000
trusted library allocation
page read and write
242727F2000
heap
page read and write
24D79754000
heap
page read and write
24D034E0000
trusted library allocation
page read and write
24FEA103000
heap
page read and write
24D0AABA000
trusted library allocation
page read and write
24D7F9A7000
trusted library allocation
page read and write
24D0AAB6000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D7FAA1000
trusted library allocation
page read and write
24D0AFFD000
trusted library allocation
page read and write
24D7976A000
heap
page read and write
24D0447B000
trusted library allocation
page read and write
1434000
heap
page read and write
242727ED000
heap
page read and write
24D79785000
heap
page read and write
24D049EA000
trusted library allocation
page read and write
24D7FA61000
trusted library allocation
page read and write
24D055D2000
trusted library allocation
page read and write
24D002AD000
heap
page read and write
24D0ACE8000
trusted library allocation
page read and write
24D03BAA000
trusted library allocation
page read and write
24D0CB5E000
trusted library allocation
page read and write
24D797AF000
heap
page read and write
24D04445000
trusted library allocation
page read and write
24D7EBA3000
trusted library allocation
page read and write
24D03158000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D03ED2000
trusted library allocation
page read and write
68FB3FE000
unkown
page readonly
1D311DB0000
heap
page read and write
24D7975D000
heap
page read and write
24D0528F000
trusted library allocation
page read and write
24D02B90000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D7976D000
heap
page read and write
2078A8F6000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D002B6000
heap
page read and write
24D7976A000
heap
page read and write
2078AC0C000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D062E1000
trusted library allocation
page read and write
24272600000
trusted library allocation
page read and write
24D7F88C000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D03E53000
trusted library allocation
page read and write
24D0D1AF000
trusted library allocation
page read and write
24D03DB0000
trusted library allocation
page read and write
24D0E8B9000
trusted library allocation
page read and write
24272760000
heap
page read and write
24D0E8EC000
trusted library allocation
page read and write
24FEA060000
unclassified section
page readonly
24D049B3000
trusted library allocation
page read and write
24D7977F000
heap
page read and write
24D0AEF8000
trusted library allocation
page read and write
24D05543000
trusted library allocation
page read and write
242716B0000
unclassified section
page readonly
24D7F8A1000
trusted library allocation
page read and write
24D7977A000
heap
page read and write
24D79757000
heap
page read and write
24D7974F000
heap
page read and write
24D04EC0000
trusted library allocation
page read and write
24D0AEF6000
trusted library allocation
page read and write
24D79778000
heap
page read and write
2427275C000
heap
page read and write
24D055C7000
trusted library allocation
page read and write
24D03132000
trusted library allocation
page read and write
24D05632000
trusted library allocation
page read and write
24D0E9CB000
trusted library allocation
page read and write
24D0E994000
trusted library allocation
page read and write
24D0554F000
trusted library allocation
page read and write
24FE9FE0000
unclassified section
page readonly
24D7F98F000
trusted library allocation
page read and write
24D047F4000
trusted library allocation
page read and write
24D0ACE4000
trusted library allocation
page read and write
24D044B2000
trusted library allocation
page read and write
24D7F7F9000
trusted library allocation
page read and write
24D79776000
heap
page read and write
24D051F4000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D7977A000
heap
page read and write
242716C0000
unclassified section
page readonly
24D0C759000
trusted library allocation
page read and write
24D041D7000
trusted library allocation
page read and write
24D055C7000
trusted library allocation
page read and write
24D0555B000
trusted library allocation
page read and write
24D7F9EA000
trusted library allocation
page read and write
24D0B4CE000
trusted library allocation
page read and write
24D04576000
trusted library allocation
page read and write
24D79778000
heap
page read and write
2078A510000
heap
page read and write
24D79798000
heap
page read and write
13EF000
stack
page read and write
242727FD000
heap
page read and write
24D02DD1000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D04245000
trusted library allocation
page read and write
24D002A1000
heap
page read and write
24D0C4CC000
trusted library allocation
page read and write
2078A85D000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D7F852000
trusted library allocation
page read and write
24D0E82C000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D7F8E6000
trusted library allocation
page read and write
24D0E9F1000
trusted library allocation
page read and write
24D051D1000
trusted library allocation
page read and write
24D0EDE5000
trusted library allocation
page read and write
24D0AEF8000
trusted library allocation
page read and write
14C2000
heap
page read and write
24D044E2000
trusted library allocation
page read and write
24D026E9000
trusted library allocation
page read and write
24D7977C000
heap
page read and write
24D0B491000
trusted library allocation
page read and write
24D0027E000
heap
page read and write
24D0CB55000
trusted library allocation
page read and write
24D0AD46000
trusted library allocation
page read and write
24D04372000
trusted library allocation
page read and write
24D79765000
heap
page read and write
73F51FE000
stack
page read and write
24D041D5000
trusted library allocation
page read and write
24D031F3000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D02884000
trusted library allocation
page read and write
24D0AEE7000
trusted library allocation
page read and write
24D0EDD1000
trusted library allocation
page read and write
24FEA517000
trusted library allocation
page read and write
24D06155000
trusted library allocation
page read and write
24D7F87E000
trusted library allocation
page read and write
2427278A000
heap
page read and write
24272760000
heap
page read and write
24D041B3000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0AF10000
trusted library allocation
page read and write
24D0B48A000
trusted library allocation
page read and write
24D0C6C1000
trusted library allocation
page read and write
24D04547000
trusted library allocation
page read and write
24D047E4000
trusted library allocation
page read and write
24D041DE000
trusted library allocation
page read and write
24D79763000
heap
page read and write
24D79785000
heap
page read and write
24D049A1000
trusted library allocation
page read and write
24D79757000
heap
page read and write
24D79785000
heap
page read and write
24D7976B000
heap
page read and write
24D0423D000
trusted library allocation
page read and write
24D0C4AA000
trusted library allocation
page read and write
24D797B8000
heap
page read and write
24D79751000
heap
page read and write
24D7975F000
heap
page read and write
24D049B6000
trusted library allocation
page read and write
24D03479000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D797AC000
heap
page read and write
24D7E7FE000
trusted library allocation
page read and write
14C6000
heap
page read and write
24D0EECC000
trusted library allocation
page read and write
24D79764000
heap
page read and write
24D046C8000
trusted library allocation
page read and write
24FEA430000
heap
page read and write
24D7975F000
heap
page read and write
24D79762000
heap
page read and write
24D79757000
heap
page read and write
24D79754000
heap
page read and write
24D047AB000
trusted library allocation
page read and write
242727E6000
heap
page read and write
24D7977D000
heap
page read and write
24D026CF000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D031B2000
trusted library allocation
page read and write
24D0315B000
trusted library allocation
page read and write
24D051F6000
trusted library allocation
page read and write
24D79769000
heap
page read and write
24D79785000
heap
page read and write
24D02BD2000
trusted library allocation
page read and write
24D0FB2B000
trusted library allocation
page read and write
24D0ED25000
trusted library allocation
page read and write
24D79763000
heap
page read and write
242727E1000
heap
page read and write
24D0652D000
trusted library allocation
page read and write
24D03511000
trusted library allocation
page read and write
24D7FA6D000
trusted library allocation
page read and write
24D0AA8F000
trusted library allocation
page read and write
24D031A7000
trusted library allocation
page read and write
68FCDFE000
stack
page read and write
2078A470000
remote allocation
page read and write
24D797D5000
heap
page read and write
24D79798000
heap
page read and write
24D035AE000
trusted library allocation
page read and write
24D002A8000
heap
page read and write
24D0AD4E000
trusted library allocation
page read and write
24D035F8000
trusted library allocation
page read and write
24D04374000
trusted library allocation
page read and write
24D044CD000
trusted library allocation
page read and write
24D035F8000
trusted library allocation
page read and write
24D0434E000
trusted library allocation
page read and write
24D0AAB6000
trusted library allocation
page read and write
24D0C4AC000
trusted library allocation
page read and write
24D79762000
heap
page read and write
24D031E3000
trusted library allocation
page read and write
24D7F9C7000
trusted library allocation
page read and write
2427276C000
heap
page read and write
24D7F89D000
trusted library allocation
page read and write
24D0CB51000
trusted library allocation
page read and write
24D05043000
trusted library allocation
page read and write
24D0496C000
trusted library allocation
page read and write
24D05055000
trusted library allocation
page read and write
24D0AFEE000
trusted library allocation
page read and write
24D041D3000
trusted library allocation
page read and write
24D05565000
trusted library allocation
page read and write
F17C18C000
stack
page read and write
24D0AEFB000
trusted library allocation
page read and write
24D0EF36000
heap
page read and write
24D031F1000
trusted library allocation
page read and write
24D0AFCF000
trusted library allocation
page read and write
24D0B490000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D0628E000
trusted library allocation
page read and write
24D0AD9D000
trusted library allocation
page read and write
2078A8C4000
trusted library allocation
page read and write
24D04957000
trusted library allocation
page read and write
24D7E8D2000
trusted library allocation
page read and write
24D79760000
heap
page read and write
24D02DB7000
trusted library allocation
page read and write
24D0E5E1000
trusted library allocation
page read and write
24D7F87E000
trusted library allocation
page read and write
24D02DB7000
trusted library allocation
page read and write
24D04982000
trusted library allocation
page read and write
24D79758000
heap
page read and write
24D02B92000
trusted library allocation
page read and write
24D002C6000
heap
page read and write
24D797AC000
heap
page read and write
24D0EDEB000
trusted library allocation
page read and write
24D0ECDE000
trusted library allocation
page read and write
24D0529C000
trusted library allocation
page read and write
24D797D4000
heap
page read and write
24D0ACB8000
trusted library allocation
page read and write
24D047AE000
trusted library allocation
page read and write
24D0EF3F000
heap
page read and write
24D79762000
heap
page read and write
24D0CB3C000
trusted library allocation
page read and write
24D0CB1B000
trusted library allocation
page read and write
24D0B000000
trusted library allocation
page read and write
24D79785000
heap
page read and write
D44000
heap
page read and write
24D79798000
heap
page read and write
24272877000
heap
page read and write
24D03E99000
trusted library allocation
page read and write
24D7975D000
heap
page read and write
24D031CD000
trusted library allocation
page read and write
24D031C1000
trusted library allocation
page read and write
24D041E1000
trusted library allocation
page read and write
24FEA3EB000
trusted library allocation
page read and write
24D0E89B000
trusted library allocation
page read and write
24D055C7000
trusted library allocation
page read and write
24272764000
heap
page read and write
24D04160000
trusted library allocation
page read and write
24D0C4DE000
trusted library allocation
page read and write
24D028E8000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D04193000
trusted library allocation
page read and write
24D0ACE0000
trusted library allocation
page read and write
24D051F6000
trusted library allocation
page read and write
DE0000
heap
page read and write
24D0AE1A000
trusted library allocation
page read and write
24D05052000
trusted library allocation
page read and write
24D02DEA000
trusted library allocation
page read and write
24D7975E000
heap
page read and write
24D03EAA000
trusted library allocation
page read and write
24D0C4D9000
trusted library allocation
page read and write
24D0428E000
trusted library allocation
page read and write
24D02C4E000
trusted library allocation
page read and write
24D0EFBC000
heap
page read and write
24D79771000
heap
page read and write
24D7977C000
heap
page read and write
24D0CB0F000
trusted library allocation
page read and write
24D0E834000
trusted library allocation
page read and write
24D7977F000
heap
page read and write
24D7E776000
trusted library allocation
page read and write
24272035000
unkown
page execute read
24D04370000
trusted library allocation
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D7F8FD000
trusted library allocation
page read and write
24D0E8D8000
trusted library allocation
page read and write
24D043E2000
trusted library allocation
page read and write
24D7F836000
trusted library allocation
page read and write
24D031E3000
trusted library allocation
page read and write
24D031EE000
trusted library allocation
page read and write
24D0AB61000
trusted library allocation
page read and write
24D79771000
heap
page read and write
2078A8B0000
trusted library allocation
page read and write
24D0557B000
trusted library allocation
page read and write
68FB3BD000
stack
page read and write
24D0EED6000
trusted library allocation
page read and write
24D0496C000
trusted library allocation
page read and write
24D0AAD5000
trusted library allocation
page read and write
24D0AACF000
trusted library allocation
page read and write
24D02BA2000
trusted library allocation
page read and write
24D055FD000
trusted library allocation
page read and write
68FD5FE000
unkown
page readonly
24D7F9BB000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D0AE4B000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D7F71B000
trusted library allocation
page read and write
24D0AFB1000
trusted library allocation
page read and write
24D0FB0E000
trusted library allocation
page read and write
24D0AE7B000
trusted library allocation
page read and write
24D7E1A5000
trusted library allocation
page read and write
24D79754000
heap
page read and write
24D79757000
heap
page read and write
24D041B3000
trusted library allocation
page read and write
24D0AACF000
trusted library allocation
page read and write
24D05551000
trusted library allocation
page read and write
24D7F9E8000
trusted library allocation
page read and write
24D0C6FC000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D05579000
trusted library allocation
page read and write
24D0AF67000
trusted library allocation
page read and write
24FEA35D000
trusted library allocation
page read and write
24D79790000
heap
page read and write
24D7E882000
trusted library allocation
page read and write
24D00299000
heap
page read and write
24D797AD000
heap
page read and write
24D79745000
heap
page read and write
24D79762000
heap
page read and write
24D79762000
heap
page read and write
24D002F5000
heap
page read and write
24D03EB6000
trusted library allocation
page read and write
24D0AFE9000
trusted library allocation
page read and write
24D026B8000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D05548000
trusted library allocation
page read and write
2078A866000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0EECE000
trusted library allocation
page read and write
24D0AB6B000
trusted library allocation
page read and write
24D7F8C5000
trusted library allocation
page read and write
24D0EE2A000
trusted library allocation
page read and write
24D0C483000
trusted library allocation
page read and write
24D7976A000
heap
page read and write
24D7F9E4000
trusted library allocation
page read and write
24D797DD000
heap
page read and write
24D797AF000
heap
page read and write
2427274D000
heap
page read and write
24D035FE000
trusted library allocation
page read and write
24D79785000
heap
page read and write
2078A4B0000
heap
page read and write
24D7F7DC000
trusted library allocation
page read and write
24D06138000
trusted library allocation
page read and write
24D044DD000
trusted library allocation
page read and write
24D7977E000
heap
page read and write
24D0423F000
trusted library allocation
page read and write
24D0497A000
trusted library allocation
page read and write
24D797AC000
heap
page read and write
24D79752000
heap
page read and write
24D79754000
heap
page read and write
24D7E3FE000
trusted library allocation
page read and write
24272858000
heap
page read and write
24D0353F000
trusted library allocation
page read and write
24D79768000
heap
page read and write
24D047BB000
trusted library allocation
page read and write
24D0428E000
trusted library allocation
page read and write
24D02DEE000
trusted library allocation
page read and write
24D0CB78000
trusted library allocation
page read and write
24D0AF27000
trusted library allocation
page read and write
24272760000
heap
page read and write
24D79770000
heap
page read and write
24D02898000
trusted library allocation
page read and write
24D0C785000
trusted library allocation
page read and write
1CA602F0000
heap
page read and write
24D79785000
heap
page read and write
24D7976D000
heap
page read and write
24D0438E000
trusted library allocation
page read and write
24D79751000
heap
page read and write
24D7F874000
trusted library allocation
page read and write
24D79780000
heap
page read and write
24271B40000
heap
page read and write
24FEA434000
heap
page read and write
24D049EA000
trusted library allocation
page read and write
24D0AEFB000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D0AFBC000
trusted library allocation
page read and write
24D0C4ED000
trusted library allocation
page read and write
24D0354D000
trusted library allocation
page read and write
24D0AEC5000
trusted library allocation
page read and write
24D79765000
heap
page read and write
24D031C1000
trusted library allocation
page read and write
24D7F9FE000
trusted library allocation
page read and write
24D031DA000
trusted library allocation
page read and write
24D7974E000
heap
page read and write
24D0561F000
trusted library allocation
page read and write
24D0612B000
trusted library allocation
page read and write
24D0E8C2000
trusted library allocation
page read and write
24D797AD000
heap
page read and write
24D0B4C6000
trusted library allocation
page read and write
24D7E866000
trusted library allocation
page read and write
24D04786000
trusted library allocation
page read and write
24D7F8F7000
trusted library allocation
page read and write
24D04937000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D0E5B4000
trusted library allocation
page read and write
24D04191000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D7975A000
heap
page read and write
24D03EF7000
trusted library allocation
page read and write
24D0AC30000
trusted library allocation
page read and write
24D79734000
heap
page read and write
24D047B4000
trusted library allocation
page read and write
242727F1000
heap
page read and write
24D7976E000
heap
page read and write
14D9000
heap
page read and write
24D7974F000
heap
page read and write
14A8000
heap
page read and write
24D02633000
trusted library allocation
page read and write
24D7F852000
trusted library allocation
page read and write
24D040EE000
trusted library allocation
page read and write
24D02B66000
trusted library allocation
page read and write
24D0AF59000
trusted library allocation
page read and write
24D7FA47000
trusted library allocation
page read and write
24D049F3000
trusted library allocation
page read and write
24D79798000
heap
page read and write
3EC0000
trusted library allocation
page read and write
24D03E58000
trusted library allocation
page read and write
14D2000
heap
page read and write
24D046CA000
trusted library allocation
page read and write
24D79771000
heap
page read and write
24D0450B000
trusted library allocation
page read and write
24D0C4D4000
trusted library allocation
page read and write
24D7975B000
heap
page read and write
24D051F2000
trusted library allocation
page read and write
24D04234000
trusted library allocation
page read and write
24D04E82000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D7974F000
heap
page read and write
24D0ECE5000
trusted library allocation
page read and write
24272709000
heap
page read and write
24D0AC75000
trusted library allocation
page read and write
24D04965000
trusted library allocation
page read and write
24D79777000
heap
page read and write
24D79771000
heap
page read and write
24D79764000
heap
page read and write
24D049AE000
trusted library allocation
page read and write
24D0C4AA000
trusted library allocation
page read and write
24D79798000
heap
page read and write
24D0421B000
trusted library allocation
page read and write
24D03F0A000
trusted library allocation
page read and write
24D0D12B000
trusted library allocation
page read and write
24D05542000
trusted library allocation
page read and write
24D0555D000
trusted library allocation
page read and write
24D7974F000
heap
page read and write
24D049E5000
trusted library allocation
page read and write
24D03585000
trusted library allocation
page read and write
24D0B4C6000
trusted library allocation
page read and write
24D79785000
heap
page read and write
24D02BD2000
trusted library allocation
page read and write
24D044E2000
trusted library allocation
page read and write
24D7979F000
heap
page read and write
24D0ACA8000
trusted library allocation
page read and write
There are 3942 hidden memdumps, click here to show them.