IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_acf8b154-b237-4e2d-afd7-0699068602cd.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_acf8b154-b237-4e2d-afd7-0699068602cd.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52ff7113-6985-4006-bec7-7eb2328d957f} 7780 "\\.\pipe\gecko-crash-server-pipe.7780" 2d29b56fb10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4136 -parentBuildID 20230927232528 -prefsHandle 4188 -prefMapHandle 4184 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd698bc7-645a-4afe-acb1-9f9348c4d216} 7780 "\\.\pipe\gecko-crash-server-pipe.7780" 2d2ad635210 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5212 -prefMapHandle 5264 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58edcd17-e6ab-4b3e-b629-9824facfceb3} 7780 "\\.\pipe\gecko-crash-server-pipe.7780" 2d2ac551310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.microsoft.JG
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
http://crl3.digic
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.174
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.114.101
unknown
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
142.250.185.238
youtube.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2D2AB6C5000
trusted library allocation
page read and write
2D2ACD64000
trusted library allocation
page read and write
2D2B349F000
trusted library allocation
page read and write
2D2ADF62000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2A23AF000
heap
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2AB45A000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AB9C3000
trusted library allocation
page read and write
2D2B37EE000
trusted library allocation
page read and write
2D2AC459000
trusted library allocation
page read and write
2D2A8D89000
heap
page read and write
2D2A86A3000
trusted library allocation
page read and write
2D2AB93B000
trusted library allocation
page read and write
2D2A8AA9000
trusted library allocation
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2ACA7E000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2B37C5000
trusted library allocation
page read and write
16E1000
heap
page read and write
2D2B367E000
trusted library allocation
page read and write
2D2A8D6A000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2D2AB6D5000
trusted library allocation
page read and write
1A624B20000
heap
page read and write
2D2B36E6000
trusted library allocation
page read and write
2D2AB968000
trusted library allocation
page read and write
2D2AB9C3000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A238D000
heap
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2ACDFD000
trusted library allocation
page read and write
2D2ADF9B000
trusted library allocation
page read and write
2D2B387E000
trusted library allocation
page read and write
2D2A23BA000
heap
page read and write
2D2B67B0000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A7500000
trusted library allocation
page read and write
2D2ADCD4000
trusted library allocation
page read and write
2D2ABBF0000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2AC78A000
trusted library allocation
page read and write
2D2AC9F7000
trusted library allocation
page read and write
2D2A8524000
trusted library allocation
page read and write
2D2A85E8000
trusted library allocation
page read and write
2D2B5002000
trusted library allocation
page read and write
2D2ACBD0000
trusted library allocation
page read and write
2D2B3872000
trusted library allocation
page read and write
3DF0000
heap
page read and write
3848FFF000
stack
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2B36C7000
trusted library allocation
page read and write
2D2B365A000
trusted library allocation
page read and write
2D2AC44B000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2AB4AF000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2AC9D1000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B4DB7000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2ADFE5000
trusted library allocation
page read and write
2D2AC687000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ADDF9000
trusted library allocation
page read and write
2D2B4F71000
trusted library allocation
page read and write
2D2AB376000
trusted library allocation
page read and write
2D2B4CEB000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A23C4000
heap
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2B351A000
trusted library allocation
page read and write
2D2AC9D7000
trusted library allocation
page read and write
2D2ACA37000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
1A62676E000
heap
page read and write
2D2AD77F000
trusted library allocation
page read and write
2D2AB9B9000
trusted library allocation
page read and write
2D2AD758000
trusted library allocation
page read and write
2D2B5AFC000
trusted library allocation
page read and write
2D2ACAAE000
trusted library allocation
page read and write
2D2AC705000
trusted library allocation
page read and write
2D2AB4C1000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2ADC1F000
trusted library allocation
page read and write
2D2AB669000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2A8CF9000
heap
page read and write
2D2B5995000
trusted library allocation
page read and write
2D2B36CB000
trusted library allocation
page read and write
2D2AB4FC000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2715E078000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2B36D0000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2A8A7A000
trusted library allocation
page read and write
2D2AB6E7000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2B5D5D000
trusted library allocation
page read and write
2D2B5DF2000
trusted library allocation
page read and write
2D2AB100000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2B67A1000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2715ED58000
heap
page read and write
2D2B4FA7000
trusted library allocation
page read and write
2D2AAF62000
trusted library allocation
page read and write
2D2ACC23000
trusted library allocation
page read and write
2D2B3295000
trusted library allocation
page read and write
2D2B3A97000
trusted library allocation
page read and write
2D2B37E9000
trusted library allocation
page read and write
2D2B5D09000
trusted library allocation
page read and write
2D2ABDB4000
trusted library allocation
page read and write
2D2ADC93000
trusted library allocation
page read and write
CEC000
unkown
page read and write
2D2B3651000
trusted library allocation
page read and write
2D2AC4E1000
trusted library allocation
page read and write
2D2AB90F000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
21BEAE98000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B3AF6000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B3567000
trusted library allocation
page read and write
2D2AB4BE000
trusted library allocation
page read and write
2D2AD59A000
trusted library allocation
page read and write
2715E630000
heap
page read and write
2D2A23FC000
heap
page read and write
2D2AC47C000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
EDC88FE000
stack
page read and write
2D2AE9E9000
trusted library allocation
page read and write
2D2AC6BE000
trusted library allocation
page read and write
2D2A2396000
heap
page read and write
2D2ADD12000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2ADFD8000
trusted library allocation
page read and write
71CA0BE000
unkown
page readonly
2D2A23B3000
heap
page read and write
2D2A2384000
heap
page read and write
2D2B671E000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2ACC10000
trusted library allocation
page read and write
2D2A746D000
trusted library allocation
page read and write
2715ED59000
heap
page read and write
2D2A8D77000
heap
page read and write
1C076310000
unclassified section
page read and write
2D2AB370000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
21BEABD3000
heap
page read and write
2D2A23A4000
heap
page read and write
2D2A23A9000
heap
page read and write
2D2ADFDC000
trusted library allocation
page read and write
2D2ADCAE000
trusted library allocation
page read and write
2D2ABD7C000
trusted library allocation
page read and write
2715ECE0000
heap
page read and write
2D2A8A82000
trusted library allocation
page read and write
2D2B5A29000
trusted library allocation
page read and write
2D2B3846000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A8549000
trusted library allocation
page read and write
2D2B3718000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2AE943000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B3A4B000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC4C8000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2AB4BE000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2ACAB7000
trusted library allocation
page read and write
21BEAE2E000
trusted library allocation
page read and write
1C07670C000
trusted library allocation
page read and write
2D2ADD85000
trusted library allocation
page read and write
21BEABEA000
heap
page read and write
2D2B3678000
trusted library allocation
page read and write
C20000
unkown
page readonly
2D2ABD5F000
trusted library allocation
page read and write
2D2AE9DF000
trusted library allocation
page read and write
313BEE91000
trusted library allocation
page execute read
2D2AB45A000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2A23A2000
heap
page read and write
2D2A239D000
heap
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2AC6A6000
trusted library allocation
page read and write
2D2AC998000
trusted library allocation
page read and write
2D2ADC55000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2AC6C3000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2B35EA000
trusted library allocation
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2ADF6A000
trusted library allocation
page read and write
1C0764B1000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AC9D9000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2B36C0000
trusted library allocation
page read and write
2D2B4C3C000
trusted library allocation
page read and write
2D2A8722000
trusted library allocation
page read and write
2D2B4DFD000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2A23C1000
heap
page read and write
2D2AC48C000
trusted library allocation
page read and write
2D2B5D5D000
trusted library allocation
page read and write
2D2ADCB5000
trusted library allocation
page read and write
2D2ACAAE000
trusted library allocation
page read and write
2D2B5992000
trusted library allocation
page read and write
2D2A8531000
trusted library allocation
page read and write
2D2AB93B000
trusted library allocation
page read and write
2D2B36E1000
trusted library allocation
page read and write
23F94B30000
heap
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AC4C3000
trusted library allocation
page read and write
2D2ABD06000
trusted library allocation
page read and write
2D2AC676000
trusted library allocation
page read and write
2D2AC72E000
trusted library allocation
page read and write
2D2AB4A5000
trusted library allocation
page read and write
2D2B36E8000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2B4CE9000
trusted library allocation
page read and write
2D2B35D7000
trusted library allocation
page read and write
2D2B351A000
trusted library allocation
page read and write
2D2A2421000
heap
page read and write
2D2AB93B000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2ABEA2000
trusted library allocation
page read and write
2715EC5C000
heap
page read and write
2D2B3AD6000
trusted library allocation
page read and write
2D2B67B2000
trusted library allocation
page read and write
2D2B35D5000
trusted library allocation
page read and write
2D2AC726000
trusted library allocation
page read and write
2D2ADF6E000
trusted library allocation
page read and write
2715EB00000
trusted library allocation
page read and write
2D2B4DB0000
trusted library allocation
page read and write
2D2AD7CB000
trusted library allocation
page read and write
2D2AED7C000
trusted library allocation
page read and write
2D2A8A1C000
trusted library allocation
page read and write
EDC913E000
stack
page read and write
2D2A2380000
heap
page read and write
2D2A7376000
trusted library allocation
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2B5A9E000
trusted library allocation
page read and write
2D2AE966000
trusted library allocation
page read and write
2D2A7466000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AAF7A000
trusted library allocation
page read and write
2D2AC6A6000
trusted library allocation
page read and write
1C076472000
trusted library allocation
page read and write
2D2A85EF000
trusted library allocation
page read and write
2D2B4DF1000
trusted library allocation
page read and write
2D2B3AC5000
trusted library allocation
page read and write
2D2AB4DC000
trusted library allocation
page read and write
2D2ADC59000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2AD5B8000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3A6A000
trusted library allocation
page read and write
2D2B364B000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2A8AA9000
trusted library allocation
page read and write
2D2ACA37000
trusted library allocation
page read and write
2D2AC7B1000
trusted library allocation
page read and write
16D0000
heap
page read and write
2D2AB675000
trusted library allocation
page read and write
2D2ACA76000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC792000
trusted library allocation
page read and write
2D2B5D67000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2B389C000
trusted library allocation
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2D2B5974000
trusted library allocation
page read and write
2D2AC998000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2B5988000
trusted library allocation
page read and write
2D2AC6F7000
trusted library allocation
page read and write
2D2AC99E000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2ACA4D000
trusted library allocation
page read and write
2D2B5992000
trusted library allocation
page read and write
2D2AE927000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2715EC6C000
heap
page read and write
2D2A23B3000
heap
page read and write
2D2B358C000
trusted library allocation
page read and write
2715E062000
trusted library allocation
page read and write
2D2ABDED000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
21BEB100000
heap
page read and write
2D2ADCC0000
trusted library allocation
page read and write
2D2A2396000
heap
page read and write
2D2ABD2A000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2715DF02000
unclassified section
page read and write
2D2A23A0000
heap
page read and write
2D2B3834000
trusted library allocation
page read and write
2D2AB590000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2B4C88000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B36C0000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
15C4000
heap
page read and write
CE2000
unkown
page readonly
2D2A8D80000
heap
page read and write
2D2ACC0A000
trusted library allocation
page read and write
2D2AC7B2000
trusted library allocation
page read and write
2D2A83BB000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B4F1E000
trusted library allocation
page read and write
2715EB04000
trusted library allocation
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2AED7E000
trusted library allocation
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AB38E000
trusted library allocation
page read and write
1C07648F000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AD85A000
trusted library allocation
page read and write
2D2B67B4000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2ACDC3000
trusted library allocation
page read and write
2715EC09000
heap
page read and write
2D2B32D5000
trusted library allocation
page read and write
2D2B37CD000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
E40D4BE000
stack
page read and write
2D2B3651000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2B35A3000
trusted library allocation
page read and write
2D2B355F000
trusted library allocation
page read and write
2715E012000
trusted library allocation
page read and write
21BEAD00000
trusted library allocation
page read and write
2D2AC6ED000
trusted library allocation
page read and write
1C076476000
trusted library allocation
page read and write
2D2ACD6D000
trusted library allocation
page read and write
2D2B5AD2000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2AB6CB000
trusted library allocation
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2A23FC000
heap
page read and write
2D2A8D67000
heap
page read and write
2D2B36E6000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B4C23000
trusted library allocation
page read and write
2D2B672C000
trusted library allocation
page read and write
2D2B35CA000
trusted library allocation
page read and write
2D2AB487000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AC9D7000
trusted library allocation
page read and write
2D2B370E000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2AEA5D000
trusted library allocation
page read and write
2D2ACDD5000
trusted library allocation
page read and write
2D2ADCB0000
trusted library allocation
page read and write
2D2B5D36000
trusted library allocation
page read and write
2D2AE91E000
trusted library allocation
page read and write
2D2AC624000
trusted library allocation
page read and write
2D2A23A8000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A2419000
heap
page read and write
2D2A23D1000
heap
page read and write
2D2AEDE5000
trusted library allocation
page read and write
2D2ABDFE000
trusted library allocation
page read and write
2D2B3AB6000
trusted library allocation
page read and write
2D2B6500000
trusted library allocation
page read and write
2D2ACA1D000
trusted library allocation
page read and write
2D2B6B71000
heap
page read and write
2D2AB99E000
trusted library allocation
page read and write
2D2A2445000
heap
page read and write
2D2A2419000
heap
page read and write
2D2B4CFA000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2AC6CD000
trusted library allocation
page read and write
2715ECE9000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2AC496000
trusted library allocation
page read and write
2D2ADF36000
trusted library allocation
page read and write
2D2A2396000
heap
page read and write
2D2AE9AE000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A8A26000
trusted library allocation
page read and write
2715DFA0000
unkown
page execute read
2D2AC99E000
trusted library allocation
page read and write
2D2B4CE9000
trusted library allocation
page read and write
2D2B3AAC000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADD12000
trusted library allocation
page read and write
2D2A8560000
trusted library allocation
page read and write
16F0000
heap
page read and write
2D2B3554000
trusted library allocation
page read and write
2D2AD859000
trusted library allocation
page read and write
2D2B59D7000
trusted library allocation
page read and write
2D2AB59A000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A23C9000
heap
page read and write
2D2B686A000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2A239E000
heap
page read and write
2D2B368C000
trusted library allocation
page read and write
2D2ADCD4000
trusted library allocation
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2B3475000
trusted library allocation
page read and write
2D2ACA18000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2ABE7A000
trusted library allocation
page read and write
2D2B32A4000
trusted library allocation
page read and write
2D2B3332000
trusted library allocation
page read and write
2D2AC646000
trusted library allocation
page read and write
2D2A8599000
trusted library allocation
page read and write
2D2A8675000
trusted library allocation
page read and write
2715E086000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AB370000
trusted library allocation
page read and write
2D2ADCB0000
trusted library allocation
page read and write
2D2AC6A6000
trusted library allocation
page read and write
2D2AC7B2000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AC9CA000
trusted library allocation
page read and write
21BEAEB5000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2ACA98000
trusted library allocation
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2B4FEF000
trusted library allocation
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2ADF3B000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AB9B4000
trusted library allocation
page read and write
2D2B368A000
trusted library allocation
page read and write
2D2AD757000
trusted library allocation
page read and write
2D2AE9E9000
trusted library allocation
page read and write
2715E02F000
trusted library allocation
page read and write
2D2ADC33000
trusted library allocation
page read and write
2D2B3AED000
trusted library allocation
page read and write
23F94B50000
heap
page read and write
2D2B365D000
trusted library allocation
page read and write
2D2B4F85000
trusted library allocation
page read and write
1C07602B000
remote allocation
page execute read
2D2ADCBF000
trusted library allocation
page read and write
2D2AD9E1000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2B33A2000
trusted library allocation
page read and write
2D2AB466000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A239C000
heap
page read and write
2D2ABD12000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2AC9E5000
trusted library allocation
page read and write
2D2B5A80000
trusted library allocation
page read and write
2D2ACA74000
trusted library allocation
page read and write
2D2ACAAE000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AED4E000
trusted library allocation
page read and write
2D2AB384000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B5D8C000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2ACA7E000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC9B8000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2AD7A2000
trusted library allocation
page read and write
2D2ACADB000
trusted library allocation
page read and write
1A624E00000
trusted library allocation
page read and write
2D2AC6D7000
trusted library allocation
page read and write
2D2A241F000
heap
page read and write
2D2A23B9000
heap
page read and write
2D2B3685000
trusted library allocation
page read and write
32E5B9203000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2A23A7000
heap
page read and write
2D2A239B000
heap
page read and write
2D2B37E2000
trusted library allocation
page read and write
2D2ADCA7000
trusted library allocation
page read and write
2D2AB4A5000
trusted library allocation
page read and write
2D2AD596000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2AC47D000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2ACA6E000
trusted library allocation
page read and write
2715DF10000
trusted library section
page readonly
2D2B5BB1000
trusted library allocation
page read and write
2D2B5A80000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A23C8000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B3667000
trusted library allocation
page read and write
2D2B33F9000
trusted library allocation
page read and write
2D2B33F6000
trusted library allocation
page read and write
2D2ADF6A000
trusted library allocation
page read and write
2D2AF663000
trusted library allocation
page read and write
21BEAE9D000
trusted library allocation
page read and write
2D2AB6D7000
trusted library allocation
page read and write
2D2B4C91000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2B37EB000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B348B000
trusted library allocation
page read and write
2D2A8A39000
trusted library allocation
page read and write
2D2ACC07000
trusted library allocation
page read and write
2D2AD971000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23D8000
heap
page read and write
16F0000
heap
page read and write
2D2B599D000
trusted library allocation
page read and write
2D2AB9DB000
trusted library allocation
page read and write
2D2A83B8000
trusted library allocation
page read and write
16B8000
heap
page read and write
2D2ACBC0000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A239E000
heap
page read and write
2D2AD798000
trusted library allocation
page read and write
38497FE000
stack
page read and write
2D2B4D63000
trusted library allocation
page read and write
2D2ADC29000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2A239B000
heap
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2AC71A000
trusted library allocation
page read and write
2D2ACA42000
trusted library allocation
page read and write
2D2A8599000
trusted library allocation
page read and write
2D2B5988000
trusted library allocation
page read and write
2D2AC9CE000
trusted library allocation
page read and write
2D2B36B8000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A23A6000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B337C000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2AD580000
trusted library allocation
page read and write
2D2ACE00000
trusted library allocation
page read and write
2D2AB45E000
trusted library allocation
page read and write
2D2A23B3000
heap
page read and write
2715E661000
heap
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2ACC63000
trusted library allocation
page read and write
16E0000
heap
page read and write
2D2ADD8D000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A8A63000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2B4FEF000
trusted library allocation
page read and write
13BE000
stack
page read and write
2D2B387E000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2B5B61000
trusted library allocation
page read and write
2D2ACA8E000
trusted library allocation
page read and write
2D2B369D000
trusted library allocation
page read and write
2D2A857A000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2ADFB5000
trusted library allocation
page read and write
2D2A23AD000
heap
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2B4C7C000
trusted library allocation
page read and write
2D2AB64E000
trusted library allocation
page read and write
71C87D8000
stack
page read and write
2D2AB96F000
trusted library allocation
page read and write
2D2AED2E000
trusted library allocation
page read and write
2D2B4C2D000
trusted library allocation
page read and write
2D2AC3FD000
trusted library allocation
page read and write
2D2B332B000
trusted library allocation
page read and write
2D2ACA74000
trusted library allocation
page read and write
2D2AB9D9000
trusted library allocation
page read and write
2D2AC933000
trusted library allocation
page read and write
2D2AC6C1000
trusted library allocation
page read and write
2D2ACA78000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2A23B1000
heap
page read and write
23F94C00000
trusted library allocation
page read and write
2D2B33C5000
trusted library allocation
page read and write
2D2A23CD000
heap
page read and write
2D2B3A6F000
trusted library allocation
page read and write
2D2B3354000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2AC69F000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2A239D000
heap
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2A8A1C000
trusted library allocation
page read and write
2D2AD9E6000
trusted library allocation
page read and write
2715DF80000
trusted library allocation
page read and write
21BEAE5D000
trusted library allocation
page read and write
2D2B4CE9000
trusted library allocation
page read and write
2D2AEAF8000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ADA92000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
2D2A2399000
heap
page read and write
2D2B36F3000
trusted library allocation
page read and write
2D2A8CF9000
heap
page read and write
2D2AED89000
trusted library allocation
page read and write
2D2AC988000
trusted library allocation
page read and write
2D2B6576000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B32D5000
trusted library allocation
page read and write
2D2B4F17000
trusted library allocation
page read and write
2D2B4C2A000
trusted library allocation
page read and write
2D2AC74A000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2B4F4C000
trusted library allocation
page read and write
EDC55CE000
stack
page read and write
2D2AC467000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B351F000
trusted library allocation
page read and write
2D2B6B47000
heap
page read and write
1A624F60000
heap
page read and write
2D2A2380000
heap
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2AD9BE000
trusted library allocation
page read and write
2D2B4C37000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2ACA37000
trusted library allocation
page read and write
2D2AC405000
trusted library allocation
page read and write
2D2AC424000
trusted library allocation
page read and write
2D2AC6A6000
trusted library allocation
page read and write
2D2AB958000
trusted library allocation
page read and write
2D2A8D16000
heap
page read and write
2D2A23B6000
heap
page read and write
2D2ABEDF000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2B4D63000
trusted library allocation
page read and write
2D2A8D63000
heap
page read and write
2D2ADCCE000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2ADF9D000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AC4BF000
trusted library allocation
page read and write
2D2AD843000
trusted library allocation
page read and write
2D2B33D8000
trusted library allocation
page read and write
2D2AC4E3000
trusted library allocation
page read and write
1C076700000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2AE9AE000
trusted library allocation
page read and write
2D2AB6AB000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB614000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B37EB000
trusted library allocation
page read and write
2D2B5980000
trusted library allocation
page read and write
2D2A8D16000
heap
page read and write
2D2AB9FD000
trusted library allocation
page read and write
2D2A8D16000
heap
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2AD8BE000
trusted library allocation
page read and write
2D2A8D69000
heap
page read and write
2D2AC7B1000
trusted library allocation
page read and write
15C4000
heap
page read and write
2D2B3354000
trusted library allocation
page read and write
2D2AC48F000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2AC9F4000
trusted library allocation
page read and write
2D2ADCB5000
trusted library allocation
page read and write
2D2A23AF000
heap
page read and write
2D2A23A8000
heap
page read and write
2D2AB362000
trusted library allocation
page read and write
1C076478000
trusted library allocation
page read and write
21BEB000000
trusted library allocation
page read and write
2D2AB972000
trusted library allocation
page read and write
2715EC60000
heap
page read and write
2D2B6740000
trusted library allocation
page read and write
2715E048000
trusted library allocation
page read and write
2D2ADDD1000
trusted library allocation
page read and write
2D2B4C2D000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
71CA93E000
stack
page read and write
2D2A23B5000
heap
page read and write
2D2ADC96000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AB6E8000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2A23C4000
heap
page read and write
15C4000
heap
page read and write
21BEB038000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AC764000
trusted library allocation
page read and write
1A624CA0000
heap
page read and write
2D2B3356000
trusted library allocation
page read and write
2D2B36BD000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB92E000
trusted library allocation
page read and write
2D2B337A000
trusted library allocation
page read and write
2D2ADF54000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ADF26000
trusted library allocation
page read and write
2D2B328F000
trusted library allocation
page read and write
2D2AC7B9000
trusted library allocation
page read and write
2D2A857A000
trusted library allocation
page read and write
2D2A8A41000
trusted library allocation
page read and write
2D2A83BB000
trusted library allocation
page read and write
2D2B3572000
trusted library allocation
page read and write
2D2B5A21000
trusted library allocation
page read and write
2D2B4C88000
trusted library allocation
page read and write
1C076403000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2ADF21000
trusted library allocation
page read and write
2D2AC6CD000
trusted library allocation
page read and write
EDC77FE000
unkown
page readonly
2D2AB4D9000
trusted library allocation
page read and write
2D2AB4B2000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2B6766000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
71CA03E000
unkown
page readonly
2D2ACAEA000
trusted library allocation
page read and write
EDC558B000
stack
page read and write
2D2ADF3B000
trusted library allocation
page read and write
2D2ACDB5000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2A8D8A000
heap
page read and write
2D2A8D13000
heap
page read and write
2D2ACA57000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B67A5000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
3DF1000
heap
page read and write
2D2B4D4F000
trusted library allocation
page read and write
2D2B3741000
trusted library allocation
page read and write
2D2B3A64000
trusted library allocation
page read and write
2D2AD9CA000
trusted library allocation
page read and write
2D2AB370000
trusted library allocation
page read and write
2D2ACA5C000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2A2445000
heap
page read and write
2D2A23C9000
heap
page read and write
2D2B67A3000
trusted library allocation
page read and write
2D2B37D8000
trusted library allocation
page read and write
2715DF93000
unkown
page execute read
2D2AD97A000
trusted library allocation
page read and write
2D2B381F000
trusted library allocation
page read and write
2D2AC73E000
trusted library allocation
page read and write
2D2B4D66000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC31E000
trusted library allocation
page read and write
2D2A2427000
heap
page read and write
2D2A239B000
heap
page read and write
2D2A8D84000
heap
page read and write
2D2AC9B8000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2ACA7B000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AE9D7000
trusted library allocation
page read and write
2D2B4CFC000
trusted library allocation
page read and write
2D2B5DB2000
trusted library allocation
page read and write
2D2B4C97000
trusted library allocation
page read and write
2D2ADFE5000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC9A8000
trusted library allocation
page read and write
2D2AC499000
trusted library allocation
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2AB4CB000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2ACD6D000
trusted library allocation
page read and write
2D2B4F83000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2ADFB5000
trusted library allocation
page read and write
2D2ACA52000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2AC6C3000
trusted library allocation
page read and write
2D2ABDFE000
trusted library allocation
page read and write
2D2AC6AD000
trusted library allocation
page read and write
2D2B67AD000
trusted library allocation
page read and write
2D2ADFBD000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2ACA41000
trusted library allocation
page read and write
2D2B36E6000
trusted library allocation
page read and write
2D2B35A3000
trusted library allocation
page read and write
2D2ACA4E000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B5963000
trusted library allocation
page read and write
2D2AC9D7000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B36F8000
trusted library allocation
page read and write
2D2ADCD4000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
71CB13E000
unkown
page readonly
2D2A2382000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2A2408000
heap
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2A6DDF000
trusted library allocation
page read and write
2D2AAF33000
trusted library allocation
page read and write
2D2A8D69000
heap
page read and write
2D2AC9E0000
trusted library allocation
page read and write
2D2ACBBC000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2A8D69000
heap
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2AC9B5000
trusted library allocation
page read and write
2D2AE9A0000
trusted library allocation
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2B365A000
trusted library allocation
page read and write
2D2AC6D7000
trusted library allocation
page read and write
2D2B36D0000
trusted library allocation
page read and write
2715EC69000
heap
page read and write
2715ED77000
heap
page read and write
2D2AB473000
trusted library allocation
page read and write
16F8000
heap
page read and write
2D2A2424000
heap
page read and write
2D2A239A000
heap
page read and write
2D2A239A000
heap
page read and write
2D2A23A4000
heap
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2ADCF4000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B33CB000
trusted library allocation
page read and write
2D2AC458000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
1C076424000
trusted library allocation
page read and write
2D2AC44A000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
1C076300000
heap
page readonly
2D2A23A1000
heap
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2B3576000
trusted library allocation
page read and write
2D2AC99E000
trusted library allocation
page read and write
2D2A8CFA000
heap
page read and write
2D2A2423000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2ABDF9000
trusted library allocation
page read and write
2D2A8AF4000
trusted library allocation
page read and write
2D2A8A44000
trusted library allocation
page read and write
2715EC4D000
heap
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
2D2A23A3000
heap
page read and write
2D2ACA21000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2A23FC000
heap
page read and write
3DF1000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B3844000
trusted library allocation
page read and write
2D2AB61D000
trusted library allocation
page read and write
2D2B385A000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
2D2AC740000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2A8A8C000
trusted library allocation
page read and write
2D2AAF73000
trusted library allocation
page read and write
2D2AD533000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2A23BF000
heap
page read and write
2D2A23B9000
heap
page read and write
2D2A239B000
heap
page read and write
2D2AB6F9000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B5971000
trusted library allocation
page read and write
2D2AAF62000
trusted library allocation
page read and write
2D2AE9CC000
trusted library allocation
page read and write
2715ECEE000
heap
page read and write
2715ED58000
heap
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2B6BE1000
heap
page read and write
2D2B4C85000
trusted library allocation
page read and write
2D2B5BF9000
trusted library allocation
page read and write
2D2ADD1E000
trusted library allocation
page read and write
2D2B4F71000
trusted library allocation
page read and write
2D2A8CF8000
heap
page read and write
2D2A23AC000
heap
page read and write
2D2A238D000
heap
page read and write
2D2B37F8000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2ADFD3000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2B3743000
trusted library allocation
page read and write
2D2B3364000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B36F8000
trusted library allocation
page read and write
2D2AD7D2000
trusted library allocation
page read and write
2D2B4FC6000
trusted library allocation
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2AC6A0000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2B333D000
trusted library allocation
page read and write
2D2ADD64000
trusted library allocation
page read and write
2D2AD865000
trusted library allocation
page read and write
2D2AC743000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A239B000
heap
page read and write
2D2AD541000
trusted library allocation
page read and write
2D2AB385000
trusted library allocation
page read and write
2D2B5955000
trusted library allocation
page read and write
2D2B36CC000
trusted library allocation
page read and write
2D2A8D64000
heap
page read and write
2D2AE916000
trusted library allocation
page read and write
2D2B4C62000
trusted library allocation
page read and write
2D2AC9A5000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ABD37000
trusted library allocation
page read and write
2D2B5963000
trusted library allocation
page read and write
2D2AD9C0000
trusted library allocation
page read and write
2D2A8D18000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2B33B7000
trusted library allocation
page read and write
22AE000
stack
page read and write
2D2A2408000
heap
page read and write
2D2AC9B8000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2B4C62000
trusted library allocation
page read and write
2D2B3678000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2ACA8C000
trusted library allocation
page read and write
2D2B5A40000
trusted library allocation
page read and write
2D2AD8FA000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2A23B7000
heap
page read and write
2D2B35FA000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B4D34000
trusted library allocation
page read and write
2D2AD9FC000
trusted library allocation
page read and write
2D2AC654000
trusted library allocation
page read and write
2D2AC31A000
trusted library allocation
page read and write
2D2AB31F000
trusted library allocation
page read and write
1C0764F4000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
21BEAE96000
trusted library allocation
page read and write
2D2B6B5C000
heap
page read and write
2D2B6B71000
heap
page read and write
2D2B4F4C000
trusted library allocation
page read and write
2D2B35BA000
trusted library allocation
page read and write
2D2AD8FE000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AC9CA000
trusted library allocation
page read and write
2D2AED34000
trusted library allocation
page read and write
2D2B3565000
trusted library allocation
page read and write
2D2A74BB000
trusted library allocation
page read and write
2D2AC674000
trusted library allocation
page read and write
2D2AD7BD000
trusted library allocation
page read and write
2715DC2A000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2ADD91000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2A23FC000
heap
page read and write
2D2B3321000
trusted library allocation
page read and write
2D2AC4C2000
trusted library allocation
page read and write
2D2ADF6E000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2ADEE2000
trusted library allocation
page read and write
CEC000
unkown
page write copy
2D2A2423000
heap
page read and write
2D2A8683000
trusted library allocation
page read and write
2D2A8322000
trusted library allocation
page read and write
2715DFC4000
heap
page read and write
2D2AC6CB000
trusted library allocation
page read and write
2D2AC3C3000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2AC9F4000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2AAF62000
trusted library allocation
page read and write
2D2ACADB000
trusted library allocation
page read and write
2D2ABD31000
trusted library allocation
page read and write
2D2AD9E4000
trusted library allocation
page read and write
2D2A23BE000
heap
page read and write
21BEB01A000
trusted library allocation
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A8A90000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2B3356000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2AB6E7000
trusted library allocation
page read and write
2D2AB4B3000
trusted library allocation
page read and write
2D2AC6C3000
trusted library allocation
page read and write
2D2B5D29000
trusted library allocation
page read and write
2D2AC702000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2B3839000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
16E2000
heap
page read and write
2715ED67000
heap
page read and write
2D2AC3EC000
trusted library allocation
page read and write
2D2B34CB000
trusted library allocation
page read and write
2D2B3ADB000
trusted library allocation
page read and write
2D2AD9D7000
trusted library allocation
page read and write
71CA0FE000
stack
page read and write
2D2AB35A000
trusted library allocation
page read and write
2D2B36E1000
trusted library allocation
page read and write
2D2B3657000
trusted library allocation
page read and write
1C076160000
heap
page read and write
2D2AED92000
trusted library allocation
page read and write
2D2AD8D4000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2ACBBC000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AAF63000
trusted library allocation
page read and write
1C0763F0000
heap
page read and write
2D2ADAE1000
trusted library allocation
page read and write
2715EC7D000
heap
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2AB57E000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2B354F000
trusted library allocation
page read and write
2D2AC6D5000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2A23A7000
heap
page read and write
2D2AB6C3000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AC9AF000
trusted library allocation
page read and write
2D2B5988000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2B35C5000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2A23BC000
heap
page read and write
2D2AB487000
trusted library allocation
page read and write
2D2AB93B000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2B5DF2000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2715ECEE000
heap
page read and write
2D2B354F000
trusted library allocation
page read and write
2D2A23AF000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2B336D000
trusted library allocation
page read and write
2D2ADF52000
trusted library allocation
page read and write
71CC13E000
unkown
page readonly
2D2ACA0F000
trusted library allocation
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2D2B32E5000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2B67AB000
trusted library allocation
page read and write
2D2AED8F000
trusted library allocation
page read and write
2D2ADCB8000
trusted library allocation
page read and write
2D2A8333000
trusted library allocation
page read and write
2D2A8D88000
heap
page read and write
2D2A86EB000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2ADD79000
trusted library allocation
page read and write
2D2ABD74000
trusted library allocation
page read and write
2D2A8658000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2715ECB9000
heap
page read and write
2D2AC67E000
trusted library allocation
page read and write
2D2AD8AD000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A2423000
heap
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2B4FED000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23D8000
heap
page read and write
2D2B3AA8000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2AB571000
trusted library allocation
page read and write
2715DF0F000
unclassified section
page read and write
2D2B36BD000
trusted library allocation
page read and write
2D2B35E6000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2AC654000
trusted library allocation
page read and write
2D2AB377000
trusted library allocation
page read and write
2D2B32B8000
trusted library allocation
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2AC6B9000
trusted library allocation
page read and write
2D2AB4C1000
trusted library allocation
page read and write
21BEAE10000
trusted library allocation
page read and write
2715E05C000
trusted library allocation
page read and write
2D2AD58E000
trusted library allocation
page read and write
2D2A23BE000
heap
page read and write
2D2B6861000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2B381D000
trusted library allocation
page read and write
2D2B4F17000
trusted library allocation
page read and write
2D2AB4BB000
trusted library allocation
page read and write
1A624E07000
trusted library allocation
page read and write
2D2AB6FB000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2A239A000
heap
page read and write
2D2A239A000
heap
page read and write
2D2ABDED000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2A749E000
trusted library allocation
page read and write
2D2A8AF5000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2ADC24000
trusted library allocation
page read and write
2D2B3AB6000
trusted library allocation
page read and write
2D2B36FA000
trusted library allocation
page read and write
2D2ACAC7000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2B6711000
trusted library allocation
page read and write
1C076430000
trusted library allocation
page read and write
2715DC60000
unclassified section
page readonly
2D2B380D000
trusted library allocation
page read and write
2715EC6C000
heap
page read and write
2D2AC99E000
trusted library allocation
page read and write
2D2ADE68000
trusted library allocation
page read and write
2D2A83CF000
trusted library allocation
page read and write
2D2ACDB5000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A23A6000
heap
page read and write
2D2A23CD000
heap
page read and write
EDC550E000
unkown
page readonly
71CA07D000
stack
page read and write
2D2A8D77000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2B333C000
trusted library allocation
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2ACC63000
trusted library allocation
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2D2B3634000
trusted library allocation
page read and write
2D2B4FD6000
trusted library allocation
page read and write
2D2ADAB0000
trusted library allocation
page read and write
2D2ADC53000
trusted library allocation
page read and write
2D2A85E8000
trusted library allocation
page read and write
2D2AB594000
trusted library allocation
page read and write
2D2B5A60000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
16E0000
heap
page read and write
2D2B32BC000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B4CF5000
trusted library allocation
page read and write
2D2AC442000
trusted library allocation
page read and write
2D2AAFF3000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADA8C000
trusted library allocation
page read and write
2D2ADF2F000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3567000
trusted library allocation
page read and write
2D2B36CB000
trusted library allocation
page read and write
2D2ACA7B000
trusted library allocation
page read and write
2715EC7D000
heap
page read and write
2D2AC306000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2ADD64000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2B6B01000
heap
page read and write
2D2AC637000
trusted library allocation
page read and write
2D2B34C1000
trusted library allocation
page read and write
2D2B67BA000
trusted library allocation
page read and write
2D2AB4A7000
trusted library allocation
page read and write
2D2A8697000
trusted library allocation
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2B335F000
trusted library allocation
page read and write
2D2AB6F4000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2B3721000
trusted library allocation
page read and write
2D2ABD31000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2AC792000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2AC6C7000
trusted library allocation
page read and write
23F94D0A000
trusted library allocation
page read and write
2D2ADD07000
trusted library allocation
page read and write
2D2A23BE000
heap
page read and write
2D2AD9CC000
trusted library allocation
page read and write
2D2B35CA000
trusted library allocation
page read and write
2D2A85EF000
trusted library allocation
page read and write
2D2AE963000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
C21000
unkown
page execute read
2D2ADA88000
trusted library allocation
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2AD9C8000
trusted library allocation
page read and write
2D2A23BE000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B59D7000
trusted library allocation
page read and write
2D2B36BD000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2ADDCB000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
1C076470000
trusted library allocation
page read and write
2D2AEAEF000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2715ED58000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B347F000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2B37C5000
trusted library allocation
page read and write
2D2A85EA000
trusted library allocation
page read and write
2D2B5AAC000
trusted library allocation
page read and write
2D2A73FE000
trusted library allocation
page read and write
2D2AC70A000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2ACA1D000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
2D2B4FBE000
trusted library allocation
page read and write
2D2AE9A5000
trusted library allocation
page read and write
2D2B35E6000
trusted library allocation
page read and write
2D2B36EA000
trusted library allocation
page read and write
2D2AE93E000
trusted library allocation
page read and write
2D2B5A21000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2ADD91000
trusted library allocation
page read and write
2D2ACC23000
trusted library allocation
page read and write
2D2ADF80000
trusted library allocation
page read and write
2D2B67D1000
trusted library allocation
page read and write
2D2B3A5D000
trusted library allocation
page read and write
2D2B5D50000
trusted library allocation
page read and write
2D2A7482000
trusted library allocation
page read and write
2D2B3713000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AD76B000
trusted library allocation
page read and write
2D2ABD76000
trusted library allocation
page read and write
1C076050000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2AC792000
trusted library allocation
page read and write
2D2B34FC000
trusted library allocation
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2D2A8CF8000
heap
page read and write
2D2AC988000
trusted library allocation
page read and write
2D2AC99B000
trusted library allocation
page read and write
2D2AC6E5000
trusted library allocation
page read and write
2D2B5957000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A239B000
heap
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2ACA52000
trusted library allocation
page read and write
2D2B4DFD000
trusted library allocation
page read and write
2D2B5D50000
trusted library allocation
page read and write
2D2A6D9E000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2B358C000
trusted library allocation
page read and write
2D2A242A000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2AC47C000
trusted library allocation
page read and write
2D2ACA46000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B33BD000
trusted library allocation
page read and write
2D2AC9F4000
trusted library allocation
page read and write
2D2AB917000
trusted library allocation
page read and write
2D2B67CF000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ACAD2000
trusted library allocation
page read and write
2D2A8A8B000
trusted library allocation
page read and write
2D2AC981000
trusted library allocation
page read and write
2D2AC9D1000
trusted library allocation
page read and write
2D2AC736000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
1C076340000
unclassified section
page readonly
15C4000
heap
page read and write
2D2B3554000
trusted library allocation
page read and write
2D2B3678000
trusted library allocation
page read and write
2D2B4C3B000
trusted library allocation
page read and write
13CE000
stack
page read and write
2D2A23C1000
heap
page read and write
2D2A23A2000
heap
page read and write
2D2B3829000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2AD5CA000
trusted library allocation
page read and write
2D2B3822000
trusted library allocation
page read and write
2D2ADFBB000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2B4F71000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2B5A82000
trusted library allocation
page read and write
21BEAA60000
heap
page read and write
2D2AC687000
trusted library allocation
page read and write
2D2B5A82000
trusted library allocation
page read and write
2D2B4DEE000
trusted library allocation
page read and write
2D2A241E000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B3653000
trusted library allocation
page read and write
2D2B32B2000
trusted library allocation
page read and write
2D2ADFE9000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A23C9000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2AC6C7000
trusted library allocation
page read and write
1C076030000
unclassified section
page readonly
2D2AC6CD000
trusted library allocation
page read and write
2D2AC4FB000
trusted library allocation
page read and write
2D2A23BE000
heap
page read and write
1C076010000
remote allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2B4D8F000
trusted library allocation
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2AB38A000
trusted library allocation
page read and write
16F0000
heap
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A23E8000
heap
page read and write
2D2A23CF000
heap
page read and write
2D2AD7BD000
trusted library allocation
page read and write
21BEAE79000
trusted library allocation
page read and write
2715DF91000
unkown
page execute read
2D2AC6C5000
trusted library allocation
page read and write
2D2A2433000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B5DCD000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2B65DC000
trusted library allocation
page read and write
2715ECF2000
heap
page read and write
2D2AB4B2000
trusted library allocation
page read and write
2D2B368A000
trusted library allocation
page read and write
1A624FB0000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B33BF000
trusted library allocation
page read and write
2D2A8D88000
heap
page read and write
2D2A2424000
heap
page read and write
2D2AC7B9000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2B3829000
trusted library allocation
page read and write
2D2B35ED000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B362C000
trusted library allocation
page read and write
2D2AE96B000
trusted library allocation
page read and write
2D2A23D4000
heap
page read and write
2D2B5D79000
trusted library allocation
page read and write
2D2ACA6E000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2AC988000
trusted library allocation
page read and write
2D2B67A9000
trusted library allocation
page read and write
15C4000
heap
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2AC956000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2AEAFE000
trusted library allocation
page read and write
2715ECF1000
heap
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AB9D9000
trusted library allocation
page read and write
2D2AC65D000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
21BEB032000
trusted library allocation
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2A23A6000
heap
page read and write
2D2AB948000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2A23A6000
heap
page read and write
E40A9AE000
unkown
page readonly
2D2B4C62000
trusted library allocation
page read and write
2715DC80000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2A23A3000
heap
page read and write
2D2ADC53000
trusted library allocation
page read and write
2D2B6B01000
heap
page read and write
2D2A8536000
trusted library allocation
page read and write
CBC000
unkown
page readonly
2D2A8D46000
heap
page read and write
2D2A8D77000
heap
page read and write
2715E067000
trusted library allocation
page read and write
2D2A73F6000
trusted library allocation
page read and write
1C076411000
trusted library allocation
page read and write
2D2B365D000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ACA8A000
trusted library allocation
page read and write
2D2B3AED000
trusted library allocation
page read and write
2D2B5BFC000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2ABD5F000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2B4F8F000
trusted library allocation
page read and write
2D2AB912000
trusted library allocation
page read and write
2D2AC9A5000
trusted library allocation
page read and write
21BEAE65000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2AB652000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A2419000
heap
page read and write
2D2B35B4000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A8D6A000
heap
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2AC45C000
trusted library allocation
page read and write
2D2AC3FD000
trusted library allocation
page read and write
2D2ACC08000
trusted library allocation
page read and write
DF0000
heap
page read and write
2D2B59A0000
trusted library allocation
page read and write
2D2AC9E7000
trusted library allocation
page read and write
2D2B32EB000
trusted library allocation
page read and write
2D2ACBD7000
trusted library allocation
page read and write
2D2ADC55000
trusted library allocation
page read and write
2D2B36CC000
trusted library allocation
page read and write
2D2AD856000
trusted library allocation
page read and write
2D2AB9B4000
trusted library allocation
page read and write
2D2AE9A0000
trusted library allocation
page read and write
2D2B3824000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2ADCCE000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2AC9DA000
trusted library allocation
page read and write
2D2A74C2000
trusted library allocation
page read and write
2D2A854C000
trusted library allocation
page read and write
2D2A741B000
trusted library allocation
page read and write
2D2B36F8000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
21BEAE72000
trusted library allocation
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B5D10000
trusted library allocation
page read and write
2D2ABECC000
trusted library allocation
page read and write
1A624FB5000
heap
page read and write
2D2A23C3000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2AB97F000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B3386000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2A23B8000
heap
page read and write
2D2A8D84000
heap
page read and write
2D2A8AFE000
trusted library allocation
page read and write
1C076482000
trusted library allocation
page read and write
2D2AB56A000
trusted library allocation
page read and write
2D2ACA25000
trusted library allocation
page read and write
2D2ABDBF000
trusted library allocation
page read and write
2D2A8CF9000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2AD78F000
trusted library allocation
page read and write
2D2AC9E7000
trusted library allocation
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2AC318000
trusted library allocation
page read and write
2715ED67000
heap
page read and write
2D2AD9D8000
trusted library allocation
page read and write
2D2AC6C5000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2B4DEC000
trusted library allocation
page read and write
2D2ACD64000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2ADF56000
trusted library allocation
page read and write
2D2A23B3000
heap
page read and write
2D2B369D000
trusted library allocation
page read and write
2D2B4C7C000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ADEDC000
trusted library allocation
page read and write
2D2A23CD000
heap
page read and write
2D2AD7BD000
trusted library allocation
page read and write
2D2AC759000
trusted library allocation
page read and write
1C076603000
trusted library allocation
page read and write
1C076312000
unclassified section
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
E40E4BE000
stack
page read and write
2D2B380F000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2ADA6F000
trusted library allocation
page read and write
2D2AC9F4000
trusted library allocation
page read and write
2715ED67000
heap
page read and write
2D2B3653000
trusted library allocation
page read and write
2D2ACAC7000
trusted library allocation
page read and write
2D2A8679000
trusted library allocation
page read and write
2D2AB4FC000
trusted library allocation
page read and write
2D2AB48C000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2AC67E000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B35B4000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2AB477000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
2D2AC7DC000
trusted library allocation
page read and write
21BEAB50000
heap
page read and write
2D2A239B000
heap
page read and write
2D2B381F000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2AB584000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2AE9F5000
trusted library allocation
page read and write
2715DFB0000
heap
page read and write
2D2B6BB8000
heap
page read and write
2D2A2387000
heap
page read and write
2D2B3554000
trusted library allocation
page read and write
2D2A8A88000
trusted library allocation
page read and write
2D2AF6A3000
trusted library allocation
page read and write
2D2AB4FC000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
1A624CA1000
heap
page read and write
2D2ACAAD000
trusted library allocation
page read and write
21BEAE47000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2AC4F4000
trusted library allocation
page read and write
C21000
unkown
page execute read
2D2A8D22000
heap
page read and write
2D2B36E8000
trusted library allocation
page read and write
2D2B3A62000
trusted library allocation
page read and write
2D2B3378000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A741E000
trusted library allocation
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2ADFD8000
trusted library allocation
page read and write
EDC787E000
unkown
page readonly
2D2ADC50000
trusted library allocation
page read and write
71CA13E000
unkown
page readonly
2D2AB9B4000
trusted library allocation
page read and write
2D2A8A35000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2A8A87000
trusted library allocation
page read and write
2D2ABDC4000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2AC6DC000
trusted library allocation
page read and write
2D2AD7A2000
trusted library allocation
page read and write
2D2A74EE000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ABD12000
trusted library allocation
page read and write
2D2AB5CF000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2AC70B000
trusted library allocation
page read and write
2D2AEDBB000
trusted library allocation
page read and write
2D2B36C7000
trusted library allocation
page read and write
2D2B5200000
trusted library allocation
page read and write
2D2ADC61000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B4C3C000
trusted library allocation
page read and write
2D2B32A8000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
1A62676A000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B5A6B000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2B5DEC000
trusted library allocation
page read and write
2D2AB384000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A2408000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2ADDEA000
trusted library allocation
page read and write
2D2B6804000
trusted library allocation
page read and write
2D2B33C1000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2AB563000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2715DC1A000
remote allocation
page execute read
2D2ADDBF000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2AC7C7000
trusted library allocation
page read and write
1C07645F000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2ADC69000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2ADDD1000
trusted library allocation
page read and write
2715DBA0000
unclassified section
page readonly
2D2ADCF7000
trusted library allocation
page read and write
2D2AB516000
trusted library allocation
page read and write
2D2B4FDF000
trusted library allocation
page read and write
2D2AD978000
trusted library allocation
page read and write
2D2AB36A000
trusted library allocation
page read and write
2D2AB4D2000
trusted library allocation
page read and write
2D2B3835000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A238D000
heap
page read and write
2D2B36D0000
trusted library allocation
page read and write
2D2AAFDC000
trusted library allocation
page read and write
2715DF00000
unclassified section
page read and write
2D2A8CFA000
heap
page read and write
2D2ACAEF000
trusted library allocation
page read and write
1C0764D7000
trusted library allocation
page read and write
2D2AC4C8000
trusted library allocation
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2A23A3000
heap
page read and write
2715E05F000
trusted library allocation
page read and write
71C9FFE000
unkown
page readonly
2D2B67B0000
trusted library allocation
page read and write
2D2A8D17000
heap
page read and write
2D2A239D000
heap
page read and write
2D2A238D000
heap
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2AC31A000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2A23C1000
heap
page read and write
2D2A732F000
trusted library allocation
page read and write
2D2ACC0A000
trusted library allocation
page read and write
2D2A86D8000
trusted library allocation
page read and write
1A624C92000
heap
page read and write
2D2B6B6A000
heap
page read and write
2D2A23B1000
heap
page read and write
2715ED2A000
heap
page read and write
2D2B6B8B000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B6585000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2ADCB3000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2AD9C0000
trusted library allocation
page read and write
2715DBB0000
unclassified section
page readonly
2D2B4FE8000
trusted library allocation
page read and write
2D2B3665000
trusted library allocation
page read and write
2D2A8A1C000
trusted library allocation
page read and write
2D2A239E000
heap
page read and write
2D2B35DD000
trusted library allocation
page read and write
2D2AB487000
trusted library allocation
page read and write
2D2ACDB3000
trusted library allocation
page read and write
2D2B5B89000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
21BEAA40000
unclassified section
page readonly
1C0764B6000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AB5B0000
trusted library allocation
page read and write
2D2AC6F7000
trusted library allocation
page read and write
CBC000
unkown
page readonly
2D2ADCF5000
trusted library allocation
page read and write
2D2ACA8C000
trusted library allocation
page read and write
2D2A23CD000
heap
page read and write
2D2A8A2C000
trusted library allocation
page read and write
2D2A8AF5000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2715ED21000
heap
page read and write
2D2A8D6A000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B67F4000
trusted library allocation
page read and write
2D2B4C2D000
trusted library allocation
page read and write
2D2AC45C000
trusted library allocation
page read and write
2D2ABD35000
trusted library allocation
page read and write
2D2B37CD000
trusted library allocation
page read and write
2D2B5995000
trusted library allocation
page read and write
2D2AC72A000
trusted library allocation
page read and write
2D2B3817000
trusted library allocation
page read and write
2D2ADF14000
trusted library allocation
page read and write
2D2AC676000
trusted library allocation
page read and write
2D2B4D66000
trusted library allocation
page read and write
2D2B67A5000
trusted library allocation
page read and write
2D2B4C20000
trusted library allocation
page read and write
3AA0000
heap
page read and write
2D2AB4C4000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
15C4000
heap
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2A8CEA000
heap
page read and write
1A624E0A000
trusted library allocation
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2AC9E5000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2ACA15000
trusted library allocation
page read and write
2D2AB4BB000
trusted library allocation
page read and write
2D2B5A09000
trusted library allocation
page read and write
1A624C7A000
heap
page read and write
2D2A23A4000
heap
page read and write
2D2AC455000
trusted library allocation
page read and write
2D2B3576000
trusted library allocation
page read and write
1C076320000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2A23A6000
heap
page read and write
2D2A23A9000
heap
page read and write
2D2AC9A6000
trusted library allocation
page read and write
2D2AEAE9000
trusted library allocation
page read and write
2D2AC9F6000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ADC92000
trusted library allocation
page read and write
2D2ADC44000
trusted library allocation
page read and write
2715ED67000
heap
page read and write
2D2A23BA000
heap
page read and write
21BEA9B0000
unclassified section
page readonly
2D2A23FC000
heap
page read and write
2D2B3384000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A8D6A000
heap
page read and write
2D2AE9CC000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2B4D00000
trusted library allocation
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
2D2AC48F000
trusted library allocation
page read and write
2D2ADC53000
trusted library allocation
page read and write
2D2AD5CE000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2AC712000
trusted library allocation
page read and write
2D2ADC3F000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2B6734000
trusted library allocation
page read and write
2D2AD9C6000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2AB981000
trusted library allocation
page read and write
2D2B3572000
trusted library allocation
page read and write
2D2AD8ED000
trusted library allocation
page read and write
2715ECEE000
heap
page read and write
2D2ACAEC000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2B37D3000
trusted library allocation
page read and write
2D2AC9CA000
trusted library allocation
page read and write
2D2B365A000
trusted library allocation
page read and write
2D2B3842000
trusted library allocation
page read and write
2D2B36C0000
trusted library allocation
page read and write
2D2ACA52000
trusted library allocation
page read and write
2D2B5AF8000
trusted library allocation
page read and write
2D2B37F6000
trusted library allocation
page read and write
1EAF000
stack
page read and write
2D2B5988000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2AB475000
trusted library allocation
page read and write
2D2ADF9D000
trusted library allocation
page read and write
2D2AD778000
trusted library allocation
page read and write
2D2ACD70000
trusted library allocation
page read and write
2D2ADC33000
trusted library allocation
page read and write
2D2B4DFD000
trusted library allocation
page read and write
2D2B67A1000
trusted library allocation
page read and write
2D2ADC65000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC479000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2AD748000
trusted library allocation
page read and write
2D2B3651000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2A8CEA000
heap
page read and write
2D2B5D67000
trusted library allocation
page read and write
2D2AC654000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2B3382000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
1A624D00000
trusted library allocation
page read and write
2D2AC4DF000
trusted library allocation
page read and write
2D2A8D1C000
heap
page read and write
2D2ACCFB000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A852F000
trusted library allocation
page read and write
21BEAEB7000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2A8D88000
heap
page read and write
2D2B4F4C000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2AB60F000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2AB4A9000
trusted library allocation
page read and write
1C07645D000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A23BA000
heap
page read and write
2D2B3834000
trusted library allocation
page read and write
2D2AC915000
trusted library allocation
page read and write
2D2A8D89000
heap
page read and write
2D2A2387000
heap
page read and write
2715DF98000
unkown
page execute read
2D2A23CF000
heap
page read and write
16D3000
heap
page read and write
2D2A833F000
trusted library allocation
page read and write
2D2A8599000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A23D4000
heap
page read and write
2D2B4DEE000
trusted library allocation
page read and write
2D2B5995000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2ACD64000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ACAAD000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ABE62000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2B5A60000
trusted library allocation
page read and write
2D2ACAEC000
trusted library allocation
page read and write
2D2AB370000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2715ECE6000
heap
page read and write
2D2A241C000
heap
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2A7371000
trusted library allocation
page read and write
2D2A7476000
trusted library allocation
page read and write
2D2A23AF000
heap
page read and write
2D2ADCB0000
trusted library allocation
page read and write
2D2A8D6A000
heap
page read and write
2D2B389C000
trusted library allocation
page read and write
2D2B32E9000
trusted library allocation
page read and write
2D2ADF44000
trusted library allocation
page read and write
2D2ACA0F000
trusted library allocation
page read and write
21BEAC30000
heap
page read and write
2D2A239B000
heap
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2D2ADCAC000
trusted library allocation
page read and write
2D2B5992000
trusted library allocation
page read and write
2D2AC9AF000
trusted library allocation
page read and write
2D2A74FE000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2B5D10000
trusted library allocation
page read and write
2D2AC981000
trusted library allocation
page read and write
2D2AC6F7000
trusted library allocation
page read and write
2D2AC6AD000
trusted library allocation
page read and write
2D2A23A4000
heap
page read and write
2D2AB95D000
trusted library allocation
page read and write
2D2AD853000
trusted library allocation
page read and write
2D2ABDE6000
trusted library allocation
page read and write
2D2ACDAD000
trusted library allocation
page read and write
2D2A8D6A000
heap
page read and write
2D2A242A000
heap
page read and write
2715EC60000
heap
page read and write
2D2AB90F000
trusted library allocation
page read and write
2D2AD573000
trusted library allocation
page read and write
2D2B35D5000
trusted library allocation
page read and write
2D2AE917000
trusted library allocation
page read and write
2D2AB9FD000
trusted library allocation
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2B38ED000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2AD8F8000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2AC44B000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2AD580000
trusted library allocation
page read and write
2D2B3382000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AD887000
trusted library allocation
page read and write
2D2A23CA000
heap
page read and write
2D2AC405000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2AB4BB000
trusted library allocation
page read and write
2D2AB483000
trusted library allocation
page read and write
2D2A2427000
heap
page read and write
2D2AB571000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
1C076600000
trusted library allocation
page read and write
2D2ADFFB000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AC670000
trusted library allocation
page read and write
2D2B67BD000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AB996000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2A2424000
heap
page read and write
2715ECF1000
heap
page read and write
2D2ADFFB000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2AB917000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2A85E4000
trusted library allocation
page read and write
2715ED44000
heap
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2B32E9000
trusted library allocation
page read and write
2D2ABD56000
trusted library allocation
page read and write
2D2B3660000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2ACA47000
trusted library allocation
page read and write
E40ECBE000
unkown
page readonly
2D2AC9E2000
trusted library allocation
page read and write
21BEAE61000
trusted library allocation
page read and write
2715E000000
trusted library allocation
page read and write
2D2B37EB000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AB652000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2AB483000
trusted library allocation
page read and write
2D2AB9B4000
trusted library allocation
page read and write
2D2ACAB1000
trusted library allocation
page read and write
2D2ADCC0000
trusted library allocation
page read and write
2D2AB559000
trusted library allocation
page read and write
2D2ACA25000
trusted library allocation
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B4C7C000
trusted library allocation
page read and write
2D2B3380000
trusted library allocation
page read and write
21BEAA39000
remote allocation
page execute read
2D2B4C85000
trusted library allocation
page read and write
2D2ADF36000
trusted library allocation
page read and write
2D2B67CF000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2B36E5000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2AC956000
trusted library allocation
page read and write
2D2B5B59000
trusted library allocation
page read and write
2D2B3846000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AB5CF000
trusted library allocation
page read and write
2D2ADF11000
trusted library allocation
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B3735000
trusted library allocation
page read and write
2D2ACA35000
trusted library allocation
page read and write
2D2ADFBD000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2ADF2F000
trusted library allocation
page read and write
2D2AD7A2000
trusted library allocation
page read and write
1C076400000
trusted library allocation
page read and write
2D2A23C1000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2B37FC000
trusted library allocation
page read and write
2D2AC7B7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
21BEAE03000
trusted library allocation
page read and write
1E39BB224000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3653000
trusted library allocation
page read and write
2D2B365D000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2ACD2F000
trusted library allocation
page read and write
2715DD70000
heap
page read and write
2D2AD84E000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2B3808000
trusted library allocation
page read and write
2D2ADD79000
trusted library allocation
page read and write
2D2ACA0F000
trusted library allocation
page read and write
2D2AB638000
trusted library allocation
page read and write
2D2AB64E000
trusted library allocation
page read and write
2D2ADEDE000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2ABE4B000
trusted library allocation
page read and write
2D2AD942000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2ADCF7000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2A23D5000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B67F4000
trusted library allocation
page read and write
2D2B5A9C000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
21BEAC22000
unclassified section
page read and write
2D2A239E000
heap
page read and write
2D2A239C000
heap
page read and write
2D2B5D97000
trusted library allocation
page read and write
2D2AD7B0000
trusted library allocation
page read and write
2D2ACAC1000
trusted library allocation
page read and write
2D2AC9E2000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2AC9B5000
trusted library allocation
page read and write
2D2A83ED000
trusted library allocation
page read and write
2715ECA1000
heap
page read and write
2D2ABD31000
trusted library allocation
page read and write
2D2ADD97000
trusted library allocation
page read and write
2D2B4C89000
trusted library allocation
page read and write
2D2AD847000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A241D000
heap
page read and write
2D2B3699000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B37F6000
trusted library allocation
page read and write
2D2B3A6C000
trusted library allocation
page read and write
2D2ADFC6000
trusted library allocation
page read and write
2D2B3A97000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2B358F000
trusted library allocation
page read and write
2D2A6DBF000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2ACDC5000
trusted library allocation
page read and write
2D2B5A96000
trusted library allocation
page read and write
2D2A8AF1000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2A2419000
heap
page read and write
2D2AB363000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
D1199FE000
stack
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2B36E6000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2A8CEA000
heap
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2A23AA000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2AB594000
trusted library allocation
page read and write
2D2B337E000
trusted library allocation
page read and write
2D2A23B6000
heap
page read and write
2D2ABD60000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2B4C38000
trusted library allocation
page read and write
2715EC60000
heap
page read and write
2D2AB374000
trusted library allocation
page read and write
2D2B38B7000
trusted library allocation
page read and write
2D2ADDC5000
trusted library allocation
page read and write
2D2A7371000
trusted library allocation
page read and write
2D2B5D97000
trusted library allocation
page read and write
2715ECEE000
heap
page read and write
2D2AB6F0000
trusted library allocation
page read and write
2D2B5DBF000
trusted library allocation
page read and write
2D2AC4DF000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B3699000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2715ECFC000
heap
page read and write
2D2A2408000
heap
page read and write
2D2A23A5000
heap
page read and write
2D2B5995000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B3332000
trusted library allocation
page read and write
2D2AEA07000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3687000
trusted library allocation
page read and write
2D2AC9E5000
trusted library allocation
page read and write
2D2AC4FB000
trusted library allocation
page read and write
2D2B337C000
trusted library allocation
page read and write
21BEAA20000
remote allocation
page read and write
2D2ABD77000
trusted library allocation
page read and write
313BEE21000
trusted library allocation
page execute read
2D2AC730000
trusted library allocation
page read and write
2D2ACDAD000
trusted library allocation
page read and write
2D2B368A000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A8A78000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2AC9AF000
trusted library allocation
page read and write
2D2AD7D9000
trusted library allocation
page read and write
2715E064000
trusted library allocation
page read and write
2D2B359F000
trusted library allocation
page read and write
2D2AD974000
trusted library allocation
page read and write
2D2B3678000
trusted library allocation
page read and write
2D2AB50B000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2AB483000
trusted library allocation
page read and write
EDC88BE000
unkown
page readonly
2D2B382D000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B5950000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2A23C0000
heap
page read and write
2D2ACA6E000
trusted library allocation
page read and write
2715E0B0000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A8567000
trusted library allocation
page read and write
2D2B5980000
trusted library allocation
page read and write
2D2B4FDD000
trusted library allocation
page read and write
2D2B3574000
trusted library allocation
page read and write
2D2AE95B000
trusted library allocation
page read and write
2D2ADCF4000
trusted library allocation
page read and write
2D2AB6D5000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A23A8000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B3AD6000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2A8A34000
trusted library allocation
page read and write
2D2AD9A2000
trusted library allocation
page read and write
2D2AC4FB000
trusted library allocation
page read and write
2D2ACADB000
trusted library allocation
page read and write
2D2ACA74000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2715E0C2000
trusted library allocation
page read and write
15C0000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2B35E8000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2B351F000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2B6B01000
heap
page read and write
2D2AB4CE000
trusted library allocation
page read and write
2D2ACAAD000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2B37EB000
trusted library allocation
page read and write
2D2ADCD4000
trusted library allocation
page read and write
2D2B369D000
trusted library allocation
page read and write
2D2AB578000
trusted library allocation
page read and write
2D2AC674000
trusted library allocation
page read and write
2D2AD5A9000
trusted library allocation
page read and write
2D2A8CFA000
heap
page read and write
2D2ADC79000
trusted library allocation
page read and write
2D2AB9CF000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2B3674000
trusted library allocation
page read and write
2D2AB4BE000
trusted library allocation
page read and write
2715DFC0000
heap
page read and write
2D2AC48C000
trusted library allocation
page read and write
2D2B6B01000
heap
page read and write
2D2AB92E000
trusted library allocation
page read and write
2D2AB355000
trusted library allocation
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2ADEFE000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A239B000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B3386000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2B383E000
trusted library allocation
page read and write
2D2A6D90000
trusted library allocation
page read and write
2D2B67A7000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2A23C0000
heap
page read and write
2D2A23B7000
heap
page read and write
2D2AC9E0000
trusted library allocation
page read and write
2D2ADC22000
trusted library allocation
page read and write
2D2ADFCF000
trusted library allocation
page read and write
2D2B380F000
trusted library allocation
page read and write
2D2AB46A000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2ACAAE000
trusted library allocation
page read and write
2D2A8A90000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2ACAB5000
trusted library allocation
page read and write
2D2A8D80000
heap
page read and write
2D2AC9D7000
trusted library allocation
page read and write
2D2B673B000
trusted library allocation
page read and write
2D2B5944000
trusted library allocation
page read and write
2D2ADCB5000
trusted library allocation
page read and write
2715ECE0000
heap
page read and write
2D2B3685000
trusted library allocation
page read and write
2D2AC472000
trusted library allocation
page read and write
2D2B3733000
trusted library allocation
page read and write
2D2ACD8E000
trusted library allocation
page read and write
2D2B4C32000
trusted library allocation
page read and write
2D2AB38E000
trusted library allocation
page read and write
1C0764C4000
trusted library allocation
page read and write
2715E0C7000
trusted library allocation
page read and write
2D2AB9D5000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2AED4B000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AB62E000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2B32BC000
trusted library allocation
page read and write
2D2AB487000
trusted library allocation
page read and write
21BEB012000
trusted library allocation
page read and write
2D2AB912000
trusted library allocation
page read and write
2D2AE983000
trusted library allocation
page read and write
21BEAE18000
trusted library allocation
page read and write
2D2ACAA6000
trusted library allocation
page read and write
2D29CF0A000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
EDCA93E000
unkown
page readonly
2D2A832C000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2715ECE8000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2ADFE9000
trusted library allocation
page read and write
2D2B3653000
trusted library allocation
page read and write
2D2AB584000
trusted library allocation
page read and write
2D2ABECA000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2ADAD1000
trusted library allocation
page read and write
2D2ACDC3000
trusted library allocation
page read and write
2D2AB63D000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2A8D77000
heap
page read and write
2D2B67BA000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2AB4C5000
trusted library allocation
page read and write
2D2ABD18000
trusted library allocation
page read and write
2D2AB6D7000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A239B000
heap
page read and write
2D2A23FC000
heap
page read and write
2D2AB9DB000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2A8A57000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2ADC92000
trusted library allocation
page read and write
2D2B4C38000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2ACA18000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3741000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2B363D000
trusted library allocation
page read and write
2D2A2427000
heap
page read and write
2D2AB53E000
trusted library allocation
page read and write
2D2A241E000
heap
page read and write
2D2B3300000
trusted library allocation
page read and write
2715ECFC000
heap
page read and write
2D2ADFC6000
trusted library allocation
page read and write
2D2AB56D000
trusted library allocation
page read and write
2D2AB366000
trusted library allocation
page read and write
2D2ABBF9000
trusted library allocation
page read and write
2D2AD9B2000
trusted library allocation
page read and write
2D2A23C6000
heap
page read and write
2D2ACADB000
trusted library allocation
page read and write
2D2AB5F3000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2D2AC470000
trusted library allocation
page read and write
2D2A8D69000
heap
page read and write
2D2B3A49000
trusted library allocation
page read and write
2D2AE927000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2AC99B000
trusted library allocation
page read and write
2D2A23AF000
heap
page read and write
2D2A23B1000
heap
page read and write
2715ECF1000
heap
page read and write
21BEAC50000
unclassified section
page readonly
16F0000
heap
page read and write
2D2A23B9000
heap
page read and write
2D2AE9C4000
trusted library allocation
page read and write
2D2A73FB000
trusted library allocation
page read and write
21BEAF54000
heap
page read and write
2D2AB63D000
trusted library allocation
page read and write
2D2ACA8C000
trusted library allocation
page read and write
2D2B369D000
trusted library allocation
page read and write
2D2A85EA000
trusted library allocation
page read and write
2D2ABD53000
trusted library allocation
page read and write
2D2B6797000
trusted library allocation
page read and write
2D2B6B35000
heap
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A8D1D000
heap
page read and write
2D2AB6F7000
trusted library allocation
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B342E000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B32E5000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
1C076083000
heap
page read and write
2D2ADDF9000
trusted library allocation
page read and write
2D2AC646000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2AB6F8000
trusted library allocation
page read and write
2D2B3885000
trusted library allocation
page read and write
1A624C10000
heap
page read and write
2D2A23B2000
heap
page read and write
2715ED67000
heap
page read and write
2D2A23B7000
heap
page read and write
2D2A241D000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2A7413000
trusted library allocation
page read and write
2D2AE9DC000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AB6A1000
trusted library allocation
page read and write
2D2AB539000
trusted library allocation
page read and write
2D2A8A82000
trusted library allocation
page read and write
2D2AC687000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
E40A8EB000
stack
page read and write
2D2ABD3C000
trusted library allocation
page read and write
2D2ABD49000
trusted library allocation
page read and write
2D2B6797000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B37C3000
trusted library allocation
page read and write
2D2B35E8000
trusted library allocation
page read and write
2D2ACD00000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D29CF02000
heap
page read and write
2D2ABD1D000
trusted library allocation
page read and write
2D2B34D9000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2AC6A6000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A8695000
trusted library allocation
page read and write
2D2A8D88000
heap
page read and write
15C4000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2A6DA6000
trusted library allocation
page read and write
2D2AB47E000
trusted library allocation
page read and write
2D2B5D82000
trusted library allocation
page read and write
2D2AB68F000
trusted library allocation
page read and write
2D2B6BE1000
heap
page read and write
2D2ADF49000
trusted library allocation
page read and write
2D2A8A3F000
trusted library allocation
page read and write
2D2AD5CA000
trusted library allocation
page read and write
2D2B4DA0000
trusted library allocation
page read and write
2D2A23C0000
heap
page read and write
C1E000
stack
page read and write
384B7FF000
stack
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2AECFA000
trusted library allocation
page read and write
2D2ACB7A000
trusted library allocation
page read and write
2D2B33E5000
trusted library allocation
page read and write
2D2B33A2000
trusted library allocation
page read and write
2D2AE9D4000
trusted library allocation
page read and write
2D2B3378000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2ADF9F000
trusted library allocation
page read and write
2D2A8AF1000
trusted library allocation
page read and write
2D2B3822000
trusted library allocation
page read and write
2D2B33B4000
trusted library allocation
page read and write
2D2AC6C3000
trusted library allocation
page read and write
1C076413000
trusted library allocation
page read and write
2D2ADD07000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2AC9E9000
trusted library allocation
page read and write
2D2A23CD000
heap
page read and write
2D2B5963000
trusted library allocation
page read and write
2D2B3674000
trusted library allocation
page read and write
3DF1000
heap
page read and write
2D2AB46C000
trusted library allocation
page read and write
2D2AC9E7000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADD81000
trusted library allocation
page read and write
2D2B35C5000
trusted library allocation
page read and write
2D2ADC2D000
trusted library allocation
page read and write
2D2AC9E9000
trusted library allocation
page read and write
2D2AC6CD000
trusted library allocation
page read and write
2715ED2A000
heap
page read and write
2D2AB47E000
trusted library allocation
page read and write
2D2A23A5000
heap
page read and write
2D2A23A3000
heap
page read and write
2D2AB9DB000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B5D0D000
trusted library allocation
page read and write
2715ED21000
heap
page read and write
2D2B359F000
trusted library allocation
page read and write
2D2A747D000
trusted library allocation
page read and write
2D2B5D67000
trusted library allocation
page read and write
E40C3FE000
stack
page read and write
2D2A239D000
heap
page read and write
2D2A239A000
heap
page read and write
2D2AD5B8000
trusted library allocation
page read and write
2D2B6883000
trusted library allocation
page read and write
EDC6FFE000
stack
page read and write
2D2B4D71000
trusted library allocation
page read and write
2D2B59A5000
trusted library allocation
page read and write
2D2A8D6A000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2715EC9C000
heap
page read and write
2D2B37C3000
trusted library allocation
page read and write
2715EC60000
heap
page read and write
2D2A8D17000
heap
page read and write
2D2AB924000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2B3825000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2B36AC000
trusted library allocation
page read and write
2D2B36A8000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2715ECF1000
heap
page read and write
2D2B33E9000
trusted library allocation
page read and write
21BEB00B000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
21BEAB70000
heap
page read and write
21BEAC2F000
unclassified section
page read and write
2D2B5D82000
trusted library allocation
page read and write
2D2AC792000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2ADF58000
trusted library allocation
page read and write
2D2AC459000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2AB36C000
trusted library allocation
page read and write
2D2ADFCF000
trusted library allocation
page read and write
2715E081000
trusted library allocation
page read and write
BCE000
stack
page read and write
2D2B6B4C000
heap
page read and write
2D2B6715000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B4C2A000
trusted library allocation
page read and write
2D2B33C5000
trusted library allocation
page read and write
2D2AC499000
trusted library allocation
page read and write
2D2AB38D000
trusted library allocation
page read and write
2D2B4FDD000
trusted library allocation
page read and write
2D2AD76B000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC45F000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B599D000
trusted library allocation
page read and write
2D2ACD5F000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2ACA76000
trusted library allocation
page read and write
2D2ABE6F000
trusted library allocation
page read and write
2D2B37F9000
trusted library allocation
page read and write
2D2A23C5000
heap
page read and write
2D2ABDED000
trusted library allocation
page read and write
2D2B4C32000
trusted library allocation
page read and write
2D2ADC95000
trusted library allocation
page read and write
2D2AB368000
trusted library allocation
page read and write
2D2AC45D000
trusted library allocation
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2715DD90000
heap
page read and write
2D2ACD8E000
trusted library allocation
page read and write
2D2AC3E8000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2A2386000
heap
page read and write
2D2B373F000
trusted library allocation
page read and write
2D2B3737000
trusted library allocation
page read and write
2D2B33B7000
trusted library allocation
page read and write
2D2AC481000
trusted library allocation
page read and write
2D2A8D1A000
heap
page read and write
2D2ADCB5000
trusted library allocation
page read and write
2D2ABEC5000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A241D000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B59DF000
trusted library allocation
page read and write
2D2B3AED000
trusted library allocation
page read and write
16DB000
heap
page read and write
2D2ADC93000
trusted library allocation
page read and write
2D2AB68A000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2A2427000
heap
page read and write
2715E017000
trusted library allocation
page read and write
2D2B670E000
trusted library allocation
page read and write
2D2B381A000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2A238F000
heap
page read and write
2D2A238D000
heap
page read and write
21BEAE12000
trusted library allocation
page read and write
2D2B672A000
trusted library allocation
page read and write
2D2ADFC2000
trusted library allocation
page read and write
2D2ADC23000
trusted library allocation
page read and write
1C0761D0000
heap
page read and write
2D2ACD6D000
trusted library allocation
page read and write
2D2AD5D5000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2AB6F4000
trusted library allocation
page read and write
2D2AC983000
trusted library allocation
page read and write
2D2A2387000
heap
page read and write
2D2A8D67000
heap
page read and write
2D2ACA7E000
trusted library allocation
page read and write
2D2B36F8000
trusted library allocation
page read and write
2D2AC9E0000
trusted library allocation
page read and write
2D2AC660000
trusted library allocation
page read and write
2D2AB958000
trusted library allocation
page read and write
2D2ADAB3000
trusted library allocation
page read and write
2D2AB946000
trusted library allocation
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2B3667000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2AE912000
trusted library allocation
page read and write
2D2AC753000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2B37E3000
trusted library allocation
page read and write
2D2ADDDA000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2ACAEF000
trusted library allocation
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2ADAC8000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB63A000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ADDD3000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B67A7000
trusted library allocation
page read and write
2D2AC6D5000
trusted library allocation
page read and write
2D2AB9D9000
trusted library allocation
page read and write
2D2B4D71000
trusted library allocation
page read and write
2D2ACAEF000
trusted library allocation
page read and write
2D2A8D63000
heap
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B6751000
trusted library allocation
page read and write
2D2ADD97000
trusted library allocation
page read and write
2D2B35DD000
trusted library allocation
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2AC792000
trusted library allocation
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2AC7B9000
trusted library allocation
page read and write
2D2AD8F2000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2715EC60000
heap
page read and write
3849FFE000
stack
page read and write
2D2B36F4000
trusted library allocation
page read and write
2D2B5A2B000
trusted library allocation
page read and write
2D2ACA4D000
trusted library allocation
page read and write
2D2B335F000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
15C4000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B37EE000
trusted library allocation
page read and write
2D2AC6F7000
trusted library allocation
page read and write
2D2A23A4000
heap
page read and write
2D2A8A57000
trusted library allocation
page read and write
2D2B36B8000
trusted library allocation
page read and write
2D2AC67E000
trusted library allocation
page read and write
2D2AB4C4000
trusted library allocation
page read and write
2D2A2427000
heap
page read and write
2D2A23C2000
heap
page read and write
2D2A867D000
trusted library allocation
page read and write
CF4000
unkown
page readonly
2D2ACA70000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23B7000
heap
page read and write
2D2ACD2F000
trusted library allocation
page read and write
2D2ACDB3000
trusted library allocation
page read and write
2D2AC6F7000
trusted library allocation
page read and write
2D2AC9B1000
trusted library allocation
page read and write
2D2ADFDC000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A2408000
heap
page read and write
1C076466000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2B3677000
trusted library allocation
page read and write
2D2AB43D000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2A8726000
trusted library allocation
page read and write
2D2ACA2A000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADF21000
trusted library allocation
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2AAF17000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ACA98000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
2D2AB937000
trusted library allocation
page read and write
2D2AE983000
trusted library allocation
page read and write
2D2AD921000
trusted library allocation
page read and write
2D2AC9F4000
trusted library allocation
page read and write
2D2AE933000
trusted library allocation
page read and write
2D2ABDED000
trusted library allocation
page read and write
2715EC01000
heap
page read and write
2D2AB4A0000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2AC9B8000
trusted library allocation
page read and write
2715DDE0000
heap
page readonly
2715ED44000
heap
page read and write
2D2ADCE8000
trusted library allocation
page read and write
2D2ADDAB000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A23A0000
heap
page read and write
2D2A2399000
heap
page read and write
2D2A23D8000
heap
page read and write
2D2B5AC1000
trusted library allocation
page read and write
2D2ADF9B000
trusted library allocation
page read and write
2D2AD753000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2B4F8A000
trusted library allocation
page read and write
2D2A8D8C000
heap
page read and write
2D2B4D54000
trusted library allocation
page read and write
2D2AC3E4000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2ACAAD000
trusted library allocation
page read and write
2D2AB58A000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A2387000
heap
page read and write
2D2A2408000
heap
page read and write
2D2A2408000
heap
page read and write
2D2B368C000
trusted library allocation
page read and write
2D2A23A2000
heap
page read and write
2D2ADC93000
trusted library allocation
page read and write
2D2B35A3000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A23C8000
heap
page read and write
2D2A23C2000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B4FCE000
trusted library allocation
page read and write
2D2ABDF0000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2AEDD3000
trusted library allocation
page read and write
21BEAF50000
heap
page read and write
2D2B3485000
trusted library allocation
page read and write
2D2AC933000
trusted library allocation
page read and write
2715EC5C000
heap
page read and write
2D2A23C9000
heap
page read and write
2D2AB59B000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2AD8F8000
trusted library allocation
page read and write
2D2ADF5F000
trusted library allocation
page read and write
2715E076000
trusted library allocation
page read and write
21BEAEC8000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2AB9CF000
trusted library allocation
page read and write
2D2B33C3000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2A23B5000
heap
page read and write
71CB93E000
stack
page read and write
2D2ACD62000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2ABDB4000
trusted library allocation
page read and write
2D2B33AF000
trusted library allocation
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2ACD5F000
trusted library allocation
page read and write
2D2AC6FD000
trusted library allocation
page read and write
2D2AB948000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
23F94A90000
heap
page read and write
2715ED58000
heap
page read and write
2D2ACDB5000
trusted library allocation
page read and write
21BEA9C0000
unclassified section
page readonly
2D2A23A4000
heap
page read and write
2D2ACADD000
trusted library allocation
page read and write
2D2B33C1000
trusted library allocation
page read and write
2D2AD97C000
trusted library allocation
page read and write
2715EC60000
heap
page read and write
2D2A8D83000
heap
page read and write
2D2B32B8000
trusted library allocation
page read and write
2D2A7426000
trusted library allocation
page read and write
2D2A23AB000
heap
page read and write
2D29CF17000
heap
page read and write
2D2AB366000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A8A1F000
trusted library allocation
page read and write
2D2AB9C0000
trusted library allocation
page read and write
2D2B4C32000
trusted library allocation
page read and write
2D2B4FCD000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
21BEAEEB000
trusted library allocation
page read and write
2D2B3AA6000
trusted library allocation
page read and write
2D2ACA91000
trusted library allocation
page read and write
2D2AE9D7000
trusted library allocation
page read and write
2D2AB4BB000
trusted library allocation
page read and write
1C07641B000
trusted library allocation
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2ADD9B000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2A241D000
heap
page read and write
2D2AB49B000
trusted library allocation
page read and write
2D2A2382000
heap
page read and write
2D2AC7B7000
trusted library allocation
page read and write
2D2B5A6B000
trusted library allocation
page read and write
2D2B5992000
trusted library allocation
page read and write
2D2ABE10000
trusted library allocation
page read and write
2D2B3674000
trusted library allocation
page read and write
2D2B36F8000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2A23B5000
heap
page read and write
2715DFD0000
trusted library allocation
page read and write
2D2B3743000
trusted library allocation
page read and write
2D2A6DEF000
trusted library allocation
page read and write
2D2AB471000
trusted library allocation
page read and write
2D2B37F9000
trusted library allocation
page read and write
2D2ADC5E000
trusted library allocation
page read and write
CF4000
unkown
page readonly
2D2A23BB000
heap
page read and write
2715ECE9000
heap
page read and write
2D2B5980000
trusted library allocation
page read and write
2D2B5D8C000
trusted library allocation
page read and write
2D2AC771000
trusted library allocation
page read and write
2D2ADC53000
trusted library allocation
page read and write
2D2B3841000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AB59C000
trusted library allocation
page read and write
2D2B6B01000
heap
page read and write
2D2B4C38000
trusted library allocation
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2D2AC9E0000
trusted library allocation
page read and write
2D2AB578000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
1A624C30000
heap
page read and write
2D2A23B2000
heap
page read and write
21BEAC20000
unclassified section
page read and write
2D2AB4A1000
trusted library allocation
page read and write
23F94D07000
trusted library allocation
page read and write
2D2A8684000
trusted library allocation
page read and write
2D2ADD85000
trusted library allocation
page read and write
2D2B33BF000
trusted library allocation
page read and write
2D2AB4A7000
trusted library allocation
page read and write
2D2B37EB000
trusted library allocation
page read and write
2D2ADCC3000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2B3873000
trusted library allocation
page read and write
2D2B6B01000
heap
page read and write
2D2B35DD000
trusted library allocation
page read and write
2D2ADC22000
trusted library allocation
page read and write
2D2ACA21000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2AB4A5000
trusted library allocation
page read and write
2D2A8D18000
heap
page read and write
2D2B5B66000
trusted library allocation
page read and write
2D2ACA45000
trusted library allocation
page read and write
1A624C70000
heap
page read and write
2D2ADDC5000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2715ED3B000
heap
page read and write
2D2A239C000
heap
page read and write
21BEAE7E000
trusted library allocation
page read and write
2D2ABD49000
trusted library allocation
page read and write
2D2B5AA6000
trusted library allocation
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2AC988000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2A8D63000
heap
page read and write
2D2A8A33000
trusted library allocation
page read and write
2715EC64000
heap
page read and write
2D2B33F6000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B683B000
trusted library allocation
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2D2ADD9B000
trusted library allocation
page read and write
1C076190000
heap
page read and write
2D2B36C2000
trusted library allocation
page read and write
2D2AC956000
trusted library allocation
page read and write
2D2AC466000
trusted library allocation
page read and write
2D2A85E8000
trusted library allocation
page read and write
2715ECAA000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2AC983000
trusted library allocation
page read and write
2D2B5AAA000
trusted library allocation
page read and write
2D2AC9B5000
trusted library allocation
page read and write
2D2AC6CD000
trusted library allocation
page read and write
2715ED00000
heap
page read and write
2D2AC43C000
trusted library allocation
page read and write
2D2B5DB2000
trusted library allocation
page read and write
2D2B5971000
trusted library allocation
page read and write
2D2B37E3000
trusted library allocation
page read and write
2D2ACAB2000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
15C4000
heap
page read and write
2715ED22000
heap
page read and write
2D2A23A5000
heap
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2715EC60000
heap
page read and write
2D2B67D1000
trusted library allocation
page read and write
2D2ADD1E000
trusted library allocation
page read and write
2D2AB652000
trusted library allocation
page read and write
2D2B32AE000
trusted library allocation
page read and write
2D2AB948000
trusted library allocation
page read and write
2D2B4C19000
trusted library allocation
page read and write
2D2AC9A5000
trusted library allocation
page read and write
2D2ACAFE000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B36B8000
trusted library allocation
page read and write
2D2B5D82000
trusted library allocation
page read and write
2D2AC6D5000
trusted library allocation
page read and write
2D2A23B0000
heap
page read and write
2D2ACAB2000
trusted library allocation
page read and write
2D2A23A4000
heap
page read and write
2D2B34A0000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B35E8000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23AC000
heap
page read and write
2D2B32FE000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23B5000
heap
page read and write
21BEAECA000
trusted library allocation
page read and write
2D2AB578000
trusted library allocation
page read and write
2D2B5DF8000
trusted library allocation
page read and write
2D2B383E000
trusted library allocation
page read and write
2D2A8A3F000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2AD93C000
trusted library allocation
page read and write
2D2B5D8C000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2ABD18000
trusted library allocation
page read and write
2D2AC31E000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A239A000
heap
page read and write
1C07619A000
heap
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2AB9CF000
trusted library allocation
page read and write
2D2AC7BC000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2ADC93000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2A241D000
heap
page read and write
2D2ABD51000
trusted library allocation
page read and write
2D2ADDCB000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B332A000
trusted library allocation
page read and write
2D2B6827000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2A8D88000
heap
page read and write
2D2ACA96000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2ADCF7000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AD5A9000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2B364B000
trusted library allocation
page read and write
2D2A833F000
trusted library allocation
page read and write
2D2B3663000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2B38D9000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A238D000
heap
page read and write
2D2AB4C4000
trusted library allocation
page read and write
2D2ACA18000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AC6A0000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A241E000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2AB4D9000
trusted library allocation
page read and write
2D2B36E4000
trusted library allocation
page read and write
2715E09F000
trusted library allocation
page read and write
2715EC8D000
heap
page read and write
2D2B4FCD000
trusted library allocation
page read and write
2D2ADC2F000
trusted library allocation
page read and write
2D2B4C32000
trusted library allocation
page read and write
2D2A8D66000
heap
page read and write
1C075FA0000
unclassified section
page readonly
2D2AB4A5000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B4C2A000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ABE83000
trusted library allocation
page read and write
13EF000
stack
page read and write
2D2ACA7B000
trusted library allocation
page read and write
23F94AB0000
heap
page read and write
2D2A2408000
heap
page read and write
2D2AC640000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2715EC69000
heap
page read and write
2D2AC9E9000
trusted library allocation
page read and write
2D2B38F4000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2D2AB91E000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A2408000
heap
page read and write
2D2ABD2B000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2AD78F000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ACA7E000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2ADF5F000
trusted library allocation
page read and write
2D2AD596000
trusted library allocation
page read and write
2D2A85EA000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2B6B01000
heap
page read and write
2D2A2408000
heap
page read and write
2D2AB4B2000
trusted library allocation
page read and write
2D2B37D1000
trusted library allocation
page read and write
2D2B3B00000
trusted library allocation
page read and write
23F94D00000
trusted library allocation
page read and write
2D2B3653000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23AA000
heap
page read and write
2D2B5C04000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B354F000
trusted library allocation
page read and write
2D2B4C62000
trusted library allocation
page read and write
2D2B3AAA000
trusted library allocation
page read and write
2D2AD5C3000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB44A000
trusted library allocation
page read and write
2D2ACC13000
trusted library allocation
page read and write
2D2B67AB000
trusted library allocation
page read and write
1C076417000
trusted library allocation
page read and write
2D2B4D4F000
trusted library allocation
page read and write
2D2AB6F3000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2B37CD000
trusted library allocation
page read and write
2715ED3B000
heap
page read and write
2D2B3A6E000
trusted library allocation
page read and write
2D2AC660000
trusted library allocation
page read and write
384BFFF000
stack
page read and write
2D2AC648000
trusted library allocation
page read and write
2D2B32A8000
trusted library allocation
page read and write
2D2AC455000
trusted library allocation
page read and write
2D2A2395000
heap
page read and write
313BEEA1000
trusted library allocation
page execute read
15C4000
heap
page read and write
2715EC69000
heap
page read and write
2D2AB4FC000
trusted library allocation
page read and write
2715E023000
trusted library allocation
page read and write
2D2AB9DB000
trusted library allocation
page read and write
2D2AB45E000
trusted library allocation
page read and write
2D2AD7D9000
trusted library allocation
page read and write
2D2ADCB5000
trusted library allocation
page read and write
2D2A8A59000
trusted library allocation
page read and write
2D2ADF62000
trusted library allocation
page read and write
2D2B50A8000
trusted library allocation
page read and write
2D2B32B2000
trusted library allocation
page read and write
2D2ACAB1000
trusted library allocation
page read and write
2D2AEA30000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B4C20000
trusted library allocation
page read and write
2D2A8D63000
heap
page read and write
2D2A23C9000
heap
page read and write
2D2A6D98000
trusted library allocation
page read and write
2D2AE9B7000
trusted library allocation
page read and write
2D2ACA52000
trusted library allocation
page read and write
2D2B5DC5000
trusted library allocation
page read and write
2D2AB54D000
trusted library allocation
page read and write
2D2AB497000
trusted library allocation
page read and write
2D2AB6F8000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2A23C8000
heap
page read and write
1C0763F4000
heap
page read and write
2D2B33B4000
trusted library allocation
page read and write
2D2AB98F000
trusted library allocation
page read and write
2D2A2382000
heap
page read and write
2715DC20000
heap
page read and write
2D2ADF95000
trusted library allocation
page read and write
2D2AE933000
trusted library allocation
page read and write
2715EC00000
heap
page read and write
2D2A23AB000
heap
page read and write
2D2A23C0000
heap
page read and write
2D2AEA9F000
trusted library allocation
page read and write
2D2B67A9000
trusted library allocation
page read and write
2D2AB4A9000
trusted library allocation
page read and write
2D2ADC55000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AC4BF000
trusted library allocation
page read and write
21BEAE5B000
trusted library allocation
page read and write
2D2AE9FD000
trusted library allocation
page read and write
2715EC5C000
heap
page read and write
2D2ADCC3000
trusted library allocation
page read and write
2D2AB56A000
trusted library allocation
page read and write
2715ECFC000
heap
page read and write
2D2AED55000
trusted library allocation
page read and write
2D2B36C7000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A8569000
trusted library allocation
page read and write
2D2AC3E6000
trusted library allocation
page read and write
21BEAE00000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2ADC39000
trusted library allocation
page read and write
21BEABE0000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ADDD8000
trusted library allocation
page read and write
2D2A6D81000
trusted library allocation
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2715ECE6000
heap
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2AC9E7000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B334B000
trusted library allocation
page read and write
2D2AB9B7000
trusted library allocation
page read and write
2D2A8CFA000
heap
page read and write
2D2A2423000
heap
page read and write
2D2ABEA9000
trusted library allocation
page read and write
2D2ACAB7000
trusted library allocation
page read and write
2D2ADD74000
trusted library allocation
page read and write
2D2ACAD2000
trusted library allocation
page read and write
21BEAE7B000
trusted library allocation
page read and write
2D2B4FED000
trusted library allocation
page read and write
2715ED79000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2AE912000
trusted library allocation
page read and write
2D2ADCD4000
trusted library allocation
page read and write
2D2A23C4000
heap
page read and write
B80000
heap
page read and write
2D2AC981000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2A23BF000
heap
page read and write
2D2B3574000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2ADFD3000
trusted library allocation
page read and write
2D2A239D000
heap
page read and write
2D2AB58A000
trusted library allocation
page read and write
2D2A8AF5000
trusted library allocation
page read and write
2D2AB584000
trusted library allocation
page read and write
2D2AE9DF000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2A8AF4000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2ADDEA000
trusted library allocation
page read and write
2D2ACA6E000
trusted library allocation
page read and write
2D2AE981000
trusted library allocation
page read and write
2D2A242A000
heap
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
2D2AD7D2000
trusted library allocation
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2ACBF9000
trusted library allocation
page read and write
1C0763F6000
heap
page read and write
2D2B0002000
trusted library allocation
page read and write
EDC54CC000
stack
page read and write
2715ED44000
heap
page read and write
2D2A23BF000
heap
page read and write
2D2ABD0D000
trusted library allocation
page read and write
2D2ADEE6000
trusted library allocation
page read and write
2D2AB5AC000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2A83EB000
trusted library allocation
page read and write
2D2AC3FA000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
2D2AC6C5000
trusted library allocation
page read and write
2D2AD7B0000
trusted library allocation
page read and write
2D2B36FA000
trusted library allocation
page read and write
2D2AD59A000
trusted library allocation
page read and write
2D2B32A4000
trusted library allocation
page read and write
2D2AE9F5000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2715EC7F000
heap
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2715EB06000
trusted library allocation
page read and write
2D2B389C000
trusted library allocation
page read and write
2D2AC638000
trusted library allocation
page read and write
2D2B59B8000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2A23B5000
heap
page read and write
21BEB014000
trusted library allocation
page read and write
2D2AC983000
trusted library allocation
page read and write
2D2B4CFC000
trusted library allocation
page read and write
2D2B4C62000
trusted library allocation
page read and write
15C4000
heap
page read and write
13DB000
stack
page read and write
2D2AE9D4000
trusted library allocation
page read and write
2D2A23C3000
heap
page read and write
2D2A23BB000
heap
page read and write
2715ED67000
heap
page read and write
2D2B36E4000
trusted library allocation
page read and write
2D2A23C1000
heap
page read and write
2D2B3649000
trusted library allocation
page read and write
2D2AD58E000
trusted library allocation
page read and write
2D2B381A000
trusted library allocation
page read and write
2D2ABD2A000
trusted library allocation
page read and write
2D2B37F6000
trusted library allocation
page read and write
2D2AC45D000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2ACA74000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2B4FCA000
trusted library allocation
page read and write
2D2A86A3000
trusted library allocation
page read and write
2D2A8355000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2B3667000
trusted library allocation
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2D2AB363000
trusted library allocation
page read and write
2D2AE91E000
trusted library allocation
page read and write
2D2B5D36000
trusted library allocation
page read and write
21BEAE6E000
trusted library allocation
page read and write
2D2AB4BB000
trusted library allocation
page read and write
2D2ACDD5000
trusted library allocation
page read and write
2D2B67A3000
trusted library allocation
page read and write
2D2ACA47000
trusted library allocation
page read and write
2715ECE1000
heap
page read and write
2D2ACDFA000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2AB38D000
trusted library allocation
page read and write
2D2B4C88000
trusted library allocation
page read and write
2D2B3665000
trusted library allocation
page read and write
2715ECF1000
heap
page read and write
2D2AC617000
trusted library allocation
page read and write
2D2B35E6000
trusted library allocation
page read and write
2715ED58000
heap
page read and write
2D2A2380000
heap
page read and write
21BEAE81000
trusted library allocation
page read and write
2D2A8D80000
heap
page read and write
2D2B5B5C000
trusted library allocation
page read and write
15C4000
heap
page read and write
2D2ABDC3000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2A8668000
trusted library allocation
page read and write
2D2ADD74000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2ABD7E000
trusted library allocation
page read and write
2D2AF6C3000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2B3651000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ADD10000
trusted library allocation
page read and write
2D2B37E2000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2AC789000
trusted library allocation
page read and write
2715EC63000
heap
page read and write
2D2A8355000
trusted library allocation
page read and write
2D2A23B7000
heap
page read and write
2D2A2419000
heap
page read and write
2D2A23FC000
heap
page read and write
2D2A23A3000
heap
page read and write
2D2B4C89000
trusted library allocation
page read and write
2D2AE9AB000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B3805000
trusted library allocation
page read and write
2D2AED80000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2B4C37000
trusted library allocation
page read and write
2715EB17000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2B5D40000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2B672A000
trusted library allocation
page read and write
2D2ACDD5000
trusted library allocation
page read and write
2D2B3AC5000
trusted library allocation
page read and write
2D2B3685000
trusted library allocation
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2B5ABA000
trusted library allocation
page read and write
2D2ADAC5000
trusted library allocation
page read and write
2715E640000
heap
page read and write
2D2ACA37000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2AB38D000
trusted library allocation
page read and write
2D2B6766000
trusted library allocation
page read and write
2D2B33F9000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2B37E9000
trusted library allocation
page read and write
2715ECE8000
heap
page read and write
2D2B3668000
trusted library allocation
page read and write
2D2AD882000
trusted library allocation
page read and write
2D2AE95B000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
16B0000
heap
page read and write
2D2AB4BB000
trusted library allocation
page read and write
2D2ADC34000
trusted library allocation
page read and write
2D2AC9B8000
trusted library allocation
page read and write
23F949A0000
heap
page read and write
15C4000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2A239B000
heap
page read and write
2715DFC6000
heap
page read and write
16DC000
heap
page read and write
2D2ACAF5000
trusted library allocation
page read and write
2D2AC9B1000
trusted library allocation
page read and write
2D2B3808000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AE9B7000
trusted library allocation
page read and write
2D2AAF33000
trusted library allocation
page read and write
2D2ACA0B000
trusted library allocation
page read and write
2D2AE943000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2715ECA8000
heap
page read and write
2D2ADECF000
trusted library allocation
page read and write
2D2ADD66000
trusted library allocation
page read and write
CE2000
unkown
page readonly
2D2A23BB000
heap
page read and write
2D2ACA40000
trusted library allocation
page read and write
2D2B4FD1000
trusted library allocation
page read and write
2D2AB9D5000
trusted library allocation
page read and write
EDC5FD8000
stack
page read and write
2D2A23C4000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B4CEC000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADC55000
trusted library allocation
page read and write
2D2A8569000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2715ED58000
heap
page read and write
2D2AE9DC000
trusted library allocation
page read and write
EDC893E000
unkown
page readonly
2D2AC9D7000
trusted library allocation
page read and write
2D2AB6C2000
trusted library allocation
page read and write
2D2AC6CB000
trusted library allocation
page read and write
2D2B4C87000
trusted library allocation
page read and write
2D2A7426000
trusted library allocation
page read and write
2715E0F3000
trusted library allocation
page read and write
E40A92E000
unkown
page readonly
2D2ADED4000
trusted library allocation
page read and write
21BEAF56000
heap
page read and write
2D2B381D000
trusted library allocation
page read and write
2D2AB6B1000
trusted library allocation
page read and write
2D2B37C5000
trusted library allocation
page read and write
2D2AC9AF000
trusted library allocation
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2ACA7B000
trusted library allocation
page read and write
2D2B385A000
trusted library allocation
page read and write
2D2AB36A000
trusted library allocation
page read and write
1A626764000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A23CF000
heap
page read and write
2D2AD9E1000
trusted library allocation
page read and write
EDCA13E000
stack
page read and write
2D2A8D77000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A7417000
trusted library allocation
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2B3872000
trusted library allocation
page read and write
2D2ABE90000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2A2380000
heap
page read and write
2D2A2384000
heap
page read and write
2D2A23B9000
heap
page read and write
2D2A8569000
trusted library allocation
page read and write
2D2ACD5F000
trusted library allocation
page read and write
2D2B35C5000
trusted library allocation
page read and write
2D2AC6ED000
trusted library allocation
page read and write
2D2A85EF000
trusted library allocation
page read and write
2D2AB965000
trusted library allocation
page read and write
2D2B5C24000
trusted library allocation
page read and write
2D2B36C7000
trusted library allocation
page read and write
2D2B3817000
trusted library allocation
page read and write
2D2B333D000
trusted library allocation
page read and write
2715EC69000
heap
page read and write
2D2B38F0000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2ADCB5000
trusted library allocation
page read and write
1C076462000
trusted library allocation
page read and write
16D7000
heap
page read and write
2D2A2433000
heap
page read and write
2D2B35CA000
trusted library allocation
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2B4F8A000
trusted library allocation
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2ABDC3000
trusted library allocation
page read and write
2D2A2396000
heap
page read and write
B1A000
stack
page read and write
1C075FB0000
unclassified section
page readonly
2D2AC7FB000
trusted library allocation
page read and write
2D2A23A9000
heap
page read and write
2D2ADC55000
trusted library allocation
page read and write
2D2AC779000
trusted library allocation
page read and write
2D2AB380000
trusted library allocation
page read and write
2D2ACA1F000
trusted library allocation
page read and write
2D2B3637000
trusted library allocation
page read and write
2D2AB93B000
trusted library allocation
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2ACAAD000
trusted library allocation
page read and write
2D2A23A7000
heap
page read and write
2D2A23B1000
heap
page read and write
2715ECEE000
heap
page read and write
2D2AE9C4000
trusted library allocation
page read and write
2D2AE963000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2ADD7D000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ADC83000
trusted library allocation
page read and write
2D2A2381000
heap
page read and write
2D2A8A2C000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2ACA55000
trusted library allocation
page read and write
2D2AD77F000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B5C01000
trusted library allocation
page read and write
2D2ADF9F000
trusted library allocation
page read and write
2D2B36F3000
trusted library allocation
page read and write
2D2B4C7C000
trusted library allocation
page read and write
2D2A6DB3000
trusted library allocation
page read and write
2D2B5AD5000
trusted library allocation
page read and write
2D2A865F000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
2D2AB38D000
trusted library allocation
page read and write
2D2A242A000
heap
page read and write
2D2AED86000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2B37F3000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2715ECE8000
heap
page read and write
2D2ADDBC000
trusted library allocation
page read and write
2D2AC6ED000
trusted library allocation
page read and write
2715DF50000
trusted library allocation
page read and write
2D2B6B6A000
heap
page read and write
2D2B4D7D000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2B4CFC000
trusted library allocation
page read and write
2D2AD7D9000
trusted library allocation
page read and write
2D2ADF49000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ABDB4000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
2D2ACA40000
trusted library allocation
page read and write
2D2AD5C3000
trusted library allocation
page read and write
2D2A86DF000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2B34BE000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2AC9B5000
trusted library allocation
page read and write
2D2ACA4D000
trusted library allocation
page read and write
2D2A8D84000
heap
page read and write
2D2B4FDB000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2ACA47000
trusted library allocation
page read and write
2D2ADF80000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2A23BB000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2ABB6F000
trusted library allocation
page read and write
2D2ADF44000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2A8A3F000
trusted library allocation
page read and write
1C0764F0000
trusted library allocation
page read and write
2D2AC478000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
E40CC3E000
unkown
page readonly
2D2B67AD000
trusted library allocation
page read and write
2D2B3364000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2B3384000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
EDC807E000
stack
page read and write
2D2ACA1D000
trusted library allocation
page read and write
2D2AC9F8000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2AC4E1000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2B36D7000
trusted library allocation
page read and write
2D2ACAAD000
trusted library allocation
page read and write
2D2B5980000
trusted library allocation
page read and write
2D2AC9B5000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A832C000
trusted library allocation
page read and write
2D29CEF3000
heap
page read and write
2D2AC7C5000
trusted library allocation
page read and write
2D2A8D67000
heap
page read and write
2D2B327E000
trusted library allocation
page read and write
2D2ACA7E000
trusted library allocation
page read and write
3848FFA000
stack
page read and write
2D2B32AE000
trusted library allocation
page read and write
2D2AB68C000
trusted library allocation
page read and write
1C076080000
heap
page read and write
2D2A241D000
heap
page read and write
2D2B36FE000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2B3295000
trusted library allocation
page read and write
2D2AB36A000
trusted library allocation
page read and write
2D2B37C3000
trusted library allocation
page read and write
2D2B4FED000
trusted library allocation
page read and write
2D2ADCCB000
trusted library allocation
page read and write
2D2A85E4000
trusted library allocation
page read and write
2D2AC9D0000
trusted library allocation
page read and write
2D2AC4BB000
trusted library allocation
page read and write
2D2AD9B6000
trusted library allocation
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2AB6D5000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B5BCA000
trusted library allocation
page read and write
2D2AC46D000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2A8D43000
heap
page read and write
16F0000
heap
page read and write
2D2AB9FD000
trusted library allocation
page read and write
2715EC8A000
heap
page read and write
2D2AB996000
trusted library allocation
page read and write
2D2ADD66000
trusted library allocation
page read and write
2D2AD8DB000
trusted library allocation
page read and write
2715ED2A000
heap
page read and write
2D2A86F4000
trusted library allocation
page read and write
2D2A23CF000
heap
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2AB5CA000
trusted library allocation
page read and write
2D2AC781000
trusted library allocation
page read and write
2D2A23D1000
heap
page read and write
2D2B3649000
trusted library allocation
page read and write
1E39BB21E000
trusted library allocation
page read and write
71C97FE000
stack
page read and write
2D2ADCB8000
trusted library allocation
page read and write
2D2A8D77000
heap
page read and write
2D2A23C2000
heap
page read and write
2D2B5A98000
trusted library allocation
page read and write
2D2AC44B000
trusted library allocation
page read and write
2D2ACA8C000
trusted library allocation
page read and write
2D2ADC5E000
trusted library allocation
page read and write
2D2ADDAB000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2ABDBF000
trusted library allocation
page read and write
2D2ADFBB000
trusted library allocation
page read and write
2D2AC3EC000
trusted library allocation
page read and write
2D2ADD35000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2B4F1F000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2AC459000
trusted library allocation
page read and write
2D2AB9A7000
trusted library allocation
page read and write
2D2AC7C1000
trusted library allocation
page read and write
2715ECE3000
heap
page read and write
2715ECE0000
heap
page read and write
2D2AC479000
trusted library allocation
page read and write
2D2B6B01000
heap
page read and write
2715ED2D000
heap
page read and write
2715ECF1000
heap
page read and write
2D2AC956000
trusted library allocation
page read and write
2D2ABD3C000
trusted library allocation
page read and write
2D2B380D000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2A2424000
heap
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AC46D000
trusted library allocation
page read and write
2D2AB92E000
trusted library allocation
page read and write
2D2ADDD3000
trusted library allocation
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2AD96D000
trusted library allocation
page read and write
2D2ADC5F000
trusted library allocation
page read and write
2715EC5F000
heap
page read and write
2D2A23BF000
heap
page read and write
2D2ACC63000
trusted library allocation
page read and write
2D2B358F000
trusted library allocation
page read and write
2D2ADCE4000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2AB638000
trusted library allocation
page read and write
2D2AB96A000
trusted library allocation
page read and write
2D2B36CD000
trusted library allocation
page read and write
D11A1FE000
stack
page read and write
2D2AB9DE000
trusted library allocation
page read and write
EDC5588000
stack
page read and write
2D2AB4B2000
trusted library allocation
page read and write
2D2AC6B1000
trusted library allocation
page read and write
2D2B36EA000
trusted library allocation
page read and write
2D2B5A9A000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB48F000
trusted library allocation
page read and write
2D2B6781000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2AB986000
trusted library allocation
page read and write
2D2AC6C3000
trusted library allocation
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2B4DA4000
trusted library allocation
page read and write
2D2B36B8000
trusted library allocation
page read and write
2D2A241C000
heap
page read and write
2D2ADDDA000
trusted library allocation
page read and write
2D2A8D80000
heap
page read and write
2D2ADD7D000
trusted library allocation
page read and write
2D2B351F000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2AB6F4000
trusted library allocation
page read and write
2D2A23A6000
heap
page read and write
2D2AB3CE000
trusted library allocation
page read and write
2D2A2408000
heap
page read and write
2D2B38E2000
trusted library allocation
page read and write
2D2AAF27000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2ADD10000
trusted library allocation
page read and write
2D2ABB8B000
trusted library allocation
page read and write
21BEABD0000
heap
page read and write
2715EC6C000
heap
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2ADC3F000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2B373F000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2B4DFD000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2ABD49000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2B4DEC000
trusted library allocation
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2AC6B1000
trusted library allocation
page read and write
2D2AB66C000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2AC660000
trusted library allocation
page read and write
2D2B353C000
trusted library allocation
page read and write
384AFFE000
stack
page read and write
2D2A2419000
heap
page read and write
2D2B4C3C000
trusted library allocation
page read and write
2D2A8A2C000
trusted library allocation
page read and write
2D2B35A1000
trusted library allocation
page read and write
2D2ABDEB000
trusted library allocation
page read and write
2715ED77000
heap
page read and write
2D2A23BC000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A8D84000
heap
page read and write
2D2AD799000
trusted library allocation
page read and write
2715E0C0000
trusted library allocation
page read and write
2D2A2424000
heap
page read and write
2D2AC617000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2B368C000
trusted library allocation
page read and write
2D2A8ACB000
trusted library allocation
page read and write
2D2AC467000
trusted library allocation
page read and write
2D2AC781000
trusted library allocation
page read and write
2D2B4D54000
trusted library allocation
page read and write
1C0764A8000
trusted library allocation
page read and write
2D2AE93D000
trusted library allocation
page read and write
2D2B5D32000
trusted library allocation
page read and write
2D2B5971000
trusted library allocation
page read and write
2D2AC9E0000
trusted library allocation
page read and write
2D2B3AA2000
trusted library allocation
page read and write
2D2AD9E6000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2AC458000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
384A7FE000
stack
page read and write
2D2ACA59000
trusted library allocation
page read and write
D1191FC000
stack
page read and write
2D2ABEAF000
trusted library allocation
page read and write
2D2AB4FC000
trusted library allocation
page read and write
2D2A23C2000
heap
page read and write
2D2AC9D8000
trusted library allocation
page read and write
2D2ACA52000
trusted library allocation
page read and write
E40CBFE000
unkown
page readonly
2D2ADA00000
trusted library allocation
page read and write
2D2AB33C000
trusted library allocation
page read and write
2D2B36F3000
trusted library allocation
page read and write
2D2AB58A000
trusted library allocation
page read and write
2D2B6B36000
heap
page read and write
E40A96D000
stack
page read and write
2D2B353C000
trusted library allocation
page read and write
2D2A23AC000
heap
page read and write
2D2A23AF000
heap
page read and write
2D2AEDC0000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A2423000
heap
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2B4CFC000
trusted library allocation
page read and write
2D2A23DE000
heap
page read and write
2D2AD75D000
trusted library allocation
page read and write
2D2A23C4000
heap
page read and write
2D2A23C8000
heap
page read and write
2D2AC652000
trusted library allocation
page read and write
2D2B3380000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2AAF1E000
trusted library allocation
page read and write
2D2B355F000
trusted library allocation
page read and write
2D2AAF72000
trusted library allocation
page read and write
2D2B5D0A000
trusted library allocation
page read and write
2D2A8D23000
heap
page read and write
2D2A23B7000
heap
page read and write
EDC887E000
unkown
page readonly
CF0000
unkown
page write copy
2D2A23B5000
heap
page read and write
2D2B35B4000
trusted library allocation
page read and write
2D2B3866000
trusted library allocation
page read and write
2D2B35B4000
trusted library allocation
page read and write
1A626760000
heap
page read and write
2D2AD9E4000
trusted library allocation
page read and write
1C076200000
trusted library allocation
page read and write
2D2AC77D000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ABD31000
trusted library allocation
page read and write
2D2A23AE000
heap
page read and write
2D2AB38D000
trusted library allocation
page read and write
2D2ABE23000
trusted library allocation
page read and write
2D2AC634000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A238D000
heap
page read and write
2D2A8D66000
heap
page read and write
2D2ADCB9000
trusted library allocation
page read and write
2D2B59C0000
trusted library allocation
page read and write
2D2B3844000
trusted library allocation
page read and write
BD0000
heap
page read and write
2D2ABDE9000
trusted library allocation
page read and write
2D2ADC93000
trusted library allocation
page read and write
2D2B36C0000
trusted library allocation
page read and write
2D2B36F3000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2AB5CF000
trusted library allocation
page read and write
2D2B3660000
trusted library allocation
page read and write
2D2AB38D000
trusted library allocation
page read and write
2715DE00000
trusted library allocation
page read and write
2D2A23D4000
heap
page read and write
2D2B4C7C000
trusted library allocation
page read and write
2715E0E9000
trusted library allocation
page read and write
2D2B3559000
trusted library allocation
page read and write
2D2ADFF7000
trusted library allocation
page read and write
2D2B37D8000
trusted library allocation
page read and write
2D2B35EC000
trusted library allocation
page read and write
2D2B334B000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2B368A000
trusted library allocation
page read and write
2D2AC933000
trusted library allocation
page read and write
2D2B3699000
trusted library allocation
page read and write
2D2AB556000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2ACAAA000
trusted library allocation
page read and write
2D2AB996000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2A23CF000
heap
page read and write
2D2A23CF000
heap
page read and write
2D2AC650000
trusted library allocation
page read and write
2D2A23B5000
heap
page read and write
2D2A23B7000
heap
page read and write
13FD000
stack
page read and write
2D2B33E5000
trusted library allocation
page read and write
2D2ACDB3000
trusted library allocation
page read and write
2D2A8CFA000
heap
page read and write
2D2AC9D1000
trusted library allocation
page read and write
2D2B3870000
trusted library allocation
page read and write
2D2B3640000
trusted library allocation
page read and write
2D2ACA1B000
trusted library allocation
page read and write
2D2ADFF7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
E40A9EE000
stack
page read and write
2D2A86A3000
trusted library allocation
page read and write
2D2AD53F000
trusted library allocation
page read and write
2D2B36D7000
trusted library allocation
page read and write
1670000
heap
page read and write
2D2AD7D3000
trusted library allocation
page read and write
2D2ACA2F000
trusted library allocation
page read and write
2D2AB9B4000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2AB97D000
trusted library allocation
page read and write
2D2AD8B8000
trusted library allocation
page read and write
2D2AC9DB000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2ABE9A000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2B3AF6000
trusted library allocation
page read and write
1A624C8D000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2B3674000
trusted library allocation
page read and write
2D2AEA61000
trusted library allocation
page read and write
2D2AC9B8000
trusted library allocation
page read and write
2D2A2399000
heap
page read and write
2D2B370C000
trusted library allocation
page read and write
2D2AE906000
trusted library allocation
page read and write
2D2ACA4D000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2715E06F000
trusted library allocation
page read and write
2D2A23BF000
heap
page read and write
2D2A23B3000
heap
page read and write
2D2A8355000
trusted library allocation
page read and write
2D2ADCC8000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2A23C2000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A86EB000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AB9D5000
trusted library allocation
page read and write
21BEAE23000
trusted library allocation
page read and write
2D2AD5D5000
trusted library allocation
page read and write
2D2AB9AC000
trusted library allocation
page read and write
2D2AC9CD000
trusted library allocation
page read and write
2D2B672F000
trusted library allocation
page read and write
2D2AC648000
trusted library allocation
page read and write
2D2B3737000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2B6740000
trusted library allocation
page read and write
2D2AB59A000
trusted library allocation
page read and write
2D2B67BD000
trusted library allocation
page read and write
2D2B33C3000
trusted library allocation
page read and write
2D2B33CB000
trusted library allocation
page read and write
2D2A23AF000
heap
page read and write
2D2B3665000
trusted library allocation
page read and write
2D2B33AF000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2715E003000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2AB6F8000
trusted library allocation
page read and write
2D2ABDBC000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2B36F3000
trusted library allocation
page read and write
2D2ACDAE000
trusted library allocation
page read and write
2D2AD96F000
trusted library allocation
page read and write
2D2ADFC2000
trusted library allocation
page read and write
2D2AD8BE000
trusted library allocation
page read and write
2D2ACBC0000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2AC707000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AD573000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2AC9A6000
trusted library allocation
page read and write
2D2ADDD8000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2B3841000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
71C7DFE000
stack
page read and write
2D2B673B000
trusted library allocation
page read and write
2D2A2419000
heap
page read and write
2D2B4FBE000
trusted library allocation
page read and write
2D2AB6D7000
trusted library allocation
page read and write
2D2A8D8C000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2AB979000
trusted library allocation
page read and write
2D2ACAFB000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2B4D39000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
D1191FF000
stack
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2AB68F000
trusted library allocation
page read and write
2D2ADCF9000
trusted library allocation
page read and write
2D2AB917000
trusted library allocation
page read and write
2D2ADD22000
trusted library allocation
page read and write
2D2AC7DA000
trusted library allocation
page read and write
2D2AB96A000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2A23B0000
heap
page read and write
2D2AC7B9000
trusted library allocation
page read and write
2D2AD8E0000
trusted library allocation
page read and write
2D2ADC33000
trusted library allocation
page read and write
2D2A23A0000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2B364B000
trusted library allocation
page read and write
2D2B5D32000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2AC71F000
trusted library allocation
page read and write
2D2B5A85000
trusted library allocation
page read and write
2D2A2387000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2B67F4000
trusted library allocation
page read and write
2D2B5DB2000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2AC6D7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2ACAD0000
trusted library allocation
page read and write
2D2B5B18000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
1C076415000
trusted library allocation
page read and write
2D2B59EC000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2AB387000
trusted library allocation
page read and write
3AA4000
heap
page read and write
2D2ACA45000
trusted library allocation
page read and write
2715E010000
trusted library allocation
page read and write
2D2AE906000
trusted library allocation
page read and write
2D2AC7C7000
trusted library allocation
page read and write
2D2ADDBF000
trusted library allocation
page read and write
2D2ADC93000
trusted library allocation
page read and write
2D2A8578000
trusted library allocation
page read and write
2D2AC455000
trusted library allocation
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2ABD7E000
trusted library allocation
page read and write
2D2ACE80000
trusted library allocation
page read and write
2D2AB65D000
trusted library allocation
page read and write
2D2B3872000
trusted library allocation
page read and write
2D2A8D90000
heap
page read and write
2D2B337E000
trusted library allocation
page read and write
2D2ACA57000
trusted library allocation
page read and write
2D2A23C8000
heap
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2ACBD8000
trusted library allocation
page read and write
2D2AC7D4000
trusted library allocation
page read and write
2D2AB9C0000
trusted library allocation
page read and write
2D2AB986000
trusted library allocation
page read and write
2D2B5DEC000
trusted library allocation
page read and write
2D2A85E4000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2B3714000
trusted library allocation
page read and write
1C07631F000
unclassified section
page read and write
2D2A23CF000
heap
page read and write
2D2A23AC000
heap
page read and write
2D2ADF17000
trusted library allocation
page read and write
2D2AB4BE000
trusted library allocation
page read and write
2D2A239B000
heap
page read and write
2D2B3332000
trusted library allocation
page read and write
2D2A23CB000
heap
page read and write
2D2B5DC9000
trusted library allocation
page read and write
2715ECE8000
heap
page read and write
2D2AB447000
trusted library allocation
page read and write
2D2AD8B0000
trusted library allocation
page read and write
2D2B389C000
trusted library allocation
page read and write
2D2AD9BC000
trusted library allocation
page read and write
2D2A239A000
heap
page read and write
2D2ADCD1000
trusted library allocation
page read and write
2D2B3699000
trusted library allocation
page read and write
2D2AEDF7000
trusted library allocation
page read and write
2D2B36D7000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2B4F1F000
trusted library allocation
page read and write
2D2A8D18000
heap
page read and write
2D2AB3A5000
trusted library allocation
page read and write
2D2AC6C7000
trusted library allocation
page read and write
2D2A23CA000
heap
page read and write
2D2B387E000
trusted library allocation
page read and write
2D2ACADE000
trusted library allocation
page read and write
2D2B4DB7000
trusted library allocation
page read and write
2D2AC7C9000
trusted library allocation
page read and write
2D2AB43B000
trusted library allocation
page read and write
2D2AB4C4000
trusted library allocation
page read and write
2D2B337A000
trusted library allocation
page read and write
2D2AB57E000
trusted library allocation
page read and write
2D2B5D28000
trusted library allocation
page read and write
2D2AD97E000
trusted library allocation
page read and write
2D2A241D000
heap
page read and write
2D2AB475000
trusted library allocation
page read and write
2D2B59EC000
trusted library allocation
page read and write
2D2A2380000
heap
page read and write
2D2A2380000
heap
page read and write
2D2B599D000
trusted library allocation
page read and write
2D2ACA1F000
trusted library allocation
page read and write
2D2A86F6000
trusted library allocation
page read and write
2D2AB372000
trusted library allocation
page read and write
2D2ABD37000
trusted library allocation
page read and write
2D2A238D000
heap
page read and write
2D2ACAE5000
trusted library allocation
page read and write
2D2ACA59000
trusted library allocation
page read and write
2D2B3565000
trusted library allocation
page read and write
1A626763000
heap
page read and write
2D2AB47C000
trusted library allocation
page read and write
2D2B5D3E000
trusted library allocation
page read and write
2D2AB9BC000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2ADA00000
trusted library allocation
page read and write
2D2A2384000
heap
page read and write
2D2AC7FB000
trusted library allocation
page read and write
2D2B36CC000
trusted library allocation
page read and write
2D2B35CA000
trusted library allocation
page read and write
2D2B5D5D000
trusted library allocation
page read and write
2D2A2423000
heap
page read and write
2D2A86DF000
trusted library allocation
page read and write
2D2B4FE1000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B5955000
trusted library allocation
page read and write
2D2A8CEA000
heap
page read and write
E40B3D8000
stack
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2D2A23B0000
heap
page read and write
2D2ACAEA000
trusted library allocation
page read and write
2D2B5DD5000
trusted library allocation
page read and write
2D2ADC5F000
trusted library allocation
page read and write
2D2AB632000
trusted library allocation
page read and write
2D2B33BD000
trusted library allocation
page read and write
2D2ADC41000
trusted library allocation
page read and write
2D2AE9A8000
trusted library allocation
page read and write
2D2ABE5C000
trusted library allocation
page read and write
2D2A8ACF000
trusted library allocation
page read and write
2715ED44000
heap
page read and write
2D2B33D8000
trusted library allocation
page read and write
2D2A23CD000
heap
page read and write
2D2A23B1000
heap
page read and write
2D2B5D97000
trusted library allocation
page read and write
2D2B5D50000
trusted library allocation
page read and write
2D2ADCCF000
trusted library allocation
page read and write
2D2B328C000
trusted library allocation
page read and write
2D2AC6D7000
trusted library allocation
page read and write
2D2A7323000
trusted library allocation
page read and write
2D2AC481000
trusted library allocation
page read and write
2D2AB39E000
trusted library allocation
page read and write
2D2A6DC7000
trusted library allocation
page read and write
2D2A8A1C000
trusted library allocation
page read and write
2D2AB4C5000
trusted library allocation
page read and write
2D2AC76F000
trusted library allocation
page read and write
2D2A23AA000
heap
page read and write
2D2AC933000
trusted library allocation
page read and write
2D2AC6C5000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2ADD81000
trusted library allocation
page read and write
2D2AB38E000
trusted library allocation
page read and write
2D2AB4AF000
trusted library allocation
page read and write
2D2ABD1D000
trusted library allocation
page read and write
1C076607000
trusted library allocation
page read and write
2D2ADCBD000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2B3824000
trusted library allocation
page read and write
2D2B599D000
trusted library allocation
page read and write
2D2B3660000
trusted library allocation
page read and write
2D2A23B3000
heap
page read and write
2D2AB4A9000
trusted library allocation
page read and write
2D2B3667000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A23AC000
heap
page read and write
2D2ADCBF000
trusted library allocation
page read and write
2715ECE3000
heap
page read and write
2D2AE9FD000
trusted library allocation
page read and write
2D2A239C000
heap
page read and write
2D2AC687000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AC6FA000
trusted library allocation
page read and write
2D2ADF95000
trusted library allocation
page read and write
2D2AD5CE000
trusted library allocation
page read and write
2D2A23B2000
heap
page read and write
2D2B4FED000
trusted library allocation
page read and write
2D2B3316000
trusted library allocation
page read and write
2D2B3A68000
trusted library allocation
page read and write
2D2ADD8D000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2AE983000
trusted library allocation
page read and write
2D2A85EA000
trusted library allocation
page read and write
2D2B5DD5000
trusted library allocation
page read and write
2D2A241C000
heap
page read and write
2D2AB97F000
trusted library allocation
page read and write
2D2ABDE3000
trusted library allocation
page read and write
1C076500000
heap
page read and write
2D2A23A1000
heap
page read and write
2D2A23C3000
heap
page read and write
2D2ACBF9000
trusted library allocation
page read and write
2D2ACAE8000
trusted library allocation
page read and write
2D2B3493000
trusted library allocation
page read and write
2D2ABD72000
trusted library allocation
page read and write
2D2AC7DC000
trusted library allocation
page read and write
2D2B3AF6000
trusted library allocation
page read and write
2D2A869A000
trusted library allocation
page read and write
2D2B3493000
trusted library allocation
page read and write
2D2AB4D4000
trusted library allocation
page read and write
23F94B5A000
heap
page read and write
2D2B328F000
trusted library allocation
page read and write
2D2AE9A5000
trusted library allocation
page read and write
2D2B4C87000
trusted library allocation
page read and write
2D2A8697000
trusted library allocation
page read and write
2D2B3A66000
trusted library allocation
page read and write
2D2B33E9000
trusted library allocation
page read and write
21BEB01F000
trusted library allocation
page read and write
2D2A23B1000
heap
page read and write
2D2A86F6000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2B5D79000
trusted library allocation
page read and write
2D2A23A3000
heap
page read and write
2D2A2408000
heap
page read and write
2D2A747F000
trusted library allocation
page read and write
C20000
unkown
page readonly
2D2B5A40000
trusted library allocation
page read and write
2D2A6DC2000
trusted library allocation
page read and write
2D2AC7CF000
trusted library allocation
page read and write
2D2A2382000
heap
page read and write
2D2B5DF8000
trusted library allocation
page read and write
2D2AEA0A000
trusted library allocation
page read and write
2D2ADDBC000
trusted library allocation
page read and write
2D2A23B9000
heap
page read and write
2D2A23CF000
heap
page read and write
2D2AC9CD000
trusted library allocation
page read and write
1C076449000
trusted library allocation
page read and write
2D2A23C9000
heap
page read and write
2D2A23B5000
heap
page read and write
2D2AC9A5000
trusted library allocation
page read and write
2D2A241A000
heap
page read and write
2D2A23B1000
heap
page read and write
2715ED3B000
heap
page read and write
2D2AB38A000
trusted library allocation
page read and write
2D2A23BB000
heap
page read and write
2D2A23BB000
heap
page read and write
2D2B34F6000
trusted library allocation
page read and write
2D2AC493000
trusted library allocation
page read and write
2D2A8331000
trusted library allocation
page read and write
E40DCBE000
unkown
page readonly
2D2A239A000
heap
page read and write
2D2AC7C9000
trusted library allocation
page read and write
EDC993E000
unkown
page readonly
2D2AE9A8000
trusted library allocation
page read and write
2D2B36CD000
trusted library allocation
page read and write
2D2AC6CA000
trusted library allocation
page read and write
2D2AC714000
trusted library allocation
page read and write
2D2A23CA000
heap
page read and write
2D2AB37C000
trusted library allocation
page read and write
2D2ADC27000
trusted library allocation
page read and write
2715EC8A000
heap
page read and write
2D2AB571000
trusted library allocation
page read and write
2D2B34C8000
trusted library allocation
page read and write
2D2A23FC000
heap
page read and write
2D2A2423000
heap
page read and write
2D2B37FC000
trusted library allocation
page read and write
2D2A241C000
heap
page read and write
16D9000
heap
page read and write
2D2B5D40000
trusted library allocation
page read and write
2D2B351A000
trusted library allocation
page read and write
2D2B6B26000
heap
page read and write
2D2A23B2000
heap
page read and write
2D2AC629000
trusted library allocation
page read and write
2D2A23A1000
heap
page read and write
2D2AEA04000
trusted library allocation
page read and write
2D2B36BD000
trusted library allocation
page read and write
1C07646A000
trusted library allocation
page read and write
2D2B5D79000
trusted library allocation
page read and write
2D2ABEEC000
trusted library allocation
page read and write
2D2B35D5000
trusted library allocation
page read and write
2715ECEE000
heap
page read and write
2D2AE9AB000
trusted library allocation
page read and write
2715E00A000
trusted library allocation
page read and write
2D2AEDE2000
trusted library allocation
page read and write
2D2AC470000
trusted library allocation
page read and write
2D2B3651000
trusted library allocation
page read and write
2D2B5BB4000
trusted library allocation
page read and write
2D2B3A57000
trusted library allocation
page read and write
21BEABC0000
heap
page readonly
2D2AD898000
trusted library allocation
page read and write
2D2B5B85000
trusted library allocation
page read and write
2D2AB4C6000
trusted library allocation
page read and write
2D2B4DB2000
trusted library allocation
page read and write
2D2AB6F8000
trusted library allocation
page read and write
There are 4014 hidden memdumps, click here to show them.