IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6ad96030-1135-4eb9-9697-29c724cdc1dc.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6ad96030-1135-4eb9-9697-29c724cdc1dc.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2104 -prefMapHandle 2096 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea3caeab-090e-4bed-8d8d-a30942e208b9} 6680 "\\.\pipe\gecko-crash-server-pipe.6680" 23cb8f70510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3784 -parentBuildID 20230927232528 -prefsHandle 3900 -prefMapHandle 2900 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8192325-94d2-4ada-8e12-bcb1b746e09c} 6680 "\\.\pipe\gecko-crash-server-pipe.6680" 23ccb823510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c842d6f1-122b-4503-86d5-2aebba3580d4} 6680 "\\.\pipe\gecko-crash-server-pipe.6680" 23cca791d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
23CBFDAA000
heap
page read and write
23CBFDF1000
heap
page read and write
23CD3350000
heap
page read and write
23CBFD6B000
heap
page read and write
18843D07000
trusted library allocation
page read and write
23CC6451000
trusted library allocation
page read and write
23CD5250000
trusted library allocation
page read and write
23CD145F000
trusted library allocation
page read and write
23CCA77E000
trusted library allocation
page read and write
23CCAF4E000
trusted library allocation
page read and write
23CCA9A5000
trusted library allocation
page read and write
23CC916F000
trusted library allocation
page read and write
23CCA5DE000
trusted library allocation
page read and write
23CCD201000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
22B0DEE0000
heap
page read and write
23CCA6DD000
trusted library allocation
page read and write
23CCA5A8000
trusted library allocation
page read and write
23CC9B80000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CD2D2D000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA311000
trusted library allocation
page read and write
23CC9AE1000
trusted library allocation
page read and write
23CD4C8B000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CD15E2000
trusted library allocation
page read and write
24369D8D000
remote allocation
page execute read
23CBFD93000
heap
page read and write
23CBFD72000
heap
page read and write
23CC8D2A000
trusted library allocation
page read and write
23CC60C2000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCADF9000
trusted library allocation
page read and write
23CC9185000
trusted library allocation
page read and write
23CC9179000
trusted library allocation
page read and write
23CD122A000
trusted library allocation
page read and write
23CCBCB0000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFD9C000
heap
page read and write
23CCB720000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CCA484000
trusted library allocation
page read and write
23CCC6FD000
trusted library allocation
page read and write
23CD147B000
trusted library allocation
page read and write
23CC9061000
trusted library allocation
page read and write
23CD52BA000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CC9E22000
trusted library allocation
page read and write
23CCA6CC000
trusted library allocation
page read and write
23CD34C8000
trusted library allocation
page read and write
23CCA9F7000
trusted library allocation
page read and write
23CCB8D2000
trusted library allocation
page read and write
23CC60F0000
trusted library allocation
page read and write
23CCA924000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD14F8000
trusted library allocation
page read and write
23CD16EC000
trusted library allocation
page read and write
18E6000
heap
page read and write
23CD50E6000
trusted library allocation
page read and write
23CC99D0000
trusted library allocation
page read and write
23CCAB44000
trusted library allocation
page read and write
23CD5118000
trusted library allocation
page read and write
23CC9833000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CC917E000
trusted library allocation
page read and write
23CCB935000
trusted library allocation
page read and write
23CD49EF000
trusted library allocation
page read and write
23CCD0E5000
trusted library allocation
page read and write
23CCACA9000
trusted library allocation
page read and write
23CCA776000
trusted library allocation
page read and write
23CCA595000
trusted library allocation
page read and write
23CBFD59000
heap
page read and write
23CD14B7000
trusted library allocation
page read and write
22B0E03C000
trusted library allocation
page read and write
23CD0E9E000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CC9EB3000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA33C000
trusted library allocation
page read and write
23CCA746000
trusted library allocation
page read and write
23CD4E99000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CC47EF000
trusted library allocation
page read and write
23CCA5C3000
trusted library allocation
page read and write
23CD0CC5000
trusted library allocation
page read and write
23CD4E1C000
trusted library allocation
page read and write
23CC9D49000
trusted library allocation
page read and write
23CCB70C000
trusted library allocation
page read and write
23CCA5A8000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA896000
trusted library allocation
page read and write
2436ADFD000
heap
page read and write
2436AE00000
heap
page read and write
23CCB8DC000
trusted library allocation
page read and write
23CC681E000
trusted library allocation
page read and write
23CC6435000
trusted library allocation
page read and write
23CCA9A0000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
18D3000
heap
page read and write
23CD1395000
trusted library allocation
page read and write
23CC916B000
trusted library allocation
page read and write
23CCB98C000
trusted library allocation
page read and write
23CCAF34000
trusted library allocation
page read and write
23CC60AE000
trusted library allocation
page read and write
23CCACB4000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
23CCA5DB000
trusted library allocation
page read and write
23CD1031000
trusted library allocation
page read and write
23CCA856000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
23CCA33C000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CD492A000
trusted library allocation
page read and write
23CD0CD5000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CD14B9000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
2436A12F000
trusted library allocation
page read and write
23CD4C56000
trusted library allocation
page read and write
F94000
unkown
page readonly
23CCB6AF000
trusted library allocation
page read and write
23CC8F0B000
trusted library allocation
page read and write
23CC9CB5000
trusted library allocation
page read and write
23CCA9A5000
trusted library allocation
page read and write
23CD3404000
heap
page read and write
23CBFDAC000
heap
page read and write
23CCABE2000
trusted library allocation
page read and write
23CC9877000
trusted library allocation
page read and write
1C64B807000
trusted library allocation
page read and write
23CCA58A000
trusted library allocation
page read and write
23CD14E9000
trusted library allocation
page read and write
23CC9885000
trusted library allocation
page read and write
23CCA8BD000
trusted library allocation
page read and write
23CCB948000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CCACAE000
trusted library allocation
page read and write
23CD156A000
trusted library allocation
page read and write
23CC9C75000
trusted library allocation
page read and write
23CCD16D000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CC9942000
trusted library allocation
page read and write
5A3D03E000
unkown
page readonly
5A3C7FE000
stack
page read and write
17F4000
heap
page read and write
23CD15AD000
trusted library allocation
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CD4CE0000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CBFD98000
heap
page read and write
23CD1482000
trusted library allocation
page read and write
23CD0EC2000
trusted library allocation
page read and write
23CBFDBB000
heap
page read and write
23CD165B000
trusted library allocation
page read and write
23CCA9F7000
trusted library allocation
page read and write
23CC9CF5000
trusted library allocation
page read and write
23CCADD3000
trusted library allocation
page read and write
23CCCACE000
trusted library allocation
page read and write
23CD0E6E000
trusted library allocation
page read and write
23CCDA02000
trusted library allocation
page read and write
A5D16DE000
stack
page read and write
23CBFD6C000
heap
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CD1242000
trusted library allocation
page read and write
23CCC7CA000
trusted library allocation
page read and write
23CCBCA9000
trusted library allocation
page read and write
23CC6DF7000
trusted library allocation
page read and write
23CCABD0000
trusted library allocation
page read and write
23CC6D7A000
trusted library allocation
page read and write
2436AD01000
heap
page read and write
23CCA786000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA91B000
trusted library allocation
page read and write
23CCB39B000
trusted library allocation
page read and write
23CC916B000
trusted library allocation
page read and write
23CCB8D0000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC60A7000
trusted library allocation
page read and write
23CC4E26000
trusted library allocation
page read and write
23CD125F000
trusted library allocation
page read and write
2436AD5C000
heap
page read and write
2436ADE8000
heap
page read and write
23CD50E3000
trusted library allocation
page read and write
23CCBCA9000
trusted library allocation
page read and write
23CBFD45000
heap
page read and write
23CBFDA0000
heap
page read and write
23CC95EF000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CD4EC6000
trusted library allocation
page read and write
23CC9BE1000
trusted library allocation
page read and write
22B0E032000
trusted library allocation
page read and write
23CCA6BD000
trusted library allocation
page read and write
2436A163000
trusted library allocation
page read and write
1EDBB1424000
trusted library allocation
page read and write
24369F80000
heap
page read and write
23CCBCD6000
trusted library allocation
page read and write
23CC9BA3000
trusted library allocation
page read and write
23CCA753000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CD1425000
trusted library allocation
page read and write
23CD3507000
trusted library allocation
page read and write
23CC90CB000
trusted library allocation
page read and write
23CCBC8E000
trusted library allocation
page read and write
23CCAAE7000
trusted library allocation
page read and write
23CD5259000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CD168D000
trusted library allocation
page read and write
23CCB955000
trusted library allocation
page read and write
23CCA678000
trusted library allocation
page read and write
23CC9B7F000
trusted library allocation
page read and write
23CD4E5A000
trusted library allocation
page read and write
23CBFDB7000
heap
page read and write
23CC85BC000
trusted library allocation
page read and write
23CC9D3A000
trusted library allocation
page read and write
23CD10BC000
trusted library allocation
page read and write
23CD16A1000
trusted library allocation
page read and write
23CCAF71000
trusted library allocation
page read and write
22B0DF66000
trusted library allocation
page read and write
23CCD61C000
trusted library allocation
page read and write
23CC91FC000
trusted library allocation
page read and write
23CC9966000
trusted library allocation
page read and write
23CC9836000
trusted library allocation
page read and write
23CD12A3000
trusted library allocation
page read and write
23CCA946000
trusted library allocation
page read and write
23CD0CF1000
trusted library allocation
page read and write
23CCB4DD000
trusted library allocation
page read and write
23CCA3C0000
trusted library allocation
page read and write
23CCB8B6000
trusted library allocation
page read and write
23CD16F1000
trusted library allocation
page read and write
23CCCE4C000
trusted library allocation
page read and write
23CD49DF000
trusted library allocation
page read and write
2436A6D0000
heap
page read and write
23CCAEA0000
trusted library allocation
page read and write
23CCA6C6000
trusted library allocation
page read and write
23CCB955000
trusted library allocation
page read and write
23CCAF83000
trusted library allocation
page read and write
23CC4EBE000
trusted library allocation
page read and write
23CCA595000
trusted library allocation
page read and write
23CCBCD0000
trusted library allocation
page read and write
23CD0CED000
trusted library allocation
page read and write
23CCA5A6000
trusted library allocation
page read and write
23CD0D20000
trusted library allocation
page read and write
23CC9C5E000
trusted library allocation
page read and write
23CCA9A5000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
23CD11F1000
trusted library allocation
page read and write
18843D00000
trusted library allocation
page read and write
23CCCE0F000
trusted library allocation
page read and write
23CBFDA2000
heap
page read and write
23CD13F4000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CCBC68000
trusted library allocation
page read and write
23CD4F68000
trusted library allocation
page read and write
23CC64BD000
trusted library allocation
page read and write
23CCBCCB000
trusted library allocation
page read and write
23CD0E40000
trusted library allocation
page read and write
23CCC8DE000
trusted library allocation
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CCA58A000
trusted library allocation
page read and write
23CD1434000
trusted library allocation
page read and write
23CC6481000
trusted library allocation
page read and write
23CD4E20000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CCA84D000
trusted library allocation
page read and write
280DE3C0000
unclassified section
page readonly
23CD148D000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CBFD72000
heap
page read and write
23CC85D3000
trusted library allocation
page read and write
23CCA5AD000
trusted library allocation
page read and write
23CC9EAC000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CD4CE2000
trusted library allocation
page read and write
23CC60E6000
trusted library allocation
page read and write
23CD1671000
trusted library allocation
page read and write
23CCA75E000
trusted library allocation
page read and write
23CD4F82000
trusted library allocation
page read and write
23CC9EB9000
trusted library allocation
page read and write
23CBFD60000
heap
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
18C8000
heap
page read and write
23CBFDA4000
heap
page read and write
23CD4C71000
trusted library allocation
page read and write
23CD511A000
trusted library allocation
page read and write
23CD3505000
trusted library allocation
page read and write
23CD50A8000
trusted library allocation
page read and write
23CD150F000
trusted library allocation
page read and write
23CC9DCE000
trusted library allocation
page read and write
23CCA4C0000
trusted library allocation
page read and write
23CD10AF000
trusted library allocation
page read and write
23CC9B3E000
trusted library allocation
page read and write
23CCBCD6000
trusted library allocation
page read and write
23CCA308000
trusted library allocation
page read and write
23CCA479000
trusted library allocation
page read and write
23CC9B48000
trusted library allocation
page read and write
23CD0C9E000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CC6DEB000
trusted library allocation
page read and write
23CD4E99000
trusted library allocation
page read and write
23CCA389000
trusted library allocation
page read and write
23CC91B6000
trusted library allocation
page read and write
23CC60C7000
trusted library allocation
page read and write
23CCA3CF000
trusted library allocation
page read and write
2436AD6C000
heap
page read and write
23CCA8C1000
trusted library allocation
page read and write
23CC4F00000
trusted library allocation
page read and write
23CCA89F000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CD338B000
heap
page read and write
23CBFD5E000
heap
page read and write
23CCB97C000
trusted library allocation
page read and write
2436AE2A000
heap
page read and write
23CD1352000
trusted library allocation
page read and write
23CD148B000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CBFDB9000
heap
page read and write
23CCA504000
trusted library allocation
page read and write
23CCB74A000
trusted library allocation
page read and write
23CCA680000
trusted library allocation
page read and write
23CCD105000
trusted library allocation
page read and write
23CD1568000
trusted library allocation
page read and write
22B0DFBA000
trusted library allocation
page read and write
23CD4E5E000
trusted library allocation
page read and write
23CCA662000
trusted library allocation
page read and write
2436A1F1000
trusted library allocation
page read and write
23CC9171000
trusted library allocation
page read and write
23CD10AF000
trusted library allocation
page read and write
3D20000
heap
page read and write
23CCC8EB000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CC9B36000
trusted library allocation
page read and write
2436A15F000
trusted library allocation
page read and write
23CD0EC2000
trusted library allocation
page read and write
23CC9B9C000
trusted library allocation
page read and write
22B0DFA7000
trusted library allocation
page read and write
23CCA8B2000
trusted library allocation
page read and write
23CC8D3A000
trusted library allocation
page read and write
23CD4E90000
trusted library allocation
page read and write
24369F72000
unclassified section
page read and write
23CCA8C5000
trusted library allocation
page read and write
23CD0CC5000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CBFDA0000
heap
page read and write
23CC64C6000
trusted library allocation
page read and write
23CC9538000
trusted library allocation
page read and write
22B0D9E0000
remote allocation
page read and write
23CCD605000
trusted library allocation
page read and write
2436AE58000
heap
page read and write
23CBFD6C000
heap
page read and write
23CC918F000
trusted library allocation
page read and write
23CCC6F5000
trusted library allocation
page read and write
23CD12E0000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CD4C48000
trusted library allocation
page read and write
23CCC8F7000
trusted library allocation
page read and write
23CCD186000
trusted library allocation
page read and write
23CD16ED000
trusted library allocation
page read and write
23CC9AE4000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
188455B7000
heap
page read and write
23CCA84D000
trusted library allocation
page read and write
23CCAE89000
trusted library allocation
page read and write
23CCB960000
trusted library allocation
page read and write
1C64B9C0000
heap
page read and write
23CD15D9000
trusted library allocation
page read and write
463FDDE000
unkown
page readonly
5A3BFFE000
unkown
page readonly
23CCBCFE000
trusted library allocation
page read and write
23CCA8FE000
trusted library allocation
page read and write
464307E000
unkown
page readonly
23CBFD93000
heap
page read and write
23CBFD93000
heap
page read and write
23CC916E000
trusted library allocation
page read and write
23CD4E32000
trusted library allocation
page read and write
23CCB7F6000
trusted library allocation
page read and write
23CD16EA000
trusted library allocation
page read and write
23CCA348000
trusted library allocation
page read and write
23CD14FB000
trusted library allocation
page read and write
23CD0D72000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CC9C8C000
trusted library allocation
page read and write
23CD1482000
trusted library allocation
page read and write
23CD0EBB000
trusted library allocation
page read and write
23CD14C3000
trusted library allocation
page read and write
23CC6360000
trusted library allocation
page read and write
23CD5255000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFDA0000
heap
page read and write
23CC9180000
trusted library allocation
page read and write
23CCA570000
trusted library allocation
page read and write
23CCA5A6000
trusted library allocation
page read and write
23CD10BC000
trusted library allocation
page read and write
23CCA9F7000
trusted library allocation
page read and write
23CD512E000
trusted library allocation
page read and write
23CC91CC000
trusted library allocation
page read and write
23CCBCAE000
trusted library allocation
page read and write
23CC9CC8000
trusted library allocation
page read and write
23CBFDA6000
heap
page read and write
23CBFD7B000
heap
page read and write
23CD1437000
trusted library allocation
page read and write
23CD14CC000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CBFDB3000
heap
page read and write
23CBFD7B000
heap
page read and write
23CCB6D6000
trusted library allocation
page read and write
23CC9DDA000
trusted library allocation
page read and write
23CD15AB000
trusted library allocation
page read and write
23CD14F5000
trusted library allocation
page read and write
23CC60F1000
trusted library allocation
page read and write
23CC9172000
trusted library allocation
page read and write
23CD1486000
trusted library allocation
page read and write
23CC9E64000
trusted library allocation
page read and write
23CCBC8F000
trusted library allocation
page read and write
23CC9875000
trusted library allocation
page read and write
23CCC6D3000
trusted library allocation
page read and write
23CD4E90000
trusted library allocation
page read and write
23CCA3F5000
trusted library allocation
page read and write
22B0DF63000
trusted library allocation
page read and write
23CD14F5000
trusted library allocation
page read and write
23CD510B000
trusted library allocation
page read and write
2436A1AE000
trusted library allocation
page read and write
280DE7B1000
trusted library allocation
page read and write
23CCA6E5000
trusted library allocation
page read and write
23CC64E3000
trusted library allocation
page read and write
23CC6DFC000
trusted library allocation
page read and write
23CD10DB000
trusted library allocation
page read and write
18C2000
heap
page read and write
23CCBCA1000
trusted library allocation
page read and write
23CCA515000
trusted library allocation
page read and write
2436A673000
unkown
page execute read
23CBFD73000
heap
page read and write
23CCA89F000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
280DE400000
heap
page read and write
4641FFE000
unkown
page readonly
23CD12AF000
trusted library allocation
page read and write
23CD1482000
trusted library allocation
page read and write
23CC9B66000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CD15EB000
trusted library allocation
page read and write
23CCA5EC000
trusted library allocation
page read and write
23CCAFC3000
trusted library allocation
page read and write
23CCAF51000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CD11FB000
trusted library allocation
page read and write
2436A110000
trusted library allocation
page read and write
23CC8F9A000
trusted library allocation
page read and write
23CD4E4B000
trusted library allocation
page read and write
23CC9C91000
trusted library allocation
page read and write
23CCA3BD000
trusted library allocation
page read and write
23CBFD97000
heap
page read and write
23CD50BF000
trusted library allocation
page read and write
23CC91C7000
trusted library allocation
page read and write
23CC9072000
trusted library allocation
page read and write
23CD1495000
trusted library allocation
page read and write
23CCA4E6000
trusted library allocation
page read and write
23CC9198000
trusted library allocation
page read and write
23CCA6DA000
trusted library allocation
page read and write
23CC4E66000
trusted library allocation
page read and write
44711FF000
stack
page read and write
23CCA8D5000
trusted library allocation
page read and write
23CC60A7000
trusted library allocation
page read and write
23CCBA00000
trusted library allocation
page read and write
2436ADF1000
heap
page read and write
23CBFD72000
heap
page read and write
23CCABE6000
trusted library allocation
page read and write
23CC906C000
trusted library allocation
page read and write
23CCA6DD000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CC953A000
trusted library allocation
page read and write
23CCA590000
trusted library allocation
page read and write
23CD10F9000
trusted library allocation
page read and write
280DE5AA000
heap
page read and write
23CC9D0B000
trusted library allocation
page read and write
23CCA9D8000
trusted library allocation
page read and write
23CCA3C3000
trusted library allocation
page read and write
23CC638B000
trusted library allocation
page read and write
2436AC11000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CD5041000
trusted library allocation
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CD108D000
trusted library allocation
page read and write
23CCAEC8000
trusted library allocation
page read and write
23CD145F000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD15A3000
trusted library allocation
page read and write
23CBFD6D000
heap
page read and write
23CCA897000
trusted library allocation
page read and write
23CD2900000
trusted library allocation
page read and write
23CD4EC6000
trusted library allocation
page read and write
23CD1248000
trusted library allocation
page read and write
23CCAFA6000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CC9B7E000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CD1654000
trusted library allocation
page read and write
23CCC8EF000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CBFD98000
heap
page read and write
23CC90A2000
trusted library allocation
page read and write
23CCB66E000
trusted library allocation
page read and write
23CCA7DD000
trusted library allocation
page read and write
23CCD14D000
trusted library allocation
page read and write
23CD0CE1000
trusted library allocation
page read and write
23CCA85D000
trusted library allocation
page read and write
23CC64B4000
trusted library allocation
page read and write
23CCAF48000
trusted library allocation
page read and write
5A3E8BE000
stack
page read and write
23CCB988000
trusted library allocation
page read and write
23CD2B00000
trusted library allocation
page read and write
23CC9DD4000
trusted library allocation
page read and write
23CCC8C2000
trusted library allocation
page read and write
22B0DA00000
unclassified section
page readonly
24369EEA000
heap
page read and write
23CD150B000
trusted library allocation
page read and write
23CC9585000
trusted library allocation
page read and write
23CD147B000
trusted library allocation
page read and write
23CCBCA1000
trusted library allocation
page read and write
2436AE58000
heap
page read and write
23CCABA7000
trusted library allocation
page read and write
23CCABE6000
trusted library allocation
page read and write
23CCA8A9000
trusted library allocation
page read and write
23CBFD49000
heap
page read and write
23CCB662000
trusted library allocation
page read and write
23CCC6BB000
trusted library allocation
page read and write
23CD13E8000
trusted library allocation
page read and write
23CCC879000
trusted library allocation
page read and write
23CCCE1D000
trusted library allocation
page read and write
23CCC874000
trusted library allocation
page read and write
23CCAAE7000
trusted library allocation
page read and write
23CCAEBB000
trusted library allocation
page read and write
23CBFDA7000
heap
page read and write
23CBFD93000
heap
page read and write
23CC95D7000
trusted library allocation
page read and write
23CC85C7000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CCD148000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CD52E5000
trusted library allocation
page read and write
280DE78F000
trusted library allocation
page read and write
23CD3657000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CD11D8000
trusted library allocation
page read and write
23CCA5A6000
trusted library allocation
page read and write
18C2000
heap
page read and write
23CCAAEF000
trusted library allocation
page read and write
23CCAEBB000
trusted library allocation
page read and write
23CD11FB000
trusted library allocation
page read and write
23CCA43C000
trusted library allocation
page read and write
23CC91B5000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
188455BE000
heap
page read and write
23CD0E68000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD15D7000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCBC6D000
trusted library allocation
page read and write
163E000
stack
page read and write
23CC4EAB000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD0CE5000
trusted library allocation
page read and write
23CD15AF000
trusted library allocation
page read and write
23CC91A0000
trusted library allocation
page read and write
162F000
stack
page read and write
23CD4C17000
trusted library allocation
page read and write
23CCACB4000
trusted library allocation
page read and write
23CCD0C8000
trusted library allocation
page read and write
23CCA87A000
trusted library allocation
page read and write
23CCA891000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD56000
heap
page read and write
23CC9A1D000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CD333C000
heap
page read and write
23CBFD7B000
heap
page read and write
23CC63AB000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CD49EF000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC9560000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCBCA9000
trusted library allocation
page read and write
23CC4EA0000
trusted library allocation
page read and write
23CD5124000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CCBC70000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CCB948000
trusted library allocation
page read and write
23CCA5BE000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
22B0DC00000
unclassified section
page readonly
23CCBCB9000
trusted library allocation
page read and write
23CC609E000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CCB782000
trusted library allocation
page read and write
23CD16EF000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CBFD72000
heap
page read and write
17BE000
stack
page read and write
23CC9B6A000
trusted library allocation
page read and write
23CC9EE9000
trusted library allocation
page read and write
23CCA3EC000
trusted library allocation
page read and write
23CD164C000
trusted library allocation
page read and write
23CCA5A7000
trusted library allocation
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CC606F000
trusted library allocation
page read and write
23CCAAEA000
trusted library allocation
page read and write
23CC6199000
trusted library allocation
page read and write
23CC9B70000
trusted library allocation
page read and write
23CD5285000
trusted library allocation
page read and write
23CD0CE1000
trusted library allocation
page read and write
23CD49B2000
trusted library allocation
page read and write
188455C6000
heap
page read and write
23CD3301000
heap
page read and write
23CCB4B9000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
1C64B470000
heap
page read and write
23CD0CCF000
trusted library allocation
page read and write
23CD5232000
trusted library allocation
page read and write
23CC647F000
trusted library allocation
page read and write
23CD15AD000
trusted library allocation
page read and write
23CC63A2000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CC9B3F000
trusted library allocation
page read and write
23CBFDF1000
heap
page read and write
23CCA87A000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
23CCA531000
trusted library allocation
page read and write
22B0DFC6000
trusted library allocation
page read and write
23CC9D0F000
trusted library allocation
page read and write
23CD4ECC000
trusted library allocation
page read and write
2436A112000
trusted library allocation
page read and write
23CD15A3000
trusted library allocation
page read and write
23CCA4E4000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CCABD0000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
23CD149E000
trusted library allocation
page read and write
23CD52C4000
trusted library allocation
page read and write
23CCA75B000
trusted library allocation
page read and write
23CD4E6C000
trusted library allocation
page read and write
23CCAC8B000
trusted library allocation
page read and write
23CD0D61000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCAF9D000
trusted library allocation
page read and write
23CC9AF9000
trusted library allocation
page read and write
23CD5127000
trusted library allocation
page read and write
23CC639C000
trusted library allocation
page read and write
23CCA856000
trusted library allocation
page read and write
23CD4E65000
trusted library allocation
page read and write
23CBFD6D000
heap
page read and write
23CBFD9A000
heap
page read and write
23CC60A7000
trusted library allocation
page read and write
23CCACF7000
trusted library allocation
page read and write
23CCD693000
trusted library allocation
page read and write
2436AD6C000
heap
page read and write
23CD4FF7000
trusted library allocation
page read and write
23CC5EE2000
trusted library allocation
page read and write
23CD143C000
trusted library allocation
page read and write
23CD5293000
trusted library allocation
page read and write
23CC9B76000
trusted library allocation
page read and write
22B0DF96000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CD3350000
heap
page read and write
23CC63F6000
trusted library allocation
page read and write
23CCBC7D000
trusted library allocation
page read and write
23CC91D0000
trusted library allocation
page read and write
23CC60C9000
trusted library allocation
page read and write
23CD114F000
trusted library allocation
page read and write
23CC6D83000
trusted library allocation
page read and write
464287E000
stack
page read and write
23CCA845000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CD0CDD000
trusted library allocation
page read and write
23CBFDAC000
heap
page read and write
23CC8F90000
trusted library allocation
page read and write
23CC9158000
trusted library allocation
page read and write
23CCB99B000
trusted library allocation
page read and write
23CCA47C000
trusted library allocation
page read and write
23CC63F4000
trusted library allocation
page read and write
23CCA553000
trusted library allocation
page read and write
23CC6365000
trusted library allocation
page read and write
23CC9AF4000
trusted library allocation
page read and write
1C64B700000
trusted library allocation
page read and write
23CCA4E8000
trusted library allocation
page read and write
23CCBCA9000
trusted library allocation
page read and write
23CD14DE000
trusted library allocation
page read and write
23CCA466000
trusted library allocation
page read and write
23CD5241000
trusted library allocation
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CC85DA000
trusted library allocation
page read and write
23CD523E000
trusted library allocation
page read and write
23CC9EB9000
trusted library allocation
page read and write
23CD1488000
trusted library allocation
page read and write
23CC9B6C000
trusted library allocation
page read and write
23CBFDA4000
heap
page read and write
1C64B500000
heap
page read and write
23CC993F000
trusted library allocation
page read and write
23CCA531000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CD1576000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCB73B000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA6C3000
trusted library allocation
page read and write
23CC6329000
trusted library allocation
page read and write
23CC8BD4000
heap
page read and write
23CD333C000
heap
page read and write
23CD4F9B000
trusted library allocation
page read and write
23CCA6F3000
trusted library allocation
page read and write
23CCA6DA000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CCC85F000
trusted library allocation
page read and write
23CD10AD000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCB6AB000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CCA6CF000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
2F04DFE000
stack
page read and write
23CCACA7000
trusted library allocation
page read and write
23CC61A0000
trusted library allocation
page read and write
23CCA6E9000
trusted library allocation
page read and write
23CD165E000
trusted library allocation
page read and write
2436AD7D000
heap
page read and write
23CCBCA4000
trusted library allocation
page read and write
23CCC86D000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD14C3000
trusted library allocation
page read and write
23CD1390000
trusted library allocation
page read and write
23CD5255000
trusted library allocation
page read and write
23CD0C9F000
trusted library allocation
page read and write
23CD0EA0000
trusted library allocation
page read and write
23CD14E5000
trusted library allocation
page read and write
24369FD0000
trusted library allocation
page read and write
23CCD650000
trusted library allocation
page read and write
23CD11FB000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CD336D000
heap
page read and write
23CBFD72000
heap
page read and write
2436AE2D000
heap
page read and write
23CD4F90000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
23CCC7DB000
trusted library allocation
page read and write
23CD16C6000
trusted library allocation
page read and write
23CD0CF1000
trusted library allocation
page read and write
23CCA742000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CC9BFD000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD10A8000
trusted library allocation
page read and write
23CD1576000
trusted library allocation
page read and write
23CCA779000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CCADA4000
trusted library allocation
page read and write
23CCA444000
trusted library allocation
page read and write
23CC60AE000
trusted library allocation
page read and write
22B0D970000
unclassified section
page readonly
23CBFD51000
heap
page read and write
23CCA8AA000
trusted library allocation
page read and write
2436A16F000
trusted library allocation
page read and write
23CD5293000
trusted library allocation
page read and write
23CCA345000
trusted library allocation
page read and write
23CCAB2C000
trusted library allocation
page read and write
23CC632D000
trusted library allocation
page read and write
23CC609E000
trusted library allocation
page read and write
260D51FC000
trusted library allocation
page execute read
23CD3350000
heap
page read and write
23CC8B8D000
heap
page read and write
23CBFD7B000
heap
page read and write
23CC9D0F000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC9E1B000
trusted library allocation
page read and write
23CD1253000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CC8E00000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CD14D9000
trusted library allocation
page read and write
23CBFDA5000
heap
page read and write
23CD50AC000
trusted library allocation
page read and write
23CD0D3C000
trusted library allocation
page read and write
23CD4E4B000
trusted library allocation
page read and write
23CCCA9E000
trusted library allocation
page read and write
23CBFDA5000
heap
page read and write
23CC909C000
trusted library allocation
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CC992C000
trusted library allocation
page read and write
23CC916E000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC90CB000
trusted library allocation
page read and write
23CCA9FE000
trusted library allocation
page read and write
23CBFDC5000
heap
page read and write
23CCA8B5000
trusted library allocation
page read and write
23CBFDB3000
heap
page read and write
23CBFDB1000
heap
page read and write
23CC90A2000
trusted library allocation
page read and write
23CCA9A5000
trusted library allocation
page read and write
23CCA6F1000
trusted library allocation
page read and write
23CCA896000
trusted library allocation
page read and write
23CD5278000
trusted library allocation
page read and write
23CC64C6000
trusted library allocation
page read and write
23CD10AD000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
2436AD4D000
heap
page read and write
23CCB78E000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CC6077000
trusted library allocation
page read and write
23CC60BE000
trusted library allocation
page read and write
23CD335A000
heap
page read and write
23CD15A1000
trusted library allocation
page read and write
23CC6033000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CCAA3B000
trusted library allocation
page read and write
23CCC88F000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD50A8000
trusted library allocation
page read and write
23CD105E000
trusted library allocation
page read and write
23CD356D000
trusted library allocation
page read and write
23CCA75B000
trusted library allocation
page read and write
23CCAFF1000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA72B000
trusted library allocation
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CD1486000
trusted library allocation
page read and write
23CC9EAC000
trusted library allocation
page read and write
2436ADA1000
heap
page read and write
2436A000000
trusted library allocation
page read and write
23CCA6D2000
trusted library allocation
page read and write
23CC60BE000
trusted library allocation
page read and write
23CCABB2000
trusted library allocation
page read and write
23CCA415000
trusted library allocation
page read and write
23CD16A5000
trusted library allocation
page read and write
23CD521C000
trusted library allocation
page read and write
23CD4E5E000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCAF71000
trusted library allocation
page read and write
2436A176000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CC9841000
trusted library allocation
page read and write
23CD139C000
trusted library allocation
page read and write
23CD0E9E000
trusted library allocation
page read and write
23CC9B53000
trusted library allocation
page read and write
23CC6433000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CD14C3000
trusted library allocation
page read and write
23CD1344000
trusted library allocation
page read and write
44721FF000
stack
page read and write
23CBFD6C000
heap
page read and write
23CC9166000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CCCA2F000
trusted library allocation
page read and write
23CCA75B000
trusted library allocation
page read and write
23CCA505000
trusted library allocation
page read and write
23CCBC62000
trusted library allocation
page read and write
1C64B507000
heap
page read and write
23CD4E7B000
trusted library allocation
page read and write
23CD11C6000
trusted library allocation
page read and write
22B0DBC0000
heap
page readonly
23CD4E8D000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CCD141000
trusted library allocation
page read and write
23CC9EAC000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD15A9000
trusted library allocation
page read and write
23CC8E83000
trusted library allocation
page read and write
23CD15A1000
trusted library allocation
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD147C000
trusted library allocation
page read and write
2436ADF1000
heap
page read and write
23CD4E5C000
trusted library allocation
page read and write
23CBFD61000
heap
page read and write
23CD4F8D000
trusted library allocation
page read and write
23CC96E1000
trusted library allocation
page read and write
23CD3345000
heap
page read and write
EC1000
unkown
page execute read
23CC9BA1000
trusted library allocation
page read and write
23CD4E72000
trusted library allocation
page read and write
23CD2D8D000
trusted library allocation
page read and write
23CD4E7B000
trusted library allocation
page read and write
23CCC8CE000
trusted library allocation
page read and write
23CD147F000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD0EA6000
trusted library allocation
page read and write
280DEB0C000
trusted library allocation
page read and write
23CD4CF4000
trusted library allocation
page read and write
2436A123000
trusted library allocation
page read and write
23CD11E7000
trusted library allocation
page read and write
23CC9DE3000
trusted library allocation
page read and write
23CCBCF6000
trusted library allocation
page read and write
23CC916B000
trusted library allocation
page read and write
23CC60BE000
trusted library allocation
page read and write
23CD3606000
trusted library allocation
page read and write
23CD1497000
trusted library allocation
page read and write
23CC91B0000
trusted library allocation
page read and write
22B0E01C000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CD1257000
trusted library allocation
page read and write
23CC95F4000
trusted library allocation
page read and write
23CD4EDB000
trusted library allocation
page read and write
23CD5291000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CBFDC1000
heap
page read and write
17F4000
heap
page read and write
23CCC874000
trusted library allocation
page read and write
280DE800000
heap
page read and write
23CCA72E000
trusted library allocation
page read and write
23CD52B0000
trusted library allocation
page read and write
23CD3586000
trusted library allocation
page read and write
23CCAE89000
trusted library allocation
page read and write
23CCB9C3000
trusted library allocation
page read and write
23CC9BBE000
trusted library allocation
page read and write
23CC9D6D000
trusted library allocation
page read and write
23CCA9DE000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CBFDB6000
heap
page read and write
23CBFDC2000
heap
page read and write
23CCAFF1000
trusted library allocation
page read and write
23CCCE1F000
trusted library allocation
page read and write
23CCA67E000
trusted library allocation
page read and write
23CD167B000
trusted library allocation
page read and write
23CCAEF8000
trusted library allocation
page read and write
23CCAF3B000
trusted library allocation
page read and write
23CD1242000
trusted library allocation
page read and write
23CCA9A8000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CC9084000
trusted library allocation
page read and write
23CC9AF7000
trusted library allocation
page read and write
23CC64E3000
trusted library allocation
page read and write
23CD10AD000
trusted library allocation
page read and write
23CCA79B000
trusted library allocation
page read and write
280DE7A8000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD4C5B000
trusted library allocation
page read and write
23CC9148000
trusted library allocation
page read and write
23CCC81C000
trusted library allocation
page read and write
23CBFD74000
heap
page read and write
18C8000
heap
page read and write
23CC4D2F000
trusted library allocation
page read and write
23CCA358000
trusted library allocation
page read and write
280DE770000
trusted library allocation
page read and write
23CD49E7000
trusted library allocation
page read and write
23CCA8C5000
trusted library allocation
page read and write
23CCBCB6000
trusted library allocation
page read and write
23CD148D000
trusted library allocation
page read and write
23CC64A7000
trusted library allocation
page read and write
23CD1141000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
2436AE58000
heap
page read and write
23CBFD56000
heap
page read and write
23CCB9C8000
trusted library allocation
page read and write
23CBFD67000
heap
page read and write
23CBFD6B000
heap
page read and write
23CC9945000
trusted library allocation
page read and write
23CC6009000
trusted library allocation
page read and write
23CCAF45000
trusted library allocation
page read and write
23CBFD59000
heap
page read and write
23CD4CE8000
trusted library allocation
page read and write
23CC6069000
trusted library allocation
page read and write
23CC4EE2000
trusted library allocation
page read and write
23CBFD9C000
heap
page read and write
23CC60E2000
trusted library allocation
page read and write
23CD14DE000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CC90CB000
trusted library allocation
page read and write
188439F0000
heap
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CD105E000
trusted library allocation
page read and write
1C64B80A000
trusted library allocation
page read and write
23CD142A000
trusted library allocation
page read and write
23CCAD56000
trusted library allocation
page read and write
23CBFD97000
heap
page read and write
23CD5085000
trusted library allocation
page read and write
23CCA58A000
trusted library allocation
page read and write
23CD147B000
trusted library allocation
page read and write
23CD0EAE000
trusted library allocation
page read and write
23CBFDB1000
heap
page read and write
23CD1395000
trusted library allocation
page read and write
23CD4938000
trusted library allocation
page read and write
23CD336D000
heap
page read and write
23CBFDBA000
heap
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CCD233000
trusted library allocation
page read and write
23CCB960000
trusted library allocation
page read and write
23CD145F000
trusted library allocation
page read and write
2436AD5C000
heap
page read and write
23CCAB9C000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CCABC3000
trusted library allocation
page read and write
23CCACFC000
trusted library allocation
page read and write
23CD4EA9000
trusted library allocation
page read and write
A5D39FE000
unkown
page readonly
23CD3541000
trusted library allocation
page read and write
280DE470000
heap
page readonly
23CBFDA8000
heap
page read and write
2436AE68000
heap
page read and write
23CCD0A2000
trusted library allocation
page read and write
23CC6DC8000
trusted library allocation
page read and write
23CC6223000
trusted library allocation
page read and write
23CCBC63000
trusted library allocation
page read and write
23CD49D1000
trusted library allocation
page read and write
23CD15A7000
trusted library allocation
page read and write
15FF000
stack
page read and write
23CCBCB0000
trusted library allocation
page read and write
23CCA3BD000
trusted library allocation
page read and write
23CD50E3000
trusted library allocation
page read and write
23CD10DB000
trusted library allocation
page read and write
23CD4C13000
trusted library allocation
page read and write
23CC4E82000
trusted library allocation
page read and write
23CBFD63000
heap
page read and write
23CD15A5000
trusted library allocation
page read and write
23CD5127000
trusted library allocation
page read and write
23CD14B7000
trusted library allocation
page read and write
23CD4949000
trusted library allocation
page read and write
23CC9A4A000
trusted library allocation
page read and write
23CCA311000
trusted library allocation
page read and write
23CCA9DB000
trusted library allocation
page read and write
23CD2D96000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CCAF42000
trusted library allocation
page read and write
23CBFD5C000
heap
page read and write
23CC9E73000
trusted library allocation
page read and write
23CD148D000
trusted library allocation
page read and write
23CCBC9D000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCBCF6000
trusted library allocation
page read and write
23CD4EA9000
trusted library allocation
page read and write
23CCA5CF000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD4FBC000
trusted library allocation
page read and write
23CCBC65000
trusted library allocation
page read and write
23CCBCCC000
trusted library allocation
page read and write
23CCA926000
trusted library allocation
page read and write
23CD4941000
trusted library allocation
page read and write
23CC9EB3000
trusted library allocation
page read and write
23CCAF91000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCBCD6000
trusted library allocation
page read and write
18843A6A000
heap
page read and write
23CD14B9000
trusted library allocation
page read and write
18843A7D000
heap
page read and write
23CC60DE000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CC60B8000
trusted library allocation
page read and write
2436AD8D000
heap
page read and write
23CBFD93000
heap
page read and write
280DE75F000
trusted library allocation
page read and write
23CD133A000
trusted library allocation
page read and write
23CCB99B000
trusted library allocation
page read and write
23CC9B7E000
trusted library allocation
page read and write
23CCC673000
trusted library allocation
page read and write
23CD4FA4000
trusted library allocation
page read and write
23CCD107000
trusted library allocation
page read and write
23CC95B8000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CCBCF9000
trusted library allocation
page read and write
23CCADB7000
trusted library allocation
page read and write
A5D175D000
stack
page read and write
23CBFDB6000
heap
page read and write
23CD0EBB000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CC47F7000
trusted library allocation
page read and write
23CCC8EF000
trusted library allocation
page read and write
23CC6433000
trusted library allocation
page read and write
23CC8D2E000
trusted library allocation
page read and write
23CD4EC8000
trusted library allocation
page read and write
23CC478A000
trusted library allocation
page read and write
23CCA3C3000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CD34A3000
trusted library allocation
page read and write
23CCA8F5000
trusted library allocation
page read and write
23CD0E24000
trusted library allocation
page read and write
23CCA8D0000
trusted library allocation
page read and write
23CD0E9A000
trusted library allocation
page read and write
23CD1482000
trusted library allocation
page read and write
23CD1045000
trusted library allocation
page read and write
23CC9B4B000
trusted library allocation
page read and write
23CBFDA5000
heap
page read and write
260D52AE000
trusted library allocation
page execute read
23CBFD93000
heap
page read and write
23CBFD96000
heap
page read and write
23CC9D49000
trusted library allocation
page read and write
23CCC6B6000
trusted library allocation
page read and write
23CCB77C000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CC91DC000
trusted library allocation
page read and write
23CC9885000
trusted library allocation
page read and write
23CC9562000
trusted library allocation
page read and write
23CD4E8D000
trusted library allocation
page read and write
23CCAAFE000
trusted library allocation
page read and write
23CCACBD000
trusted library allocation
page read and write
23CC9B80000
trusted library allocation
page read and write
23CC95D7000
trusted library allocation
page read and write
23CC956D000
trusted library allocation
page read and write
23CD52FB000
trusted library allocation
page read and write
23CD11C6000
trusted library allocation
page read and write
23CD4E81000
trusted library allocation
page read and write
23CD138D000
trusted library allocation
page read and write
23CC9B6E000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CD1061000
trusted library allocation
page read and write
23CC9BDD000
trusted library allocation
page read and write
23CCAFC3000
trusted library allocation
page read and write
23CCA348000
trusted library allocation
page read and write
23CD529E000
trusted library allocation
page read and write
18D5000
heap
page read and write
23CBFD93000
heap
page read and write
23CC9667000
trusted library allocation
page read and write
18843A82000
heap
page read and write
23CBFD7F000
heap
page read and write
23CBFDC1000
heap
page read and write
23CBFD96000
heap
page read and write
23CC4EB4000
trusted library allocation
page read and write
23CCBC88000
trusted library allocation
page read and write
23CC963D000
trusted library allocation
page read and write
22B0DF61000
trusted library allocation
page read and write
23CCB76F000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
23CC953D000
trusted library allocation
page read and write
23CCA358000
trusted library allocation
page read and write
23CC95FB000
trusted library allocation
page read and write
23CC8D35000
trusted library allocation
page read and write
23CCBCD8000
trusted library allocation
page read and write
2436A690000
trusted library allocation
page read and write
23CC4EB9000
trusted library allocation
page read and write
23CBFD97000
heap
page read and write
23CBFD9B000
heap
page read and write
23CCAAEA000
trusted library allocation
page read and write
23CC8BE9000
heap
page read and write
23CC9ED8000
trusted library allocation
page read and write
23CD10C0000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CD4E9D000
trusted library allocation
page read and write
23CD0EC2000
trusted library allocation
page read and write
23CD13FB000
trusted library allocation
page read and write
23CD5250000
trusted library allocation
page read and write
23CCB89C000
trusted library allocation
page read and write
23CCA731000
trusted library allocation
page read and write
23CD14B7000
trusted library allocation
page read and write
23CCC7D5000
trusted library allocation
page read and write
23CCBCCB000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA72E000
trusted library allocation
page read and write
23CCAFF3000
trusted library allocation
page read and write
23CD1495000
trusted library allocation
page read and write
23CBFD67000
heap
page read and write
23CD14CC000
trusted library allocation
page read and write
23CCAFC0000
trusted library allocation
page read and write
23CC9B8A000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCAEDE000
trusted library allocation
page read and write
23CD5249000
trusted library allocation
page read and write
2436ADEF000
heap
page read and write
23CC9B6C000
trusted library allocation
page read and write
23CD4E2A000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CBFD62000
heap
page read and write
23CC9888000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFDA9000
heap
page read and write
23CD4F52000
trusted library allocation
page read and write
23CD1657000
trusted library allocation
page read and write
23CD14F8000
trusted library allocation
page read and write
5A3A7D8000
stack
page read and write
23CBFDA5000
heap
page read and write
23CD15AF000
trusted library allocation
page read and write
23CD50BF000
trusted library allocation
page read and write
23CCA7C0000
trusted library allocation
page read and write
2436A114000
trusted library allocation
page read and write
23CD4E7B000
trusted library allocation
page read and write
23CD0CB6000
trusted library allocation
page read and write
23CCA8C5000
trusted library allocation
page read and write
23CBFDC0000
heap
page read and write
23CBFDBA000
heap
page read and write
2436ADE3000
heap
page read and write
23CCA8A9000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
23CCBC95000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CBFD4F000
heap
page read and write
23CCA642000
trusted library allocation
page read and write
23CD140D000
trusted library allocation
page read and write
23CC8F07000
trusted library allocation
page read and write
23CC6192000
trusted library allocation
page read and write
280DE77A000
trusted library allocation
page read and write
23CCA361000
trusted library allocation
page read and write
23CCA643000
trusted library allocation
page read and write
23CCB9D0000
trusted library allocation
page read and write
23CC60A0000
trusted library allocation
page read and write
2436AE68000
heap
page read and write
23CBFDC2000
heap
page read and write
23CCB7BB000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CCABC3000
trusted library allocation
page read and write
23CC9CFB000
trusted library allocation
page read and write
23CCC6D8000
trusted library allocation
page read and write
23CCA536000
trusted library allocation
page read and write
23CCC628000
trusted library allocation
page read and write
23CD14E5000
trusted library allocation
page read and write
23CCADE9000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CCAB9F000
trusted library allocation
page read and write
18A8000
heap
page read and write
2436AE68000
heap
page read and write
23CD15D7000
trusted library allocation
page read and write
23CD5106000
trusted library allocation
page read and write
18CE000
heap
page read and write
23CD1495000
trusted library allocation
page read and write
23CCC8B1000
trusted library allocation
page read and write
23CD1265000
trusted library allocation
page read and write
23CBFDA2000
heap
page read and write
23CC9B48000
trusted library allocation
page read and write
23CD4E41000
trusted library allocation
page read and write
23CCA4F0000
trusted library allocation
page read and write
23CCCE1B000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
2436AE21000
heap
page read and write
2436ADEF000
heap
page read and write
23CC47CA000
trusted library allocation
page read and write
23CC91B0000
trusted library allocation
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CC61E4000
trusted library allocation
page read and write
23CC96DF000
trusted library allocation
page read and write
23CC9AEC000
trusted library allocation
page read and write
23CCC8C8000
trusted library allocation
page read and write
23CD11F8000
trusted library allocation
page read and write
23CD4EC4000
trusted library allocation
page read and write
23CCB75E000
trusted library allocation
page read and write
23CBFD5C000
heap
page read and write
2436ADEF000
heap
page read and write
23CD0DA8000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
18F4000
heap
page read and write
23CD14B7000
trusted library allocation
page read and write
280DE730000
trusted library allocation
page read and write
23CCA896000
trusted library allocation
page read and write
23CD4100000
trusted library allocation
page read and write
5A3E0BE000
unkown
page readonly
23CC60E2000
trusted library allocation
page read and write
23CCA590000
trusted library allocation
page read and write
23CCA9DB000
trusted library allocation
page read and write
23CD12D5000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CD14F8000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CCA49A000
trusted library allocation
page read and write
23CCA5BE000
trusted library allocation
page read and write
23CCA309000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CCA69E000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD9A000
heap
page read and write
23CBFD9F000
heap
page read and write
23CC91A0000
trusted library allocation
page read and write
23CCAF3F000
trusted library allocation
page read and write
23CCC8CE000
trusted library allocation
page read and write
23CCB3DE000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CD0EC7000
trusted library allocation
page read and write
A5D171E000
unkown
page readonly
2436A688000
unkown
page execute read
23CCA5CA000
trusted library allocation
page read and write
23CC9D18000
trusted library allocation
page read and write
23CD16BA000
trusted library allocation
page read and write
23CD0EA0000
trusted library allocation
page read and write
23CCA635000
trusted library allocation
page read and write
23CCA5BE000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CCBC6D000
trusted library allocation
page read and write
23CCABB2000
trusted library allocation
page read and write
23CCA4E4000
trusted library allocation
page read and write
23CD0CD9000
trusted library allocation
page read and write
2436AD6C000
heap
page read and write
23CCABA7000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CC940D000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
23CD0EAE000
trusted library allocation
page read and write
23CC9521000
trusted library allocation
page read and write
2F035FE000
stack
page read and write
23CC6D99000
trusted library allocation
page read and write
23CC60A5000
trusted library allocation
page read and write
23CCA896000
trusted library allocation
page read and write
23CCACBE000
trusted library allocation
page read and write
23CCA7A4000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
23CD4E1C000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CBFD4F000
heap
page read and write
23CC645D000
trusted library allocation
page read and write
23CC91C2000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CD136B000
trusted library allocation
page read and write
23CD15EC000
trusted library allocation
page read and write
23CD0E9E000
trusted library allocation
page read and write
23CCB5A6000
trusted library allocation
page read and write
23CD4C0E000
trusted library allocation
page read and write
23CCB771000
trusted library allocation
page read and write
23CC60A7000
trusted library allocation
page read and write
23CCAEBE000
trusted library allocation
page read and write
23CCAB96000
trusted library allocation
page read and write
23CD0DB4000
trusted library allocation
page read and write
23CD151C000
trusted library allocation
page read and write
23CCA6D2000
trusted library allocation
page read and write
23CCA589000
trusted library allocation
page read and write
22B0E018000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
23CC9C67000
trusted library allocation
page read and write
23CD1061000
trusted library allocation
page read and write
23CD1431000
trusted library allocation
page read and write
23CC9A0E000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
2436A860000
heap
page read and write
23CC85FB000
trusted library allocation
page read and write
23CD0CB6000
trusted library allocation
page read and write
23CD4E6A000
trusted library allocation
page read and write
23CD4EDD000
trusted library allocation
page read and write
23CC60F1000
trusted library allocation
page read and write
23CD498F000
trusted library allocation
page read and write
23CC914C000
trusted library allocation
page read and write
23CC8578000
trusted library allocation
page read and write
23CCBCEC000
trusted library allocation
page read and write
23CC9EB3000
trusted library allocation
page read and write
23CCA5D3000
trusted library allocation
page read and write
23CD10A8000
trusted library allocation
page read and write
23CCADF7000
trusted library allocation
page read and write
23CC85D6000
trusted library allocation
page read and write
2436A680000
unkown
page execute read
23CD15A5000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CD3307000
heap
page read and write
23CBFDB6000
heap
page read and write
23CCC6BF000
trusted library allocation
page read and write
23CC60C9000
trusted library allocation
page read and write
23CD5122000
trusted library allocation
page read and write
23CCBCC0000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CD0EA4000
trusted library allocation
page read and write
23CC91D6000
trusted library allocation
page read and write
23CBFD60000
heap
page read and write
23CBFDC5000
heap
page read and write
23CD145C000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CD499C000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CC9E64000
trusted library allocation
page read and write
23CC986B000
trusted library allocation
page read and write
280DE340000
unclassified section
page readonly
23CBFDA8000
heap
page read and write
23CC6373000
trusted library allocation
page read and write
23CD5255000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CBFD59000
heap
page read and write
23CCA4B9000
trusted library allocation
page read and write
23CCB938000
trusted library allocation
page read and write
23CCA920000
trusted library allocation
page read and write
23CC9CA4000
trusted library allocation
page read and write
23CD14F5000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CBFD6B000
heap
page read and write
23CCAB72000
trusted library allocation
page read and write
23CBFD61000
heap
page read and write
23CD0E27000
trusted library allocation
page read and write
23CD141C000
trusted library allocation
page read and write
23CD10AF000
trusted library allocation
page read and write
22B0DF9F000
trusted library allocation
page read and write
23CD12DB000
trusted library allocation
page read and write
23CD1061000
trusted library allocation
page read and write
23CD149E000
trusted library allocation
page read and write
23CC9C81000
trusted library allocation
page read and write
23CC9139000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CD0CB6000
trusted library allocation
page read and write
23CD14F8000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCC65A000
trusted library allocation
page read and write
23CD5014000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CC6018000
trusted library allocation
page read and write
23CCA4B0000
trusted library allocation
page read and write
23CC9B66000
trusted library allocation
page read and write
23CD0C9A000
trusted library allocation
page read and write
23CCB929000
trusted library allocation
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CCC8D8000
trusted library allocation
page read and write
23CC9491000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CCA3F6000
trusted library allocation
page read and write
23CCACAE000
trusted library allocation
page read and write
23CC9878000
trusted library allocation
page read and write
23CC9E73000
trusted library allocation
page read and write
2436AC03000
trusted library allocation
page read and write
23CCA76A000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CD35A3000
trusted library allocation
page read and write
23CC9C94000
trusted library allocation
page read and write
F94000
unkown
page readonly
23CCA547000
trusted library allocation
page read and write
23CC4E64000
trusted library allocation
page read and write
23CC9CAB000
trusted library allocation
page read and write
18D0000
heap
page read and write
23CC99D5000
trusted library allocation
page read and write
23CC8D3D000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CCADFA000
trusted library allocation
page read and write
23CC8F63000
trusted library allocation
page read and write
23CC95DF000
trusted library allocation
page read and write
23CCA30B000
trusted library allocation
page read and write
23CD4E5E000
trusted library allocation
page read and write
2436A1BA000
trusted library allocation
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CD4E20000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFD96000
heap
page read and write
23CCBCFB000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
2436ADE6000
heap
page read and write
23CCA864000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CD5250000
trusted library allocation
page read and write
23CCAF5F000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
463FD9E000
stack
page read and write
23CC60B6000
trusted library allocation
page read and write
23CD0EA6000
trusted library allocation
page read and write
23CD12F6000
trusted library allocation
page read and write
23CC9B1B000
trusted library allocation
page read and write
23CD5259000
trusted library allocation
page read and write
23CD1443000
trusted library allocation
page read and write
22B0E020000
trusted library allocation
page read and write
23CD35AC000
trusted library allocation
page read and write
23CCA5EE000
trusted library allocation
page read and write
23CD10F9000
trusted library allocation
page read and write
280DE484000
heap
page read and write
18F4000
heap
page read and write
23CCB586000
trusted library allocation
page read and write
23CD14F5000
trusted library allocation
page read and write
23CCA9FE000
trusted library allocation
page read and write
23CCA5BE000
trusted library allocation
page read and write
23CC60F1000
trusted library allocation
page read and write
23CCA9DB000
trusted library allocation
page read and write
23CD50E1000
trusted library allocation
page read and write
23CD33CD000
heap
page read and write
23CC60E2000
trusted library allocation
page read and write
18843A10000
heap
page read and write
18843E05000
heap
page read and write
23CD12CF000
trusted library allocation
page read and write
23CC9C46000
trusted library allocation
page read and write
23CC9C5E000
trusted library allocation
page read and write
22B0DEE6000
heap
page read and write
23CBFD50000
heap
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CD15A9000
trusted library allocation
page read and write
23CC986D000
trusted library allocation
page read and write
463FC9B000
stack
page read and write
23CD1461000
trusted library allocation
page read and write
23CCA8AA000
trusted library allocation
page read and write
23CC8FAC000
trusted library allocation
page read and write
23CCBC70000
trusted library allocation
page read and write
23CC6157000
trusted library allocation
page read and write
23CCACBB000
trusted library allocation
page read and write
23CCADB5000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CC99F9000
trusted library allocation
page read and write
463FD5E000
unkown
page readonly
23CC9EF4000
trusted library allocation
page read and write
23CC6011000
trusted library allocation
page read and write
23CD1551000
trusted library allocation
page read and write
260D52D1000
trusted library allocation
page execute read
23CD0D83000
trusted library allocation
page read and write
23CCC6E4000
trusted library allocation
page read and write
23CD0C8B000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CCAEEE000
trusted library allocation
page read and write
22B0DAB0000
heap
page read and write
23CD0EDA000
trusted library allocation
page read and write
23CCA566000
trusted library allocation
page read and write
18EF000
heap
page read and write
24369D20000
unclassified section
page readonly
23CBFD4E000
heap
page read and write
2F055FF000
stack
page read and write
23CD5127000
trusted library allocation
page read and write
3D24000
heap
page read and write
23CCD22C000
trusted library allocation
page read and write
23CC918D000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CBFD98000
heap
page read and write
23CBFDC1000
heap
page read and write
23CC60AE000
trusted library allocation
page read and write
23CCA9FE000
trusted library allocation
page read and write
23CD1390000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CBFDBA000
heap
page read and write
23CC99C9000
trusted library allocation
page read and write
23CCA9D8000
trusted library allocation
page read and write
23CC9145000
trusted library allocation
page read and write
23CD15A1000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CBFD61000
heap
page read and write
23CBFD73000
heap
page read and write
23CCB8D0000
trusted library allocation
page read and write
23CCC644000
trusted library allocation
page read and write
23CCC656000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CCAEAE000
trusted library allocation
page read and write
23CD1661000
trusted library allocation
page read and write
23CCBCF3000
trusted library allocation
page read and write
23CC60E2000
trusted library allocation
page read and write
23CC8F6A000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CCC61B000
trusted library allocation
page read and write
23CBFDB1000
heap
page read and write
23CD3347000
heap
page read and write
23CCA6C0000
trusted library allocation
page read and write
18ED000
heap
page read and write
23CC6370000
trusted library allocation
page read and write
18F2000
heap
page read and write
23CBFD6B000
heap
page read and write
23CBFDC2000
heap
page read and write
23CCB4CA000
trusted library allocation
page read and write
23CD3305000
heap
page read and write
23CBFDB8000
heap
page read and write
23CC907E000
trusted library allocation
page read and write
F8C000
unkown
page write copy
23CD1568000
trusted library allocation
page read and write
17F4000
heap
page read and write
2436ADE3000
heap
page read and write
2436AD00000
heap
page read and write
23CC91FC000
trusted library allocation
page read and write
18E6000
heap
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CCC69B000
trusted library allocation
page read and write
23CD1661000
trusted library allocation
page read and write
23CC91C2000
trusted library allocation
page read and write
23CC91FC000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CC9E5A000
trusted library allocation
page read and write
23CCB9D4000
trusted library allocation
page read and write
23CCA3C3000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC8FF7000
trusted library allocation
page read and write
23CCA444000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC90CB000
trusted library allocation
page read and write
23CC8FAF000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCB8AA000
trusted library allocation
page read and write
23CD4945000
trusted library allocation
page read and write
23CD1461000
trusted library allocation
page read and write
2436A67C000
unkown
page execute read
23CBFDC2000
heap
page read and write
23CC9B66000
trusted library allocation
page read and write
23CD16D2000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD73000
heap
page read and write
23CBFD50000
heap
page read and write
23CD12D3000
trusted library allocation
page read and write
249E000
stack
page read and write
23CCBC9D000
trusted library allocation
page read and write
23CD141C000
trusted library allocation
page read and write
23CC9B60000
trusted library allocation
page read and write
23CCBCDC000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CD16EC000
trusted library allocation
page read and write
209E000
stack
page read and write
23CD167B000
trusted library allocation
page read and write
5A3B7FE000
stack
page read and write
23CD15F5000
trusted library allocation
page read and write
22B0DF5B000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
23CCACD1000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CCBC70000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CD0D10000
trusted library allocation
page read and write
23CCA8D3000
trusted library allocation
page read and write
23CD4CA1000
trusted library allocation
page read and write
23CCADD3000
trusted library allocation
page read and write
23CD16C6000
trusted library allocation
page read and write
23CCB7F6000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCA59D000
trusted library allocation
page read and write
23CD14B9000
trusted library allocation
page read and write
23CD0EF2000
trusted library allocation
page read and write
23CC8BCA000
heap
page read and write
23CBFD72000
heap
page read and write
2436AE2A000
heap
page read and write
23CBFD5A000
heap
page read and write
23CBFD6C000
heap
page read and write
23CBFD9A000
heap
page read and write
23CCAB38000
trusted library allocation
page read and write
23CC9176000
trusted library allocation
page read and write
23CD0CCB000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCC8B1000
trusted library allocation
page read and write
23CCAEF8000
trusted library allocation
page read and write
23CC4D71000
trusted library allocation
page read and write
23CC6DF5000
trusted library allocation
page read and write
23CD11DF000
trusted library allocation
page read and write
23CCB957000
trusted library allocation
page read and write
23CD1470000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
22B0DEE4000
heap
page read and write
23CC6386000
trusted library allocation
page read and write
23CD139C000
trusted library allocation
page read and write
23CD14C3000
trusted library allocation
page read and write
23CC915B000
trusted library allocation
page read and write
23CD4E6C000
trusted library allocation
page read and write
23CC949D000
trusted library allocation
page read and write
23CCB92C000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CD148D000
trusted library allocation
page read and write
23CCB9D4000
trusted library allocation
page read and write
23CCAF6D000
trusted library allocation
page read and write
23CC64C3000
trusted library allocation
page read and write
23CD4E55000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCA7BE000
trusted library allocation
page read and write
23CD4C5B000
trusted library allocation
page read and write
23CCA9A0000
trusted library allocation
page read and write
23CBFDA5000
heap
page read and write
23CCD1E4000
trusted library allocation
page read and write
2436A670000
unkown
page execute read
23CCA5FC000
trusted library allocation
page read and write
23CD50BF000
trusted library allocation
page read and write
18C4000
heap
page read and write
23CC47C5000
trusted library allocation
page read and write
18E6000
heap
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CCBCF9000
trusted library allocation
page read and write
23CD4E9D000
trusted library allocation
page read and write
23CCA9FC000
trusted library allocation
page read and write
23CCBCC9000
trusted library allocation
page read and write
23CD16E4000
trusted library allocation
page read and write
23CCADB0000
trusted library allocation
page read and write
23CCA494000
trusted library allocation
page read and write
23CD10C0000
trusted library allocation
page read and write
23CC6188000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CCC8C2000
trusted library allocation
page read and write
23CC618A000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CD3350000
heap
page read and write
23CCA491000
trusted library allocation
page read and write
23CC4E1B000
trusted library allocation
page read and write
22B0DA20000
heap
page read and write
23CD524A000
trusted library allocation
page read and write
23CBFD49000
heap
page read and write
23CC9AF7000
trusted library allocation
page read and write
23CCABD8000
trusted library allocation
page read and write
23CC99E1000
trusted library allocation
page read and write
2436AE44000
heap
page read and write
23CC6DD3000
trusted library allocation
page read and write
188455B0000
heap
page read and write
23CBFDB3000
heap
page read and write
23CBFD9F000
heap
page read and write
23CBFD9A000
heap
page read and write
23CC99D9000
trusted library allocation
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCA345000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CC95FB000
trusted library allocation
page read and write
23CD0EA2000
trusted library allocation
page read and write
23CC95C8000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CCA3AB000
trusted library allocation
page read and write
22B0D9F3000
remote allocation
page execute read
23CCA3CF000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC6236000
trusted library allocation
page read and write
2F03DFE000
stack
page read and write
23CCBCCB000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA358000
trusted library allocation
page read and write
23CCA75B000
trusted library allocation
page read and write
23CCA4B0000
trusted library allocation
page read and write
23CC9DDF000
trusted library allocation
page read and write
23CCD143000
trusted library allocation
page read and write
23CCC80D000
trusted library allocation
page read and write
23CCB8FA000
trusted library allocation
page read and write
23CD1461000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CD127B000
trusted library allocation
page read and write
18843C00000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
23CD52F3000
trusted library allocation
page read and write
23CCC8A8000
trusted library allocation
page read and write
23CCA83D000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CC60B8000
trusted library allocation
page read and write
23CD16BA000
trusted library allocation
page read and write
23CD15AB000
trusted library allocation
page read and write
23CD14B7000
trusted library allocation
page read and write
23CBFD94000
heap
page read and write
23CC47C1000
trusted library allocation
page read and write
23CD13BB000
trusted library allocation
page read and write
23CCA45D000
trusted library allocation
page read and write
280DEA05000
trusted library allocation
page read and write
23CC9CC3000
trusted library allocation
page read and write
23CC6062000
trusted library allocation
page read and write
23CD15E2000
trusted library allocation
page read and write
23CCA534000
trusted library allocation
page read and write
23CC913B000
trusted library allocation
page read and write
23CCA7CA000
trusted library allocation
page read and write
23CBFD45000
heap
page read and write
23CCB8F4000
trusted library allocation
page read and write
23CCA3EC000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC60A5000
trusted library allocation
page read and write
23CC6064000
trusted library allocation
page read and write
23CCA595000
trusted library allocation
page read and write
2436AE21000
heap
page read and write
23CD15E9000
trusted library allocation
page read and write
23CD3358000
heap
page read and write
23CC95C8000
trusted library allocation
page read and write
23CD50FA000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCA7D8000
trusted library allocation
page read and write
23CCA678000
trusted library allocation
page read and write
2436ADE0000
heap
page read and write
23CCBC9C000
trusted library allocation
page read and write
23CCC7CA000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CCC88F000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
2436ADE0000
heap
page read and write
23CD4C0E000
trusted library allocation
page read and write
23CCA5A6000
trusted library allocation
page read and write
23CD0CDD000
trusted library allocation
page read and write
23CD1434000
trusted library allocation
page read and write
23CBFDA3000
heap
page read and write
23CC6DBA000
trusted library allocation
page read and write
23CCC67F000
trusted library allocation
page read and write
23CCB8D7000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD105E000
trusted library allocation
page read and write
23CC8B97000
heap
page read and write
23CCA662000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC4E7D000
trusted library allocation
page read and write
23CCA746000
trusted library allocation
page read and write
23CCA502000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CBFD61000
heap
page read and write
23CCA5B3000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CC9418000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CBFD93000
heap
page read and write
23CCBCA1000
trusted library allocation
page read and write
23CC95D7000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCBCD6000
trusted library allocation
page read and write
23CCA4F1000
trusted library allocation
page read and write
23CCA3FE000
trusted library allocation
page read and write
23CD3309000
heap
page read and write
41E1000
heap
page read and write
23CBFD96000
heap
page read and write
23CBFD56000
heap
page read and write
23CCA6E1000
trusted library allocation
page read and write
23CD119E000
trusted library allocation
page read and write
23CCD1C5000
trusted library allocation
page read and write
23CBFD63000
heap
page read and write
23CBFD6B000
heap
page read and write
23CC95EF000
trusted library allocation
page read and write
2436AD7D000
heap
page read and write
23CBFD96000
heap
page read and write
23CBFD98000
heap
page read and write
23CD10AD000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CCC8D6000
trusted library allocation
page read and write
23CCB988000
trusted library allocation
page read and write
18843E00000
heap
page read and write
23CC9888000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CBFD49000
heap
page read and write
23CCB9E3000
trusted library allocation
page read and write
23CD0CED000
trusted library allocation
page read and write
23CC9AF4000
trusted library allocation
page read and write
23CC96F8000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CC60F0000
trusted library allocation
page read and write
23CC9525000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
A5D21D8000
stack
page read and write
23CC99EC000
trusted library allocation
page read and write
23CD354D000
trusted library allocation
page read and write
23CCAB9B000
trusted library allocation
page read and write
23CC6DBE000
trusted library allocation
page read and write
23CCBC68000
trusted library allocation
page read and write
23CD2DD8000
trusted library allocation
page read and write
23CCA9F7000
trusted library allocation
page read and write
23CBFDF1000
heap
page read and write
23CD3351000
heap
page read and write
23CD14E2000
trusted library allocation
page read and write
2436ADB9000
heap
page read and write
23CCA6A9000
trusted library allocation
page read and write
23CD49EF000
trusted library allocation
page read and write
41E0000
heap
page read and write
23CD350C000
trusted library allocation
page read and write
23CD4CF4000
trusted library allocation
page read and write
23CCB9FA000
trusted library allocation
page read and write
23CD0EA2000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CCA5E2000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
2F045FE000
stack
page read and write
23CCA32C000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CD1421000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD3350000
heap
page read and write
23CCA88A000
trusted library allocation
page read and write
23CC9064000
trusted library allocation
page read and write
23CD10FC000
trusted library allocation
page read and write
23CD146A000
trusted library allocation
page read and write
23CD49FE000
trusted library allocation
page read and write
23CD15A5000
trusted library allocation
page read and write
23CCBCAC000
trusted library allocation
page read and write
2436AD69000
heap
page read and write
2500000
heap
page read and write
23CD4C2D000
trusted library allocation
page read and write
23CCA6EB000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC9983000
trusted library allocation
page read and write
23CBFD64000
heap
page read and write
23CC4D23000
trusted library allocation
page read and write
23CC6DB0000
trusted library allocation
page read and write
23CC9E20000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CBFD72000
heap
page read and write
23CBFDBC000
heap
page read and write
23CD499C000
trusted library allocation
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CD0ED0000
trusted library allocation
page read and write
46407D8000
stack
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CBFDA4000
heap
page read and write
280DE700000
trusted library allocation
page read and write
23CC643D000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CD0CDD000
trusted library allocation
page read and write
23CCBCC9000
trusted library allocation
page read and write
23CBFD4A000
heap
page read and write
23CC8D38000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
5A39D9E000
unkown
page readonly
23CCA3BD000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CC4DF6000
trusted library allocation
page read and write
23CD4E1C000
trusted library allocation
page read and write
23CD3601000
trusted library allocation
page read and write
23CBFDBB000
heap
page read and write
23CD0DB0000
trusted library allocation
page read and write
23CD501C000
trusted library allocation
page read and write
23CD0CD9000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CCACD8000
trusted library allocation
page read and write
23CD50E6000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CD10FC000
trusted library allocation
page read and write
23CD0C9E000
trusted library allocation
page read and write
23CD1425000
trusted library allocation
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CCA3CF000
trusted library allocation
page read and write
23CCA848000
trusted library allocation
page read and write
23CCACD1000
trusted library allocation
page read and write
2436ADF1000
heap
page read and write
23CBFDBF000
heap
page read and write
23CCAEEE000
trusted library allocation
page read and write
44719FE000
stack
page read and write
23CC909C000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
A5D5A3E000
unkown
page readonly
23CBFD56000
heap
page read and write
23CD49DF000
trusted library allocation
page read and write
22B0E000000
trusted library allocation
page read and write
23CC4E13000
trusted library allocation
page read and write
23CCAF4E000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCACAE000
trusted library allocation
page read and write
23CCC831000
trusted library allocation
page read and write
23CC9512000
trusted library allocation
page read and write
23CCA956000
trusted library allocation
page read and write
23CC8F62000
trusted library allocation
page read and write
280DE711000
trusted library allocation
page read and write
23CCACAE000
trusted library allocation
page read and write
23CD10DD000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC61B1000
trusted library allocation
page read and write
23CD2D75000
trusted library allocation
page read and write
23CD147B000
trusted library allocation
page read and write
23CC9EFA000
trusted library allocation
page read and write
23CC609B000
trusted library allocation
page read and write
23CC9B70000
trusted library allocation
page read and write
280DE774000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCA590000
trusted library allocation
page read and write
23CCA361000
trusted library allocation
page read and write
23CD13FD000
trusted library allocation
page read and write
2436ADF1000
heap
page read and write
23CD4E6A000
trusted library allocation
page read and write
23CC9B95000
trusted library allocation
page read and write
23CC91AC000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCA48A000
trusted library allocation
page read and write
23CD156A000
trusted library allocation
page read and write
23CD149E000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
23CC6473000
trusted library allocation
page read and write
23CCA77E000
trusted library allocation
page read and write
23CCA3AB000
trusted library allocation
page read and write
2436ADE8000
heap
page read and write
280DE777000
trusted library allocation
page read and write
23CC9B6C000
trusted library allocation
page read and write
23CCB656000
trusted library allocation
page read and write
23CC9DD4000
trusted library allocation
page read and write
2436A1EB000
trusted library allocation
page read and write
23CD336D000
heap
page read and write
23CCACBB000
trusted library allocation
page read and write
23CC6D92000
trusted library allocation
page read and write
2436AD8A000
heap
page read and write
23CCA5AD000
trusted library allocation
page read and write
23CCACFC000
trusted library allocation
page read and write
23CC60AE000
trusted library allocation
page read and write
23CBFD6A000
heap
page read and write
23CC617C000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFDA3000
heap
page read and write
23CBFD93000
heap
page read and write
23CD10DB000
trusted library allocation
page read and write
280DE4A3000
heap
page read and write
23CBFD9A000
heap
page read and write
23CD13B4000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC9B6C000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CD1696000
trusted library allocation
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CCA7E5000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCB780000
trusted library allocation
page read and write
23CC95DF000
trusted library allocation
page read and write
23CC9A24000
trusted library allocation
page read and write
23CCA8D5000
trusted library allocation
page read and write
23CD1493000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CCD07B000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CD5041000
trusted library allocation
page read and write
23CCBA00000
trusted library allocation
page read and write
F82000
unkown
page readonly
23CCA87A000
trusted library allocation
page read and write
23CD0EA0000
trusted library allocation
page read and write
23CD1149000
trusted library allocation
page read and write
2436A10C000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD9B000
heap
page read and write
23CCA9F7000
trusted library allocation
page read and write
5A3D07E000
stack
page read and write
23CC6DF3000
trusted library allocation
page read and write
23CD4949000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CCBCE0000
trusted library allocation
page read and write
23CC91AC000
trusted library allocation
page read and write
23CCA6FD000
trusted library allocation
page read and write
23CD4CF0000
trusted library allocation
page read and write
23CC8BDE000
heap
page read and write
23CBFD72000
heap
page read and write
23CD13B4000
trusted library allocation
page read and write
23CCAFC1000
trusted library allocation
page read and write
23CD104D000
trusted library allocation
page read and write
23CCC68B000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CCADEC000
trusted library allocation
page read and write
23CD14B9000
trusted library allocation
page read and write
23CD0D81000
trusted library allocation
page read and write
23CBFD53000
heap
page read and write
23CBFDA8000
heap
page read and write
23CC9B6C000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD10AF000
trusted library allocation
page read and write
23CD0CC0000
trusted library allocation
page read and write
23CCAF63000
trusted library allocation
page read and write
23CD11A2000
trusted library allocation
page read and write
23CC9B60000
trusted library allocation
page read and write
23CC9EA3000
trusted library allocation
page read and write
18D3000
heap
page read and write
23CBFD46000
heap
page read and write
23CBFDA8000
heap
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CBFD70000
heap
page read and write
24369F7F000
unclassified section
page read and write
23CBFD51000
heap
page read and write
23CCAF4C000
trusted library allocation
page read and write
23CD0CE9000
trusted library allocation
page read and write
23CCAF75000
trusted library allocation
page read and write
23CD12E5000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CCA73C000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFD56000
heap
page read and write
23CBFD9A000
heap
page read and write
23CC9B36000
trusted library allocation
page read and write
23CCA59D000
trusted library allocation
page read and write
23CCC8DE000
trusted library allocation
page read and write
23CCB9C5000
trusted library allocation
page read and write
23CCA7B2000
trusted library allocation
page read and write
23CC60E6000
trusted library allocation
page read and write
23CD4938000
trusted library allocation
page read and write
23CD52E5000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CC91DC000
trusted library allocation
page read and write
23CBFD59000
heap
page read and write
23CC9C7D000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFD93000
heap
page read and write
23CBFDC2000
heap
page read and write
23CBFD52000
heap
page read and write
23CCA343000
trusted library allocation
page read and write
23CC4D76000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CBFD96000
heap
page read and write
2436AE44000
heap
page read and write
23CCA9FE000
trusted library allocation
page read and write
2436AD8A000
heap
page read and write
23CCADDC000
trusted library allocation
page read and write
23CD4E38000
trusted library allocation
page read and write
23CD14C3000
trusted library allocation
page read and write
23CD4FCC000
trusted library allocation
page read and write
23CCC82C000
trusted library allocation
page read and write
23CD1280000
trusted library allocation
page read and write
23CC9BA3000
trusted library allocation
page read and write
23CCA590000
trusted library allocation
page read and write
23CC9530000
trusted library allocation
page read and write
23CBFDAB000
heap
page read and write
23CC953A000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CBFDB6000
heap
page read and write
EC0000
unkown
page readonly
23CD1395000
trusted library allocation
page read and write
23CC8F53000
trusted library allocation
page read and write
23CD11AB000
trusted library allocation
page read and write
23CCA5CF000
trusted library allocation
page read and write
280DE713000
trusted library allocation
page read and write
23CCBCB0000
trusted library allocation
page read and write
2436A1BC000
trusted library allocation
page read and write
23CC6025000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CCB5E5000
trusted library allocation
page read and write
23CD0CD5000
trusted library allocation
page read and write
23CCA3C0000
trusted library allocation
page read and write
23CBFD62000
heap
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CCAB4D000
trusted library allocation
page read and write
23CC60DE000
trusted library allocation
page read and write
23CCA8A9000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CD511A000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CC8BD9000
heap
page read and write
280DE703000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CC8F8B000
trusted library allocation
page read and write
23CC60A5000
trusted library allocation
page read and write
188455B4000
heap
page read and write
24369D10000
unclassified section
page readonly
23CCA60D000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC8BC1000
heap
page read and write
23CC8B8D000
heap
page read and write
23CD52F3000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CBFD4F000
heap
page read and write
41E1000
heap
page read and write
23CD4EC6000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CCAB00000
trusted library allocation
page read and write
23CBFD49000
heap
page read and write
23CD52BA000
trusted library allocation
page read and write
23CD1343000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CD49C0000
trusted library allocation
page read and write
23CC60E2000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CCBCE6000
trusted library allocation
page read and write
23CD165E000
trusted library allocation
page read and write
18C7000
heap
page read and write
23CC916D000
trusted library allocation
page read and write
23CC906C000
trusted library allocation
page read and write
23CCA45F000
trusted library allocation
page read and write
5A39D18000
stack
page read and write
23CC61C3000
trusted library allocation
page read and write
280DE486000
heap
page read and write
23CCA5EE000
trusted library allocation
page read and write
23CCBC6D000
trusted library allocation
page read and write
23CD15D9000
trusted library allocation
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CC6D6B000
trusted library allocation
page read and write
23CD14CF000
trusted library allocation
page read and write
23CD52B0000
trusted library allocation
page read and write
23CC9ADD000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC60B8000
trusted library allocation
page read and write
23CD15A7000
trusted library allocation
page read and write
23CCA3F1000
trusted library allocation
page read and write
23CCA4C3000
trusted library allocation
page read and write
23CCB957000
trusted library allocation
page read and write
23CCADFC000
trusted library allocation
page read and write
23CD4EDD000
trusted library allocation
page read and write
23CCB74C000
trusted library allocation
page read and write
23CCB957000
trusted library allocation
page read and write
22B0DF10000
trusted library allocation
page read and write
22B0E012000
trusted library allocation
page read and write
23CC9E82000
trusted library allocation
page read and write
280DE75D000
trusted library allocation
page read and write
23CC95C3000
trusted library allocation
page read and write
23CD0EC7000
trusted library allocation
page read and write
23CC8F8B000
trusted library allocation
page read and write
23CD4500000
trusted library allocation
page read and write
161B000
stack
page read and write
23CC6444000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
22B0DF6A000
trusted library allocation
page read and write
23CD1357000
trusted library allocation
page read and write
23CD5051000
trusted library allocation
page read and write
23CCC8D6000
trusted library allocation
page read and write
24369EE0000
heap
page read and write
23CD4E55000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CBFDBC000
heap
page read and write
23CCADB5000
trusted library allocation
page read and write
23CD0E64000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
23CCBCAE000
trusted library allocation
page read and write
18DE000
heap
page read and write
23CC84E9000
trusted library allocation
page read and write
23CCBCC7000
trusted library allocation
page read and write
23CD14EC000
trusted library allocation
page read and write
260D51FC000
trusted library allocation
page execute read
23CBFD4F000
heap
page read and write
23CD16A1000
trusted library allocation
page read and write
23CD50B2000
trusted library allocation
page read and write
23CD10F9000
trusted library allocation
page read and write
23CCA553000
trusted library allocation
page read and write
23CC60BE000
trusted library allocation
page read and write
23CD1495000
trusted library allocation
page read and write
23CD4CF0000
trusted library allocation
page read and write
22B0DF7A000
trusted library allocation
page read and write
23CC9082000
trusted library allocation
page read and write
23CC95EF000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CD10AB000
trusted library allocation
page read and write
23CD4EA9000
trusted library allocation
page read and write
23CC64E3000
trusted library allocation
page read and write
23CCB7D7000
trusted library allocation
page read and write
23CD4CF2000
trusted library allocation
page read and write
23CCBCCB000
trusted library allocation
page read and write
23CD0EA4000
trusted library allocation
page read and write
23CCAA40000
trusted library allocation
page read and write
23CD49E6000
trusted library allocation
page read and write
23CC917F000
trusted library allocation
page read and write
23CC9B6A000
trusted library allocation
page read and write
280DE420000
heap
page read and write
23CCB930000
trusted library allocation
page read and write
23CD4CAC000
trusted library allocation
page read and write
23CCAF75000
trusted library allocation
page read and write
23CC4781000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CCC8AA000
trusted library allocation
page read and write
2436AC0D000
trusted library allocation
page read and write
23CC623B000
trusted library allocation
page read and write
23CCA5FE000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CC9180000
trusted library allocation
page read and write
23CD5051000
trusted library allocation
page read and write
23CD143A000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CC60A7000
trusted library allocation
page read and write
23CCA84D000
trusted library allocation
page read and write
23CD10C0000
trusted library allocation
page read and write
23CD0EBB000
trusted library allocation
page read and write
5A39C9E000
unkown
page readonly
23CCBCAE000
trusted library allocation
page read and write
23CD14CC000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CBFD96000
heap
page read and write
23CCBC91000
trusted library allocation
page read and write
23CC9E7B000
trusted library allocation
page read and write
23CCBC80000
trusted library allocation
page read and write
23CC99D3000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CD50F9000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CCAF54000
trusted library allocation
page read and write
23CBFDD3000
heap
page read and write
23CD14AB000
trusted library allocation
page read and write
23CC9B83000
trusted library allocation
page read and write
23CCACFC000
trusted library allocation
page read and write
23CCAD55000
trusted library allocation
page read and write
188455C9000
heap
page read and write
23CBFDA7000
heap
page read and write
23CCAA65000
trusted library allocation
page read and write
280DE767000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA5B9000
trusted library allocation
page read and write
23CC91D0000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCA89F000
trusted library allocation
page read and write
23CBFD6D000
heap
page read and write
23CC9552000
trusted library allocation
page read and write
23CBFD82000
heap
page read and write
23CD1392000
trusted library allocation
page read and write
23CCCA84000
trusted library allocation
page read and write
23CD11EE000
trusted library allocation
page read and write
23CD1495000
trusted library allocation
page read and write
22B0DC63000
heap
page read and write
23CCAC85000
trusted library allocation
page read and write
23CCB9E3000
trusted library allocation
page read and write
23CD0E95000
trusted library allocation
page read and write
23CCAFEF000
trusted library allocation
page read and write
23CD1482000
trusted library allocation
page read and write
23CD139C000
trusted library allocation
page read and write
41E1000
heap
page read and write
23CD5249000
trusted library allocation
page read and write
23CBFDAC000
heap
page read and write
23CBFD3B000
heap
page read and write
23CC90A2000
trusted library allocation
page read and write
23CD14F8000
trusted library allocation
page read and write
280DEB00000
trusted library allocation
page read and write
23CCC649000
trusted library allocation
page read and write
23CD10AB000
trusted library allocation
page read and write
2436AE79000
heap
page read and write
23CD4938000
trusted library allocation
page read and write
23CC85CB000
trusted library allocation
page read and write
23CC9D23000
trusted library allocation
page read and write
23CD49FE000
trusted library allocation
page read and write
23CC91AC000
trusted library allocation
page read and write
23CBFD97000
heap
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CCBCB8000
trusted library allocation
page read and write
23CC98A9000
trusted library allocation
page read and write
23CD50DF000
trusted library allocation
page read and write
23CC9969000
trusted library allocation
page read and write
23CD4941000
trusted library allocation
page read and write
23CD52F6000
trusted library allocation
page read and write
23CC95D2000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFDAE000
heap
page read and write
23CD4C1B000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CCAF91000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFDC2000
heap
page read and write
23CCAF58000
trusted library allocation
page read and write
23CC4E75000
trusted library allocation
page read and write
22B0DD00000
trusted library allocation
page read and write
23CCA3C3000
trusted library allocation
page read and write
23CCBCE9000
trusted library allocation
page read and write
23CCAA37000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CCA422000
trusted library allocation
page read and write
23CC6DF0000
trusted library allocation
page read and write
23CC95EF000
trusted library allocation
page read and write
23CD335A000
heap
page read and write
23CBFDB3000
heap
page read and write
23CC9A4E000
trusted library allocation
page read and write
23CD529E000
trusted library allocation
page read and write
23CBFDC0000
heap
page read and write
22B0E00C000
trusted library allocation
page read and write
23CCBCF2000
trusted library allocation
page read and write
23CD0DD9000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CC60E6000
trusted library allocation
page read and write
2436AE68000
heap
page read and write
23CC95DF000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CCA542000
trusted library allocation
page read and write
23CC9869000
trusted library allocation
page read and write
23CD10C0000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CCAAF2000
trusted library allocation
page read and write
23CC8F84000
trusted library allocation
page read and write
22B0DA40000
heap
page read and write
23CD5250000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
24369DB0000
heap
page read and write
23CBFD9A000
heap
page read and write
2436ADF1000
heap
page read and write
23CC60BE000
trusted library allocation
page read and write
18D8000
heap
page read and write
23CD11E3000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CBFD72000
heap
page read and write
23CBFD6C000
heap
page read and write
23CC6069000
trusted library allocation
page read and write
23CCB8CD000
trusted library allocation
page read and write
2436A181000
trusted library allocation
page read and write
23CD13B6000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CC601B000
trusted library allocation
page read and write
23CCBCB8000
trusted library allocation
page read and write
23CC9B1F000
trusted library allocation
page read and write
23CBFD6F000
heap
page read and write
23CC60DE000
trusted library allocation
page read and write
23CCCE29000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
F8C000
unkown
page read and write
23CD149E000
trusted library allocation
page read and write
23CD0D94000
trusted library allocation
page read and write
23CC9860000
trusted library allocation
page read and write
2436AE58000
heap
page read and write
23CD16D2000
trusted library allocation
page read and write
23CCA3EC000
trusted library allocation
page read and write
23CD1486000
trusted library allocation
page read and write
23CCAB66000
trusted library allocation
page read and write
23CD10A8000
trusted library allocation
page read and write
23CCAAED000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
23CCAF51000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CC940A000
trusted library allocation
page read and write
23CCA570000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
23CCAF75000
trusted library allocation
page read and write
23CCB979000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
24369F70000
unclassified section
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CCCE19000
trusted library allocation
page read and write
23CD4E32000
trusted library allocation
page read and write
23CD4EC4000
trusted library allocation
page read and write
23CD14D0000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CD4CF5000
trusted library allocation
page read and write
23CCADF2000
trusted library allocation
page read and write
23CCA5CF000
trusted library allocation
page read and write
23CC6DE8000
trusted library allocation
page read and write
23CCA5B9000
trusted library allocation
page read and write
2436ADE8000
heap
page read and write
23CBFD93000
heap
page read and write
23CD52C4000
trusted library allocation
page read and write
23CCBCB6000
trusted library allocation
page read and write
23CC9898000
trusted library allocation
page read and write
23CC9CD1000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CC9175000
trusted library allocation
page read and write
23CCB784000
trusted library allocation
page read and write
23CC6DE0000
trusted library allocation
page read and write
23CBFD82000
heap
page read and write
23CD0D61000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CC907F000
trusted library allocation
page read and write
23CC6474000
trusted library allocation
page read and write
23CD147F000
trusted library allocation
page read and write
23CCA753000
trusted library allocation
page read and write
1C64B4B0000
heap
page read and write
23CC91BD000
trusted library allocation
page read and write
23CD4945000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CCA89F000
trusted library allocation
page read and write
23CBFDC0000
heap
page read and write
23CCA5AD000
trusted library allocation
page read and write
23CC60F1000
trusted library allocation
page read and write
23CD5122000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
2436AE77000
heap
page read and write
2436AE3B000
heap
page read and write
23CCA6BD000
trusted library allocation
page read and write
23CCBC70000
trusted library allocation
page read and write
23CCB73F000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCBC6D000
trusted library allocation
page read and write
23CCB946000
trusted library allocation
page read and write
23CC603B000
trusted library allocation
page read and write
23CCA6AE000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCAF54000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CCC8B6000
trusted library allocation
page read and write
23CCAFA6000
trusted library allocation
page read and write
23CBFDAA000
heap
page read and write
23CD50EE000
trusted library allocation
page read and write
23CCAAFE000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
23CC8B8D000
heap
page read and write
23CD509D000
trusted library allocation
page read and write
23CD1414000
trusted library allocation
page read and write
2436A178000
trusted library allocation
page read and write
2436AD64000
heap
page read and write
23CCA51B000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CD5066000
trusted library allocation
page read and write
23CC857D000
trusted library allocation
page read and write
23CCB979000
trusted library allocation
page read and write
23CCAAEA000
trusted library allocation
page read and write
23CCA479000
trusted library allocation
page read and write
23CBFDB5000
heap
page read and write
23CCA507000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC8EF0000
trusted library allocation
page read and write
23CD3348000
heap
page read and write
23CCB8EE000
trusted library allocation
page read and write
23CCA343000
trusted library allocation
page read and write
23CCABD6000
trusted library allocation
page read and write
23CD14E2000
trusted library allocation
page read and write
23CBFDBB000
heap
page read and write
464387E000
stack
page read and write
23CC9EF5000
trusted library allocation
page read and write
23CCACAB000
trusted library allocation
page read and write
23CD148B000
trusted library allocation
page read and write
23CD1031000
trusted library allocation
page read and write
23CC6435000
trusted library allocation
page read and write
23CCA3F0000
trusted library allocation
page read and write
23CC95CC000
trusted library allocation
page read and write
23CCBCF6000
trusted library allocation
page read and write
23CD3487000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFD93000
heap
page read and write
23CCA9F7000
trusted library allocation
page read and write
23CCACBB000
trusted library allocation
page read and write
23CCAD79000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC91DC000
trusted library allocation
page read and write
23CC47BF000
trusted library allocation
page read and write
23CC648C000
trusted library allocation
page read and write
23CCA47C000
trusted library allocation
page read and write
2436AD9C000
heap
page read and write
23CCA8D0000
trusted library allocation
page read and write
280DE4A0000
heap
page read and write
5A3F0BE000
unkown
page readonly
23CBFD44000
heap
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CC9C48000
trusted library allocation
page read and write
23CD4E4B000
trusted library allocation
page read and write
23CD15AB000
trusted library allocation
page read and write
23CCA345000
trusted library allocation
page read and write
280DE715000
trusted library allocation
page read and write
23CCC8C7000
trusted library allocation
page read and write
23CC6074000
trusted library allocation
page read and write
23CD12D5000
trusted library allocation
page read and write
23CCB4E8000
trusted library allocation
page read and write
23CC635E000
trusted library allocation
page read and write
23CD14CC000
trusted library allocation
page read and write
23CCB591000
trusted library allocation
page read and write
23CD3307000
heap
page read and write
23CC6458000
trusted library allocation
page read and write
23CBFDBC000
heap
page read and write
23CD15A9000
trusted library allocation
page read and write
23CCABD6000
trusted library allocation
page read and write
23CCAB20000
trusted library allocation
page read and write
23CCB5FA000
trusted library allocation
page read and write
23CCA8D0000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CC9BA7000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
22B0DBD2000
unclassified section
page read and write
23CCB76F000
trusted library allocation
page read and write
23CCA363000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CC643D000
trusted library allocation
page read and write
23CD147F000
trusted library allocation
page read and write
23CD4E41000
trusted library allocation
page read and write
1880000
heap
page read and write
2436A15C000
trusted library allocation
page read and write
2436ADE9000
heap
page read and write
23CBFDB6000
heap
page read and write
23CD4ECC000
trusted library allocation
page read and write
23CD4EDB000
trusted library allocation
page read and write
23CD1031000
trusted library allocation
page read and write
23CC8F84000
trusted library allocation
page read and write
23CD147B000
trusted library allocation
page read and write
23CBFD39000
heap
page read and write
23CC60E9000
trusted library allocation
page read and write
23CC9B6A000
trusted library allocation
page read and write
23CD52BA000
trusted library allocation
page read and write
23CC6477000
trusted library allocation
page read and write
280DE580000
heap
page read and write
23CC9556000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CBFD4F000
heap
page read and write
23CBFD4F000
heap
page read and write
23CD4C56000
trusted library allocation
page read and write
23CD0CE5000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
23CD10DD000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CD3307000
heap
page read and write
23CD0D15000
trusted library allocation
page read and write
23CD15E7000
trusted library allocation
page read and write
23CCA3C0000
trusted library allocation
page read and write
23CCC684000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CC9624000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CD50FD000
trusted library allocation
page read and write
17C0000
heap
page read and write
23CBFDA2000
heap
page read and write
23CC9EB3000
trusted library allocation
page read and write
23CCD68A000
trusted library allocation
page read and write
23CCA876000
trusted library allocation
page read and write
23CD10BD000
trusted library allocation
page read and write
23CCC8EB000
trusted library allocation
page read and write
23CD147C000
trusted library allocation
page read and write
23CC915E000
trusted library allocation
page read and write
23CCA3EC000
trusted library allocation
page read and write
23CCACB4000
trusted library allocation
page read and write
23CCC620000
trusted library allocation
page read and write
23CBFD61000
heap
page read and write
2436ADFD000
heap
page read and write
23CBFD93000
heap
page read and write
23CBFDB6000
heap
page read and write
23CBFD9E000
heap
page read and write
23CBFD72000
heap
page read and write
23CBFD4F000
heap
page read and write
23CD523E000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA630000
trusted library allocation
page read and write
23CD11AC000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CC908B000
trusted library allocation
page read and write
23CC8D40000
trusted library allocation
page read and write
23CCA361000
trusted library allocation
page read and write
23CCBC88000
trusted library allocation
page read and write
23CC9B76000
trusted library allocation
page read and write
23CBFD49000
heap
page read and write
23CC60E2000
trusted library allocation
page read and write
23CBFDA3000
heap
page read and write
23CD14B9000
trusted library allocation
page read and write
23CCBCEE000
trusted library allocation
page read and write
23CCAEA6000
trusted library allocation
page read and write
23CCA4E9000
trusted library allocation
page read and write
23CD148D000
trusted library allocation
page read and write
23CCACBD000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD9B000
heap
page read and write
23CBFD9A000
heap
page read and write
23CCA9D8000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CC4EF6000
trusted library allocation
page read and write
23CC9BB9000
trusted library allocation
page read and write
23CC6D70000
trusted library allocation
page read and write
23CCB98C000
trusted library allocation
page read and write
23CCAF98000
trusted library allocation
page read and write
23CCB6F9000
trusted library allocation
page read and write
23CD52E3000
trusted library allocation
page read and write
23CC9B62000
trusted library allocation
page read and write
23CD16EA000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CD3356000
heap
page read and write
23CBFDBD000
heap
page read and write
23CD50AE000
trusted library allocation
page read and write
23CCAF75000
trusted library allocation
page read and write
23CD1235000
trusted library allocation
page read and write
23CD1231000
trusted library allocation
page read and write
280DE7B6000
trusted library allocation
page read and write
23CCBC6A000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CC9EB9000
trusted library allocation
page read and write
2436AD7F000
heap
page read and write
23CC9D18000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CBFD96000
heap
page read and write
2436AE3B000
heap
page read and write
23CBFD94000
heap
page read and write
23CD112A000
trusted library allocation
page read and write
23CC9154000
trusted library allocation
page read and write
23CCACBB000
trusted library allocation
page read and write
23CD4EE1000
trusted library allocation
page read and write
23CD15AF000
trusted library allocation
page read and write
23CD34E5000
trusted library allocation
page read and write
23CCA5A8000
trusted library allocation
page read and write
23CC9EB9000
trusted library allocation
page read and write
23CD4CA9000
trusted library allocation
page read and write
18843BA0000
heap
page read and write
23CD14CC000
trusted library allocation
page read and write
23CCAE86000
trusted library allocation
page read and write
22B0DF0D000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
2436AE77000
heap
page read and write
2F02DFF000
stack
page read and write
23CD4E2A000
trusted library allocation
page read and write
23CC9038000
trusted library allocation
page read and write
23CD2D34000
trusted library allocation
page read and write
23CCC8AA000
trusted library allocation
page read and write
1C64B800000
trusted library allocation
page read and write
23CCA3F0000
trusted library allocation
page read and write
23CCB5B0000
trusted library allocation
page read and write
23CCA8B0000
trusted library allocation
page read and write
23CC9C30000
trusted library allocation
page read and write
23CC84F6000
trusted library allocation
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD93000
heap
page read and write
23CBFDA4000
heap
page read and write
23CC918B000
trusted library allocation
page read and write
23CC9B62000
trusted library allocation
page read and write
280DE480000
heap
page read and write
23CCBCE6000
trusted library allocation
page read and write
23CD15D3000
trusted library allocation
page read and write
23CD0E9A000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC9DCE000
trusted library allocation
page read and write
23CCB9D0000
trusted library allocation
page read and write
2436ADE8000
heap
page read and write
23CC90CB000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC84A8000
trusted library allocation
page read and write
5A3CFFE000
unkown
page readonly
23CBFD56000
heap
page read and write
A5D3A3E000
unkown
page readonly
22B0DF5D000
trusted library allocation
page read and write
23CD0CD5000
trusted library allocation
page read and write
23CCB6F9000
trusted library allocation
page read and write
23CCB955000
trusted library allocation
page read and write
23CCB6D5000
trusted library allocation
page read and write
23CCAEB6000
trusted library allocation
page read and write
23CD12D7000
trusted library allocation
page read and write
23CC9907000
trusted library allocation
page read and write
23CC8BC1000
heap
page read and write
23CCAB2C000
trusted library allocation
page read and write
23CC9E52000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CCA735000
trusted library allocation
page read and write
23CCBC5B000
trusted library allocation
page read and write
23CCACB4000
trusted library allocation
page read and write
23CBFDA2000
heap
page read and write
23CC9CAE000
trusted library allocation
page read and write
23CCA6CF000
trusted library allocation
page read and write
23CCA4F7000
trusted library allocation
page read and write
23CCAB24000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CBFD93000
heap
page read and write
23CD5255000
trusted library allocation
page read and write
23CCBCD1000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CD49FE000
trusted library allocation
page read and write
23CD3428000
heap
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CC9197000
trusted library allocation
page read and write
23CCC814000
trusted library allocation
page read and write
23CC9D23000
trusted library allocation
page read and write
23CCA9D8000
trusted library allocation
page read and write
280DE724000
trusted library allocation
page read and write
23CD4F93000
trusted library allocation
page read and write
23CCAF86000
trusted library allocation
page read and write
23CCA896000
trusted library allocation
page read and write
23CC5EAB000
trusted library allocation
page read and write
23CC9B76000
trusted library allocation
page read and write
23CCB6A5000
trusted library allocation
page read and write
23CC91BF000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CD15E2000
trusted library allocation
page read and write
23CD16EA000
trusted library allocation
page read and write
23CC9AEC000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
22B0DBD0000
unclassified section
page read and write
23CCA57C000
trusted library allocation
page read and write
23CC8582000
trusted library allocation
page read and write
22B0DFB7000
trusted library allocation
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CC8576000
trusted library allocation
page read and write
18D3000
heap
page read and write
23CD5041000
trusted library allocation
page read and write
280DE70C000
trusted library allocation
page read and write
23CC47B3000
trusted library allocation
page read and write
23CCB96C000
trusted library allocation
page read and write
23CC994A000
trusted library allocation
page read and write
23CD0DD7000
trusted library allocation
page read and write
23CC9ECF000
trusted library allocation
page read and write
2436A1C7000
trusted library allocation
page read and write
23CCACBE000
trusted library allocation
page read and write
23CCB9FA000
trusted library allocation
page read and write
23CC91AA000
trusted library allocation
page read and write
260D5231000
trusted library allocation
page execute read
23CCB3A6000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CCAB9F000
trusted library allocation
page read and write
23CC6077000
trusted library allocation
page read and write
23CD33B8000
heap
page read and write
23CBFD49000
heap
page read and write
23CCBC74000
trusted library allocation
page read and write
23CD52D3000
trusted library allocation
page read and write
23CC9B70000
trusted library allocation
page read and write
23CCA4E8000
trusted library allocation
page read and write
23CCA8D2000
trusted library allocation
page read and write
23CCA485000
trusted library allocation
page read and write
23CC8BB2000
heap
page read and write
23CCA4E4000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CCB7C1000
trusted library allocation
page read and write
23CCA4EE000
trusted library allocation
page read and write
23CCAEA0000
trusted library allocation
page read and write
23CBFD3E000
heap
page read and write
22B0DF47000
trusted library allocation
page read and write
23CD1476000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CBFDC2000
heap
page read and write
23CC9B2E000
trusted library allocation
page read and write
23CCA6D2000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CCA34A000
trusted library allocation
page read and write
23CC8E69000
trusted library allocation
page read and write
23CCA3CF000
trusted library allocation
page read and write
260D52E1000
trusted library allocation
page execute read
23CD2700000
trusted library allocation
page read and write
23CC609B000
trusted library allocation
page read and write
280DE7DB000
trusted library allocation
page read and write
23CD11EE000
trusted library allocation
page read and write
280DE490000
unclassified section
page read and write
23CD4C0E000
trusted library allocation
page read and write
23CD49F3000
trusted library allocation
page read and write
23CC8F7F000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
23CCA5DE000
trusted library allocation
page read and write
23CC84F8000
trusted library allocation
page read and write
23CC91B6000
trusted library allocation
page read and write
23CCBCEC000
trusted library allocation
page read and write
23CCBCA1000
trusted library allocation
page read and write
23CCBCB8000
trusted library allocation
page read and write
23CC6064000
trusted library allocation
page read and write
23CC9C67000
trusted library allocation
page read and write
2436AC00000
trusted library allocation
page read and write
23CCA9DB000
trusted library allocation
page read and write
23CCAF63000
trusted library allocation
page read and write
23CC6D4A000
trusted library allocation
page read and write
23CCA6C6000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CD145C000
trusted library allocation
page read and write
23CCA856000
trusted library allocation
page read and write
23CC96E7000
trusted library allocation
page read and write
23CCA8FE000
trusted library allocation
page read and write
2436AE77000
heap
page read and write
23CCAF72000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
280DE492000
unclassified section
page read and write
2436ADE1000
heap
page read and write
23CBFD54000
heap
page read and write
23CBFD9B000
heap
page read and write
23CCAF8E000
trusted library allocation
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CD105E000
trusted library allocation
page read and write
23CCA79B000
trusted library allocation
page read and write
23CD4EC4000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCAE7A000
trusted library allocation
page read and write
23CD14FD000
trusted library allocation
page read and write
23CC9B24000
trusted library allocation
page read and write
23CCA753000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD500C000
trusted library allocation
page read and write
23CCA72E000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
23CCA611000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CD492A000
trusted library allocation
page read and write
23CC622B000
trusted library allocation
page read and write
23CC60A7000
trusted library allocation
page read and write
23CC953D000
trusted library allocation
page read and write
23CBFDAD000
heap
page read and write
23CC60F1000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
23CD13B6000
trusted library allocation
page read and write
23CCBCAD000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
18DB000
heap
page read and write
23CC918A000
trusted library allocation
page read and write
23CC9086000
trusted library allocation
page read and write
23CC9EC9000
trusted library allocation
page read and write
23CCA9DB000
trusted library allocation
page read and write
18DF000
heap
page read and write
23CD4CA1000
trusted library allocation
page read and write
23CC9BAB000
trusted library allocation
page read and write
23CCA8B0000
trusted library allocation
page read and write
23CD52CD000
trusted library allocation
page read and write
23CCBC75000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CC918A000
trusted library allocation
page read and write
23CD1297000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CD4EDF000
trusted library allocation
page read and write
23CC8F7B000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
22B0DFE7000
trusted library allocation
page read and write
A5D17DE000
stack
page read and write
23CCACA1000
trusted library allocation
page read and write
23CC6DD7000
trusted library allocation
page read and write
23CD143C000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CBFDBD000
heap
page read and write
23CD10AB000
trusted library allocation
page read and write
23CC9AF9000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD0C9A000
trusted library allocation
page read and write
23CC9AFD000
trusted library allocation
page read and write
23CD11DF000
trusted library allocation
page read and write
23CCB583000
trusted library allocation
page read and write
23CC60BE000
trusted library allocation
page read and write
23CCA613000
trusted library allocation
page read and write
A5D31FE000
stack
page read and write
18843A93000
heap
page read and write
23CD3548000
trusted library allocation
page read and write
18F4000
heap
page read and write
23CCA8BE000
trusted library allocation
page read and write
23CCBCB0000
trusted library allocation
page read and write
23CCA9DE000
trusted library allocation
page read and write
22B0D980000
unclassified section
page readonly
23CC9C22000
trusted library allocation
page read and write
23CCC897000
trusted library allocation
page read and write
23CD0D04000
trusted library allocation
page read and write
23CD0C9A000
trusted library allocation
page read and write
23CCA5BB000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
22B0DF83000
trusted library allocation
page read and write
23CBFDBC000
heap
page read and write
23CCAF6D000
trusted library allocation
page read and write
23CCA956000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD5240000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
23CCC6AE000
trusted library allocation
page read and write
23CC9541000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
23CCA89C000
trusted library allocation
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCACF7000
trusted library allocation
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CCA30B000
trusted library allocation
page read and write
23CCBC86000
trusted library allocation
page read and write
23CD1395000
trusted library allocation
page read and write
23CC9B6E000
trusted library allocation
page read and write
A5D4A3E000
unkown
page readonly
23CD338B000
heap
page read and write
23CBFDAE000
heap
page read and write
23CBFD72000
heap
page read and write
23CC60CD000
trusted library allocation
page read and write
23CD0C8F000
trusted library allocation
page read and write
22B0DC60000
heap
page read and write
23CCCAF1000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CD4380000
trusted library allocation
page read and write
5A39D1B000
stack
page read and write
23CC9A13000
trusted library allocation
page read and write
23CCBCA9000
trusted library allocation
page read and write
23CCC63B000
trusted library allocation
page read and write
23CCAF6D000
trusted library allocation
page read and write
23CC9198000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CBFD9A000
heap
page read and write
23CD13EE000
trusted library allocation
page read and write
23CCAB8B000
trusted library allocation
page read and write
23CC6D65000
trusted library allocation
page read and write
23CCA494000
trusted library allocation
page read and write
23CCA564000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CCA5C3000
trusted library allocation
page read and write
23CD3404000
heap
page read and write
23CCB744000
trusted library allocation
page read and write
2436AD69000
heap
page read and write
23CC6DB5000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CBFDB6000
heap
page read and write
23CBFDB6000
heap
page read and write
23CCD257000
trusted library allocation
page read and write
23CCB944000
trusted library allocation
page read and write
23CCACAA000
trusted library allocation
page read and write
23CD49AB000
trusted library allocation
page read and write
23CD4E8D000
trusted library allocation
page read and write
2436A186000
trusted library allocation
page read and write
280DE49F000
unclassified section
page read and write
23CC9E52000
trusted library allocation
page read and write
2436A1EE000
trusted library allocation
page read and write
23CBFDA2000
heap
page read and write
23CCC8DE000
trusted library allocation
page read and write
23CD146A000
trusted library allocation
page read and write
23CCD22E000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CBFDA0000
heap
page read and write
23CD147B000
trusted library allocation
page read and write
23CCA640000
trusted library allocation
page read and write
23CCA57E000
trusted library allocation
page read and write
18E6000
heap
page read and write
23CD0DD7000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CC91B0000
trusted library allocation
page read and write
23CCA58A000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CD0CE9000
trusted library allocation
page read and write
23CC4EE2000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCA5E2000
trusted library allocation
page read and write
23CCADC5000
trusted library allocation
page read and write
23CD52D9000
trusted library allocation
page read and write
23CD333F000
heap
page read and write
23CC9AE6000
trusted library allocation
page read and write
23CC9B8D000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
17F4000
heap
page read and write
280DE3E0000
heap
page read and write
23CCBCAC000
trusted library allocation
page read and write
23CC9B60000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CC95C4000
trusted library allocation
page read and write
18C9000
heap
page read and write
23CCA87A000
trusted library allocation
page read and write
23CD12F0000
trusted library allocation
page read and write
23CCA50A000
trusted library allocation
page read and write
23CCA728000
trusted library allocation
page read and write
23CC9E5A000
trusted library allocation
page read and write
23CC9424000
trusted library allocation
page read and write
23CCBCAC000
trusted library allocation
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CD4E20000
trusted library allocation
page read and write
23CC99CE000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD4E5A000
trusted library allocation
page read and write
23CCAEDE000
trusted library allocation
page read and write
23CCBC88000
trusted library allocation
page read and write
23CD4EE1000
trusted library allocation
page read and write
23CCA6FD000
trusted library allocation
page read and write
23CD149E000
trusted library allocation
page read and write
23CD14F6000
trusted library allocation
page read and write
2436ADAA000
heap
page read and write
23CC60B8000
trusted library allocation
page read and write
23CD3355000
heap
page read and write
23CBFD93000
heap
page read and write
2436AD5F000
heap
page read and write
23CD1486000
trusted library allocation
page read and write
23CC61D6000
trusted library allocation
page read and write
23CD35C5000
trusted library allocation
page read and write
23CCA6BD000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CBFD98000
heap
page read and write
23CCAFA6000
trusted library allocation
page read and write
23CBFD5A000
heap
page read and write
23CCA5F4000
trusted library allocation
page read and write
24369F84000
heap
page read and write
23CD1340000
trusted library allocation
page read and write
23CD14F5000
trusted library allocation
page read and write
23CD330F000
heap
page read and write
23CCAEC8000
trusted library allocation
page read and write
23CCA9DE000
trusted library allocation
page read and write
280DE7C4000
trusted library allocation
page read and write
23CC9B62000
trusted library allocation
page read and write
23CC4E75000
trusted library allocation
page read and write
23CD10BC000
trusted library allocation
page read and write
23CCD1A3000
trusted library allocation
page read and write
23CD362C000
trusted library allocation
page read and write
23CC90CB000
trusted library allocation
page read and write
1C64B480000
heap
page read and write
280DE330000
unclassified section
page readonly
280DE3A0000
remote allocation
page read and write
23CD15A7000
trusted library allocation
page read and write
18F4000
heap
page read and write
23CD11BF000
trusted library allocation
page read and write
23CCA4C0000
trusted library allocation
page read and write
23CD4E5A000
trusted library allocation
page read and write
23CCAEBE000
trusted library allocation
page read and write
23CC9B83000
trusted library allocation
page read and write
23CC9CDD000
trusted library allocation
page read and write
22B0DF03000
trusted library allocation
page read and write
23CCAF5A000
trusted library allocation
page read and write
23CCB681000
trusted library allocation
page read and write
23CCA786000
trusted library allocation
page read and write
23CCACA7000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCBC82000
trusted library allocation
page read and write
1EDBB141E000
trusted library allocation
page read and write
23CCAEF0000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CBFD51000
heap
page read and write
23CCA43C000
trusted library allocation
page read and write
23CCAEFB000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD59000
heap
page read and write
23CBFDA1000
heap
page read and write
23CCAC8B000
trusted library allocation
page read and write
23CCA494000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CCB6CD000
trusted library allocation
page read and write
23CCAB96000
trusted library allocation
page read and write
23CC8E59000
trusted library allocation
page read and write
23CC60AE000
trusted library allocation
page read and write
23CCC8D8000
trusted library allocation
page read and write
18843A60000
heap
page read and write
2436A6E0000
heap
page read and write
280DEA00000
trusted library allocation
page read and write
23CC4E17000
trusted library allocation
page read and write
2436AD69000
heap
page read and write
23CCAA39000
trusted library allocation
page read and write
23CCA5A2000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CCAF43000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CCB8FA000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCB8DA000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCA9DE000
trusted library allocation
page read and write
23CBFD45000
heap
page read and write
23CBFD56000
heap
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CC619E000
trusted library allocation
page read and write
23CC9C7D000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CCAC8A000
trusted library allocation
page read and write
23CCB928000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
F82000
unkown
page readonly
23CC986F000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CC90CB000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CBFD96000
heap
page read and write
23CBFDA5000
heap
page read and write
23CCBCCB000
trusted library allocation
page read and write
23CC9EF8000
trusted library allocation
page read and write
23CBFD7C000
heap
page read and write
23CC6196000
trusted library allocation
page read and write
23CC5EB2000
trusted library allocation
page read and write
23CD49FE000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CCA45F000
trusted library allocation
page read and write
23CBFDBC000
heap
page read and write
2436ADEF000
heap
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CCBC70000
trusted library allocation
page read and write
23CCB9A1000
trusted library allocation
page read and write
23CC9EE2000
trusted library allocation
page read and write
23CBFDA1000
heap
page read and write
23CBFDBF000
heap
page read and write
23CD13B4000
trusted library allocation
page read and write
23CC9B67000
trusted library allocation
page read and write
23CCA448000
trusted library allocation
page read and write
23CC60E6000
trusted library allocation
page read and write
23CCA8C4000
trusted library allocation
page read and write
23CCC62E000
trusted library allocation
page read and write
23CCA8E5000
trusted library allocation
page read and write
23CC4DFB000
trusted library allocation
page read and write
2436A148000
trusted library allocation
page read and write
23CC6DE5000
trusted library allocation
page read and write
23CCAB2C000
trusted library allocation
page read and write
23CD15D7000
trusted library allocation
page read and write
23CC47DF000
trusted library allocation
page read and write
23CD2D1B000
trusted library allocation
page read and write
23CD14F8000
trusted library allocation
page read and write
23CD2DFD000
trusted library allocation
page read and write
23CD148D000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CCAC9E000
trusted library allocation
page read and write
23CCBC8E000
trusted library allocation
page read and write
23CD5014000
trusted library allocation
page read and write
23CD4CC1000
trusted library allocation
page read and write
23CC608B000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CD148B000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
18D3000
heap
page read and write
23CBFDA3000
heap
page read and write
23CCA3A5000
trusted library allocation
page read and write
23CCB8C6000
trusted library allocation
page read and write
23CCA3AB000
trusted library allocation
page read and write
23CD14B9000
trusted library allocation
page read and write
23CD142B000
trusted library allocation
page read and write
280DE749000
trusted library allocation
page read and write
23CCBCB0000
trusted library allocation
page read and write
23CCAEF0000
trusted library allocation
page read and write
23CC9185000
trusted library allocation
page read and write
23CC9E05000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CD0DC6000
trusted library allocation
page read and write
23CC95D7000
trusted library allocation
page read and write
23CCA8E5000
trusted library allocation
page read and write
2436A19F000
trusted library allocation
page read and write
23CCAEA6000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
24369EC0000
heap
page read and write
23CCA4F1000
trusted library allocation
page read and write
23CD10AF000
trusted library allocation
page read and write
2436AE77000
heap
page read and write
23CCC8C5000
trusted library allocation
page read and write
23CC61DA000
trusted library allocation
page read and write
2436AD5C000
heap
page read and write
23CC9C81000
trusted library allocation
page read and write
23CCB96C000
trusted library allocation
page read and write
23CBFDB2000
heap
page read and write
24369EA0000
heap
page read and write
23CBFD9A000
heap
page read and write
23CCB960000
trusted library allocation
page read and write
23CBFDAC000
heap
page read and write
23CBFD6B000
heap
page read and write
23CD14C3000
trusted library allocation
page read and write
23CD3F02000
trusted library allocation
page read and write
23CCB5DA000
trusted library allocation
page read and write
23CD509D000
trusted library allocation
page read and write
23CCA9A0000
trusted library allocation
page read and write
23CCB9F4000
trusted library allocation
page read and write
23CD0CCF000
trusted library allocation
page read and write
23CD10DD000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
23CD10A8000
trusted library allocation
page read and write
23CCD07F000
trusted library allocation
page read and write
23CCC8D8000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
23CCA9E4000
trusted library allocation
page read and write
23CCAB29000
trusted library allocation
page read and write
23CCBCCC000
trusted library allocation
page read and write
23CCB747000
trusted library allocation
page read and write
23CC9B83000
trusted library allocation
page read and write
23CCA69E000
trusted library allocation
page read and write
23CCBC97000
trusted library allocation
page read and write
18E6000
heap
page read and write
23CCBCE0000
trusted library allocation
page read and write
2436ADE6000
heap
page read and write
23CD10DD000
trusted library allocation
page read and write
5A3D8BE000
stack
page read and write
280DE600000
trusted library allocation
page read and write
22B0DBDF000
unclassified section
page read and write
23CCA856000
trusted library allocation
page read and write
23CC9185000
trusted library allocation
page read and write
23CCAEB6000
trusted library allocation
page read and write
23CCB979000
trusted library allocation
page read and write
23CD5097000
trusted library allocation
page read and write
23CD10FC000
trusted library allocation
page read and write
23CCACBB000
trusted library allocation
page read and write
F5C000
unkown
page readonly
23CC90CB000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CBFD59000
heap
page read and write
18E6000
heap
page read and write
23CD3356000
heap
page read and write
2436ADA8000
heap
page read and write
23CCB8C6000
trusted library allocation
page read and write
23CD0CE1000
trusted library allocation
page read and write
23CC918A000
trusted library allocation
page read and write
23CD4E9D000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CD14CC000
trusted library allocation
page read and write
23CD16FC000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CCAF5C000
trusted library allocation
page read and write
23CC9B62000
trusted library allocation
page read and write
23CCAAA5000
trusted library allocation
page read and write
23CBFD6A000
heap
page read and write
23CD10AB000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC9D0B000
trusted library allocation
page read and write
23CC9BE4000
trusted library allocation
page read and write
23CC85C2000
trusted library allocation
page read and write
23CC9DD4000
trusted library allocation
page read and write
23CBFD5E000
heap
page read and write
23CC4798000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
46417FE000
stack
page read and write
23CCBCD8000
trusted library allocation
page read and write
23CD336D000
heap
page read and write
23CBFDB3000
heap
page read and write
23CBFDBF000
heap
page read and write
23CD3356000
heap
page read and write
23CC99DB000
trusted library allocation
page read and write
23CC9B62000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CD14C6000
trusted library allocation
page read and write
23CC95C8000
trusted library allocation
page read and write
23CC908A000
trusted library allocation
page read and write
23CCADF2000
trusted library allocation
page read and write
23CC8F98000
trusted library allocation
page read and write
23CCA9D8000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CC4EBE000
trusted library allocation
page read and write
23CCC8D6000
trusted library allocation
page read and write
23CD1671000
trusted library allocation
page read and write
23CD1520000
trusted library allocation
page read and write
23CC6DDD000
trusted library allocation
page read and write
23CBFD4A000
heap
page read and write
23CBFD72000
heap
page read and write
23CCA89A000
trusted library allocation
page read and write
23CD0ED7000
trusted library allocation
page read and write
23CD11A7000
trusted library allocation
page read and write
22B0DF98000
trusted library allocation
page read and write
2FAE68203000
trusted library allocation
page read and write
23CC643D000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CD4E65000
trusted library allocation
page read and write
2436AD63000
heap
page read and write
23CCA55C000
trusted library allocation
page read and write
24369D90000
unclassified section
page readonly
23CC9B67000
trusted library allocation
page read and write
23CBFD76000
heap
page read and write
23CCBCB4000
trusted library allocation
page read and write
23CC907E000
trusted library allocation
page read and write
23CC6DC3000
trusted library allocation
page read and write
23CC9DF3000
trusted library allocation
page read and write
23CD5249000
trusted library allocation
page read and write
23CC60AE000
trusted library allocation
page read and write
23CC60B8000
trusted library allocation
page read and write
23CC60CD000
trusted library allocation
page read and write
23CCACBD000
trusted library allocation
page read and write
23CD15E0000
trusted library allocation
page read and write
23CCA378000
trusted library allocation
page read and write
23CC6DA7000
trusted library allocation
page read and write
23CC6463000
trusted library allocation
page read and write
23CBFD70000
heap
page read and write
23CD4C48000
trusted library allocation
page read and write
23CCBCF3000
trusted library allocation
page read and write
23CD4F86000
trusted library allocation
page read and write
23CCA546000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CBFDB6000
heap
page read and write
2F02DFB000
stack
page read and write
23CCBCB8000
trusted library allocation
page read and write
22B0E440000
heap
page read and write
23CBFDA8000
heap
page read and write
23CBFD51000
heap
page read and write
23CD13B4000
trusted library allocation
page read and write
23CD149E000
trusted library allocation
page read and write
23CCAB2C000
trusted library allocation
page read and write
23CC9B40000
trusted library allocation
page read and write
18843A30000
heap
page read and write
23CD49D1000
trusted library allocation
page read and write
23CCB696000
trusted library allocation
page read and write
23CC9B6E000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
2436ADEF000
heap
page read and write
23CCAF54000
trusted library allocation
page read and write
23CCB948000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
17F4000
heap
page read and write
23CBFD96000
heap
page read and write
23CCA4EC000
trusted library allocation
page read and write
23CD10AD000
trusted library allocation
page read and write
23CC91C7000
trusted library allocation
page read and write
23CCB997000
trusted library allocation
page read and write
23CC9BBB000
trusted library allocation
page read and write
23CD4CC9000
trusted library allocation
page read and write
F90000
unkown
page write copy
23CD0EA6000
trusted library allocation
page read and write
23CC95FB000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CC906E000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CC4EA9000
trusted library allocation
page read and write
23CCA466000
trusted library allocation
page read and write
23CC4E66000
trusted library allocation
page read and write
23CC9169000
trusted library allocation
page read and write
23CCC635000
trusted library allocation
page read and write
23CCC7CE000
trusted library allocation
page read and write
23CC8F6A000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD0E9A000
trusted library allocation
page read and write
23CCA779000
trusted library allocation
page read and write
2436ADEF000
heap
page read and write
23CCA79B000
trusted library allocation
page read and write
23CC9CB3000
trusted library allocation
page read and write
23CCA564000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CCAEFB000
trusted library allocation
page read and write
23CCC8E3000
trusted library allocation
page read and write
23CD0ED0000
trusted library allocation
page read and write
EC1000
unkown
page execute read
23CD4E2A000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CCACD3000
trusted library allocation
page read and write
23CC9594000
trusted library allocation
page read and write
23CCBCD1000
trusted library allocation
page read and write
23CCAE85000
trusted library allocation
page read and write
23CCD10C000
trusted library allocation
page read and write
23CD4E55000
trusted library allocation
page read and write
23CD10F9000
trusted library allocation
page read and write
22B0DAEC000
heap
page read and write
22B0DA60000
heap
page read and write
2436ADF2000
heap
page read and write
23CD15EB000
trusted library allocation
page read and write
23CCBCEE000
trusted library allocation
page read and write
23CCA313000
trusted library allocation
page read and write
23CD4936000
trusted library allocation
page read and write
23CCA75E000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CC98F9000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CD1412000
trusted library allocation
page read and write
23CCAF8E000
trusted library allocation
page read and write
23CCBCD1000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
22B0DF6E000
trusted library allocation
page read and write
23CC60B8000
trusted library allocation
page read and write
23CD4CD5000
trusted library allocation
page read and write
23CCBCE6000
trusted library allocation
page read and write
23CCCE49000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CBFDAC000
heap
page read and write
23CBFD6C000
heap
page read and write
23CBFD96000
heap
page read and write
23CBFDC2000
heap
page read and write
23CC91FC000
trusted library allocation
page read and write
23CD49F3000
trusted library allocation
page read and write
23CBFDA3000
heap
page read and write
23CC91B4000
trusted library allocation
page read and write
23CCC8B6000
trusted library allocation
page read and write
23CC61B3000
trusted library allocation
page read and write
23CD13B6000
trusted library allocation
page read and write
23CD5252000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFDA9000
heap
page read and write
23CD35A7000
trusted library allocation
page read and write
23CD148B000
trusted library allocation
page read and write
23CCBC6D000
trusted library allocation
page read and write
23CCBCB8000
trusted library allocation
page read and write
280DE782000
trusted library allocation
page read and write
23CC8D23000
trusted library allocation
page read and write
23CD49F2000
trusted library allocation
page read and write
23CD0CE5000
trusted library allocation
page read and write
2436AE2A000
heap
page read and write
23CC60E6000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
18843D0A000
trusted library allocation
page read and write
23CD15D9000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFDB1000
heap
page read and write
23CCABA5000
trusted library allocation
page read and write
23CD148B000
trusted library allocation
page read and write
23CD362E000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CD4947000
trusted library allocation
page read and write
23CC5E80000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CC9197000
trusted library allocation
page read and write
23CD4947000
trusted library allocation
page read and write
23CBFD61000
heap
page read and write
23CC91B6000
trusted library allocation
page read and write
23CBFDC5000
heap
page read and write
23CCBCE9000
trusted library allocation
page read and write
2436ADFD000
heap
page read and write
23CCACA3000
trusted library allocation
page read and write
23CD13B8000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CD10A8000
trusted library allocation
page read and write
23CCA5B3000
trusted library allocation
page read and write
23CBFDC5000
heap
page read and write
23CCA470000
trusted library allocation
page read and write
23CC64C6000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
2436ADE0000
heap
page read and write
23CBFD52000
heap
page read and write
23CCA9A0000
trusted library allocation
page read and write
23CC916E000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFD9A000
heap
page read and write
23CC9166000
trusted library allocation
page read and write
17F4000
heap
page read and write
18F4000
heap
page read and write
23CD1431000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD97000
heap
page read and write
23CD1551000
trusted library allocation
page read and write
23CD4C8B000
trusted library allocation
page read and write
23CC95FB000
trusted library allocation
page read and write
23CCBC80000
trusted library allocation
page read and write
23CD4EDF000
trusted library allocation
page read and write
23CCBC88000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
23CD1045000
trusted library allocation
page read and write
23CCA861000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CD1045000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CCAEAE000
trusted library allocation
page read and write
23CCAF4E000
trusted library allocation
page read and write
23CC95DF000
trusted library allocation
page read and write
23CCA856000
trusted library allocation
page read and write
23CBFDA4000
heap
page read and write
2436AE3B000
heap
page read and write
23CBFDA8000
heap
page read and write
23CD5114000
trusted library allocation
page read and write
23CD16E4000
trusted library allocation
page read and write
23CCADB7000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CBFDA0000
heap
page read and write
23CC8BFD000
heap
page read and write
23CC9053000
trusted library allocation
page read and write
23CC9AD7000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CC6DD0000
trusted library allocation
page read and write
23CCA56D000
trusted library allocation
page read and write
23CCB8DA000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CD4EDF000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CC9E93000
trusted library allocation
page read and write
23CD15D3000
trusted library allocation
page read and write
23CCA59D000
trusted library allocation
page read and write
23CD5051000
trusted library allocation
page read and write
23CCBCD8000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CC9A1A000
trusted library allocation
page read and write
23CD13DC000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CC8F7B000
trusted library allocation
page read and write
23CC9C30000
trusted library allocation
page read and write
23CD4EDB000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CD4F52000
trusted library allocation
page read and write
18A0000
heap
page read and write
23CD49F3000
trusted library allocation
page read and write
23CD1043000
trusted library allocation
page read and write
23CD1332000
trusted library allocation
page read and write
23CC99D7000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CBFD9F000
heap
page read and write
23CD4C15000
trusted library allocation
page read and write
2436AE22000
heap
page read and write
18E6000
heap
page read and write
23CBFD7B000
heap
page read and write
23CCA4BB000
trusted library allocation
page read and write
23CCB7D7000
trusted library allocation
page read and write
23CD0E96000
trusted library allocation
page read and write
23CD4EDD000
trusted library allocation
page read and write
23CD4CA9000
trusted library allocation
page read and write
23CCCEA1000
trusted library allocation
page read and write
23CCACCD000
trusted library allocation
page read and write
23CD3FA8000
trusted library allocation
page read and write
23CCAF9E000
trusted library allocation
page read and write
23CC91CD000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CC9E87000
trusted library allocation
page read and write
23CD4E6A000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CC9D6C000
trusted library allocation
page read and write
23CD4E72000
trusted library allocation
page read and write
23CCA7B6000
trusted library allocation
page read and write
23CCA5A6000
trusted library allocation
page read and write
18F7000
heap
page read and write
23CD15D3000
trusted library allocation
page read and write
23CD2D25000
trusted library allocation
page read and write
23CD1437000
trusted library allocation
page read and write
23CD4E6C000
trusted library allocation
page read and write
23CC9CD3000
trusted library allocation
page read and write
23CC9086000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CD4F9B000
trusted library allocation
page read and write
23CCA75E000
trusted library allocation
page read and write
23CCA54B000
trusted library allocation
page read and write
23CD12E2000
trusted library allocation
page read and write
23CC9B55000
trusted library allocation
page read and write
464407E000
unkown
page readonly
23CC646A000
trusted library allocation
page read and write
23CCD6AC000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CCB997000
trusted library allocation
page read and write
22B0DBE0000
heap
page read and write
23CCC849000
trusted library allocation
page read and write
23CCD637000
trusted library allocation
page read and write
23CD1286000
trusted library allocation
page read and write
23CD52B0000
trusted library allocation
page read and write
23CBFD9A000
heap
page read and write
23CC9AD0000
trusted library allocation
page read and write
23CC60A5000
trusted library allocation
page read and write
23CC8E57000
trusted library allocation
page read and write
23CBFD5E000
heap
page read and write
23CBFDA3000
heap
page read and write
23CD4ECC000
trusted library allocation
page read and write
23CBFDA0000
heap
page read and write
23CBFD72000
heap
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CBFD41000
heap
page read and write
23CC9DCE000
trusted library allocation
page read and write
160F000
stack
page read and write
23CBFDA9000
heap
page read and write
23CC5ECC000
trusted library allocation
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CBFD98000
heap
page read and write
23CCD206000
trusted library allocation
page read and write
23CD492A000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
18DF000
heap
page read and write
23CD14F5000
trusted library allocation
page read and write
23CC9AE1000
trusted library allocation
page read and write
23CD104C000
trusted library allocation
page read and write
23CCAF71000
trusted library allocation
page read and write
23CC4E93000
trusted library allocation
page read and write
188455B8000
heap
page read and write
23CBFDD3000
heap
page read and write
23CD4F90000
trusted library allocation
page read and write
23CC84FA000
trusted library allocation
page read and write
2436AE59000
heap
page read and write
23CCA69E000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD1482000
trusted library allocation
page read and write
23CD33DC000
heap
page read and write
23CCBCD6000
trusted library allocation
page read and write
23CC91B0000
trusted library allocation
page read and write
23CC9B55000
trusted library allocation
page read and write
23CCB9F4000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CBFDA6000
heap
page read and write
23CCAF95000
trusted library allocation
page read and write
23CC60E6000
trusted library allocation
page read and write
23CCB8E6000
trusted library allocation
page read and write
23CC8ED1000
trusted library allocation
page read and write
23CD4C71000
trusted library allocation
page read and write
23CD13B8000
trusted library allocation
page read and write
23CC9563000
trusted library allocation
page read and write
23CC5E86000
trusted library allocation
page read and write
23CBFDAE000
heap
page read and write
23CBFD72000
heap
page read and write
23CBFDF1000
heap
page read and write
23CC9C46000
trusted library allocation
page read and write
23CCB96C000
trusted library allocation
page read and write
23CD0ED0000
trusted library allocation
page read and write
23CC6DC5000
trusted library allocation
page read and write
23CCCA6D000
trusted library allocation
page read and write
23CCA7C4000
trusted library allocation
page read and write
23CD14E9000
trusted library allocation
page read and write
23CBFDA8000
heap
page read and write
23CCAAEA000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CD35E4000
trusted library allocation
page read and write
23CCA3F5000
trusted library allocation
page read and write
23CBFDA6000
heap
page read and write
23CBFDBA000
heap
page read and write
23CCA4B1000
trusted library allocation
page read and write
23CBFD9F000
heap
page read and write
23CD12E0000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CD0D16000
trusted library allocation
page read and write
23CC8FAC000
trusted library allocation
page read and write
23CBFD61000
heap
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CBFD50000
heap
page read and write
23CC9154000
trusted library allocation
page read and write
22B0E003000
trusted library allocation
page read and write
23CD49DF000
trusted library allocation
page read and write
23CC9ADD000
trusted library allocation
page read and write
2436AE77000
heap
page read and write
23CC4E7D000
trusted library allocation
page read and write
23CCC84D000
trusted library allocation
page read and write
23CC6D87000
trusted library allocation
page read and write
23CCA8CF000
trusted library allocation
page read and write
23CCA9DE000
trusted library allocation
page read and write
23CD168D000
trusted library allocation
page read and write
23CD12A8000
trusted library allocation
page read and write
23CD4E41000
trusted library allocation
page read and write
23CC5EBC000
trusted library allocation
page read and write
23CD1576000
trusted library allocation
page read and write
23CD1133000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CCA5AD000
trusted library allocation
page read and write
23CD0E5D000
trusted library allocation
page read and write
23CCC8AD000
trusted library allocation
page read and write
23CC9594000
trusted library allocation
page read and write
23CD15AD000
trusted library allocation
page read and write
5A3D0BE000
unkown
page readonly
23CD1409000
trusted library allocation
page read and write
23CCBC7D000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CC4E26000
trusted library allocation
page read and write
23CC9992000
trusted library allocation
page read and write
23CD3301000
heap
page read and write
23CD1273000
trusted library allocation
page read and write
23CCB7C1000
trusted library allocation
page read and write
23CC60A5000
trusted library allocation
page read and write
23CCA6FB000
trusted library allocation
page read and write
23CC9B70000
trusted library allocation
page read and write
23CC8DAA000
trusted library allocation
page read and write
23CCBCE9000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
183D000
stack
page read and write
23CD4EE1000
trusted library allocation
page read and write
5A39C5D000
stack
page read and write
23CD1045000
trusted library allocation
page read and write
23CCAAF4000
trusted library allocation
page read and write
23CD11D6000
trusted library allocation
page read and write
23CC9B60000
trusted library allocation
page read and write
23CCA59D000
trusted library allocation
page read and write
23CD1363000
trusted library allocation
page read and write
23CD4E99000
trusted library allocation
page read and write
23CCC85B000
trusted library allocation
page read and write
23CD4E81000
trusted library allocation
page read and write
23CD4E81000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
23CD52C4000
trusted library allocation
page read and write
23CC9CA9000
trusted library allocation
page read and write
23CD0E56000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD14B7000
trusted library allocation
page read and write
23CC9DDA000
trusted library allocation
page read and write
23CD502F000
trusted library allocation
page read and write
23CC9952000
trusted library allocation
page read and write
23CC9B3A000
trusted library allocation
page read and write
23CCC7CA000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
188455B3000
heap
page read and write
23CCAF9D000
trusted library allocation
page read and write
23CC9B4B000
trusted library allocation
page read and write
23CCA5A7000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CCB9A1000
trusted library allocation
page read and write
23CD511F000
trusted library allocation
page read and write
23CD5252000
trusted library allocation
page read and write
23CCC8A8000
trusted library allocation
page read and write
23CC9A4C000
trusted library allocation
page read and write
23CC60CB000
trusted library allocation
page read and write
23CBFDB8000
heap
page read and write
280DE900000
unclassified section
page readonly
23CCC8CE000
trusted library allocation
page read and write
23CCA4E8000
trusted library allocation
page read and write
23CD0CC9000
trusted library allocation
page read and write
23CCA89F000
trusted library allocation
page read and write
23CCA895000
trusted library allocation
page read and write
23CC9A2A000
trusted library allocation
page read and write
23CCBCEC000
trusted library allocation
page read and write
23CBFDA3000
heap
page read and write
23CCA678000
trusted library allocation
page read and write
23CCA9FE000
trusted library allocation
page read and write
23CC9EBE000
trusted library allocation
page read and write
2436AE68000
heap
page read and write
24369F86000
heap
page read and write
23CCBCF6000
trusted library allocation
page read and write
23CC91D5000
trusted library allocation
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CC918B000
trusted library allocation
page read and write
23CC9552000
trusted library allocation
page read and write
23CCA5F4000
trusted library allocation
page read and write
23CC905F000
trusted library allocation
page read and write
23CC6392000
trusted library allocation
page read and write
2436A168000
trusted library allocation
page read and write
23CBFD70000
heap
page read and write
23CBFDA4000
heap
page read and write
23CCACFC000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
23CCA4E8000
trusted library allocation
page read and write
23CD49D1000
trusted library allocation
page read and write
23CC9936000
trusted library allocation
page read and write
22B0DF12000
trusted library allocation
page read and write
23CCBCB6000
trusted library allocation
page read and write
23CD0CED000
trusted library allocation
page read and write
23CD0D00000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD13B8000
trusted library allocation
page read and write
23CCA5C1000
trusted library allocation
page read and write
23CCA567000
trusted library allocation
page read and write
2436AE77000
heap
page read and write
23CC60B4000
trusted library allocation
page read and write
23CD49A3000
trusted library allocation
page read and write
23CCA8C6000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CBFD93000
heap
page read and write
23CCACBD000
trusted library allocation
page read and write
2436AE77000
heap
page read and write
23CBFD9A000
heap
page read and write
23CC61FD000
trusted library allocation
page read and write
23CD15E9000
trusted library allocation
page read and write
23CBFD6D000
heap
page read and write
23CD3355000
heap
page read and write
23CC9644000
trusted library allocation
page read and write
23CCA8C4000
trusted library allocation
page read and write
23CCA6BD000
trusted library allocation
page read and write
23CBFDAC000
heap
page read and write
23CD0EA2000
trusted library allocation
page read and write
23CC8E35000
trusted library allocation
page read and write
23CBFD5E000
heap
page read and write
23CD5259000
trusted library allocation
page read and write
23CD15A3000
trusted library allocation
page read and write
23CD0EAE000
trusted library allocation
page read and write
23CCA4FA000
trusted library allocation
page read and write
23CC8E75000
trusted library allocation
page read and write
188455BC000
heap
page read and write
2436A174000
trusted library allocation
page read and write
23CD0CD9000
trusted library allocation
page read and write
2436ADF1000
heap
page read and write
23CC9B80000
trusted library allocation
page read and write
23CC9897000
trusted library allocation
page read and write
23CD11E3000
trusted library allocation
page read and write
23CD509D000
trusted library allocation
page read and write
23CD33DC000
heap
page read and write
23CBFDBD000
heap
page read and write
23CC906F000
trusted library allocation
page read and write
2436A100000
trusted library allocation
page read and write
23CCBCE4000
trusted library allocation
page read and write
23CC8F7F000
trusted library allocation
page read and write
23CD11C0000
trusted library allocation
page read and write
23CC60CE000
trusted library allocation
page read and write
23CC9892000
trusted library allocation
page read and write
23CC60B8000
trusted library allocation
page read and write
463FCDE000
unkown
page readonly
23CBFD9A000
heap
page read and write
23CCA5C6000
trusted library allocation
page read and write
23CC60A0000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
463FD1C000
stack
page read and write
23CBFDBF000
heap
page read and write
23CC60C9000
trusted library allocation
page read and write
23CCBCD0000
trusted library allocation
page read and write
23CC9C48000
trusted library allocation
page read and write
23CD1427000
trusted library allocation
page read and write
23CC9DDA000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC479E000
trusted library allocation
page read and write
23CD10AB000
trusted library allocation
page read and write
23CCBCD9000
trusted library allocation
page read and write
23CCACBD000
trusted library allocation
page read and write
23CD0EC7000
trusted library allocation
page read and write
23CCC897000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CBFD9A000
heap
page read and write
23CD3348000
heap
page read and write
24369F50000
heap
page readonly
23CCA566000
trusted library allocation
page read and write
23CD0DA7000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CCC6CD000
trusted library allocation
page read and write
23CC63B4000
trusted library allocation
page read and write
23CD3350000
heap
page read and write
23CD5272000
trusted library allocation
page read and write
23CD2D8D000
trusted library allocation
page read and write
23CD143C000
trusted library allocation
page read and write
23CD4EC8000
trusted library allocation
page read and write
22B0DABA000
heap
page read and write
23CCB55D000
trusted library allocation
page read and write
23CD3633000
trusted library allocation
page read and write
23CCD1A7000
trusted library allocation
page read and write
23CCA7B8000
trusted library allocation
page read and write
2436A660000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD0DE1000
trusted library allocation
page read and write
23CBFDBF000
heap
page read and write
23CD1544000
trusted library allocation
page read and write
22B0DF2E000
trusted library allocation
page read and write
23CC91B6000
trusted library allocation
page read and write
23CC9B6E000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA30B000
trusted library allocation
page read and write
23CC9C25000
trusted library allocation
page read and write
23CD2D75000
trusted library allocation
page read and write
23CCADC0000
trusted library allocation
page read and write
23CCA5F4000
trusted library allocation
page read and write
23CD529E000
trusted library allocation
page read and write
23CBFDBC000
heap
page read and write
23CD0CE9000
trusted library allocation
page read and write
18D5000
heap
page read and write
23CD5215000
trusted library allocation
page read and write
23CCABE2000
trusted library allocation
page read and write
2436AD09000
heap
page read and write
23CD50FD000
trusted library allocation
page read and write
2436AD69000
heap
page read and write
23CCA56D000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CBFDB6000
heap
page read and write
23CBFD73000
heap
page read and write
23CD14F5000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
2436AE58000
heap
page read and write
23CC60DE000
trusted library allocation
page read and write
23CC95F1000
trusted library allocation
page read and write
23CD13DE000
trusted library allocation
page read and write
23CD15F0000
trusted library allocation
page read and write
5A39DDE000
stack
page read and write
23CD0CC6000
trusted library allocation
page read and write
23CCA9FE000
trusted library allocation
page read and write
23CD0D32000
trusted library allocation
page read and write
18CA000
heap
page read and write
23CD502F000
trusted library allocation
page read and write
23CD139C000
trusted library allocation
page read and write
23CBFD9B000
heap
page read and write
23CD1486000
trusted library allocation
page read and write
23CBFDBD000
heap
page read and write
23CCA5AA000
trusted library allocation
page read and write
23CC60C9000
trusted library allocation
page read and write
23CD4E72000
trusted library allocation
page read and write
23CD145C000
trusted library allocation
page read and write
23CCB69C000
trusted library allocation
page read and write
23CC47EF000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA595000
trusted library allocation
page read and write
23CCC820000
trusted library allocation
page read and write
A5D523E000
stack
page read and write
2F05DFF000
stack
page read and write
2436AE68000
heap
page read and write
23CCA7FD000
trusted library allocation
page read and write
23CC8F94000
trusted library allocation
page read and write
23CC8F98000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CD1421000
trusted library allocation
page read and write
23CC9E73000
trusted library allocation
page read and write
23CBFDB6000
heap
page read and write
23CD11FB000
trusted library allocation
page read and write
23CCA896000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCA9A5000
trusted library allocation
page read and write
23CD10FC000
trusted library allocation
page read and write
23CCAB8B000
trusted library allocation
page read and write
23CC9B55000
trusted library allocation
page read and write
18F2000
heap
page read and write
23CCB8CD000
trusted library allocation
page read and write
23CC91FC000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
23CC9EA0000
trusted library allocation
page read and write
23CBFD6B000
heap
page read and write
23CBFD4F000
heap
page read and write
23CCB9C8000
trusted library allocation
page read and write
23CD4EC8000
trusted library allocation
page read and write
23CC9DEA000
trusted library allocation
page read and write
17F0000
heap
page read and write
23CBFD56000
heap
page read and write
23CBFDAD000
heap
page read and write
23CCA5FC000
trusted library allocation
page read and write
23CD1063000
trusted library allocation
page read and write
23CC9ECA000
trusted library allocation
page read and write
23CBFD7B000
heap
page read and write
23CBFD72000
heap
page read and write
23CC91BF000
trusted library allocation
page read and write
23CCA6D2000
trusted library allocation
page read and write
23CD11E7000
trusted library allocation
page read and write
23CC9059000
trusted library allocation
page read and write
23CCC6C4000
trusted library allocation
page read and write
23CC4DFE000
trusted library allocation
page read and write
23CD494A000
trusted library allocation
page read and write
23CD148B000
trusted library allocation
page read and write
23CC9069000
trusted library allocation
page read and write
23CCA5CA000
trusted library allocation
page read and write
2436ADE9000
heap
page read and write
23CCAB65000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CD1235000
trusted library allocation
page read and write
23CC9165000
trusted library allocation
page read and write
23CD0CF1000
trusted library allocation
page read and write
23CD12CB000
trusted library allocation
page read and write
23CD336D000
heap
page read and write
2436A103000
trusted library allocation
page read and write
280DE3B3000
remote allocation
page execute read
23CCA69E000
trusted library allocation
page read and write
23CCAA43000
trusted library allocation
page read and write
23CCA8A9000
trusted library allocation
page read and write
23CC9AD0000
trusted library allocation
page read and write
23CC9166000
trusted library allocation
page read and write
23CCA852000
trusted library allocation
page read and write
23CC90A2000
trusted library allocation
page read and write
23CD333F000
heap
page read and write
23CC8DD1000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CCA75E000
trusted library allocation
page read and write
16A0000
heap
page read and write
23CC96F1000
trusted library allocation
page read and write
23CCA742000
trusted library allocation
page read and write
23CCA5EC000
trusted library allocation
page read and write
23CD3356000
heap
page read and write
23CC6D3B000
trusted library allocation
page read and write
23CC9D6C000
trusted library allocation
page read and write
23CC5EA8000
trusted library allocation
page read and write
23CC63FC000
trusted library allocation
page read and write
23CC84FC000
trusted library allocation
page read and write
2436AD60000
heap
page read and write
23CC85A0000
trusted library allocation
page read and write
23CD52D7000
trusted library allocation
page read and write
23CC64E3000
trusted library allocation
page read and write
23CC6830000
trusted library allocation
page read and write
23CD0DD9000
trusted library allocation
page read and write
A5D179E000
unkown
page readonly
23CC8FC4000
trusted library allocation
page read and write
23CD0EA4000
trusted library allocation
page read and write
23CD156B000
trusted library allocation
page read and write
1239000
stack
page read and write
23CCD1AC000
trusted library allocation
page read and write
23CD4C0E000
trusted library allocation
page read and write
18CC000
heap
page read and write
EC0000
unkown
page readonly
23CCA7D6000
trusted library allocation
page read and write
23CC9579000
trusted library allocation
page read and write
22B0DF72000
trusted library allocation
page read and write
23CCBCE2000
trusted library allocation
page read and write
23CC9E66000
trusted library allocation
page read and write
23CC9B9B000
trusted library allocation
page read and write
23CD14F8000
trusted library allocation
page read and write
23CC8B8D000
heap
page read and write
23CCBCD6000
trusted library allocation
page read and write
23CC4E8C000
trusted library allocation
page read and write
23CD4E65000
trusted library allocation
page read and write
23CD146B000
trusted library allocation
page read and write
23CBFD96000
heap
page read and write
23CC6D80000
trusted library allocation
page read and write
23CC8BD1000
heap
page read and write
23CD1482000
trusted library allocation
page read and write
18BF000
heap
page read and write
23CCA753000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CD12E2000
trusted library allocation
page read and write
23CD14AF000
trusted library allocation
page read and write
23CBFD45000
heap
page read and write
23CBFDA7000
heap
page read and write
23CCBCA1000
trusted library allocation
page read and write
23CBFD69000
heap
page read and write
23CD3543000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CD12DB000
trusted library allocation
page read and write
23CC9A23000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CCAA39000
trusted library allocation
page read and write
2436AE44000
heap
page read and write
23CC9E66000
trusted library allocation
page read and write
23CC918F000
trusted library allocation
page read and write
23CBFD56000
heap
page read and write
23CCA49A000
trusted library allocation
page read and write
23CCA5DB000
trusted library allocation
page read and write
23CD13B8000
trusted library allocation
page read and write
18843A94000
heap
page read and write
23CC9D3A000
trusted library allocation
page read and write
23CD499C000
trusted library allocation
page read and write
23CC9EAD000
trusted library allocation
page read and write
23CCBCEC000
trusted library allocation
page read and write
23CCACD8000
trusted library allocation
page read and write
23CCA89C000
trusted library allocation
page read and write
280DE5A0000
heap
page read and write
23CD502F000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
A5D423E000
stack
page read and write
23CBFDB3000
heap
page read and write
23CD126D000
trusted library allocation
page read and write
23CCBCB6000
trusted library allocation
page read and write
23CC60CD000
trusted library allocation
page read and write
23CD4F98000
trusted library allocation
page read and write
23CCBCF6000
trusted library allocation
page read and write
23CC9541000
trusted library allocation
page read and write
23CD1130000
trusted library allocation
page read and write
23CBFDBA000
heap
page read and write
23CD4F8D000
trusted library allocation
page read and write
23CD4CE0000
trusted library allocation
page read and write
23CCBCB6000
trusted library allocation
page read and write
23CCA4EE000
trusted library allocation
page read and write
22B0DF00000
trusted library allocation
page read and write
23CBFDC2000
heap
page read and write
23CCA484000
trusted library allocation
page read and write
22B0DF23000
trusted library allocation
page read and write
23CC63AC000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD4F000
heap
page read and write
23CD50AE000
trusted library allocation
page read and write
2436AE58000
heap
page read and write
23CC99A6000
trusted library allocation
page read and write
23CCAFBC000
trusted library allocation
page read and write
23CC618F000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CBFD93000
heap
page read and write
23CC6435000
trusted library allocation
page read and write
23CCA8A3000
trusted library allocation
page read and write
23CD2D46000
trusted library allocation
page read and write
23CBFD73000
heap
page read and write
23CCA5FE000
trusted library allocation
page read and write
23CC4790000
trusted library allocation
page read and write
23CC60C9000
trusted library allocation
page read and write
23CC9156000
trusted library allocation
page read and write
23CCA73C000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD56000
heap
page read and write
18F2000
heap
page read and write
23CCA466000
trusted library allocation
page read and write
23CBFD6C000
heap
page read and write
24369F90000
trusted library section
page readonly
23CD3350000
heap
page read and write
23CBFD93000
heap
page read and write
23CC60A5000
trusted library allocation
page read and write
23CCA9E8000
trusted library allocation
page read and write
23CCBC6A000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CCADBE000
trusted library allocation
page read and write
23CD12DB000
trusted library allocation
page read and write
23CD164F000
trusted library allocation
page read and write
23CD0CCF000
trusted library allocation
page read and write
44711FC000
stack
page read and write
23CBFDA0000
heap
page read and write
23CD1192000
trusted library allocation
page read and write
23CD16A5000
trusted library allocation
page read and write
23CD10DB000
trusted library allocation
page read and write
23CC91AC000
trusted library allocation
page read and write
23CC64DB000
trusted library allocation
page read and write
23CCB6C4000
trusted library allocation
page read and write
23CCC6C8000
trusted library allocation
page read and write
23CBFD72000
heap
page read and write
23CCA89F000
trusted library allocation
page read and write
23CC9C75000
trusted library allocation
page read and write
23CC9074000
trusted library allocation
page read and write
23CC909C000
trusted library allocation
page read and write
2436AE44000
heap
page read and write
23CC9B60000
trusted library allocation
page read and write
23CBFD93000
heap
page read and write
23CBFD6A000
heap
page read and write
23CD163C000
trusted library allocation
page read and write
23CCA9EC000
trusted library allocation
page read and write
23CD5259000
trusted library allocation
page read and write
23CD4FB1000
trusted library allocation
page read and write
23CD2D1F000
trusted library allocation
page read and write
23CBFD4F000
heap
page read and write
23CD15EC000
trusted library allocation
page read and write
23CD4CF2000
trusted library allocation
page read and write
23CC989B000
trusted library allocation
page read and write
23CC91A5000
trusted library allocation
page read and write
23CCA9EE000
trusted library allocation
page read and write
23CCBC6D000
trusted library allocation
page read and write
23CC5E8D000
trusted library allocation
page read and write
23CD1696000
trusted library allocation
page read and write
23CC90CB000
trusted library allocation
page read and write
2436A6FF000
heap
page read and write
23CC901D000
trusted library allocation
page read and write
23CC9B44000
trusted library allocation
page read and write
23CCD667000
trusted library allocation
page read and write
17F4000
heap
page read and write
23CC96BC000
trusted library allocation
page read and write
23CD5232000
trusted library allocation
page read and write
23CD12FA000
trusted library allocation
page read and write
23CCACBE000
trusted library allocation
page read and write
23CC9B6E000
trusted library allocation
page read and write
280DE7F6000
trusted library allocation
page read and write
23CCA57C000
trusted library allocation
page read and write
23CC9E92000
trusted library allocation
page read and write
23CCA5B1000
trusted library allocation
page read and write
23CC4E1E000
trusted library allocation
page read and write
F5C000
unkown
page readonly
23CBFD7B000
heap
page read and write
23CCD084000
trusted library allocation
page read and write
23CBFDA9000
heap
page read and write
23CCC8F7000
trusted library allocation
page read and write
23CCBC6A000
trusted library allocation
page read and write
23CBFD51000
heap
page read and write
There are 4046 hidden memdumps, click here to show them.