IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b150bc98-a738-458b-b244-0861ebdfb702.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b150bc98-a738-458b-b244-0861ebdfb702.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\d5ffe540-1bf5-492a-8225-7292b2756c0a (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\d5ffe540-1bf5-492a-8225-7292b2756c0a.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2120 -prefMapHandle 2116 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e542091b-9dc7-4550-9d17-5ca93cbf51d1} 5492 "\\.\pipe\gecko-crash-server-pipe.5492" 23a8b76d310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4184 -parentBuildID 20230927232528 -prefsHandle 3356 -prefMapHandle 4428 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46e7fab1-6afc-4bfb-bc0d-982fabcd3634} 5492 "\\.\pipe\gecko-crash-server-pipe.5492" 23a9dd28510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5064 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5036 -prefMapHandle 5040 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27e25ea4-9a79-4ebf-bed9-2343228ad319} 5492 "\\.\pipe\gecko-crash-server-pipe.5492" 23aa55c4d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://youtube.com/account?=https://accounts.google.co7N1Q
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.120
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.174
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.120
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
23A92520000
heap
page read and write
23AA3C77000
trusted library allocation
page read and write
23A9E329000
trusted library allocation
page read and write
280ECE00000
trusted library allocation
page read and write
23A9859C000
trusted library allocation
page read and write
23A9742F000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9B581000
heap
page read and write
23A9D0A9000
trusted library allocation
page read and write
23A9858C000
trusted library allocation
page read and write
23AA38F4000
trusted library allocation
page read and write
23AA37C9000
trusted library allocation
page read and write
258FBDA4000
trusted library allocation
page read and write
23AA55E8000
trusted library allocation
page read and write
23AA3DFE000
trusted library allocation
page read and write
23A9857D000
trusted library allocation
page read and write
23AA39C4000
trusted library allocation
page read and write
23A9D0F4000
trusted library allocation
page read and write
23A98B25000
trusted library allocation
page read and write
23A9C1E7000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A9D3A3000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9CDA3000
trusted library allocation
page read and write
23A9D0E2000
trusted library allocation
page read and write
23AA4A47000
trusted library allocation
page read and write
23A975BC000
trusted library allocation
page read and write
23A9B581000
heap
page read and write
23A9DFEB000
trusted library allocation
page read and write
23A9DFC7000
trusted library allocation
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A92518000
heap
page read and write
23A924D6000
heap
page read and write
23A9BCBB000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23AA5B01000
heap
page read and write
23A9D28C000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23A9F0CF000
trusted library allocation
page read and write
23A9D97F000
trusted library allocation
page read and write
23A9D549000
trusted library allocation
page read and write
23AA35DA000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23A9CBB3000
trusted library allocation
page read and write
23A9D5FB000
trusted library allocation
page read and write
23AA556C000
trusted library allocation
page read and write
23A9F3D1000
trusted library allocation
page read and write
23A96E9E000
trusted library allocation
page read and write
23A9CE4C000
trusted library allocation
page read and write
23A9F3C5000
trusted library allocation
page read and write
23AA5560000
trusted library allocation
page read and write
23AA3AE5000
trusted library allocation
page read and write
23A9DFBF000
trusted library allocation
page read and write
23AA3C51000
trusted library allocation
page read and write
23AA78BD000
trusted library allocation
page read and write
23AA34EA000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9D153000
trusted library allocation
page read and write
1734000
heap
page read and write
23A96EEF000
trusted library allocation
page read and write
2526F476000
trusted library allocation
page read and write
23A9253C000
heap
page read and write
23A9F1CD000
trusted library allocation
page read and write
23AA37D6000
trusted library allocation
page read and write
2526FBDD000
heap
page read and write
18BF000
heap
page read and write
23A9D268000
trusted library allocation
page read and write
23A9BCB4000
trusted library allocation
page read and write
23A9CB84000
trusted library allocation
page read and write
1824000
heap
page read and write
23A92532000
heap
page read and write
23AA614F000
trusted library allocation
page read and write
23AA3CA6000
trusted library allocation
page read and write
23A9F194000
trusted library allocation
page read and write
23AA34DC000
trusted library allocation
page read and write
23A9CBEC000
trusted library allocation
page read and write
23A9D2C2000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9D5AF000
trusted library allocation
page read and write
23A9BAFB000
trusted library allocation
page read and write
23A98BB6000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A9E5CD000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA7863000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23AA39AC000
trusted library allocation
page read and write
23AA55A1000
trusted library allocation
page read and write
23AA3D26000
trusted library allocation
page read and write
23A9D4F0000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A9D4C0000
trusted library allocation
page read and write
23A9CEB8000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9B2A0000
trusted library allocation
page read and write
23A9CAD7000
trusted library allocation
page read and write
23AA4A19000
trusted library allocation
page read and write
23A9B2A9000
trusted library allocation
page read and write
23A9BC0F000
trusted library allocation
page read and write
23A9BA6C000
trusted library allocation
page read and write
23AA35EF000
trusted library allocation
page read and write
23A9FE8E000
trusted library allocation
page read and write
23AA37AC000
trusted library allocation
page read and write
23AA36AC000
trusted library allocation
page read and write
23A9BCD5000
trusted library allocation
page read and write
23A92515000
heap
page read and write
177473C4000
heap
page read and write
23A9CC97000
trusted library allocation
page read and write
23A9D292000
trusted library allocation
page read and write
23A9D473000
trusted library allocation
page read and write
23A9EF58000
trusted library allocation
page read and write
23A9D4AD000
trusted library allocation
page read and write
23A9BC55000
trusted library allocation
page read and write
23A9D17F000
trusted library allocation
page read and write
4D2000
unkown
page readonly
23AA35EC000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23AA354D000
trusted library allocation
page read and write
23AA5D5C000
trusted library allocation
page read and write
23AA5D89000
trusted library allocation
page read and write
23AA4A7F000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A9CE72000
trusted library allocation
page read and write
23A9D4CD000
trusted library allocation
page read and write
23AA35AE000
trusted library allocation
page read and write
23A9CB75000
trusted library allocation
page read and write
23A9B57F000
heap
page read and write
23A98586000
trusted library allocation
page read and write
23A9D56E000
trusted library allocation
page read and write
23A924EC000
heap
page read and write
23A9BA7A000
trusted library allocation
page read and write
23AA3769000
trusted library allocation
page read and write
23A98BDE000
trusted library allocation
page read and write
23A9B275000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9C142000
trusted library allocation
page read and write
23AA39D8000
trusted library allocation
page read and write
17747300000
heap
page read and write
23A924F7000
heap
page read and write
23AA370D000
trusted library allocation
page read and write
23A9B59D000
heap
page read and write
23A9F0F7000
trusted library allocation
page read and write
23A9F6F7000
trusted library allocation
page read and write
23A9B57B000
heap
page read and write
23A9CBF7000
trusted library allocation
page read and write
23AA39CF000
trusted library allocation
page read and write
23A9DEBB000
trusted library allocation
page read and write
23A9C1AE000
trusted library allocation
page read and write
23A9CAD7000
trusted library allocation
page read and write
23AA37CB000
trusted library allocation
page read and write
17747507000
trusted library allocation
page read and write
23A9C147000
trusted library allocation
page read and write
23AA39D2000
trusted library allocation
page read and write
23A9CB9E000
trusted library allocation
page read and write
23A975AE000
trusted library allocation
page read and write
23A9DEED000
trusted library allocation
page read and write
23A9CB8D000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
23AA41F1000
trusted library allocation
page read and write
2526F481000
trusted library allocation
page read and write
23A9CD6A000
trusted library allocation
page read and write
23A9D19F000
trusted library allocation
page read and write
2526FC46000
heap
page read and write
23A92515000
heap
page read and write
23A9757D000
trusted library allocation
page read and write
23A9DFFB000
trusted library allocation
page read and write
1734000
heap
page read and write
23A9AE53000
trusted library allocation
page read and write
23AA3DEF000
trusted library allocation
page read and write
2526FC43000
heap
page read and write
23A9B2F9000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A924F3000
heap
page read and write
18BF000
heap
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A92533000
heap
page read and write
23A9C5F9000
trusted library allocation
page read and write
23A98BBE000
trusted library allocation
page read and write
2527016D000
heap
page read and write
23A9D573000
trusted library allocation
page read and write
23A9BA84000
trusted library allocation
page read and write
23A9D34B000
trusted library allocation
page read and write
23A9253E000
heap
page read and write
23AA3957000
trusted library allocation
page read and write
23A9D4D0000
trusted library allocation
page read and write
23A9D0A9000
trusted library allocation
page read and write
23A9DDDF000
trusted library allocation
page read and write
23A9D1C8000
trusted library allocation
page read and write
23A9BA9B000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A98BF1000
trusted library allocation
page read and write
23A9CE56000
trusted library allocation
page read and write
258FB94A000
heap
page read and write
23AA37B3000
trusted library allocation
page read and write
2526F423000
trusted library allocation
page read and write
23A92520000
heap
page read and write
23AA5585000
trusted library allocation
page read and write
26F788BB000
heap
page read and write
23AA39C1000
trusted library allocation
page read and write
258FB900000
heap
page read and write
23A9D9C5000
trusted library allocation
page read and write
23A9B590000
heap
page read and write
23A9D0C6000
trusted library allocation
page read and write
23A9D220000
trusted library allocation
page read and write
23A9D547000
trusted library allocation
page read and write
23A9F0D5000
trusted library allocation
page read and write
23AA3948000
trusted library allocation
page read and write
177473C6000
heap
page read and write
23AA38AB000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9BAAE000
trusted library allocation
page read and write
23A98C6B000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9D4E6000
trusted library allocation
page read and write
17746F50000
heap
page read and write
258FBD5D000
trusted library allocation
page read and write
2527012D000
heap
page read and write
23A9BA6D000
trusted library allocation
page read and write
23A9F691000
trusted library allocation
page read and write
23A9D5E8000
trusted library allocation
page read and write
23AA39C1000
trusted library allocation
page read and write
23A9F585000
trusted library allocation
page read and write
23A9D4F2000
trusted library allocation
page read and write
23AA3A23000
trusted library allocation
page read and write
23A9D0A5000
trusted library allocation
page read and write
23A9D951000
trusted library allocation
page read and write
23AA7865000
trusted library allocation
page read and write
23AA3CC5000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A92528000
heap
page read and write
258FBD1B000
trusted library allocation
page read and write
25270144000
heap
page read and write
23A9C18A000
trusted library allocation
page read and write
23A9D42F000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A9E318000
trusted library allocation
page read and write
23A9BA9B000
trusted library allocation
page read and write
23A9D953000
trusted library allocation
page read and write
23A9BADA000
trusted library allocation
page read and write
23AA55B4000
trusted library allocation
page read and write
23AA37F1000
trusted library allocation
page read and write
23A9E5E1000
trusted library allocation
page read and write
23A9CBC1000
trusted library allocation
page read and write
23AA3AB3000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
23A924E8000
heap
page read and write
23A9CAFA000
trusted library allocation
page read and write
23A9DE93000
trusted library allocation
page read and write
23A9B962000
trusted library allocation
page read and write
23AA3A3D000
trusted library allocation
page read and write
4DC000
unkown
page read and write
23A9C1BB000
trusted library allocation
page read and write
23AA3769000
trusted library allocation
page read and write
23AA3AFA000
trusted library allocation
page read and write
23AA3A2B000
trusted library allocation
page read and write
23AA37C7000
trusted library allocation
page read and write
23A9CB53000
trusted library allocation
page read and write
23A9C1E2000
trusted library allocation
page read and write
23A9FE12000
trusted library allocation
page read and write
23A9B136000
trusted library allocation
page read and write
23A9BAA6000
trusted library allocation
page read and write
23AA39AC000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23AA5560000
trusted library allocation
page read and write
23A9B578000
heap
page read and write
23AA5B7E000
heap
page read and write
23A9F39D000
trusted library allocation
page read and write
23AA38FD000
trusted library allocation
page read and write
23A98B62000
trusted library allocation
page read and write
2526F2F4000
unkown
page execute read
258FBD00000
trusted library allocation
page read and write
23A9CE68000
trusted library allocation
page read and write
23A9B86B000
trusted library allocation
page read and write
23A9D13E000
trusted library allocation
page read and write
23A9B8CF000
trusted library allocation
page read and write
23A9F3AA000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA3DEF000
trusted library allocation
page read and write
23A9CBB5000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A9D171000
trusted library allocation
page read and write
23A9CE5F000
trusted library allocation
page read and write
23AA5DCA000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23A92519000
heap
page read and write
2526FC52000
heap
page read and write
23A9BAB8000
trusted library allocation
page read and write
23A9D243000
trusted library allocation
page read and write
23A985B2000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A96E9A000
trusted library allocation
page read and write
23A92531000
heap
page read and write
23A924D7000
heap
page read and write
23A9DA4D000
trusted library allocation
page read and write
23A9D179000
trusted library allocation
page read and write
23AA34D8000
trusted library allocation
page read and write
23A9D0B9000
trusted library allocation
page read and write
177473C0000
heap
page read and write
26C747E000
stack
page read and write
23A9DFDF000
trusted library allocation
page read and write
23AA35AE000
trusted library allocation
page read and write
26F76CE0000
heap
page read and write
23A98CF6000
trusted library allocation
page read and write
23A98C7A000
trusted library allocation
page read and write
23A9CCFC000
trusted library allocation
page read and write
258FBDEA000
trusted library allocation
page read and write
23A9DFC1000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A9CE24000
trusted library allocation
page read and write
23AA62A4000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A9D088000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9D294000
trusted library allocation
page read and write
23AA78EE000
trusted library allocation
page read and write
23A9B987000
trusted library allocation
page read and write
23A98BA5000
trusted library allocation
page read and write
23A9B27F000
trusted library allocation
page read and write
23AA3AF4000
trusted library allocation
page read and write
23A98BA7000
trusted library allocation
page read and write
23A974FB000
trusted library allocation
page read and write
23A9C195000
trusted library allocation
page read and write
23AA383F000
trusted library allocation
page read and write
280ECF07000
trusted library allocation
page read and write
23A9CEDB000
trusted library allocation
page read and write
23A98BCE000
trusted library allocation
page read and write
189F000
heap
page read and write
23A9D0E2000
trusted library allocation
page read and write
23A985AD000
trusted library allocation
page read and write
23AA3C96000
trusted library allocation
page read and write
23AA39C4000
trusted library allocation
page read and write
23A9D27A000
trusted library allocation
page read and write
2526F486000
trusted library allocation
page read and write
23A9D23D000
trusted library allocation
page read and write
23A9AEE0000
trusted library allocation
page read and write
17747230000
trusted library allocation
page read and write
23A98C61000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9B57C000
heap
page read and write
23A9F3E8000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A9D0D0000
trusted library allocation
page read and write
26F76E72000
heap
page read and write
23A92519000
heap
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A98BA5000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9CE59000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23AA396B000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9D3A3000
trusted library allocation
page read and write
23A9F6A9000
trusted library allocation
page read and write
23AA353C000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9C1BF000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9D0F8000
trusted library allocation
page read and write
23AA3DEF000
trusted library allocation
page read and write
23A9DFEA000
trusted library allocation
page read and write
23AA70A8000
trusted library allocation
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A9D49D000
trusted library allocation
page read and write
23AA35F5000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23A9D0DF000
trusted library allocation
page read and write
23AA39C1000
trusted library allocation
page read and write
23A9D0B5000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23A9DEDB000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9CEB5000
trusted library allocation
page read and write
23AA4143000
trusted library allocation
page read and write
23A9DCDC000
trusted library allocation
page read and write
23AA36FD000
trusted library allocation
page read and write
E1D7DFE000
stack
page read and write
23A924E8000
heap
page read and write
23A9E59B000
trusted library allocation
page read and write
23A9B4F9000
heap
page read and write
23AA37E9000
trusted library allocation
page read and write
2526F403000
trusted library allocation
page read and write
23AA785B000
trusted library allocation
page read and write
23A9B57C000
heap
page read and write
23AA784E000
trusted library allocation
page read and write
258FBF21000
trusted library allocation
page read and write
26F76E88000
heap
page read and write
23A9F160000
trusted library allocation
page read and write
23AA5CC1000
trusted library allocation
page read and write
23A9F1ED000
trusted library allocation
page read and write
23A9CDC5000
trusted library allocation
page read and write
23A9D55C000
trusted library allocation
page read and write
23A9D10D000
trusted library allocation
page read and write
23AA38F4000
trusted library allocation
page read and write
2526FA30000
heap
page read and write
26F788BB000
heap
page read and write
23AA4A50000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
23AA3C11000
trusted library allocation
page read and write
23A9E337000
trusted library allocation
page read and write
23A9CDC5000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA38A9000
trusted library allocation
page read and write
23A9F32C000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9AE2E000
trusted library allocation
page read and write
23A9B52C000
heap
page read and write
23A9D24B000
trusted library allocation
page read and write
23A9F6ED000
trusted library allocation
page read and write
23A9D191000
trusted library allocation
page read and write
23A9859A000
trusted library allocation
page read and write
23A9D559000
trusted library allocation
page read and write
258FB920000
heap
page read and write
23A9B578000
heap
page read and write
23A96E98000
trusted library allocation
page read and write
23A9F38B000
trusted library allocation
page read and write
23AA39C1000
trusted library allocation
page read and write
17747282000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23AA37A7000
trusted library allocation
page read and write
23A9B867000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A924F3000
heap
page read and write
23A98BF1000
trusted library allocation
page read and write
23A9BCC3000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9B8D5000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23AA39AC000
trusted library allocation
page read and write
23A9EF50000
trusted library allocation
page read and write
23AA7200000
trusted library allocation
page read and write
23AA4A62000
trusted library allocation
page read and write
23A9B875000
trusted library allocation
page read and write
23A98CF4000
trusted library allocation
page read and write
23A9F3BC000
trusted library allocation
page read and write
23A9D1BC000
trusted library allocation
page read and write
23A9C1CF000
trusted library allocation
page read and write
23AA4AA5000
trusted library allocation
page read and write
23A9F3A7000
trusted library allocation
page read and write
23A9BC6B000
trusted library allocation
page read and write
23AA3A3F000
trusted library allocation
page read and write
2526F078000
remote allocation
page execute read
23A9D559000
trusted library allocation
page read and write
23A9B585000
heap
page read and write
23AA39D2000
trusted library allocation
page read and write
23A9DFF7000
trusted library allocation
page read and write
2527016D000
heap
page read and write
23A9B525000
heap
page read and write
23AA5B5C000
heap
page read and write
23AA39D2000
trusted library allocation
page read and write
EE517BE000
stack
page read and write
23A9DC60000
trusted library allocation
page read and write
23A92503000
heap
page read and write
23AA3AAE000
trusted library allocation
page read and write
23A9E36A000
trusted library allocation
page read and write
23A9D4AA000
trusted library allocation
page read and write
2526FBEA000
heap
page read and write
23A9D2EC000
trusted library allocation
page read and write
23AA36E9000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
3D9F000
stack
page read and write
23A9CE6D000
trusted library allocation
page read and write
23A9F6FD000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9F3F2000
trusted library allocation
page read and write
23AA3AE5000
trusted library allocation
page read and write
23AA55A5000
trusted library allocation
page read and write
23A9CEBC000
trusted library allocation
page read and write
23A9CD7C000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
26F788BE000
heap
page read and write
25270121000
heap
page read and write
23A924F7000
heap
page read and write
23AA3C68000
trusted library allocation
page read and write
17747500000
trusted library allocation
page read and write
23A9B84D000
trusted library allocation
page read and write
23A9CC89000
trusted library allocation
page read and write
23A9D1B6000
trusted library allocation
page read and write
2526F000000
unclassified section
page readonly
23A9C1BB000
trusted library allocation
page read and write
23A92520000
heap
page read and write
23A9DFF4000
trusted library allocation
page read and write
23A9B59A000
heap
page read and write
23A9DE23000
trusted library allocation
page read and write
23A9F571000
trusted library allocation
page read and write
23A98C6F000
trusted library allocation
page read and write
23A9D58A000
trusted library allocation
page read and write
23A9758C000
trusted library allocation
page read and write
23A9DFE7000
trusted library allocation
page read and write
937C1FC000
stack
page read and write
23A9BABB000
trusted library allocation
page read and write
23A924F2000
heap
page read and write
23A9D061000
trusted library allocation
page read and write
23A9D4AF000
trusted library allocation
page read and write
23A924C7000
heap
page read and write
23A92523000
heap
page read and write
23A9CD7C000
trusted library allocation
page read and write
23A9CBEA000
trusted library allocation
page read and write
23AA789E000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A92535000
heap
page read and write
1880000
heap
page read and write
23A9D17D000
trusted library allocation
page read and write
23A9B2F9000
trusted library allocation
page read and write
17747600000
trusted library allocation
page read and write
23AA5100000
trusted library allocation
page read and write
23A9D31B000
trusted library allocation
page read and write
26F76DF0000
heap
page read and write
23AA3DE3000
trusted library allocation
page read and write
23A9F3CA000
trusted library allocation
page read and write
23A9CCD4000
trusted library allocation
page read and write
23AA5598000
trusted library allocation
page read and write
23AA38D9000
trusted library allocation
page read and write
23A92521000
heap
page read and write
23AA3A75000
trusted library allocation
page read and write
23AA39C5000
trusted library allocation
page read and write
23A9D5C8000
trusted library allocation
page read and write
23AA5591000
trusted library allocation
page read and write
23AA3CD3000
trusted library allocation
page read and write
23A9D91E000
trusted library allocation
page read and write
23A9BA6D000
trusted library allocation
page read and write
23A9D5FD000
trusted library allocation
page read and write
23A9CE8B000
trusted library allocation
page read and write
4AC000
unkown
page readonly
23A9D5D0000
trusted library allocation
page read and write
23AA349D000
trusted library allocation
page read and write
18A6000
heap
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9EFE8000
trusted library allocation
page read and write
258FBDB9000
trusted library allocation
page read and write
23A9F3E5000
trusted library allocation
page read and write
23A9F6C9000
trusted library allocation
page read and write
23AA35E3000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9D5C8000
trusted library allocation
page read and write
23AA378F000
trusted library allocation
page read and write
23A9CC55000
trusted library allocation
page read and write
23AA38FD000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D5D0000
trusted library allocation
page read and write
23A9D118000
trusted library allocation
page read and write
23A985C3000
trusted library allocation
page read and write
23A9D5B0000
trusted library allocation
page read and write
23A9BA9D000
trusted library allocation
page read and write
17746EEB000
remote allocation
page execute read
23A92515000
heap
page read and write
23A924E8000
heap
page read and write
23A9CDFC000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9BA71000
trusted library allocation
page read and write
23A92527000
heap
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9C1A6000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23AA3DC5000
trusted library allocation
page read and write
23A9B897000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23AA3DFC000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A98B33000
trusted library allocation
page read and write
23AA37D6000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23A9CC0F000
trusted library allocation
page read and write
23AA35A5000
trusted library allocation
page read and write
23A9F0F7000
trusted library allocation
page read and write
23A9BAA6000
trusted library allocation
page read and write
23A924E7000
heap
page read and write
23A9B866000
trusted library allocation
page read and write
23AA394B000
trusted library allocation
page read and write
23A9E326000
trusted library allocation
page read and write
23AA4A0D000
trusted library allocation
page read and write
23AA5570000
trusted library allocation
page read and write
23AA3AF0000
trusted library allocation
page read and write
23A9CD9D000
trusted library allocation
page read and write
23AA3A25000
trusted library allocation
page read and write
23A9BAFB000
trusted library allocation
page read and write
23AA5585000
trusted library allocation
page read and write
23AA34A4000
trusted library allocation
page read and write
23AA3962000
trusted library allocation
page read and write
23A9EFBE000
trusted library allocation
page read and write
23A9B4E8000
heap
page read and write
23A9CBE6000
trusted library allocation
page read and write
23A9DCAE000
trusted library allocation
page read and write
23A975A0000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23AA3AF4000
trusted library allocation
page read and write
23AA370F000
trusted library allocation
page read and write
23A9B597000
heap
page read and write
C5F6BD8000
stack
page read and write
23A9CB37000
trusted library allocation
page read and write
23A9E334000
trusted library allocation
page read and write
23A9B9A2000
trusted library allocation
page read and write
23AA5CBA000
trusted library allocation
page read and write
23A9CB53000
trusted library allocation
page read and write
23A98BC2000
trusted library allocation
page read and write
23A9CE62000
trusted library allocation
page read and write
23A9CDFC000
trusted library allocation
page read and write
23AA3957000
trusted library allocation
page read and write
23A9CA85000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23A9CBFE000
trusted library allocation
page read and write
23AA37F1000
trusted library allocation
page read and write
23A9BA95000
trusted library allocation
page read and write
23A9BA78000
trusted library allocation
page read and write
23A92518000
heap
page read and write
23A9B228000
trusted library allocation
page read and write
23A9CEE4000
trusted library allocation
page read and write
23A9B586000
heap
page read and write
23A92528000
heap
page read and write
25270177000
heap
page read and write
23A924F3000
heap
page read and write
23AA38E8000
trusted library allocation
page read and write
23AA3810000
trusted library allocation
page read and write
23A9CC76000
trusted library allocation
page read and write
23AA556C000
trusted library allocation
page read and write
23AA5BBC000
heap
page read and write
23AA5B01000
heap
page read and write
23A92515000
heap
page read and write
23AA3948000
trusted library allocation
page read and write
23A9D0D7000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A924DD000
heap
page read and write
23AA553D000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
25270158000
heap
page read and write
2527012A000
heap
page read and write
23A9CE68000
trusted library allocation
page read and write
23A9DCFE000
trusted library allocation
page read and write
23A9EFBE000
trusted library allocation
page read and write
23AA36AC000
trusted library allocation
page read and write
23AA3C75000
trusted library allocation
page read and write
23A98BDE000
trusted library allocation
page read and write
23A9CC4F000
trusted library allocation
page read and write
23A9DCEB000
trusted library allocation
page read and write
C5F60DB000
stack
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9D57C000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9CDB2000
trusted library allocation
page read and write
23A985BC000
trusted library allocation
page read and write
23A98BA5000
trusted library allocation
page read and write
23AA3CA6000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A924F7000
heap
page read and write
23AA37EB000
trusted library allocation
page read and write
23AA39D4000
trusted library allocation
page read and write
23A9CC52000
trusted library allocation
page read and write
23AA62A9000
trusted library allocation
page read and write
23A9D945000
trusted library allocation
page read and write
23A9B2F9000
trusted library allocation
page read and write
23A9E50C000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
280ECD10000
heap
page read and write
23A9CBB5000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9B578000
heap
page read and write
23A9B9CB000
trusted library allocation
page read and write
23A9DD7C000
trusted library allocation
page read and write
23AA4A62000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
2526FC4D000
heap
page read and write
23A9D9E4000
trusted library allocation
page read and write
23A9CC87000
trusted library allocation
page read and write
23A98569000
trusted library allocation
page read and write
2526F2FE000
unkown
page execute read
23A9BC89000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23AA3C77000
trusted library allocation
page read and write
23A9CB90000
trusted library allocation
page read and write
23A9CB38000
trusted library allocation
page read and write
18A2000
heap
page read and write
17747100000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23AA34E4000
trusted library allocation
page read and write
23A9BA56000
trusted library allocation
page read and write
23A9D5EF000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9D935000
trusted library allocation
page read and write
23A9CEB5000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A974FE000
trusted library allocation
page read and write
23A98BB8000
trusted library allocation
page read and write
23A9B95F000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23A9D5C0000
trusted library allocation
page read and write
23A9B23E000
trusted library allocation
page read and write
23A9CDB8000
trusted library allocation
page read and write
23A9AEAA000
trusted library allocation
page read and write
23A9252A000
heap
page read and write
23A9D0D3000
trusted library allocation
page read and write
23A9B251000
trusted library allocation
page read and write
23A9CEDB000
trusted library allocation
page read and write
23AA39E8000
trusted library allocation
page read and write
2526F1B0000
heap
page read and write
23A9D2C7000
trusted library allocation
page read and write
23A975A5000
trusted library allocation
page read and write
23A9D2B3000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23AA3D41000
trusted library allocation
page read and write
23A9D929000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA37DA000
trusted library allocation
page read and write
23A9D5D8000
trusted library allocation
page read and write
23A9D1C2000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
23AA34EE000
trusted library allocation
page read and write
23AA3DC5000
trusted library allocation
page read and write
23AA3780000
trusted library allocation
page read and write
23A9F00B000
trusted library allocation
page read and write
23A9CC61000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A98BA5000
trusted library allocation
page read and write
23A9C166000
trusted library allocation
page read and write
23AA34D8000
trusted library allocation
page read and write
23AA3948000
trusted library allocation
page read and write
23A9D23F000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9DE1E000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23AA37A7000
trusted library allocation
page read and write
23A9B938000
trusted library allocation
page read and write
23A9D41B000
trusted library allocation
page read and write
258FB8DF000
remote allocation
page execute read
23A9B8BB000
trusted library allocation
page read and write
23AA41EF000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9CEFD000
trusted library allocation
page read and write
258FBE54000
heap
page read and write
23A9F082000
trusted library allocation
page read and write
23AA34E0000
trusted library allocation
page read and write
26F76E50000
heap
page read and write
23A924F7000
heap
page read and write
23A9CC61000
trusted library allocation
page read and write
23A9F5EC000
trusted library allocation
page read and write
23AA3DEF000
trusted library allocation
page read and write
23A9D298000
trusted library allocation
page read and write
23A9251D000
heap
page read and write
2526FB60000
heap
page read and write
23AA36A0000
trusted library allocation
page read and write
23AA378B000
trusted library allocation
page read and write
23A9CDF2000
trusted library allocation
page read and write
23A9C1B3000
trusted library allocation
page read and write
23A9E4DD000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9D0ED000
trusted library allocation
page read and write
23AA373B000
trusted library allocation
page read and write
23A9F18A000
trusted library allocation
page read and write
23A92535000
heap
page read and write
18AD000
heap
page read and write
23AA3957000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A9B99C000
trusted library allocation
page read and write
23A9F1AF000
trusted library allocation
page read and write
23AA3888000
trusted library allocation
page read and write
23A9BA9B000
trusted library allocation
page read and write
23AA3C77000
trusted library allocation
page read and write
23A9CFBC000
trusted library allocation
page read and write
23A985AB000
trusted library allocation
page read and write
23A9C1B1000
trusted library allocation
page read and write
23AA4A8C000
trusted library allocation
page read and write
23A9E376000
trusted library allocation
page read and write
23A9D235000
trusted library allocation
page read and write
23AA5560000
trusted library allocation
page read and write
23AA4AAA000
trusted library allocation
page read and write
23AA3605000
trusted library allocation
page read and write
23A9CE5F000
trusted library allocation
page read and write
23A9D1BA000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
17747274000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A924C3000
heap
page read and write
23AA35EC000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23AA36B7000
trusted library allocation
page read and write
23A9D296000
trusted library allocation
page read and write
23AA5D61000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9F3BC000
trusted library allocation
page read and write
23AA35CC000
trusted library allocation
page read and write
23AA55A1000
trusted library allocation
page read and write
EE4F73E000
stack
page read and write
23A9D2DC000
trusted library allocation
page read and write
4E4000
unkown
page readonly
23AA4A44000
trusted library allocation
page read and write
2526FC49000
heap
page read and write
23A9B50E000
heap
page read and write
1774728F000
trusted library allocation
page read and write
23A9C197000
trusted library allocation
page read and write
23AA38A3000
trusted library allocation
page read and write
23A9CE2F000
trusted library allocation
page read and write
23A924FE000
heap
page read and write
2526FC43000
heap
page read and write
23A96EDF000
trusted library allocation
page read and write
2526FBC4000
heap
page read and write
23A9B597000
heap
page read and write
23A924F7000
heap
page read and write
23AA36E9000
trusted library allocation
page read and write
23A9B51A000
heap
page read and write
23A9D0C4000
trusted library allocation
page read and write
23AA3C21000
trusted library allocation
page read and write
23AA394E000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23A98BBE000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A924E9000
heap
page read and write
23AA394B000
trusted library allocation
page read and write
23A9CEB8000
trusted library allocation
page read and write
23A975E0000
trusted library allocation
page read and write
23AA36E1000
trusted library allocation
page read and write
23AA3A0A000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23A9DFF4000
trusted library allocation
page read and write
937C9FE000
stack
page read and write
23AA3CF9000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
25270179000
heap
page read and write
23A9B700000
trusted library allocation
page read and write
23A9CEDB000
trusted library allocation
page read and write
23A9EF9B000
trusted library allocation
page read and write
23A9CDB8000
trusted library allocation
page read and write
23AA36D1000
trusted library allocation
page read and write
23AA37CE000
trusted library allocation
page read and write
23A9CE86000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23AA38AD000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23AA3D43000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A92515000
heap
page read and write
23A9CAD7000
trusted library allocation
page read and write
23A98C6F000
trusted library allocation
page read and write
23A9B9A2000
trusted library allocation
page read and write
23AA37AC000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A9846C000
trusted library allocation
page read and write
23A9B29B000
trusted library allocation
page read and write
23A9859C000
trusted library allocation
page read and write
23A9D0F0000
trusted library allocation
page read and write
23A92515000
heap
page read and write
2526FC40000
heap
page read and write
23A924C2000
heap
page read and write
23A9B9A2000
trusted library allocation
page read and write
23A9CBFB000
trusted library allocation
page read and write
1734000
heap
page read and write
23A9B139000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23AA3962000
trusted library allocation
page read and write
23AA38E8000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9D4F6000
trusted library allocation
page read and write
23A9D5C8000
trusted library allocation
page read and write
23AA35EC000
trusted library allocation
page read and write
23A9DC75000
trusted library allocation
page read and write
23A9E356000
trusted library allocation
page read and write
23A9D290000
trusted library allocation
page read and write
23A98BA0000
trusted library allocation
page read and write
23AA35D5000
trusted library allocation
page read and write
23A9B953000
trusted library allocation
page read and write
23A9AEBD000
trusted library allocation
page read and write
23A9AED3000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23AA4BC3000
trusted library allocation
page read and write
23A9D4F2000
trusted library allocation
page read and write
23AA62E4000
trusted library allocation
page read and write
23A9D473000
trusted library allocation
page read and write
23A9EFB4000
trusted library allocation
page read and write
23AA34E4000
trusted library allocation
page read and write
23AA5B4C000
heap
page read and write
23A9BC29000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9D294000
trusted library allocation
page read and write
23A9D17F000
trusted library allocation
page read and write
23A9B98A000
trusted library allocation
page read and write
26F788AB000
heap
page read and write
23A9B591000
heap
page read and write
23AA3CB3000
trusted library allocation
page read and write
23A9D596000
trusted library allocation
page read and write
23A9EF37000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A9CAC3000
trusted library allocation
page read and write
23A9BABB000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
23A9D122000
trusted library allocation
page read and write
23A9D582000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23AA369C000
trusted library allocation
page read and write
23A9D57C000
trusted library allocation
page read and write
23A9F3D1000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23A924E9000
heap
page read and write
23A9251F000
heap
page read and write
23A9D5F1000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23A9D10A000
trusted library allocation
page read and write
23A9EFB1000
trusted library allocation
page read and write
23A9CAE9000
trusted library allocation
page read and write
23A9E57E000
trusted library allocation
page read and write
177470CF000
unclassified section
page read and write
23A9D05E000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A9D54D000
trusted library allocation
page read and write
23A9C19A000
trusted library allocation
page read and write
23A9CED8000
trusted library allocation
page read and write
23A9BABB000
trusted library allocation
page read and write
23A9D084000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9B585000
heap
page read and write
23A9251F000
heap
page read and write
23A9CEBC000
trusted library allocation
page read and write
23A98B69000
trusted library allocation
page read and write
23A9CFF6000
trusted library allocation
page read and write
23AA373B000
trusted library allocation
page read and write
23AA3649000
trusted library allocation
page read and write
23A9D115000
trusted library allocation
page read and write
23A9AE33000
trusted library allocation
page read and write
23A9B2ED000
trusted library allocation
page read and write
23AA38FD000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A92515000
heap
page read and write
23A9CB8D000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23AA37B7000
trusted library allocation
page read and write
23A9D429000
trusted library allocation
page read and write
23A9DDBD000
trusted library allocation
page read and write
23A9D9CF000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A924F3000
heap
page read and write
23AA3AE7000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9CEA4000
trusted library allocation
page read and write
23A9CC27000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9CB51000
trusted library allocation
page read and write
23A9F6D9000
trusted library allocation
page read and write
23AA4A8C000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23AA36EE000
trusted library allocation
page read and write
23A9CFDA000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23AA3765000
trusted library allocation
page read and write
258FBB10000
unclassified section
page readonly
23AA39F2000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9D5EF000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23A9BC69000
trusted library allocation
page read and write
23A924B9000
heap
page read and write
23A9D197000
trusted library allocation
page read and write
23A9C197000
trusted library allocation
page read and write
23A9C147000
trusted library allocation
page read and write
2526F190000
heap
page read and write
25270177000
heap
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9CDE6000
trusted library allocation
page read and write
23AA39D2000
trusted library allocation
page read and write
23A9BCA1000
trusted library allocation
page read and write
23A9CFBE000
trusted library allocation
page read and write
23A9F30B000
trusted library allocation
page read and write
23AA37C0000
trusted library allocation
page read and write
23A9D5FD000
trusted library allocation
page read and write
40E1000
heap
page read and write
25270158000
heap
page read and write
23A9B232000
trusted library allocation
page read and write
23A9DFDF000
trusted library allocation
page read and write
1734000
heap
page read and write
23AA3CD5000
trusted library allocation
page read and write
23A985AB000
trusted library allocation
page read and write
23A9F3DA000
trusted library allocation
page read and write
23A9DD64000
trusted library allocation
page read and write
23A98B76000
trusted library allocation
page read and write
23A9F3A3000
trusted library allocation
page read and write
23AA3DEA000
trusted library allocation
page read and write
23AA3532000
trusted library allocation
page read and write
23A9CE5B000
trusted library allocation
page read and write
23A9DDB3000
trusted library allocation
page read and write
23A924EB000
heap
page read and write
23AA39C7000
trusted library allocation
page read and write
23A9F160000
trusted library allocation
page read and write
2526FBCC000
heap
page read and write
23A9D35A000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23AA6D27000
trusted library allocation
page read and write
23A9BCB7000
trusted library allocation
page read and write
23AA4AA5000
trusted library allocation
page read and write
23A9BCCA000
trusted library allocation
page read and write
23AA61A6000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A924E2000
heap
page read and write
23A924E1000
heap
page read and write
23AA3A30000
trusted library allocation
page read and write
23A9D0C0000
trusted library allocation
page read and write
177470E0000
heap
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA6D83000
trusted library allocation
page read and write
23A9CAC9000
trusted library allocation
page read and write
23A9BACC000
trusted library allocation
page read and write
23A9E332000
trusted library allocation
page read and write
23AA36A2000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
23AA4141000
trusted library allocation
page read and write
23A98B1B000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A9BC67000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
23A9BAB4000
trusted library allocation
page read and write
23AA5B35000
heap
page read and write
23A9252C000
heap
page read and write
23AA37C0000
trusted library allocation
page read and write
23A9D4CD000
trusted library allocation
page read and write
23AA3DE7000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A924D0000
heap
page read and write
23A9FF04000
trusted library allocation
page read and write
23A9D1E3000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A924FC000
heap
page read and write
23AA3C1E000
trusted library allocation
page read and write
23AA3864000
trusted library allocation
page read and write
23AA3CA2000
trusted library allocation
page read and write
23A9B2BA000
trusted library allocation
page read and write
23AA7899000
trusted library allocation
page read and write
23AA39C3000
trusted library allocation
page read and write
23AA5539000
trusted library allocation
page read and write
177470E3000
heap
page read and write
23A9B2D1000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9D1B0000
trusted library allocation
page read and write
23A98BB1000
trusted library allocation
page read and write
23A9D055000
trusted library allocation
page read and write
23A9BA52000
trusted library allocation
page read and write
23A96EA4000
trusted library allocation
page read and write
23AA3AE5000
trusted library allocation
page read and write
23AA36B0000
trusted library allocation
page read and write
23A9D91C000
trusted library allocation
page read and write
2526F2E0000
trusted library allocation
page read and write
26F788AA000
heap
page read and write
23AA3A26000
trusted library allocation
page read and write
23A9B591000
heap
page read and write
23A9CE5F000
trusted library allocation
page read and write
23A9C193000
trusted library allocation
page read and write
2526F46F000
trusted library allocation
page read and write
23A9B26F000
trusted library allocation
page read and write
258FBB03000
heap
page read and write
23A92528000
heap
page read and write
23A98C73000
trusted library allocation
page read and write
23A9D58C000
trusted library allocation
page read and write
23A9CDFC000
trusted library allocation
page read and write
18AF000
heap
page read and write
23A98BC9000
trusted library allocation
page read and write
23AA3531000
trusted library allocation
page read and write
23A9C1C3000
trusted library allocation
page read and write
23A9CC68000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A9B59B000
heap
page read and write
23A9D294000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9D290000
trusted library allocation
page read and write
23A9CB0B000
trusted library allocation
page read and write
23A97423000
trusted library allocation
page read and write
23A98BE2000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA3DF6000
trusted library allocation
page read and write
C5F619E000
unkown
page readonly
23A92532000
heap
page read and write
23AA34DC000
trusted library allocation
page read and write
23A924D5000
heap
page read and write
23A9D290000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23AA3649000
trusted library allocation
page read and write
23A9D197000
trusted library allocation
page read and write
EE4EE7E000
unkown
page readonly
23A9DA99000
trusted library allocation
page read and write
23A9B97E000
trusted library allocation
page read and write
26F76E88000
heap
page read and write
23A9EFE8000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
258FBAB0000
unclassified section
page read and write
23AA35EC000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9D573000
trusted library allocation
page read and write
23AA38DC000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23AA35AF000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
23AA5B47000
heap
page read and write
23AA3765000
trusted library allocation
page read and write
23A9FF2B000
trusted library allocation
page read and write
23A9BAA9000
trusted library allocation
page read and write
25270013000
trusted library allocation
page read and write
23A9DFD9000
trusted library allocation
page read and write
23A98BAE000
trusted library allocation
page read and write
23A9F396000
trusted library allocation
page read and write
23AA377A000
trusted library allocation
page read and write
17747503000
trusted library allocation
page read and write
23A9B8D2000
trusted library allocation
page read and write
23A9B52C000
heap
page read and write
23A9F3FE000
trusted library allocation
page read and write
23A98BA7000
trusted library allocation
page read and write
23A9BA72000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A9844A000
trusted library allocation
page read and write
23A9B97F000
trusted library allocation
page read and write
17747320000
unclassified section
page readonly
1774720C000
trusted library allocation
page read and write
23A9CE95000
trusted library allocation
page read and write
23A92527000
heap
page read and write
258FB860000
unclassified section
page readonly
23A9D26C000
trusted library allocation
page read and write
25270100000
heap
page read and write
23A924F7000
heap
page read and write
23AA379B000
trusted library allocation
page read and write
23A9D9FE000
trusted library allocation
page read and write
23AA36A4000
trusted library allocation
page read and write
23AA37DC000
trusted library allocation
page read and write
23AA3DF8000
trusted library allocation
page read and write
25270144000
heap
page read and write
23A9BA68000
trusted library allocation
page read and write
23AA37F1000
trusted library allocation
page read and write
23AA35E9000
trusted library allocation
page read and write
23A98BF0000
trusted library allocation
page read and write
23A9C142000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A985B1000
trusted library allocation
page read and write
C5F8CBE000
stack
page read and write
23A98B8D000
trusted library allocation
page read and write
23A924CA000
heap
page read and write
23AA4A19000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23AA4AAA000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
2527012A000
heap
page read and write
258FBD2E000
trusted library allocation
page read and write
23A9CEA4000
trusted library allocation
page read and write
23A9D4C0000
trusted library allocation
page read and write
23A9D951000
trusted library allocation
page read and write
18BF000
heap
page read and write
23A9D4D8000
trusted library allocation
page read and write
411000
unkown
page execute read
23A9E4AF000
trusted library allocation
page read and write
23A9D5F1000
trusted library allocation
page read and write
23AA3A30000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23AA6D3B000
trusted library allocation
page read and write
23A9CA86000
trusted library allocation
page read and write
1734000
heap
page read and write
23A9B57B000
heap
page read and write
C5FA4BE000
unkown
page readonly
23A924E8000
heap
page read and write
23A92522000
heap
page read and write
23A924F3000
heap
page read and write
23A924D7000
heap
page read and write
2526FB50000
heap
page read and write
23A9AEA2000
trusted library allocation
page read and write
23AA37DA000
trusted library allocation
page read and write
23A9CE9B000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9CD53000
trusted library allocation
page read and write
23A97526000
trusted library allocation
page read and write
23A9B987000
trusted library allocation
page read and write
1734000
heap
page read and write
23A92528000
heap
page read and write
23A9BAC6000
trusted library allocation
page read and write
23A9C1A6000
trusted library allocation
page read and write
23AA3A59000
trusted library allocation
page read and write
23A9BAAB000
trusted library allocation
page read and write
23A9CE62000
trusted library allocation
page read and write
23AA3767000
trusted library allocation
page read and write
23A9B2B0000
trusted library allocation
page read and write
23A9E3FE000
trusted library allocation
page read and write
23A92524000
heap
page read and write
23A9BCCC000
trusted library allocation
page read and write
23AA4A57000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23AA61D2000
trusted library allocation
page read and write
23A9D543000
trusted library allocation
page read and write
23A9EF99000
trusted library allocation
page read and write
23A9AE6A000
trusted library allocation
page read and write
23AA39CF000
trusted library allocation
page read and write
23A9B597000
heap
page read and write
23AA39AC000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA35A5000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23A9F3AA000
trusted library allocation
page read and write
23AA5B45000
heap
page read and write
23A9EFA2000
trusted library allocation
page read and write
23A9252A000
heap
page read and write
23A9CC7E000
trusted library allocation
page read and write
18C7000
heap
page read and write
23AA7400000
trusted library allocation
page read and write
23A9C1AF000
trusted library allocation
page read and write
23AA34F2000
trusted library allocation
page read and write
23A924F4000
heap
page read and write
23A924E1000
heap
page read and write
23A9C166000
trusted library allocation
page read and write
23A9EFD8000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23AA5560000
trusted library allocation
page read and write
23A9B2F9000
trusted library allocation
page read and write
23AA5D66000
trusted library allocation
page read and write
23A9DEA0000
trusted library allocation
page read and write
23A9FE2F000
trusted library allocation
page read and write
23A9D387000
trusted library allocation
page read and write
23A9B525000
heap
page read and write
23A9DD74000
trusted library allocation
page read and write
23AA3751000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9B9A2000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23AA55B5000
trusted library allocation
page read and write
23AA372E000
trusted library allocation
page read and write
23A9CBE0000
trusted library allocation
page read and write
17746E70000
unclassified section
page readonly
23A9BABE000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA35CC000
trusted library allocation
page read and write
23A9CBE6000
trusted library allocation
page read and write
23A9C17A000
trusted library allocation
page read and write
23AA3DCA000
trusted library allocation
page read and write
23A924E4000
heap
page read and write
23A9CB75000
trusted library allocation
page read and write
2526FC5D000
heap
page read and write
23A9D058000
trusted library allocation
page read and write
23A9D57C000
trusted library allocation
page read and write
18BF000
heap
page read and write
23A9BCD5000
trusted library allocation
page read and write
23A9D566000
trusted library allocation
page read and write
23AA3941000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A92522000
heap
page read and write
23A9B275000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9E372000
trusted library allocation
page read and write
23A9B50E000
heap
page read and write
23A9DEC3000
trusted library allocation
page read and write
23A98BAE000
trusted library allocation
page read and write
23A9B987000
trusted library allocation
page read and write
23A9C15D000
trusted library allocation
page read and write
23AA4A72000
trusted library allocation
page read and write
23A9D180000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9CB99000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9CE55000
trusted library allocation
page read and write
23AA78C1000
trusted library allocation
page read and write
2526F45C000
trusted library allocation
page read and write
23A9D0D7000
trusted library allocation
page read and write
23AA35D5000
trusted library allocation
page read and write
23AA37DA000
trusted library allocation
page read and write
18A2000
heap
page read and write
23A9D06E000
trusted library allocation
page read and write
23A9D3E3000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23A9F5C7000
trusted library allocation
page read and write
23A9DFC7000
trusted library allocation
page read and write
23A9C1B3000
trusted library allocation
page read and write
23A924CE000
heap
page read and write
23AA36EE000
trusted library allocation
page read and write
23A9B57C000
heap
page read and write
23A9DEB1000
trusted library allocation
page read and write
25270177000
heap
page read and write
23A924EC000
heap
page read and write
23A9DFC7000
trusted library allocation
page read and write
23AA35E9000
trusted library allocation
page read and write
23A924D6000
heap
page read and write
23A985A8000
trusted library allocation
page read and write
23AA3D41000
trusted library allocation
page read and write
23A9D559000
trusted library allocation
page read and write
23A9D354000
trusted library allocation
page read and write
23A9D0ED000
trusted library allocation
page read and write
23AA3DF8000
trusted library allocation
page read and write
F8E000
stack
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A98B18000
trusted library allocation
page read and write
23AA37C7000
trusted library allocation
page read and write
23A9DDD2000
trusted library allocation
page read and write
23A9CB27000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23AA3A8B000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9B57B000
heap
page read and write
23AA3860000
trusted library allocation
page read and write
23AA78BF000
trusted library allocation
page read and write
23A98BC7000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9C1BF000
trusted library allocation
page read and write
23AA3797000
trusted library allocation
page read and write
23A9AEE0000
trusted library allocation
page read and write
23A9AE33000
trusted library allocation
page read and write
23A96EF7000
trusted library allocation
page read and write
23AA78ED000
trusted library allocation
page read and write
23AA3AF0000
trusted library allocation
page read and write
23A975DB000
trusted library allocation
page read and write
23AA3914000
trusted library allocation
page read and write
23A98BB8000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
23A9CC40000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D4BC000
trusted library allocation
page read and write
2526FC40000
heap
page read and write
23A9D1B0000
trusted library allocation
page read and write
23AA4A07000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23AA5591000
trusted library allocation
page read and write
23A9CB99000
trusted library allocation
page read and write
23AA37D6000
trusted library allocation
page read and write
23A9CC4F000
trusted library allocation
page read and write
23AA360E000
trusted library allocation
page read and write
23A9B97E000
trusted library allocation
page read and write
23A9B59D000
heap
page read and write
23AA3797000
trusted library allocation
page read and write
23A9CED8000
trusted library allocation
page read and write
23A9F023000
trusted library allocation
page read and write
23A92515000
heap
page read and write
18B2000
heap
page read and write
23A9F175000
trusted library allocation
page read and write
23AA4A4A000
trusted library allocation
page read and write
23A924CC000
heap
page read and write
23A924FC000
heap
page read and write
23A9DCB9000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
ED9000
stack
page read and write
23A9BA95000
trusted library allocation
page read and write
23A9D0C2000
trusted library allocation
page read and write
2526FA50000
heap
page read and write
2526F0A0000
heap
page read and write
23AA37C0000
trusted library allocation
page read and write
23A9FF06000
trusted library allocation
page read and write
23AA37F1000
trusted library allocation
page read and write
23AA37CE000
trusted library allocation
page read and write
23A9DE54000
trusted library allocation
page read and write
23A9D1DB000
trusted library allocation
page read and write
23AA3951000
trusted library allocation
page read and write
23A9252E000
heap
page read and write
23A9C1B3000
trusted library allocation
page read and write
23A9D91E000
trusted library allocation
page read and write
23AA3A8E000
trusted library allocation
page read and write
23AA34E4000
trusted library allocation
page read and write
23AA35DD000
trusted library allocation
page read and write
26F76EC0000
heap
page read and write
23A9F1F8000
trusted library allocation
page read and write
23AA3A30000
trusted library allocation
page read and write
23A9B972000
trusted library allocation
page read and write
23A9E506000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A92515000
heap
page read and write
23A924E2000
heap
page read and write
23A924F7000
heap
page read and write
23AA5B8B000
heap
page read and write
23A9E3CA000
trusted library allocation
page read and write
C5F61DE000
stack
page read and write
23A9CBB3000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23A9F1C3000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9B590000
heap
page read and write
23A9EFBE000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A9CCFC000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A92535000
heap
page read and write
23A9CD83000
trusted library allocation
page read and write
23AA4A41000
trusted library allocation
page read and write
23AA34E4000
trusted library allocation
page read and write
23A9E345000
trusted library allocation
page read and write
23AA3966000
trusted library allocation
page read and write
23A9D3DC000
trusted library allocation
page read and write
23AA394E000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9B875000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA378F000
trusted library allocation
page read and write
23AA3DF6000
trusted library allocation
page read and write
17747249000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
23AA34EE000
trusted library allocation
page read and write
23A9CBE0000
trusted library allocation
page read and write
2526F510000
trusted library allocation
page read and write
23AA3984000
trusted library allocation
page read and write
23A9D52F000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9CBBA000
trusted library allocation
page read and write
23AA3DFE000
trusted library allocation
page read and write
2526F412000
trusted library allocation
page read and write
23A98BAE000
trusted library allocation
page read and write
23A9E3AB000
trusted library allocation
page read and write
23A9C5E7000
trusted library allocation
page read and write
23AA39F2000
trusted library allocation
page read and write
23AA34EE000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A92519000
heap
page read and write
23AA5DB1000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9F5D4000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23A98C6B000
trusted library allocation
page read and write
23A9F3EF000
trusted library allocation
page read and write
23AA3563000
trusted library allocation
page read and write
23A9B27D000
trusted library allocation
page read and write
23A9C19A000
trusted library allocation
page read and write
23AA3CA2000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A98BCB000
trusted library allocation
page read and write
23AA35E1000
trusted library allocation
page read and write
23A92503000
heap
page read and write
23A9F6A1000
trusted library allocation
page read and write
23A9B2C3000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23AA3813000
trusted library allocation
page read and write
23A9CD57000
trusted library allocation
page read and write
23A9F3F6000
trusted library allocation
page read and write
25270121000
heap
page read and write
23A9B9CB000
trusted library allocation
page read and write
23A985CC000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23AA3C68000
trusted library allocation
page read and write
2526FC08000
heap
page read and write
23A9AEE5000
trusted library allocation
page read and write
23A9CC25000
trusted library allocation
page read and write
23A9AE35000
trusted library allocation
page read and write
23AA6D04000
trusted library allocation
page read and write
23AA3CB3000
trusted library allocation
page read and write
23A9D2EC000
trusted library allocation
page read and write
258FBC00000
trusted library allocation
page read and write
EE507BE000
stack
page read and write
23AA37CE000
trusted library allocation
page read and write
23A9BC98000
trusted library allocation
page read and write
23A9CBB1000
trusted library allocation
page read and write
23A9EFE0000
trusted library allocation
page read and write
23A9BAB6000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A98BE2000
trusted library allocation
page read and write
23A9DEA6000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA39D8000
trusted library allocation
page read and write
23A9CB9B000
trusted library allocation
page read and write
23AA3531000
trusted library allocation
page read and write
2526FBDF000
heap
page read and write
23A9F0EC000
trusted library allocation
page read and write
EE4D5D8000
stack
page read and write
23A9C1EC000
trusted library allocation
page read and write
23A98BE2000
trusted library allocation
page read and write
23A9E564000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
23A9B590000
heap
page read and write
23A92515000
heap
page read and write
23AA55CC000
trusted library allocation
page read and write
23A9D0E9000
trusted library allocation
page read and write
23AA39D4000
trusted library allocation
page read and write
23A9DFF9000
trusted library allocation
page read and write
23AA3966000
trusted library allocation
page read and write
23A9BAFB000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9B4E5000
heap
page read and write
23A9EF50000
trusted library allocation
page read and write
23A9CE5B000
trusted library allocation
page read and write
23A98BA7000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23A9CBC1000
trusted library allocation
page read and write
23A9F3E5000
trusted library allocation
page read and write
23A9D0F0000
trusted library allocation
page read and write
23A9D2C4000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23AA3941000
trusted library allocation
page read and write
23A9F3F2000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23A9FF0B000
trusted library allocation
page read and write
23A9BCD5000
trusted library allocation
page read and write
23AA3CF9000
trusted library allocation
page read and write
23A9CDCF000
trusted library allocation
page read and write
23AA3CD5000
trusted library allocation
page read and write
2526F5C4000
heap
page read and write
23AA3D43000
trusted library allocation
page read and write
23AA3CBC000
trusted library allocation
page read and write
2527016D000
heap
page read and write
2526FBCC000
heap
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9DFF1000
trusted library allocation
page read and write
23A9CE74000
trusted library allocation
page read and write
23A9B2C6000
trusted library allocation
page read and write
23A9D948000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A9CAE7000
trusted library allocation
page read and write
23A9D17A000
trusted library allocation
page read and write
23AA55FC000
trusted library allocation
page read and write
23AA3DF6000
trusted library allocation
page read and write
23A9D5D0000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9D07F000
trusted library allocation
page read and write
23A9B894000
trusted library allocation
page read and write
23AA0102000
trusted library allocation
page read and write
23AA37C9000
trusted library allocation
page read and write
258FBDA8000
trusted library allocation
page read and write
23A9CEFB000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A92515000
heap
page read and write
23AA3DF8000
trusted library allocation
page read and write
EE4FFBE000
unkown
page readonly
23A9D943000
trusted library allocation
page read and write
23A9D4F6000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A9D2DA000
trusted library allocation
page read and write
23AA354D000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A98BE2000
trusted library allocation
page read and write
258FBAB2000
unclassified section
page read and write
23A92515000
heap
page read and write
23AA4AD2000
trusted library allocation
page read and write
23A9D2C2000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9D559000
trusted library allocation
page read and write
23AA36C0000
trusted library allocation
page read and write
23AA62A2000
trusted library allocation
page read and write
23A9CCC2000
trusted library allocation
page read and write
23A9F032000
trusted library allocation
page read and write
23A9AEF6000
trusted library allocation
page read and write
23A9CBC3000
trusted library allocation
page read and write
23A9E509000
trusted library allocation
page read and write
23AA556C000
trusted library allocation
page read and write
23AA3CC5000
trusted library allocation
page read and write
23A9CD9D000
trusted library allocation
page read and write
23AA35E3000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23A924E9000
heap
page read and write
23A9B271000
trusted library allocation
page read and write
258FBE50000
heap
page read and write
23A9B9CB000
trusted library allocation
page read and write
23A9FF2F000
trusted library allocation
page read and write
23A9BA8C000
trusted library allocation
page read and write
23A9C181000
trusted library allocation
page read and write
23A98B3B000
trusted library allocation
page read and write
1A78E01E000
trusted library allocation
page execute read
23AA3A06000
trusted library allocation
page read and write
23A9CD88000
trusted library allocation
page read and write
23A975DB000
trusted library allocation
page read and write
23A98BC9000
trusted library allocation
page read and write
23A9D374000
trusted library allocation
page read and write
23A9F1CD000
trusted library allocation
page read and write
23AA78BF000
trusted library allocation
page read and write
23A9CE5B000
trusted library allocation
page read and write
23A9DDD2000
trusted library allocation
page read and write
23A9C1BF000
trusted library allocation
page read and write
15FE000
stack
page read and write
23AA39CF000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9D362000
trusted library allocation
page read and write
23A9D4F0000
trusted library allocation
page read and write
3D6661224000
trusted library allocation
page read and write
23A9B2D1000
trusted library allocation
page read and write
23A9CE3A000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9CD81000
trusted library allocation
page read and write
23A9F1F1000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9BA8C000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9CCE8000
trusted library allocation
page read and write
26F788AF000
heap
page read and write
23A924B9000
heap
page read and write
23AA36B0000
trusted library allocation
page read and write
2526F4B1000
trusted library allocation
page read and write
23A98C65000
trusted library allocation
page read and write
23A9CCE8000
trusted library allocation
page read and write
23A9B86D000
trusted library allocation
page read and write
23AA4ACA000
trusted library allocation
page read and write
2526FBEA000
heap
page read and write
2526F469000
trusted library allocation
page read and write
23A9D0C6000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
280ECF0A000
trusted library allocation
page read and write
23A9BA6D000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9CDB2000
trusted library allocation
page read and write
18AD000
heap
page read and write
23A9CAD7000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9D37A000
trusted library allocation
page read and write
23A97526000
trusted library allocation
page read and write
23AA4AD2000
trusted library allocation
page read and write
23A9B282000
trusted library allocation
page read and write
23A9CEBC000
trusted library allocation
page read and write
23A9D048000
trusted library allocation
page read and write
23AA34E0000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
26F76E5A000
heap
page read and write
23A98BA7000
trusted library allocation
page read and write
23AA3DEF000
trusted library allocation
page read and write
23A9DA2B000
trusted library allocation
page read and write
23A9B54C000
heap
page read and write
23A9F3BC000
trusted library allocation
page read and write
23A9D23E000
trusted library allocation
page read and write
23A9CB06000
trusted library allocation
page read and write
23AA369C000
trusted library allocation
page read and write
26F788AE000
heap
page read and write
23A9BA69000
trusted library allocation
page read and write
23AA378F000
trusted library allocation
page read and write
23A9D235000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9BA95000
trusted library allocation
page read and write
1734000
heap
page read and write
23AA4ACA000
trusted library allocation
page read and write
23A9B95D000
trusted library allocation
page read and write
23A9E579000
trusted library allocation
page read and write
937D1FE000
stack
page read and write
23A9E5FB000
trusted library allocation
page read and write
23A9DFAC000
trusted library allocation
page read and write
23A9BA3B000
trusted library allocation
page read and write
280ECD3A000
heap
page read and write
23A9F15A000
trusted library allocation
page read and write
23A9EF97000
trusted library allocation
page read and write
23A9D0E2000
trusted library allocation
page read and write
23A9D1CD000
trusted library allocation
page read and write
23A9F01F000
trusted library allocation
page read and write
23A98BA5000
trusted library allocation
page read and write
23A9F3EC000
trusted library allocation
page read and write
23A9DDB6000
trusted library allocation
page read and write
23A9D5EC000
trusted library allocation
page read and write
23A9C5BE000
trusted library allocation
page read and write
23AA3C1E000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23A9CE8E000
trusted library allocation
page read and write
23AA3948000
trusted library allocation
page read and write
23A98B69000
trusted library allocation
page read and write
2526F400000
trusted library allocation
page read and write
23AA78BF000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D294000
trusted library allocation
page read and write
23A9CB0F000
trusted library allocation
page read and write
23A985C3000
trusted library allocation
page read and write
23A9BAB5000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A92519000
heap
page read and write
23A98BC9000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23AA37C1000
trusted library allocation
page read and write
23AA39AC000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9B975000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23AA3D3F000
trusted library allocation
page read and write
23A9DD84000
trusted library allocation
page read and write
23A98BC7000
trusted library allocation
page read and write
23A9E543000
trusted library allocation
page read and write
23A9CBFC000
trusted library allocation
page read and write
23A96E90000
trusted library allocation
page read and write
23AA35E3000
trusted library allocation
page read and write
23A9B58A000
heap
page read and write
23A9D593000
trusted library allocation
page read and write
23AA39A0000
trusted library allocation
page read and write
23A9BABE000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A9D533000
trusted library allocation
page read and write
23AA39CF000
trusted library allocation
page read and write
23A9F6F3000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A924E9000
heap
page read and write
23A92519000
heap
page read and write
23AA3CE3000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9DFF4000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23AA34D8000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23A9D177000
trusted library allocation
page read and write
23A9CD9F000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9D4ED000
trusted library allocation
page read and write
23A9D290000
trusted library allocation
page read and write
2527013B000
heap
page read and write
23A9CBF7000
trusted library allocation
page read and write
23AA3968000
trusted library allocation
page read and write
23A9CE55000
trusted library allocation
page read and write
EE4EEFE000
stack
page read and write
23A92520000
heap
page read and write
23A9BA69000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23A9FEAE000
trusted library allocation
page read and write
23A97600000
trusted library allocation
page read and write
23A9AE22000
trusted library allocation
page read and write
23A9B271000
trusted library allocation
page read and write
23AA6151000
trusted library allocation
page read and write
23AA4A8E000
trusted library allocation
page read and write
23AA3DD7000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9D1D5000
trusted library allocation
page read and write
23A9C1B1000
trusted library allocation
page read and write
23A9D943000
trusted library allocation
page read and write
23A9BA84000
trusted library allocation
page read and write
23A9BA90000
trusted library allocation
page read and write
23AA5DFC000
trusted library allocation
page read and write
23A9D4F7000
trusted library allocation
page read and write
23A9E54B000
trusted library allocation
page read and write
26C497E000
unkown
page readonly
23A9D948000
trusted library allocation
page read and write
258FBD03000
trusted library allocation
page read and write
23A9F59A000
trusted library allocation
page read and write
23A9B50E000
heap
page read and write
23A9B57E000
heap
page read and write
25270003000
trusted library allocation
page read and write
23AA5BB8000
heap
page read and write
23A9D23F000
trusted library allocation
page read and write
23A9D24B000
trusted library allocation
page read and write
23AA394B000
trusted library allocation
page read and write
23A9D0C0000
trusted library allocation
page read and write
23AA41F6000
trusted library allocation
page read and write
FEE000
stack
page read and write
23A924E2000
heap
page read and write
258FBD62000
trusted library allocation
page read and write
23A9CBE6000
trusted library allocation
page read and write
2526FC4D000
heap
page read and write
23AA3CD3000
trusted library allocation
page read and write
23A9CC7E000
trusted library allocation
page read and write
23A9CC73000
trusted library allocation
page read and write
23AA78ED000
trusted library allocation
page read and write
23A9E532000
trusted library allocation
page read and write
23A9BCCA000
trusted library allocation
page read and write
23AA34EA000
trusted library allocation
page read and write
23AA5300000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A924F7000
heap
page read and write
280ECF00000
trusted library allocation
page read and write
23A924CB000
heap
page read and write
23AA3C64000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9CB57000
trusted library allocation
page read and write
23A98C73000
trusted library allocation
page read and write
23A9CEA8000
trusted library allocation
page read and write
23A92515000
heap
page read and write
1710000
heap
page read and write
23A9EFF5000
trusted library allocation
page read and write
23AA3953000
trusted library allocation
page read and write
23A9CBF7000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
17747200000
trusted library allocation
page read and write
23A9D298000
trusted library allocation
page read and write
23A9D23F000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23A9CC91000
trusted library allocation
page read and write
23A9BAD3000
trusted library allocation
page read and write
23A9DFF9000
trusted library allocation
page read and write
23A9F5D4000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
23A9D593000
trusted library allocation
page read and write
23A9DFEA000
trusted library allocation
page read and write
23A9F18A000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23AA39D2000
trusted library allocation
page read and write
23A92503000
heap
page read and write
23A9CE80000
trusted library allocation
page read and write
23A9BA3B000
trusted library allocation
page read and write
23A9D9CB000
trusted library allocation
page read and write
23AA35B0000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
C5F615C000
stack
page read and write
23A92515000
heap
page read and write
23A9F6A6000
trusted library allocation
page read and write
23A9D49D000
trusted library allocation
page read and write
23A9D2B0000
trusted library allocation
page read and write
23A98BE2000
trusted library allocation
page read and write
23A9CD9D000
trusted library allocation
page read and write
26F76DD0000
heap
page read and write
258FB850000
unclassified section
page readonly
23A9D0ED000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
23A9F17D000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A9D245000
trusted library allocation
page read and write
1A78DFD1000
trusted library allocation
page execute read
23AA41C1000
trusted library allocation
page read and write
23A9D2EC000
trusted library allocation
page read and write
23A9CFF8000
trusted library allocation
page read and write
23A9B585000
heap
page read and write
23A9CB3F000
trusted library allocation
page read and write
23AA3AFB000
trusted library allocation
page read and write
258FBF00000
trusted library allocation
page read and write
258FBDC8000
trusted library allocation
page read and write
23A9B987000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A9F3F7000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9C147000
trusted library allocation
page read and write
23A98C29000
trusted library allocation
page read and write
23A9B884000
trusted library allocation
page read and write
23AA5D59000
trusted library allocation
page read and write
23A9D2FE000
trusted library allocation
page read and write
23AA39D8000
trusted library allocation
page read and write
23A9E4AC000
trusted library allocation
page read and write
23A9D255000
trusted library allocation
page read and write
23A9CDE4000
trusted library allocation
page read and write
23AA5B36000
heap
page read and write
23A9253B000
heap
page read and write
23A9EF9B000
trusted library allocation
page read and write
23AA37DA000
trusted library allocation
page read and write
23A9BA5B000
trusted library allocation
page read and write
23A9CDA3000
trusted library allocation
page read and write
23A92520000
heap
page read and write
23A9B54B000
heap
page read and write
EE4EEBE000
unkown
page readonly
23AA4AB6000
trusted library allocation
page read and write
23AA55CD000
trusted library allocation
page read and write
23A924EA000
heap
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9D4B5000
trusted library allocation
page read and write
23A9D94F000
trusted library allocation
page read and write
258FBAA0000
heap
page readonly
23A9CE66000
trusted library allocation
page read and write
23AA394E000
trusted library allocation
page read and write
23AA36A2000
trusted library allocation
page read and write
23A9DE2B000
trusted library allocation
page read and write
23A9CFBE000
trusted library allocation
page read and write
23A9D582000
trusted library allocation
page read and write
23A9D2C2000
trusted library allocation
page read and write
23A9F6B7000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A92519000
heap
page read and write
23A9B590000
heap
page read and write
23A924FC000
heap
page read and write
23A9D0AA000
trusted library allocation
page read and write
2526F2B0000
trusted library allocation
page read and write
15EF000
stack
page read and write
23A9DC4B000
trusted library allocation
page read and write
23AA394B000
trusted library allocation
page read and write
23A9C190000
trusted library allocation
page read and write
23A9D0DF000
trusted library allocation
page read and write
1734000
heap
page read and write
23A9CCD8000
trusted library allocation
page read and write
23A9844A000
trusted library allocation
page read and write
23AA3ADF000
trusted library allocation
page read and write
2526FC46000
heap
page read and write
23AA55CE000
trusted library allocation
page read and write
23A9BA39000
trusted library allocation
page read and write
23A9BC8C000
trusted library allocation
page read and write
23A9D934000
trusted library allocation
page read and write
23A9C1EC000
trusted library allocation
page read and write
23A9CE2D000
trusted library allocation
page read and write
C5F83FE000
unkown
page readonly
23A9D357000
trusted library allocation
page read and write
23AA3DC5000
trusted library allocation
page read and write
25270158000
heap
page read and write
23A9B50E000
heap
page read and write
23A9D5EC000
trusted library allocation
page read and write
23A9D0E9000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23A9BC73000
trusted library allocation
page read and write
23AA7002000
trusted library allocation
page read and write
23A9CB9E000
trusted library allocation
page read and write
177470B0000
heap
page readonly
23A9B59E000
heap
page read and write
23A924FC000
heap
page read and write
23A9F12F000
trusted library allocation
page read and write
2526F262000
unclassified section
page read and write
23AA3ADF000
trusted library allocation
page read and write
258FBD68000
trusted library allocation
page read and write
23A9AE53000
trusted library allocation
page read and write
23A9D1F9000
trusted library allocation
page read and write
23A9CED8000
trusted library allocation
page read and write
23A975B0000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A924FC000
heap
page read and write
23A9D2E0000
trusted library allocation
page read and write
23AA36FD000
trusted library allocation
page read and write
23A9D21B000
trusted library allocation
page read and write
23A9D1E7000
trusted library allocation
page read and write
23A9B98C000
trusted library allocation
page read and write
23A9B4F8000
heap
page read and write
23AA37AC000
trusted library allocation
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9DFDB000
trusted library allocation
page read and write
23A9CB54000
trusted library allocation
page read and write
23A9B96C000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23A9D52C000
trusted library allocation
page read and write
23A9B9A2000
trusted library allocation
page read and write
23AA55A2000
trusted library allocation
page read and write
23A92529000
heap
page read and write
26F788A2000
heap
page read and write
23AA3797000
trusted library allocation
page read and write
23AA3787000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
1820000
heap
page read and write
23A924FC000
heap
page read and write
23A9F059000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9F3A2000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23AA3AE7000
trusted library allocation
page read and write
23AA3715000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A9DFF9000
trusted library allocation
page read and write
23A9CC83000
trusted library allocation
page read and write
26F788A4000
heap
page read and write
2526FC48000
heap
page read and write
23A9CDCF000
trusted library allocation
page read and write
23AA35A5000
trusted library allocation
page read and write
23A9F076000
trusted library allocation
page read and write
23A98C6F000
trusted library allocation
page read and write
23AA41F4000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
23A98CFC000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A92515000
heap
page read and write
23A9D54A000
trusted library allocation
page read and write
23A9D19F000
trusted library allocation
page read and write
258FBD6E000
trusted library allocation
page read and write
23A9846C000
trusted library allocation
page read and write
23A9B52C000
heap
page read and write
23AA5BE3000
heap
page read and write
23A924F3000
heap
page read and write
23AA39C4000
trusted library allocation
page read and write
23A9E52B000
trusted library allocation
page read and write
23AA3527000
trusted library allocation
page read and write
23AA3563000
trusted library allocation
page read and write
23AA3776000
trusted library allocation
page read and write
23AA3DEA000
trusted library allocation
page read and write
23A9DFF1000
trusted library allocation
page read and write
23A9EF54000
trusted library allocation
page read and write
23A9DCF4000
trusted library allocation
page read and write
23AA3948000
trusted library allocation
page read and write
23AA559F000
trusted library allocation
page read and write
2526F26F000
unclassified section
page read and write
23A9CE68000
trusted library allocation
page read and write
23A9C142000
trusted library allocation
page read and write
23AA3966000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23A98BAE000
trusted library allocation
page read and write
23A9D132000
trusted library allocation
page read and write
23A9D0CF000
trusted library allocation
page read and write
23A9C5DB000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
2527016D000
heap
page read and write
23A9BABE000
trusted library allocation
page read and write
23AA35A5000
trusted library allocation
page read and write
23AA39C7000
trusted library allocation
page read and write
23A9B525000
heap
page read and write
23A9DFF7000
trusted library allocation
page read and write
23A9AE4A000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9D376000
trusted library allocation
page read and write
23AA3DDC000
trusted library allocation
page read and write
40E1000
heap
page read and write
23A9D91C000
trusted library allocation
page read and write
23A9E32E000
trusted library allocation
page read and write
23A9D1E9000
trusted library allocation
page read and write
23A9B89B000
trusted library allocation
page read and write
2527016D000
heap
page read and write
23A9F152000
trusted library allocation
page read and write
23AA39AC000
trusted library allocation
page read and write
23AA3CD5000
trusted library allocation
page read and write
23A9E31D000
trusted library allocation
page read and write
23A9CBE0000
trusted library allocation
page read and write
23A98BC7000
trusted library allocation
page read and write
23A9D354000
trusted library allocation
page read and write
23A9CBEE000
trusted library allocation
page read and write
E1D85FE000
stack
page read and write
23AA55AF000
trusted library allocation
page read and write
23A9EF9B000
trusted library allocation
page read and write
23AA37B3000
trusted library allocation
page read and write
23A9CBE6000
trusted library allocation
page read and write
23AA3957000
trusted library allocation
page read and write
23A98BDE000
trusted library allocation
page read and write
23AA6147000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23AA3797000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9B50E000
heap
page read and write
23AA78C1000
trusted library allocation
page read and write
23A92536000
heap
page read and write
2526F42F000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A98BA0000
trusted library allocation
page read and write
23A9D2AA000
trusted library allocation
page read and write
258FBD96000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9795E000
trusted library allocation
page read and write
23A9D923000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9F3E8000
trusted library allocation
page read and write
23AA62FE000
trusted library allocation
page read and write
23A9C14E000
trusted library allocation
page read and write
23A9AE5D000
trusted library allocation
page read and write
23A9DFD3000
trusted library allocation
page read and write
23A9CAE7000
trusted library allocation
page read and write
2526FC41000
heap
page read and write
23A924E2000
heap
page read and write
23A9D0E3000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9CDC5000
trusted library allocation
page read and write
23A9F6F7000
trusted library allocation
page read and write
23A9BA95000
trusted library allocation
page read and write
23A9251D000
heap
page read and write
23A9F17D000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A98BBE000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23AA3DFC000
trusted library allocation
page read and write
23A924D5000
heap
page read and write
23A9B21F000
trusted library allocation
page read and write
21F0000
heap
page read and write
23AA3C96000
trusted library allocation
page read and write
177473D0000
heap
page read and write
23A9DE90000
trusted library allocation
page read and write
23A9D0BF000
trusted library allocation
page read and write
23AA39D2000
trusted library allocation
page read and write
23A9D3C3000
trusted library allocation
page read and write
23A9252A000
heap
page read and write
2526FBCC000
heap
page read and write
23A98C4E000
trusted library allocation
page read and write
23A9EFF5000
trusted library allocation
page read and write
23A9BA7A000
trusted library allocation
page read and write
23A9EF69000
trusted library allocation
page read and write
23A98556000
trusted library allocation
page read and write
23A9D33D000
trusted library allocation
page read and write
23A92523000
heap
page read and write
17747211000
trusted library allocation
page read and write
23A9CDE4000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9CFF3000
trusted library allocation
page read and write
23AA3D15000
trusted library allocation
page read and write
23A92520000
heap
page read and write
23AA39C4000
trusted library allocation
page read and write
23AA3935000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9E550000
trusted library allocation
page read and write
23A9BA76000
trusted library allocation
page read and write
23A9CDD7000
trusted library allocation
page read and write
23A9D21B000
trusted library allocation
page read and write
23A9D53A000
trusted library allocation
page read and write
23A9AE4D000
trusted library allocation
page read and write
258FBF1D000
trusted library allocation
page read and write
23A9B591000
heap
page read and write
2526F410000
trusted library allocation
page read and write
23AA365C000
trusted library allocation
page read and write
23A9D515000
trusted library allocation
page read and write
23A98B09000
trusted library allocation
page read and write
23A9D5F1000
trusted library allocation
page read and write
23A9D1D8000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23AA39AF000
trusted library allocation
page read and write
23A9B290000
trusted library allocation
page read and write
23A9AE61000
trusted library allocation
page read and write
23AA3ACF000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23AA3C2D000
trusted library allocation
page read and write
23A9F0EC000
trusted library allocation
page read and write
23A9F3FC000
trusted library allocation
page read and write
23A9252B000
heap
page read and write
23A9F063000
trusted library allocation
page read and write
23A9CC85000
trusted library allocation
page read and write
23A9E3A3000
trusted library allocation
page read and write
23A9F0CF000
trusted library allocation
page read and write
17746E60000
unclassified section
page readonly
23A9B9A2000
trusted library allocation
page read and write
23AA38A1000
trusted library allocation
page read and write
23A9DFF7000
trusted library allocation
page read and write
23A9D022000
trusted library allocation
page read and write
2526FC48000
heap
page read and write
2526FBAD000
heap
page read and write
23A9C1C3000
trusted library allocation
page read and write
23A9D0E9000
trusted library allocation
page read and write
23A924EF000
heap
page read and write
23A98CE7000
trusted library allocation
page read and write
17747246000
trusted library allocation
page read and write
23AA3AE7000
trusted library allocation
page read and write
23AA41EF000
trusted library allocation
page read and write
23AA39BA000
trusted library allocation
page read and write
23A9E3AD000
trusted library allocation
page read and write
18B0000
heap
page read and write
23A9DE54000
trusted library allocation
page read and write
23A924C0000
heap
page read and write
23AA3500000
trusted library allocation
page read and write
23AA36C0000
trusted library allocation
page read and write
23A9DDE2000
trusted library allocation
page read and write
23A9EF5D000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A924FC000
heap
page read and write
23A92523000
heap
page read and write
23A9EFB1000
trusted library allocation
page read and write
3D666121E000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A97566000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A924E8000
heap
page read and write
2527013B000
heap
page read and write
23A975BC000
trusted library allocation
page read and write
2526F080000
unclassified section
page readonly
23A9DCFE000
trusted library allocation
page read and write
23A9D554000
trusted library allocation
page read and write
1730000
heap
page read and write
23A974F6000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A924EE000
heap
page read and write
2526FB61000
heap
page read and write
23A9BABB000
trusted library allocation
page read and write
23A9C5D0000
trusted library allocation
page read and write
23AA78ED000
trusted library allocation
page read and write
23AA36F4000
trusted library allocation
page read and write
23A9CEDB000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
2526F260000
unclassified section
page read and write
23A9D935000
trusted library allocation
page read and write
23A9F37C000
trusted library allocation
page read and write
23A9CBAE000
trusted library allocation
page read and write
23A9F04F000
trusted library allocation
page read and write
1774721B000
trusted library allocation
page read and write
23AA78B0000
trusted library allocation
page read and write
23AA3C64000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23A96EEF000
trusted library allocation
page read and write
23A9B54C000
heap
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9E5E9000
trusted library allocation
page read and write
23A924E4000
heap
page read and write
23A924E2000
heap
page read and write
23AA35E9000
trusted library allocation
page read and write
23AA4A85000
trusted library allocation
page read and write
23A9F3AA000
trusted library allocation
page read and write
23A9D560000
trusted library allocation
page read and write
23A9CAFA000
trusted library allocation
page read and write
23A9D3E0000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9B590000
heap
page read and write
23A98B64000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23AA3780000
trusted library allocation
page read and write
23AA3D0C000
trusted library allocation
page read and write
23AA3CB3000
trusted library allocation
page read and write
23A8D0C4000
heap
page read and write
23AA78C1000
trusted library allocation
page read and write
23A9DCF6000
trusted library allocation
page read and write
23A9D0B9000
trusted library allocation
page read and write
23A9D389000
trusted library allocation
page read and write
23A9253E000
heap
page read and write
23A9D262000
trusted library allocation
page read and write
23A9E3E3000
trusted library allocation
page read and write
23AA35FB000
trusted library allocation
page read and write
2526F270000
trusted library section
page readonly
23A9D21A000
trusted library allocation
page read and write
23A9AE61000
trusted library allocation
page read and write
23AA5585000
trusted library allocation
page read and write
23AA34CE000
trusted library allocation
page read and write
23A9B969000
trusted library allocation
page read and write
23AA39B5000
trusted library allocation
page read and write
23A9D049000
trusted library allocation
page read and write
23AA3A22000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A924B9000
heap
page read and write
23A9C5D3000
trusted library allocation
page read and write
23A9F319000
trusted library allocation
page read and write
23A9C16A000
trusted library allocation
page read and write
2527012A000
heap
page read and write
23A9B59E000
heap
page read and write
23A9252C000
heap
page read and write
23A9D26C000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23AA3941000
trusted library allocation
page read and write
177472B6000
trusted library allocation
page read and write
23A9CBC3000
trusted library allocation
page read and write
23A9F3E8000
trusted library allocation
page read and write
26F76E81000
heap
page read and write
23A924DD000
heap
page read and write
23AA3773000
trusted library allocation
page read and write
23A9BCF9000
trusted library allocation
page read and write
23A9B89D000
trusted library allocation
page read and write
23A924D3000
heap
page read and write
23A9E000000
trusted library allocation
page read and write
23A9251E000
heap
page read and write
23AA78ED000
trusted library allocation
page read and write
23A9D298000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
1734000
heap
page read and write
23AA3CE3000
trusted library allocation
page read and write
23A92524000
heap
page read and write
23A98BAE000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A98BE9000
trusted library allocation
page read and write
23AA3966000
trusted library allocation
page read and write
23A9DDDA000
trusted library allocation
page read and write
23A9CEB8000
trusted library allocation
page read and write
23AA39CF000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23AA34CE000
trusted library allocation
page read and write
23A9BA61000
trusted library allocation
page read and write
23A9F14E000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9B290000
trusted library allocation
page read and write
23A9CDD7000
trusted library allocation
page read and write
23AA4A85000
trusted library allocation
page read and write
23A9D05A000
trusted library allocation
page read and write
23A9EF62000
trusted library allocation
page read and write
23A9CEAD000
trusted library allocation
page read and write
23A9253E000
heap
page read and write
23A9DD59000
trusted library allocation
page read and write
23A9FF1A000
trusted library allocation
page read and write
23A9D223000
trusted library allocation
page read and write
26C8C7E000
unkown
page readonly
23A92527000
heap
page read and write
23A9D573000
trusted library allocation
page read and write
23A9CC93000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9B59B000
heap
page read and write
23AA3C75000
trusted library allocation
page read and write
23A98C55000
trusted library allocation
page read and write
23A9D473000
trusted library allocation
page read and write
23AA55C3000
trusted library allocation
page read and write
2526FBC9000
heap
page read and write
23A92532000
heap
page read and write
23A92533000
heap
page read and write
23A9DFC3000
trusted library allocation
page read and write
23A985B1000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA3953000
trusted library allocation
page read and write
17747203000
trusted library allocation
page read and write
23A9B57B000
heap
page read and write
23A9B4F6000
heap
page read and write
23A9CB53000
trusted library allocation
page read and write
23A9D21A000
trusted library allocation
page read and write
23AA394B000
trusted library allocation
page read and write
23AA34F2000
trusted library allocation
page read and write
23A9B527000
heap
page read and write
23A9F555000
trusted library allocation
page read and write
23AA35F5000
trusted library allocation
page read and write
15BF000
stack
page read and write
23A924D5000
heap
page read and write
17C0000
trusted library allocation
page read and write
23AA5541000
trusted library allocation
page read and write
23AA5591000
trusted library allocation
page read and write
23A9AED6000
trusted library allocation
page read and write
23A9CDF2000
trusted library allocation
page read and write
23AA5D18000
trusted library allocation
page read and write
23A9CF79000
trusted library allocation
page read and write
23A9CBA9000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23AA3941000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9F1A6000
trusted library allocation
page read and write
23A9F391000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9D9CA000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9B59E000
heap
page read and write
23AA35F5000
trusted library allocation
page read and write
15DB000
stack
page read and write
23A9CAE7000
trusted library allocation
page read and write
23AA35F5000
trusted library allocation
page read and write
23A9CBB3000
trusted library allocation
page read and write
23A9FF08000
trusted library allocation
page read and write
23A9EFB1000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A92519000
heap
page read and write
23A924E9000
heap
page read and write
23AA3C71000
trusted library allocation
page read and write
15CF000
stack
page read and write
23A9B585000
heap
page read and write
23AA4A44000
trusted library allocation
page read and write
E1D5DFA000
stack
page read and write
23A9D362000
trusted library allocation
page read and write
2526F4E9000
trusted library allocation
page read and write
23A9B4D9000
heap
page read and write
26C63FE000
stack
page read and write
23AA3DF8000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9B525000
heap
page read and write
23AA4ADF000
trusted library allocation
page read and write
23AA4D00000
trusted library allocation
page read and write
23AA37C7000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9F595000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9D1E9000
trusted library allocation
page read and write
2527013B000
heap
page read and write
23A9FF22000
trusted library allocation
page read and write
2526F21A000
heap
page read and write
23AA3640000
trusted library allocation
page read and write
23A9DFC5000
trusted library allocation
page read and write
23A9BCF6000
trusted library allocation
page read and write
23A9AE35000
trusted library allocation
page read and write
23A9D4C9000
trusted library allocation
page read and write
23A9D559000
trusted library allocation
page read and write
23A9B88A000
trusted library allocation
page read and write
23A9DFF1000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A92532000
heap
page read and write
23A9D0F4000
trusted library allocation
page read and write
2526FC4D000
heap
page read and write
23A9BA80000
trusted library allocation
page read and write
23A9F023000
trusted library allocation
page read and write
23A9D9CF000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A92536000
heap
page read and write
23A9D4C9000
trusted library allocation
page read and write
23A9F0F7000
trusted library allocation
page read and write
23AA36AD000
trusted library allocation
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A9CE2D000
trusted library allocation
page read and write
23A9D345000
trusted library allocation
page read and write
23A9DD9F000
trusted library allocation
page read and write
23A9B52C000
heap
page read and write
23AA4A52000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9DEA6000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A9D0F0000
trusted library allocation
page read and write
23A9CC6F000
trusted library allocation
page read and write
23A98560000
trusted library allocation
page read and write
23AA38A5000
trusted library allocation
page read and write
23A98BB8000
trusted library allocation
page read and write
23AA37C6000
trusted library allocation
page read and write
23A9CE4C000
trusted library allocation
page read and write
23A9DEC8000
trusted library allocation
page read and write
23AA39D8000
trusted library allocation
page read and write
23A9D0DF000
trusted library allocation
page read and write
23A9CEB8000
trusted library allocation
page read and write
23AA36FA000
trusted library allocation
page read and write
23AA3CBC000
trusted library allocation
page read and write
23A9DC8C000
trusted library allocation
page read and write
23A9D49D000
trusted library allocation
page read and write
23A9D3ED000
trusted library allocation
page read and write
23A9EFB4000
trusted library allocation
page read and write
2526FC5D000
heap
page read and write
23A924D2000
heap
page read and write
23A9D5EC000
trusted library allocation
page read and write
23A9DEA3000
trusted library allocation
page read and write
23A9CE3F000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9CB4D000
trusted library allocation
page read and write
23AA35DA000
trusted library allocation
page read and write
23A98C9B000
trusted library allocation
page read and write
23AA3987000
trusted library allocation
page read and write
23A9D5C1000
trusted library allocation
page read and write
23AA3953000
trusted library allocation
page read and write
17746F10000
heap
page read and write
23AA378B000
trusted library allocation
page read and write
23A9CE7E000
trusted library allocation
page read and write
23A9B284000
trusted library allocation
page read and write
23A9D9CF000
trusted library allocation
page read and write
23A98C4E000
trusted library allocation
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A9CD64000
trusted library allocation
page read and write
23A9F55F000
trusted library allocation
page read and write
23AA378F000
trusted library allocation
page read and write
23AA4A76000
trusted library allocation
page read and write
23A9F1F8000
trusted library allocation
page read and write
23A9F0EC000
trusted library allocation
page read and write
23A9D23F000
trusted library allocation
page read and write
23A9D5EF000
trusted library allocation
page read and write
23A9CBAC000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9AE5D000
trusted library allocation
page read and write
1A78E041000
trusted library allocation
page execute read
23A924DD000
heap
page read and write
23A98C92000
trusted library allocation
page read and write
23A9EFAA000
trusted library allocation
page read and write
23A924D1000
heap
page read and write
23A9BAB2000
trusted library allocation
page read and write
23AA349E000
trusted library allocation
page read and write
23A9AE66000
trusted library allocation
page read and write
23A9CBB3000
trusted library allocation
page read and write
23A924C7000
heap
page read and write
23A96EC3000
trusted library allocation
page read and write
23A9D9FC000
trusted library allocation
page read and write
23A9B586000
heap
page read and write
23A9DE10000
trusted library allocation
page read and write
23A985A8000
trusted library allocation
page read and write
23A9AEAA000
trusted library allocation
page read and write
23A9CD9F000
trusted library allocation
page read and write
23A9BAD0000
trusted library allocation
page read and write
1A78DFBC000
trusted library allocation
page execute read
23A9D0F0000
trusted library allocation
page read and write
23A9D537000
trusted library allocation
page read and write
23A9AEF1000
trusted library allocation
page read and write
23A9D287000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
23A985E2000
trusted library allocation
page read and write
23A9D105000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9F1A6000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9CB9E000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9F6D0000
trusted library allocation
page read and write
23AA413C000
trusted library allocation
page read and write
23A9DDC4000
trusted library allocation
page read and write
937C1FF000
stack
page read and write
23A924E2000
heap
page read and write
23A9CC55000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23A9B9A2000
trusted library allocation
page read and write
23A985D1000
trusted library allocation
page read and write
23A9D0F0000
trusted library allocation
page read and write
23A9EF54000
trusted library allocation
page read and write
23A9CDD7000
trusted library allocation
page read and write
23A9AE61000
trusted library allocation
page read and write
23A9EFD8000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A98C55000
trusted library allocation
page read and write
23A9B591000
heap
page read and write
23A9EFF5000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23AA36CE000
trusted library allocation
page read and write
26C49FE000
unkown
page readonly
23AA7899000
trusted library allocation
page read and write
1734000
heap
page read and write
23A9DE1B000
trusted library allocation
page read and write
23AA3C11000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A924EE000
heap
page read and write
23A924BB000
heap
page read and write
23A9D37D000
trusted library allocation
page read and write
23A9253F000
heap
page read and write
258FBD7B000
trusted library allocation
page read and write
23AA3797000
trusted library allocation
page read and write
23AA36B1000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A98471000
trusted library allocation
page read and write
23A9DE93000
trusted library allocation
page read and write
23A9CB9E000
trusted library allocation
page read and write
23A9D0ED000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23A9CAC3000
trusted library allocation
page read and write
23A9BA95000
trusted library allocation
page read and write
23AA4A7F000
trusted library allocation
page read and write
23A9D0F6000
trusted library allocation
page read and write
23AA3953000
trusted library allocation
page read and write
23AA3CD3000
trusted library allocation
page read and write
23A9B96F000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A9B22A000
trusted library allocation
page read and write
23A9E3D7000
trusted library allocation
page read and write
23A98BB8000
trusted library allocation
page read and write
23AA3962000
trusted library allocation
page read and write
23AA3A23000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A9D5FB000
trusted library allocation
page read and write
23AA3C96000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9F1C3000
trusted library allocation
page read and write
258FBD5B000
trusted library allocation
page read and write
23AA3AD4000
trusted library allocation
page read and write
23A9DFA6000
trusted library allocation
page read and write
258FBF32000
trusted library allocation
page read and write
23A9D573000
trusted library allocation
page read and write
2526F448000
trusted library allocation
page read and write
26F76F00000
trusted library allocation
page read and write
2526F300000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A9F0D5000
trusted library allocation
page read and write
23A924D6000
heap
page read and write
23A9CE66000
trusted library allocation
page read and write
23AA5573000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA3AF4000
trusted library allocation
page read and write
23AA37C7000
trusted library allocation
page read and write
23A9D0DF000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9D51C000
trusted library allocation
page read and write
2526FBBF000
heap
page read and write
258FBD66000
trusted library allocation
page read and write
23A9CB37000
trusted library allocation
page read and write
23A9CBA6000
trusted library allocation
page read and write
23A9F15A000
trusted library allocation
page read and write
23A9CE8E000
trusted library allocation
page read and write
23A9252D000
heap
page read and write
23A9CE76000
trusted library allocation
page read and write
23A9D5FC000
trusted library allocation
page read and write
23AA4AAA000
trusted library allocation
page read and write
23AA37B7000
trusted library allocation
page read and write
25270177000
heap
page read and write
23AA61E3000
trusted library allocation
page read and write
23A9F3FC000
trusted library allocation
page read and write
23A9B247000
trusted library allocation
page read and write
23A9CBA6000
trusted library allocation
page read and write
23A9D1D7000
trusted library allocation
page read and write
23AA34E0000
trusted library allocation
page read and write
23A98C8B000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9C195000
trusted library allocation
page read and write
23AA3C19000
trusted library allocation
page read and write
23A9B97E000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9D5CC000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9CBAC000
trusted library allocation
page read and write
23A9CB9C000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A9B263000
trusted library allocation
page read and write
23A9F3F6000
trusted library allocation
page read and write
23A9B535000
heap
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A9D099000
trusted library allocation
page read and write
23A9D1FB000
trusted library allocation
page read and write
23A9F1D7000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23AA34F2000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
2526F010000
unclassified section
page readonly
23A9E4A4000
trusted library allocation
page read and write
23A9D5A8000
trusted library allocation
page read and write
23AA4B43000
trusted library allocation
page read and write
23A9BCFA000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A9D5D0000
trusted library allocation
page read and write
2526FC48000
heap
page read and write
23A92515000
heap
page read and write
23A9DE95000
trusted library allocation
page read and write
23A9CDB8000
trusted library allocation
page read and write
23AA3DFC000
trusted library allocation
page read and write
23AA35DD000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9253B000
heap
page read and write
23AA37B3000
trusted library allocation
page read and write
23A9EF87000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
23A9DE7C000
trusted library allocation
page read and write
23AA559C000
trusted library allocation
page read and write
23A9D296000
trusted library allocation
page read and write
23A9D25C000
trusted library allocation
page read and write
23AA5573000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23A9D3A6000
trusted library allocation
page read and write
23A9B251000
trusted library allocation
page read and write
23AA3DF6000
trusted library allocation
page read and write
23A92522000
heap
page read and write
23AA35E3000
trusted library allocation
page read and write
2526F4C7000
trusted library allocation
page read and write
23A9CB99000
trusted library allocation
page read and write
23A9D298000
trusted library allocation
page read and write
23A92515000
heap
page read and write
1888000
heap
page read and write
26F77007000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9F0A3000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A9DCAE000
trusted library allocation
page read and write
23A9DC51000
trusted library allocation
page read and write
23A9F6ED000
trusted library allocation
page read and write
23AA3A0F000
trusted library allocation
page read and write
23A9D224000
trusted library allocation
page read and write
4E4000
unkown
page readonly
23A92540000
heap
page read and write
410000
unkown
page readonly
25270144000
heap
page read and write
23A9F15E000
trusted library allocation
page read and write
23A9D4E8000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23AA394E000
trusted library allocation
page read and write
23A9CEB5000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A924F7000
heap
page read and write
23A9D50A000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9C1BB000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23AA3751000
trusted library allocation
page read and write
23AA3DCA000
trusted library allocation
page read and write
23A9CC45000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A9CDE6000
trusted library allocation
page read and write
EE4E5FE000
stack
page read and write
23A9857D000
trusted library allocation
page read and write
23A9DCB9000
trusted library allocation
page read and write
23A9D0B9000
trusted library allocation
page read and write
280ECD30000
heap
page read and write
23A9F08F000
trusted library allocation
page read and write
23A9C164000
trusted library allocation
page read and write
23A9D41B000
trusted library allocation
page read and write
EE50FBE000
unkown
page readonly
23A9D94F000
trusted library allocation
page read and write
23A98BE6000
trusted library allocation
page read and write
23A924C0000
heap
page read and write
177472C4000
trusted library allocation
page read and write
23A9D0ED000
trusted library allocation
page read and write
23AA37B3000
trusted library allocation
page read and write
23A9D5D0000
trusted library allocation
page read and write
23A9BA67000
trusted library allocation
page read and write
23A924CC000
heap
page read and write
23A9F304000
trusted library allocation
page read and write
23A9DFF7000
trusted library allocation
page read and write
23AA78BD000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9B590000
heap
page read and write
23AA39D8000
trusted library allocation
page read and write
23AA4ACA000
trusted library allocation
page read and write
23AA3D35000
trusted library allocation
page read and write
4D2000
unkown
page readonly
23A9D549000
trusted library allocation
page read and write
23A9EFA2000
trusted library allocation
page read and write
23A9CE98000
trusted library allocation
page read and write
23A924D2000
heap
page read and write
23A9D0BF000
trusted library allocation
page read and write
23A9B863000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
26F76E15000
heap
page read and write
23A9C17D000
trusted library allocation
page read and write
23A9D922000
trusted library allocation
page read and write
2526FBFC000
heap
page read and write
23A9DE2F000
trusted library allocation
page read and write
23A92529000
heap
page read and write
23AA3ACA000
trusted library allocation
page read and write
23A9E364000
trusted library allocation
page read and write
258FBD10000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A9D09B000
trusted library allocation
page read and write
26C6C3E000
stack
page read and write
23A924E4000
heap
page read and write
23AA3962000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
23A9D5F1000
trusted library allocation
page read and write
23A9D588000
trusted library allocation
page read and write
23AA3962000
trusted library allocation
page read and write
23A9CD98000
trusted library allocation
page read and write
23A9D0BC000
trusted library allocation
page read and write
23A9D3ED000
trusted library allocation
page read and write
23A9C195000
trusted library allocation
page read and write
23A9CB8D000
trusted library allocation
page read and write
177472D7000
trusted library allocation
page read and write
23A9EF6F000
trusted library allocation
page read and write
23A9CE6C000
trusted library allocation
page read and write
23A9DC4B000
trusted library allocation
page read and write
23A92506000
heap
page read and write
23A9CC52000
trusted library allocation
page read and write
23A9CB8D000
trusted library allocation
page read and write
2526F200000
heap
page readonly
23AA3C2D000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9D54D000
trusted library allocation
page read and write
23A9CBE0000
trusted library allocation
page read and write
177472F0000
trusted library allocation
page read and write
258FBD23000
trusted library allocation
page read and write
23A98BB8000
trusted library allocation
page read and write
23A97582000
trusted library allocation
page read and write
23A9CC45000
trusted library allocation
page read and write
23A96E81000
trusted library allocation
page read and write
23A9F6D2000
trusted library allocation
page read and write
23A9B2C6000
trusted library allocation
page read and write
23AA78BD000
trusted library allocation
page read and write
23A9E364000
trusted library allocation
page read and write
23A92521000
heap
page read and write
23AA3A30000
trusted library allocation
page read and write
23A9F3EC000
trusted library allocation
page read and write
23A9D943000
trusted library allocation
page read and write
23A9B57B000
heap
page read and write
23AA37D6000
trusted library allocation
page read and write
23AA555C000
trusted library allocation
page read and write
23A9C1EB000
trusted library allocation
page read and write
23AA3945000
trusted library allocation
page read and write
23A9D028000
trusted library allocation
page read and write
23A9D5C1000
trusted library allocation
page read and write
23AA361A000
trusted library allocation
page read and write
23A924CC000
heap
page read and write
23A92528000
heap
page read and write
23A924E1000
heap
page read and write
23A98B7D000
trusted library allocation
page read and write
23A9BA63000
trusted library allocation
page read and write
23AA39D8000
trusted library allocation
page read and write
26F76E6D000
heap
page read and write
23A9D57C000
trusted library allocation
page read and write
23A9C1EB000
trusted library allocation
page read and write
23A9D554000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9BAC6000
trusted library allocation
page read and write
EE4EDFE000
unkown
page readonly
23A9BA69000
trusted library allocation
page read and write
23A924EA000
heap
page read and write
23A9B585000
heap
page read and write
26C7C7E000
unkown
page readonly
177470C0000
unclassified section
page read and write
23A9B99C000
trusted library allocation
page read and write
23A9CB51000
trusted library allocation
page read and write
23AA37B7000
trusted library allocation
page read and write
23A9F309000
trusted library allocation
page read and write
23A9E3B5000
trusted library allocation
page read and write
23A9D700000
trusted library allocation
page read and write
23A9CD9F000
trusted library allocation
page read and write
23A9F5BB000
trusted library allocation
page read and write
23A924D3000
heap
page read and write
258FBA50000
heap
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA377A000
trusted library allocation
page read and write
1A78E03C000
trusted library allocation
page execute read
258FB8C0000
remote allocation
page read and write
23A9F0A3000
trusted library allocation
page read and write
23A9D2FE000
trusted library allocation
page read and write
17747213000
trusted library allocation
page read and write
23AA369E000
trusted library allocation
page read and write
23A9CAFA000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A98BB8000
trusted library allocation
page read and write
23AA39C7000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9CCE6000
trusted library allocation
page read and write
23AA41E3000
trusted library allocation
page read and write
23A924E0000
heap
page read and write
23AA37C6000
trusted library allocation
page read and write
2526F500000
unkown
page execute read
23A9252A000
heap
page read and write
23A924DE000
heap
page read and write
23A9CBA6000
trusted library allocation
page read and write
23A9CED8000
trusted library allocation
page read and write
23A9D0F0000
trusted library allocation
page read and write
23A9D24B000
trusted library allocation
page read and write
23A9D534000
trusted library allocation
page read and write
258FBD47000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9758C000
trusted library allocation
page read and write
23A9BC9B000
trusted library allocation
page read and write
23A97476000
trusted library allocation
page read and write
23AA3AE5000
trusted library allocation
page read and write
23A9F321000
trusted library allocation
page read and write
23A9C19A000
trusted library allocation
page read and write
23A9EFE3000
trusted library allocation
page read and write
23A9D565000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A924D5000
heap
page read and write
23A924F7000
heap
page read and write
23A9E5ED000
trusted library allocation
page read and write
23A9B2B4000
trusted library allocation
page read and write
2526FC40000
heap
page read and write
23A9D596000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9D92E000
trusted library allocation
page read and write
23A9FE67000
trusted library allocation
page read and write
23A9F06E000
trusted library allocation
page read and write
17747267000
trusted library allocation
page read and write
23A9DEDB000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A9D52F000
trusted library allocation
page read and write
23A92532000
heap
page read and write
23AA37B7000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9D5EC000
trusted library allocation
page read and write
23AA5573000
trusted library allocation
page read and write
23AA3A75000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9EF54000
trusted library allocation
page read and write
23A9EF58000
trusted library allocation
page read and write
23AA3C77000
trusted library allocation
page read and write
23A9D54D000
trusted library allocation
page read and write
23A9B84A000
trusted library allocation
page read and write
23A9DED1000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A9F155000
trusted library allocation
page read and write
258FBAC0000
heap
page read and write
23A9D5F1000
trusted library allocation
page read and write
23A9D586000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9B536000
heap
page read and write
23A9251F000
heap
page read and write
23AA3CA6000
trusted library allocation
page read and write
23A924F2000
heap
page read and write
280ECD00000
heap
page read and write
2526FBC3000
heap
page read and write
23A9F32C000
trusted library allocation
page read and write
23A9CB9E000
trusted library allocation
page read and write
23AA4A57000
trusted library allocation
page read and write
23A9B2ED000
trusted library allocation
page read and write
25270177000
heap
page read and write
23AA4A66000
trusted library allocation
page read and write
23A9DC75000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
C5F7BFE000
stack
page read and write
23AA3C1E000
trusted library allocation
page read and write
23A924E7000
heap
page read and write
23AA3D3F000
trusted library allocation
page read and write
23A9D5D0000
trusted library allocation
page read and write
23A924F2000
heap
page read and write
23AA3C71000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
23A9AE90000
trusted library allocation
page read and write
23AA349D000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
23A9CE59000
trusted library allocation
page read and write
23A924DE000
heap
page read and write
23A98BC6000
trusted library allocation
page read and write
23A9CFC7000
trusted library allocation
page read and write
23AA3A27000
trusted library allocation
page read and write
23AA3AF4000
trusted library allocation
page read and write
23A9D9F6000
trusted library allocation
page read and write
23A9D1C8000
trusted library allocation
page read and write
23A9D5EF000
trusted library allocation
page read and write
23A9D913000
trusted library allocation
page read and write
23AA3C71000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9CDE4000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A9E370000
trusted library allocation
page read and write
23A9D17F000
trusted library allocation
page read and write
23A92518000
heap
page read and write
18BF000
heap
page read and write
23A9BA7A000
trusted library allocation
page read and write
23A9CBA6000
trusted library allocation
page read and write
23AA4B80000
trusted library allocation
page read and write
2526F462000
trusted library allocation
page read and write
2526FBC9000
heap
page read and write
23A9D197000
trusted library allocation
page read and write
23A9C186000
trusted library allocation
page read and write
2526FBBC000
heap
page read and write
23A9D2DA000
trusted library allocation
page read and write
23AA3CA2000
trusted library allocation
page read and write
23AA55B0000
trusted library allocation
page read and write
23A9DC64000
trusted library allocation
page read and write
17747262000
trusted library allocation
page read and write
23A9B52C000
heap
page read and write
23A9D5EF000
trusted library allocation
page read and write
23AA3DD5000
trusted library allocation
page read and write
23AA39D4000
trusted library allocation
page read and write
23A9D061000
trusted library allocation
page read and write
23AA4A47000
trusted library allocation
page read and write
23AA3523000
trusted library allocation
page read and write
23AA5B26000
heap
page read and write
23AA3ADF000
trusted library allocation
page read and write
23A9D560000
trusted library allocation
page read and write
23A9AEFA000
trusted library allocation
page read and write
23A9B275000
trusted library allocation
page read and write
23A9CE34000
trusted library allocation
page read and write
23A9CC89000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A9E55B000
trusted library allocation
page read and write
23A9AE5C000
trusted library allocation
page read and write
23A98C9E000
trusted library allocation
page read and write
23AA5B71000
heap
page read and write
23AA3751000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9CB75000
trusted library allocation
page read and write
25270000000
trusted library allocation
page read and write
23AA62F1000
trusted library allocation
page read and write
23A9D16D000
trusted library allocation
page read and write
23A9D3DC000
trusted library allocation
page read and write
23AA5E04000
trusted library allocation
page read and write
2526FC4D000
heap
page read and write
23A9CB77000
trusted library allocation
page read and write
23A92531000
heap
page read and write
23A92523000
heap
page read and write
23A9DD88000
trusted library allocation
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A9CB0D000
trusted library allocation
page read and write
23A9B57C000
heap
page read and write
25270158000
heap
page read and write
23AA38DF000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23A9D5CC000
trusted library allocation
page read and write
23A9D0E9000
trusted library allocation
page read and write
23A9BA70000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A9BCF6000
trusted library allocation
page read and write
23A9D57C000
trusted library allocation
page read and write
23A9D387000
trusted library allocation
page read and write
23AA38FB000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A9B86D000
trusted library allocation
page read and write
23AA4BA3000
trusted library allocation
page read and write
23A9BAC3000
trusted library allocation
page read and write
23A9D5AB000
trusted library allocation
page read and write
23A9E3D1000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A92533000
heap
page read and write
E1D65FE000
stack
page read and write
23A9F577000
trusted library allocation
page read and write
23AA3C96000
trusted library allocation
page read and write
23A9CB9E000
trusted library allocation
page read and write
23A9C147000
trusted library allocation
page read and write
23A9D293000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
25270177000
heap
page read and write
258FBABF000
unclassified section
page read and write
23A9B231000
trusted library allocation
page read and write
23A924C6000
heap
page read and write
23AA3CA1000
trusted library allocation
page read and write
23AA5B3F000
heap
page read and write
23A9B4E9000
heap
page read and write
23A9CB90000
trusted library allocation
page read and write
23A9F6A7000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA3875000
trusted library allocation
page read and write
23A9DE0D000
trusted library allocation
page read and write
23A9EFE0000
trusted library allocation
page read and write
23A9B4E5000
heap
page read and write
1774760C000
trusted library allocation
page read and write
23A9D2FA000
trusted library allocation
page read and write
23A9D19F000
trusted library allocation
page read and write
23A9DDD6000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9BA9B000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23A9BABB000
trusted library allocation
page read and write
23A9CAE7000
trusted library allocation
page read and write
23A9F0CF000
trusted library allocation
page read and write
23A98C5E000
trusted library allocation
page read and write
23A9C1AE000
trusted library allocation
page read and write
23A924D3000
heap
page read and write
2526FBC9000
heap
page read and write
23A9252A000
heap
page read and write
23A9D2CD000
trusted library allocation
page read and write
23AA3657000
trusted library allocation
page read and write
23A9E56C000
trusted library allocation
page read and write
23A9DCEF000
trusted library allocation
page read and write
23A9E51E000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
258FBDCB000
trusted library allocation
page read and write
23A9B272000
trusted library allocation
page read and write
2526F4BC000
trusted library allocation
page read and write
23A9D233000
trusted library allocation
page read and write
23A9D0C4000
trusted library allocation
page read and write
C5F843E000
unkown
page readonly
23A9B59E000
heap
page read and write
23A9DFF1000
trusted library allocation
page read and write
23A9D5F1000
trusted library allocation
page read and write
23A9CCE2000
trusted library allocation
page read and write
23A98BE6000
trusted library allocation
page read and write
23AA3D05000
trusted library allocation
page read and write
23AA3773000
trusted library allocation
page read and write
23AA3DCA000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D0DF000
trusted library allocation
page read and write
23A9B91D000
trusted library allocation
page read and write
23AA788D000
trusted library allocation
page read and write
207F000
stack
page read and write
23A92519000
heap
page read and write
23AA78BD000
trusted library allocation
page read and write
23AA37C0000
trusted library allocation
page read and write
23A9CE3F000
trusted library allocation
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
2526F2FC000
unkown
page execute read
23A9F3BC000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23A9F0D5000
trusted library allocation
page read and write
23A9D573000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A9E5E7000
trusted library allocation
page read and write
23AA36B7000
trusted library allocation
page read and write
23A9BAD3000
trusted library allocation
page read and write
23AA3CFC000
trusted library allocation
page read and write
23A9F3FE000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
23AA5CFC000
trusted library allocation
page read and write
23AA3CC5000
trusted library allocation
page read and write
23A9D560000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
2526FCA0000
heap
page read and write
23AA3962000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
258FBD72000
trusted library allocation
page read and write
23A9CAC0000
trusted library allocation
page read and write
23A9CB95000
trusted library allocation
page read and write
23AA3797000
trusted library allocation
page read and write
23AA35E9000
trusted library allocation
page read and write
26F788B7000
heap
page read and write
23AA3C2D000
trusted library allocation
page read and write
2526F5C6000
heap
page read and write
23A9BCCA000
trusted library allocation
page read and write
23AA3953000
trusted library allocation
page read and write
23AA35CC000
trusted library allocation
page read and write
2526F2F8000
unkown
page execute read
1C6AE9B03000
trusted library allocation
page read and write
23A9C1BD000
trusted library allocation
page read and write
23A9F059000
trusted library allocation
page read and write
23A9D20F000
trusted library allocation
page read and write
23AA5E24000
trusted library allocation
page read and write
23A98CAC000
trusted library allocation
page read and write
23AA3AD5000
trusted library allocation
page read and write
18AB000
heap
page read and write
23A9253B000
heap
page read and write
23A9CC93000
trusted library allocation
page read and write
23A924D1000
heap
page read and write
23A9BAD0000
trusted library allocation
page read and write
23A9D2EC000
trusted library allocation
page read and write
23A975E8000
trusted library allocation
page read and write
4E0000
unkown
page write copy
23AA78C1000
trusted library allocation
page read and write
23A9C16A000
trusted library allocation
page read and write
23A9B12C000
trusted library allocation
page read and write
23A9B525000
heap
page read and write
23A9D191000
trusted library allocation
page read and write
23A9DD5E000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A924DE000
heap
page read and write
23A9CCDC000
trusted library allocation
page read and write
23A9B590000
heap
page read and write
23A924E2000
heap
page read and write
23A9F00B000
trusted library allocation
page read and write
23A9F1D0000
trusted library allocation
page read and write
23A9CBAC000
trusted library allocation
page read and write
23A9D4ED000
trusted library allocation
page read and write
23A924C1000
heap
page read and write
23A9D046000
trusted library allocation
page read and write
EE4CB98000
stack
page read and write
17746EF0000
unclassified section
page readonly
23A9D1DF000
trusted library allocation
page read and write
23A9CEFB000
trusted library allocation
page read and write
23A9DFF4000
trusted library allocation
page read and write
23A9CC97000
trusted library allocation
page read and write
23A924DC000
heap
page read and write
23A9251F000
heap
page read and write
23A9D0FC000
trusted library allocation
page read and write
2526FB69000
heap
page read and write
23A9D5F1000
trusted library allocation
page read and write
23AA3966000
trusted library allocation
page read and write
23A9D945000
trusted library allocation
page read and write
23A98B6F000
trusted library allocation
page read and write
23A92519000
heap
page read and write
26C6C7E000
unkown
page readonly
23A9DFFB000
trusted library allocation
page read and write
410000
unkown
page readonly
23A92523000
heap
page read and write
23A9D2D2000
trusted library allocation
page read and write
23A9D5FD000
trusted library allocation
page read and write
23A975CB000
trusted library allocation
page read and write
23A9B86D000
trusted library allocation
page read and write
25270122000
heap
page read and write
23A924E1000
heap
page read and write
23A9D1C4000
trusted library allocation
page read and write
23A92503000
heap
page read and write
23A9D560000
trusted library allocation
page read and write
23A9D243000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23AA4A76000
trusted library allocation
page read and write
23AA6143000
trusted library allocation
page read and write
4DC000
unkown
page write copy
23A9E5F1000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9BA95000
trusted library allocation
page read and write
26C493E000
stack
page read and write
23AA3CE3000
trusted library allocation
page read and write
23A9CC27000
trusted library allocation
page read and write
23A9D0C9000
trusted library allocation
page read and write
23A9BCC1000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9E53D000
trusted library allocation
page read and write
23A98580000
trusted library allocation
page read and write
40E0000
heap
page read and write
23A92515000
heap
page read and write
23A9B2F9000
trusted library allocation
page read and write
23A9D343000
trusted library allocation
page read and write
23AA3957000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23AA3AF4000
trusted library allocation
page read and write
F90000
heap
page read and write
23A9D2FE000
trusted library allocation
page read and write
23A924C0000
heap
page read and write
23A924F7000
heap
page read and write
23A9C140000
trusted library allocation
page read and write
23AA38D3000
trusted library allocation
page read and write
23A9B4F9000
heap
page read and write
23AA3614000
trusted library allocation
page read and write
23A9D3C3000
trusted library allocation
page read and write
23A9BA80000
trusted library allocation
page read and write
23A9D1C6000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23AA384A000
trusted library allocation
page read and write
258FBD79000
trusted library allocation
page read and write
23A9DFF9000
trusted library allocation
page read and write
23A9E3A8000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
2526F49F000
trusted library allocation
page read and write
23A9D585000
trusted library allocation
page read and write
23A9251A000
heap
page read and write
23A92535000
heap
page read and write
23A924E9000
heap
page read and write
23A9D596000
trusted library allocation
page read and write
23A98BE6000
trusted library allocation
page read and write
26C6BFE000
unkown
page readonly
23A9D0BC000
trusted library allocation
page read and write
23A9B2A6000
trusted library allocation
page read and write
23A9CB5A000
trusted library allocation
page read and write
23A9D590000
trusted library allocation
page read and write
23AA5573000
trusted library allocation
page read and write
17747060000
heap
page read and write
177472B1000
trusted library allocation
page read and write
23AA3AC4000
trusted library allocation
page read and write
23A9B591000
heap
page read and write
2526F478000
trusted library allocation
page read and write
23AA62AC000
trusted library allocation
page read and write
23AA39C4000
trusted library allocation
page read and write
2526F210000
heap
page read and write
23A924DE000
heap
page read and write
23A9D5B0000
trusted library allocation
page read and write
23A9CBC1000
trusted library allocation
page read and write
23A9BCCD000
trusted library allocation
page read and write
23A92525000
heap
page read and write
23A9CE9C000
trusted library allocation
page read and write
23A9B2ED000
trusted library allocation
page read and write
2526FBED000
heap
page read and write
23AA3516000
trusted library allocation
page read and write
23A9D23F000
trusted library allocation
page read and write
23A9D169000
trusted library allocation
page read and write
23A98BE6000
trusted library allocation
page read and write
C5F611E000
unkown
page readonly
23A98BCD000
trusted library allocation
page read and write
23A9E5EF000
trusted library allocation
page read and write
23AA3C75000
trusted library allocation
page read and write
23A9DC8C000
trusted library allocation
page read and write
23AA5B01000
heap
page read and write
2526FC4D000
heap
page read and write
23A9BA67000
trusted library allocation
page read and write
23AA3935000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23A9D287000
trusted library allocation
page read and write
23A9253B000
heap
page read and write
23AA3AE7000
trusted library allocation
page read and write
23A92506000
heap
page read and write
23A9F3B3000
trusted library allocation
page read and write
23AA37AC000
trusted library allocation
page read and write
177470C2000
unclassified section
page read and write
23A9D12D000
trusted library allocation
page read and write
17746F5A000
heap
page read and write
23A9F372000
trusted library allocation
page read and write
23A9F361000
trusted library allocation
page read and write
23A9D2EC000
trusted library allocation
page read and write
23A9D3BE000
trusted library allocation
page read and write
23A9E3DB000
trusted library allocation
page read and write
23A9B57F000
heap
page read and write
23A9CB90000
trusted library allocation
page read and write
411000
unkown
page execute read
23A985BC000
trusted library allocation
page read and write
258FBF1A000
trusted library allocation
page read and write
23A924D6000
heap
page read and write
40E1000
heap
page read and write
23A924EE000
heap
page read and write
23A924D3000
heap
page read and write
23A9C17D000
trusted library allocation
page read and write
23AA34EA000
trusted library allocation
page read and write
23A9DFEB000
trusted library allocation
page read and write
23A9CDE6000
trusted library allocation
page read and write
23AA3C15000
trusted library allocation
page read and write
23AA5D85000
trusted library allocation
page read and write
23A9D9DE000
trusted library allocation
page read and write
1774726B000
trusted library allocation
page read and write
23A9F175000
trusted library allocation
page read and write
23AA6D61000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9D2B2000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9D0FC000
trusted library allocation
page read and write
23A9251D000
heap
page read and write
23A9CE7E000
trusted library allocation
page read and write
23A9D06F000
trusted library allocation
page read and write
23A92521000
heap
page read and write
23A924D6000
heap
page read and write
23A9D34B000
trusted library allocation
page read and write
23A924F2000
heap
page read and write
23A98BBE000
trusted library allocation
page read and write
23A9F6E5000
trusted library allocation
page read and write
23A9E5B2000
trusted library allocation
page read and write
23A9D213000
trusted library allocation
page read and write
23A9BA7A000
trusted library allocation
page read and write
23A9751E000
trusted library allocation
page read and write
23A9EFE3000
trusted library allocation
page read and write
23A9CAEE000
trusted library allocation
page read and write
23A9D9BF000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9D3CA000
trusted library allocation
page read and write
23A9B57D000
heap
page read and write
23AA3D07000
trusted library allocation
page read and write
23AA55D0000
trusted library allocation
page read and write
23A9D582000
trusted library allocation
page read and write
23A9B289000
trusted library allocation
page read and write
EE51FBE000
unkown
page readonly
23AA5542000
trusted library allocation
page read and write
23A9D2EC000
trusted library allocation
page read and write
23AA3C78000
trusted library allocation
page read and write
23A9BA92000
trusted library allocation
page read and write
23A9B89B000
trusted library allocation
page read and write
23AA3A64000
trusted library allocation
page read and write
23AA37B7000
trusted library allocation
page read and write
23AA3C15000
trusted library allocation
page read and write
23A924D1000
heap
page read and write
23A9B583000
heap
page read and write
26F788BD000
heap
page read and write
23A9CC40000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9D21E000
trusted library allocation
page read and write
23A9D4F9000
trusted library allocation
page read and write
18AA000
heap
page read and write
23A9253E000
heap
page read and write
23AA37B7000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9DED7000
trusted library allocation
page read and write
23AA375A000
trusted library allocation
page read and write
23A9B4F3000
heap
page read and write
23A92536000
heap
page read and write
23A98B8B000
trusted library allocation
page read and write
23A924D6000
heap
page read and write
23A9D3BE000
trusted library allocation
page read and write
23A9BA65000
trusted library allocation
page read and write
23A9B50F000
heap
page read and write
23AA78BF000
trusted library allocation
page read and write
25270144000
heap
page read and write
23AA3A12000
trusted library allocation
page read and write
23A9B844000
trusted library allocation
page read and write
23A924D5000
heap
page read and write
23A924F3000
heap
page read and write
23A9E30F000
trusted library allocation
page read and write
23AA377A000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9CB51000
trusted library allocation
page read and write
23A9CAFA000
trusted library allocation
page read and write
23A9B4F9000
heap
page read and write
23A9F15E000
trusted library allocation
page read and write
258FBF39000
trusted library allocation
page read and write
23A9D35A000
trusted library allocation
page read and write
23AA78C1000
trusted library allocation
page read and write
23A9B8BB000
trusted library allocation
page read and write
23AA3A26000
trusted library allocation
page read and write
23A9D290000
trusted library allocation
page read and write
23AA35DA000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A924FC000
heap
page read and write
23AA35DD000
trusted library allocation
page read and write
EE4FF7E000
stack
page read and write
23A9D389000
trusted library allocation
page read and write
23AA3AD4000
trusted library allocation
page read and write
23A9D2E0000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23A9F3FE000
trusted library allocation
page read and write
23A9B4F3000
heap
page read and write
23AA5DF9000
trusted library allocation
page read and write
23AA789E000
trusted library allocation
page read and write
23A9EFE8000
trusted library allocation
page read and write
23AA4A4A000
trusted library allocation
page read and write
23A97471000
trusted library allocation
page read and write
1A78E031000
trusted library allocation
page execute read
2527001D000
trusted library allocation
page read and write
23AA37AC000
trusted library allocation
page read and write
26F77000000
trusted library allocation
page read and write
23A9CB96000
trusted library allocation
page read and write
23A9CA84000
trusted library allocation
page read and write
23A9B586000
heap
page read and write
23A9AEC7000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9F087000
trusted library allocation
page read and write
23AA35DA000
trusted library allocation
page read and write
23A9B97C000
trusted library allocation
page read and write
23A924DD000
heap
page read and write
23A9CF81000
trusted library allocation
page read and write
23AA55CC000
trusted library allocation
page read and write
23A9F3D1000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9C17D000
trusted library allocation
page read and write
23A9E33D000
trusted library allocation
page read and write
E1D75FE000
stack
page read and write
23A9D585000
trusted library allocation
page read and write
23A9BAB5000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A9C1CF000
trusted library allocation
page read and write
23AA3D2A000
trusted library allocation
page read and write
23A9BA9B000
trusted library allocation
page read and write
23AA4ADF000
trusted library allocation
page read and write
23A9EF99000
trusted library allocation
page read and write
23A924D0000
heap
page read and write
23AA38FD000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA37CE000
trusted library allocation
page read and write
23AA3A75000
trusted library allocation
page read and write
1A78E001000
trusted library allocation
page execute read
23A9F56F000
trusted library allocation
page read and write
23A975BC000
trusted library allocation
page read and write
258FC340000
heap
page read and write
23A924E8000
heap
page read and write
23A98B6F000
trusted library allocation
page read and write
23A9D5AA000
trusted library allocation
page read and write
2526FBBC000
heap
page read and write
23A97513000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9BA84000
trusted library allocation
page read and write
2526FC48000
heap
page read and write
23A9CB90000
trusted library allocation
page read and write
23A9B884000
trusted library allocation
page read and write
23A9F3CE000
trusted library allocation
page read and write
23A9F0A3000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
2526FBDD000
heap
page read and write
23A9CDA3000
trusted library allocation
page read and write
23A9CE76000
trusted library allocation
page read and write
23A9BCF6000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9CE3A000
trusted library allocation
page read and write
23AA4AA5000
trusted library allocation
page read and write
23AA34EA000
trusted library allocation
page read and write
23AA3767000
trusted library allocation
page read and write
23A92540000
heap
page read and write
23A9BC62000
trusted library allocation
page read and write
26F76E88000
heap
page read and write
23A924E8000
heap
page read and write
23A9C1BB000
trusted library allocation
page read and write
26C847E000
stack
page read and write
23A9EFE0000
trusted library allocation
page read and write
23A9EFB4000
trusted library allocation
page read and write
23A9D345000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9B4F9000
heap
page read and write
258FBF0C000
trusted library allocation
page read and write
23A9DCDC000
trusted library allocation
page read and write
23A9CC76000
trusted library allocation
page read and write
23A9E573000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
23A9D5C0000
trusted library allocation
page read and write
23AA5DB4000
trusted library allocation
page read and write
23AA396B000
trusted library allocation
page read and write
23A9B4F9000
heap
page read and write
1A78E03E000
trusted library allocation
page execute read
23A9B9A2000
trusted library allocation
page read and write
23A9B578000
heap
page read and write
23AA36F9000
trusted library allocation
page read and write
23AA5539000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23A9D031000
trusted library allocation
page read and write
23AA3C68000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9CBF7000
trusted library allocation
page read and write
23AA5560000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9B525000
heap
page read and write
23A9CBE6000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
23A924E9000
heap
page read and write
23AA78B0000
trusted library allocation
page read and write
23A9D554000
trusted library allocation
page read and write
258FB940000
heap
page read and write
23A9CB27000
trusted library allocation
page read and write
23A9CB75000
trusted library allocation
page read and write
23A9BA84000
trusted library allocation
page read and write
17746F30000
heap
page read and write
23A9BA84000
trusted library allocation
page read and write
23AA3ADF000
trusted library allocation
page read and write
23AA37F2000
trusted library allocation
page read and write
23AA39B1000
trusted library allocation
page read and write
23AA3DF8000
trusted library allocation
page read and write
23A9EFA2000
trusted library allocation
page read and write
23A9DCDF000
trusted library allocation
page read and write
23A9D26C000
trusted library allocation
page read and write
23A9B27D000
trusted library allocation
page read and write
23A9B57F000
heap
page read and write
23A9D25F000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23AA3DF6000
trusted library allocation
page read and write
23A9D2DC000
trusted library allocation
page read and write
23A9D107000
trusted library allocation
page read and write
23AA36B2000
trusted library allocation
page read and write
23A9CE59000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9CB92000
trusted library allocation
page read and write
23A9F080000
trusted library allocation
page read and write
23A98BE6000
trusted library allocation
page read and write
17747224000
trusted library allocation
page read and write
25270158000
heap
page read and write
23A924DD000
heap
page read and write
23A924DD000
heap
page read and write
23A9CB7B000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23A98BF1000
trusted library allocation
page read and write
23A9C1CF000
trusted library allocation
page read and write
23A9CBF7000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA39D8000
trusted library allocation
page read and write
23A924C2000
heap
page read and write
25270177000
heap
page read and write
23A92535000
heap
page read and write
2526FBBC000
heap
page read and write
23A9CE2F000
trusted library allocation
page read and write
23A9E3F2000
trusted library allocation
page read and write
23A924DB000
heap
page read and write
23A9D473000
trusted library allocation
page read and write
2526FC51000
heap
page read and write
23A9D23E000
trusted library allocation
page read and write
2526FC4D000
heap
page read and write
23A9D4E8000
trusted library allocation
page read and write
23A9C190000
trusted library allocation
page read and write
23A9F3FC000
trusted library allocation
page read and write
23A9CB90000
trusted library allocation
page read and write
23A9F393000
trusted library allocation
page read and write
23A92521000
heap
page read and write
23AA3773000
trusted library allocation
page read and write
18BF000
heap
page read and write
258FBD12000
trusted library allocation
page read and write
23A9CFF3000
trusted library allocation
page read and write
23A98B11000
trusted library allocation
page read and write
23A9B875000
trusted library allocation
page read and write
23A9CBFB000
trusted library allocation
page read and write
23A9BA95000
trusted library allocation
page read and write
23AA3856000
trusted library allocation
page read and write
23A9CBE0000
trusted library allocation
page read and write
23AA39C3000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
1774725F000
trusted library allocation
page read and write
23AA61CD000
trusted library allocation
page read and write
23AA4A1C000
trusted library allocation
page read and write
23A975AE000
trusted library allocation
page read and write
23AA39A7000
trusted library allocation
page read and write
23A92529000
heap
page read and write
23A92515000
heap
page read and write
23AA3CBC000
trusted library allocation
page read and write
23A9D5EC000
trusted library allocation
page read and write
177472D2000
trusted library allocation
page read and write
23A9CD9A000
trusted library allocation
page read and write
23A9CE4C000
trusted library allocation
page read and write
23A9D3E0000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23AA37B3000
trusted library allocation
page read and write
23AA3CF9000
trusted library allocation
page read and write
23AA3D35000
trusted library allocation
page read and write
26C53D8000
stack
page read and write
23A9CAFD000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A97519000
trusted library allocation
page read and write
23A9858C000
trusted library allocation
page read and write
23A98BC9000
trusted library allocation
page read and write
2526FBC0000
heap
page read and write
23A924E2000
heap
page read and write
23AA38A7000
trusted library allocation
page read and write
23AA35E9000
trusted library allocation
page read and write
26F788A0000
heap
page read and write
23A9CB73000
trusted library allocation
page read and write
23A9858F000
trusted library allocation
page read and write
23AA62F0000
trusted library allocation
page read and write
23AA3624000
trusted library allocation
page read and write
23A9D2F0000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A92535000
heap
page read and write
23A9CFF9000
trusted library allocation
page read and write
23A9C1B5000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23AA3639000
trusted library allocation
page read and write
23A92523000
heap
page read and write
1774725D000
trusted library allocation
page read and write
23A92531000
heap
page read and write
23A9B8B4000
trusted library allocation
page read and write
23A9F3C5000
trusted library allocation
page read and write
23A9DC30000
trusted library allocation
page read and write
258FBE56000
heap
page read and write
23A98BF1000
trusted library allocation
page read and write
23AA7837000
trusted library allocation
page read and write
23A9BA39000
trusted library allocation
page read and write
1734000
heap
page read and write
23A924E8000
heap
page read and write
23AA3966000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9D2EC000
trusted library allocation
page read and write
23A9CF8B000
trusted library allocation
page read and write
2526FC19000
heap
page read and write
2526FC5D000
heap
page read and write
23AA38AF000
trusted library allocation
page read and write
23AA38E7000
trusted library allocation
page read and write
23A924E4000
heap
page read and write
2526FBC0000
heap
page read and write
23A9B57B000
heap
page read and write
23A9D0F2000
trusted library allocation
page read and write
23A92523000
heap
page read and write
23A9CFDA000
trusted library allocation
page read and write
23A9DE0A000
trusted library allocation
page read and write
23A9CBFE000
trusted library allocation
page read and write
258FBD0D000
trusted library allocation
page read and write
23A924F5000
heap
page read and write
23AA38F8000
trusted library allocation
page read and write
23A9F6B7000
trusted library allocation
page read and write
23A9DE83000
trusted library allocation
page read and write
23AA3DFC000
trusted library allocation
page read and write
23A924E2000
heap
page read and write
258FBD81000
trusted library allocation
page read and write
23A9BCBD000
trusted library allocation
page read and write
E1D5DFF000
stack
page read and write
23A9C1CF000
trusted library allocation
page read and write
23A9DFE7000
trusted library allocation
page read and write
23A9C1B5000
trusted library allocation
page read and write
23A9B99C000
trusted library allocation
page read and write
23AA35DD000
trusted library allocation
page read and write
23A92506000
heap
page read and write
23A9C1B3000
trusted library allocation
page read and write
23A98B90000
trusted library allocation
page read and write
23A985C3000
trusted library allocation
page read and write
23A9F3B3000
trusted library allocation
page read and write
23A9CB7F000
trusted library allocation
page read and write
23AA36BB000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23A924F7000
heap
page read and write
23A9252C000
heap
page read and write
23A9AE8B000
trusted library allocation
page read and write
23A9BCCC000
trusted library allocation
page read and write
23AA3AD4000
trusted library allocation
page read and write
23A9D1B4000
trusted library allocation
page read and write
23A9CCDC000
trusted library allocation
page read and write
23AA34DC000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA38FD000
trusted library allocation
page read and write
23A9F1AF000
trusted library allocation
page read and write
23AA38E5000
trusted library allocation
page read and write
23A9BCB7000
trusted library allocation
page read and write
23AA78E2000
trusted library allocation
page read and write
23A9D3A6000
trusted library allocation
page read and write
23AA37C1000
trusted library allocation
page read and write
23AA36CE000
trusted library allocation
page read and write
23A97593000
trusted library allocation
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9F1E0000
trusted library allocation
page read and write
23AA3AC2000
trusted library allocation
page read and write
23A9F032000
trusted library allocation
page read and write
23A9D294000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA3A12000
trusted library allocation
page read and write
23A9B525000
heap
page read and write
280ECCE0000
heap
page read and write
23AA39CF000
trusted library allocation
page read and write
23A9CE66000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9D357000
trusted library allocation
page read and write
23A9AEA6000
trusted library allocation
page read and write
23A9CC1D000
trusted library allocation
page read and write
23A9EF58000
trusted library allocation
page read and write
258FBB00000
heap
page read and write
23AA3957000
trusted library allocation
page read and write
23AA37AC000
trusted library allocation
page read and write
17747270000
trusted library allocation
page read and write
23A92535000
heap
page read and write
23AA3A0A000
trusted library allocation
page read and write
23A98BCD000
trusted library allocation
page read and write
23A9D102000
trusted library allocation
page read and write
23A9B891000
trusted library allocation
page read and write
23AA39C1000
trusted library allocation
page read and write
23A9D11F000
trusted library allocation
page read and write
23A9D1E3000
trusted library allocation
page read and write
23A9CB93000
trusted library allocation
page read and write
23A9D530000
trusted library allocation
page read and write
23A9C1EB000
trusted library allocation
page read and write
23A9B4F9000
heap
page read and write
23A924EE000
heap
page read and write
2526FC49000
heap
page read and write
23A9F04C000
trusted library allocation
page read and write
23A9B8D2000
trusted library allocation
page read and write
23AA5E01000
trusted library allocation
page read and write
23A9BA77000
trusted library allocation
page read and write
23A9E37A000
trusted library allocation
page read and write
23A9CEE1000
trusted library allocation
page read and write
23A9C5B7000
trusted library allocation
page read and write
23A98BBE000
trusted library allocation
page read and write
23A9F5DB000
trusted library allocation
page read and write
23AA61F9000
trusted library allocation
page read and write
23AA39F1000
trusted library allocation
page read and write
23A9D49D000
trusted library allocation
page read and write
23AA4AB6000
trusted library allocation
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A9B975000
trusted library allocation
page read and write
18B1000
heap
page read and write
23A9D4D9000
trusted library allocation
page read and write
23AA3C64000
trusted library allocation
page read and write
23A98C6F000
trusted library allocation
page read and write
23A9EFD8000
trusted library allocation
page read and write
23A9B4D8000
heap
page read and write
23A9C113000
trusted library allocation
page read and write
23AA378C000
trusted library allocation
page read and write
23A9D5D0000
trusted library allocation
page read and write
23AA55C3000
trusted library allocation
page read and write
23A9EF99000
trusted library allocation
page read and write
23A9F31F000
trusted library allocation
page read and write
23AA3A35000
trusted library allocation
page read and write
23AA36E9000
trusted library allocation
page read and write
23AA36F9000
trusted library allocation
page read and write
23AA5B71000
heap
page read and write
23A924EE000
heap
page read and write
23AA38DC000
trusted library allocation
page read and write
23A9D4C6000
trusted library allocation
page read and write
23A92520000
heap
page read and write
23A92528000
heap
page read and write
23A9D2CD000
trusted library allocation
page read and write
23A9D4AF000
trusted library allocation
page read and write
23A9D943000
trusted library allocation
page read and write
23A9E4B4000
trusted library allocation
page read and write
23A9F5BE000
trusted library allocation
page read and write
2526F4BA000
trusted library allocation
page read and write
23AA34DC000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23AA38D5000
trusted library allocation
page read and write
23A9C1BD000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A9CDB2000
trusted library allocation
page read and write
23A9CDF2000
trusted library allocation
page read and write
23AA35E1000
trusted library allocation
page read and write
2526F45F000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9C180000
trusted library allocation
page read and write
23AA35D5000
trusted library allocation
page read and write
26F76E10000
heap
page read and write
23A9D0FA000
trusted library allocation
page read and write
2526FBC9000
heap
page read and write
23A92518000
heap
page read and write
23A9C1EB000
trusted library allocation
page read and write
23A975D7000
trusted library allocation
page read and write
2526F5C0000
heap
page read and write
26F788B2000
heap
page read and write
23A9B99C000
trusted library allocation
page read and write
23A92518000
heap
page read and write
23AA55A1000
trusted library allocation
page read and write
23A9D946000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23A98B57000
trusted library allocation
page read and write
23A9D927000
trusted library allocation
page read and write
23AA3778000
trusted library allocation
page read and write
23A9B578000
heap
page read and write
23AA5B6A000
heap
page read and write
23A9BADB000
trusted library allocation
page read and write
23AA35EC000
trusted library allocation
page read and write
23AA6140000
trusted library allocation
page read and write
23AA34CE000
trusted library allocation
page read and write
23A924E1000
heap
page read and write
23A924FC000
heap
page read and write
17747277000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A924E4000
heap
page read and write
23A98471000
trusted library allocation
page read and write
23A9D429000
trusted library allocation
page read and write
23A98C6B000
trusted library allocation
page read and write
23A9B2B0000
trusted library allocation
page read and write
23AA373B000
trusted library allocation
page read and write
23AA5BE1000
heap
page read and write
23AA5B89000
heap
page read and write
18A8000
heap
page read and write
23A92528000
heap
page read and write
23A92519000
heap
page read and write
23A9BA8C000
trusted library allocation
page read and write
23AA37B3000
trusted library allocation
page read and write
23A9C19A000
trusted library allocation
page read and write
23AA559F000
trusted library allocation
page read and write
1734000
heap
page read and write
23AA391A000
trusted library allocation
page read and write
23AA3563000
trusted library allocation
page read and write
23A92533000
heap
page read and write
23AA38E9000
trusted library allocation
page read and write
23A9B96E000
trusted library allocation
page read and write
23A9BCFB000
trusted library allocation
page read and write
23AA3962000
trusted library allocation
page read and write
23A9BADA000
trusted library allocation
page read and write
23A9C5F2000
trusted library allocation
page read and write
23AA4F00000
trusted library allocation
page read and write
23A9B88A000
trusted library allocation
page read and write
23AA38E7000
trusted library allocation
page read and write
23A9D292000
trusted library allocation
page read and write
23AA6D6A000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9D0B9000
trusted library allocation
page read and write
EE4FF3E000
unkown
page readonly
23AA3957000
trusted library allocation
page read and write
23AA3C1E000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23AA3943000
trusted library allocation
page read and write
25270158000
heap
page read and write
23A9D191000
trusted library allocation
page read and write
23A924F5000
heap
page read and write
23A9B590000
heap
page read and write
17C0000
trusted library allocation
page read and write
23AA391D000
trusted library allocation
page read and write
2527016D000
heap
page read and write
23A9DAED000
trusted library allocation
page read and write
23A9B9CB000
trusted library allocation
page read and write
23AA34F2000
trusted library allocation
page read and write
EE4EF3E000
unkown
page readonly
23AA35E1000
trusted library allocation
page read and write
23A9CEBC000
trusted library allocation
page read and write
23A9CB37000
trusted library allocation
page read and write
23A9BAFB000
trusted library allocation
page read and write
23AA39D2000
trusted library allocation
page read and write
23D0003F000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
23A9D9F3000
trusted library allocation
page read and write
23A9B29B000
trusted library allocation
page read and write
23AA378F000
trusted library allocation
page read and write
280ECBF0000
heap
page read and write
23A9B50E000
heap
page read and write
25270159000
heap
page read and write
17746ED0000
remote allocation
page read and write
23AA36AD000
trusted library allocation
page read and write
23A9D2DA000
trusted library allocation
page read and write
23A96EB3000
trusted library allocation
page read and write
F40000
heap
page read and write
23A9F5DB000
trusted library allocation
page read and write
23A9CBAC000
trusted library allocation
page read and write
23A9BAA2000
trusted library allocation
page read and write
23A98BF0000
trusted library allocation
page read and write
23A9AEA4000
trusted library allocation
page read and write
23A92527000
heap
page read and write
23A98BF1000
trusted library allocation
page read and write
23A9F142000
trusted library allocation
page read and write
23AA394E000
trusted library allocation
page read and write
23A9CEB6000
trusted library allocation
page read and write
23AA38FD000
trusted library allocation
page read and write
23A9D5C7000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A9D9CF000
trusted library allocation
page read and write
23A9BAFB000
trusted library allocation
page read and write
177472F4000
trusted library allocation
page read and write
23A9BA70000
trusted library allocation
page read and write
23A924F7000
heap
page read and write
C5F94BE000
unkown
page readonly
23AA559F000
trusted library allocation
page read and write
23A9D1CB000
trusted library allocation
page read and write
23A9CFD0000
trusted library allocation
page read and write
23AA3A30000
trusted library allocation
page read and write
23A9D343000
trusted library allocation
page read and write
23A9B87B000
trusted library allocation
page read and write
23A924FC000
heap
page read and write
23A9B54C000
heap
page read and write
23A9D590000
trusted library allocation
page read and write
C5F9CBE000
stack
page read and write
258FBF09000
trusted library allocation
page read and write
EE4CB9B000
stack
page read and write
23A9F5EC000
trusted library allocation
page read and write
23A9D54D000
trusted library allocation
page read and write
23AA39B3000
trusted library allocation
page read and write
23AA37DC000
trusted library allocation
page read and write
EE4CBDE000
stack
page read and write
23AA34D8000
trusted library allocation
page read and write
23A9E37F000
trusted library allocation
page read and write
23AA371A000
trusted library allocation
page read and write
23A9D2A6000
trusted library allocation
page read and write
23A924F3000
heap
page read and write
23A9D566000
trusted library allocation
page read and write
23A9DEB6000
trusted library allocation
page read and write
23AA34CE000
trusted library allocation
page read and write
23A92539000
heap
page read and write
23A9CB0F000
trusted library allocation
page read and write
23A9DDA8000
trusted library allocation
page read and write
23A9CCE2000
trusted library allocation
page read and write
23A9B27C000
trusted library allocation
page read and write
23AA381A000
trusted library allocation
page read and write
23A98582000
trusted library allocation
page read and write
2526FC01000
heap
page read and write
23A9D0F8000
trusted library allocation
page read and write
23A98BC7000
trusted library allocation
page read and write
23AA5576000
trusted library allocation
page read and write
23A9D287000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA36D1000
trusted library allocation
page read and write
23A96EBF000
trusted library allocation
page read and write
258FB8E0000
unclassified section
page readonly
23AA35E1000
trusted library allocation
page read and write
23A9D0FA000
trusted library allocation
page read and write
23A9F6F3000
trusted library allocation
page read and write
23A9EF95000
trusted library allocation
page read and write
23A9C186000
trusted library allocation
page read and write
23A9D25F000
trusted library allocation
page read and write
23AA3736000
trusted library allocation
page read and write
23AA55C3000
trusted library allocation
page read and write
23AA3C64000
trusted library allocation
page read and write
23AA3941000
trusted library allocation
page read and write
23A9B59E000
heap
page read and write
23A98BAB000
trusted library allocation
page read and write
23A98B94000
trusted library allocation
page read and write
23A924D7000
heap
page read and write
23A9D3CA000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A9B52C000
heap
page read and write
23A9BCA1000
trusted library allocation
page read and write
E1D8DFF000
stack
page read and write
23AA39C7000
trusted library allocation
page read and write
23A92515000
heap
page read and write
23AA38D5000
trusted library allocation
page read and write
23A9D24C000
trusted library allocation
page read and write
23AA3DE3000
trusted library allocation
page read and write
23A9E552000
trusted library allocation
page read and write
23AA35E3000
trusted library allocation
page read and write
23A9D5EF000
trusted library allocation
page read and write
23AA3DE8000
trusted library allocation
page read and write
23A9D24E000
trusted library allocation
page read and write
23AA3527000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A9B9A2000
trusted library allocation
page read and write
23AA3769000
trusted library allocation
page read and write
23A9D930000
trusted library allocation
page read and write
1734000
heap
page read and write
23AA34EE000
trusted library allocation
page read and write
2526F465000
trusted library allocation
page read and write
23A9BA84000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A9D9C4000
trusted library allocation
page read and write
23A9BA45000
trusted library allocation
page read and write
23A975AB000
trusted library allocation
page read and write
23A9B279000
trusted library allocation
page read and write
23A924EE000
heap
page read and write
23A9B2D1000
trusted library allocation
page read and write
23A9D9CF000
trusted library allocation
page read and write
23A924DB000
heap
page read and write
23AA35CC000
trusted library allocation
page read and write
23A9BCC3000
trusted library allocation
page read and write
23AA37DE000
trusted library allocation
page read and write
23A924E8000
heap
page read and write
23A97575000
trusted library allocation
page read and write
2526F4F3000
trusted library allocation
page read and write
23A9B2F0000
trusted library allocation
page read and write
23AA4A1F000
trusted library allocation
page read and write
23A9B8F5000
trusted library allocation
page read and write
4AC000
unkown
page readonly
23A92519000
heap
page read and write
23A9D582000
trusted library allocation
page read and write
23A9DEE4000
trusted library allocation
page read and write
23A9D2D2000
trusted library allocation
page read and write
23AA382B000
trusted library allocation
page read and write
23A9252C000
heap
page read and write
2526FC0A000
heap
page read and write
E1D6DFE000
stack
page read and write
23A9B590000
heap
page read and write
23A9B9A2000
trusted library allocation
page read and write
23A9F04C000
trusted library allocation
page read and write
23A9E383000
trusted library allocation
page read and write
23AA35EC000
trusted library allocation
page read and write
23A9BA6D000
trusted library allocation
page read and write
23AA4A40000
trusted library allocation
page read and write
23A924E9000
heap
page read and write
23AA39D4000
trusted library allocation
page read and write
23A9D33D000
trusted library allocation
page read and write
23A9E3C4000
trusted library allocation
page read and write
23AA3640000
trusted library allocation
page read and write
23AA34E0000
trusted library allocation
page read and write
23A92519000
heap
page read and write
23A9CC17000
trusted library allocation
page read and write
23A9AEC2000
trusted library allocation
page read and write
23A9CDCF000
trusted library allocation
page read and write
23A9D431000
trusted library allocation
page read and write
23A9859C000
trusted library allocation
page read and write
23A9D5FB000
trusted library allocation
page read and write
23A92539000
heap
page read and write
23AA39C1000
trusted library allocation
page read and write
23A9B50E000
heap
page read and write
26F76E83000
heap
page read and write
26F788B1000
heap
page read and write
23A9EFE3000
trusted library allocation
page read and write
23A9BCF6000
trusted library allocation
page read and write
23A9C1C3000
trusted library allocation
page read and write
23A9251F000
heap
page read and write
23A8D0C2000
heap
page read and write
23A9BCF6000
trusted library allocation
page read and write
26C49BD000
stack
page read and write
258FBF16000
trusted library allocation
page read and write
23A92528000
heap
page read and write
23A92535000
heap
page read and write
23A9C1EB000
trusted library allocation
page read and write
23A9F194000
trusted library allocation
page read and write
23AA3620000
trusted library allocation
page read and write
23AA62F7000
trusted library allocation
page read and write
23A9B123000
trusted library allocation
page read and write
There are 3863 hidden memdumps, click here to show them.