IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_98b256db-8edc-4665-a906-46cc0b924b85.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_98b256db-8edc-4665-a906-46cc0b924b85.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3ee68f-9cdf-464b-bcc4-bfcae5e827a3} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" 230a1e6d710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3904 -parentBuildID 20230927232528 -prefsHandle 3912 -prefMapHandle 3908 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85363194-8cc0-4802-91a8-e213973fd8be} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" 230b43aee10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4972 -prefMapHandle 4740 -prefsLen 33076 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be7d4054-5c38-4189-9f83-6f293799c454} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" 230bc211b10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://youtube.com/account?=https://ac
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://youtube.com/account?=https://accounts.googlH
unknown
https://api.accounts.firefox.com/v1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://youtube.com/account?=https://acv
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://www.leboncoin.fr/Could
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://support.mozilla.org/
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://www.google.com/complete/search
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
142.250.185.238
youtube.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
124F000
heap
page read and write
malicious
230A8CE2000
heap
page read and write
230B4A4D000
trusted library allocation
page read and write
230B1F5E000
trusted library allocation
page read and write
230BABF3000
trusted library allocation
page read and write
230BDDBF000
trusted library allocation
page read and write
21A836B0000
heap
page read and write
230B557A000
trusted library allocation
page read and write
230B40E6000
trusted library allocation
page read and write
230B5AF3000
trusted library allocation
page read and write
230B399E000
trusted library allocation
page read and write
230B35B1000
trusted library allocation
page read and write
230BA9C7000
trusted library allocation
page read and write
230AF2BB000
trusted library allocation
page read and write
230A8D20000
heap
page read and write
1F24E6B0000
heap
page read and write
230B3254000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BAA68000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B31B7000
trusted library allocation
page read and write
230B31DA000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BA9C3000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B39C3000
trusted library allocation
page read and write
230AE1E0000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230B3254000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B6C63000
trusted library allocation
page read and write
1F24F3B8000
heap
page read and write
230B3F60000
trusted library allocation
page read and write
230B4783000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
1F24F399000
heap
page read and write
230A8CDE000
heap
page read and write
230A8CAD000
heap
page read and write
230A8D2D000
heap
page read and write
230BDDED000
trusted library allocation
page read and write
230A8D1C000
heap
page read and write
230B354A000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230BDDDD000
trusted library allocation
page read and write
230BA71E000
trusted library allocation
page read and write
1F24F358000
heap
page read and write
230A8CAE000
heap
page read and write
230B3570000
trusted library allocation
page read and write
230B1C15000
trusted library allocation
page read and write
230B22DB000
trusted library allocation
page read and write
230AFA69000
heap
page read and write
230AF8C5000
trusted library allocation
page read and write
230B3937000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8CAF000
heap
page read and write
230B3FDB000
trusted library allocation
page read and write
1F24E59F000
trusted library allocation
page read and write
24B5CACF000
unclassified section
page read and write
230B3165000
trusted library allocation
page read and write
230AF533000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230A8CC9000
heap
page read and write
230B47EC000
trusted library allocation
page read and write
230B3916000
trusted library allocation
page read and write
230B3241000
trusted library allocation
page read and write
230B2092000
trusted library allocation
page read and write
230BAAB9000
trusted library allocation
page read and write
230BC4B6000
trusted library allocation
page read and write
230B3F92000
trusted library allocation
page read and write
230BC4D3000
trusted library allocation
page read and write
230BC2E3000
trusted library allocation
page read and write
230B552B000
trusted library allocation
page read and write
230B46E7000
trusted library allocation
page read and write
230B3158000
trusted library allocation
page read and write
21A83B00000
unclassified section
page readonly
230BAAC4000
trusted library allocation
page read and write
230B4883000
trusted library allocation
page read and write
230B3558000
trusted library allocation
page read and write
230A8D17000
heap
page read and write
230AF4C1000
trusted library allocation
page read and write
230BA7DE000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230B548D000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
1F24F32B000
heap
page read and write
230BDC99000
trusted library allocation
page read and write
230B3F8D000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230BABE1000
trusted library allocation
page read and write
230BA98E000
trusted library allocation
page read and write
230B22DB000
trusted library allocation
page read and write
230B5544000
trusted library allocation
page read and write
230B4047000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230BA49A000
trusted library allocation
page read and write
1F24E503000
trusted library allocation
page read and write
230B39C9000
trusted library allocation
page read and write
1F24F37C000
heap
page read and write
230B3FB8000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B5541000
trusted library allocation
page read and write
230BAEA7000
trusted library allocation
page read and write
230BDDD3000
trusted library allocation
page read and write
230BCFC8000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B3555000
trusted library allocation
page read and write
230B3FC0000
trusted library allocation
page read and write
1F24F32B000
heap
page read and write
1F24F3AF000
heap
page read and write
230AFA62000
heap
page read and write
230B4673000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
230BABE1000
trusted library allocation
page read and write
3A60000
heap
page read and write
230BA7F8000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
5E32E7E000
unkown
page readonly
230B3146000
trusted library allocation
page read and write
230B3D53000
trusted library allocation
page read and write
230B5AA3000
trusted library allocation
page read and write
24B5C93A000
heap
page read and write
230BC4A2000
trusted library allocation
page read and write
230A8CC8000
heap
page read and write
230BA6A5000
trusted library allocation
page read and write
230B1C96000
trusted library allocation
page read and write
230BDD3F000
trusted library allocation
page read and write
230B4A56000
trusted library allocation
page read and write
230BDDB1000
trusted library allocation
page read and write
230B3D5A000
trusted library allocation
page read and write
230B1EC4000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
230BA59B000
trusted library allocation
page read and write
230B1F6E000
trusted library allocation
page read and write
1DA563EE000
heap
page read and write
21A837B0000
heap
page read and write
230BD202000
trusted library allocation
page read and write
230B3165000
trusted library allocation
page read and write
230B1C31000
trusted library allocation
page read and write
230B6C23000
trusted library allocation
page read and write
230B3581000
trusted library allocation
page read and write
230BA6DE000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230A8CD8000
heap
page read and write
230BA998000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B31F0000
trusted library allocation
page read and write
230AF4F6000
trusted library allocation
page read and write
5E2FB3E000
stack
page read and write
230B35EC000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230AF4AC000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B3488000
trusted library allocation
page read and write
1F24F2A9000
heap
page read and write
230BC549000
trusted library allocation
page read and write
1F24E52F000
trusted library allocation
page read and write
230B31BA000
trusted library allocation
page read and write
230BA8BE000
trusted library allocation
page read and write
230B4AC4000
trusted library allocation
page read and write
230BA6A1000
trusted library allocation
page read and write
230B396D000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230AF899000
trusted library allocation
page read and write
21A83968000
trusted library allocation
page read and write
230B37E6000
trusted library allocation
page read and write
230BC02C000
trusted library allocation
page read and write
230B2E3F000
trusted library allocation
page read and write
24B5CC00000
trusted library allocation
page read and write
230B41BC000
trusted library allocation
page read and write
230B390A000
trusted library allocation
page read and write
230BA986000
trusted library allocation
page read and write
230BABE5000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230B377E000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BA839000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B4047000
trusted library allocation
page read and write
230B54E6000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230B32DC000
trusted library allocation
page read and write
230AF4A1000
trusted library allocation
page read and write
230B32BC000
trusted library allocation
page read and write
230B3F59000
trusted library allocation
page read and write
230B4616000
trusted library allocation
page read and write
230B20BC000
trusted library allocation
page read and write
230B3D23000
trusted library allocation
page read and write
230AF2D2000
trusted library allocation
page read and write
230BA8D7000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230AF8C4000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230B3FDB000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
5E31E7E000
unkown
page readonly
230AF89F000
trusted library allocation
page read and write
230BA830000
trusted library allocation
page read and write
230BA6AC000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230BC286000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230BA728000
trusted library allocation
page read and write
21A83981000
trusted library allocation
page read and write
230B3139000
trusted library allocation
page read and write
230B1C24000
trusted library allocation
page read and write
230B1FFA000
trusted library allocation
page read and write
230B3231000
trusted library allocation
page read and write
230BA7E8000
trusted library allocation
page read and write
230AFA81000
heap
page read and write
230B1CA2000
trusted library allocation
page read and write
230BAEAD000
trusted library allocation
page read and write
230B336A000
trusted library allocation
page read and write
230AD6C8000
trusted library allocation
page read and write
230BA5F6000
trusted library allocation
page read and write
230B3575000
trusted library allocation
page read and write
230BABC7000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B32C0000
trusted library allocation
page read and write
230A8D36000
heap
page read and write
230BA678000
trusted library allocation
page read and write
230B397C000
trusted library allocation
page read and write
230AE182000
trusted library allocation
page read and write
230B2E5A000
trusted library allocation
page read and write
230B3FE5000
trusted library allocation
page read and write
230B32CF000
trusted library allocation
page read and write
230B5A18000
trusted library allocation
page read and write
230BA6AA000
trusted library allocation
page read and write
230BC557000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230A8CBD000
heap
page read and write
230B32CF000
trusted library allocation
page read and write
230B3362000
trusted library allocation
page read and write
230BA889000
trusted library allocation
page read and write
230B3182000
trusted library allocation
page read and write
230AF173000
trusted library allocation
page read and write
230AF4C7000
trusted library allocation
page read and write
230A8D31000
heap
page read and write
230BD0AC000
trusted library allocation
page read and write
230BC249000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
1F24F36B000
heap
page read and write
230B31B2000
trusted library allocation
page read and write
230B3133000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230B46DF000
trusted library allocation
page read and write
230BDD91000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230BC0A1000
trusted library allocation
page read and write
230BA69E000
trusted library allocation
page read and write
230B3263000
trusted library allocation
page read and write
230B4A37000
trusted library allocation
page read and write
230A8CCE000
heap
page read and write
230B3FCD000
trusted library allocation
page read and write
230BDC44000
trusted library allocation
page read and write
1F24E650000
unclassified section
page read and write
230AD6A7000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B40F6000
trusted library allocation
page read and write
230B55FD000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
2743D2E0000
heap
page read and write
230B4A7F000
trusted library allocation
page read and write
230B5A66000
trusted library allocation
page read and write
1F24F2AC000
heap
page read and write
230B393F000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
230B20BC000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B1C2B000
trusted library allocation
page read and write
230B3527000
trusted library allocation
page read and write
230BA538000
trusted library allocation
page read and write
230BC4C5000
trusted library allocation
page read and write
1F24F2DC000
heap
page read and write
230BC0C2000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230B39B7000
trusted library allocation
page read and write
230B3DD8000
trusted library allocation
page read and write
230B459D000
trusted library allocation
page read and write
230B315E000
trusted library allocation
page read and write
230B315B000
trusted library allocation
page read and write
230B4700000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
126F000
heap
page read and write
230B4A87000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CCA000
heap
page read and write
230BABE7000
trusted library allocation
page read and write
230B22B6000
trusted library allocation
page read and write
230B4A96000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
230AF4A5000
trusted library allocation
page read and write
1F24E500000
trusted library allocation
page read and write
230B2E3B000
trusted library allocation
page read and write
D3FE1FE000
stack
page read and write
230BA8DC000
trusted library allocation
page read and write
230A8D31000
heap
page read and write
230A8D17000
heap
page read and write
230A8D19000
heap
page read and write
230B46A4000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B454D000
trusted library allocation
page read and write
230B45D0000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
230B39BC000
trusted library allocation
page read and write
230B31F0000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230A8CD8000
heap
page read and write
230B5971000
trusted library allocation
page read and write
230BD12C000
trusted library allocation
page read and write
24B5C8C0000
remote allocation
page read and write
230A8D0D000
heap
page read and write
230B5480000
trusted library allocation
page read and write
F54000
unkown
page readonly
230A8CE2000
heap
page read and write
230BC0AC000
trusted library allocation
page read and write
230B1E6D000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230B31B4000
trusted library allocation
page read and write
230BA8F1000
trusted library allocation
page read and write
230BC4F3000
trusted library allocation
page read and write
230B5985000
trusted library allocation
page read and write
230B4ABF000
trusted library allocation
page read and write
CEF0DFE000
stack
page read and write
230A8D28000
heap
page read and write
230B31B1000
trusted library allocation
page read and write
230A8D31000
heap
page read and write
230B4A4D000
trusted library allocation
page read and write
230B55A4000
trusted library allocation
page read and write
230B39BB000
trusted library allocation
page read and write
230BC697000
trusted library allocation
page read and write
230B4A4D000
trusted library allocation
page read and write
230A8D2B000
heap
page read and write
230B32CF000
trusted library allocation
page read and write
230BC46D000
trusted library allocation
page read and write
230B58C2000
trusted library allocation
page read and write
230B3509000
trusted library allocation
page read and write
1104000
heap
page read and write
230B20F9000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230A8CB5000
heap
page read and write
230A8CC9000
heap
page read and write
230A8D19000
heap
page read and write
230BA786000
trusted library allocation
page read and write
230B5463000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B4A13000
trusted library allocation
page read and write
230BC486000
trusted library allocation
page read and write
230A8CC1000
heap
page read and write
230BA5EF000
trusted library allocation
page read and write
230B32A0000
trusted library allocation
page read and write
230B3982000
trusted library allocation
page read and write
230B55E4000
trusted library allocation
page read and write
230B3254000
trusted library allocation
page read and write
230B32EF000
trusted library allocation
page read and write
230B373E000
trusted library allocation
page read and write
230B351D000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230B3F9B000
trusted library allocation
page read and write
230B58DD000
trusted library allocation
page read and write
230B4A96000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230BABD8000
trusted library allocation
page read and write
230B39F6000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230AE1E4000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230AE1AF000
trusted library allocation
page read and write
24B5CE17000
trusted library allocation
page read and write
230AF498000
trusted library allocation
page read and write
21A83963000
trusted library allocation
page read and write
230B2241000
trusted library allocation
page read and write
230B3258000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230BC4F3000
trusted library allocation
page read and write
230B3FDE000
trusted library allocation
page read and write
230BDD91000
trusted library allocation
page read and write
230B322A000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230AE1DB000
trusted library allocation
page read and write
230BABE7000
trusted library allocation
page read and write
230A8CBA000
heap
page read and write
230AFA86000
heap
page read and write
230B467C000
trusted library allocation
page read and write
1F24F2F9000
heap
page read and write
230AF8DA000
trusted library allocation
page read and write
230B3971000
trusted library allocation
page read and write
1F24F2BD000
heap
page read and write
230B3963000
trusted library allocation
page read and write
1DA56380000
heap
page read and write
230B5AF3000
trusted library allocation
page read and write
230B3DB2000
trusted library allocation
page read and write
230B20C0000
trusted library allocation
page read and write
230BA9B5000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
1F24F240000
heap
page read and write
230A8CAF000
heap
page read and write
230B46FA000
trusted library allocation
page read and write
230B4661000
trusted library allocation
page read and write
230BA4DF000
trusted library allocation
page read and write
230B3733000
trusted library allocation
page read and write
1F24E262000
remote allocation
page execute read
230BAA9C000
trusted library allocation
page read and write
230AFA52000
heap
page read and write
1F24F321000
heap
page read and write
230B3FEB000
trusted library allocation
page read and write
230AF423000
trusted library allocation
page read and write
230BAE36000
trusted library allocation
page read and write
230B3937000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
230B399B000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B4AA9000
trusted library allocation
page read and write
230B62C8000
trusted library allocation
page read and write
230BA7D6000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B462B000
trusted library allocation
page read and write
24B5CAB0000
heap
page readonly
230A8CC5000
heap
page read and write
230B3DF4000
trusted library allocation
page read and write
41B55FE000
unkown
page readonly
230B206E000
trusted library allocation
page read and write
230BAE82000
trusted library allocation
page read and write
230BA496000
trusted library allocation
page read and write
230B3FC9000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
230B3263000
trusted library allocation
page read and write
230BABCD000
trusted library allocation
page read and write
230BDCDD000
trusted library allocation
page read and write
230B1E61000
trusted library allocation
page read and write
230BDD56000
trusted library allocation
page read and write
230BDD46000
trusted library allocation
page read and write
230B32BE000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
230B22D1000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B4A74000
trusted library allocation
page read and write
230B3D5C000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B32E1000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230BC2D6000
trusted library allocation
page read and write
230B5583000
trusted library allocation
page read and write
21A83530000
unclassified section
page readonly
230BA84A000
trusted library allocation
page read and write
230B37D6000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B3982000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230B3FC9000
trusted library allocation
page read and write
230B4A74000
trusted library allocation
page read and write
230BC547000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230BC04C000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
1F24F2A0000
heap
page read and write
230BC476000
trusted library allocation
page read and write
230B4AF2000
trusted library allocation
page read and write
1F24F32B000
heap
page read and write
230B31F0000
trusted library allocation
page read and write
230BC2E3000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
1F70000
heap
page read and write
230B350B000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B542C000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
21A8398E000
trusted library allocation
page read and write
230B392F000
trusted library allocation
page read and write
230B393F000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230B3D23000
trusted library allocation
page read and write
230BDD91000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230B3245000
trusted library allocation
page read and write
230AF4FA000
trusted library allocation
page read and write
230B557A000
trusted library allocation
page read and write
230AF4BC000
trusted library allocation
page read and write
230AF8D0000
trusted library allocation
page read and write
230B3156000
trusted library allocation
page read and write
230B3760000
trusted library allocation
page read and write
230B34A7000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230AF4F8000
trusted library allocation
page read and write
5E3267E000
stack
page read and write
230B5A10000
trusted library allocation
page read and write
230B6307000
trusted library allocation
page read and write
230BDDB1000
trusted library allocation
page read and write
230B3212000
trusted library allocation
page read and write
230B4045000
trusted library allocation
page read and write
1F24F29F000
heap
page read and write
230A8D0F000
heap
page read and write
1F24F331000
heap
page read and write
2743D302000
heap
page read and write
230AF40F000
trusted library allocation
page read and write
230B4A4F000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230A8D2B000
heap
page read and write
230B37E6000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230A8D0B000
heap
page read and write
230B1EFE000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
24B5CC03000
trusted library allocation
page read and write
24B5CE1E000
trusted library allocation
page read and write
2743B850000
heap
page read and write
230BA99A000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230B54ED000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
230BA9A4000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230B4A7F000
trusted library allocation
page read and write
230BA7EF000
trusted library allocation
page read and write
24B5CE0C000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230B5A72000
trusted library allocation
page read and write
230BC6CF000
trusted library allocation
page read and write
21A839C3000
trusted library allocation
page read and write
230A8D24000
heap
page read and write
230B398E000
trusted library allocation
page read and write
230B3D45000
trusted library allocation
page read and write
230B2E05000
trusted library allocation
page read and write
230B47E3000
trusted library allocation
page read and write
230B3170000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230B3944000
trusted library allocation
page read and write
230B1EC4000
trusted library allocation
page read and write
230B3170000
trusted library allocation
page read and write
230B4AAF000
trusted library allocation
page read and write
3A61000
heap
page read and write
230B20C1000
trusted library allocation
page read and write
1F24E576000
trusted library allocation
page read and write
230BA775000
trusted library allocation
page read and write
230AF121000
trusted library allocation
page read and write
230AF1F9000
trusted library allocation
page read and write
230BAAA5000
trusted library allocation
page read and write
230B46A6000
trusted library allocation
page read and write
230AF2CA000
trusted library allocation
page read and write
230A8D25000
heap
page read and write
230B355B000
trusted library allocation
page read and write
230BD086000
trusted library allocation
page read and write
230B5AB2000
trusted library allocation
page read and write
230AF41D000
trusted library allocation
page read and write
230B3267000
trusted library allocation
page read and write
1F24F3AF000
heap
page read and write
230B3D4C000
trusted library allocation
page read and write
230B46A2000
trusted library allocation
page read and write
230BC1AF000
trusted library allocation
page read and write
230BDCEB000
trusted library allocation
page read and write
230BC282000
trusted library allocation
page read and write
230A8CC8000
heap
page read and write
230BE58A000
trusted library allocation
page read and write
230A8CBE000
heap
page read and write
230B393F000
trusted library allocation
page read and write
230B394F000
trusted library allocation
page read and write
24B5CC12000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BA57C000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230A8D2D000
heap
page read and write
1DA5670A000
trusted library allocation
page read and write
230BC405000
trusted library allocation
page read and write
230B3133000
trusted library allocation
page read and write
230B3934000
trusted library allocation
page read and write
230AF8ED000
trusted library allocation
page read and write
230B398E000
trusted library allocation
page read and write
230B3593000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230A8D36000
heap
page read and write
230A8D19000
heap
page read and write
230B321B000
trusted library allocation
page read and write
230BA5A0000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B1F76000
trusted library allocation
page read and write
230B3722000
trusted library allocation
page read and write
230B3982000
trusted library allocation
page read and write
230B59AB000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
230B3980000
trusted library allocation
page read and write
230BA57C000
trusted library allocation
page read and write
230B4AA5000
trusted library allocation
page read and write
230BAA98000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230AFA87000
heap
page read and write
230BA9CD000
trusted library allocation
page read and write
230B20EB000
trusted library allocation
page read and write
230B34C5000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230BA7ED000
trusted library allocation
page read and write
230BAE3A000
trusted library allocation
page read and write
230B1CB0000
trusted library allocation
page read and write
230B39C9000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230BC2A1000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230BC4F3000
trusted library allocation
page read and write
230BDCF2000
trusted library allocation
page read and write
230BAA71000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BA9A8000
trusted library allocation
page read and write
230B468F000
trusted library allocation
page read and write
230BABDF000
trusted library allocation
page read and write
230BC45A000
trusted library allocation
page read and write
230B4575000
trusted library allocation
page read and write
1270000
heap
page read and write
230A8CAE000
heap
page read and write
230BC4DB000
trusted library allocation
page read and write
230B399C000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230BA72E000
trusted library allocation
page read and write
230B3D55000
trusted library allocation
page read and write
230B47B7000
trusted library allocation
page read and write
230A8CE1000
heap
page read and write
230A8CDE000
heap
page read and write
230A8D0B000
heap
page read and write
230AE1DB000
trusted library allocation
page read and write
1F24F37C000
heap
page read and write
230B20F9000
trusted library allocation
page read and write
230BABFB000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8D2D000
heap
page read and write
230B41B2000
trusted library allocation
page read and write
230BA596000
trusted library allocation
page read and write
230BA744000
trusted library allocation
page read and write
230B3D5C000
trusted library allocation
page read and write
230B4047000
trusted library allocation
page read and write
230B4A74000
trusted library allocation
page read and write
230B3FEB000
trusted library allocation
page read and write
230B358C000
trusted library allocation
page read and write
230BA66A000
trusted library allocation
page read and write
230BC549000
trusted library allocation
page read and write
230BA582000
trusted library allocation
page read and write
230BC2FE000
trusted library allocation
page read and write
21A83C03000
trusted library allocation
page read and write
230B4A42000
trusted library allocation
page read and write
1F24F33C000
heap
page read and write
230B1F9B000
trusted library allocation
page read and write
230B3241000
trusted library allocation
page read and write
230B3DE2000
trusted library allocation
page read and write
230AF8DC000
trusted library allocation
page read and write
230B467C000
trusted library allocation
page read and write
230B3F41000
trusted library allocation
page read and write
230B22FE000
trusted library allocation
page read and write
230B5A3E000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230BD12E000
trusted library allocation
page read and write
230B32C0000
trusted library allocation
page read and write
F54000
unkown
page readonly
21A83978000
trusted library allocation
page read and write
230BA9B3000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B3515000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
D3FEA7B000
stack
page read and write
230B3FCB000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230AF4F6000
trusted library allocation
page read and write
230A8D26000
heap
page read and write
230B47D9000
trusted library allocation
page read and write
230BA6A5000
trusted library allocation
page read and write
230AE02F000
trusted library allocation
page read and write
7D0000
heap
page read and write
230BC295000
trusted library allocation
page read and write
230BDDDD000
trusted library allocation
page read and write
1F24E562000
trusted library allocation
page read and write
230B3959000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B5567000
trusted library allocation
page read and write
230B399E000
trusted library allocation
page read and write
230B3D5A000
trusted library allocation
page read and write
230BA5A8000
trusted library allocation
page read and write
230B54AC000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
1F24E581000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230BA582000
trusted library allocation
page read and write
230AE144000
trusted library allocation
page read and write
230B3291000
trusted library allocation
page read and write
230BABBF000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230BA89C000
trusted library allocation
page read and write
230B3591000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230B39EF000
trusted library allocation
page read and write
230AF8D3000
trusted library allocation
page read and write
230B46AA000
trusted library allocation
page read and write
230BA9C7000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
2743B810000
heap
page read and write
230BA560000
trusted library allocation
page read and write
24B5CC81000
trusted library allocation
page read and write
230BA582000
trusted library allocation
page read and write
230BAEE2000
trusted library allocation
page read and write
230AF4F0000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
21A8390E000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
21A83790000
heap
page read and write
230B3544000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230BC08E000
trusted library allocation
page read and write
CEEEDFA000
stack
page read and write
230B399E000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230B332C000
trusted library allocation
page read and write
230BDD46000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
41B34FE000
unkown
page readonly
230BA9B7000
trusted library allocation
page read and write
230B459D000
trusted library allocation
page read and write
230B3135000
trusted library allocation
page read and write
230BA5FE000
trusted library allocation
page read and write
230B4A1C000
trusted library allocation
page read and write
230B3F3D000
trusted library allocation
page read and write
230B55EC000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8D27000
heap
page read and write
230B3734000
trusted library allocation
page read and write
230B1E7D000
trusted library allocation
page read and write
230B3902000
trusted library allocation
page read and write
230BA9A8000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
230BA59B000
trusted library allocation
page read and write
230B3215000
trusted library allocation
page read and write
230BDDC3000
trusted library allocation
page read and write
1F24E5EF000
trusted library allocation
page read and write
CEEF5FE000
stack
page read and write
230A8CDE000
heap
page read and write
230A8CCF000
heap
page read and write
2743D2FC000
heap
page read and write
230BA562000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230B39C3000
trusted library allocation
page read and write
230BC549000
trusted library allocation
page read and write
1F24F29C000
heap
page read and write
230B1F9B000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230A8D36000
heap
page read and write
230BC064000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CD2000
heap
page read and write
230AF8D3000
trusted library allocation
page read and write
230BD2A8000
trusted library allocation
page read and write
230B5AB2000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230AE193000
trusted library allocation
page read and write
230B4A6D000
trusted library allocation
page read and write
230B3150000
trusted library allocation
page read and write
230AE1A6000
trusted library allocation
page read and write
24B5CC7B000
trusted library allocation
page read and write
230B4800000
trusted library allocation
page read and write
230B37ED000
trusted library allocation
page read and write
230B35C3000
trusted library allocation
page read and write
230BA74D000
trusted library allocation
page read and write
230B3165000
trusted library allocation
page read and write
230BAAA3000
trusted library allocation
page read and write
E81000
unkown
page execute read
230B3FFE000
trusted library allocation
page read and write
230B39CE000
trusted library allocation
page read and write
230BA57C000
trusted library allocation
page read and write
230B40BC000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CD8000
heap
page read and write
230BAECF000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B45F6000
trusted library allocation
page read and write
230B20EB000
trusted library allocation
page read and write
230B5A58000
trusted library allocation
page read and write
230B1C63000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B391C000
trusted library allocation
page read and write
230B34B4000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B6C00000
trusted library allocation
page read and write
1F24F358000
heap
page read and write
230B3293000
trusted library allocation
page read and write
230B5544000
trusted library allocation
page read and write
230B4033000
trusted library allocation
page read and write
1F24F2A0000
heap
page read and write
230A8D2C000
heap
page read and write
230A8CD2000
heap
page read and write
230B3937000
trusted library allocation
page read and write
230B5AEE000
trusted library allocation
page read and write
230AF4E0000
trusted library allocation
page read and write
230B1FFA000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230B348C000
trusted library allocation
page read and write
230BC2BC000
trusted library allocation
page read and write
230BA96D000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
230BA998000
trusted library allocation
page read and write
2743D303000
heap
page read and write
230B20EB000
trusted library allocation
page read and write
230B55A7000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230BAE40000
trusted library allocation
page read and write
230B1EE8000
trusted library allocation
page read and write
230B3D55000
trusted library allocation
page read and write
230BA596000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230A8D15000
heap
page read and write
230B31BC000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
DFE000
stack
page read and write
230B226D000
trusted library allocation
page read and write
230B20EB000
trusted library allocation
page read and write
230B3470000
trusted library allocation
page read and write
230B32C0000
trusted library allocation
page read and write
230BA9BF000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230A8CCE000
heap
page read and write
230A8CD0000
heap
page read and write
230B35B5000
trusted library allocation
page read and write
230B1E7D000
trusted library allocation
page read and write
230BA7CD000
trusted library allocation
page read and write
230B357F000
trusted library allocation
page read and write
230AFA65000
heap
page read and write
230BA85F000
trusted library allocation
page read and write
230BA9B3000
trusted library allocation
page read and write
230B3932000
trusted library allocation
page read and write
230B4ADA000
trusted library allocation
page read and write
230AF4E7000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230BC2D6000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B33C7000
trusted library allocation
page read and write
230BA496000
trusted library allocation
page read and write
230BAED3000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
230A8CEA000
heap
page read and write
230BC4DD000
trusted library allocation
page read and write
230BC47B000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B3552000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B6341000
trusted library allocation
page read and write
230B4A42000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230B1C8F000
trusted library allocation
page read and write
230AF8FE000
trusted library allocation
page read and write
230BABE1000
trusted library allocation
page read and write
126F000
heap
page read and write
230B5A5E000
trusted library allocation
page read and write
230B3994000
trusted library allocation
page read and write
24B5CCC8000
trusted library allocation
page read and write
2743D2FF000
heap
page read and write
230B392C000
trusted library allocation
page read and write
1F24EB50000
unkown
page execute read
230B31B4000
trusted library allocation
page read and write
230BAED9000
trusted library allocation
page read and write
230A8D1C000
heap
page read and write
230A8CE6000
heap
page read and write
230B20F7000
trusted library allocation
page read and write
230B1CCE000
trusted library allocation
page read and write
D3FFBFE000
unkown
page readonly
230B37F0000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230BDCE8000
trusted library allocation
page read and write
21A83903000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230A8CDE000
heap
page read and write
230B32DC000
trusted library allocation
page read and write
230B2097000
trusted library allocation
page read and write
230B3FBC000
trusted library allocation
page read and write
1F24F3B8000
heap
page read and write
230A8D14000
heap
page read and write
230B3D25000
trusted library allocation
page read and write
230BA6AA000
trusted library allocation
page read and write
230B3992000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B4A43000
trusted library allocation
page read and write
230BC506000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230B39D5000
trusted library allocation
page read and write
230BA649000
trusted library allocation
page read and write
230BABDC000
trusted library allocation
page read and write
1F24E510000
trusted library allocation
page read and write
230B4ADB000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B3170000
trusted library allocation
page read and write
1F24F331000
heap
page read and write
230B1CA2000
trusted library allocation
page read and write
230B46A9000
trusted library allocation
page read and write
230BA9C5000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BE12F000
trusted library allocation
page read and write
230AF49D000
trusted library allocation
page read and write
1F24E3E0000
heap
page read and write
230B35CF000
trusted library allocation
page read and write
1F24E545000
trusted library allocation
page read and write
230B3FF8000
trusted library allocation
page read and write
230A8D4C000
heap
page read and write
230BA94B000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230B4525000
trusted library allocation
page read and write
230B3980000
trusted library allocation
page read and write
230B2297000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B1C2B000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
1080000
heap
page read and write
230A8CCA000
heap
page read and write
230B2072000
trusted library allocation
page read and write
230BDD5C000
trusted library allocation
page read and write
230B3570000
trusted library allocation
page read and write
230B39BD000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
DBF000
stack
page read and write
230B315E000
trusted library allocation
page read and write
230BAAB0000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B54B7000
trusted library allocation
page read and write
230A8CB1000
heap
page read and write
230BA889000
trusted library allocation
page read and write
230B39BB000
trusted library allocation
page read and write
1F24F326000
heap
page read and write
230B3932000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230BAE7A000
trusted library allocation
page read and write
230BDCE2000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
1F24F3B8000
heap
page read and write
230B2068000
trusted library allocation
page read and write
230B2072000
trusted library allocation
page read and write
21A8390C000
trusted library allocation
page read and write
21A83796000
heap
page read and write
230B4046000
trusted library allocation
page read and write
230BC273000
trusted library allocation
page read and write
24B5CC79000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B3F3D000
trusted library allocation
page read and write
230B3D43000
trusted library allocation
page read and write
230B1E4A000
trusted library allocation
page read and write
230A8CAE000
heap
page read and write
230A8CD8000
heap
page read and write
230B55AC000
trusted library allocation
page read and write
230B453D000
trusted library allocation
page read and write
230B4AA5000
trusted library allocation
page read and write
230B2E86000
trusted library allocation
page read and write
F4C000
unkown
page read and write
230BA899000
trusted library allocation
page read and write
230B200B000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
230B3F89000
trusted library allocation
page read and write
230B31F0000
trusted library allocation
page read and write
230AF190000
trusted library allocation
page read and write
230B35B7000
trusted library allocation
page read and write
230B3DB2000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CD2000
heap
page read and write
230B5873000
trusted library allocation
page read and write
230B5AC5000
trusted library allocation
page read and write
230B3593000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B4A19000
trusted library allocation
page read and write
230A8D31000
heap
page read and write
230B395C000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B5A60000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230B5A89000
trusted library allocation
page read and write
230B1C15000
trusted library allocation
page read and write
1F24F2EA000
heap
page read and write
21A83794000
heap
page read and write
230B4638000
trusted library allocation
page read and write
230B3528000
trusted library allocation
page read and write
230B3DCF000
trusted library allocation
page read and write
230B675C000
heap
page read and write
230A8CE3000
heap
page read and write
230BA584000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B350E000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230B3731000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230BA532000
trusted library allocation
page read and write
230BAE84000
trusted library allocation
page read and write
230B3F36000
trusted library allocation
page read and write
2743BA00000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230B55E4000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230AE0F6000
trusted library allocation
page read and write
230B3963000
trusted library allocation
page read and write
1F24F320000
heap
page read and write
230A8CB5000
heap
page read and write
230B630C000
trusted library allocation
page read and write
230B39C9000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230AF44C000
trusted library allocation
page read and write
230B204C000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
D380FFE000
unkown
page readonly
230B3932000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8D17000
heap
page read and write
230A8D0D000
heap
page read and write
230A8CDE000
heap
page read and write
5E305D8000
stack
page read and write
230BC4E4000
trusted library allocation
page read and write
230B3D41000
trusted library allocation
page read and write
230A8CD4000
heap
page read and write
230BC2B6000
trusted library allocation
page read and write
230B3581000
trusted library allocation
page read and write
230BC24B000
trusted library allocation
page read and write
230B1EE9000
trusted library allocation
page read and write
230B4A49000
trusted library allocation
page read and write
230B5AF3000
trusted library allocation
page read and write
2743B8AA000
heap
page read and write
CEEFDFE000
stack
page read and write
230A8D14000
heap
page read and write
230BC4A3000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B319A000
trusted library allocation
page read and write
21A8395D000
trusted library allocation
page read and write
D381FFE000
unkown
page readonly
230B35EC000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B29EC000
trusted library allocation
page read and write
230B3258000
trusted library allocation
page read and write
230B37E2000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230A8D0F000
heap
page read and write
230BA89C000
trusted library allocation
page read and write
230B4529000
trusted library allocation
page read and write
230BAAC4000
trusted library allocation
page read and write
230B37ED000
trusted library allocation
page read and write
230BA9E0000
trusted library allocation
page read and write
230B2E13000
trusted library allocation
page read and write
230BA9C9000
trusted library allocation
page read and write
230B59C2000
trusted library allocation
page read and write
230B3F8D000
trusted library allocation
page read and write
230BA85E000
trusted library allocation
page read and write
230B34C3000
trusted library allocation
page read and write
230BDD3B000
trusted library allocation
page read and write
230AFA69000
heap
page read and write
230B3963000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230B3436000
trusted library allocation
page read and write
230B350C000
trusted library allocation
page read and write
230B54F0000
trusted library allocation
page read and write
230B325B000
trusted library allocation
page read and write
1F24E55C000
trusted library allocation
page read and write
230BAA7E000
trusted library allocation
page read and write
1F24EB5C000
unkown
page execute read
230BABC6000
trusted library allocation
page read and write
230B350E000
trusted library allocation
page read and write
230A8D1C000
heap
page read and write
24B5CC66000
trusted library allocation
page read and write
F50000
unkown
page write copy
230A8CDE000
heap
page read and write
230A8CB5000
heap
page read and write
230BA5A0000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230B3581000
trusted library allocation
page read and write
230B634D000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230B4023000
trusted library allocation
page read and write
1104000
heap
page read and write
230BA98C000
trusted library allocation
page read and write
230B224C000
trusted library allocation
page read and write
230B3F38000
trusted library allocation
page read and write
230BDD39000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B63A7000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BAA92000
trusted library allocation
page read and write
230BC441000
trusted library allocation
page read and write
230B1CD8000
trusted library allocation
page read and write
230BC0C2000
trusted library allocation
page read and write
230AF84B000
trusted library allocation
page read and write
230B4AAF000
trusted library allocation
page read and write
230B3D4C000
trusted library allocation
page read and write
230B3522000
trusted library allocation
page read and write
230B5A9C000
trusted library allocation
page read and write
230BA784000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230A8D0B000
heap
page read and write
230B20BB000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8CB3000
heap
page read and write
230B5567000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230BDD3B000
trusted library allocation
page read and write
230B4047000
trusted library allocation
page read and write
230AE076000
trusted library allocation
page read and write
230A8D2B000
heap
page read and write
230BA9E6000
trusted library allocation
page read and write
230B5AEE000
trusted library allocation
page read and write
230B321B000
trusted library allocation
page read and write
230B46FE000
trusted library allocation
page read and write
230B32CF000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230A8D2B000
heap
page read and write
230BA6F9000
trusted library allocation
page read and write
230BD400000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8CAF000
heap
page read and write
230B1CBA000
trusted library allocation
page read and write
230BC476000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B355E000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
1DA56700000
trusted library allocation
page read and write
1F24F29C000
heap
page read and write
230A8D15000
heap
page read and write
230A8D17000
heap
page read and write
230B2E15000
trusted library allocation
page read and write
230AF2FB000
trusted library allocation
page read and write
230B206F000
trusted library allocation
page read and write
230B22B6000
trusted library allocation
page read and write
230B35CF000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230A8D21000
heap
page read and write
230B559C000
trusted library allocation
page read and write
1F24F2A0000
heap
page read and write
1DA563EA000
heap
page read and write
230BABD8000
trusted library allocation
page read and write
1F24F399000
heap
page read and write
230AE1F0000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230BA6F9000
trusted library allocation
page read and write
230B315B000
trusted library allocation
page read and write
1F24EC71000
heap
page read and write
230B39F9000
trusted library allocation
page read and write
5E2FB7E000
unkown
page readonly
230A8CCF000
heap
page read and write
230AF190000
trusted library allocation
page read and write
230B3556000
trusted library allocation
page read and write
230B319A000
trusted library allocation
page read and write
230B20F9000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230BA830000
trusted library allocation
page read and write
E7E000
stack
page read and write
230B22F8000
trusted library allocation
page read and write
230BDD36000
trusted library allocation
page read and write
230B1F10000
trusted library allocation
page read and write
21A839F1000
trusted library allocation
page read and write
230BA8B5000
trusted library allocation
page read and write
230B205A000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BC0B1000
trusted library allocation
page read and write
230BA699000
trusted library allocation
page read and write
230B3FBA000
trusted library allocation
page read and write
230BAB83000
trusted library allocation
page read and write
1F24F385000
heap
page read and write
230AF2D2000
trusted library allocation
page read and write
230B357C000
trusted library allocation
page read and write
1F24E548000
trusted library allocation
page read and write
230B47E3000
trusted library allocation
page read and write
230BABE5000
trusted library allocation
page read and write
230B35A0000
trusted library allocation
page read and write
230B46A4000
trusted library allocation
page read and write
230B2E11000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8CBE000
heap
page read and write
230BC4A7000
trusted library allocation
page read and write
230B402B000
trusted library allocation
page read and write
230B31B1000
trusted library allocation
page read and write
230BAABC000
trusted library allocation
page read and write
2743B8AE000
heap
page read and write
230A8CE2000
heap
page read and write
230B5A56000
trusted library allocation
page read and write
230AF423000
trusted library allocation
page read and write
230B40E2000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230AE071000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B315E000
trusted library allocation
page read and write
230BA9C1000
trusted library allocation
page read and write
230BDD8D000
trusted library allocation
page read and write
1256000
heap
page read and write
230A8D18000
heap
page read and write
230B6701000
heap
page read and write
230A8CE3000
heap
page read and write
230AF8EC000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
230B32BC000
trusted library allocation
page read and write
230B1CB0000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
230B3FBD000
trusted library allocation
page read and write
1F24F36B000
heap
page read and write
230BA5E9000
trusted library allocation
page read and write
230BA51C000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
230B4543000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B22FE000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
125E000
heap
page read and write
230A8D1E000
heap
page read and write
230B321F000
trusted library allocation
page read and write
230B40E7000
trusted library allocation
page read and write
230BA49E000
trusted library allocation
page read and write
230B548D000
trusted library allocation
page read and write
230AF2FB000
trusted library allocation
page read and write
230B47B4000
trusted library allocation
page read and write
230BABEA000
trusted library allocation
page read and write
1F24E6A0000
trusted library allocation
page read and write
230B3258000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230A8CE6000
heap
page read and write
230A8CC9000
heap
page read and write
230B549D000
trusted library allocation
page read and write
230AFA66000
heap
page read and write
230B392C000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8CBB000
heap
page read and write
230B2074000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
230BA9B1000
trusted library allocation
page read and write
230BA86C000
trusted library allocation
page read and write
230B3751000
trusted library allocation
page read and write
230BA9BB000
trusted library allocation
page read and write
230BC2D8000
trusted library allocation
page read and write
230B3522000
trusted library allocation
page read and write
230BE184000
trusted library allocation
page read and write
1F24E660000
trusted library section
page readonly
1F24E630000
heap
page readonly
230AF470000
trusted library allocation
page read and write
230B5AD6000
trusted library allocation
page read and write
230B37B9000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230B37A3000
trusted library allocation
page read and write
230B3912000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B39A1000
trusted library allocation
page read and write
230B316D000
trusted library allocation
page read and write
230B3247000
trusted library allocation
page read and write
1F24E512000
trusted library allocation
page read and write
230B1E6D000
trusted library allocation
page read and write
230B63C5000
trusted library allocation
page read and write
230B20EB000
trusted library allocation
page read and write
E80000
unkown
page readonly
230BC559000
trusted library allocation
page read and write
230BC2D8000
trusted library allocation
page read and write
230BC4B1000
trusted library allocation
page read and write
230B2080000
trusted library allocation
page read and write
230BC2F9000
trusted library allocation
page read and write
230BC3C8000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230A8D18000
heap
page read and write
230B22F8000
trusted library allocation
page read and write
230B1C96000
trusted library allocation
page read and write
230B32DF000
trusted library allocation
page read and write
230B4673000
trusted library allocation
page read and write
D3FC78C000
stack
page read and write
230A8CCF000
heap
page read and write
230B34EB000
trusted library allocation
page read and write
230B3156000
trusted library allocation
page read and write
230B3D23000
trusted library allocation
page read and write
230B3FC0000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230B396D000
trusted library allocation
page read and write
230B31B2000
trusted library allocation
page read and write
230B3FCD000
trusted library allocation
page read and write
230BC2E5000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230BC2DB000
trusted library allocation
page read and write
230B1EC0000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
230B351D000
trusted library allocation
page read and write
230BA99C000
trusted library allocation
page read and write
230B20F7000
trusted library allocation
page read and write
230AE0FB000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
24B5CC73000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
230B4AD4000
trusted library allocation
page read and write
230BDCA2000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
230BC2E7000
trusted library allocation
page read and write
230B342B000
trusted library allocation
page read and write
230B3182000
trusted library allocation
page read and write
230B47E3000
trusted library allocation
page read and write
230BDD33000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230A8D2A000
heap
page read and write
230B4013000
trusted library allocation
page read and write
230B40E9000
trusted library allocation
page read and write
230B3944000
trusted library allocation
page read and write
230B32C3000
trusted library allocation
page read and write
230BAA4F000
trusted library allocation
page read and write
230BC4F9000
trusted library allocation
page read and write
230BABDC000
trusted library allocation
page read and write
230B3555000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230AFA7D000
heap
page read and write
230B5AA6000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B3231000
trusted library allocation
page read and write
230AF177000
trusted library allocation
page read and write
230B395C000
trusted library allocation
page read and write
230B224F000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230A8CAF000
heap
page read and write
230A8CD2000
heap
page read and write
1F24EE2E000
trusted library allocation
page read and write
230B58C3000
trusted library allocation
page read and write
230BAA66000
trusted library allocation
page read and write
230B40E6000
trusted library allocation
page read and write
230B5A9C000
trusted library allocation
page read and write
230B6284000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230A8CD8000
heap
page read and write
230BA8A7000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8D1E000
heap
page read and write
230AFAA8000
heap
page read and write
230B4543000
trusted library allocation
page read and write
230B3FC6000
trusted library allocation
page read and write
230B6433000
trusted library allocation
page read and write
230B3FC9000
trusted library allocation
page read and write
230BA59B000
trusted library allocation
page read and write
230B5AEE000
trusted library allocation
page read and write
230B3FFE000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B39C3000
trusted library allocation
page read and write
230AD6CC000
trusted library allocation
page read and write
230B3293000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230B46C6000
trusted library allocation
page read and write
1F24F2A9000
heap
page read and write
230BDDEA000
trusted library allocation
page read and write
230B1E63000
trusted library allocation
page read and write
230B3515000
trusted library allocation
page read and write
230AF4D8000
trusted library allocation
page read and write
230B33EC000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
230B3182000
trusted library allocation
page read and write
230A8D16000
heap
page read and write
1F24F2A0000
heap
page read and write
230BDD5C000
trusted library allocation
page read and write
1F24E586000
trusted library allocation
page read and write
2322BFE000
stack
page read and write
230B4AA5000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230A8CB5000
heap
page read and write
230B319A000
trusted library allocation
page read and write
230BAEEF000
trusted library allocation
page read and write
230B55E4000
trusted library allocation
page read and write
230BDD72000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
D3807FE000
stack
page read and write
230B54FD000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230AF456000
trusted library allocation
page read and write
230BE19E000
trusted library allocation
page read and write
230BA500000
trusted library allocation
page read and write
230B3739000
trusted library allocation
page read and write
230B35BE000
trusted library allocation
page read and write
230B6386000
trusted library allocation
page read and write
230B5448000
trusted library allocation
page read and write
230B391A000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
1104000
heap
page read and write
230B359D000
trusted library allocation
page read and write
230B20AF000
trusted library allocation
page read and write
230AF8F9000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B297F000
trusted library allocation
page read and write
230BABD2000
trusted library allocation
page read and write
230BA6DE000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8D17000
heap
page read and write
230B31E5000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230BA596000
trusted library allocation
page read and write
24B5CC61000
trusted library allocation
page read and write
D3FF2FE000
stack
page read and write
230B2062000
trusted library allocation
page read and write
1F24EC40000
heap
page read and write
230B3D61000
trusted library allocation
page read and write
230B2068000
trusted library allocation
page read and write
230AF8D7000
trusted library allocation
page read and write
230B4592000
trusted library allocation
page read and write
230A8CB3000
heap
page read and write
230B3932000
trusted library allocation
page read and write
3A61000
heap
page read and write
230BAEBC000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B642E000
trusted library allocation
page read and write
1104000
heap
page read and write
230A8D0B000
heap
page read and write
24B5CAC0000
unclassified section
page read and write
230B32CF000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
1F24F320000
heap
page read and write
230B20EB000
trusted library allocation
page read and write
230AF4C7000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B1E67000
trusted library allocation
page read and write
230B3251000
trusted library allocation
page read and write
230B31B1000
trusted library allocation
page read and write
230B315B000
trusted library allocation
page read and write
230BC44B000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230B3183000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230B47FC000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
21A83520000
unclassified section
page readonly
230AF4C7000
trusted library allocation
page read and write
230B3182000
trusted library allocation
page read and write
230BAAE4000
trusted library allocation
page read and write
230BA5A0000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B35CF000
trusted library allocation
page read and write
230B3570000
trusted library allocation
page read and write
230BA697000
trusted library allocation
page read and write
230AE11E000
trusted library allocation
page read and write
230BA516000
trusted library allocation
page read and write
230BA9CF000
trusted library allocation
page read and write
230B54A1000
trusted library allocation
page read and write
230B2059000
trusted library allocation
page read and write
230A8CB3000
heap
page read and write
230B58CF000
trusted library allocation
page read and write
230BA9C5000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230BC1A7000
trusted library allocation
page read and write
230BA7CB000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230A8D0B000
heap
page read and write
230BABDC000
trusted library allocation
page read and write
230B5A69000
trusted library allocation
page read and write
230BC2E1000
trusted library allocation
page read and write
21A839A7000
trusted library allocation
page read and write
230BC4F7000
trusted library allocation
page read and write
230B46FA000
trusted library allocation
page read and write
230B54B3000
trusted library allocation
page read and write
1F24F36B000
heap
page read and write
230B3170000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230A8CD2000
heap
page read and write
230B4529000
trusted library allocation
page read and write
230BDCC1000
trusted library allocation
page read and write
230B3D55000
trusted library allocation
page read and write
230BA564000
trusted library allocation
page read and write
230B201F000
trusted library allocation
page read and write
230BA9F0000
trusted library allocation
page read and write
F1C000
unkown
page readonly
230B39E3000
trusted library allocation
page read and write
230BA9FD000
trusted library allocation
page read and write
230B324D000
trusted library allocation
page read and write
230B315B000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230AF8EB000
trusted library allocation
page read and write
230BABD8000
trusted library allocation
page read and write
230BA6F9000
trusted library allocation
page read and write
230A8CC8000
heap
page read and write
21A83911000
trusted library allocation
page read and write
230AF417000
trusted library allocation
page read and write
230B5524000
trusted library allocation
page read and write
230B2080000
trusted library allocation
page read and write
230BA560000
trusted library allocation
page read and write
D3FFB7E000
unkown
page readonly
230B398E000
trusted library allocation
page read and write
230B32C0000
trusted library allocation
page read and write
230B4A3A000
trusted library allocation
page read and write
230B20BE000
trusted library allocation
page read and write
230B4A63000
trusted library allocation
page read and write
230B2057000
trusted library allocation
page read and write
230B3FE5000
trusted library allocation
page read and write
230AFA50000
heap
page read and write
230B2EC5000
trusted library allocation
page read and write
1F24F32B000
heap
page read and write
230BCE80000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
41B45FE000
unkown
page readonly
230BC04C000
trusted library allocation
page read and write
230B46B7000
trusted library allocation
page read and write
230B1E61000
trusted library allocation
page read and write
230BC4F9000
trusted library allocation
page read and write
230B4A4F000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B3D41000
trusted library allocation
page read and write
230B3581000
trusted library allocation
page read and write
230B3267000
trusted library allocation
page read and write
230B35BE000
trusted library allocation
page read and write
1F24E56F000
trusted library allocation
page read and write
230B3937000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B3934000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
1F24F340000
heap
page read and write
230BDDEE000
trusted library allocation
page read and write
1F24F399000
heap
page read and write
1F24F32B000
heap
page read and write
230B46A2000
trusted library allocation
page read and write
230B597F000
trusted library allocation
page read and write
230A8D17000
heap
page read and write
230BC4F5000
trusted library allocation
page read and write
1DA56360000
heap
page read and write
230A8D1E000
heap
page read and write
230BD04D000
trusted library allocation
page read and write
230BD106000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230BDCA0000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230BA554000
trusted library allocation
page read and write
230AFACA000
heap
page read and write
230B1C72000
trusted library allocation
page read and write
230B2063000
trusted library allocation
page read and write
230B22DB000
trusted library allocation
page read and write
230B45F6000
trusted library allocation
page read and write
230B32B9000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230B3F00000
trusted library allocation
page read and write
5E315FE000
stack
page read and write
230A8D19000
heap
page read and write
230B5A72000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230BC245000
trusted library allocation
page read and write
230BAE3E000
trusted library allocation
page read and write
41B357E000
unkown
page readonly
230B3760000
trusted library allocation
page read and write
230BC0CB000
trusted library allocation
page read and write
230B47B7000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
230B2E3F000
trusted library allocation
page read and write
230B5985000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8D0F000
heap
page read and write
230BA4BB000
trusted library allocation
page read and write
230A8D21000
heap
page read and write
230A8CD8000
heap
page read and write
230B31BC000
trusted library allocation
page read and write
230B20F9000
trusted library allocation
page read and write
230B3254000
trusted library allocation
page read and write
230B3D68000
trusted library allocation
page read and write
230BA87C000
trusted library allocation
page read and write
230AF4C1000
trusted library allocation
page read and write
DCE000
stack
page read and write
230A8CE2000
heap
page read and write
21A839F5000
trusted library allocation
page read and write
230B5AA1000
trusted library allocation
page read and write
230BA696000
trusted library allocation
page read and write
230B4A7F000
trusted library allocation
page read and write
230BA5EF000
trusted library allocation
page read and write
230B1C72000
trusted library allocation
page read and write
230B5524000
trusted library allocation
page read and write
230BC46E000
trusted library allocation
page read and write
230B676A000
heap
page read and write
230B3D41000
trusted library allocation
page read and write
2FBADC81E000
trusted library allocation
page read and write
230BABE1000
trusted library allocation
page read and write
230B315D000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230A8CDF000
heap
page read and write
230A8D0B000
heap
page read and write
CEEEDFF000
stack
page read and write
230B37E8000
trusted library allocation
page read and write
230B4013000
trusted library allocation
page read and write
230B559E000
trusted library allocation
page read and write
230B3D95000
trusted library allocation
page read and write
230BC42C000
trusted library allocation
page read and write
230BA9C1000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230BC1F7000
trusted library allocation
page read and write
230B5AF3000
trusted library allocation
page read and write
230B1F76000
trusted library allocation
page read and write
230B3979000
trusted library allocation
page read and write
230A8D31000
heap
page read and write
230B3934000
trusted library allocation
page read and write
1A2E000
stack
page read and write
230AF469000
trusted library allocation
page read and write
230B636D000
trusted library allocation
page read and write
230B1FFA000
trusted library allocation
page read and write
230B399E000
trusted library allocation
page read and write
230AD6C0000
trusted library allocation
page read and write
230BC46E000
trusted library allocation
page read and write
D3FEAFE000
unkown
page readonly
1F24F2E8000
heap
page read and write
230B33BC000
trusted library allocation
page read and write
230B35B5000
trusted library allocation
page read and write
230B559C000
trusted library allocation
page read and write
230AF4E0000
trusted library allocation
page read and write
230B3581000
trusted library allocation
page read and write
230B54A6000
trusted library allocation
page read and write
230B4045000
trusted library allocation
page read and write
230B2068000
trusted library allocation
page read and write
230B4575000
trusted library allocation
page read and write
230B37C8000
trusted library allocation
page read and write
2FBADC824000
trusted library allocation
page read and write
230B209E000
trusted library allocation
page read and write
1F24F3B8000
heap
page read and write
230AFA62000
heap
page read and write
230A8D0B000
heap
page read and write
230B5428000
trusted library allocation
page read and write
230BA562000
trusted library allocation
page read and write
230B4033000
trusted library allocation
page read and write
230B549D000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B3212000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230BC4D3000
trusted library allocation
page read and write
230AF2D2000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
230BD06D000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8D15000
heap
page read and write
230B5A64000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230BDCF2000
trusted library allocation
page read and write
230BC53F000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
230B3FBD000
trusted library allocation
page read and write
230B4033000
trusted library allocation
page read and write
230B321B000
trusted library allocation
page read and write
230BA57C000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230A8CD8000
heap
page read and write
230B3FE0000
trusted library allocation
page read and write
230B4A9A000
trusted library allocation
page read and write
230B40E6000
trusted library allocation
page read and write
230B400E000
trusted library allocation
page read and write
230B3529000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230BA739000
trusted library allocation
page read and write
230BC1AB000
trusted library allocation
page read and write
230B3FBE000
trusted library allocation
page read and write
230B3283000
trusted library allocation
page read and write
230B5968000
trusted library allocation
page read and write
230B31E1000
trusted library allocation
page read and write
230AF4DF000
trusted library allocation
page read and write
230BA65F000
trusted library allocation
page read and write
230BAED3000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230BA96D000
trusted library allocation
page read and write
230BABE7000
trusted library allocation
page read and write
230B5AEE000
trusted library allocation
page read and write
230B3F99000
trusted library allocation
page read and write
230B2095000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230AF483000
trusted library allocation
page read and write
230BC039000
trusted library allocation
page read and write
230B1CA2000
trusted library allocation
page read and write
230B3944000
trusted library allocation
page read and write
230B3F6D000
trusted library allocation
page read and write
230B41EF000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B320E000
trusted library allocation
page read and write
230B5ABD000
trusted library allocation
page read and write
230B3598000
trusted library allocation
page read and write
230A8CAE000
heap
page read and write
230B2E5D000
trusted library allocation
page read and write
230BC4F0000
trusted library allocation
page read and write
230B3591000
trusted library allocation
page read and write
230BABDC000
trusted library allocation
page read and write
1266000
heap
page read and write
230B357F000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B55EE000
trusted library allocation
page read and write
24B5CE00000
trusted library allocation
page read and write
230BC1AD000
trusted library allocation
page read and write
1F24F320000
heap
page read and write
230BCF7F000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230B4597000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B3251000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B357B000
trusted library allocation
page read and write
230B20C9000
trusted library allocation
page read and write
230AF2F9000
trusted library allocation
page read and write
230BC1A2000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230B4033000
trusted library allocation
page read and write
230B3D23000
trusted library allocation
page read and write
230BA86C000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230A8CB0000
heap
page read and write
230BA6A1000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230B39E3000
trusted library allocation
page read and write
230BDCC1000
trusted library allocation
page read and write
230BA4CB000
trusted library allocation
page read and write
230B3205000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B3980000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230B4ABF000
trusted library allocation
page read and write
230AE200000
trusted library allocation
page read and write
230BC239000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230A8D0B000
heap
page read and write
41B33FE000
unkown
page readonly
24B5CF04000
heap
page read and write
230B3944000
trusted library allocation
page read and write
230B2E3D000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230BC2E1000
trusted library allocation
page read and write
230AE17D000
trusted library allocation
page read and write
230BA98E000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B3267000
trusted library allocation
page read and write
5E2FBFE000
unkown
page readonly
230A8CCF000
heap
page read and write
230B35D4000
trusted library allocation
page read and write
230B44F1000
trusted library allocation
page read and write
230AF49D000
trusted library allocation
page read and write
24B5CD20000
heap
page read and write
230BDC21000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8D0B000
heap
page read and write
230B54BC000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
1F24F28D000
heap
page read and write
1F24E5E9000
trusted library allocation
page read and write
230B321F000
trusted library allocation
page read and write
230BABDF000
trusted library allocation
page read and write
230B4021000
trusted library allocation
page read and write
230B2092000
trusted library allocation
page read and write
1F24F241000
heap
page read and write
24B5CA60000
heap
page read and write
24B5CC2E000
trusted library allocation
page read and write
230B47B4000
trusted library allocation
page read and write
1F24F3B8000
heap
page read and write
230BC4F5000
trusted library allocation
page read and write
230B6745000
heap
page read and write
230A8D1E000
heap
page read and write
230B31E5000
trusted library allocation
page read and write
230B37C6000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230A8CDF000
heap
page read and write
230A8D16000
heap
page read and write
230B1F6E000
trusted library allocation
page read and write
24B5CB00000
trusted library allocation
page read and write
230B32B1000
trusted library allocation
page read and write
230BA8BA000
trusted library allocation
page read and write
230BABE5000
trusted library allocation
page read and write
21A83590000
remote allocation
page read and write
230B2E36000
trusted library allocation
page read and write
230B208E000
trusted library allocation
page read and write
1DA563E0000
heap
page read and write
230A8D0B000
heap
page read and write
230B3293000
trusted library allocation
page read and write
230BA99C000
trusted library allocation
page read and write
230BABBF000
trusted library allocation
page read and write
1F24E5B3000
trusted library allocation
page read and write
230B3979000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230BA6B1000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230BAA96000
trusted library allocation
page read and write
21A83913000
trusted library allocation
page read and write
230BC236000
trusted library allocation
page read and write
230B3140000
trusted library allocation
page read and write
230B372C000
trusted library allocation
page read and write
230AF899000
trusted library allocation
page read and write
230BABCF000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BCFE5000
trusted library allocation
page read and write
230B55A4000
trusted library allocation
page read and write
230BDD69000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8CD8000
heap
page read and write
230BC2FE000
trusted library allocation
page read and write
230B20BC000
trusted library allocation
page read and write
230B399E000
trusted library allocation
page read and write
230B469D000
trusted library allocation
page read and write
230BAE7A000
trusted library allocation
page read and write
230AF129000
trusted library allocation
page read and write
230B3736000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230BDD8B000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B32BC000
trusted library allocation
page read and write
D3FC7CE000
unkown
page readonly
230BAAA5000
trusted library allocation
page read and write
230B31BA000
trusted library allocation
page read and write
230BAA61000
trusted library allocation
page read and write
230BE1F1000
trusted library allocation
page read and write
230B1CA2000
trusted library allocation
page read and write
230B37E0000
trusted library allocation
page read and write
230BC2F9000
trusted library allocation
page read and write
230B3575000
trusted library allocation
page read and write
230AF1F3000
trusted library allocation
page read and write
230B34E8000
trusted library allocation
page read and write
230AF47A000
trusted library allocation
page read and write
230B32CF000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
41B347E000
unkown
page readonly
230B3D93000
trusted library allocation
page read and write
230B4ADB000
trusted library allocation
page read and write
230BC241000
trusted library allocation
page read and write
230BC05D000
trusted library allocation
page read and write
230B37ED000
trusted library allocation
page read and write
230B3937000
trusted library allocation
page read and write
230B31BC000
trusted library allocation
page read and write
230AF4F3000
trusted library allocation
page read and write
230B3D12000
trusted library allocation
page read and write
230BE537000
trusted library allocation
page read and write
230BA986000
trusted library allocation
page read and write
230B1EA5000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B39F9000
trusted library allocation
page read and write
230B1C1D000
trusted library allocation
page read and write
230BA736000
trusted library allocation
page read and write
230BA560000
trusted library allocation
page read and write
230B56C0000
trusted library allocation
page read and write
2743BA07000
trusted library allocation
page read and write
230BA620000
trusted library allocation
page read and write
230B1EE9000
trusted library allocation
page read and write
230B1F9B000
trusted library allocation
page read and write
230BC565000
trusted library allocation
page read and write
230B47D8000
trusted library allocation
page read and write
230BA580000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230BA745000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B5494000
trusted library allocation
page read and write
230AF463000
trusted library allocation
page read and write
230B3D25000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230A8D72000
heap
page read and write
230B1E5B000
trusted library allocation
page read and write
230B39F9000
trusted library allocation
page read and write
230B3FC9000
trusted library allocation
page read and write
230AF4BE000
trusted library allocation
page read and write
230B3193000
trusted library allocation
page read and write
230B6745000
heap
page read and write
230AF47A000
trusted library allocation
page read and write
230B5550000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230BDD3F000
trusted library allocation
page read and write
230B32BC000
trusted library allocation
page read and write
230A8D17000
heap
page read and write
230BC443000
trusted library allocation
page read and write
230B3FC0000
trusted library allocation
page read and write
230B2764000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
21A836B3000
heap
page read and write
230B3792000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
1DA56650000
heap
page read and write
230BA855000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230B3D51000
trusted library allocation
page read and write
230B674E000
heap
page read and write
230BE16D000
trusted library allocation
page read and write
230BC2D4000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B1C8E000
trusted library allocation
page read and write
230BAEF0000
trusted library allocation
page read and write
230A8D21000
heap
page read and write
230BC3A3000
trusted library allocation
page read and write
1F24EE00000
trusted library allocation
page read and write
230A8D1C000
heap
page read and write
230A8CDE000
heap
page read and write
230B342E000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B469B000
trusted library allocation
page read and write
1F24F32B000
heap
page read and write
230A8D15000
heap
page read and write
230B3985000
trusted library allocation
page read and write
230A8D52000
heap
page read and write
230BC26D000
trusted library allocation
page read and write
230B7202000
trusted library allocation
page read and write
230B40A3000
trusted library allocation
page read and write
230B5A80000
trusted library allocation
page read and write
230B20BC000
trusted library allocation
page read and write
230AE17D000
trusted library allocation
page read and write
230B1C33000
trusted library allocation
page read and write
230B63AC000
trusted library allocation
page read and write
230B31B1000
trusted library allocation
page read and write
230B5A85000
trusted library allocation
page read and write
230B47BC000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B46A6000
trusted library allocation
page read and write
230B676A000
heap
page read and write
230B4A22000
trusted library allocation
page read and write
230BA9C3000
trusted library allocation
page read and write
230BE505000
trusted library allocation
page read and write
230BC290000
trusted library allocation
page read and write
230B22F8000
trusted library allocation
page read and write
230B31D8000
trusted library allocation
page read and write
1F24F2AC000
heap
page read and write
230B3924000
trusted library allocation
page read and write
230B1C11000
trusted library allocation
page read and write
230B3170000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B2297000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B39B7000
trusted library allocation
page read and write
230BC52E000
trusted library allocation
page read and write
230B201A000
trusted library allocation
page read and write
230BA84A000
trusted library allocation
page read and write
230B3913000
trusted library allocation
page read and write
230B3DCA000
trusted library allocation
page read and write
230BA781000
trusted library allocation
page read and write
D3FEA78000
stack
page read and write
230A8D19000
heap
page read and write
230A8D1E000
heap
page read and write
230B22D9000
trusted library allocation
page read and write
230B46E7000
trusted library allocation
page read and write
230B4AFE000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8CAD000
heap
page read and write
230B4AD4000
trusted library allocation
page read and write
230A8CE1000
heap
page read and write
230B3DB2000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230A8CE2000
heap
page read and write
230B595B000
trusted library allocation
page read and write
230BA6AA000
trusted library allocation
page read and write
230BA54B000
trusted library allocation
page read and write
230B3283000
trusted library allocation
page read and write
230B32BC000
trusted library allocation
page read and write
230B1F76000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230BC6AF000
trusted library allocation
page read and write
230B2043000
trusted library allocation
page read and write
230B3267000
trusted library allocation
page read and write
230BC2A1000
trusted library allocation
page read and write
230B22BC000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230AF40C000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230B2E15000
trusted library allocation
page read and write
230BBE00000
trusted library allocation
page read and write
230BA99E000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B39B2000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230A8CD4000
heap
page read and write
230BAAB5000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230BAEA2000
trusted library allocation
page read and write
230B20EB000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230A8D0B000
heap
page read and write
230AF2FB000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230B3FBD000
trusted library allocation
page read and write
230B4A36000
trusted library allocation
page read and write
230B467C000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230BAA53000
trusted library allocation
page read and write
230BDCDF000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230B5562000
trusted library allocation
page read and write
24B5CC23000
trusted library allocation
page read and write
230BABC4000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230BABE1000
trusted library allocation
page read and write
230B35A0000
trusted library allocation
page read and write
230BDC49000
trusted library allocation
page read and write
230B319E000
trusted library allocation
page read and write
230BAE7E000
trusted library allocation
page read and write
21A8395F000
trusted library allocation
page read and write
230BA584000
trusted library allocation
page read and write
1F24E50A000
trusted library allocation
page read and write
24B5CC98000
trusted library allocation
page read and write
230BC533000
trusted library allocation
page read and write
230AF440000
trusted library allocation
page read and write
230B2068000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B55A7000
trusted library allocation
page read and write
230A8D21000
heap
page read and write
230A8D25000
heap
page read and write
230B4A4D000
trusted library allocation
page read and write
230AE1F0000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BC2B6000
trusted library allocation
page read and write
230B4823000
trusted library allocation
page read and write
230BC495000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230AF4C7000
trusted library allocation
page read and write
230B58BE000
trusted library allocation
page read and write
1104000
heap
page read and write
230B4A5C000
trusted library allocation
page read and write
230B1FFA000
trusted library allocation
page read and write
230B2068000
trusted library allocation
page read and write
1F24E56A000
trusted library allocation
page read and write
230B43A4000
trusted library allocation
page read and write
230B3942000
trusted library allocation
page read and write
230B5487000
trusted library allocation
page read and write
21A83949000
trusted library allocation
page read and write
154D9601000
trusted library allocation
page execute read
1F24E5BF000
trusted library allocation
page read and write
230B3DE5000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BAA9D000
trusted library allocation
page read and write
1F24F3B9000
heap
page read and write
230A8CE3000
heap
page read and write
230B3985000
trusted library allocation
page read and write
230BDD30000
trusted library allocation
page read and write
230B2E13000
trusted library allocation
page read and write
230B46E3000
trusted library allocation
page read and write
230AF8CC000
trusted library allocation
page read and write
230B4A49000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8CD8000
heap
page read and write
230B6701000
heap
page read and write
230A8D23000
heap
page read and write
230B3158000
trusted library allocation
page read and write
230BC4C9000
trusted library allocation
page read and write
1F24E523000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B562A000
trusted library allocation
page read and write
1F24F2CD000
heap
page read and write
230B32DC000
trusted library allocation
page read and write
1F24EC10000
heap
page read and write
230B32A7000
trusted library allocation
page read and write
1F24E5EC000
trusted library allocation
page read and write
230AFA7B000
heap
page read and write
230B3591000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B4045000
trusted library allocation
page read and write
230B327F000
trusted library allocation
page read and write
230B320A000
trusted library allocation
page read and write
230AF47A000
trusted library allocation
page read and write
230B20BE000
trusted library allocation
page read and write
230B3979000
trusted library allocation
page read and write
230B35E9000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
230B3180000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230B6457000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B4A87000
trusted library allocation
page read and write
230B35E9000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
1F24F323000
heap
page read and write
230B3146000
trusted library allocation
page read and write
230B55EE000
trusted library allocation
page read and write
5E31DFE000
unkown
page readonly
230BA4BB000
trusted library allocation
page read and write
230BC276000
trusted library allocation
page read and write
E81000
unkown
page execute read
230B372C000
trusted library allocation
page read and write
230BA726000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230A8D1E000
heap
page read and write
230B5A69000
trusted library allocation
page read and write
230BDC97000
trusted library allocation
page read and write
230BAEF0000
trusted library allocation
page read and write
230B1CFD000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230B325D000
trusted library allocation
page read and write
230AF470000
trusted library allocation
page read and write
230BA5B1000
trusted library allocation
page read and write
F4C000
unkown
page write copy
230BC2BC000
trusted library allocation
page read and write
230BE5AC000
trusted library allocation
page read and write
230BA7D1000
trusted library allocation
page read and write
230B55AC000
trusted library allocation
page read and write
230BDC42000
trusted library allocation
page read and write
230B4A4F000
trusted library allocation
page read and write
230AFAD0000
heap
page read and write
230A8CE3000
heap
page read and write
230B2E14000
trusted library allocation
page read and write
230B552B000
trusted library allocation
page read and write
230B2E48000
trusted library allocation
page read and write
1F24F249000
heap
page read and write
230BA9A6000
trusted library allocation
page read and write
24B5CF00000
heap
page read and write
230B3760000
trusted library allocation
page read and write
230A8CB9000
heap
page read and write
230B377E000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B3558000
trusted library allocation
page read and write
230AF4A6000
trusted library allocation
page read and write
1F24F2A0000
heap
page read and write
230B37A0000
trusted library allocation
page read and write
230B357F000
trusted library allocation
page read and write
230BA6DC000
trusted library allocation
page read and write
230BA9C9000
trusted library allocation
page read and write
230BDD72000
trusted library allocation
page read and write
24B5CC44000
trusted library allocation
page read and write
230B3F89000
trusted library allocation
page read and write
230BDD8D000
trusted library allocation
page read and write
230B3575000
trusted library allocation
page read and write
230B6406000
trusted library allocation
page read and write
1276000
heap
page read and write
1F24E5C3000
trusted library allocation
page read and write
230B339C000
trusted library allocation
page read and write
230B3522000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230B39CE000
trusted library allocation
page read and write
230BE567000
trusted library allocation
page read and write
230B31A4000
trusted library allocation
page read and write
230BA60A000
trusted library allocation
page read and write
5E3367E000
stack
page read and write
230AF1DE000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230A8D23000
heap
page read and write
1F24F29C000
heap
page read and write
230AF199000
trusted library allocation
page read and write
230B4A07000
trusted library allocation
page read and write
230BDD44000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
230AF496000
trusted library allocation
page read and write
230B1C7A000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230A8CD8000
heap
page read and write
230AE0FE000
trusted library allocation
page read and write
21A839A1000
trusted library allocation
page read and write
230B3D25000
trusted library allocation
page read and write
230B3942000
trusted library allocation
page read and write
230BAE3A000
trusted library allocation
page read and write
1F24E37A000
heap
page read and write
230B4045000
trusted library allocation
page read and write
230B3FDE000
trusted library allocation
page read and write
230B5940000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230BA4A2000
trusted library allocation
page read and write
230B319A000
trusted library allocation
page read and write
230B31BC000
trusted library allocation
page read and write
230B3D5A000
trusted library allocation
page read and write
1265000
heap
page read and write
1100000
heap
page read and write
230BDDB1000
trusted library allocation
page read and write
230BC4DB000
trusted library allocation
page read and write
230B3D23000
trusted library allocation
page read and write
230B2E3B000
trusted library allocation
page read and write
230B3254000
trusted library allocation
page read and write
230AF470000
trusted library allocation
page read and write
230B357B000
trusted library allocation
page read and write
230B4597000
trusted library allocation
page read and write
230BA576000
trusted library allocation
page read and write
230BA8A7000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
230B3FF8000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230B4047000
trusted library allocation
page read and write
230BA5FC000
trusted library allocation
page read and write
230B3DB2000
trusted library allocation
page read and write
230B3205000
trusted library allocation
page read and write
230AF46E000
trusted library allocation
page read and write
230B4A56000
trusted library allocation
page read and write
2743B8A0000
heap
page read and write
230A8D29000
heap
page read and write
1F24F328000
heap
page read and write
230B31EE000
trusted library allocation
page read and write
230B379C000
trusted library allocation
page read and write
21A83965000
trusted library allocation
page read and write
230B55F4000
trusted library allocation
page read and write
230AF46E000
trusted library allocation
page read and write
230BC263000
trusted library allocation
page read and write
230B20BA000
trusted library allocation
page read and write
230B4A9A000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230BDDBD000
trusted library allocation
page read and write
230B4A3C000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230AE023000
trusted library allocation
page read and write
230B3258000
trusted library allocation
page read and write
230BA480000
trusted library allocation
page read and write
230BA4A2000
trusted library allocation
page read and write
230B39B2000
trusted library allocation
page read and write
230B5562000
trusted library allocation
page read and write
230B55AC000
trusted library allocation
page read and write
230BC243000
trusted library allocation
page read and write
230B55A7000
trusted library allocation
page read and write
230B5A80000
trusted library allocation
page read and write
24B5CC5D000
trusted library allocation
page read and write
230B3F64000
trusted library allocation
page read and write
230B5594000
trusted library allocation
page read and write
230B1CFD000
trusted library allocation
page read and write
230B398E000
trusted library allocation
page read and write
230BA9E3000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B3D1F000
trusted library allocation
page read and write
230B45F0000
trusted library allocation
page read and write
230B47A4000
trusted library allocation
page read and write
230B1CD8000
trusted library allocation
page read and write
21A8371A000
heap
page read and write
230B205A000
trusted library allocation
page read and write
230B22F8000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
230B3FDB000
trusted library allocation
page read and write
230B323D000
trusted library allocation
page read and write
230BC4F7000
trusted library allocation
page read and write
230B459F000
trusted library allocation
page read and write
230B6788000
heap
page read and write
230A8D27000
heap
page read and write
230B2E44000
trusted library allocation
page read and write
1F24F399000
heap
page read and write
230B39A3000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
230B3158000
trusted library allocation
page read and write
230BDD5C000
trusted library allocation
page read and write
230B54BC000
trusted library allocation
page read and write
230B32B9000
trusted library allocation
page read and write
230BAEB5000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B4AA5000
trusted library allocation
page read and write
230B44FD000
trusted library allocation
page read and write
230B3267000
trusted library allocation
page read and write
230BC159000
trusted library allocation
page read and write
230AF47A000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B396D000
trusted library allocation
page read and write
230B359D000
trusted library allocation
page read and write
230B3F56000
trusted library allocation
page read and write
230BDD56000
trusted library allocation
page read and write
230BA582000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230AFA62000
heap
page read and write
230A8CE7000
heap
page read and write
230B39D5000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
24B5CE11000
trusted library allocation
page read and write
230B407C000
trusted library allocation
page read and write
230AE1F0000
trusted library allocation
page read and write
230BA5FC000
trusted library allocation
page read and write
21A839DA000
trusted library allocation
page read and write
154D9551000
trusted library allocation
page execute read
230B4011000
trusted library allocation
page read and write
230BA586000
trusted library allocation
page read and write
D3FE9FE000
unkown
page readonly
230B3171000
trusted library allocation
page read and write
230B4A36000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230BDD3F000
trusted library allocation
page read and write
230BA8A3000
trusted library allocation
page read and write
230AF469000
trusted library allocation
page read and write
230BA514000
trusted library allocation
page read and write
CEF1DFF000
stack
page read and write
230A8CE6000
heap
page read and write
24B5CC5B000
trusted library allocation
page read and write
230B6348000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
1F24F3B8000
heap
page read and write
230B31C4000
trusted library allocation
page read and write
230B20F9000
trusted library allocation
page read and write
230B3FC0000
trusted library allocation
page read and write
230AFAD5000
heap
page read and write
230A8D27000
heap
page read and write
230AFA94000
heap
page read and write
230B46E7000
trusted library allocation
page read and write
1F24E270000
unclassified section
page readonly
21A83800000
trusted library allocation
page read and write
230BA6C3000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
1F24F399000
heap
page read and write
230B4047000
trusted library allocation
page read and write
230BC2BC000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230A8D22000
heap
page read and write
230BAAE0000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B3FC6000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
24B5CD30000
unclassified section
page readonly
230B47FC000
trusted library allocation
page read and write
24B5C860000
unclassified section
page readonly
230BA6AC000
trusted library allocation
page read and write
230B393F000
trusted library allocation
page read and write
230BA9CB000
trusted library allocation
page read and write
230B2E15000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230B4045000
trusted library allocation
page read and write
230B1F25000
trusted library allocation
page read and write
230B2E36000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230B642C000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230BA8B0000
trusted library allocation
page read and write
24B5CC10000
trusted library allocation
page read and write
230B31B1000
trusted library allocation
page read and write
230A8CE1000
heap
page read and write
23233FE000
stack
page read and write
230B206D000
trusted library allocation
page read and write
230BD133000
trusted library allocation
page read and write
230BA844000
trusted library allocation
page read and write
230B3FFE000
trusted library allocation
page read and write
230BDDEA000
trusted library allocation
page read and write
230B31BC000
trusted library allocation
page read and write
230B356D000
trusted library allocation
page read and write
1F24F2CA000
heap
page read and write
230A8D0F000
heap
page read and write
230B3959000
trusted library allocation
page read and write
230B4ABF000
trusted library allocation
page read and write
230B46DF000
trusted library allocation
page read and write
230BC2D4000
trusted library allocation
page read and write
230B3942000
trusted library allocation
page read and write
230BDDEA000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230BA59B000
trusted library allocation
page read and write
230B1C8E000
trusted library allocation
page read and write
230B3FE5000
trusted library allocation
page read and write
230BA5C3000
trusted library allocation
page read and write
1F24F36E000
heap
page read and write
230B32DC000
trusted library allocation
page read and write
230B3575000
trusted library allocation
page read and write
230B1C0A000
trusted library allocation
page read and write
230B276B000
trusted library allocation
page read and write
2743B8D1000
heap
page read and write
230B35AB000
trusted library allocation
page read and write
1F24F33C000
heap
page read and write
230B4A63000
trusted library allocation
page read and write
230BC4D3000
trusted library allocation
page read and write
230A8CCE000
heap
page read and write
230B67B8000
heap
page read and write
230B4A4F000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B4A56000
trusted library allocation
page read and write
230B54D6000
trusted library allocation
page read and write
230A8CB0000
heap
page read and write
230BC0AC000
trusted library allocation
page read and write
230B2E3F000
trusted library allocation
page read and write
230B2E3D000
trusted library allocation
page read and write
230BDD77000
trusted library allocation
page read and write
230B453D000
trusted library allocation
page read and write
230B39EB000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8D19000
heap
page read and write
230BA964000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B46D9000
trusted library allocation
page read and write
230AF8ED000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
230B3907000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230BDD46000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230B1F9B000
trusted library allocation
page read and write
230BC4A2000
trusted library allocation
page read and write
230B5498000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230B3170000
trusted library allocation
page read and write
230B45D8000
trusted library allocation
page read and write
230B321F000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230BABDF000
trusted library allocation
page read and write
230B2080000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230BA492000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
1F24E5B9000
trusted library allocation
page read and write
230BC2E7000
trusted library allocation
page read and write
230BA486000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CE4000
heap
page read and write
230B31C3000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230BABC6000
trusted library allocation
page read and write
230B676A000
heap
page read and write
230AF4F6000
trusted library allocation
page read and write
1F24E6B4000
heap
page read and write
230B3FD2000
trusted library allocation
page read and write
230B4A56000
trusted library allocation
page read and write
230B399B000
trusted library allocation
page read and write
230B350A000
trusted library allocation
page read and write
230B4A22000
trusted library allocation
page read and write
230B1F6E000
trusted library allocation
page read and write
1F24E370000
heap
page read and write
230AF4F6000
trusted library allocation
page read and write
230A8CC1000
heap
page read and write
230B378A000
trusted library allocation
page read and write
230B3905000
trusted library allocation
page read and write
230B321B000
trusted library allocation
page read and write
230B39EF000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B3280000
trusted library allocation
page read and write
230B397C000
trusted library allocation
page read and write
230B54AC000
trusted library allocation
page read and write
230AF4BE000
trusted library allocation
page read and write
230AF8EE000
trusted library allocation
page read and write
230BA48E000
trusted library allocation
page read and write
230B3FDB000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230A8CD2000
heap
page read and write
230B35A0000
trusted library allocation
page read and write
230BA523000
trusted library allocation
page read and write
230B3545000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
230B548F000
trusted library allocation
page read and write
230BC495000
trusted library allocation
page read and write
230BC039000
trusted library allocation
page read and write
41B2BFE000
stack
page read and write
230BABDF000
trusted library allocation
page read and write
230AF830000
trusted library allocation
page read and write
230BE1CE000
trusted library allocation
page read and write
230BA577000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230A8D36000
heap
page read and write
1F24F2A0000
heap
page read and write
230BA47A000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230B203F000
trusted library allocation
page read and write
230B209C000
trusted library allocation
page read and write
230B3517000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230BC21F000
trusted library allocation
page read and write
230B3FC6000
trusted library allocation
page read and write
230B374E000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230BA9B7000
trusted library allocation
page read and write
230B5A89000
trusted library allocation
page read and write
230AE1E4000
trusted library allocation
page read and write
230B59C2000
trusted library allocation
page read and write
230BDC55000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230B2E48000
trusted library allocation
page read and write
230AF863000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230B3D43000
trusted library allocation
page read and write
230AF44C000
trusted library allocation
page read and write
230B33AF000
trusted library allocation
page read and write
230B5A60000
trusted library allocation
page read and write
230B4A49000
trusted library allocation
page read and write
24B5CCCB000
trusted library allocation
page read and write
230B32DC000
trusted library allocation
page read and write
230B3254000
trusted library allocation
page read and write
230BA87C000
trusted library allocation
page read and write
230AD6DF000
trusted library allocation
page read and write
230BA53C000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
230B1C8F000
trusted library allocation
page read and write
230B209E000
trusted library allocation
page read and write
230B324B000
trusted library allocation
page read and write
2743B8D8000
heap
page read and write
230BAAE4000
trusted library allocation
page read and write
230B592B000
trusted library allocation
page read and write
230B468F000
trusted library allocation
page read and write
230B1CA2000
trusted library allocation
page read and write
230B3210000
trusted library allocation
page read and write
230AF4F0000
trusted library allocation
page read and write
230B22D9000
trusted library allocation
page read and write
230B47B7000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230A8D27000
heap
page read and write
230A8D0B000
heap
page read and write
230B3947000
trusted library allocation
page read and write
230BA584000
trusted library allocation
page read and write
230B31F0000
trusted library allocation
page read and write
230B4634000
trusted library allocation
page read and write
230B3216000
trusted library allocation
page read and write
230AF4BC000
trusted library allocation
page read and write
230BABE7000
trusted library allocation
page read and write
230BA596000
trusted library allocation
page read and write
230B3511000
trusted library allocation
page read and write
230AF8E8000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B4A5C000
trusted library allocation
page read and write
230BA830000
trusted library allocation
page read and write
230B3FFB000
trusted library allocation
page read and write
230B3944000
trusted library allocation
page read and write
230B3979000
trusted library allocation
page read and write
230B2EF9000
trusted library allocation
page read and write
230BA9E0000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B31C3000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230B6746000
heap
page read and write
230B31EE000
trusted library allocation
page read and write
230AF4E0000
trusted library allocation
page read and write
230B35B7000
trusted library allocation
page read and write
230B39AB000
trusted library allocation
page read and write
21A837A2000
unclassified section
page read and write
1F24F2BD000
heap
page read and write
230BC2DB000
trusted library allocation
page read and write
230B58BB000
trusted library allocation
page read and write
230B2E8C000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
230A8D14000
heap
page read and write
230B1C8A000
trusted library allocation
page read and write
230AE166000
trusted library allocation
page read and write
230B4045000
trusted library allocation
page read and write
230BABCD000
trusted library allocation
page read and write
230BA562000
trusted library allocation
page read and write
230BA6B1000
trusted library allocation
page read and write
230BAE34000
trusted library allocation
page read and write
1F24F33C000
heap
page read and write
230B46DD000
trusted library allocation
page read and write
230B37C6000
trusted library allocation
page read and write
230B552F000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B20F9000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230A8D1C000
heap
page read and write
230B393F000
trusted library allocation
page read and write
230AFA83000
heap
page read and write
230AF43A000
trusted library allocation
page read and write
230AF19C000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B3D25000
trusted library allocation
page read and write
230AFA8F000
heap
page read and write
230A8CD2000
heap
page read and write
230BC4F7000
trusted library allocation
page read and write
230B4A0C000
trusted library allocation
page read and write
230BA469000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230A8CDE000
heap
page read and write
230AF2FB000
trusted library allocation
page read and write
230B3257000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B1CDC000
trusted library allocation
page read and write
1F24EE05000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B5A60000
trusted library allocation
page read and write
7C0000
heap
page read and write
230B31F0000
trusted library allocation
page read and write
230B22FE000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230B3D33000
trusted library allocation
page read and write
230BA928000
trusted library allocation
page read and write
230B35AB000
trusted library allocation
page read and write
1F24EB73000
unkown
page execute read
230BD048000
trusted library allocation
page read and write
230BC227000
trusted library allocation
page read and write
230BA9BB000
trusted library allocation
page read and write
230B1CFD000
trusted library allocation
page read and write
230BC05D000
trusted library allocation
page read and write
230BC2E5000
trusted library allocation
page read and write
230BA757000
trusted library allocation
page read and write
230B3725000
trusted library allocation
page read and write
230BA866000
trusted library allocation
page read and write
230B4A0C000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B322A000
trusted library allocation
page read and write
230A8D1A000
heap
page read and write
230B3D5C000
trusted library allocation
page read and write
230B37E0000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230BA84A000
trusted library allocation
page read and write
230B3FD1000
trusted library allocation
page read and write
230BDCCD000
trusted library allocation
page read and write
230A8D17000
heap
page read and write
230BA9CD000
trusted library allocation
page read and write
230BD0A7000
trusted library allocation
page read and write
21A835AE000
remote allocation
page execute read
230AD690000
trusted library allocation
page read and write
230B4AAF000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230BC4F5000
trusted library allocation
page read and write
230A8CBA000
heap
page read and write
230B39E6000
trusted library allocation
page read and write
230BAAE4000
trusted library allocation
page read and write
230BC4B1000
trusted library allocation
page read and write
230B54D6000
trusted library allocation
page read and write
230B33DA000
trusted library allocation
page read and write
230AF1FE000
trusted library allocation
page read and write
230B375D000
trusted library allocation
page read and write
230BDD69000
trusted library allocation
page read and write
230B3F96000
trusted library allocation
page read and write
230B1CB4000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230B55EE000
trusted library allocation
page read and write
230BA947000
trusted library allocation
page read and write
230BC2E7000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230BC407000
trusted library allocation
page read and write
1F24F3AF000
heap
page read and write
230BA788000
trusted library allocation
page read and write
230B45D8000
trusted library allocation
page read and write
DDB000
stack
page read and write
230A8D17000
heap
page read and write
230AE126000
trusted library allocation
page read and write
D3817FE000
stack
page read and write
230BA7E2000
trusted library allocation
page read and write
2743B855000
heap
page read and write
230BA6A1000
trusted library allocation
page read and write
230B2049000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B2E3F000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8CD6000
heap
page read and write
230A8D31000
heap
page read and write
230B2E3B000
trusted library allocation
page read and write
230AF4AA000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B4A9A000
trusted library allocation
page read and write
230B33A9000
trusted library allocation
page read and write
230B586C000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B67E3000
heap
page read and write
230AFA82000
heap
page read and write
230B2E41000
trusted library allocation
page read and write
230BA99E000
trusted library allocation
page read and write
230B55FD000
trusted library allocation
page read and write
230B35B7000
trusted library allocation
page read and write
230B3963000
trusted library allocation
page read and write
230B3FE5000
trusted library allocation
page read and write
230AFA66000
heap
page read and write
230B454D000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230A8D14000
heap
page read and write
230B3FE5000
trusted library allocation
page read and write
230B351E000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
1252000
heap
page read and write
230A8D17000
heap
page read and write
230B5594000
trusted library allocation
page read and write
230B4043000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B4A36000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230BA8B0000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
230B5A69000
trusted library allocation
page read and write
230B37E4000
trusted library allocation
page read and write
230B3158000
trusted library allocation
page read and write
230B37F0000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B4A42000
trusted library allocation
page read and write
230BD007000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B46FA000
trusted library allocation
page read and write
230AE175000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230AF2CA000
trusted library allocation
page read and write
230B4AB6000
trusted library allocation
page read and write
230B5AB6000
trusted library allocation
page read and write
230B378C000
trusted library allocation
page read and write
230B2080000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230BDD77000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230B37C8000
trusted library allocation
page read and write
230BA839000
trusted library allocation
page read and write
21A83976000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230BA839000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
230A8D0B000
heap
page read and write
230BA48E000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B315B000
trusted library allocation
page read and write
230B31B1000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230BABCF000
trusted library allocation
page read and write
230B31EE000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230A8CAF000
heap
page read and write
230A8D0B000
heap
page read and write
230BAEF9000
trusted library allocation
page read and write
230B1E87000
trusted library allocation
page read and write
230B31C0000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
230B6401000
trusted library allocation
page read and write
230B372E000
trusted library allocation
page read and write
230B22CC000
trusted library allocation
page read and write
230BDDD3000
trusted library allocation
page read and write
230BA9CB000
trusted library allocation
page read and write
230AE071000
trusted library allocation
page read and write
230BA7FC000
trusted library allocation
page read and write
230B358C000
trusted library allocation
page read and write
230B3258000
trusted library allocation
page read and write
230AF536000
trusted library allocation
page read and write
230B4A87000
trusted library allocation
page read and write
230B356D000
trusted library allocation
page read and write
230BA9AA000
trusted library allocation
page read and write
230B4047000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B1F32000
trusted library allocation
page read and write
230B3479000
trusted library allocation
page read and write
230B5A5C000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
1F24F3AF000
heap
page read and write
230BDCB3000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BC6D4000
trusted library allocation
page read and write
230B6735000
heap
page read and write
230B31B1000
trusted library allocation
page read and write
230B320F000
trusted library allocation
page read and write
230B3170000
trusted library allocation
page read and write
230B32D6000
trusted library allocation
page read and write
230B2092000
trusted library allocation
page read and write
230BDD5A000
trusted library allocation
page read and write
230B3918000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
230BD101000
trusted library allocation
page read and write
230AF49A000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B3FCD000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B20F9000
trusted library allocation
page read and write
230B5AA6000
trusted library allocation
page read and write
24B5CE32000
trusted library allocation
page read and write
230AF8D0000
trusted library allocation
page read and write
230BA49A000
trusted library allocation
page read and write
230B4A3A000
trusted library allocation
page read and write
230BA9A4000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230BD800000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230AE175000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
230A8CDE000
heap
page read and write
230AD6CE000
trusted library allocation
page read and write
230AF137000
trusted library allocation
page read and write
230B206F000
trusted library allocation
page read and write
230BAEE2000
trusted library allocation
page read and write
230B3D53000
trusted library allocation
page read and write
1F24EC50000
heap
page read and write
230A8CD6000
heap
page read and write
230B2080000
trusted library allocation
page read and write
230B396D000
trusted library allocation
page read and write
230B1C8E000
trusted library allocation
page read and write
230B3570000
trusted library allocation
page read and write
230B5A80000
trusted library allocation
page read and write
2743B900000
trusted library allocation
page read and write
230AFA64000
heap
page read and write
230B3D96000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230B350B000
trusted library allocation
page read and write
230B46D9000
trusted library allocation
page read and write
230BC2B6000
trusted library allocation
page read and write
230BA57B000
trusted library allocation
page read and write
230AFA84000
heap
page read and write
230B3FE9000
trusted library allocation
page read and write
230AF8C4000
trusted library allocation
page read and write
230BA626000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230A8D0D000
heap
page read and write
230A8CD2000
heap
page read and write
230BA964000
trusted library allocation
page read and write
230BC295000
trusted library allocation
page read and write
230B3135000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230BDDED000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230A8CE4000
heap
page read and write
230B2097000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230B45D0000
trusted library allocation
page read and write
230B20F9000
trusted library allocation
page read and write
1F24F385000
heap
page read and write
125D000
heap
page read and write
230BDCFE000
trusted library allocation
page read and write
230B3F89000
trusted library allocation
page read and write
230B3F92000
trusted library allocation
page read and write
CEF15FE000
stack
page read and write
230BA5A8000
trusted library allocation
page read and write
230B5897000
trusted library allocation
page read and write
230B2E3D000
trusted library allocation
page read and write
230B22D1000
trusted library allocation
page read and write
230BC0D0000
trusted library allocation
page read and write
230B31BC000
trusted library allocation
page read and write
1F24E400000
trusted library allocation
page read and write
230B1C3A000
trusted library allocation
page read and write
1F24E573000
trusted library allocation
page read and write
230BA6B1000
trusted library allocation
page read and write
230A8CDF000
heap
page read and write
230B3D82000
trusted library allocation
page read and write
1F24F329000
heap
page read and write
230B39A1000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B404A000
trusted library allocation
page read and write
230B5A5E000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230B207C000
trusted library allocation
page read and write
230BC2E1000
trusted library allocation
page read and write
230B3FC6000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230AD6EF000
trusted library allocation
page read and write
230B315E000
trusted library allocation
page read and write
230B46AF000
trusted library allocation
page read and write
230B1E75000
trusted library allocation
page read and write
230B3F58000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B43F9000
trusted library allocation
page read and write
1F24E65F000
unclassified section
page read and write
230B22F8000
trusted library allocation
page read and write
230B5550000
trusted library allocation
page read and write
230B1F6E000
trusted library allocation
page read and write
1F24EB60000
trusted library allocation
page read and write
230B3985000
trusted library allocation
page read and write
230AF4BE000
trusted library allocation
page read and write
230B397C000
trusted library allocation
page read and write
24B5CC96000
trusted library allocation
page read and write
230B4A87000
trusted library allocation
page read and write
230BA584000
trusted library allocation
page read and write
230A8CD4000
heap
page read and write
230A8CE3000
heap
page read and write
230A8CD8000
heap
page read and write
230BA596000
trusted library allocation
page read and write
230B3FF9000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
230B588B000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B34B6000
trusted library allocation
page read and write
230BDD72000
trusted library allocation
page read and write
1F24F363000
heap
page read and write
230B37D0000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230B1CA2000
trusted library allocation
page read and write
230B6771000
heap
page read and write
230A8CFA000
heap
page read and write
1F24F3AF000
heap
page read and write
230BA86E000
trusted library allocation
page read and write
230B3F56000
trusted library allocation
page read and write
230B5ABD000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
1273000
heap
page read and write
230A8D0B000
heap
page read and write
230AFA83000
heap
page read and write
230A8CC9000
heap
page read and write
230BDD39000
trusted library allocation
page read and write
230A8CE4000
heap
page read and write
1F24E3C0000
heap
page read and write
230A8D0F000
heap
page read and write
230B5541000
trusted library allocation
page read and write
230BDD3B000
trusted library allocation
page read and write
230B205D000
trusted library allocation
page read and write
230B1EA1000
trusted library allocation
page read and write
230B4A07000
trusted library allocation
page read and write
230B555E000
trusted library allocation
page read and write
230B357B000
trusted library allocation
page read and write
230B37E6000
trusted library allocation
page read and write
230B34FD000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230BA9A6000
trusted library allocation
page read and write
230B20BC000
trusted library allocation
page read and write
230BC064000
trusted library allocation
page read and write
230B1EC4000
trusted library allocation
page read and write
230B397C000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230BAA9A000
trusted library allocation
page read and write
230BDD2E000
trusted library allocation
page read and write
230B469D000
trusted library allocation
page read and write
230B31B4000
trusted library allocation
page read and write
230AFA60000
heap
page read and write
1F24F331000
heap
page read and write
230B3D45000
trusted library allocation
page read and write
230A8D24000
heap
page read and write
41B343B000
stack
page read and write
230B6736000
heap
page read and write
230B557A000
trusted library allocation
page read and write
230BA554000
trusted library allocation
page read and write
230B3D81000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
1104000
heap
page read and write
230B2017000
trusted library allocation
page read and write
230BC4AC000
trusted library allocation
page read and write
230B1F53000
trusted library allocation
page read and write
230BDCE9000
trusted library allocation
page read and write
230B3231000
trusted library allocation
page read and write
230B40F6000
trusted library allocation
page read and write
230B3D68000
trusted library allocation
page read and write
230AE1DB000
trusted library allocation
page read and write
230B32C0000
trusted library allocation
page read and write
230BA526000
trusted library allocation
page read and write
1F24F3B8000
heap
page read and write
230B55FD000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
230B44EA000
trusted library allocation
page read and write
230B37A0000
trusted library allocation
page read and write
230BA560000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230B22B9000
trusted library allocation
page read and write
230B313E000
trusted library allocation
page read and write
230A8D21000
heap
page read and write
230A8D0B000
heap
page read and write
230BABE7000
trusted library allocation
page read and write
230B46AF000
trusted library allocation
page read and write
230B4A2A000
trusted library allocation
page read and write
230B22C0000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B357F000
trusted library allocation
page read and write
230BA5C3000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230B4A9A000
trusted library allocation
page read and write
230B3DB2000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
24B5CF06000
heap
page read and write
230A8CD8000
heap
page read and write
230AF4A8000
trusted library allocation
page read and write
230B32DC000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
24B5CC9D000
trusted library allocation
page read and write
230BC6DC000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230A8CE2000
heap
page read and write
230B1EE9000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230BAA51000
trusted library allocation
page read and write
230BABE1000
trusted library allocation
page read and write
230BA866000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230B47B4000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B3566000
trusted library allocation
page read and write
230B22D3000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8CD8000
heap
page read and write
230B31BC000
trusted library allocation
page read and write
230B3589000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
230B319E000
trusted library allocation
page read and write
230B35B1000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
21A836F0000
heap
page read and write
230A8D0B000
heap
page read and write
230A8CD2000
heap
page read and write
230B3258000
trusted library allocation
page read and write
230AE126000
trusted library allocation
page read and write
230BDDBF000
trusted library allocation
page read and write
21A83900000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B3D25000
trusted library allocation
page read and write
230BA562000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230A8CD2000
heap
page read and write
230B3D25000
trusted library allocation
page read and write
230BA564000
trusted library allocation
page read and write
230BC2DB000
trusted library allocation
page read and write
230BC4F0000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B63A3000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230AFA52000
heap
page read and write
230B1CDB000
trusted library allocation
page read and write
230B34B9000
trusted library allocation
page read and write
41B4DFE000
stack
page read and write
230A8CAD000
heap
page read and write
230B3934000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230B1E43000
trusted library allocation
page read and write
1F24EB40000
trusted library allocation
page read and write
230BABBE000
trusted library allocation
page read and write
230B3168000
trusted library allocation
page read and write
230BA523000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B33E4000
trusted library allocation
page read and write
1DA563A0000
heap
page read and write
1F24E200000
unclassified section
page readonly
24B5C8E0000
unclassified section
page readonly
230B1EC5000
trusted library allocation
page read and write
230B469B000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8D27000
heap
page read and write
230BD000000
trusted library allocation
page read and write
230AFA51000
heap
page read and write
230B3F80000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230A8CB5000
heap
page read and write
230B1E52000
trusted library allocation
page read and write
230B2049000
trusted library allocation
page read and write
230BA586000
trusted library allocation
page read and write
230BAA47000
trusted library allocation
page read and write
230B594B000
trusted library allocation
page read and write
230B3D45000
trusted library allocation
page read and write
1F24F331000
heap
page read and write
230B321F000
trusted library allocation
page read and write
24B5CAC2000
unclassified section
page read and write
230B39F9000
trusted library allocation
page read and write
1257000
heap
page read and write
230B55F4000
trusted library allocation
page read and write
230B5557000
trusted library allocation
page read and write
230B3265000
trusted library allocation
page read and write
230BA635000
trusted library allocation
page read and write
1F24F385000
heap
page read and write
230B3D08000
trusted library allocation
page read and write
21A839B6000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
230B39BB000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
230B35B7000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230B351E000
trusted library allocation
page read and write
230B3261000
trusted library allocation
page read and write
21A83780000
heap
page readonly
230A8CCF000
heap
page read and write
230A8D32000
heap
page read and write
230BC2D8000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230B4A5C000
trusted library allocation
page read and write
21A83C07000
trusted library allocation
page read and write
230BA59B000
trusted library allocation
page read and write
1104000
heap
page read and write
230B39BC000
trusted library allocation
page read and write
1F24E652000
unclassified section
page read and write
230BABEF000
trusted library allocation
page read and write
230AF8F9000
trusted library allocation
page read and write
230B3575000
trusted library allocation
page read and write
1260000
heap
page read and write
230B4A7F000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B31E5000
trusted library allocation
page read and write
230BA9AA000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B1CAE000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B3270000
trusted library allocation
page read and write
230BCF84000
trusted library allocation
page read and write
230BDDBF000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230BAEE0000
trusted library allocation
page read and write
230AF136000
trusted library allocation
page read and write
230B356D000
trusted library allocation
page read and write
230BABD8000
trusted library allocation
page read and write
230AF863000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B32A0000
trusted library allocation
page read and write
230B37D2000
trusted library allocation
page read and write
230BA972000
trusted library allocation
page read and write
230B22CF000
trusted library allocation
page read and write
230BA66A000
trusted library allocation
page read and write
230BABCF000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230BAECF000
trusted library allocation
page read and write
1F24F328000
heap
page read and write
230BC40C000
trusted library allocation
page read and write
230B32E1000
trusted library allocation
page read and write
230BC6E4000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B4A5C000
trusted library allocation
page read and write
230B2080000
trusted library allocation
page read and write
230B32FB000
trusted library allocation
page read and write
230B1CCE000
trusted library allocation
page read and write
230B1C31000
trusted library allocation
page read and write
230BA5A0000
trusted library allocation
page read and write
230B4A49000
trusted library allocation
page read and write
230BAA5C000
trusted library allocation
page read and write
230B46AF000
trusted library allocation
page read and write
230A8D32000
heap
page read and write
230BA722000
trusted library allocation
page read and write
230B3F8D000
trusted library allocation
page read and write
230B456E000
trusted library allocation
page read and write
230BDCCD000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
230B5AB6000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230B46A2000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230B55F4000
trusted library allocation
page read and write
230B58C6000
trusted library allocation
page read and write
230AF433000
trusted library allocation
page read and write
230A8D25000
heap
page read and write
230A8CD8000
heap
page read and write
230B5594000
trusted library allocation
page read and write
230BA9F0000
trusted library allocation
page read and write
1F24E578000
trusted library allocation
page read and write
230B2093000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
230B39E3000
trusted library allocation
page read and write
230B4A3A000
trusted library allocation
page read and write
230BABD8000
trusted library allocation
page read and write
230BAEE2000
trusted library allocation
page read and write
1E2E000
stack
page read and write
230B22D3000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230AF4A8000
trusted library allocation
page read and write
230BAA79000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230A8CDE000
heap
page read and write
230A8CB4000
heap
page read and write
230B44EC000
trusted library allocation
page read and write
230BA8C0000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230B3593000
trusted library allocation
page read and write
230AF4C7000
trusted library allocation
page read and write
230B4AAF000
trusted library allocation
page read and write
230B5971000
trusted library allocation
page read and write
230B37FB000
trusted library allocation
page read and write
230BA84E000
trusted library allocation
page read and write
230BC547000
trusted library allocation
page read and write
230B4AA9000
trusted library allocation
page read and write
230B3558000
trusted library allocation
page read and write
230B3FEB000
trusted library allocation
page read and write
41B34BD000
stack
page read and write
230A8D31000
heap
page read and write
230B5519000
trusted library allocation
page read and write
230BA582000
trusted library allocation
page read and write
230AF4A6000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230BDDB5000
trusted library allocation
page read and write
230B4A63000
trusted library allocation
page read and write
230B3293000
trusted library allocation
page read and write
230B31F0000
trusted library allocation
page read and write
230B1EC5000
trusted library allocation
page read and write
230AF862000
trusted library allocation
page read and write
230BA82A000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230A8CD6000
heap
page read and write
230B456E000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230BAA7C000
trusted library allocation
page read and write
D3FFAFE000
unkown
page readonly
230B5482000
trusted library allocation
page read and write
230BA4CB000
trusted library allocation
page read and write
230BC4B1000
trusted library allocation
page read and write
230B37D0000
trusted library allocation
page read and write
1F24EE03000
trusted library allocation
page read and write
230BD00C000
trusted library allocation
page read and write
230BABE7000
trusted library allocation
page read and write
24B5CCE9000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
230B548F000
trusted library allocation
page read and write
1F24F328000
heap
page read and write
D3FFB3E000
stack
page read and write
230B3590000
trusted library allocation
page read and write
230BA9CF000
trusted library allocation
page read and write
1F24F329000
heap
page read and write
230BC2D6000
trusted library allocation
page read and write
41B1BD8000
stack
page read and write
230A8CC8000
heap
page read and write
230BA5B1000
trusted library allocation
page read and write
23223FF000
stack
page read and write
230A8D0F000
heap
page read and write
230B3795000
trusted library allocation
page read and write
230B3F85000
trusted library allocation
page read and write
230AF830000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230BC2E3000
trusted library allocation
page read and write
230BA9D1000
trusted library allocation
page read and write
230B37D6000
trusted library allocation
page read and write
230B3725000
trusted library allocation
page read and write
230B3515000
trusted library allocation
page read and write
230BA514000
trusted library allocation
page read and write
230BDCE4000
trusted library allocation
page read and write
230B5557000
trusted library allocation
page read and write
230BA4E4000
trusted library allocation
page read and write
230A8D19000
heap
page read and write
230B46C9000
trusted library allocation
page read and write
230B3138000
trusted library allocation
page read and write
230BA9BF000
trusted library allocation
page read and write
230B46C9000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B4A3A000
trusted library allocation
page read and write
1230000
heap
page read and write
230B322A000
trusted library allocation
page read and write
230BAAAB000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230BD0E4000
trusted library allocation
page read and write
230AF8EC000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
24B5CD26000
heap
page read and write
F42000
unkown
page readonly
230BE51C000
trusted library allocation
page read and write
230B56DD000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
230A8D0B000
heap
page read and write
2743B8C3000
heap
page read and write
230B322A000
trusted library allocation
page read and write
230B4009000
trusted library allocation
page read and write
230B559E000
trusted library allocation
page read and write
230B2771000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230AF4F6000
trusted library allocation
page read and write
230A8CF3000
heap
page read and write
230B3154000
trusted library allocation
page read and write
230B3D23000
trusted library allocation
page read and write
230AFA66000
heap
page read and write
24B5CAA0000
heap
page read and write
230B3980000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
24B5CE21000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230A8D1B000
heap
page read and write
230B6771000
heap
page read and write
230BA892000
trusted library allocation
page read and write
230BE550000
trusted library allocation
page read and write
230B4AC4000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B1F6E000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230BAA9E000
trusted library allocation
page read and write
230BABDC000
trusted library allocation
page read and write
230BCFA2000
trusted library allocation
page read and write
230B39E3000
trusted library allocation
page read and write
1F24E6B6000
heap
page read and write
230A8CB5000
heap
page read and write
230A8CB3000
heap
page read and write
230B40DD000
trusted library allocation
page read and write
230BAAA3000
trusted library allocation
page read and write
21A83C00000
trusted library allocation
page read and write
230AE16A000
trusted library allocation
page read and write
230B317A000
trusted library allocation
page read and write
230B4A15000
trusted library allocation
page read and write
24B5CAA3000
heap
page read and write
230BC44D000
trusted library allocation
page read and write
230AF4FE000
trusted library allocation
page read and write
D3FD1D8000
stack
page read and write
230BA48A000
trusted library allocation
page read and write
230B1F5B000
trusted library allocation
page read and write
2743BA0A000
trusted library allocation
page read and write
41B353E000
stack
page read and write
230B319E000
trusted library allocation
page read and write
230A8CC8000
heap
page read and write
230B3293000
trusted library allocation
page read and write
230B5583000
trusted library allocation
page read and write
D3FFBBE000
stack
page read and write
230B3149000
trusted library allocation
page read and write
24B5CCB1000
trusted library allocation
page read and write
230B5567000
trusted library allocation
page read and write
230BA564000
trusted library allocation
page read and write
230B1FFA000
trusted library allocation
page read and write
230B462F000
trusted library allocation
page read and write
230B1D00000
trusted library allocation
page read and write
230B1E79000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B3DF4000
trusted library allocation
page read and write
230BC0B1000
trusted library allocation
page read and write
230B67E1000
heap
page read and write
230AF4DF000
trusted library allocation
page read and write
230BC387000
trusted library allocation
page read and write
230B3165000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230B3DD2000
trusted library allocation
page read and write
230B32CF000
trusted library allocation
page read and write
230B357F000
trusted library allocation
page read and write
230B1F76000
trusted library allocation
page read and write
24B5CA40000
heap
page read and write
230B62A2000
trusted library allocation
page read and write
230B39C0000
trusted library allocation
page read and write
230B34CF000
trusted library allocation
page read and write
230BA5FE000
trusted library allocation
page read and write
230B1C24000
trusted library allocation
page read and write
230B5498000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230A8D0D000
heap
page read and write
230A8CE6000
heap
page read and write
230A8CD8000
heap
page read and write
230B2E36000
trusted library allocation
page read and write
2743D2D0000
heap
page read and write
230AF414000
trusted library allocation
page read and write
1F24E564000
trusted library allocation
page read and write
230BA7EF000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BAC00000
trusted library allocation
page read and write
230B46D5000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230A8D0F000
heap
page read and write
230B54E6000
trusted library allocation
page read and write
230B392C000
trusted library allocation
page read and write
230B5A62000
trusted library allocation
page read and write
230AF4EF000
trusted library allocation
page read and write
230B2EA1000
trusted library allocation
page read and write
230B31B7000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230A8CB5000
heap
page read and write
230BDDDD000
trusted library allocation
page read and write
230BA562000
trusted library allocation
page read and write
230B47E5000
trusted library allocation
page read and write
230BA564000
trusted library allocation
page read and write
230B3FFE000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230A8D15000
heap
page read and write
230B39A1000
trusted library allocation
page read and write
230BA7E5000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230B47D8000
trusted library allocation
page read and write
230B334C000
trusted library allocation
page read and write
230AF4FA000
trusted library allocation
page read and write
230AD698000
trusted library allocation
page read and write
230B3DCF000
trusted library allocation
page read and write
24B5CCB7000
trusted library allocation
page read and write
230B3528000
trusted library allocation
page read and write
230BA6F7000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
230BC4F0000
trusted library allocation
page read and write
230BDCD9000
trusted library allocation
page read and write
230BA972000
trusted library allocation
page read and write
75A000
stack
page read and write
230BDD36000
trusted library allocation
page read and write
230B32EA000
trusted library allocation
page read and write
230AE119000
trusted library allocation
page read and write
230BC0A1000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230B37DF000
trusted library allocation
page read and write
230BC495000
trusted library allocation
page read and write
230BC4B6000
trusted library allocation
page read and write
230B4AD4000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
230BA6AC000
trusted library allocation
page read and write
230AFA7D000
heap
page read and write
230A8CD2000
heap
page read and write
21A83930000
trusted library allocation
page read and write
5E33E7E000
unkown
page readonly
230B3FF8000
trusted library allocation
page read and write
230B33F3000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230AF4F8000
trusted library allocation
page read and write
230B4033000
trusted library allocation
page read and write
230B37ED000
trusted library allocation
page read and write
230BC52C000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230B3165000
trusted library allocation
page read and write
24B5C900000
heap
page read and write
230B1CB7000
trusted library allocation
page read and write
230A8D29000
heap
page read and write
230B468F000
trusted library allocation
page read and write
1F24E5C7000
trusted library allocation
page read and write
24B5C8DA000
remote allocation
page execute read
1104000
heap
page read and write
230A8CD8000
heap
page read and write
230B32FE000
trusted library allocation
page read and write
230BA523000
trusted library allocation
page read and write
3A61000
heap
page read and write
230A8D16000
heap
page read and write
230BA486000
trusted library allocation
page read and write
230BA9B5000
trusted library allocation
page read and write
230B4033000
trusted library allocation
page read and write
230B5AC5000
trusted library allocation
page read and write
24B5CD24000
heap
page read and write
230AFA69000
heap
page read and write
230BC4DD000
trusted library allocation
page read and write
230A8CBD000
heap
page read and write
230B59BA000
trusted library allocation
page read and write
24B5CC0D000
trusted library allocation
page read and write
1F24F2A0000
heap
page read and write
230B39D5000
trusted library allocation
page read and write
230AD6EF000
trusted library allocation
page read and write
230BAA76000
trusted library allocation
page read and write
230B39CE000
trusted library allocation
page read and write
1F24F331000
heap
page read and write
230BA66A000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
230B4ABF000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230BA49E000
trusted library allocation
page read and write
23223FC000
stack
page read and write
230A8D29000
heap
page read and write
230B45F0000
trusted library allocation
page read and write
230BA85C000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B469D000
trusted library allocation
page read and write
230B37E6000
trusted library allocation
page read and write
230B3263000
trusted library allocation
page read and write
21A837AF000
unclassified section
page read and write
21A839B1000
trusted library allocation
page read and write
230AF4FA000
trusted library allocation
page read and write
230B22A6000
trusted library allocation
page read and write
230BA560000
trusted library allocation
page read and write
230B39B2000
trusted library allocation
page read and write
230B1C8E000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230B5A72000
trusted library allocation
page read and write
1F24F326000
heap
page read and write
230BABDF000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
F1C000
unkown
page readonly
230BDD8D000
trusted library allocation
page read and write
1F24E1F0000
unclassified section
page readonly
230A8CCF000
heap
page read and write
125C000
heap
page read and write
1104000
heap
page read and write
230A8D16000
heap
page read and write
1274000
heap
page read and write
230B1E7F000
trusted library allocation
page read and write
230B4556000
trusted library allocation
page read and write
230BAAC4000
trusted library allocation
page read and write
24B5CC63000
trusted library allocation
page read and write
230B391C000
trusted library allocation
page read and write
230BC3E5000
trusted library allocation
page read and write
230B373E000
trusted library allocation
page read and write
126F000
heap
page read and write
230A8CE3000
heap
page read and write
230A8CBB000
heap
page read and write
230B1E67000
trusted library allocation
page read and write
230B5926000
trusted library allocation
page read and write
230A8CBB000
heap
page read and write
230A8CEA000
heap
page read and write
230B41F4000
trusted library allocation
page read and write
1261000
heap
page read and write
230B46E3000
trusted library allocation
page read and write
230B35B9000
trusted library allocation
page read and write
230B316B000
trusted library allocation
page read and write
230BA5E9000
trusted library allocation
page read and write
230B3555000
trusted library allocation
page read and write
1104000
heap
page read and write
230B5487000
trusted library allocation
page read and write
230B2220000
trusted library allocation
page read and write
230BA69E000
trusted library allocation
page read and write
230B323D000
trusted library allocation
page read and write
24B5CE3D000
trusted library allocation
page read and write
230B3291000
trusted library allocation
page read and write
230B3FC0000
trusted library allocation
page read and write
230BABDF000
trusted library allocation
page read and write
21A836D0000
heap
page read and write
230B6701000
heap
page read and write
230A8CAD000
heap
page read and write
230A8CBE000
heap
page read and write
230B4007000
trusted library allocation
page read and write
230B3342000
trusted library allocation
page read and write
230B5958000
trusted library allocation
page read and write
230BA8DC000
trusted library allocation
page read and write
230B46C2000
trusted library allocation
page read and write
230B55EC000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230BC501000
trusted library allocation
page read and write
230B3D68000
trusted library allocation
page read and write
230B348F000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230BA9D1000
trusted library allocation
page read and write
230BA5A0000
trusted library allocation
page read and write
230B3165000
trusted library allocation
page read and write
230B29C9000
trusted library allocation
page read and write
230AF4D8000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230A8CE2000
heap
page read and write
230BABDF000
trusted library allocation
page read and write
230B3566000
trusted library allocation
page read and write
230B32DC000
trusted library allocation
page read and write
230B37E6000
trusted library allocation
page read and write
230BC448000
trusted library allocation
page read and write
230B46DD000
trusted library allocation
page read and write
230B58C6000
trusted library allocation
page read and write
230BD0A3000
trusted library allocation
page read and write
230B31E5000
trusted library allocation
page read and write
230A8CDF000
heap
page read and write
230B32F9000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230B33CD000
trusted library allocation
page read and write
230B4A6D000
trusted library allocation
page read and write
230AF4F6000
trusted library allocation
page read and write
230B3D3D000
trusted library allocation
page read and write
230B3123000
trusted library allocation
page read and write
230B3934000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230BAEF0000
trusted library allocation
page read and write
230BA760000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B1CAC000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230A8D0B000
heap
page read and write
21A83974000
trusted library allocation
page read and write
230B3741000
trusted library allocation
page read and write
230BAEBF000
trusted library allocation
page read and write
230BA664000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230B39B7000
trusted library allocation
page read and write
230BA76F000
trusted library allocation
page read and write
230AF46E000
trusted library allocation
page read and write
230BA586000
trusted library allocation
page read and write
21A835D0000
heap
page read and write
230B627F000
trusted library allocation
page read and write
230BCF7B000
trusted library allocation
page read and write
230B350E000
trusted library allocation
page read and write
230B348A000
trusted library allocation
page read and write
230B4AFE000
trusted library allocation
page read and write
230BA573000
trusted library allocation
page read and write
230B20F9000
trusted library allocation
page read and write
230A8D17000
heap
page read and write
230B46FB000
trusted library allocation
page read and write
21A835B0000
unclassified section
page readonly
230A8D1D000
heap
page read and write
230B3555000
trusted library allocation
page read and write
230B408B000
trusted library allocation
page read and write
F42000
unkown
page readonly
230B3982000
trusted library allocation
page read and write
230A8CC9000
heap
page read and write
1F24F2A9000
heap
page read and write
230BD157000
trusted library allocation
page read and write
230A8CEA000
heap
page read and write
230AF2F4000
trusted library allocation
page read and write
230BAA9E000
trusted library allocation
page read and write
230AF46C000
trusted library allocation
page read and write
230B6788000
heap
page read and write
21A83D00000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
230A8D1D000
heap
page read and write
230BC2FE000
trusted library allocation
page read and write
230B31BC000
trusted library allocation
page read and write
230BA5F6000
trusted library allocation
page read and write
230BA839000
trusted library allocation
page read and write
230B32A7000
trusted library allocation
page read and write
230B54A1000
trusted library allocation
page read and write
1F24F2A4000
heap
page read and write
230B37EA000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
1090000
heap
page read and write
230A8CBB000
heap
page read and write
230B2E2D000
trusted library allocation
page read and write
230BA949000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
230A8CC9000
heap
page read and write
41B3DFE000
stack
page read and write
1104000
heap
page read and write
230B3545000
trusted library allocation
page read and write
230B5562000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230A8CE3000
heap
page read and write
230A8D21000
heap
page read and write
230B20EB000
trusted library allocation
page read and write
230B1C8E000
trusted library allocation
page read and write
230BAABC000
trusted library allocation
page read and write
230B54B3000
trusted library allocation
page read and write
230AD6EF000
trusted library allocation
page read and write
230B2E36000
trusted library allocation
page read and write
230B20F7000
trusted library allocation
page read and write
230B54F7000
trusted library allocation
page read and write
230B1C96000
trusted library allocation
page read and write
230BA620000
trusted library allocation
page read and write
230B46E1000
trusted library allocation
page read and write
230A8D1B000
heap
page read and write
230B1CD0000
trusted library allocation
page read and write
1F24E290000
heap
page read and write
230B200D000
trusted library allocation
page read and write
230B5A9C000
trusted library allocation
page read and write
230A8D21000
heap
page read and write
230BABD8000
trusted library allocation
page read and write
21A83970000
trusted library allocation
page read and write
230B54F7000
trusted library allocation
page read and write
230B346E000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B2080000
trusted library allocation
page read and write
230A8D2F000
heap
page read and write
230AE113000
trusted library allocation
page read and write
230BDDD4000
trusted library allocation
page read and write
230A8CD1000
heap
page read and write
230BA82B000
trusted library allocation
page read and write
230AFA38000
heap
page read and write
230B4A63000
trusted library allocation
page read and write
230B3206000
trusted library allocation
page read and write
230B54F0000
trusted library allocation
page read and write
230B35EC000
trusted library allocation
page read and write
230B3789000
trusted library allocation
page read and write
230BAE52000
trusted library allocation
page read and write
230B47B7000
trusted library allocation
page read and write
230B2EE9000
trusted library allocation
page read and write
230B32DC000
trusted library allocation
page read and write
230BA9B1000
trusted library allocation
page read and write
230B463A000
trusted library allocation
page read and write
230B54C0000
trusted library allocation
page read and write
230B47E7000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B4AA9000
trusted library allocation
page read and write
230B35BA000
trusted library allocation
page read and write
230BA663000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230AF4F6000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
21A83D0C000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230B32FE000
trusted library allocation
page read and write
230BC4B6000
trusted library allocation
page read and write
230B3624000
trusted library allocation
page read and write
230B3942000
trusted library allocation
page read and write
230B4592000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230BA99A000
trusted library allocation
page read and write
230B6305000
trusted library allocation
page read and write
230B39D5000
trusted library allocation
page read and write
230B32FE000
trusted library allocation
page read and write
230B59BA000
trusted library allocation
page read and write
230A8CDE000
heap
page read and write
230A8D14000
heap
page read and write
230A8CDE000
heap
page read and write
230B39D9000
trusted library allocation
page read and write
230AF4FA000
trusted library allocation
page read and write
5E2FBBD000
stack
page read and write
230B3FC9000
trusted library allocation
page read and write
230AFA7F000
heap
page read and write
230B4636000
trusted library allocation
page read and write
1DA56707000
trusted library allocation
page read and write
230BC2F9000
trusted library allocation
page read and write
230B32DF000
trusted library allocation
page read and write
230BAB89000
trusted library allocation
page read and write
230BC2E5000
trusted library allocation
page read and write
1F24F2E1000
heap
page read and write
230A8D0B000
heap
page read and write
230B3570000
trusted library allocation
page read and write
230B4A6D000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230B3D88000
trusted library allocation
page read and write
230B396D000
trusted library allocation
page read and write
230A8CB4000
heap
page read and write
230B3D25000
trusted library allocation
page read and write
230B1C8A000
trusted library allocation
page read and write
1F24F3AF000
heap
page read and write
230BAEE4000
trusted library allocation
page read and write
1F24F2CA000
heap
page read and write
230A8D18000
heap
page read and write
230BA671000
trusted library allocation
page read and write
230AFA52000
heap
page read and write
230B3739000
trusted library allocation
page read and write
230B54A6000
trusted library allocation
page read and write
2743D2FA000
heap
page read and write
230B3D82000
trusted library allocation
page read and write
230A8D0F000
heap
page read and write
230B35DB000
trusted library allocation
page read and write
230B35BE000
trusted library allocation
page read and write
230B3963000
trusted library allocation
page read and write
230BDD77000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
230BA74A000
trusted library allocation
page read and write
230B397C000
trusted library allocation
page read and write
230B3257000
trusted library allocation
page read and write
230B4863000
trusted library allocation
page read and write
230B353C000
trusted library allocation
page read and write
21A837A0000
unclassified section
page read and write
230BA492000
trusted library allocation
page read and write
230B20F7000
trusted library allocation
page read and write
230BA8A3000
trusted library allocation
page read and write
230BA894000
trusted library allocation
page read and write
230B3156000
trusted library allocation
page read and write
1F24F37C000
heap
page read and write
230BAAAF000
trusted library allocation
page read and write
1F24E517000
trusted library allocation
page read and write
1F24F362000
heap
page read and write
230A8CCF000
heap
page read and write
230BA82A000
trusted library allocation
page read and write
1238000
heap
page read and write
230A8CD2000
heap
page read and write
230BABD8000
trusted library allocation
page read and write
230B20BE000
trusted library allocation
page read and write
230B3267000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230BA69E000
trusted library allocation
page read and write
230A8D36000
heap
page read and write
230A8CAF000
heap
page read and write
230A8CD6000
heap
page read and write
230BC430000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230AF161000
trusted library allocation
page read and write
2743B830000
heap
page read and write
230B6701000
heap
page read and write
230AF2F4000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230A8CBE000
heap
page read and write
230A8D15000
heap
page read and write
230A8CB3000
heap
page read and write
230A8CD8000
heap
page read and write
230B54C0000
trusted library allocation
page read and write
230B6343000
trusted library allocation
page read and write
230B3F8B000
trusted library allocation
page read and write
DEF000
stack
page read and write
230B54B7000
trusted library allocation
page read and write
230B3146000
trusted library allocation
page read and write
230BD041000
trusted library allocation
page read and write
1104000
heap
page read and write
2743B720000
heap
page read and write
230B3FE2000
trusted library allocation
page read and write
230BABC3000
trusted library allocation
page read and write
230B22F8000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230A8D1E000
heap
page read and write
230BA586000
trusted library allocation
page read and write
230AE1E4000
trusted library allocation
page read and write
230B63E4000
trusted library allocation
page read and write
1F24F2AC000
heap
page read and write
230BA649000
trusted library allocation
page read and write
230B1CA6000
trusted library allocation
page read and write
230BAEBD000
trusted library allocation
page read and write
230BC4C9000
trusted library allocation
page read and write
230B37D2000
trusted library allocation
page read and write
1104000
heap
page read and write
230A8CDE000
heap
page read and write
230B35E9000
trusted library allocation
page read and write
230AF4BC000
trusted library allocation
page read and write
230B37A3000
trusted library allocation
page read and write
230B39C0000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230BD043000
trusted library allocation
page read and write
230AD6B3000
trusted library allocation
page read and write
230B321B000
trusted library allocation
page read and write
230B62E5000
trusted library allocation
page read and write
230B3525000
trusted library allocation
page read and write
230B31F0000
trusted library allocation
page read and write
230BA7C6000
trusted library allocation
page read and write
230B3D22000
trusted library allocation
page read and write
230B2062000
trusted library allocation
page read and write
230BAA82000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230BA554000
trusted library allocation
page read and write
230B1F9B000
trusted library allocation
page read and write
230B47E5000
trusted library allocation
page read and write
24B5CC47000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B5519000
trusted library allocation
page read and write
230B5AE3000
trusted library allocation
page read and write
230B350B000
trusted library allocation
page read and write
21A83A00000
heap
page read and write
230A8CB5000
heap
page read and write
230B31B4000
trusted library allocation
page read and write
230B2E41000
trusted library allocation
page read and write
230B4AA9000
trusted library allocation
page read and write
230B2092000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230AD69E000
trusted library allocation
page read and write
230B3522000
trusted library allocation
page read and write
230B35A4000
trusted library allocation
page read and write
230BA48A000
trusted library allocation
page read and write
21A83710000
heap
page read and write
230BA526000
trusted library allocation
page read and write
230B39CE000
trusted library allocation
page read and write
230B32C0000
trusted library allocation
page read and write
230AD681000
trusted library allocation
page read and write
230A8D0D000
heap
page read and write
230B1C0C000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B3213000
trusted library allocation
page read and write
230BA899000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230B59C2000
trusted library allocation
page read and write
230B350E000
trusted library allocation
page read and write
1F24E51B000
trusted library allocation
page read and write
230A8CC8000
heap
page read and write
230B559C000
trusted library allocation
page read and write
230BC6F0000
trusted library allocation
page read and write
230B552F000
trusted library allocation
page read and write
24B5C850000
unclassified section
page readonly
230BAA35000
trusted library allocation
page read and write
230BA586000
trusted library allocation
page read and write
230B315E000
trusted library allocation
page read and write
230B315E000
trusted library allocation
page read and write
230B4A07000
trusted library allocation
page read and write
230A8D22000
heap
page read and write
230B22CC000
trusted library allocation
page read and write
230BA516000
trusted library allocation
page read and write
230B54CB000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
1F24F362000
heap
page read and write
230BA584000
trusted library allocation
page read and write
230B1CBA000
trusted library allocation
page read and write
230B29E1000
trusted library allocation
page read and write
230B2063000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B4A96000
trusted library allocation
page read and write
230B3979000
trusted library allocation
page read and write
2743B8BE000
heap
page read and write
230B319E000
trusted library allocation
page read and write
230B3FF8000
trusted library allocation
page read and write
230A8D1D000
heap
page read and write
21A83924000
trusted library allocation
page read and write
230A8CBE000
heap
page read and write
230BAAAD000
trusted library allocation
page read and write
230B32BD000
trusted library allocation
page read and write
230B3231000
trusted library allocation
page read and write
230B4A0C000
trusted library allocation
page read and write
230B29D6000
trusted library allocation
page read and write
230A8CCF000
heap
page read and write
1F24F385000
heap
page read and write
230B1CAB000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230B47FC000
trusted library allocation
page read and write
230BA830000
trusted library allocation
page read and write
230B3210000
trusted library allocation
page read and write
230BC06B000
trusted library allocation
page read and write
230BA564000
trusted library allocation
page read and write
230BA944000
trusted library allocation
page read and write
230B41A5000
trusted library allocation
page read and write
230B346A000
trusted library allocation
page read and write
230A8CE7000
heap
page read and write
230B3760000
trusted library allocation
page read and write
230B5AC8000
trusted library allocation
page read and write
230B1CAB000
trusted library allocation
page read and write
230AF4E7000
trusted library allocation
page read and write
230BAE4E000
trusted library allocation
page read and write
230B54ED000
trusted library allocation
page read and write
230A8CB5000
heap
page read and write
230B54CB000
trusted library allocation
page read and write
230B315E000
trusted library allocation
page read and write
230B3531000
trusted library allocation
page read and write
230BA747000
trusted library allocation
page read and write
230AFA86000
heap
page read and write
230A8CC9000
heap
page read and write
230B31B4000
trusted library allocation
page read and write
230B318D000
trusted library allocation
page read and write
230B3558000
trusted library allocation
page read and write
230B3D4C000
trusted library allocation
page read and write
230B323F000
trusted library allocation
page read and write
230AFA62000
heap
page read and write
230B313E000
trusted library allocation
page read and write
230BA75E000
trusted library allocation
page read and write
230A8CAE000
heap
page read and write
230B31A3000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B3DF4000
trusted library allocation
page read and write
230B2074000
trusted library allocation
page read and write
230B5494000
trusted library allocation
page read and write
230B627B000
trusted library allocation
page read and write
230B1E47000
trusted library allocation
page read and write
230B20F7000
trusted library allocation
page read and write
24B5CAD0000
heap
page read and write
230BD005000
trusted library allocation
page read and write
230B327F000
trusted library allocation
page read and write
230BAA45000
trusted library allocation
page read and write
230A8D23000
heap
page read and write
1DA56500000
trusted library allocation
page read and write
230BC4DD000
trusted library allocation
page read and write
230B1CDB000
trusted library allocation
page read and write
230BDDFE000
trusted library allocation
page read and write
230B55EC000
trusted library allocation
page read and write
230B3FF2000
trusted library allocation
page read and write
230A8D29000
heap
page read and write
230BE593000
trusted library allocation
page read and write
230B3FA1000
trusted library allocation
page read and write
230B4A22000
trusted library allocation
page read and write
230BC4DB000
trusted library allocation
page read and write
230B46E1000
trusted library allocation
page read and write
230BC0D0000
trusted library allocation
page read and write
230B3F99000
trusted library allocation
page read and write
230BA833000
trusted library allocation
page read and write
21A83919000
trusted library allocation
page read and write
230AF49D000
trusted library allocation
page read and write
230B39C9000
trusted library allocation
page read and write
230A8CCA000
heap
page read and write
230B3558000
trusted library allocation
page read and write
230B3725000
trusted library allocation
page read and write
230BAE9B000
trusted library allocation
page read and write
230B31C3000
trusted library allocation
page read and write
230B22D1000
trusted library allocation
page read and write
230B4ADB000
trusted library allocation
page read and write
230BAECF000
trusted library allocation
page read and write
230A8D2D000
heap
page read and write
230B4A6D000
trusted library allocation
page read and write
230B3942000
trusted library allocation
page read and write
230B3566000
trusted library allocation
page read and write
1B9BEF903000
trusted library allocation
page read and write
230BC4A2000
trusted library allocation
page read and write
230BC559000
trusted library allocation
page read and write
230AF498000
trusted library allocation
page read and write
230B3985000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230B3545000
trusted library allocation
page read and write
230BC45C000
trusted library allocation
page read and write
230AF469000
trusted library allocation
page read and write
230AFA65000
heap
page read and write
230BA84A000
trusted library allocation
page read and write
230B1F76000
trusted library allocation
page read and write
230BA57C000
trusted library allocation
page read and write
230A8D14000
heap
page read and write
230B40E6000
trusted library allocation
page read and write
1F24F2A9000
heap
page read and write
230B399B000
trusted library allocation
page read and write
230B1CF2000
trusted library allocation
page read and write
230B3FF8000
trusted library allocation
page read and write
230A8D6C000
heap
page read and write
230B46C9000
trusted library allocation
page read and write
230AF121000
trusted library allocation
page read and write
230BA98C000
trusted library allocation
page read and write
230B39F9000
trusted library allocation
page read and write
230B5A89000
trusted library allocation
page read and write
230B32F9000
trusted library allocation
page read and write
230B331C000
trusted library allocation
page read and write
230BD0C5000
trusted library allocation
page read and write
230B469B000
trusted library allocation
page read and write
230B22C0000
trusted library allocation
page read and write
1F24F39A000
heap
page read and write
230BC1C1000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230B2E5D000
trusted library allocation
page read and write
230B3FC6000
trusted library allocation
page read and write
230B4A74000
trusted library allocation
page read and write
230B2046000
trusted library allocation
page read and write
230B44F1000
trusted library allocation
page read and write
230B319A000
trusted library allocation
page read and write
230A8CD0000
heap
page read and write
1F24F331000
heap
page read and write
230B2077000
trusted library allocation
page read and write
230B58C9000
trusted library allocation
page read and write
230B3FCB000
trusted library allocation
page read and write
230A8D15000
heap
page read and write
230B43D1000
trusted library allocation
page read and write
230B1CB7000
trusted library allocation
page read and write
230B5A5C000
trusted library allocation
page read and write
230B46A4000
trusted library allocation
page read and write
230B3439000
trusted library allocation
page read and write
230B390D000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
CEF05FF000
stack
page read and write
230B2072000
trusted library allocation
page read and write
230B3165000
trusted library allocation
page read and write
1F24F399000
heap
page read and write
230B559E000
trusted library allocation
page read and write
230AF8C5000
trusted library allocation
page read and write
230A8D29000
heap
page read and write
1F24F323000
heap
page read and write
24B5CC6E000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230B5575000
trusted library allocation
page read and write
230BC4F9000
trusted library allocation
page read and write
230B2E3F000
trusted library allocation
page read and write
1F24E55F000
trusted library allocation
page read and write
230B3338000
trusted library allocation
page read and write
230A8D0B000
heap
page read and write
230B46C2000
trusted library allocation
page read and write
230AF2D4000
trusted library allocation
page read and write
230B4AD4000
trusted library allocation
page read and write
230A8CAD000
heap
page read and write
1F24F2BF000
heap
page read and write
230B6701000
heap
page read and write
230BAAB5000
trusted library allocation
page read and write
230B39C0000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230B4632000
trusted library allocation
page read and write
126F000
heap
page read and write
230B3D23000
trusted library allocation
page read and write
230B44FD000
trusted library allocation
page read and write
230B3FFE000
trusted library allocation
page read and write
230BDCD9000
trusted library allocation
page read and write
230B6701000
heap
page read and write
230BC6FD000
trusted library allocation
page read and write
230B4556000
trusted library allocation
page read and write
230A8CD2000
heap
page read and write
230AFA7D000
heap
page read and write
230B3980000
trusted library allocation
page read and write
230A8CAF000
heap
page read and write
230B1CB0000
trusted library allocation
page read and write
230A8D27000
heap
page read and write
230A8CDE000
heap
page read and write
230BDCDD000
trusted library allocation
page read and write
230B5583000
trusted library allocation
page read and write
230B3985000
trusted library allocation
page read and write
230A8CD8000
heap
page read and write
230A8D1E000
heap
page read and write
230B3593000
trusted library allocation
page read and write
230B390B000
trusted library allocation
page read and write
230AF4E0000
trusted library allocation
page read and write
1F24F2A3000
heap
page read and write
230B3D43000
trusted library allocation
page read and write
2743D2F9000
heap
page read and write
230A8D0B000
heap
page read and write
230B3283000
trusted library allocation
page read and write
2743B8D3000
heap
page read and write
230A8CCF000
heap
page read and write
230B328F000
trusted library allocation
page read and write
230BC2D4000
trusted library allocation
page read and write
230A8CD6000
heap
page read and write
1094000
heap
page read and write
230BC1B5000
trusted library allocation
page read and write
230BA6C0000
trusted library allocation
page read and write
1F24F332000
heap
page read and write
230BAED9000
trusted library allocation
page read and write
230BAED9000
trusted library allocation
page read and write
230AE071000
trusted library allocation
page read and write
230A8D18000
heap
page read and write
230BA95E000
trusted library allocation
page read and write
230AF177000
trusted library allocation
page read and write
230B56B8000
trusted library allocation
page read and write
230A8D1E000
heap
page read and write
230A8D2F000
heap
page read and write
230B3785000
trusted library allocation
page read and write
5E31E3E000
stack
page read and write
154D9518000
trusted library allocation
page execute read
230BAEA4000
trusted library allocation
page read and write
230BA86E000
trusted library allocation
page read and write
230BDDBD000
trusted library allocation
page read and write
230AF1D9000
trusted library allocation
page read and write
230AF4BE000
trusted library allocation
page read and write
230B3982000
trusted library allocation
page read and write
230B54FD000
trusted library allocation
page read and write
230BC4B8000
trusted library allocation
page read and write
24B5C930000
heap
page read and write
1F24F328000
heap
page read and write
230B39C3000
trusted library allocation
page read and write
230B59AB000
trusted library allocation
page read and write
125F000
heap
page read and write
230AFA62000
heap
page read and write
24B5CF10000
heap
page read and write
230B4AF5000
trusted library allocation
page read and write
230A8CE6000
heap
page read and write
230A8D31000
heap
page read and write
230BA8FE000
trusted library allocation
page read and write
230BABE5000
trusted library allocation
page read and write
230B4A96000
trusted library allocation
page read and write
230B5A31000
trusted library allocation
page read and write
24B5CE09000
trusted library allocation
page read and write
230BC438000
trusted library allocation
page read and write
230A8CE2000
heap
page read and write
230BC4C9000
trusted library allocation
page read and write
E80000
unkown
page readonly
230BABE7000
trusted library allocation
page read and write
230B55A4000
trusted library allocation
page read and write
230B22D1000
trusted library allocation
page read and write
230B1C1D000
trusted library allocation
page read and write
230A8CC5000
heap
page read and write
E3E000
stack
page read and write
230A8D0F000
heap
page read and write
230B462D000
trusted library allocation
page read and write
230B3180000
trusted library allocation
page read and write
230BC2A5000
trusted library allocation
page read and write
230BAA31000
trusted library allocation
page read and write
230AE1AF000
trusted library allocation
page read and write
230A8D2C000
heap
page read and write
230B1CFD000
trusted library allocation
page read and write
There are 3974 hidden memdumps, click here to show them.