IOC Report
7jBzTH9FXQ.exe

loading gif

Files

File Path
Type
Category
Malicious
7jBzTH9FXQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\flags32[1]
PNG image data, 32 x 7904, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\icomoon[1]
Embedded OpenType (EOT), icomoon family
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\main[1]
HTML document, ASCII text, with very long lines (35110)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\speed-boost-button-1-month[1]
PNG image data, 388 x 404, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\logo[1]
PNG image data, 200 x 200, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\psicash_coin[1]
PNG image data, 90 x 90, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\rocket[1]
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\speed-boost-button-1-day[1]
PNG image data, 388 x 404, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\banner[1]
PNG image data, 400 x 100, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\speed-boost-button-1-week[1]
PNG image data, 388 x 404, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\turtle[1]
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\flag_unknown_64[1]
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\logo-bw[1]
PNG image data, 200 x 200, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\psicash_coin_grey[1]
PNG image data, 90 x 90, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\speed-boost-button-1-hour[1]
PNG image data, 388 x 404, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb
data
dropped
C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade.184.part
gzip compressed data, was "psiphon-92AACC5BABE0944C-1BC527D3D09985CF.exe.upgrade", last modified: Sun Nov 24 07:05:26 2024, max compression, original size modulo 2^32 317832760
dropped
C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade.184.part.etag
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2 (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.temp
JSON data
modified
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.commit (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.temp
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\psiphon.config
JSON data
dropped
C:\Users\user\AppData\Local\Psiphon3\server_list.dat
ASCII text, with very long lines (5604)
dropped
C:\Users\user\AppData\Local\Temp\dat8355.tmp
Embedded OpenType (EOT), icomoon family
dropped
C:\Users\user\AppData\Local\Temp\psiphon-tunnel-core.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7jBzTH9FXQ.exe
"C:\Users\user\Desktop\7jBzTH9FXQ.exe"
malicious
C:\Users\user\AppData\Local\Temp\psiphon-tunnel-core.exe
C:\Users\user\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.e-me.lv/repository0
unknown
https://psiphon3.com/faq.html#clear-windows-data
unknown
http://www.acabogacia.org/doc0
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.html
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.htmlL
unknown
https://psiphon3.com/faq.html#clearodaltran
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://jqueryui.com
unknown
http://www.chambersign.org1
unknown
https://psiphon3.com/fr/faq.html#clear-windows-data
unknown
https://s3.amazonaws.comhttps://s3.amazonaws.com2024-11-24T07:39:56.894Z2024-11-24T07:39:56.894Z2024
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://momentjs.com/guides/#/warnings/add-inverted-param/
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
https://psiphon3.com/faq.html#clearv#comy
unknown
https://psiphon.ca/faq.html#psicash-account
unknown
http://ocsp.rootg2.amazontrust.com08
unknown
http://ocsp.starfieldtech.com0J
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
https://my.psi.cash/?etc
unknown
http://www.defence.gov.au/pki0
unknown
http://certificates.starfieldtech.com/repository0
unknown
https://psiphon.ca/privacy.htmlo
unknown
http://www.globaltrust.info0=
unknown
http://ocsp.starfieldtech.coml
unknown
http://c.pki.goog/we1/Un79Lm4-K_s.crl0
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
https://s3.amazonaws.com/psiupload/
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://momentjs.com/guides/#/warnings/zone/
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://i.pki.goog/we1.crt0
unknown
http://www.dnie.es/dpc0
unknown
https://psiphon.ca/faq.html#psicashor
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.html
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://www.globaltrust.info0
unknown
https://psiphon3.com/faq.html#clearz%w
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
http://www.satzansatz.de/cssd/onhavinglayout.html
unknown
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
http://crl.rootg2.amazontrust.com/rootg2.crl0
unknown
https://www.catcert.net/verarrel
unknown
http://www.disig.sk/ca0f
unknown
https://psiphon.ca/faq.html#psicasha
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
https://s3.amazonaws.com/web/mjr4-p23r-puwl/osl
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://o.ss2.us/0
unknown
https://psiphon.ca/faq.html#psicashf
unknown
http://www.quovadis.bm0
unknown
https://my.psi.cash/forgot?etc
unknown
https://stackoverflow.com/a/17622706/729729
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.htmlI
unknown
https://psiphon.ca/faq.html#psicashU
unknown
https://psiphon.ca/faq.html#psicash.$
unknown
http://momentjs.com/guides/#/warnings/min-max/
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.htmlo
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
https://psiphon.ca/fr/license.html
unknown
https://instem-documedia-datos.psiphon3.net/instem-documedia-datos.psiphon3.net:443
unknown
https://psiphon3.com/faq.html#clear:
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
https://repository.luxtrust.lu0
unknown
https://www.scopelifeeg.net/Sun
unknown
http://crt.rootg2.amazontrust.com/rootg2.cer0=
unknown
http://www.acabogacia.org0
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#direct
unknown
http://www.tiro.com
unknown
http://www.uce.gub.uy/acrn/acrn.crl0
unknown
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
unknown
http://www.tiro.comNH
unknown
https://psiphon.ca/privacy.html
unknown
http://www.agesic.gub.uy/acrn/acrn.crl0)
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://psiphon.ca/faq.html#psicash7
unknown
https://psiphon3.com/faq.html#clear2
unknown
https://stackoverflow.com/questions/24431054/float-right-and-float-left-in-absolute-container-ie7-ex
unknown
http://certificates.starfieldtech.com/repository/root.crl0Q
unknown
http://momentjs.com/guides/#/warnings/js-date/
unknown
http://www.e-szigno.hu/RootCA.crt0
unknown
http://www.quovadisglobal.com/cps0
unknown
https://psiphon3.com/faq.html#clear
unknown
http://momentjs.com/guides/#/warnings/define-locale/
unknown
https://psiphon3.com/faq.html#clearc
unknown
https://psiphon.ca/faq.html#psicashbo-label
unknown
http://www.valicert.com/1
unknown
https://instem-documedia-datos.psiphon3.net/cGuxAXyFXFkWm61cF4HPWX8S0srS9j0aSqN0k4AP
unknown
https://psiphon3.com/faq.html#clearF
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
139.144.40.39
unknown
United States
192.46.237.70
unknown
United States
194.99.105.212
unknown
Romania
77.68.55.150
unknown
United Kingdom
193.29.107.181
unknown
Romania
82.223.55.128
unknown
Spain
104.18.166.46
unknown
United States
37.46.117.21
unknown
Sweden
74.208.177.192
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SkipProxySettings
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SkipAutoConnect
HKEY_CURRENT_USER_Classes\psiphon
NULL
HKEY_CURRENT_USER_Classes\psiphon
URL Protocol
HKEY_CURRENT_USER_Classes\psiphon\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SSHParentProxyHost
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SSHParentProxyUsername
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SSHParentProxyPassword
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
SSHParentProxyDomain
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7jBzTH9FXQ_RASAPI32
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
NativeProxyInfo
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
UICookies
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
PsiphonProxyInfo
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
UICookies
HKEY_CURRENT_USER\SOFTWARE\Psiphon3
UICookies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD
Blob
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B4E8000
direct allocation
page read and write
B712000
direct allocation
page read and write
FF55000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
DE43000
trusted library allocation
page read and write
6969000
heap
page read and write
B4D4000
direct allocation
page read and write
CCDE000
heap
page read and write
6B56000
heap
page read and write
B6AC000
direct allocation
page read and write
6290000
heap
page read and write
10028000
trusted library allocation
page read and write
B63C000
direct allocation
page read and write
B5E7000
direct allocation
page read and write
B68C000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
E9B0000
trusted library allocation
page read and write
B68A000
direct allocation
page read and write
D172000
trusted library allocation
page read and write
6C86000
heap
page read and write
EAE8000
trusted library allocation
page read and write
B514000
direct allocation
page read and write
FFB0000
trusted library allocation
page read and write
E9CC000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
B4AE000
direct allocation
page read and write
B4CC000
direct allocation
page read and write
B62C000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
B51A000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B4D2000
direct allocation
page read and write
B844000
direct allocation
page read and write
CCE7000
heap
page read and write
B6EF000
direct allocation
page read and write
5C97000
heap
page read and write
EB4C000
trusted library allocation
page read and write
EB18000
trusted library allocation
page read and write
B772000
direct allocation
page read and write
B492000
direct allocation
page read and write
B75C000
direct allocation
page read and write
6BA4000
heap
page read and write
1003A000
trusted library allocation
page read and write
E0BC000
trusted library allocation
page read and write
B6AE000
direct allocation
page read and write
B803000
direct allocation
page read and write
E8FB000
trusted library allocation
page read and write
6651000
heap
page read and write
6290000
heap
page read and write
B626000
direct allocation
page read and write
B680000
direct allocation
page read and write
FED1000
trusted library allocation
page read and write
B708000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
EA53000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
B542000
direct allocation
page read and write
650D000
heap
page read and write
B4D2000
direct allocation
page read and write
666B000
heap
page read and write
F468000
heap
page read and write
EA38000
trusted library allocation
page read and write
EB77000
trusted library allocation
page read and write
B6E6000
direct allocation
page read and write
B7F8000
direct allocation
page read and write
74F0000
trusted library allocation
page read and write
B69A000
direct allocation
page read and write
E9E8000
trusted library allocation
page read and write
E994000
trusted library allocation
page read and write
EB63000
trusted library allocation
page read and write
FF68000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
E8CB000
trusted library allocation
page read and write
B600000
direct allocation
page read and write
EACE000
trusted library allocation
page read and write
5577000
heap
page read and write
100DA000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
EABC000
trusted library allocation
page read and write
CDEC000
heap
page read and write
D176000
trusted library allocation
page read and write
B542000
direct allocation
page read and write
CCA2000
heap
page read and write
B628000
direct allocation
page read and write
B6E2000
direct allocation
page read and write
E9A0000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
B558000
direct allocation
page read and write
5ADD000
heap
page read and write
B6AC000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
B764000
direct allocation
page read and write
B86A000
direct allocation
page read and write
B51E000
direct allocation
page read and write
B792000
direct allocation
page read and write
6252000
heap
page read and write
B486000
direct allocation
page read and write
D178000
trusted library allocation
page read and write
EB02000
trusted library allocation
page read and write
CCDE000
heap
page read and write
B70A000
direct allocation
page read and write
6139000
heap
page read and write
B4F6000
direct allocation
page read and write
B155000
trusted library allocation
page read and write
E980000
trusted library allocation
page read and write
FF28000
trusted library allocation
page read and write
B46C000
direct allocation
page read and write
3867000
heap
page read and write
B4E0000
direct allocation
page read and write
2011000
unkown
page readonly
EB10000
trusted library allocation
page read and write
B750000
direct allocation
page read and write
400000
unkown
page readonly
FEC4000
trusted library allocation
page read and write
1FFC000
unkown
page read and write
B486000
direct allocation
page read and write
10210000
trusted library allocation
page read and write
B7A8000
direct allocation
page read and write
B6E6000
direct allocation
page read and write
B7D8000
direct allocation
page read and write
B82A000
direct allocation
page read and write
B48E000
direct allocation
page read and write
E9A8000
trusted library allocation
page read and write
10078000
trusted library allocation
page read and write
B6EE000
direct allocation
page read and write
100B8000
trusted library allocation
page read and write
EAD4000
trusted library allocation
page read and write
B0E1000
trusted library allocation
page read and write
CC60000
heap
page read and write
4FA8000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
B4B6000
direct allocation
page read and write
B588000
direct allocation
page read and write
E071000
trusted library allocation
page read and write
10381000
heap
page read and write
B4AE000
direct allocation
page read and write
B5F0000
direct allocation
page read and write
682E000
heap
page read and write
B522000
direct allocation
page read and write
10B2C000
trusted library allocation
page read and write
E110000
trusted library allocation
page read and write
B5A0000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
B54A000
direct allocation
page read and write
EB4A000
trusted library allocation
page read and write
2993000
heap
page read and write
B4B6000
direct allocation
page read and write
B4E6000
direct allocation
page read and write
B744000
direct allocation
page read and write
CCCC000
heap
page read and write
B614000
direct allocation
page read and write
CE1E000
trusted library allocation
page read and write
B892000
direct allocation
page read and write
D172000
trusted library allocation
page read and write
1CAD000
heap
page read and write
B6E4000
direct allocation
page read and write
4B44000
trusted library allocation
page read and write
B542000
direct allocation
page read and write
6B34000
heap
page read and write
CCEB000
heap
page read and write
10E9C000
trusted library allocation
page read and write
B4C2000
direct allocation
page read and write
EB00000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
6AF8000
heap
page read and write
6A9A000
heap
page read and write
B49E000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
2980000
heap
page read and write
FF02000
trusted library allocation
page read and write
2876000
heap
page read and write
B4A7000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
B88E000
direct allocation
page read and write
FF28000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
B7E9000
direct allocation
page read and write
B70F000
direct allocation
page read and write
B5DE000
direct allocation
page read and write
5CD7000
heap
page read and write
B646000
direct allocation
page read and write
E8CD000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
B4EE000
direct allocation
page read and write
67EB000
heap
page read and write
B620000
direct allocation
page read and write
B5EE000
direct allocation
page read and write
E999000
trusted library allocation
page read and write
100E5000
trusted library allocation
page read and write
B66C000
direct allocation
page read and write
E9D3000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
CCEA000
heap
page read and write
B590000
direct allocation
page read and write
B7A6000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
B680000
direct allocation
page read and write
E0C5000
trusted library allocation
page read and write
CDCD000
heap
page read and write
B0E9000
trusted library allocation
page read and write
B494000
direct allocation
page read and write
B790000
direct allocation
page read and write
E9E8000
trusted library allocation
page read and write
B4F2000
direct allocation
page read and write
B542000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
696F000
heap
page read and write
B760000
direct allocation
page read and write
B780000
direct allocation
page read and write
6AE0000
heap
page read and write
B15C000
trusted library allocation
page read and write
10020000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
B75C000
direct allocation
page read and write
67D5000
heap
page read and write
B4B8000
direct allocation
page read and write
B6D4000
direct allocation
page read and write
B76C000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
B700000
direct allocation
page read and write
B750000
direct allocation
page read and write
EAA4000
trusted library allocation
page read and write
210D000
stack
page read and write
B813000
direct allocation
page read and write
B594000
direct allocation
page read and write
EB08000
trusted library allocation
page read and write
2980000
heap
page read and write
B5B2000
direct allocation
page read and write
EC0B000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
4E34000
trusted library allocation
page read and write
B592000
direct allocation
page read and write
B4D4000
direct allocation
page read and write
204D000
heap
page read and write
B766000
direct allocation
page read and write
B7E2000
direct allocation
page read and write
B838000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
6267000
heap
page read and write
B15B000
trusted library allocation
page read and write
B758000
direct allocation
page read and write
B695000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
CCEB000
heap
page read and write
6ACC000
heap
page read and write
FFF8000
trusted library allocation
page read and write
EACE000
trusted library allocation
page read and write
6BD4000
heap
page read and write
B56A000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
B610000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
E011000
trusted library allocation
page read and write
B88C000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
B49E000
direct allocation
page read and write
B6EA000
direct allocation
page read and write
2B500000
direct allocation
page read and write
1047D000
heap
page read and write
B4D1000
direct allocation
page read and write
B61E000
direct allocation
page read and write
CD31000
heap
page read and write
B7F6000
direct allocation
page read and write
B14F000
trusted library allocation
page read and write
B54A000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
10B38000
trusted library allocation
page read and write
E044000
trusted library allocation
page read and write
B800000
direct allocation
page read and write
B786000
direct allocation
page read and write
CCD7000
heap
page read and write
CE6D000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
B77A000
direct allocation
page read and write
CD6C000
heap
page read and write
FFFC000
trusted library allocation
page read and write
B5EA000
direct allocation
page read and write
E999000
trusted library allocation
page read and write
B7ED000
direct allocation
page read and write
B5FE000
direct allocation
page read and write
B4C4000
direct allocation
page read and write
6259000
heap
page read and write
B7FC000
direct allocation
page read and write
103F4000
heap
page read and write
EB54000
trusted library allocation
page read and write
B7A6000
direct allocation
page read and write
2B922000
unkown
page readonly
FF62000
trusted library allocation
page read and write
2B524000
direct allocation
page read and write
B151000
trusted library allocation
page read and write
B4FE000
direct allocation
page read and write
6954000
heap
page read and write
B56A000
direct allocation
page read and write
B5FE000
direct allocation
page read and write
D174000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
B6A2000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
B814000
direct allocation
page read and write
B756000
direct allocation
page read and write
CD25000
heap
page read and write
B55C000
direct allocation
page read and write
B542000
direct allocation
page read and write
6B71000
heap
page read and write
B552000
direct allocation
page read and write
B526000
direct allocation
page read and write
B6CA000
direct allocation
page read and write
B742000
direct allocation
page read and write
B812000
direct allocation
page read and write
CCEE000
heap
page read and write
5D06000
heap
page read and write
6BA1000
heap
page read and write
10092000
trusted library allocation
page read and write
B620000
direct allocation
page read and write
4E80000
trusted library allocation
page read and write
B6E4000
direct allocation
page read and write
6C72000
heap
page read and write
EAA4000
trusted library allocation
page read and write
E999000
trusted library allocation
page read and write
B0ED000
trusted library allocation
page read and write
CCEE000
heap
page read and write
EB77000
trusted library allocation
page read and write
B7B8000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
B48C000
direct allocation
page read and write
B15E000
trusted library allocation
page read and write
E0C9000
trusted library allocation
page read and write
EABC000
trusted library allocation
page read and write
B83A000
direct allocation
page read and write
5C97000
heap
page read and write
EAD4000
trusted library allocation
page read and write
FED1000
trusted library allocation
page read and write
CCEE000
heap
page read and write
100F8000
trusted library allocation
page read and write
B7FE000
direct allocation
page read and write
6533000
heap
page read and write
B68E000
direct allocation
page read and write
CC73000
heap
page read and write
EADE000
trusted library allocation
page read and write
B642000
direct allocation
page read and write
4F99000
trusted library allocation
page read and write
B68A000
direct allocation
page read and write
B156000
trusted library allocation
page read and write
B812000
direct allocation
page read and write
50D8000
trusted library allocation
page read and write
6B0E000
heap
page read and write
B7B0000
direct allocation
page read and write
EF99000
heap
page read and write
B5E4000
direct allocation
page read and write
B484000
direct allocation
page read and write
1BD1000
heap
page read and write
644E000
heap
page read and write
E7E8000
heap
page read and write
B4CC000
direct allocation
page read and write
FFE7000
trusted library allocation
page read and write
B78C000
direct allocation
page read and write
B4E4000
direct allocation
page read and write
6662000
heap
page read and write
CCF5000
heap
page read and write
B757000
direct allocation
page read and write
B550000
direct allocation
page read and write
B770000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
B15A000
trusted library allocation
page read and write
FECC000
trusted library allocation
page read and write
6C82000
heap
page read and write
B4AE000
direct allocation
page read and write
100B8000
trusted library allocation
page read and write
5C93000
heap
page read and write
E9E8000
trusted library allocation
page read and write
B6E0000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
EC10000
trusted library allocation
page read and write
6B57000
heap
page read and write
B6F2000
direct allocation
page read and write
CBF8000
heap
page read and write
EA3E000
trusted library allocation
page read and write
634A000
heap
page read and write
28C2000
heap
page read and write
EB10000
trusted library allocation
page read and write
6A9D000
heap
page read and write
B640000
direct allocation
page read and write
B622000
direct allocation
page read and write
B496000
direct allocation
page read and write
E0F8000
trusted library allocation
page read and write
D176000
trusted library allocation
page read and write
B6B8000
direct allocation
page read and write
B6FA000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
B62A000
direct allocation
page read and write
B55E000
direct allocation
page read and write
28CA000
heap
page read and write
EB75000
trusted library allocation
page read and write
B5F5000
direct allocation
page read and write
E8CB000
trusted library allocation
page read and write
295F000
heap
page read and write
B710000
direct allocation
page read and write
E941000
trusted library allocation
page read and write
B5AC000
direct allocation
page read and write
CD25000
heap
page read and write
5D1B000
heap
page read and write
667E000
heap
page read and write
B14F000
trusted library allocation
page read and write
B0ED000
trusted library allocation
page read and write
B494000
direct allocation
page read and write
B48A000
direct allocation
page read and write
B588000
direct allocation
page read and write
FF10000
trusted library allocation
page read and write
DC27000
heap
page read and write
10D25000
trusted library allocation
page read and write
EBDB000
trusted library allocation
page read and write
1007E000
trusted library allocation
page read and write
100CE000
trusted library allocation
page read and write
100DA000
trusted library allocation
page read and write
B806000
direct allocation
page read and write
100CE000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
1047D000
heap
page read and write
B7F4000
direct allocation
page read and write
B5A8000
direct allocation
page read and write
CCDD000
heap
page read and write
6219000
heap
page read and write
B60E000
direct allocation
page read and write
B4A5000
direct allocation
page read and write
62FC000
heap
page read and write
EB08000
trusted library allocation
page read and write
E6DD000
trusted library allocation
page read and write
B606000
direct allocation
page read and write
E06D000
trusted library allocation
page read and write
EAB8000
trusted library allocation
page read and write
6C72000
heap
page read and write
11A70000
heap
page read and write
5CBD000
heap
page read and write
B140000
trusted library allocation
page read and write
CCCC000
heap
page read and write
B7F6000
direct allocation
page read and write
B79A000
direct allocation
page read and write
B153000
trusted library allocation
page read and write
6AE4000
heap
page read and write
B4C0000
direct allocation
page read and write
B548000
direct allocation
page read and write
CCEA000
heap
page read and write
B4EC000
direct allocation
page read and write
CC47000
heap
page read and write
6360000
heap
page read and write
B5DA000
direct allocation
page read and write
5C93000
heap
page read and write
B640000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
CCE4000
heap
page read and write
B4D8000
direct allocation
page read and write
B4BC000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
EA08000
trusted library allocation
page read and write
EB58000
trusted library allocation
page read and write
B7C6000
direct allocation
page read and write
B51A000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
B548000
direct allocation
page read and write
B5B8000
direct allocation
page read and write
50EC000
trusted library allocation
page read and write
10088000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
28E0000
heap
page read and write
B4AE000
direct allocation
page read and write
E016000
trusted library allocation
page read and write
B4CE000
direct allocation
page read and write
B4BA000
direct allocation
page read and write
B55A000
direct allocation
page read and write
B4BE000
direct allocation
page read and write
B49E000
direct allocation
page read and write
CD24000
heap
page read and write
11910000
trusted library allocation
page read and write
625D000
heap
page read and write
CD1D000
heap
page read and write
FFB0000
trusted library allocation
page read and write
295A000
heap
page read and write
D1DE000
trusted library allocation
page read and write
B7E2000
direct allocation
page read and write
B496000
direct allocation
page read and write
B6EE000
direct allocation
page read and write
EB08000
trusted library allocation
page read and write
CC1E000
heap
page read and write
CD61000
heap
page read and write
B149000
trusted library allocation
page read and write
EAA4000
trusted library allocation
page read and write
CD1D000
heap
page read and write
74DA000
trusted library allocation
page read and write
6B64000
heap
page read and write
B7B5000
direct allocation
page read and write
3A83000
heap
page read and write
EB4C000
trusted library allocation
page read and write
B5B8000
direct allocation
page read and write
B71A000
direct allocation
page read and write
1CAD000
heap
page read and write
100F8000
trusted library allocation
page read and write
B5FC000
direct allocation
page read and write
6540000
heap
page read and write
B67C000
direct allocation
page read and write
B6F0000
direct allocation
page read and write
B51E000
direct allocation
page read and write
FF58000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B550000
direct allocation
page read and write
2867000
heap
page read and write
6920000
heap
page read and write
295D000
heap
page read and write
6BA1000
heap
page read and write
E999000
trusted library allocation
page read and write
EACA000
trusted library allocation
page read and write
B827000
direct allocation
page read and write
CD1D000
heap
page read and write
6B34000
heap
page read and write
B520000
direct allocation
page read and write
E0BE000
trusted library allocation
page read and write
D176000
trusted library allocation
page read and write
B63C000
direct allocation
page read and write
5D05000
heap
page read and write
EB02000
trusted library allocation
page read and write
B618000
direct allocation
page read and write
B634000
direct allocation
page read and write
DE46000
trusted library allocation
page read and write
B5B6000
direct allocation
page read and write
74C4000
trusted library allocation
page read and write
B820000
direct allocation
page read and write
5C9A000
heap
page read and write
B486000
direct allocation
page read and write
B798000
direct allocation
page read and write
665B000
heap
page read and write
2A9A000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
EB69000
trusted library allocation
page read and write
CCEB000
heap
page read and write
50E7000
trusted library allocation
page read and write
64FD000
heap
page read and write
6332000
heap
page read and write
6B71000
heap
page read and write
B52C000
direct allocation
page read and write
4E7A000
trusted library allocation
page read and write
EB08000
trusted library allocation
page read and write
B4E6000
direct allocation
page read and write
CCDE000
heap
page read and write
B4E4000
direct allocation
page read and write
E8DC000
trusted library allocation
page read and write
5CC7000
heap
page read and write
CC5F000
heap
page read and write
5CA9000
heap
page read and write
CDCD000
heap
page read and write
B6E4000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
EAD4000
trusted library allocation
page read and write
B4AE000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B6E4000
direct allocation
page read and write
6AE3000
heap
page read and write
6B51000
heap
page read and write
D171000
trusted library allocation
page read and write
6646000
heap
page read and write
B52C000
direct allocation
page read and write
B490000
direct allocation
page read and write
288A000
heap
page read and write
B4C4000
direct allocation
page read and write
CD52000
heap
page read and write
10096000
trusted library allocation
page read and write
B588000
direct allocation
page read and write
6276000
heap
page read and write
100E5000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
B6E0000
direct allocation
page read and write
B142000
trusted library allocation
page read and write
B4A0000
direct allocation
page read and write
EA3E000
trusted library allocation
page read and write
60A4000
heap
page read and write
B68E000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
10090000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
EA98000
trusted library allocation
page read and write
B5F5000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
6976000
heap
page read and write
B81B000
direct allocation
page read and write
CD61000
heap
page read and write
D174000
trusted library allocation
page read and write
EC0B000
trusted library allocation
page read and write
B4B4000
direct allocation
page read and write
E8DC000
trusted library allocation
page read and write
B65C000
direct allocation
page read and write
EBCB000
trusted library allocation
page read and write
B0F9000
trusted library allocation
page read and write
EB58000
trusted library allocation
page read and write
CD1B000
heap
page read and write
B556000
direct allocation
page read and write
B474000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
10E93000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
E93C000
trusted library allocation
page read and write
B5B8000
direct allocation
page read and write
B5B8000
direct allocation
page read and write
CCEA000
heap
page read and write
B4B8000
direct allocation
page read and write
10060000
trusted library allocation
page read and write
B490000
direct allocation
page read and write
B758000
direct allocation
page read and write
B68A000
direct allocation
page read and write
10092000
trusted library allocation
page read and write
B0FB000
trusted library allocation
page read and write
D172000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
2881000
heap
page read and write
CCEE000
heap
page read and write
B52C000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
D1E6000
trusted library allocation
page read and write
B4E0000
direct allocation
page read and write
666C000
heap
page read and write
CCEE000
heap
page read and write
B55E000
direct allocation
page read and write
B5F0000
direct allocation
page read and write
10E93000
trusted library allocation
page read and write
FFF4000
trusted library allocation
page read and write
E8CD000
trusted library allocation
page read and write
CCE2000
heap
page read and write
EB5F000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
B892000
direct allocation
page read and write
6B51000
heap
page read and write
B69A000
direct allocation
page read and write
29B6000
heap
page read and write
100F8000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
B67E000
direct allocation
page read and write
E015000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
B494000
direct allocation
page read and write
69EC000
heap
page read and write
B7FD000
direct allocation
page read and write
680C000
heap
page read and write
B490000
direct allocation
page read and write
25D0000
direct allocation
page read and write
2B6A9000
direct allocation
page read and write
D173000
trusted library allocation
page read and write
B49A000
direct allocation
page read and write
B5F3000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
B6CB000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
B89C000
direct allocation
page read and write
B570000
direct allocation
page read and write
B52C000
direct allocation
page read and write
6BA4000
heap
page read and write
CC0A000
heap
page read and write
10064000
trusted library allocation
page read and write
388B000
heap
page read and write
B602000
direct allocation
page read and write
D173000
trusted library allocation
page read and write
1CAD000
heap
page read and write
B6D4000
direct allocation
page read and write
CCE2000
heap
page read and write
FFF8000
trusted library allocation
page read and write
B143000
trusted library allocation
page read and write
B6E0000
direct allocation
page read and write
1047D000
heap
page read and write
EA98000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
6ADB000
heap
page read and write
4E79000
trusted library allocation
page read and write
EB08000
trusted library allocation
page read and write
B4BC000
direct allocation
page read and write
B609000
direct allocation
page read and write
293C000
heap
page read and write
B4CC000
direct allocation
page read and write
B156000
trusted library allocation
page read and write
B15F000
trusted library allocation
page read and write
B512000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
B820000
direct allocation
page read and write
E5E0000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
6BB2000
heap
page read and write
CDCD000
heap
page read and write
B70A000
direct allocation
page read and write
D1E2000
trusted library allocation
page read and write
B55A000
direct allocation
page read and write
B740000
direct allocation
page read and write
B520000
direct allocation
page read and write
5C7E000
heap
page read and write
FF28000
trusted library allocation
page read and write
100D8000
trusted library allocation
page read and write
B798000
direct allocation
page read and write
B706000
direct allocation
page read and write
E938000
trusted library allocation
page read and write
B4A7000
direct allocation
page read and write
B656000
direct allocation
page read and write
5CE4000
heap
page read and write
E9CC000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
B6AA000
direct allocation
page read and write
D174000
trusted library allocation
page read and write
B7FE000
direct allocation
page read and write
B0E3000
trusted library allocation
page read and write
103B9000
heap
page read and write
B6D7000
direct allocation
page read and write
6C6D000
heap
page read and write
B52C000
direct allocation
page read and write
B55C000
direct allocation
page read and write
B0E8000
trusted library allocation
page read and write
B61E000
direct allocation
page read and write
2954000
heap
page read and write
B68E000
direct allocation
page read and write
B496000
direct allocation
page read and write
CCE2000
heap
page read and write
B490000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
E9D3000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
1047D000
heap
page read and write
100F8000
trusted library allocation
page read and write
E9FD000
trusted library allocation
page read and write
B6AA000
direct allocation
page read and write
5AC8000
heap
page read and write
74E6000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
B5F7000
direct allocation
page read and write
B59E000
direct allocation
page read and write
50EA000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
64D9000
heap
page read and write
B740000
direct allocation
page read and write
B4A9000
direct allocation
page read and write
B48A000
direct allocation
page read and write
5CA6000
heap
page read and write
B5BE000
direct allocation
page read and write
27BD000
stack
page read and write
CD49000
heap
page read and write
D17B000
trusted library allocation
page read and write
B7D3000
direct allocation
page read and write
2C3FE000
stack
page read and write
B5F0000
direct allocation
page read and write
B4A4000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
B524000
direct allocation
page read and write
B49E000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
B156000
trusted library allocation
page read and write
665B000
heap
page read and write
B50E000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
EC0B000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
EA62000
trusted library allocation
page read and write
B5E8000
direct allocation
page read and write
D8A1000
heap
page read and write
B4A5000
direct allocation
page read and write
B474000
direct allocation
page read and write
B7A0000
direct allocation
page read and write
E9F4000
trusted library allocation
page read and write
EC0B000
trusted library allocation
page read and write
10064000
trusted library allocation
page read and write
CCB7000
heap
page read and write
B62C000
direct allocation
page read and write
CCEB000
heap
page read and write
B0F9000
trusted library allocation
page read and write
B52C000
direct allocation
page read and write
CC47000
heap
page read and write
EC18000
trusted library allocation
page read and write
B56E000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B7E0000
direct allocation
page read and write
60C1000
heap
page read and write
B84A000
direct allocation
page read and write
FFF8000
trusted library allocation
page read and write
6C6D000
heap
page read and write
EC10000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
6ADB000
heap
page read and write
1047D000
heap
page read and write
100F8000
trusted library allocation
page read and write
B658000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
B590000
direct allocation
page read and write
B69A000
direct allocation
page read and write
5C7E000
heap
page read and write
B4D4000
direct allocation
page read and write
CDCB000
heap
page read and write
B81E000
direct allocation
page read and write
B68B000
direct allocation
page read and write
6BA4000
heap
page read and write
B80A000
direct allocation
page read and write
B0EE000
trusted library allocation
page read and write
10116000
trusted library allocation
page read and write
6B3E000
heap
page read and write
B822000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
CCA1000
heap
page read and write
EBCF000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
EAD0000
trusted library allocation
page read and write
100D8000
trusted library allocation
page read and write
DE4E000
trusted library allocation
page read and write
B449000
direct allocation
page read and write
28D0000
heap
page read and write
B0FC000
trusted library allocation
page read and write
B5CC000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
B632000
direct allocation
page read and write
6BA4000
heap
page read and write
10088000
trusted library allocation
page read and write
B4B0000
direct allocation
page read and write
B704000
direct allocation
page read and write
B75A000
direct allocation
page read and write
B0E1000
trusted library allocation
page read and write
B642000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
E9D3000
trusted library allocation
page read and write
B5EB000
direct allocation
page read and write
B68E000
direct allocation
page read and write
B53E000
direct allocation
page read and write
6BA1000
heap
page read and write
5CC7000
heap
page read and write
B512000
direct allocation
page read and write
B812000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
6276000
heap
page read and write
2966000
heap
page read and write
1C47000
heap
page read and write
B6E4000
direct allocation
page read and write
6956000
heap
page read and write
FF3F000
trusted library allocation
page read and write
E994000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
E9A8000
trusted library allocation
page read and write
DFD0000
trusted library allocation
page read and write
E0C2000
trusted library allocation
page read and write
EC10000
trusted library allocation
page read and write
B4C2000
direct allocation
page read and write
5C98000
heap
page read and write
B602000
direct allocation
page read and write
B62E000
direct allocation
page read and write
6267000
heap
page read and write
E8DC000
trusted library allocation
page read and write
CD61000
heap
page read and write
EB65000
trusted library allocation
page read and write
B4AE000
direct allocation
page read and write
B682000
direct allocation
page read and write
E8D4000
trusted library allocation
page read and write
B4BE000
direct allocation
page read and write
B4C9000
direct allocation
page read and write
B14C000
trusted library allocation
page read and write
2A1D000
stack
page read and write
CCF5000
heap
page read and write
E9B8000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
1F45000
unkown
page write copy
E8D4000
trusted library allocation
page read and write
B50E000
direct allocation
page read and write
B14E000
trusted library allocation
page read and write
2C2BD000
stack
page read and write
B7B5000
direct allocation
page read and write
CDCA000
heap
page read and write
EB5F000
trusted library allocation
page read and write
B61A000
direct allocation
page read and write
B686000
direct allocation
page read and write
2881000
heap
page read and write
B5B4000
direct allocation
page read and write
B522000
direct allocation
page read and write
B816000
direct allocation
page read and write
B5F5000
direct allocation
page read and write
EB77000
trusted library allocation
page read and write
B47C000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
B6C3000
direct allocation
page read and write
B76C000
direct allocation
page read and write
B511000
direct allocation
page read and write
B6B0000
direct allocation
page read and write
D172000
trusted library allocation
page read and write
B0F7000
trusted library allocation
page read and write
B4BA000
direct allocation
page read and write
6BB2000
heap
page read and write
CCEC000
heap
page read and write
B150000
trusted library allocation
page read and write
B4CC000
direct allocation
page read and write
E8FB000
trusted library allocation
page read and write
B0FF000
trusted library allocation
page read and write
B0EB000
trusted library allocation
page read and write
B7F2000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
B778000
direct allocation
page read and write
D171000
trusted library allocation
page read and write
6BA4000
heap
page read and write
B526000
direct allocation
page read and write
B512000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
B52C000
direct allocation
page read and write
EA3E000
trusted library allocation
page read and write
B654000
direct allocation
page read and write
10090000
trusted library allocation
page read and write
B4EC000
direct allocation
page read and write
B6E2000
direct allocation
page read and write
CCEB000
heap
page read and write
E8D7000
trusted library allocation
page read and write
B660000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
B4FA000
direct allocation
page read and write
D1DF000
trusted library allocation
page read and write
B4CC000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
CCED000
heap
page read and write
B6F4000
direct allocation
page read and write
D178000
trusted library allocation
page read and write
B68E000
direct allocation
page read and write
CCFD000
heap
page read and write
B4E0000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
6A9A000
heap
page read and write
FFE7000
trusted library allocation
page read and write
1F43000
unkown
page write copy
B730000
direct allocation
page read and write
2AA0000
direct allocation
page read and write
2C3BE000
stack
page read and write
E9E4000
trusted library allocation
page read and write
EA58000
trusted library allocation
page read and write
B49E000
direct allocation
page read and write
B750000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B6DE000
direct allocation
page read and write
B776000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
B4E0000
direct allocation
page read and write
B53E000
direct allocation
page read and write
B742000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
B63E000
direct allocation
page read and write
B61E000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
E9CC000
trusted library allocation
page read and write
2760000
direct allocation
page read and write
B7DC000
direct allocation
page read and write
B510000
direct allocation
page read and write
B6E4000
direct allocation
page read and write
B6D4000
direct allocation
page read and write
64D1000
heap
page read and write
EB58000
trusted library allocation
page read and write
CBF8000
heap
page read and write
28DE000
heap
page read and write
B149000
trusted library allocation
page read and write
B5B0000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
B550000
direct allocation
page read and write
B522000
direct allocation
page read and write
6964000
heap
page read and write
100D8000
trusted library allocation
page read and write
B4BE000
direct allocation
page read and write
EB47000
trusted library allocation
page read and write
E980000
trusted library allocation
page read and write
27EA000
heap
page read and write
EA58000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
B4A0000
direct allocation
page read and write
CC24000
heap
page read and write
100B8000
trusted library allocation
page read and write
B54C000
direct allocation
page read and write
B4A9000
direct allocation
page read and write
B494000
direct allocation
page read and write
E08C000
trusted library allocation
page read and write
EB00000
trusted library allocation
page read and write
E8FB000
trusted library allocation
page read and write
B69A000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
B48C000
direct allocation
page read and write
CCEB000
heap
page read and write
EACE000
trusted library allocation
page read and write
B5B4000
direct allocation
page read and write
B484000
direct allocation
page read and write
EB75000
trusted library allocation
page read and write
CCE4000
heap
page read and write
CCDE000
heap
page read and write
EAD0000
trusted library allocation
page read and write
B588000
direct allocation
page read and write
B4AE000
direct allocation
page read and write
5CC7000
heap
page read and write
B62C000
direct allocation
page read and write
6276000
heap
page read and write
B656000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
CD50000
heap
page read and write
10084000
trusted library allocation
page read and write
B70A000
direct allocation
page read and write
CD61000
heap
page read and write
D178000
trusted library allocation
page read and write
6BC2000
heap
page read and write
B47E000
direct allocation
page read and write
B3FD000
stack
page read and write
B5EE000
direct allocation
page read and write
B76A000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
6818000
heap
page read and write
6B83000
heap
page read and write
DE45000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
CD1D000
heap
page read and write
B478000
direct allocation
page read and write
6B3E000
heap
page read and write
CCCC000
heap
page read and write
EB54000
trusted library allocation
page read and write
B5C0000
direct allocation
page read and write
B78A000
direct allocation
page read and write
B744000
direct allocation
page read and write
B7F0000
direct allocation
page read and write
B6AC000
direct allocation
page read and write
B822000
direct allocation
page read and write
6247000
heap
page read and write
FF0C000
trusted library allocation
page read and write
B8A2000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
B524000
direct allocation
page read and write
CDCD000
heap
page read and write
B588000
direct allocation
page read and write
4B44000
trusted library allocation
page read and write
CCDE000
heap
page read and write
6A10000
heap
page read and write
10096000
trusted library allocation
page read and write
D17A000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
CCEE000
heap
page read and write
B4BC000
direct allocation
page read and write
B48C000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
DCE0000
trusted library allocation
page read and write
B4C2000
direct allocation
page read and write
B59E000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
B4A6000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
CDCD000
heap
page read and write
FFE3000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
100A8000
trusted library allocation
page read and write
EC0B000
trusted library allocation
page read and write
CC60000
heap
page read and write
6ADB000
heap
page read and write
10B08000
trusted library allocation
page read and write
B4A0000
direct allocation
page read and write
B51A000
direct allocation
page read and write
E9E4000
trusted library allocation
page read and write
B140000
trusted library allocation
page read and write
E9D3000
trusted library allocation
page read and write
CCEA000
heap
page read and write
EB54000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
4E38000
trusted library allocation
page read and write
B79A000
direct allocation
page read and write
B494000
direct allocation
page read and write
E61000
unkown
page execute read
EB52000
trusted library allocation
page read and write
1047D000
heap
page read and write
EC1E000
trusted library allocation
page read and write
B4D0000
direct allocation
page read and write
629E000
heap
page read and write
2892000
heap
page read and write
B68E000
direct allocation
page read and write
B79C000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
B154000
trusted library allocation
page read and write
B649000
direct allocation
page read and write
B0E1000
trusted library allocation
page read and write
CC3A000
heap
page read and write
642F000
heap
page read and write
CCFC000
heap
page read and write
EB5B000
trusted library allocation
page read and write
B6E0000
direct allocation
page read and write
B758000
direct allocation
page read and write
2876000
heap
page read and write
6BA5000
heap
page read and write
6BCD000
heap
page read and write
B6DE000
direct allocation
page read and write
B49A000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
E03C000
trusted library allocation
page read and write
B619000
direct allocation
page read and write
B708000
direct allocation
page read and write
B145000
trusted library allocation
page read and write
B626000
direct allocation
page read and write
B54D000
direct allocation
page read and write
B6E4000
direct allocation
page read and write
B766000
direct allocation
page read and write
E0CC000
trusted library allocation
page read and write
B520000
direct allocation
page read and write
B85A000
direct allocation
page read and write
B59E000
direct allocation
page read and write
B48C000
direct allocation
page read and write
CC3C000
heap
page read and write
EC1E000
trusted library allocation
page read and write
B6E4000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
B600000
direct allocation
page read and write
B46C000
direct allocation
page read and write
E07E000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
B4E4000
direct allocation
page read and write
1003A000
trusted library allocation
page read and write
D17A000
trusted library allocation
page read and write
B4E6000
direct allocation
page read and write
B140000
trusted library allocation
page read and write
EBDB000
trusted library allocation
page read and write
B46C000
direct allocation
page read and write
EACE000
trusted library allocation
page read and write
6A9A000
heap
page read and write
B54E000
direct allocation
page read and write
D176000
trusted library allocation
page read and write
D1E6000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
B548000
direct allocation
page read and write
B71A000
direct allocation
page read and write
B0FE000
trusted library allocation
page read and write
CFC0000
heap
page read and write
2B989000
direct allocation
page read and write
29B0000
heap
page read and write
FFF6000
trusted library allocation
page read and write
1007E000
trusted library allocation
page read and write
B75A000
direct allocation
page read and write
EB00000
trusted library allocation
page read and write
B5CC000
direct allocation
page read and write
B5AA000
direct allocation
page read and write
B4AE000
direct allocation
page read and write
CDCD000
heap
page read and write
CD4E000
heap
page read and write
EC18000
trusted library allocation
page read and write
B802000
direct allocation
page read and write
6BB2000
heap
page read and write
2B6B4000
direct allocation
page read and write
E9D3000
trusted library allocation
page read and write
1047D000
heap
page read and write
CDCD000
heap
page read and write
CC74000
heap
page read and write
E980000
trusted library allocation
page read and write
B0E6000
trusted library allocation
page read and write
B6F4000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
B7B3000
direct allocation
page read and write
B7D6000
direct allocation
page read and write
B47C000
direct allocation
page read and write
103F4000
heap
page read and write
B680000
direct allocation
page read and write
2B505000
direct allocation
page read and write
CCEB000
heap
page read and write
6B51000
heap
page read and write
B53E000
direct allocation
page read and write
FEE0000
trusted library allocation
page read and write
FECC000
trusted library allocation
page read and write
5CAD000
heap
page read and write
E8E4000
trusted library allocation
page read and write
6947000
heap
page read and write
B7A0000
direct allocation
page read and write
B562000
direct allocation
page read and write
B5EE000
direct allocation
page read and write
B698000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
B58C000
direct allocation
page read and write
5CC7000
heap
page read and write
B548000
direct allocation
page read and write
CCEE000
heap
page read and write
EC1E000
trusted library allocation
page read and write
DBE0000
trusted library allocation
page read and write
B4EC000
direct allocation
page read and write
B526000
direct allocation
page read and write
CDCD000
heap
page read and write
B4BA000
direct allocation
page read and write
FFF4000
trusted library allocation
page read and write
FFFC000
trusted library allocation
page read and write
B6E6000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
B5C0000
direct allocation
page read and write
B554000
direct allocation
page read and write
B141000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
B5AC000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
B626000
direct allocation
page read and write
B14D000
trusted library allocation
page read and write
B49A000
direct allocation
page read and write
B4A5000
direct allocation
page read and write
CC45000
heap
page read and write
B522000
direct allocation
page read and write
B6D1000
direct allocation
page read and write
2BAFD000
stack
page read and write
E0BA000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
B570000
direct allocation
page read and write
CCEC000
heap
page read and write
2940000
heap
page read and write
100A8000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
B56A000
direct allocation
page read and write
EB69000
trusted library allocation
page read and write
B49E000
direct allocation
page read and write
CD32000
heap
page read and write
B5CC000
direct allocation
page read and write
27EE000
heap
page read and write
B63E000
direct allocation
page read and write
B149000
trusted library allocation
page read and write
2000000
unkown
page read and write
EB5B000
trusted library allocation
page read and write
B47E000
direct allocation
page read and write
CCDD000
heap
page read and write
EB18000
trusted library allocation
page read and write
CDCD000
heap
page read and write
B5E7000
direct allocation
page read and write
E9F9000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
B47C000
direct allocation
page read and write
682D000
heap
page read and write
B600000
direct allocation
page read and write
5C85000
heap
page read and write
B836000
direct allocation
page read and write
B7E4000
direct allocation
page read and write
B0E9000
trusted library allocation
page read and write
FF58000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
EB18000
trusted library allocation
page read and write
B808000
direct allocation
page read and write
B51A000
direct allocation
page read and write
6C79000
heap
page read and write
10028000
trusted library allocation
page read and write
B0EE000
trusted library allocation
page read and write
10D27000
trusted library allocation
page read and write
B4CC000
direct allocation
page read and write
B61A000
direct allocation
page read and write
6BBC000
heap
page read and write
100DE000
trusted library allocation
page read and write
5CC7000
heap
page read and write
CDCD000
heap
page read and write
B7D4000
direct allocation
page read and write
E9A8000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
B59E000
direct allocation
page read and write
B6B0000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
5C97000
heap
page read and write
B732000
direct allocation
page read and write
B53E000
direct allocation
page read and write
B812000
direct allocation
page read and write
B0E0000
trusted library allocation
page read and write
EACE000
trusted library allocation
page read and write
2B7FD000
stack
page read and write
CDCD000
heap
page read and write
B4FA000
direct allocation
page read and write
CCEB000
heap
page read and write
CC73000
heap
page read and write
EA4D000
trusted library allocation
page read and write
3ACC000
heap
page read and write
B874000
direct allocation
page read and write
EB18000
trusted library allocation
page read and write
B640000
direct allocation
page read and write
B7EC000
direct allocation
page read and write
B6EB000
direct allocation
page read and write
B53E000
direct allocation
page read and write
D179000
trusted library allocation
page read and write
B742000
direct allocation
page read and write
B6A8000
direct allocation
page read and write
CCAC000
heap
page read and write
6B71000
heap
page read and write
B5FE000
direct allocation
page read and write
100CE000
trusted library allocation
page read and write
62A3000
heap
page read and write
CCE4000
heap
page read and write
B5A0000
direct allocation
page read and write
CCE1000
heap
page read and write
B5BE000
direct allocation
page read and write
B69A000
direct allocation
page read and write
62B7000
heap
page read and write
B149000
trusted library allocation
page read and write
B6AA000
direct allocation
page read and write
FF02000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
6273000
heap
page read and write
B6F0000
direct allocation
page read and write
B52C000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
B4DA000
direct allocation
page read and write
E8DC000
trusted library allocation
page read and write
CCEE000
heap
page read and write
B6C2000
direct allocation
page read and write
CDCB000
heap
page read and write
100E5000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
E6A9000
trusted library allocation
page read and write
EB08000
trusted library allocation
page read and write
B682000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
626B000
heap
page read and write
100F8000
trusted library allocation
page read and write
B822000
direct allocation
page read and write
B680000
direct allocation
page read and write
B75C000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
B5B4000
direct allocation
page read and write
B6E6000
direct allocation
page read and write
B48A000
direct allocation
page read and write
B83E000
direct allocation
page read and write
E8D4000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
EAA4000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
B698000
direct allocation
page read and write
1C7D000
heap
page read and write
B622000
direct allocation
page read and write
B486000
direct allocation
page read and write
B63C000
direct allocation
page read and write
B4A7000
direct allocation
page read and write
B70F000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
CCD8000
heap
page read and write
B562000
direct allocation
page read and write
CD44000
heap
page read and write
100B8000
trusted library allocation
page read and write
B486000
direct allocation
page read and write
6B18000
heap
page read and write
B708000
direct allocation
page read and write
100E5000
trusted library allocation
page read and write
1C90000
heap
page read and write
E8EC000
trusted library allocation
page read and write
B85E000
direct allocation
page read and write
DE41000
trusted library allocation
page read and write
B7B0000
direct allocation
page read and write
2A80000
direct allocation
page read and write
EACA000
trusted library allocation
page read and write
6B83000
heap
page read and write
5AD4000
heap
page read and write
B65C000
direct allocation
page read and write
B674000
direct allocation
page read and write
FFF6000
trusted library allocation
page read and write
5C9A000
heap
page read and write
B14E000
trusted library allocation
page read and write
D179000
trusted library allocation
page read and write
D1EB000
trusted library allocation
page read and write
B0EA000
trusted library allocation
page read and write
B732000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
B63C000
direct allocation
page read and write
6636000
heap
page read and write
B7C8000
direct allocation
page read and write
B48A000
direct allocation
page read and write
E06C000
trusted library allocation
page read and write
B83A000
direct allocation
page read and write
B6B6000
direct allocation
page read and write
FF58000
trusted library allocation
page read and write
FF62000
trusted library allocation
page read and write
B6EE000
direct allocation
page read and write
B5B6000
direct allocation
page read and write
B4A7000
direct allocation
page read and write
4B44000
trusted library allocation
page read and write
B47E000
direct allocation
page read and write
B53E000
direct allocation
page read and write
B5BC000
direct allocation
page read and write
E9A0000
trusted library allocation
page read and write
B4CC000
direct allocation
page read and write
B7E6000
direct allocation
page read and write
629A000
heap
page read and write
6927000
heap
page read and write
CD68000
heap
page read and write
B4B8000
direct allocation
page read and write
B554000
direct allocation
page read and write
2A94000
direct allocation
page read and write
B0FA000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
B47E000
direct allocation
page read and write
E8D4000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
B4B2000
direct allocation
page read and write
B619000
direct allocation
page read and write
4B44000
trusted library allocation
page read and write
EA79000
trusted library allocation
page read and write
D1EC000
trusted library allocation
page read and write
B54E000
direct allocation
page read and write
B720000
direct allocation
page read and write
B514000
direct allocation
page read and write
CCEE000
heap
page read and write
B666000
direct allocation
page read and write
B588000
direct allocation
page read and write
B50E000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
4FA4000
trusted library allocation
page read and write
CC08000
heap
page read and write
60B5000
heap
page read and write
B62A000
direct allocation
page read and write
B550000
direct allocation
page read and write
E9D9000
trusted library allocation
page read and write
B752000
direct allocation
page read and write
B4AB000
direct allocation
page read and write
B492000
direct allocation
page read and write
CCEA000
heap
page read and write
B51E000
direct allocation
page read and write
B7F6000
direct allocation
page read and write
CDB9000
heap
page read and write
EA65000
trusted library allocation
page read and write
3ABE000
heap
page read and write
B554000
direct allocation
page read and write
B4D8000
direct allocation
page read and write
B69A000
direct allocation
page read and write
B50E000
direct allocation
page read and write
38A5000
heap
page read and write
B594000
direct allocation
page read and write
EA53000
trusted library allocation
page read and write
74DA000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B782000
direct allocation
page read and write
EB18000
trusted library allocation
page read and write
B157000
trusted library allocation
page read and write
B56C000
direct allocation
page read and write
B742000
direct allocation
page read and write
10020000
trusted library allocation
page read and write
5CAD000
heap
page read and write
2B951000
unkown
page readonly
CCCC000
heap
page read and write
B4D4000
direct allocation
page read and write
B712000
direct allocation
page read and write
B4BE000
direct allocation
page read and write
100D8000
trusted library allocation
page read and write
B712000
direct allocation
page read and write
6C86000
heap
page read and write
B4A4000
direct allocation
page read and write
E9F4000
trusted library allocation
page read and write
EAD0000
trusted library allocation
page read and write
E27F000
trusted library allocation
page read and write
100AF000
trusted library allocation
page read and write
67D0000
heap
page read and write
B48E000
direct allocation
page read and write
CE68000
trusted library allocation
page read and write
B5ED000
direct allocation
page read and write
B46C000
direct allocation
page read and write
B68A000
direct allocation
page read and write
B6AC000
direct allocation
page read and write
B646000
direct allocation
page read and write
CD25000
heap
page read and write
B542000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
B0E3000
trusted library allocation
page read and write
10B31000
trusted library allocation
page read and write
100CE000
trusted library allocation
page read and write
EACE000
trusted library allocation
page read and write
B704000
direct allocation
page read and write
11910000
trusted library allocation
page read and write
CDCB000
heap
page read and write
EC18000
trusted library allocation
page read and write
B6B8000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
CCCC000
heap
page read and write
B6F4000
direct allocation
page read and write
B766000
direct allocation
page read and write
FF58000
trusted library allocation
page read and write
10088000
trusted library allocation
page read and write
EAA4000
trusted library allocation
page read and write
E9A0000
trusted library allocation
page read and write
B78C000
direct allocation
page read and write
696C000
heap
page read and write
B47C000
direct allocation
page read and write
5CAD000
heap
page read and write
FED1000
trusted library allocation
page read and write
B880000
direct allocation
page read and write
66FB000
heap
page read and write
62BF000
heap
page read and write
B7F8000
direct allocation
page read and write
624B000
heap
page read and write
FFFC000
trusted library allocation
page read and write
EAD4000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
B4A0000
direct allocation
page read and write
FF62000
trusted library allocation
page read and write
B6E4000
direct allocation
page read and write
B649000
direct allocation
page read and write
D1D8000
trusted library allocation
page read and write
E956000
trusted library allocation
page read and write
B712000
direct allocation
page read and write
B4D2000
direct allocation
page read and write
5CD7000
heap
page read and write
B810000
direct allocation
page read and write
B0F8000
trusted library allocation
page read and write
EBCF000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
100E5000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
B710000
direct allocation
page read and write
B4C4000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
4F92000
trusted library allocation
page read and write
62BF000
heap
page read and write
B5B4000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
B740000
direct allocation
page read and write
6BA4000
heap
page read and write
B656000
direct allocation
page read and write
B614000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
B86C000
direct allocation
page read and write
FEE6000
trusted library allocation
page read and write
CCEB000
heap
page read and write
E0BA000
trusted library allocation
page read and write
B56A000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
B83C000
direct allocation
page read and write
B62C000
direct allocation
page read and write
6A9E000
heap
page read and write
E030000
trusted library allocation
page read and write
10081000
trusted library allocation
page read and write
B6EC000
direct allocation
page read and write
5C89000
heap
page read and write
B6F4000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
B4FA000
direct allocation
page read and write
62A8000
heap
page read and write
B54F000
direct allocation
page read and write
B752000
direct allocation
page read and write
6A10000
heap
page read and write
B6F9000
direct allocation
page read and write
6C82000
heap
page read and write
6B1D000
heap
page read and write
B144000
trusted library allocation
page read and write
EB4C000
trusted library allocation
page read and write
B4FE000
direct allocation
page read and write
2BC84000
direct allocation
page read and write
100CE000
trusted library allocation
page read and write
B524000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
B6EE000
direct allocation
page read and write
E9CC000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
CD32000
heap
page read and write
EADE000
trusted library allocation
page read and write
B838000
direct allocation
page read and write
B5B0000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
B4DE000
direct allocation
page read and write
E270000
trusted library allocation
page read and write
16E5000
unkown
page readonly
B594000
direct allocation
page read and write
629E000
heap
page read and write
6BA4000
heap
page read and write
6BB2000
heap
page read and write
D1E6000
trusted library allocation
page read and write
CCCC000
heap
page read and write
B46C000
direct allocation
page read and write
B4AB000
direct allocation
page read and write
D171000
trusted library allocation
page read and write
DE48000
trusted library allocation
page read and write
EB67000
trusted library allocation
page read and write
B54C000
direct allocation
page read and write
B5E9000
direct allocation
page read and write
B141000
trusted library allocation
page read and write
B15B000
trusted library allocation
page read and write
FF62000
trusted library allocation
page read and write
B56E000
direct allocation
page read and write
6286000
heap
page read and write
CC60000
heap
page read and write
EC10000
trusted library allocation
page read and write
50E8000
trusted library allocation
page read and write
10090000
trusted library allocation
page read and write
2C4FF000
stack
page read and write
B496000
direct allocation
page read and write
B6B4000
direct allocation
page read and write
B736000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
100E5000
trusted library allocation
page read and write
EA98000
trusted library allocation
page read and write
B736000
direct allocation
page read and write
B744000
direct allocation
page read and write
B14B000
trusted library allocation
page read and write
B6CD000
direct allocation
page read and write
CD13000
heap
page read and write
CCEC000
heap
page read and write
B46E000
direct allocation
page read and write
B592000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
B50E000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
10096000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
B15D000
trusted library allocation
page read and write
6B71000
heap
page read and write
B62E000
direct allocation
page read and write
B58E000
direct allocation
page read and write
2160000
heap
page read and write
B5DA000
direct allocation
page read and write
B60E000
direct allocation
page read and write
10088000
trusted library allocation
page read and write
B69D000
direct allocation
page read and write
6948000
heap
page read and write
B654000
direct allocation
page read and write
FF68000
trusted library allocation
page read and write
B4EC000
direct allocation
page read and write
E068000
trusted library allocation
page read and write
B6EE000
direct allocation
page read and write
B0E4000
trusted library allocation
page read and write
62BF000
heap
page read and write
B54A000
direct allocation
page read and write
FF3F000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
100DE000
trusted library allocation
page read and write
1005C000
trusted library allocation
page read and write
B600000
direct allocation
page read and write
64D9000
heap
page read and write
CBF8000
heap
page read and write
E8F1000
trusted library allocation
page read and write
E8D9000
trusted library allocation
page read and write
E8D9000
trusted library allocation
page read and write
EB02000
trusted library allocation
page read and write
B4A5000
direct allocation
page read and write
1047D000
heap
page read and write
EBDB000
trusted library allocation
page read and write
B0FB000
trusted library allocation
page read and write
2B9FD000
stack
page read and write
E8D4000
trusted library allocation
page read and write
B0E2000
trusted library allocation
page read and write
B5EB000
direct allocation
page read and write
EB08000
trusted library allocation
page read and write
B7A6000
direct allocation
page read and write
B6D2000
direct allocation
page read and write
FF00000
trusted library allocation
page read and write
B880000
direct allocation
page read and write
B64E000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
CCDD000
heap
page read and write
B149000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
B792000
direct allocation
page read and write
6344000
heap
page read and write
B484000
direct allocation
page read and write
CCEA000
heap
page read and write
5CA9000
heap
page read and write
2B6A5000
direct allocation
page read and write
B750000
direct allocation
page read and write
B814000
direct allocation
page read and write
100AF000
trusted library allocation
page read and write
CC60000
heap
page read and write
B594000
direct allocation
page read and write
5CC7000
heap
page read and write
CC73000
heap
page read and write
B698000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
B844000
direct allocation
page read and write
B764000
direct allocation
page read and write
10092000
trusted library allocation
page read and write
609C000
heap
page read and write
E6A5000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
B50E000
direct allocation
page read and write
FFF6000
trusted library allocation
page read and write
B4FC000
direct allocation
page read and write
10026000
trusted library allocation
page read and write
5C98000
heap
page read and write
B149000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
1047D000
heap
page read and write
E0BA000
trusted library allocation
page read and write
E8F1000
trusted library allocation
page read and write
5C7C000
heap
page read and write
B542000
direct allocation
page read and write
B6D2000
direct allocation
page read and write
B5A6000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
1FCD000
unkown
page read and write
5C98000
heap
page read and write
B511000
direct allocation
page read and write
10092000
trusted library allocation
page read and write
E990000
trusted library allocation
page read and write
4E7A000
trusted library allocation
page read and write
B4B6000
direct allocation
page read and write
B6CF000
direct allocation
page read and write
5C86000
heap
page read and write
2B680000
direct allocation
page read and write
4FA9000
trusted library allocation
page read and write
6A91000
heap
page read and write
EB5F000
trusted library allocation
page read and write
B484000
direct allocation
page read and write
5CAC000
heap
page read and write
5C82000
heap
page read and write
B786000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
CD09000
heap
page read and write
B63A000
direct allocation
page read and write
B15F000
trusted library allocation
page read and write
B49C000
direct allocation
page read and write
1FC5000
unkown
page read and write
B5B8000
direct allocation
page read and write
B584000
direct allocation
page read and write
4E60000
trusted library allocation
page read and write
B14D000
trusted library allocation
page read and write
B4D4000
direct allocation
page read and write
B69A000
direct allocation
page read and write
EB4C000
trusted library allocation
page read and write
B858000
direct allocation
page read and write
B0F6000
trusted library allocation
page read and write
CCE2000
heap
page read and write
100CE000
trusted library allocation
page read and write
CD49000
heap
page read and write
EB4C000
trusted library allocation
page read and write
EA58000
trusted library allocation
page read and write
B7C0000
direct allocation
page read and write
5C81000
heap
page read and write
DE80000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
E8CD000
trusted library allocation
page read and write
B7C8000
direct allocation
page read and write
B512000
direct allocation
page read and write
B628000
direct allocation
page read and write
6B71000
heap
page read and write
FFE7000
trusted library allocation
page read and write
50EB000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
E9E4000
trusted library allocation
page read and write
B15E000
trusted library allocation
page read and write
B782000
direct allocation
page read and write
B458000
direct allocation
page read and write
6B27000
heap
page read and write
B4A6000
direct allocation
page read and write
B6D4000
direct allocation
page read and write
B486000
direct allocation
page read and write
10E9C000
trusted library allocation
page read and write
B872000
direct allocation
page read and write
B6D4000
direct allocation
page read and write
B6B8000
direct allocation
page read and write
B542000
direct allocation
page read and write
CCA3000
heap
page read and write
100CE000
trusted library allocation
page read and write
6676000
heap
page read and write
B4CD000
direct allocation
page read and write
E0BB000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
10028000
trusted library allocation
page read and write
B62A000
direct allocation
page read and write
DE47000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
2951000
heap
page read and write
E9B8000
trusted library allocation
page read and write
100DE000
trusted library allocation
page read and write
B5E8000
direct allocation
page read and write
B4FA000
direct allocation
page read and write
B698000
direct allocation
page read and write
B5F0000
direct allocation
page read and write
626B000
heap
page read and write
B71E000
direct allocation
page read and write
FF3F000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
1F37000
unkown
page write copy
B696000
direct allocation
page read and write
FF0C000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
EACA000
trusted library allocation
page read and write
D173000
trusted library allocation
page read and write
CD24000
heap
page read and write
EAE8000
trusted library allocation
page read and write
10084000
trusted library allocation
page read and write
B819000
direct allocation
page read and write
B49C000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
EAD0000
trusted library allocation
page read and write
B83A000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
5CC7000
heap
page read and write
1CA1000
heap
page read and write
B4A0000
direct allocation
page read and write
B766000
direct allocation
page read and write
B0E6000
trusted library allocation
page read and write
24FD000
stack
page read and write
B590000
direct allocation
page read and write
6BCC000
heap
page read and write
B0FD000
trusted library allocation
page read and write
B0FA000
trusted library allocation
page read and write
DE4D000
trusted library allocation
page read and write
B74C000
direct allocation
page read and write
B484000
direct allocation
page read and write
B54D000
direct allocation
page read and write
B5F0000
direct allocation
page read and write
B522000
direct allocation
page read and write
E360000
trusted library allocation
page read and write
EACE000
trusted library allocation
page read and write
E8C2000
trusted library allocation
page read and write
B7C0000
direct allocation
page read and write
B5F3000
direct allocation
page read and write
B4EC000
direct allocation
page read and write
B750000
direct allocation
page read and write
CCDD000
heap
page read and write
FF68000
trusted library allocation
page read and write
D172000
trusted library allocation
page read and write
B714000
direct allocation
page read and write
B52C000
direct allocation
page read and write
B6C7000
direct allocation
page read and write
10B38000
trusted library allocation
page read and write
B61C000
direct allocation
page read and write
E0C3000
trusted library allocation
page read and write
B0F2000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
B4D0000
direct allocation
page read and write
2A70000
heap
page read and write
1C47000
heap
page read and write
1C87000
heap
page read and write
5C97000
heap
page read and write
B542000
direct allocation
page read and write
B570000
direct allocation
page read and write
B66C000
direct allocation
page read and write
B4BA000
direct allocation
page read and write
E8D4000
trusted library allocation
page read and write
B0E8000
trusted library allocation
page read and write
B7C8000
direct allocation
page read and write
FF00000
trusted library allocation
page read and write
2855000
heap
page read and write
B54C000
direct allocation
page read and write
B51A000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
6BA9000
heap
page read and write
B4A7000
direct allocation
page read and write
74EB000
trusted library allocation
page read and write
100DE000
trusted library allocation
page read and write
28C5000
heap
page read and write
B588000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
629A000
heap
page read and write
B562000
direct allocation
page read and write
CD62000
heap
page read and write
EA65000
trusted library allocation
page read and write
B556000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
E9A0000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
B4AC000
direct allocation
page read and write
B75E000
direct allocation
page read and write
EC0B000
trusted library allocation
page read and write
B5FE000
direct allocation
page read and write
B64E000
direct allocation
page read and write
B4C7000
direct allocation
page read and write
EA62000
trusted library allocation
page read and write
EAA4000
trusted library allocation
page read and write
CDCB000
heap
page read and write
B4C4000
direct allocation
page read and write
28C3000
heap
page read and write
B4B4000
direct allocation
page read and write
4B44000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
B805000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
6645000
heap
page read and write
1006E000
trusted library allocation
page read and write
CCB7000
heap
page read and write
B47C000
direct allocation
page read and write
B548000
direct allocation
page read and write
E9FD000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
CD6C000
heap
page read and write
6BB2000
heap
page read and write
E0C4000
trusted library allocation
page read and write
EB08000
trusted library allocation
page read and write
CCCC000
heap
page read and write
B740000
direct allocation
page read and write
11910000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
B552000
direct allocation
page read and write
B696000
direct allocation
page read and write
B617000
direct allocation
page read and write
CCDE000
heap
page read and write
D179000
trusted library allocation
page read and write
CD4E000
heap
page read and write
B55A000
direct allocation
page read and write
CD68000
heap
page read and write
67C2000
heap
page read and write
100D8000
trusted library allocation
page read and write
10096000
trusted library allocation
page read and write
B76E000
direct allocation
page read and write
FFF4000
trusted library allocation
page read and write
B5E9000
direct allocation
page read and write
CC45000
heap
page read and write
B5A0000
direct allocation
page read and write
B4BA000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
B153000
trusted library allocation
page read and write
EB18000
trusted library allocation
page read and write
EACE000
trusted library allocation
page read and write
E8CF000
trusted library allocation
page read and write
B4AE000
direct allocation
page read and write
DEF0000
trusted library allocation
page read and write
D1E0000
trusted library allocation
page read and write
B6E6000
direct allocation
page read and write
B4A0000
direct allocation
page read and write
CDCB000
heap
page read and write
64D9000
heap
page read and write
100AF000
trusted library allocation
page read and write
100AF000
trusted library allocation
page read and write
B0F4000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
EB52000
trusted library allocation
page read and write
CC45000
heap
page read and write
EB00000
trusted library allocation
page read and write
B672000
direct allocation
page read and write
B744000
direct allocation
page read and write
B151000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
B680000
direct allocation
page read and write
B817000
direct allocation
page read and write
67EA000
heap
page read and write
B83E000
direct allocation
page read and write
B56C000
direct allocation
page read and write
B524000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
100AF000
trusted library allocation
page read and write
B59E000
direct allocation
page read and write
D173000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
E9FD000
trusted library allocation
page read and write
FF55000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B0E9000
trusted library allocation
page read and write
B7B1000
direct allocation
page read and write
E9B8000
trusted library allocation
page read and write
38E6000
heap
page read and write
E8FB000
trusted library allocation
page read and write
B562000
direct allocation
page read and write
B7B1000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
EA30000
trusted library allocation
page read and write
50DF000
trusted library allocation
page read and write
FFF6000
trusted library allocation
page read and write
6332000
heap
page read and write
B542000
direct allocation
page read and write
B4EC000
direct allocation
page read and write
B696000
direct allocation
page read and write
EB7A000
trusted library allocation
page read and write
EBCF000
trusted library allocation
page read and write
E8FB000
trusted library allocation
page read and write
B6ED000
direct allocation
page read and write
B47C000
direct allocation
page read and write
100AF000
trusted library allocation
page read and write
E8D9000
trusted library allocation
page read and write
B6D1000
direct allocation
page read and write
CD89000
heap
page read and write
EAB8000
trusted library allocation
page read and write
2860000
heap
page read and write
B554000
direct allocation
page read and write
67FB000
heap
page read and write
B6C7000
direct allocation
page read and write
B836000
direct allocation
page read and write
B4C4000
direct allocation
page read and write
6C47000
heap
page read and write
B52C000
direct allocation
page read and write
B588000
direct allocation
page read and write
B47E000
direct allocation
page read and write
6B3E000
heap
page read and write
B5E6000
direct allocation
page read and write
634A000
heap
page read and write
1047D000
heap
page read and write
B494000
direct allocation
page read and write
100D8000
trusted library allocation
page read and write
B158000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
B154000
trusted library allocation
page read and write
B5FC000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
10E9A000
trusted library allocation
page read and write
B4DA000
direct allocation
page read and write
B73C000
direct allocation
page read and write
CD23000
heap
page read and write
2170000
heap
page read and write
B496000
direct allocation
page read and write
D1D3000
trusted library allocation
page read and write
B838000
direct allocation
page read and write
B474000
direct allocation
page read and write
B4BA000
direct allocation
page read and write
B660000
direct allocation
page read and write
2938000
heap
page read and write
B6E4000
direct allocation
page read and write
B74E000
direct allocation
page read and write
3A83000
heap
page read and write
B59E000
direct allocation
page read and write
E110000
trusted library allocation
page read and write
B558000
direct allocation
page read and write
B0E0000
trusted library allocation
page read and write
B14A000
trusted library allocation
page read and write
B59E000
direct allocation
page read and write
B590000
direct allocation
page read and write
CCEF000
heap
page read and write
DCF0000
trusted library allocation
page read and write
CCC1000
heap
page read and write
B60A000
direct allocation
page read and write
10090000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
B5EA000
direct allocation
page read and write
B56E000
direct allocation
page read and write
100DA000
trusted library allocation
page read and write
B588000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
B69A000
direct allocation
page read and write
B51A000
direct allocation
page read and write
B542000
direct allocation
page read and write
2B50A000
direct allocation
page read and write
B646000
direct allocation
page read and write
6BFE000
heap
page read and write
EC1E000
trusted library allocation
page read and write
B49C000
direct allocation
page read and write
B4EC000
direct allocation
page read and write
B7F8000
direct allocation
page read and write
1FD0000
unkown
page read and write
B4DC000
direct allocation
page read and write
B74C000
direct allocation
page read and write
B76E000
direct allocation
page read and write
B609000
direct allocation
page read and write
E9E4000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
B4FC000
direct allocation
page read and write
B542000
direct allocation
page read and write
1047D000
heap
page read and write
6A91000
heap
page read and write
B840000
direct allocation
page read and write
E067000
trusted library allocation
page read and write
D1EE000
trusted library allocation
page read and write
B157000
trusted library allocation
page read and write
CCC8000
heap
page read and write
E8E1000
trusted library allocation
page read and write
CD1D000
heap
page read and write
B5F8000
direct allocation
page read and write
EB75000
trusted library allocation
page read and write
FE7D000
heap
page read and write
69CC000
heap
page read and write
B6E9000
direct allocation
page read and write
B49A000
direct allocation
page read and write
62B7000
heap
page read and write
B76A000
direct allocation
page read and write
FFF4000
trusted library allocation
page read and write
B570000
direct allocation
page read and write
6A9D000
heap
page read and write
E043000
trusted library allocation
page read and write
CD49000
heap
page read and write
6676000
heap
page read and write
B75A000
direct allocation
page read and write
B724000
direct allocation
page read and write
FE7C000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
B65C000
direct allocation
page read and write
1003A000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
CC35000
heap
page read and write
B48C000
direct allocation
page read and write
10D27000
trusted library allocation
page read and write
B5CC000
direct allocation
page read and write
B4FC000
direct allocation
page read and write
B4FE000
direct allocation
page read and write
EA98000
trusted library allocation
page read and write
FF3F000
trusted library allocation
page read and write
B60A000
direct allocation
page read and write
E6A9000
trusted library allocation
page read and write
EABC000
trusted library allocation
page read and write
B572000
direct allocation
page read and write
B684000
direct allocation
page read and write
B73E000
direct allocation
page read and write
E8CF000
trusted library allocation
page read and write
B4B5000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
D1E6000
trusted library allocation
page read and write
D173000
trusted library allocation
page read and write
B628000
direct allocation
page read and write
B590000
direct allocation
page read and write
FFE3000
trusted library allocation
page read and write
67E3000
heap
page read and write
B514000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
6C72000
heap
page read and write
B474000
direct allocation
page read and write
B153000
trusted library allocation
page read and write
100B8000
trusted library allocation
page read and write
B47C000
direct allocation
page read and write
B526000
direct allocation
page read and write
E8F6000
trusted library allocation
page read and write
B5F5000
direct allocation
page read and write
B69A000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
6BA4000
heap
page read and write
3880000
heap
page read and write
6BD4000
heap
page read and write
B78E000
direct allocation
page read and write
B48C000
direct allocation
page read and write
B75C000
direct allocation
page read and write
EB4C000
trusted library allocation
page read and write
2982000
heap
page read and write
FFB0000
trusted library allocation
page read and write
EAB8000
trusted library allocation
page read and write
2966000
heap
page read and write
E010000
trusted library allocation
page read and write
E0C7000
trusted library allocation
page read and write
1005C000
trusted library allocation
page read and write
B777000
direct allocation
page read and write
B48C000
direct allocation
page read and write
B4CD000
direct allocation
page read and write
4E6E000
trusted library allocation
page read and write
B524000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
B772000
direct allocation
page read and write
CCE2000
heap
page read and write
100E5000
trusted library allocation
page read and write
FFE7000
trusted library allocation
page read and write
B62A000
direct allocation
page read and write
EB08000
trusted library allocation
page read and write
6BF5000
heap
page read and write
EB52000
trusted library allocation
page read and write
B626000
direct allocation
page read and write
CE1C000
trusted library allocation
page read and write
B63E000
direct allocation
page read and write
74B8000
trusted library allocation
page read and write
B626000
direct allocation
page read and write
B53E000
direct allocation
page read and write
1B86000
unkown
page write copy
B59E000
direct allocation
page read and write
E954000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
B5E9000
direct allocation
page read and write
CD23000
heap
page read and write
EB18000
trusted library allocation
page read and write
B806000
direct allocation
page read and write
FF0A000
trusted library allocation
page read and write
B5B0000
direct allocation
page read and write
B4AA000
direct allocation
page read and write
D175000
trusted library allocation
page read and write
B696000
direct allocation
page read and write
E038000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
B564000
direct allocation
page read and write
B698000
direct allocation
page read and write
64D9000
heap
page read and write
CD13000
heap
page read and write
100F8000
trusted library allocation
page read and write
B7D3000
direct allocation
page read and write
B588000
direct allocation
page read and write
B654000
direct allocation
page read and write
10081000
trusted library allocation
page read and write
B782000
direct allocation
page read and write
B56A000
direct allocation
page read and write
B478000
direct allocation
page read and write
B50E000
direct allocation
page read and write
CCAE000
heap
page read and write
B149000
trusted library allocation
page read and write
B400000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B155000
trusted library allocation
page read and write
B14A000
trusted library allocation
page read and write
B7AB000
direct allocation
page read and write
FF68000
trusted library allocation
page read and write
EA98000
trusted library allocation
page read and write
CCC3000
heap
page read and write
B56A000
direct allocation
page read and write
D1EA000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
B55E000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
B52C000
direct allocation
page read and write
B554000
direct allocation
page read and write
B484000
direct allocation
page read and write
2AC2000
direct allocation
page read and write
607D000
heap
page read and write
5CC3000
heap
page read and write
6252000
heap
page read and write
B5DA000
direct allocation
page read and write
B484000
direct allocation
page read and write
E994000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
6854000
heap
page read and write
B7F8000
direct allocation
page read and write
B490000
direct allocation
page read and write
B524000
direct allocation
page read and write
B490000
direct allocation
page read and write
1F44000
unkown
page read and write
B5ED000
direct allocation
page read and write
1047D000
heap
page read and write
CCE2000
heap
page read and write
FF55000
trusted library allocation
page read and write
B5CC000
direct allocation
page read and write
E9CC000
trusted library allocation
page read and write
50DC000
trusted library allocation
page read and write
D179000
trusted library allocation
page read and write
B4C0000
direct allocation
page read and write
B5F3000
direct allocation
page read and write
CCDD000
heap
page read and write
B554000
direct allocation
page read and write
B158000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
641E000
heap
page read and write
B4EA000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B4C7000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
B55E000
direct allocation
page read and write
B4AE000
direct allocation
page read and write
CC47000
heap
page read and write
EC1A000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
B5CC000
direct allocation
page read and write
B63A000
direct allocation
page read and write
E8FB000
trusted library allocation
page read and write
B542000
direct allocation
page read and write
B7B6000
direct allocation
page read and write
B490000
direct allocation
page read and write
E9E4000
trusted library allocation
page read and write
B6D4000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
B542000
direct allocation
page read and write
2C510000
remote allocation
page read and write
B5B8000
direct allocation
page read and write
B51E000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
CC10000
heap
page read and write
B56E000
direct allocation
page read and write
B47E000
direct allocation
page read and write
D175000
trusted library allocation
page read and write
62B7000
heap
page read and write
B49E000
direct allocation
page read and write
6C6D000
heap
page read and write
27E0000
heap
page read and write
B52C000
direct allocation
page read and write
B3BD000
stack
page read and write
B698000
direct allocation
page read and write
B68E000
direct allocation
page read and write
D1DC000
trusted library allocation
page read and write
EB54000
trusted library allocation
page read and write
29B3000
heap
page read and write
B147000
trusted library allocation
page read and write
B871000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
B542000
direct allocation
page read and write
B526000
direct allocation
page read and write
B696000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
10096000
trusted library allocation
page read and write
2BB06000
direct allocation
page read and write
B7D6000
direct allocation
page read and write
B588000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
B7C8000
direct allocation
page read and write
B158000
trusted library allocation
page read and write
B7E2000
direct allocation
page read and write
D1E7000
trusted library allocation
page read and write
B0E5000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
CCEF000
heap
page read and write
E6DD000
trusted library allocation
page read and write
B824000
direct allocation
page read and write
B762000
direct allocation
page read and write
CD6C000
heap
page read and write
B815000
direct allocation
page read and write
E9E4000
trusted library allocation
page read and write
B7D8000
direct allocation
page read and write
B542000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
6328000
heap
page read and write
FFFC000
trusted library allocation
page read and write
5C8B000
heap
page read and write
B4CD000
direct allocation
page read and write
FFF8000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
E037000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
B608000
direct allocation
page read and write
EB10000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
B638000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
E072000
trusted library allocation
page read and write
B4DC000
direct allocation
page read and write
624B000
heap
page read and write
EB08000
trusted library allocation
page read and write
B474000
direct allocation
page read and write
2011000
unkown
page readonly
B52C000
direct allocation
page read and write
2A5D000
stack
page read and write
2938000
heap
page read and write
B5C0000
direct allocation
page read and write
B726000
direct allocation
page read and write
EB75000
trusted library allocation
page read and write
B54C000
direct allocation
page read and write
B766000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
E8D9000
trusted library allocation
page read and write
B56A000
direct allocation
page read and write
B149000
trusted library allocation
page read and write
B756000
direct allocation
page read and write
B4A4000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
B4E8000
direct allocation
page read and write
B6DE000
direct allocation
page read and write
B511000
direct allocation
page read and write
FEC0000
trusted library allocation
page read and write
B4F2000
direct allocation
page read and write
B15C000
trusted library allocation
page read and write
B592000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
10064000
trusted library allocation
page read and write
EB67000
trusted library allocation
page read and write
6AA7000
heap
page read and write
B5EB000
direct allocation
page read and write
60DA000
heap
page read and write
B47E000
direct allocation
page read and write
B5A6000
direct allocation
page read and write
EAD0000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
B4D2000
direct allocation
page read and write
B59E000
direct allocation
page read and write
B51E000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
EB65000
trusted library allocation
page read and write
B146000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
B5F5000
direct allocation
page read and write
B526000
direct allocation
page read and write
1047D000
heap
page read and write
FF3F000
trusted library allocation
page read and write
B4E0000
direct allocation
page read and write
6BA1000
heap
page read and write
D1EF000
trusted library allocation
page read and write
B62A000
direct allocation
page read and write
B60C000
direct allocation
page read and write
10360000
trusted library allocation
page read and write
B4F0000
direct allocation
page read and write
B730000
direct allocation
page read and write
EC09000
trusted library allocation
page read and write
6926000
heap
page read and write
6BA1000
heap
page read and write
B5F5000
direct allocation
page read and write
B496000
direct allocation
page read and write
B626000
direct allocation
page read and write
CCDD000
heap
page read and write
B63C000
direct allocation
page read and write
CD70000
heap
page read and write
B5DA000
direct allocation
page read and write
B4D4000
direct allocation
page read and write
B141000
trusted library allocation
page read and write
66FB000
heap
page read and write
B646000
direct allocation
page read and write
10088000
trusted library allocation
page read and write
CCEC000
heap
page read and write
B62E000
direct allocation
page read and write
E9A0000
trusted library allocation
page read and write
6286000
heap
page read and write
1FCA000
unkown
page write copy
3867000
heap
page read and write
B6B0000
direct allocation
page read and write
CC3C000
heap
page read and write
6B28000
heap
page read and write
B708000
direct allocation
page read and write
CCCA000
heap
page read and write
2B8FE000
stack
page read and write
2883000
heap
page read and write
CCEB000
heap
page read and write
64D1000
heap
page read and write
62FC000
heap
page read and write
DEF0000
trusted library allocation
page read and write
B766000
direct allocation
page read and write
B708000
direct allocation
page read and write
B686000
direct allocation
page read and write
2B6AF000
direct allocation
page read and write
EB4A000
trusted library allocation
page read and write
EB18000
trusted library allocation
page read and write
B662000
direct allocation
page read and write
B7CA000
direct allocation
page read and write
B0E4000
trusted library allocation
page read and write
B4D4000
direct allocation
page read and write
CCC7000
heap
page read and write
2B902000
unkown
page readonly
B50E000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
CD32000
heap
page read and write
B0F8000
trusted library allocation
page read and write
D173000
trusted library allocation
page read and write
38AA000
heap
page read and write
B5CC000
direct allocation
page read and write
FEE0000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
CCDE000
heap
page read and write
B838000
direct allocation
page read and write
B5F8000
direct allocation
page read and write
2C27D000
stack
page read and write
6540000
heap
page read and write
B5B8000
direct allocation
page read and write
B4B4000
direct allocation
page read and write
CCEB000
heap
page read and write
B7AC000
direct allocation
page read and write
B74C000
direct allocation
page read and write
2B6AB000
direct allocation
page read and write
5C9A000
heap
page read and write
1047D000
heap
page read and write
E4E5000
heap
page read and write
B4B6000
direct allocation
page read and write
B14A000
trusted library allocation
page read and write
B4C2000
direct allocation
page read and write
EAA4000
trusted library allocation
page read and write
B50E000
direct allocation
page read and write
B6CD000
direct allocation
page read and write
CDCD000
heap
page read and write
6259000
heap
page read and write
100A8000
trusted library allocation
page read and write
B4C6000
direct allocation
page read and write
B7F6000
direct allocation
page read and write
E08F000
trusted library allocation
page read and write
6211000
heap
page read and write
6A91000
heap
page read and write
EB5F000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
B62E000
direct allocation
page read and write
B2BF000
stack
page read and write
DE4B000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
B15F000
trusted library allocation
page read and write
B744000
direct allocation
page read and write
69A1000
heap
page read and write
E8CB000
trusted library allocation
page read and write
10088000
trusted library allocation
page read and write
CCCC000
heap
page read and write
10020000
trusted library allocation
page read and write
B0FC000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
FFB0000
trusted library allocation
page read and write
FECC000
trusted library allocation
page read and write
EBCF000
trusted library allocation
page read and write
B498000
direct allocation
page read and write
B0F5000
trusted library allocation
page read and write
B474000
direct allocation
page read and write
119C5000
heap
page read and write
6B3E000
heap
page read and write
B612000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
11910000
trusted library allocation
page read and write
B5AC000
direct allocation
page read and write
B496000
direct allocation
page read and write
D175000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
B56C000
direct allocation
page read and write
DEF0000
trusted library allocation
page read and write
5CE8000
heap
page read and write
66FB000
heap
page read and write
B63E000
direct allocation
page read and write
B7B5000
direct allocation
page read and write
B71C000
direct allocation
page read and write
B51E000
direct allocation
page read and write
B833000
direct allocation
page read and write
B7DE000
direct allocation
page read and write
B511000
direct allocation
page read and write
2010000
unkown
page write copy
B4E6000
direct allocation
page read and write
EAD0000
trusted library allocation
page read and write
662B000
heap
page read and write
FF10000
trusted library allocation
page read and write
B588000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
CDCB000
heap
page read and write
B63A000
direct allocation
page read and write
10081000
trusted library allocation
page read and write
6093000
heap
page read and write
B730000
direct allocation
page read and write
EB69000
trusted library allocation
page read and write
B5FA000
direct allocation
page read and write
B4B4000
direct allocation
page read and write
B82A000
direct allocation
page read and write
B7E7000
direct allocation
page read and write
B7F4000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
286C000
heap
page read and write
6BB2000
heap
page read and write
62A8000
heap
page read and write
10E9A000
trusted library allocation
page read and write
B4C6000
direct allocation
page read and write
CD49000
heap
page read and write
B764000
direct allocation
page read and write
B55E000
direct allocation
page read and write
B680000
direct allocation
page read and write
100DA000
trusted library allocation
page read and write
E9E4000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
B616000
direct allocation
page read and write
B80C000
direct allocation
page read and write
B5AC000
direct allocation
page read and write
B524000
direct allocation
page read and write
B4EC000
direct allocation
page read and write
6AD2000
heap
page read and write
EAE8000
trusted library allocation
page read and write
B59E000
direct allocation
page read and write
B60A000
direct allocation
page read and write
65ED000
heap
page read and write
E8DC000
trusted library allocation
page read and write
EA98000
trusted library allocation
page read and write
DE60000
trusted library allocation
page read and write
B600000
direct allocation
page read and write
FF00000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
B54C000
direct allocation
page read and write
B6F3000
direct allocation
page read and write
E0F3000
trusted library allocation
page read and write
EB54000
trusted library allocation
page read and write
B80E000
direct allocation
page read and write
B7AD000
direct allocation
page read and write
285B000
heap
page read and write
B4E4000
direct allocation
page read and write
10096000
trusted library allocation
page read and write
6B3E000
heap
page read and write
B55E000
direct allocation
page read and write
B5B0000
direct allocation
page read and write
B159000
trusted library allocation
page read and write
E8CF000
trusted library allocation
page read and write
E012000
trusted library allocation
page read and write
EB54000
trusted library allocation
page read and write
B49D000
direct allocation
page read and write
B5C0000
direct allocation
page read and write
B4CC000
direct allocation
page read and write
B496000
direct allocation
page read and write
B702000
direct allocation
page read and write
B566000
direct allocation
page read and write
B772000
direct allocation
page read and write
B592000
direct allocation
page read and write
E8EC000
trusted library allocation
page read and write
B606000
direct allocation
page read and write
E0F0000
trusted library allocation
page read and write
3867000
heap
page read and write
CCEE000
heap
page read and write
6A91000
heap
page read and write
B6EF000
direct allocation
page read and write
B694000
direct allocation
page read and write
B6D1000
direct allocation
page read and write
CCEA000
heap
page read and write
6247000
heap
page read and write
B484000
direct allocation
page read and write
B5F5000
direct allocation
page read and write
B4BC000
direct allocation
page read and write
B149000
trusted library allocation
page read and write
6847000
heap
page read and write
B52C000
direct allocation
page read and write
4F90000
trusted library allocation
page read and write
E8CF000
trusted library allocation
page read and write
B588000
direct allocation
page read and write
EA79000
trusted library allocation
page read and write
B0E7000
trusted library allocation
page read and write
B14C000
trusted library allocation
page read and write
FF0C000
trusted library allocation
page read and write
B5A0000
direct allocation
page read and write
10E9C000
trusted library allocation
page read and write
B49C000
direct allocation
page read and write
B54C000
direct allocation
page read and write
B48A000
direct allocation
page read and write
B616000
direct allocation
page read and write
EACE000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
294C000
heap
page read and write
B0E9000
trusted library allocation
page read and write
E999000
trusted library allocation
page read and write
B7D1000
direct allocation
page read and write
B6F6000
direct allocation
page read and write
6267000
heap
page read and write
B4AE000
direct allocation
page read and write
626B000
heap
page read and write
B728000
direct allocation
page read and write
6533000
heap
page read and write
D177000
trusted library allocation
page read and write
B5E8000
direct allocation
page read and write
CD28000
heap
page read and write
B4C6000
direct allocation
page read and write
CCEE000
heap
page read and write
E8CB000
trusted library allocation
page read and write
CCE4000
heap
page read and write
EACA000
trusted library allocation
page read and write
B69C000
direct allocation
page read and write
29AB000
heap
page read and write
B5EE000
direct allocation
page read and write
5CAD000
heap
page read and write
B49E000
direct allocation
page read and write
E8C8000
trusted library allocation
page read and write
65C5000
heap
page read and write
B62E000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
CD25000
heap
page read and write
6540000
heap
page read and write
625D000
heap
page read and write
CCEB000
heap
page read and write
EAA4000
trusted library allocation
page read and write
B56C000
direct allocation
page read and write
B4E8000
direct allocation
page read and write
6B52000
heap
page read and write
B5F3000
direct allocation
page read and write
5CAD000
heap
page read and write
B600000
direct allocation
page read and write
B84A000
direct allocation
page read and write
B712000
direct allocation
page read and write
B54C000
direct allocation
page read and write
B831000
direct allocation
page read and write
B54E000
direct allocation
page read and write
B149000
trusted library allocation
page read and write
B4A8000
direct allocation
page read and write
B606000
direct allocation
page read and write
B4CE000
direct allocation
page read and write
B6E6000
direct allocation
page read and write
CCEA000
heap
page read and write
100A8000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
B6B8000
direct allocation
page read and write
B70A000
direct allocation
page read and write
B614000
direct allocation
page read and write
2966000
heap
page read and write
EB08000
trusted library allocation
page read and write
1FDC000
unkown
page read and write
B5B0000
direct allocation
page read and write
19D2000
unkown
page readonly
100B8000
trusted library allocation
page read and write
6B3E000
heap
page read and write
CCEA000
heap
page read and write
B874000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
EB02000
trusted library allocation
page read and write
B4BE000
direct allocation
page read and write
B75C000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
B7CD000
direct allocation
page read and write
EC0B000
trusted library allocation
page read and write
B4B6000
direct allocation
page read and write
B526000
direct allocation
page read and write
B550000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
624B000
heap
page read and write
B6F2000
direct allocation
page read and write
B5E4000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
6533000
heap
page read and write
B696000
direct allocation
page read and write
3ACC000
heap
page read and write
65D2000
heap
page read and write
19D2000
unkown
page readonly
B52C000
direct allocation
page read and write
67CC000
heap
page read and write
B6C2000
direct allocation
page read and write
2010000
unkown
page write copy
FFFC000
trusted library allocation
page read and write
FFFC000
trusted library allocation
page read and write
EB02000
trusted library allocation
page read and write
CCEA000
heap
page read and write
6247000
heap
page read and write
B148000
trusted library allocation
page read and write
EC0B000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
10096000
trusted library allocation
page read and write
B84E000
direct allocation
page read and write
B49E000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
EAB8000
trusted library allocation
page read and write
EA53000
trusted library allocation
page read and write
B4CC000
direct allocation
page read and write
B548000
direct allocation
page read and write
B7F8000
direct allocation
page read and write
6991000
heap
page read and write
5C9C000
heap
page read and write
4E5C000
trusted library allocation
page read and write
1F37000
unkown
page read and write
B4B0000
direct allocation
page read and write
E980000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
B63E000
direct allocation
page read and write
B51A000
direct allocation
page read and write
D177000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
B554000
direct allocation
page read and write
6B51000
heap
page read and write
B824000
direct allocation
page read and write
100B8000
trusted library allocation
page read and write
B606000
direct allocation
page read and write
E999000
trusted library allocation
page read and write
6837000
heap
page read and write
B726000
direct allocation
page read and write
B4BA000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
DE4C000
trusted library allocation
page read and write
B486000
direct allocation
page read and write
E0BA000
trusted library allocation
page read and write
664B000
heap
page read and write
6B34000
heap
page read and write
B4D2000
direct allocation
page read and write
100DE000
trusted library allocation
page read and write
CCE2000
heap
page read and write
EACA000
trusted library allocation
page read and write
CDCD000
heap
page read and write
B6DC000
direct allocation
page read and write
CF8A000
trusted library allocation
page read and write
10090000
trusted library allocation
page read and write
B5B4000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
D176000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
B490000
direct allocation
page read and write
B492000
direct allocation
page read and write
288A000
heap
page read and write
B522000
direct allocation
page read and write
B5EE000
direct allocation
page read and write
E0B7000
trusted library allocation
page read and write
B4C6000
direct allocation
page read and write
6B51000
heap
page read and write
B548000
direct allocation
page read and write
B59E000
direct allocation
page read and write
B80E000
direct allocation
page read and write
5CDA000
heap
page read and write
10078000
trusted library allocation
page read and write
B0E7000
trusted library allocation
page read and write
B884000
direct allocation
page read and write
B524000
direct allocation
page read and write
EA62000
trusted library allocation
page read and write
B6CC000
direct allocation
page read and write
6B2C000
heap
page read and write
B52C000
direct allocation
page read and write
E9D3000
trusted library allocation
page read and write
B5A0000
direct allocation
page read and write
B68C000
direct allocation
page read and write
2A97000
direct allocation
page read and write
E6DD000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
E230000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
B7BC000
direct allocation
page read and write
B149000
trusted library allocation
page read and write
2B4FF000
stack
page read and write
E9B0000
trusted library allocation
page read and write
62A3000
heap
page read and write
3867000
heap
page read and write
5CC7000
heap
page read and write
B48C000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
100B8000
trusted library allocation
page read and write
2C17E000
stack
page read and write
B777000
direct allocation
page read and write
CCBD000
heap
page read and write
1006E000
trusted library allocation
page read and write
696C000
heap
page read and write
E9CC000
trusted library allocation
page read and write
B862000
direct allocation
page read and write
5C81000
heap
page read and write
6829000
heap
page read and write
62A8000
heap
page read and write
64D1000
heap
page read and write
B652000
direct allocation
page read and write
6332000
heap
page read and write
B0F5000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
CCFC000
heap
page read and write
EC10000
trusted library allocation
page read and write
EB08000
trusted library allocation
page read and write
B620000
direct allocation
page read and write
6A7C000
heap
page read and write
B816000
direct allocation
page read and write
B594000
direct allocation
page read and write
B6E4000
direct allocation
page read and write
B4E6000
direct allocation
page read and write
64D9000
heap
page read and write
D177000
trusted library allocation
page read and write
CD1D000
heap
page read and write
10096000
trusted library allocation
page read and write
B772000
direct allocation
page read and write
74EB000
trusted library allocation
page read and write
CC4F000
heap
page read and write
50E2000
trusted library allocation
page read and write
CF91000
trusted library allocation
page read and write
CCE7000
heap
page read and write
B600000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
B159000
trusted library allocation
page read and write
D1DB000
trusted library allocation
page read and write
B4C0000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
6B65000
heap
page read and write
B15C000
trusted library allocation
page read and write
B4D6000
direct allocation
page read and write
B827000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
E049000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
B698000
direct allocation
page read and write
B4DE000
direct allocation
page read and write
10B28000
trusted library allocation
page read and write
66FB000
heap
page read and write
B510000
direct allocation
page read and write
B4C6000
direct allocation
page read and write
B696000
direct allocation
page read and write
B6E0000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
FF58000
trusted library allocation
page read and write
B860000
direct allocation
page read and write
E8F6000
trusted library allocation
page read and write
B4DC000
direct allocation
page read and write
74CA000
trusted library allocation
page read and write
D17A000
trusted library allocation
page read and write
E6D5000
trusted library allocation
page read and write
1FCB000
unkown
page read and write
D1E6000
trusted library allocation
page read and write
E110000
trusted library allocation
page read and write
E9DD000
trusted library allocation
page read and write
B5EC000
direct allocation
page read and write
1006E000
trusted library allocation
page read and write
B83C000
direct allocation
page read and write
CCC5000
heap
page read and write
B728000
direct allocation
page read and write
B6A1000
direct allocation
page read and write
B4B8000
direct allocation
page read and write
B51A000
direct allocation
page read and write
6255000
heap
page read and write
10096000
trusted library allocation
page read and write
B786000
direct allocation
page read and write
B606000
direct allocation
page read and write
B866000
direct allocation
page read and write
B4BC000
direct allocation
page read and write
6C30000
heap
page read and write
EC1A000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
CC73000
heap
page read and write
5C98000
heap
page read and write
FF0C000
trusted library allocation
page read and write
B5A0000
direct allocation
page read and write
B5ED000
direct allocation
page read and write
D177000
trusted library allocation
page read and write
FEE0000
trusted library allocation
page read and write
CD6D000
heap
page read and write
4E5C000
trusted library allocation
page read and write
B6F3000
direct allocation
page read and write
50E3000
trusted library allocation
page read and write
1007E000
trusted library allocation
page read and write
D1E6000
trusted library allocation
page read and write
B760000
direct allocation
page read and write
B494000
direct allocation
page read and write
B51A000
direct allocation
page read and write
D0E6000
heap
page read and write
B4BC000
direct allocation
page read and write
B696000
direct allocation
page read and write
6219000
heap
page read and write
B4CD000
direct allocation
page read and write
6540000
heap
page read and write
74D2000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
CCB3000
heap
page read and write
B63E000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
10B2C000
trusted library allocation
page read and write
E033000
trusted library allocation
page read and write
6263000
heap
page read and write
B0EB000
trusted library allocation
page read and write
682F000
heap
page read and write
EAE8000
trusted library allocation
page read and write
B5E7000
direct allocation
page read and write
1C98000
heap
page read and write
100CE000
trusted library allocation
page read and write
CCC5000
heap
page read and write
28DE000
heap
page read and write
B70C000
direct allocation
page read and write
B4E6000
direct allocation
page read and write
100DE000
trusted library allocation
page read and write
B5F3000
direct allocation
page read and write
B63E000
direct allocation
page read and write
EB69000
trusted library allocation
page read and write
116EF000
heap
page read and write
B50E000
direct allocation
page read and write
DE29000
heap
page read and write
B494000
direct allocation
page read and write
E0B2000
trusted library allocation
page read and write
E950000
trusted library allocation
page read and write
B484000
direct allocation
page read and write
E370000
trusted library allocation
page read and write
EB02000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
B5FE000
direct allocation
page read and write
B756000
direct allocation
page read and write
B5F6000
direct allocation
page read and write
CDEC000
heap
page read and write
E60000
unkown
page readonly
B83C000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
D171000
trusted library allocation
page read and write
B710000
direct allocation
page read and write
B64E000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
B62A000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
100DA000
trusted library allocation
page read and write
6BA1000
heap
page read and write
CCDD000
heap
page read and write
E9A0000
trusted library allocation
page read and write
D171000
trusted library allocation
page read and write
B620000
direct allocation
page read and write
B6AE000
direct allocation
page read and write
5CB0000
heap
page read and write
FE98000
trusted library allocation
page read and write
B6F4000
direct allocation
page read and write
EB4A000
trusted library allocation
page read and write
B6AC000
direct allocation
page read and write
E0CD000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
B712000
direct allocation
page read and write
B74C000
direct allocation
page read and write
D178000
trusted library allocation
page read and write
CC73000
heap
page read and write
B6AC000
direct allocation
page read and write
B47E000
direct allocation
page read and write
B53E000
direct allocation
page read and write
B866000
direct allocation
page read and write
D24E000
heap
page read and write
B5B8000
direct allocation
page read and write
DE4D000
heap
page read and write
B5A0000
direct allocation
page read and write
B700000
direct allocation
page read and write
B47C000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
FFA0000
trusted library allocation
page read and write
E0BD000
trusted library allocation
page read and write
6263000
heap
page read and write
FFF8000
trusted library allocation
page read and write
B5B0000
direct allocation
page read and write
5D18000
heap
page read and write
B4DE000
direct allocation
page read and write
B512000
direct allocation
page read and write
B51E000
direct allocation
page read and write
CBF8000
heap
page read and write
100DA000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
B0E9000
trusted library allocation
page read and write
296A000
heap
page read and write
1005C000
trusted library allocation
page read and write
EB75000
trusted library allocation
page read and write
B554000
direct allocation
page read and write
B62E000
direct allocation
page read and write
B0F4000
trusted library allocation
page read and write
B550000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
EB77000
trusted library allocation
page read and write
B4DC000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
B15B000
trusted library allocation
page read and write
B14F000
trusted library allocation
page read and write
6BA4000
heap
page read and write
B524000
direct allocation
page read and write
EACA000
trusted library allocation
page read and write
10078000
trusted library allocation
page read and write
6855000
heap
page read and write
B14B000
trusted library allocation
page read and write
B4BE000
direct allocation
page read and write
B486000
direct allocation
page read and write
EACA000
trusted library allocation
page read and write
E8CB000
trusted library allocation
page read and write
2C510000
remote allocation
page read and write
100DA000
trusted library allocation
page read and write
100CE000
trusted library allocation
page read and write
6211000
heap
page read and write
B4BA000
direct allocation
page read and write
B698000
direct allocation
page read and write
B88E000
direct allocation
page read and write
B524000
direct allocation
page read and write
B4E2000
direct allocation
page read and write
B490000
direct allocation
page read and write
10092000
trusted library allocation
page read and write
CDCB000
heap
page read and write
EB77000
trusted library allocation
page read and write
B680000
direct allocation
page read and write
B4B7000
direct allocation
page read and write
B155000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B49C000
direct allocation
page read and write
E9A2000
heap
page read and write
B474000
direct allocation
page read and write
1047C000
heap
page read and write
E956000
trusted library allocation
page read and write
B6DC000
direct allocation
page read and write
B656000
direct allocation
page read and write
B56E000
direct allocation
page read and write
E0B0000
trusted library allocation
page read and write
B656000
direct allocation
page read and write
B0F6000
trusted library allocation
page read and write
B590000
direct allocation
page read and write
B874000
direct allocation
page read and write
6BA1000
heap
page read and write
B76F000
direct allocation
page read and write
B4AA000
direct allocation
page read and write
B5DA000
direct allocation
page read and write
B7D8000
direct allocation
page read and write
B56A000
direct allocation
page read and write
B5A6000
direct allocation
page read and write
38B4000
heap
page read and write
B7AB000
direct allocation
page read and write
5C9A000
heap
page read and write
E9D3000
trusted library allocation
page read and write
6426000
heap
page read and write
EB4A000
trusted library allocation
page read and write
B6A4000
direct allocation
page read and write
B6A2000
direct allocation
page read and write
B770000
direct allocation
page read and write
CCE4000
heap
page read and write
B48C000
direct allocation
page read and write
B777000
direct allocation
page read and write
294E000
heap
page read and write
1003A000
trusted library allocation
page read and write
6829000
heap
page read and write
D17A000
trusted library allocation
page read and write
CC60000
heap
page read and write
74B4000
trusted library allocation
page read and write
B570000
direct allocation
page read and write
B594000
direct allocation
page read and write
EA79000
trusted library allocation
page read and write
74E6000
trusted library allocation
page read and write
B7D6000
direct allocation
page read and write
E9B8000
trusted library allocation
page read and write
B728000
direct allocation
page read and write
B7D6000
direct allocation
page read and write
B81A000
direct allocation
page read and write
B486000
direct allocation
page read and write
B4EE000
direct allocation
page read and write
100E5000
trusted library allocation
page read and write
EB47000
trusted library allocation
page read and write
CBF1000
heap
page read and write
644E000
heap
page read and write
B510000
direct allocation
page read and write
B518000
direct allocation
page read and write
B484000
direct allocation
page read and write
2BB7E000
stack
page read and write
CCEE000
heap
page read and write
EABC000
trusted library allocation
page read and write
B15A000
trusted library allocation
page read and write
B822000
direct allocation
page read and write
B524000
direct allocation
page read and write
B4F0000
direct allocation
page read and write
6A15000
heap
page read and write
B47C000
direct allocation
page read and write
B6CB000
direct allocation
page read and write
B80E000
direct allocation
page read and write
6C06000
heap
page read and write
B5C0000
direct allocation
page read and write
B58C000
direct allocation
page read and write
B69A000
direct allocation
page read and write
5D0E000
heap
page read and write
100F8000
trusted library allocation
page read and write
B600000
direct allocation
page read and write
B6CD000
direct allocation
page read and write
B4C4000
direct allocation
page read and write
FFF6000
trusted library allocation
page read and write
EB47000
trusted library allocation
page read and write
B750000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
B46C000
direct allocation
page read and write
67C6000
heap
page read and write
B4C7000
direct allocation
page read and write
EB47000
trusted library allocation
page read and write
B700000
direct allocation
page read and write
B7CF000
direct allocation
page read and write
4FAC000
trusted library allocation
page read and write
CDCB000
heap
page read and write
B4D6000
direct allocation
page read and write
10081000
trusted library allocation
page read and write
CCC9000
heap
page read and write
B77C000
direct allocation
page read and write
B5A0000
direct allocation
page read and write
B615000
direct allocation
page read and write
B7BC000
direct allocation
page read and write
100DE000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
CCE2000
heap
page read and write
B6EC000
direct allocation
page read and write
B6C3000
direct allocation
page read and write
B522000
direct allocation
page read and write
B7CA000
direct allocation
page read and write
1003A000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
B6E0000
direct allocation
page read and write
E8DC000
trusted library allocation
page read and write
100DE000
trusted library allocation
page read and write
2B7A2000
direct allocation
page read and write
5ACD000
heap
page read and write
5CC0000
heap
page read and write
CDCB000
heap
page read and write
B0EA000
trusted library allocation
page read and write
B62E000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
B56E000
direct allocation
page read and write
CD61000
heap
page read and write
EB58000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
CD70000
heap
page read and write
B562000
direct allocation
page read and write
B588000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
B474000
direct allocation
page read and write
625D000
heap
page read and write
EC1A000
trusted library allocation
page read and write
FEC0000
trusted library allocation
page read and write
B6A6000
direct allocation
page read and write
E5BA000
heap
page read and write
3867000
heap
page read and write
6255000
heap
page read and write
B614000
direct allocation
page read and write
B5F0000
direct allocation
page read and write
CCE4000
heap
page read and write
B706000
direct allocation
page read and write
B4B4000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
38C1000
heap
page read and write
B61C000
direct allocation
page read and write
100DE000
trusted library allocation
page read and write
5C96000
heap
page read and write
10081000
trusted library allocation
page read and write
6252000
heap
page read and write
1047D000
heap
page read and write
B55C000
direct allocation
page read and write
B4A6000
direct allocation
page read and write
B474000
direct allocation
page read and write
B15A000
trusted library allocation
page read and write
EB10000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
B800000
direct allocation
page read and write
100E5000
trusted library allocation
page read and write
B494000
direct allocation
page read and write
10064000
trusted library allocation
page read and write
692F000
heap
page read and write
1FCC000
unkown
page write copy
B7CD000
direct allocation
page read and write
B76C000
direct allocation
page read and write
EB18000
trusted library allocation
page read and write
5C3F000
heap
page read and write
B74E000
direct allocation
page read and write
B47E000
direct allocation
page read and write
E08D000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
E013000
trusted library allocation
page read and write
DFD0000
trusted library allocation
page read and write
B5E6000
direct allocation
page read and write
B76C000
direct allocation
page read and write
B54C000
direct allocation
page read and write
3897000
heap
page read and write
E360000
trusted library allocation
page read and write
EC09000
trusted library allocation
page read and write
E950000
trusted library allocation
page read and write
B764000
direct allocation
page read and write
B7D1000
direct allocation
page read and write
E8C8000
trusted library allocation
page read and write
B47C000
direct allocation
page read and write
B4B4000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
B512000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
B140000
trusted library allocation
page read and write
B7AB000
direct allocation
page read and write
B490000
direct allocation
page read and write
CC4A000
heap
page read and write
B6B3000
direct allocation
page read and write
6B51000
heap
page read and write
E080000
trusted library allocation
page read and write
D172000
trusted library allocation
page read and write
CC60000
heap
page read and write
FE88000
trusted library allocation
page read and write
B524000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
1BD1000
heap
page read and write
10E9A000
trusted library allocation
page read and write
E0BA000
trusted library allocation
page read and write
B49E000
direct allocation
page read and write
E056000
trusted library allocation
page read and write
EB52000
trusted library allocation
page read and write
EB58000
trusted library allocation
page read and write
6A57000
heap
page read and write
E8D7000
trusted library allocation
page read and write
5C94000
heap
page read and write
B6A8000
direct allocation
page read and write
B652000
direct allocation
page read and write
E98E000
trusted library allocation
page read and write
6286000
heap
page read and write
B6D4000
direct allocation
page read and write
B75C000
direct allocation
page read and write
B698000
direct allocation
page read and write
65A7000
heap
page read and write
B490000
direct allocation
page read and write
CCD7000
heap
page read and write
B46C000
direct allocation
page read and write
B511000
direct allocation
page read and write
CD5D000
heap
page read and write
1047D000
heap
page read and write
6B7C000
heap
page read and write
EC1E000
trusted library allocation
page read and write
B47C000
direct allocation
page read and write
B7BC000
direct allocation
page read and write
10064000
trusted library allocation
page read and write
EB5B000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
CCC5000
heap
page read and write
634A000
heap
page read and write
CCEC000
heap
page read and write
100E5000
trusted library allocation
page read and write
74D2000
trusted library allocation
page read and write
B6D1000
direct allocation
page read and write
B4F8000
direct allocation
page read and write
E04C000
trusted library allocation
page read and write
5C98000
heap
page read and write
13F1000
unkown
page execute and write copy
B46C000
direct allocation
page read and write
B4D8000
direct allocation
page read and write
B5FC000
direct allocation
page read and write
B5BC000
direct allocation
page read and write
B59E000
direct allocation
page read and write
B484000
direct allocation
page read and write
CD25000
heap
page read and write
E8D9000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
B5FA000
direct allocation
page read and write
B5F3000
direct allocation
page read and write
B615000
direct allocation
page read and write
CDCD000
heap
page read and write
EB77000
trusted library allocation
page read and write
10060000
trusted library allocation
page read and write
B5A0000
direct allocation
page read and write
B83C000
direct allocation
page read and write
FFF4000
trusted library allocation
page read and write
E9B0000
trusted library allocation
page read and write
CDCD000
heap
page read and write
B7B8000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
D1D4000
trusted library allocation
page read and write
B4E6000
direct allocation
page read and write
D17A000
trusted library allocation
page read and write
B474000
direct allocation
page read and write
B5AA000
direct allocation
page read and write
7548000
trusted library allocation
page read and write
6ADB000
heap
page read and write
2BC7F000
stack
page read and write
B4C7000
direct allocation
page read and write
CCEB000
heap
page read and write
B4EE000
direct allocation
page read and write
6A9D000
heap
page read and write
EBDB000
trusted library allocation
page read and write
6AF8000
heap
page read and write
EB7A000
trusted library allocation
page read and write
B70C000
direct allocation
page read and write
B7E6000
direct allocation
page read and write
E8F6000
trusted library allocation
page read and write
B494000
direct allocation
page read and write
B4A9000
direct allocation
page read and write
E8CF000
trusted library allocation
page read and write
B83C000
direct allocation
page read and write
E9A0000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
6842000
heap
page read and write
2C510000
remote allocation
page read and write
B526000
direct allocation
page read and write
29B3000
heap
page read and write
6207000
heap
page read and write
B51E000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
B5B6000
direct allocation
page read and write
CCCC000
heap
page read and write
10096000
trusted library allocation
page read and write
B500000
direct allocation
page read and write
B7F6000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
B734000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
6AF8000
heap
page read and write
CCEE000
heap
page read and write
FEC4000
trusted library allocation
page read and write
EAE8000
trusted library allocation
page read and write
B6F2000
direct allocation
page read and write
B680000
direct allocation
page read and write
16E5000
unkown
page readonly
B5CC000
direct allocation
page read and write
EB77000
trusted library allocation
page read and write
B14C000
trusted library allocation
page read and write
FF10000
trusted library allocation
page read and write
EC1A000
trusted library allocation
page read and write
B6CA000
direct allocation
page read and write
1C47000
heap
page read and write
B641000
direct allocation
page read and write
B51A000
direct allocation
page read and write
D171000
trusted library allocation
page read and write
B4E6000
direct allocation
page read and write
B55E000
direct allocation
page read and write
CCE5000
heap
page read and write
298F000
heap
page read and write
EB77000
trusted library allocation
page read and write
B4C4000
direct allocation
page read and write
1006E000
trusted library allocation
page read and write
CC73000
heap
page read and write
1047D000
heap
page read and write
10084000
trusted library allocation
page read and write
B7D8000
direct allocation
page read and write
EB10000
trusted library allocation
page read and write
B6D8000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
E98E000
trusted library allocation
page read and write
B59E000
direct allocation
page read and write
B7CF000
direct allocation
page read and write
EB77000
trusted library allocation
page read and write
10092000
trusted library allocation
page read and write
38E5000
heap
page read and write
B618000
direct allocation
page read and write
6C3A000
heap
page read and write
EA50000
trusted library allocation
page read and write
EA50000
trusted library allocation
page read and write
B54A000
direct allocation
page read and write
10B16000
trusted library allocation
page read and write
B83C000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
B7F6000
direct allocation
page read and write
2966000
heap
page read and write
B63C000
direct allocation
page read and write
CF02000
heap
page read and write
CC0B000
heap
page read and write
B696000
direct allocation
page read and write
B588000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
CCD6000
heap
page read and write
B7A8000
direct allocation
page read and write
74C0000
trusted library allocation
page read and write
B4DA000
direct allocation
page read and write
EBCB000
trusted library allocation
page read and write
6255000
heap
page read and write
B5EE000
direct allocation
page read and write
B49E000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
B6E0000
direct allocation
page read and write
E8D7000
trusted library allocation
page read and write
CD6C000
heap
page read and write
FF0A000
trusted library allocation
page read and write
6BB2000
heap
page read and write
EA98000
trusted library allocation
page read and write
B63A000
direct allocation
page read and write
10096000
trusted library allocation
page read and write
28E1000
heap
page read and write
B56A000
direct allocation
page read and write
B4D4000
direct allocation
page read and write
B6E0000
direct allocation
page read and write
100D8000
trusted library allocation
page read and write
FEA6000
trusted library allocation
page read and write
DE4A000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
6273000
heap
page read and write
B4EE000
direct allocation
page read and write
B5F9000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
D178000
trusted library allocation
page read and write
B75C000
direct allocation
page read and write
2B980000
direct allocation
page read and write
B15D000
trusted library allocation
page read and write
5C30000
heap
page read and write
634A000
heap
page read and write
B6D2000
direct allocation
page read and write
B5C0000
direct allocation
page read and write
EB10000
trusted library allocation
page read and write
B4DC000
direct allocation
page read and write
B69A000
direct allocation
page read and write
B4A7000
direct allocation
page read and write
EC0B000
trusted library allocation
page read and write
5C97000
heap
page read and write
66FB000
heap
page read and write
CC80000
heap
page read and write
B5BC000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
D1D2000
trusted library allocation
page read and write
E9D8000
trusted library allocation
page read and write
B4AC000
direct allocation
page read and write
EBCF000
trusted library allocation
page read and write
CCE7000
heap
page read and write
E8D4000
trusted library allocation
page read and write
25D8000
direct allocation
page read and write
E8CD000
trusted library allocation
page read and write
B6F2000
direct allocation
page read and write
B698000
direct allocation
page read and write
10060000
trusted library allocation
page read and write
6934000
heap
page read and write
B478000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
B60E000
direct allocation
page read and write
B608000
direct allocation
page read and write
B5FA000
direct allocation
page read and write
EC10000
trusted library allocation
page read and write
D174000
trusted library allocation
page read and write
B492000
direct allocation
page read and write
EB0E000
trusted library allocation
page read and write
64D1000
heap
page read and write
B6F2000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
B4E6000
direct allocation
page read and write
286A000
heap
page read and write
CC73000
heap
page read and write
B4B6000
direct allocation
page read and write
B542000
direct allocation
page read and write
B46E000
direct allocation
page read and write
570D000
heap
page read and write
B444000
direct allocation
page read and write
B4EE000
direct allocation
page read and write
B568000
direct allocation
page read and write
B0E5000
trusted library allocation
page read and write
B5B8000
direct allocation
page read and write
B5F3000
direct allocation
page read and write
FF10000
trusted library allocation
page read and write
B777000
direct allocation
page read and write
B512000
direct allocation
page read and write
CCDD000
heap
page read and write
B60E000
direct allocation
page read and write
EACA000
trusted library allocation
page read and write
B820000
direct allocation
page read and write
B764000
direct allocation
page read and write
B874000
direct allocation
page read and write
B4D8000
direct allocation
page read and write
B802000
direct allocation
page read and write
CD23000
heap
page read and write
B4EE000
direct allocation
page read and write
B0E9000
trusted library allocation
page read and write
B594000
direct allocation
page read and write
E8CD000
trusted library allocation
page read and write
B81E000
direct allocation
page read and write
E0C1000
trusted library allocation
page read and write
B0F7000
trusted library allocation
page read and write
6453000
heap
page read and write
B1BF000
stack
page read and write
6991000
heap
page read and write
2C13F000
stack
page read and write
EADE000
trusted library allocation
page read and write
EB00000
trusted library allocation
page read and write
B6EB000
direct allocation
page read and write
B5B4000
direct allocation
page read and write
B4B6000
direct allocation
page read and write
E8F6000
trusted library allocation
page read and write
29AB000
heap
page read and write
10084000
trusted library allocation
page read and write
EC10000
trusted library allocation
page read and write
B650000
direct allocation
page read and write
B5BC000
direct allocation
page read and write
B72C000
direct allocation
page read and write
B56A000
direct allocation
page read and write
D171000
trusted library allocation
page read and write
EA62000
trusted library allocation
page read and write
B628000
direct allocation
page read and write
B652000
direct allocation
page read and write
B5C0000
direct allocation
page read and write
CCEE000
heap
page read and write
CD1B000
heap
page read and write
D173000
trusted library allocation
page read and write
D1E6000
trusted library allocation
page read and write
B777000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
EB63000
trusted library allocation
page read and write
EB0E000
trusted library allocation
page read and write
B52C000
direct allocation
page read and write
6263000
heap
page read and write
EB5F000
trusted library allocation
page read and write
B71C000
direct allocation
page read and write
E9F4000
trusted library allocation
page read and write
B6E0000
direct allocation
page read and write
B606000
direct allocation
page read and write
B646000
direct allocation
page read and write
B4EC000
direct allocation
page read and write
B6D4000
direct allocation
page read and write
50D6000
trusted library allocation
page read and write
E8DC000
trusted library allocation
page read and write
FF28000
trusted library allocation
page read and write
B4DE000
direct allocation
page read and write
100DA000
trusted library allocation
page read and write
E8D4000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
100D8000
trusted library allocation
page read and write
B6EC000
direct allocation
page read and write
B874000
direct allocation
page read and write
21BE000
stack
page read and write
5CB2000
heap
page read and write
B7E6000
direct allocation
page read and write
B522000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
E9B8000
trusted library allocation
page read and write
FF62000
trusted library allocation
page read and write
FFB0000
trusted library allocation
page read and write
EC18000
trusted library allocation
page read and write
EAA4000
trusted library allocation
page read and write
E9F9000
trusted library allocation
page read and write
B474000
direct allocation
page read and write
B68A000
direct allocation
page read and write
6BB2000
heap
page read and write
D1D6000
trusted library allocation
page read and write
B157000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
100AF000
trusted library allocation
page read and write
FFF8000
trusted library allocation
page read and write
B5B8000
direct allocation
page read and write
EB52000
trusted library allocation
page read and write
EA65000
trusted library allocation
page read and write
B48C000
direct allocation
page read and write
B5BC000
direct allocation
page read and write
B4D2000
direct allocation
page read and write
FFF6000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
B149000
trusted library allocation
page read and write
B4E0000
direct allocation
page read and write
B4AE000
direct allocation
page read and write
62FC000
heap
page read and write
E980000
trusted library allocation
page read and write
B60C000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
6BA1000
heap
page read and write
B59E000
direct allocation
page read and write
B617000
direct allocation
page read and write
B6F0000
direct allocation
page read and write
B738000
direct allocation
page read and write
E8DC000
trusted library allocation
page read and write
B6CB000
direct allocation
page read and write
B75C000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
E8D9000
trusted library allocation
page read and write
B649000
direct allocation
page read and write
E9D8000
trusted library allocation
page read and write
B864000
direct allocation
page read and write
FF10000
trusted library allocation
page read and write
100F8000
trusted library allocation
page read and write
B4A8000
direct allocation
page read and write
6BA1000
heap
page read and write
B894000
direct allocation
page read and write
E8D9000
trusted library allocation
page read and write
6626000
heap
page read and write
B4C0000
direct allocation
page read and write
B5ED000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
B77C000
direct allocation
page read and write
B15E000
trusted library allocation
page read and write
B695000
direct allocation
page read and write
B4EA000
direct allocation
page read and write
E9D3000
trusted library allocation
page read and write
B831000
direct allocation
page read and write
B5E4000
direct allocation
page read and write
B4E4000
direct allocation
page read and write
EB0E000
trusted library allocation
page read and write
E61000
unkown
page execute read
B48C000
direct allocation
page read and write
B404000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
B6E2000
direct allocation
page read and write
EB54000
trusted library allocation
page read and write
B84A000
direct allocation
page read and write
B5EC000
direct allocation
page read and write
67BF000
heap
page read and write
B4EA000
direct allocation
page read and write
B852000
direct allocation
page read and write
B7C8000
direct allocation
page read and write
B856000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
EABC000
trusted library allocation
page read and write
6B45000
heap
page read and write
B51E000
direct allocation
page read and write
B4B8000
direct allocation
page read and write
B680000
direct allocation
page read and write
10064000
trusted library allocation
page read and write
B0E0000
trusted library allocation
page read and write
B592000
direct allocation
page read and write
B61E000
direct allocation
page read and write
2770000
direct allocation
page read and write
4F9D000
trusted library allocation
page read and write
CCD7000
heap
page read and write
B7D8000
direct allocation
page read and write
B50E000
direct allocation
page read and write
10016000
trusted library allocation
page read and write
B742000
direct allocation
page read and write
E6D5000
trusted library allocation
page read and write
B819000
direct allocation
page read and write
B150000
trusted library allocation
page read and write
B716000
direct allocation
page read and write
B6C2000
direct allocation
page read and write
6211000
heap
page read and write
50DA000
trusted library allocation
page read and write
B510000
direct allocation
page read and write
B4E4000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
695D000
heap
page read and write
B4E0000
direct allocation
page read and write
B61B000
direct allocation
page read and write
D175000
trusted library allocation
page read and write
D179000
trusted library allocation
page read and write
B83C000
direct allocation
page read and write
B785000
direct allocation
page read and write
B76E000
direct allocation
page read and write
B882000
direct allocation
page read and write
B4E0000
direct allocation
page read and write
B646000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
CCEB000
heap
page read and write
B4A4000
direct allocation
page read and write
B53E000
direct allocation
page read and write
B712000
direct allocation
page read and write
E60000
unkown
page readonly
64D1000
heap
page read and write
EAD4000
trusted library allocation
page read and write
CCC6000
heap
page read and write
E9E4000
trusted library allocation
page read and write
E6D0000
trusted library allocation
page read and write
B75E000
direct allocation
page read and write
B68C000
direct allocation
page read and write
E945000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
E8CF000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
6421000
heap
page read and write
1FCF000
unkown
page write copy
B486000
direct allocation
page read and write
B77E000
direct allocation
page read and write
B490000
direct allocation
page read and write
696B000
heap
page read and write
B494000
direct allocation
page read and write
5CAE000
heap
page read and write
B66E000
direct allocation
page read and write
E8CD000
trusted library allocation
page read and write
CD13000
heap
page read and write
B149000
trusted library allocation
page read and write
10084000
trusted library allocation
page read and write
B4D4000
direct allocation
page read and write
10096000
trusted library allocation
page read and write
6B34000
heap
page read and write
EA4D000
trusted library allocation
page read and write
B4BC000
direct allocation
page read and write
B4E4000
direct allocation
page read and write
EB69000
trusted library allocation
page read and write
6273000
heap
page read and write
B676000
direct allocation
page read and write
E08B000
trusted library allocation
page read and write
10455000
heap
page read and write
E8CF000
trusted library allocation
page read and write
6603000
heap
page read and write
B6B8000
direct allocation
page read and write
B51A000
direct allocation
page read and write
B44E000
direct allocation
page read and write
1007E000
trusted library allocation
page read and write
B4D4000
direct allocation
page read and write
CCEC000
heap
page read and write
B4D4000
direct allocation
page read and write
B50E000
direct allocation
page read and write
CCEC000
heap
page read and write
B6AC000
direct allocation
page read and write
B5EE000
direct allocation
page read and write
B6AC000
direct allocation
page read and write
EABC000
trusted library allocation
page read and write
B680000
direct allocation
page read and write
2977000
heap
page read and write
5C36000
heap
page read and write
B4AB000
direct allocation
page read and write
B4B0000
direct allocation
page read and write
5D0E000
heap
page read and write
298C000
heap
page read and write
CCEA000
heap
page read and write
B47E000
direct allocation
page read and write
B801000
direct allocation
page read and write
6AEC000
heap
page read and write
6922000
heap
page read and write
4FAA000
trusted library allocation
page read and write
EB67000
trusted library allocation
page read and write
B48C000
direct allocation
page read and write
B592000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
E956000
trusted library allocation
page read and write
B151000
trusted library allocation
page read and write
B4B2000
direct allocation
page read and write
D1E6000
trusted library allocation
page read and write
B4C6000
direct allocation
page read and write
B594000
direct allocation
page read and write
FF55000
trusted library allocation
page read and write
FF0A000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
100D8000
trusted library allocation
page read and write
EA98000
trusted library allocation
page read and write
CC06000
heap
page read and write
6AF8000
heap
page read and write
B4C7000
direct allocation
page read and write
EAD4000
trusted library allocation
page read and write
65B2000
heap
page read and write
B61B000
direct allocation
page read and write
B885000
direct allocation
page read and write
CCEE000
heap
page read and write
B738000
direct allocation
page read and write
2C03E000
stack
page read and write
B622000
direct allocation
page read and write
EC1E000
trusted library allocation
page read and write
EC0B000
trusted library allocation
page read and write
6670000
heap
page read and write
B496000
direct allocation
page read and write
B5F6000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B4A7000
direct allocation
page read and write
1047D000
heap
page read and write
B6E2000
direct allocation
page read and write
6084000
heap
page read and write
4E7D000
trusted library allocation
page read and write
B4EA000
direct allocation
page read and write
5C98000
heap
page read and write
EA50000
trusted library allocation
page read and write
B5E9000
direct allocation
page read and write
EC09000
trusted library allocation
page read and write
B4AE000
direct allocation
page read and write
B7CA000
direct allocation
page read and write
B554000
direct allocation
page read and write
FEC0000
trusted library allocation
page read and write
B4A4000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
B6EB000
direct allocation
page read and write
CD70000
heap
page read and write
B4A0000
direct allocation
page read and write
CCE2000
heap
page read and write
629A000
heap
page read and write
EB65000
trusted library allocation
page read and write
B5EE000
direct allocation
page read and write
B792000
direct allocation
page read and write
B55A000
direct allocation
page read and write
B484000
direct allocation
page read and write
CD4E000
heap
page read and write
CDCD000
heap
page read and write
E8D7000
trusted library allocation
page read and write
CCEB000
heap
page read and write
6135000
heap
page read and write
EB10000
trusted library allocation
page read and write
B4A0000
direct allocation
page read and write
EB58000
trusted library allocation
page read and write
B15D000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
62A3000
heap
page read and write
B68E000
direct allocation
page read and write
B836000
direct allocation
page read and write
EAB8000
trusted library allocation
page read and write
B55A000
direct allocation
page read and write
B4F2000
direct allocation
page read and write
B60E000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
B54C000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
B14E000
trusted library allocation
page read and write
6A99000
heap
page read and write
B7DC000
direct allocation
page read and write
275F000
stack
page read and write
EB75000
trusted library allocation
page read and write
CDCD000
heap
page read and write
CCE2000
heap
page read and write
B7EE000
direct allocation
page read and write
2936000
heap
page read and write
B6B4000
direct allocation
page read and write
B0E9000
trusted library allocation
page read and write
B7C4000
direct allocation
page read and write
B6E2000
direct allocation
page read and write
FFB0000
trusted library allocation
page read and write
EB75000
trusted library allocation
page read and write
B68E000
direct allocation
page read and write
38B6000
heap
page read and write
B60C000
direct allocation
page read and write
10078000
trusted library allocation
page read and write
B512000
direct allocation
page read and write
B0EA000
trusted library allocation
page read and write
B5DA000
direct allocation
page read and write
EA79000
trusted library allocation
page read and write
B624000
direct allocation
page read and write
B824000
direct allocation
page read and write
B6F2000
direct allocation
page read and write
B666000
direct allocation
page read and write
B4E8000
direct allocation
page read and write
28CC000
heap
page read and write
6A36000
heap
page read and write
10E9C000
trusted library allocation
page read and write
644D000
heap
page read and write
B76A000
direct allocation
page read and write
B780000
direct allocation
page read and write
B722000
direct allocation
page read and write
CCDD000
heap
page read and write
5C7E000
heap
page read and write
B510000
direct allocation
page read and write
B50E000
direct allocation
page read and write
B6EE000
direct allocation
page read and write
DFF6000
heap
page read and write
EABC000
trusted library allocation
page read and write
B5B4000
direct allocation
page read and write
B691000
direct allocation
page read and write
50E1000
trusted library allocation
page read and write
699D000
heap
page read and write
B524000
direct allocation
page read and write
6533000
heap
page read and write
CCEB000
heap
page read and write
EAE8000
trusted library allocation
page read and write
B706000
direct allocation
page read and write
B74C000
direct allocation
page read and write
60AC000
heap
page read and write
B744000
direct allocation
page read and write
B4FA000
direct allocation
page read and write
B5A6000
direct allocation
page read and write
B5EB000
direct allocation
page read and write
E04F000
trusted library allocation
page read and write
B833000
direct allocation
page read and write
B0F2000
trusted library allocation
page read and write
D172000
trusted library allocation
page read and write
B4A4000
direct allocation
page read and write
B6F2000
direct allocation
page read and write
B47C000
direct allocation
page read and write
B626000
direct allocation
page read and write
CC73000
heap
page read and write
B478000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
B6CA000
direct allocation
page read and write
EB10000
trusted library allocation
page read and write
B748000
direct allocation
page read and write
B698000
direct allocation
page read and write
B510000
direct allocation
page read and write
B696000
direct allocation
page read and write
E0C8000
trusted library allocation
page read and write
E9E4000
trusted library allocation
page read and write
5CC8000
heap
page read and write
B49C000
direct allocation
page read and write
2650000
heap
page read and write
EB52000
trusted library allocation
page read and write
EB5F000
trusted library allocation
page read and write
629E000
heap
page read and write
B718000
direct allocation
page read and write
D1D7000
trusted library allocation
page read and write
E980000
trusted library allocation
page read and write
6A9D000
heap
page read and write
B5B8000
direct allocation
page read and write
E8D4000
trusted library allocation
page read and write
B5E4000
direct allocation
page read and write
10064000
trusted library allocation
page read and write
CD25000
heap
page read and write
CD4E000
heap
page read and write
B7AB000
direct allocation
page read and write
B5B2000
direct allocation
page read and write
B58C000
direct allocation
page read and write
EB7A000
trusted library allocation
page read and write
D177000
trusted library allocation
page read and write
B608000
direct allocation
page read and write
EAE8000
trusted library allocation
page read and write
D175000
trusted library allocation
page read and write
B4BA000
direct allocation
page read and write
EB08000
trusted library allocation
page read and write
B14B000
trusted library allocation
page read and write
B4C2000
direct allocation
page read and write
EC09000
trusted library allocation
page read and write
6259000
heap
page read and write
B5F9000
direct allocation
page read and write
EA62000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
B70D000
direct allocation
page read and write
B542000
direct allocation
page read and write
E9B8000
trusted library allocation
page read and write
FF68000
trusted library allocation
page read and write
B4BE000
direct allocation
page read and write
5C7A000
heap
page read and write
B61A000
direct allocation
page read and write
E9B0000
trusted library allocation
page read and write
10E93000
trusted library allocation
page read and write
B4AC000
direct allocation
page read and write
6A7F000
heap
page read and write
CCE4000
heap
page read and write
B52C000
direct allocation
page read and write
EBDB000
trusted library allocation
page read and write
E0B3000
trusted library allocation
page read and write
B46E000
direct allocation
page read and write
B806000
direct allocation
page read and write
B4A6000
direct allocation
page read and write
69BA000
heap
page read and write
50DB000
trusted library allocation
page read and write
B47E000
direct allocation
page read and write
E8C8000
trusted library allocation
page read and write
B56C000
direct allocation
page read and write
CC4A000
heap
page read and write
B14D000
trusted library allocation
page read and write
E8D7000
trusted library allocation
page read and write
B4D8000
direct allocation
page read and write
B5CC000
direct allocation
page read and write
1CA1000
heap
page read and write
B4A4000
direct allocation
page read and write
B524000
direct allocation
page read and write
B542000
direct allocation
page read and write
B70A000
direct allocation
page read and write
DE49000
trusted library allocation
page read and write
B5B0000
direct allocation
page read and write
10060000
trusted library allocation
page read and write
EB4A000
trusted library allocation
page read and write
CCEC000
heap
page read and write
CCEB000
heap
page read and write
B5CC000
direct allocation
page read and write
EACA000
trusted library allocation
page read and write
DE44000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
B752000
direct allocation
page read and write
E9F9000
trusted library allocation
page read and write
EFD1000
heap
page read and write
EBDB000
trusted library allocation
page read and write
CCEB000
heap
page read and write
100A8000
trusted library allocation
page read and write
2B983000
direct allocation
page read and write
B6AC000
direct allocation
page read and write
EB75000
trusted library allocation
page read and write
B4A9000
direct allocation
page read and write
B622000
direct allocation
page read and write
B554000
direct allocation
page read and write
B5C0000
direct allocation
page read and write
EA4D000
trusted library allocation
page read and write
B486000
direct allocation
page read and write
CCE1000
heap
page read and write
2B93E000
unkown
page readonly
B4DC000
direct allocation
page read and write
B5F7000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
B46E000
direct allocation
page read and write
100F8000
trusted library allocation
page read and write
B696000
direct allocation
page read and write
6219000
heap
page read and write
CCE2000
heap
page read and write
B6E4000
direct allocation
page read and write
EB5B000
trusted library allocation
page read and write
E8E4000
trusted library allocation
page read and write
E110000
trusted library allocation
page read and write
B56A000
direct allocation
page read and write
EC18000
trusted library allocation
page read and write
B46C000
direct allocation
page read and write
5CC0000
heap
page read and write
CCE4000
heap
page read and write
B6CA000
direct allocation
page read and write
B526000
direct allocation
page read and write
60CA000
heap
page read and write
B86A000
direct allocation
page read and write
B159000
trusted library allocation
page read and write
10B31000
trusted library allocation
page read and write
B606000
direct allocation
page read and write
100DA000
trusted library allocation
page read and write
B4B2000
direct allocation
page read and write
B854000
direct allocation
page read and write
EA38000
trusted library allocation
page read and write
EB00000
trusted library allocation
page read and write
B624000
direct allocation
page read and write
100D8000
trusted library allocation
page read and write
6938000
heap
page read and write
E9B0000
trusted library allocation
page read and write
B6D4000
direct allocation
page read and write
FF55000
trusted library allocation
page read and write
CCD0000
heap
page read and write
B649000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
B4C6000
direct allocation
page read and write
FF10000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
EA48000
trusted library allocation
page read and write
5C92000
heap
page read and write
6B0B000
heap
page read and write
B4B4000
direct allocation
page read and write
EAA4000
trusted library allocation
page read and write
E8D7000
trusted library allocation
page read and write
B154000
trusted library allocation
page read and write
6B15000
heap
page read and write
6B34000
heap
page read and write
B0F1000
trusted library allocation
page read and write
E8D4000
trusted library allocation
page read and write
B52C000
direct allocation
page read and write
B150000
trusted library allocation
page read and write
B4A4000
direct allocation
page read and write
6B71000
heap
page read and write
2B7A5000
direct allocation
page read and write
2BB00000
direct allocation
page read and write
5C98000
heap
page read and write
E9CC000
trusted library allocation
page read and write
B0F1000
trusted library allocation
page read and write
EB67000
trusted library allocation
page read and write
B698000
direct allocation
page read and write
B46C000
direct allocation
page read and write
B5EC000
direct allocation
page read and write
B4E8000
direct allocation
page read and write
B4AC000
direct allocation
page read and write
B6B8000
direct allocation
page read and write
B764000
direct allocation
page read and write
EADE000
trusted library allocation
page read and write
B752000
direct allocation
page read and write
EB02000
trusted library allocation
page read and write
B78E000
direct allocation
page read and write
6653000
heap
page read and write
B6B2000
direct allocation
page read and write
B63E000
direct allocation
page read and write
B690000
direct allocation
page read and write
EC1A000
trusted library allocation
page read and write
60C8000
heap
page read and write
FF10000
trusted library allocation
page read and write
CCD6000
heap
page read and write
D174000
trusted library allocation
page read and write
B614000
direct allocation
page read and write
B4B0000
direct allocation
page read and write
6541000
heap
page read and write
B4B4000
direct allocation
page read and write
EB5F000
trusted library allocation
page read and write
B49C000
direct allocation
page read and write
B478000
direct allocation
page read and write
B815000
direct allocation
page read and write
CF90000
trusted library allocation
page read and write
6B7B000
heap
page read and write
B605000
direct allocation
page read and write
B7C6000
direct allocation
page read and write
10096000
trusted library allocation
page read and write
EC1E000
trusted library allocation
page read and write
6290000
heap
page read and write
EB00000
trusted library allocation
page read and write
B4BA000
direct allocation
page read and write
E0C6000
trusted library allocation
page read and write
100DE000
trusted library allocation
page read and write
E999000
trusted library allocation
page read and write
B53E000
direct allocation
page read and write
B76C000
direct allocation
page read and write
B4AB000
direct allocation
page read and write
FF02000
trusted library allocation
page read and write
EBDB000
trusted library allocation
page read and write
B5B2000
direct allocation
page read and write
B51A000
direct allocation
page read and write
100A8000
trusted library allocation
page read and write
There are 4045 hidden memdumps, click here to show them.