IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dea8bdd6-ded2-44c3-b4aa-716f26b8b3f0.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dea8bdd6-ded2-44c3-b4aa-716f26b8b3f0.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23394519-5634-4e38-af03-29850acb4b80} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d3be6e510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3664 -parentBuildID 20230927232528 -prefsHandle 3648 -prefMapHandle 2912 -prefsLen 26151 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e42fb9f8-7b06-4a0a-8703-7e638740022d} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d3be7a710 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4920 -prefMapHandle 4916 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32652d90-4854-4b87-9fab-293d8e7df5cd} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d4e207510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://crl.microso
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=htA
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mathiasbynens.be/
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://www.google.com/complete/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
s-part-0035.t-0009.t-msedge.net
13.107.246.63
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
23D42B0F000
heap
page read and write
23D42B4F000
heap
page read and write
213C776A000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D53F76000
trusted library allocation
page read and write
23D4BDF1000
trusted library allocation
page read and write
23D4C1FC000
trusted library allocation
page read and write
23D57C91000
trusted library allocation
page read and write
23D57C66000
trusted library allocation
page read and write
BBD000
heap
page read and write
23D4BD14000
trusted library allocation
page read and write
23D4F940000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D42B1D000
heap
page read and write
213C75D0000
heap
page read and write
23D4D235000
trusted library allocation
page read and write
23D4D966000
trusted library allocation
page read and write
23D4CEC9000
trusted library allocation
page read and write
23D4CEBC000
trusted library allocation
page read and write
23D4D941000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
23D57A61000
trusted library allocation
page read and write
23D4FACD000
trusted library allocation
page read and write
23D5799D000
trusted library allocation
page read and write
23D55A4B000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4D7C1000
trusted library allocation
page read and write
23D50C58000
trusted library allocation
page read and write
23D4CBBC000
trusted library allocation
page read and write
213C8467000
heap
page read and write
23D55084000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D42B4F000
heap
page read and write
1EEA4100000
heap
page read and write
23D4B47D000
heap
page read and write
23D4BA89000
trusted library allocation
page read and write
23D4E340000
trusted library allocation
page read and write
A50000
heap
page read and write
23D4BDE1000
trusted library allocation
page read and write
23D57AEE000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
213C8369000
heap
page read and write
23D42B30000
heap
page read and write
23D42B4E000
heap
page read and write
23D5868F000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D42B29000
heap
page read and write
BD4000
heap
page read and write
23D57DB4000
trusted library allocation
page read and write
22D6821F000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4C194000
trusted library allocation
page read and write
23D57D76000
trusted library allocation
page read and write
23D4D853000
trusted library allocation
page read and write
213C770A000
trusted library allocation
page read and write
FE5BFFC000
stack
page read and write
23D4B4CF000
heap
page read and write
22D67C90000
unclassified section
page readonly
23D57D73000
trusted library allocation
page read and write
A60000
unkown
page readonly
23D42B24000
heap
page read and write
23D4F3F9000
trusted library allocation
page read and write
23D4D6F9000
trusted library allocation
page read and write
23D5516D000
trusted library allocation
page read and write
23D4F012000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D42B15000
heap
page read and write
23D57D7F000
trusted library allocation
page read and write
23D4CB10000
trusted library allocation
page read and write
23D4CE60000
trusted library allocation
page read and write
23D5858F000
trusted library allocation
page read and write
23D4B21E000
trusted library allocation
page read and write
23D4D276000
trusted library allocation
page read and write
23D53F68000
trusted library allocation
page read and write
23D4C188000
trusted library allocation
page read and write
23D57A19000
trusted library allocation
page read and write
213C77F3000
trusted library allocation
page read and write
23D4E491000
trusted library allocation
page read and write
23D50C7D000
trusted library allocation
page read and write
23D4E479000
trusted library allocation
page read and write
23D48A16000
trusted library allocation
page read and write
23D4D840000
trusted library allocation
page read and write
23D48CC1000
trusted library allocation
page read and write
23D579AD000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4DFF8000
trusted library allocation
page read and write
23D4D9A4000
trusted library allocation
page read and write
23D540F7000
trusted library allocation
page read and write
23D4D788000
trusted library allocation
page read and write
23D4D86C000
trusted library allocation
page read and write
23D4CB8C000
trusted library allocation
page read and write
23D4BB71000
trusted library allocation
page read and write
23D4E65D000
trusted library allocation
page read and write
213C842B000
heap
page read and write
23D57A9A000
trusted library allocation
page read and write
23D4E19B000
trusted library allocation
page read and write
23D4F8D8000
trusted library allocation
page read and write
23D57BC8000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4BBA8000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4CBAB000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4F4D6000
trusted library allocation
page read and write
23D48DBB000
trusted library allocation
page read and write
23D47B82000
trusted library allocation
page read and write
23D48CA1000
trusted library allocation
page read and write
23D4DCFD000
trusted library allocation
page read and write
23D57998000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D585AD000
trusted library allocation
page read and write
23D4CAC7000
trusted library allocation
page read and write
23D4C1EF000
trusted library allocation
page read and write
23D57EE3000
heap
page read and write
23D576FE000
trusted library allocation
page read and write
344000
heap
page read and write
23D50C39000
trusted library allocation
page read and write
226BC460000
heap
page read and write
23D53ED6000
trusted library allocation
page read and write
23D4CB8C000
trusted library allocation
page read and write
23D579DC000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4BD3F000
trusted library allocation
page read and write
23D586C1000
trusted library allocation
page read and write
23D57C78000
trusted library allocation
page read and write
23D47A71000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4C15A000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D5506D000
trusted library allocation
page read and write
23D4D2C1000
trusted library allocation
page read and write
213C8209000
trusted library allocation
page read and write
23D585F5000
trusted library allocation
page read and write
23D54937000
trusted library allocation
page read and write
23D4D2B4000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4E2D3000
trusted library allocation
page read and write
226BC85F000
trusted library allocation
page read and write
213C83E8000
heap
page read and write
23D4D999000
trusted library allocation
page read and write
23D48AD9000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4CEAF000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D55AC9000
trusted library allocation
page read and write
23D4CA96000
trusted library allocation
page read and write
23D53F56000
trusted library allocation
page read and write
23D4E4C2000
trusted library allocation
page read and write
D0CF7FE000
unkown
page readonly
23D585C7000
trusted library allocation
page read and write
213C8458000
heap
page read and write
23D42B1D000
heap
page read and write
213C8369000
heap
page read and write
23D4B4F3000
heap
page read and write
23D4DEB0000
trusted library allocation
page read and write
23D4C188000
trusted library allocation
page read and write
23D4D955000
trusted library allocation
page read and write
23D50C69000
trusted library allocation
page read and write
22D68160000
trusted library allocation
page read and write
23D4D23B000
trusted library allocation
page read and write
23D53E17000
trusted library allocation
page read and write
23D50CB3000
trusted library allocation
page read and write
23D5795E000
trusted library allocation
page read and write
23D4CAE1000
trusted library allocation
page read and write
23D573E8000
trusted library allocation
page read and write
23D4D84C000
trusted library allocation
page read and write
23D57E71000
heap
page read and write
23D4D8FA000
trusted library allocation
page read and write
23D53FCB000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4C17F000
trusted library allocation
page read and write
1EEA5BBB000
heap
page read and write
23D57DE3000
trusted library allocation
page read and write
213C8467000
heap
page read and write
23D4E62D000
trusted library allocation
page read and write
23D58595000
trusted library allocation
page read and write
23D47B93000
trusted library allocation
page read and write
23D4CB6B000
trusted library allocation
page read and write
23D4C109000
trusted library allocation
page read and write
23D5767D000
trusted library allocation
page read and write
213C750A000
heap
page read and write
213C83B9000
heap
page read and write
BC3000
heap
page read and write
23D57AFC000
trusted library allocation
page read and write
23D4B4F4000
heap
page read and write
213C8200000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D42B38000
heap
page read and write
23D42B2E000
heap
page read and write
23D42B4E000
heap
page read and write
23D42B24000
heap
page read and write
9CF000
stack
page read and write
23D42B10000
heap
page read and write
23D4F47F000
trusted library allocation
page read and write
23D42B65000
heap
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D4E3F6000
trusted library allocation
page read and write
A61000
unkown
page execute read
23D4C1A6000
trusted library allocation
page read and write
23D4D70C000
trusted library allocation
page read and write
23D50DE6000
trusted library allocation
page read and write
213C7773000
trusted library allocation
page read and write
23D57A61000
trusted library allocation
page read and write
23D4B4E4000
heap
page read and write
23D48D9E000
trusted library allocation
page read and write
23D53EB9000
trusted library allocation
page read and write
23D4FAFD000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
213C83A8000
heap
page read and write
23D4FA3C000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4E184000
trusted library allocation
page read and write
23D4B989000
trusted library allocation
page read and write
23D57A9C000
trusted library allocation
page read and write
23D4B98F000
trusted library allocation
page read and write
23D50D28000
trusted library allocation
page read and write
BDA000
heap
page read and write
BFD478E000
unkown
page readonly
23D4BAA0000
trusted library allocation
page read and write
23D4C17A000
trusted library allocation
page read and write
213C83EC000
heap
page read and write
23D4D9D4000
trusted library allocation
page read and write
23D42B14000
heap
page read and write
23D4CAC3000
trusted library allocation
page read and write
23D4D791000
trusted library allocation
page read and write
23D4E34D000
trusted library allocation
page read and write
23D47B13000
trusted library allocation
page read and write
23D4D220000
trusted library allocation
page read and write
23D48A7F000
trusted library allocation
page read and write
23D4CEBE000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D42B5A000
heap
page read and write
23D4CBE0000
trusted library allocation
page read and write
23D53FFD000
trusted library allocation
page read and write
23D48AE8000
trusted library allocation
page read and write
23D4E387000
trusted library allocation
page read and write
23D4E3F2000
trusted library allocation
page read and write
23D42B51000
heap
page read and write
B34000
unkown
page readonly
23D4B47D000
heap
page read and write
23D4BBA8000
trusted library allocation
page read and write
23D47B75000
trusted library allocation
page read and write
23D4BDFA000
trusted library allocation
page read and write
23D4FAA1000
trusted library allocation
page read and write
23D4D238000
trusted library allocation
page read and write
22D681EB000
trusted library allocation
page read and write
23D4DCFD000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D53E0F000
trusted library allocation
page read and write
213C83E8000
heap
page read and write
23D4CA96000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D586B0000
trusted library allocation
page read and write
23D4E39E000
trusted library allocation
page read and write
23D4CEF2000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D4B557000
trusted library allocation
page read and write
23D42B37000
heap
page read and write
23D42B0F000
heap
page read and write
23D4D767000
trusted library allocation
page read and write
213C8445000
heap
page read and write
23D4E1DB000
trusted library allocation
page read and write
23D4E48D000
trusted library allocation
page read and write
23D4CD70000
trusted library allocation
page read and write
21DF2DD1000
trusted library allocation
page execute read
23D57AF0000
trusted library allocation
page read and write
23D4F4DA000
trusted library allocation
page read and write
23D4CA96000
trusted library allocation
page read and write
23D4E3FC000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
213C7500000
heap
page read and write
23D4D7C5000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D42B15000
heap
page read and write
23D55A6E000
trusted library allocation
page read and write
1CAEF5D000
stack
page read and write
226BC882000
trusted library allocation
page read and write
344000
heap
page read and write
23D42B1A000
heap
page read and write
23D4C15A000
trusted library allocation
page read and write
23D5434D000
trusted library allocation
page read and write
39D000
stack
page read and write
23D58697000
trusted library allocation
page read and write
23D57DF7000
trusted library allocation
page read and write
1EEA4105000
heap
page read and write
23D4CA26000
trusted library allocation
page read and write
23D55107000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4B9A3000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
2A00FFE000
stack
page read and write
22D67F23000
heap
page read and write
23D4DDC5000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D57BDB000
trusted library allocation
page read and write
23D586A9000
trusted library allocation
page read and write
23D50C40000
trusted library allocation
page read and write
23D4F8D8000
trusted library allocation
page read and write
23D4F47C000
trusted library allocation
page read and write
23D4C17A000
trusted library allocation
page read and write
213C8429000
heap
page read and write
226BC8DB000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D42B25000
heap
page read and write
344000
heap
page read and write
23D42B31000
heap
page read and write
23D4D7FD000
trusted library allocation
page read and write
23D53E24000
trusted library allocation
page read and write
23D57A56000
trusted library allocation
page read and write
23D55A72000
trusted library allocation
page read and write
23D57AFA000
trusted library allocation
page read and write
23D4BA54000
trusted library allocation
page read and write
23D4CD74000
trusted library allocation
page read and write
23D54A84000
trusted library allocation
page read and write
1EEA430A000
trusted library allocation
page read and write
23D48A69000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D4BBF5000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D57C4F000
trusted library allocation
page read and write
23D4FA36000
trusted library allocation
page read and write
23D50CA7000
trusted library allocation
page read and write
23D55143000
trusted library allocation
page read and write
23D4D256000
trusted library allocation
page read and write
226BCA07000
trusted library allocation
page read and write
23D56433000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D42B24000
heap
page read and write
23D579E0000
trusted library allocation
page read and write
23D4E389000
trusted library allocation
page read and write
23D4F8B5000
trusted library allocation
page read and write
23D4E4B8000
trusted library allocation
page read and write
2AF7CE40000
heap
page read and write
23D42B30000
heap
page read and write
23D4CD72000
trusted library allocation
page read and write
23D57BFC000
trusted library allocation
page read and write
23D4BA83000
trusted library allocation
page read and write
23D4CEC9000
trusted library allocation
page read and write
23D4BDF6000
trusted library allocation
page read and write
23D4DD88000
trusted library allocation
page read and write
23D4B4D4000
heap
page read and write
23D4CBE6000
trusted library allocation
page read and write
23D48D4A000
trusted library allocation
page read and write
23D4F881000
trusted library allocation
page read and write
23D4BE29000
trusted library allocation
page read and write
23D4D23A000
trusted library allocation
page read and write
23D57DE7000
trusted library allocation
page read and write
23D4FAD2000
trusted library allocation
page read and write
23D4BBE0000
trusted library allocation
page read and write
23D4E240000
trusted library allocation
page read and write
23D4B233000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4D785000
trusted library allocation
page read and write
23D47D23000
trusted library allocation
page read and write
23D4D9FB000
trusted library allocation
page read and write
23D4D8B3000
trusted library allocation
page read and write
23D57CF6000
trusted library allocation
page read and write
23D4D8F7000
trusted library allocation
page read and write
23D48AD4000
trusted library allocation
page read and write
23D5436D000
trusted library allocation
page read and write
23D50C84000
trusted library allocation
page read and write
23D562C8000
trusted library allocation
page read and write
23D57DFB000
trusted library allocation
page read and write
23D586F0000
trusted library allocation
page read and write
23D5642C000
trusted library allocation
page read and write
23D57BFC000
trusted library allocation
page read and write
23D4C156000
trusted library allocation
page read and write
23D5867D000
trusted library allocation
page read and write
23D48A27000
trusted library allocation
page read and write
23D4C1F3000
trusted library allocation
page read and write
23D57CD5000
trusted library allocation
page read and write
23D585EC000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D576BE000
trusted library allocation
page read and write
226BC805000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4F0F5000
trusted library allocation
page read and write
23D53E6A000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4D84E000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4B279000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
213C775F000
trusted library allocation
page read and write
23D4F94B000
trusted library allocation
page read and write
23D57AF2000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D55201000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4CFFA000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D4F029000
trusted library allocation
page read and write
213C75B0000
unclassified section
page read and write
23D42B3B000
heap
page read and write
23D579FE000
trusted library allocation
page read and write
23D42B5F000
heap
page read and write
23D4E699000
trusted library allocation
page read and write
23D4F80D000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
22D68123000
trusted library allocation
page read and write
23D4D226000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4B276000
trusted library allocation
page read and write
23D4BB92000
trusted library allocation
page read and write
23D4F9D2000
trusted library allocation
page read and write
23D4E4D9000
trusted library allocation
page read and write
23D4CBA3000
trusted library allocation
page read and write
23D54A9E000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D47A23000
trusted library allocation
page read and write
23D57D9F000
trusted library allocation
page read and write
23D4D796000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D42B54000
heap
page read and write
23D42B1D000
heap
page read and write
23D4B4F6000
heap
page read and write
23D540D6000
trusted library allocation
page read and write
213C838A000
heap
page read and write
23D4C161000
trusted library allocation
page read and write
23D57D85000
trusted library allocation
page read and write
213C8360000
heap
page read and write
23D4CEF5000
trusted library allocation
page read and write
23D48CB3000
trusted library allocation
page read and write
23D42B36000
heap
page read and write
23D4D216000
trusted library allocation
page read and write
23D4D831000
trusted library allocation
page read and write
23D42B2B000
heap
page read and write
23D48DF6000
trusted library allocation
page read and write
23D57DA5000
trusted library allocation
page read and write
23D42B13000
heap
page read and write
23D42B4F000
heap
page read and write
23D42B5D000
heap
page read and write
23D4CAE3000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D4D786000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D42B2E000
heap
page read and write
BE5000
heap
page read and write
22D67DE0000
unclassified section
page read and write
23D4BBA8000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D42B2E000
heap
page read and write
23D42B40000
heap
page read and write
23D5850D000
trusted library allocation
page read and write
9EF000
stack
page read and write
23D4F9FD000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4F9D2000
trusted library allocation
page read and write
23D4C19E000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4B217000
trusted library allocation
page read and write
23D579E0000
trusted library allocation
page read and write
23D4BBCE000
trusted library allocation
page read and write
226BC867000
trusted library allocation
page read and write
23D4D863000
trusted library allocation
page read and write
23D4CB5B000
trusted library allocation
page read and write
23D543A7000
trusted library allocation
page read and write
23D4D247000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D55A6B000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D4E1D6000
trusted library allocation
page read and write
23D4FA38000
trusted library allocation
page read and write
23D57A96000
trusted library allocation
page read and write
23D573B3000
trusted library allocation
page read and write
23D4CE5C000
trusted library allocation
page read and write
23D4BB87000
trusted library allocation
page read and write
23D4D84C000
trusted library allocation
page read and write
23D540F7000
trusted library allocation
page read and write
23D4F03E000
trusted library allocation
page read and write
23D540C8000
trusted library allocation
page read and write
23D4E370000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4D757000
trusted library allocation
page read and write
23D4D7BE000
trusted library allocation
page read and write
23D4DDF4000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D585AC000
trusted library allocation
page read and write
23D579E4000
trusted library allocation
page read and write
23D4B2A1000
trusted library allocation
page read and write
23D4C1FC000
trusted library allocation
page read and write
213C8360000
heap
page read and write
23D540BE000
trusted library allocation
page read and write
23D4F9C3000
trusted library allocation
page read and write
23D4D853000
trusted library allocation
page read and write
23D474DF000
trusted library allocation
page read and write
23D4BE53000
trusted library allocation
page read and write
23D50C40000
trusted library allocation
page read and write
213C8360000
heap
page read and write
213C83EC000
heap
page read and write
213C83E0000
heap
page read and write
23D57AEE000
trusted library allocation
page read and write
213C77C4000
trusted library allocation
page read and write
23D4CBAB000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4F820000
trusted library allocation
page read and write
1EEA415A000
heap
page read and write
23D4CA74000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D57A61000
trusted library allocation
page read and write
23D4BC93000
trusted library allocation
page read and write
23D57D61000
trusted library allocation
page read and write
23D4D8D3000
trusted library allocation
page read and write
23D4B4D6000
heap
page read and write
23D55AAD000
trusted library allocation
page read and write
23D540F5000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
22D67D40000
heap
page read and write
23D4CEC0000
trusted library allocation
page read and write
1EEA4200000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D573F0000
trusted library allocation
page read and write
23D4B228000
trusted library allocation
page read and write
1EEA4150000
heap
page read and write
23D48DBE000
trusted library allocation
page read and write
23D4CA3C000
trusted library allocation
page read and write
23D4BA63000
trusted library allocation
page read and write
23D55A72000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
213C83F1000
heap
page read and write
23D42B15000
heap
page read and write
213C7CBF000
unkown
page execute read
23D4E353000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4D866000
trusted library allocation
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D57AF4000
trusted library allocation
page read and write
23D4D83B000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4DD82000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4DE94000
trusted library allocation
page read and write
22D68373000
heap
page read and write
23D53F60000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4F4D1000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D57DC1000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
23D4F4E4000
trusted library allocation
page read and write
23D4DD73000
trusted library allocation
page read and write
23D549AC000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4B22A000
trusted library allocation
page read and write
23D57A92000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D57AFA000
trusted library allocation
page read and write
23D585FB000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4DD8D000
trusted library allocation
page read and write
213C838A000
heap
page read and write
1EEA4300000
trusted library allocation
page read and write
23D5798C000
trusted library allocation
page read and write
23D4F008000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D57BFC000
trusted library allocation
page read and write
23D57AFA000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
213C8360000
heap
page read and write
23D42B8F000
heap
page read and write
23D50C7D000
trusted library allocation
page read and write
23D4DFEC000
trusted library allocation
page read and write
23D55AA3000
trusted library allocation
page read and write
23D48AD9000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D4E3D0000
trusted library allocation
page read and write
23D5864C000
trusted library allocation
page read and write
23D4E0AB000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4E18D000
trusted library allocation
page read and write
23D4B9D4000
trusted library allocation
page read and write
23D4BBC7000
trusted library allocation
page read and write
23D586B9000
trusted library allocation
page read and write
23D55AA3000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4CEF2000
trusted library allocation
page read and write
23D55AC9000
trusted library allocation
page read and write
BC3000
heap
page read and write
D0CB51D000
stack
page read and write
23D4D8DA000
trusted library allocation
page read and write
23D57AF8000
trusted library allocation
page read and write
23D4D29C000
trusted library allocation
page read and write
23D4D840000
trusted library allocation
page read and write
23D58537000
trusted library allocation
page read and write
23D57C20000
trusted library allocation
page read and write
23D48DBE000
trusted library allocation
page read and write
23D4D8E6000
trusted library allocation
page read and write
23D4BBA1000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
1CAEF1E000
unkown
page readonly
23D4DED8000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D42B4F000
heap
page read and write
23D4BB6C000
trusted library allocation
page read and write
23D55A7A000
trusted library allocation
page read and write
213C7CBB000
unkown
page execute read
23D4BAA0000
trusted library allocation
page read and write
226BC350000
remote allocation
page read and write
23D4C130000
trusted library allocation
page read and write
213C74E0000
heap
page read and write
23D4BA83000
trusted library allocation
page read and write
23D57D72000
trusted library allocation
page read and write
23D4D7C5000
trusted library allocation
page read and write
23D5794E000
trusted library allocation
page read and write
23D4C16D000
trusted library allocation
page read and write
23D42B37000
heap
page read and write
23D4C138000
trusted library allocation
page read and write
23D4D85A000
trusted library allocation
page read and write
23D42B54000
heap
page read and write
23D4F9D5000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
23D573F5000
trusted library allocation
page read and write
23D4B4E8000
heap
page read and write
BB0000
heap
page read and write
22D68232000
trusted library allocation
page read and write
23D55A9C000
trusted library allocation
page read and write
23D4D83D000
trusted library allocation
page read and write
23D579E2000
trusted library allocation
page read and write
22D67D20000
unclassified section
page readonly
23D56287000
trusted library allocation
page read and write
23D4E38B000
trusted library allocation
page read and write
23D57FC2000
heap
page read and write
23D42B25000
heap
page read and write
23D4CA74000
trusted library allocation
page read and write
BE2000
heap
page read and write
23D4FA40000
trusted library allocation
page read and write
213C83F1000
heap
page read and write
23D4C122000
trusted library allocation
page read and write
23D4D7C7000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D4BA61000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4FA3C000
trusted library allocation
page read and write
23D57BB9000
trusted library allocation
page read and write
23D4BCA7000
trusted library allocation
page read and write
22D67D00000
remote allocation
page read and write
23D57CFD000
trusted library allocation
page read and write
23D57D9F000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4B989000
trusted library allocation
page read and write
23D57CBE000
trusted library allocation
page read and write
213C836C000
heap
page read and write
23D57BEB000
trusted library allocation
page read and write
23D47B26000
trusted library allocation
page read and write
23D4D7AF000
trusted library allocation
page read and write
23D4B25F000
trusted library allocation
page read and write
23D4D876000
trusted library allocation
page read and write
23D4E610000
trusted library allocation
page read and write
23D57974000
trusted library allocation
page read and write
23D4E18D000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D47BE3000
trusted library allocation
page read and write
23D4F075000
trusted library allocation
page read and write
23D50C4A000
trusted library allocation
page read and write
2A02FFE000
stack
page read and write
23D4CAD2000
trusted library allocation
page read and write
23D4F7F3000
trusted library allocation
page read and write
22D681BA000
trusted library allocation
page read and write
23D57A9E000
trusted library allocation
page read and write
23D4F837000
trusted library allocation
page read and write
23D5859B000
trusted library allocation
page read and write
23D4C185000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D42B4A000
heap
page read and write
23D42B48000
heap
page read and write
23D57FC2000
heap
page read and write
23D42B0F000
heap
page read and write
226BC803000
trusted library allocation
page read and write
23D4BBD9000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4CE66000
trusted library allocation
page read and write
23D542C8000
trusted library allocation
page read and write
23D4BA60000
trusted library allocation
page read and write
23D4F860000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D42B57000
heap
page read and write
23D4E10B000
trusted library allocation
page read and write
23D4FA1C000
trusted library allocation
page read and write
23D4E10B000
trusted library allocation
page read and write
23D4D86B000
trusted library allocation
page read and write
23D573B5000
trusted library allocation
page read and write
23D4C1EF000
trusted library allocation
page read and write
213C7D00000
heap
page read and write
23D4CA64000
trusted library allocation
page read and write
23D5795E000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4FA93000
trusted library allocation
page read and write
23D562A3000
trusted library allocation
page read and write
23D4D8FA000
trusted library allocation
page read and write
23D4F835000
trusted library allocation
page read and write
23D4B93F000
trusted library allocation
page read and write
226BC46A000
heap
page read and write
23D42B3D000
heap
page read and write
23D5427F000
trusted library allocation
page read and write
213C837D000
heap
page read and write
23D4C17A000
trusted library allocation
page read and write
23D4C11A000
trusted library allocation
page read and write
23D4B508000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D53F68000
trusted library allocation
page read and write
23D4E2C5000
trusted library allocation
page read and write
23D57CD2000
trusted library allocation
page read and write
23D4E344000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4CA32000
trusted library allocation
page read and write
23D4D233000
trusted library allocation
page read and write
23D53F5F000
trusted library allocation
page read and write
23D4FAB1000
trusted library allocation
page read and write
22D67E28000
heap
page read and write
23D42B4A000
heap
page read and write
23D4CDAD000
trusted library allocation
page read and write
23D4F6E3000
trusted library allocation
page read and write
23D57DF2000
trusted library allocation
page read and write
23D4D7C7000
trusted library allocation
page read and write
23D4B98F000
trusted library allocation
page read and write
23D55AC9000
trusted library allocation
page read and write
23D48D90000
trusted library allocation
page read and write
23D4D9E2000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D586D6000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4BBE0000
trusted library allocation
page read and write
23D57DDA000
trusted library allocation
page read and write
23D4B4E8000
heap
page read and write
23D585AA000
trusted library allocation
page read and write
23D4C19E000
trusted library allocation
page read and write
23D4E2DD000
trusted library allocation
page read and write
23D48AC0000
trusted library allocation
page read and write
23D4BB76000
trusted library allocation
page read and write
23D4B4E4000
heap
page read and write
23D4D89C000
trusted library allocation
page read and write
23D4BBD9000
trusted library allocation
page read and write
213C8469000
heap
page read and write
213C83E0000
heap
page read and write
23D55AC2000
trusted library allocation
page read and write
23D4B4D5000
heap
page read and write
23D4CD9C000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D551A7000
trusted library allocation
page read and write
23D4BB54000
trusted library allocation
page read and write
23D48A5E000
trusted library allocation
page read and write
23D4F8C0000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D55AD1000
trusted library allocation
page read and write
23D4B5CB000
trusted library allocation
page read and write
213C75C0000
trusted library allocation
page read and write
23D4CB94000
trusted library allocation
page read and write
23D5862E000
trusted library allocation
page read and write
23D4B4D6000
heap
page read and write
23D57D9F000
trusted library allocation
page read and write
23D57DF6000
trusted library allocation
page read and write
23D4D876000
trusted library allocation
page read and write
23D5869F000
trusted library allocation
page read and write
23D4F04E000
trusted library allocation
page read and write
23D54950000
trusted library allocation
page read and write
23D50D58000
trusted library allocation
page read and write
23D54093000
trusted library allocation
page read and write
23D4BBCE000
trusted library allocation
page read and write
23D57967000
trusted library allocation
page read and write
23D4CA84000
trusted library allocation
page read and write
23D4D8F7000
trusted library allocation
page read and write
23D4F9A1000
trusted library allocation
page read and write
23D42B28000
heap
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D4CB6B000
trusted library allocation
page read and write
23D4CA58000
trusted library allocation
page read and write
23D4F9BC000
trusted library allocation
page read and write
213C83EC000
heap
page read and write
23D42B4F000
heap
page read and write
23D4CD6E000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4D7BE000
trusted library allocation
page read and write
23D4B2B3000
trusted library allocation
page read and write
213C77BA000
trusted library allocation
page read and write
23D3DA78000
heap
page read and write
23D4E14B000
trusted library allocation
page read and write
23D579FE000
trusted library allocation
page read and write
23D48AB8000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D573E8000
trusted library allocation
page read and write
23D57DDA000
trusted library allocation
page read and write
213C83E9000
heap
page read and write
23D42B4F000
heap
page read and write
226BCB0C000
trusted library allocation
page read and write
23D4F451000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D4D23B000
trusted library allocation
page read and write
23D474EF000
trusted library allocation
page read and write
23D4B2BC000
trusted library allocation
page read and write
23D4E196000
trusted library allocation
page read and write
23D57AFA000
trusted library allocation
page read and write
23D42B5A000
heap
page read and write
23D4FA44000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
213C83FC000
heap
page read and write
1CB1ABE000
stack
page read and write
23D4D107000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D48A7D000
trusted library allocation
page read and write
23D4E3D0000
trusted library allocation
page read and write
23D4BDE1000
trusted library allocation
page read and write
23D4BD5D000
trusted library allocation
page read and write
23D4D796000
trusted library allocation
page read and write
23D55AC2000
trusted library allocation
page read and write
23D42B26000
heap
page read and write
23D4BBBB000
trusted library allocation
page read and write
23D576BD000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D4D788000
trusted library allocation
page read and write
23D50CAE000
trusted library allocation
page read and write
23D4C1B6000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D576E0000
trusted library allocation
page read and write
2A7FDFB000
stack
page read and write
23D4D7A5000
trusted library allocation
page read and write
23D4C1FC000
trusted library allocation
page read and write
B22000
unkown
page readonly
23D57DE3000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
213C8369000
heap
page read and write
23D4F416000
trusted library allocation
page read and write
23D53F68000
trusted library allocation
page read and write
23D4D22C000
trusted library allocation
page read and write
23D57C0E000
trusted library allocation
page read and write
23D4C16D000
trusted library allocation
page read and write
213C7781000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4CF34000
trusted library allocation
page read and write
23D4BB90000
trusted library allocation
page read and write
23D4F44A000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D579E6000
trusted library allocation
page read and write
23D4F4D8000
trusted library allocation
page read and write
23D4B4CF000
heap
page read and write
23D4BA54000
trusted library allocation
page read and write
23D57B9E000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D5868F000
trusted library allocation
page read and write
23D4F02D000
trusted library allocation
page read and write
23D4B4E5000
heap
page read and write
213C8429000
heap
page read and write
23D4BBFB000
trusted library allocation
page read and write
23D4B9D9000
trusted library allocation
page read and write
23D540C1000
trusted library allocation
page read and write
213C8360000
heap
page read and write
23D57E01000
heap
page read and write
23D4CB7E000
trusted library allocation
page read and write
23D50CD7000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4D84E000
trusted library allocation
page read and write
23D4E100000
trusted library allocation
page read and write
23D4E1F7000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D57D98000
trusted library allocation
page read and write
23D4D7C1000
trusted library allocation
page read and write
23D563A7000
trusted library allocation
page read and write
23D586C9000
trusted library allocation
page read and write
226BC870000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4D833000
trusted library allocation
page read and write
23D57DDF000
trusted library allocation
page read and write
23D4B989000
trusted library allocation
page read and write
23D576FE000
trusted library allocation
page read and write
23D4E389000
trusted library allocation
page read and write
23D4BA4F000
trusted library allocation
page read and write
23D4BA64000
trusted library allocation
page read and write
3DE000
stack
page read and write
23D4D2B6000
trusted library allocation
page read and write
23D4D7BE000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4CBE6000
trusted library allocation
page read and write
23D4D26D000
trusted library allocation
page read and write
23D50C6E000
trusted library allocation
page read and write
23D4F686000
trusted library allocation
page read and write
23D550F1000
trusted library allocation
page read and write
23D5864B000
trusted library allocation
page read and write
23D57D0E000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D48DDD000
trusted library allocation
page read and write
23D550CE000
trusted library allocation
page read and write
23D4B2FD000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D48E32000
trusted library allocation
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4E11C000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D4D842000
trusted library allocation
page read and write
23D4E485000
trusted library allocation
page read and write
23D50CA4000
trusted library allocation
page read and write
23D42B51000
heap
page read and write
213C83AA000
heap
page read and write
23D4BD95000
trusted library allocation
page read and write
23D57626000
trusted library allocation
page read and write
226BC830000
trusted library allocation
page read and write
3E0000
heap
page read and write
23D50C69000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
213C7712000
trusted library allocation
page read and write
BB3000
heap
page read and write
23D4CA60000
trusted library allocation
page read and write
23D4E3B2000
trusted library allocation
page read and write
23D4E4CD000
trusted library allocation
page read and write
23D4CA16000
trusted library allocation
page read and write
23D4D9C1000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D4F4D1000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D54086000
trusted library allocation
page read and write
23D50C6E000
trusted library allocation
page read and write
23D4B997000
trusted library allocation
page read and write
23D4CACF000
trusted library allocation
page read and write
23D586B0000
trusted library allocation
page read and write
23D48A1F000
trusted library allocation
page read and write
23D4CA84000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B3D000
heap
page read and write
23D57C64000
trusted library allocation
page read and write
23D4BD56000
trusted library allocation
page read and write
23D53EB9000
trusted library allocation
page read and write
23D50C4C000
trusted library allocation
page read and write
23D4D6F6000
trusted library allocation
page read and write
23D4BDC8000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
344000
heap
page read and write
23D50C6E000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D48CC4000
trusted library allocation
page read and write
213C83B2000
heap
page read and write
23D4E485000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D579DE000
trusted library allocation
page read and write
226BC8F2000
trusted library allocation
page read and write
23D4E37E000
trusted library allocation
page read and write
23D4B2D2000
trusted library allocation
page read and write
23D4B2A9000
trusted library allocation
page read and write
23D4F8DA000
trusted library allocation
page read and write
23D42B1A000
heap
page read and write
23D53FBF000
trusted library allocation
page read and write
23D57BE0000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
22D68172000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D42B2A000
heap
page read and write
23D4E3C7000
trusted library allocation
page read and write
23D4E3F2000
trusted library allocation
page read and write
22D6810D000
trusted library allocation
page read and write
23D4D711000
trusted library allocation
page read and write
23D57A98000
trusted library allocation
page read and write
23D4B9D0000
trusted library allocation
page read and write
23D4B261000
trusted library allocation
page read and write
23D4E3B7000
trusted library allocation
page read and write
23D57F53000
heap
page read and write
23D4BD5A000
trusted library allocation
page read and write
23D42B6C000
heap
page read and write
23D42B27000
heap
page read and write
23D4B261000
trusted library allocation
page read and write
23D4D833000
trusted library allocation
page read and write
23D4BBCA000
trusted library allocation
page read and write
23D4FAA4000
trusted library allocation
page read and write
23D4F9BC000
trusted library allocation
page read and write
23D4F0F2000
trusted library allocation
page read and write
23D4D27A000
trusted library allocation
page read and write
23D57A92000
trusted library allocation
page read and write
213C843B000
heap
page read and write
23D55A6B000
trusted library allocation
page read and write
213C83E3000
heap
page read and write
23D42B49000
heap
page read and write
213C836C000
heap
page read and write
23D42B2D000
heap
page read and write
23D57BA4000
trusted library allocation
page read and write
23D50C5B000
trusted library allocation
page read and write
213C7764000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D540C8000
trusted library allocation
page read and write
23D4D2FE000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D42B5D000
heap
page read and write
23D474EF000
trusted library allocation
page read and write
23D4B4F6000
heap
page read and write
23D4F835000
trusted library allocation
page read and write
23D57AF2000
trusted library allocation
page read and write
23D586C9000
trusted library allocation
page read and write
213C835C000
heap
page read and write
2AF7D207000
trusted library allocation
page read and write
23D4CA9D000
trusted library allocation
page read and write
23D4BA63000
trusted library allocation
page read and write
23D4C191000
trusted library allocation
page read and write
23D4BBE3000
trusted library allocation
page read and write
23D4E35B000
trusted library allocation
page read and write
23D4CAE3000
trusted library allocation
page read and write
23D4CA41000
trusted library allocation
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D4CEA4000
trusted library allocation
page read and write
23D4DF13000
trusted library allocation
page read and write
2AF7CF30000
heap
page read and write
23D585BA000
trusted library allocation
page read and write
23D4E353000
trusted library allocation
page read and write
23D579FE000
trusted library allocation
page read and write
23D4F7FC000
trusted library allocation
page read and write
23D4E392000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D42B1D000
heap
page read and write
23D42B53000
heap
page read and write
23D42B49000
heap
page read and write
23D42B5D000
heap
page read and write
23D579E2000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D57A65000
trusted library allocation
page read and write
23D4CA91000
trusted library allocation
page read and write
23D4FA2E000
trusted library allocation
page read and write
23D42B3E000
heap
page read and write
23D53EA9000
trusted library allocation
page read and write
23D4F8B5000
trusted library allocation
page read and write
23D4F9A1000
trusted library allocation
page read and write
23D585EC000
trusted library allocation
page read and write
23D4E39E000
trusted library allocation
page read and write
23D57FC2000
heap
page read and write
1EEA5BB8000
heap
page read and write
23D50CA7000
trusted library allocation
page read and write
23D57AD5000
trusted library allocation
page read and write
23D55AC2000
trusted library allocation
page read and write
213C842D000
heap
page read and write
23D42B3D000
heap
page read and write
23D42B27000
heap
page read and write
23D4BA61000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
BC3000
heap
page read and write
23D4CEF2000
trusted library allocation
page read and write
23D4B98F000
trusted library allocation
page read and write
23D4E49B000
trusted library allocation
page read and write
23D57D87000
trusted library allocation
page read and write
23D4B4F2000
heap
page read and write
23D4CE38000
trusted library allocation
page read and write
23D540DD000
trusted library allocation
page read and write
23D57BBC000
trusted library allocation
page read and write
23D4E146000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D4D8DD000
trusted library allocation
page read and write
23D4E3A4000
trusted library allocation
page read and write
23D540DD000
trusted library allocation
page read and write
23D55167000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D48DE5000
trusted library allocation
page read and write
23D576E0000
trusted library allocation
page read and write
22D6817A000
trusted library allocation
page read and write
23D57A92000
trusted library allocation
page read and write
23D57A9A000
trusted library allocation
page read and write
23D4F949000
trusted library allocation
page read and write
344000
heap
page read and write
23D4D7B7000
trusted library allocation
page read and write
2AF7CFD0000
heap
page read and write
BB7000
heap
page read and write
23D4D213000
trusted library allocation
page read and write
23D57A9C000
trusted library allocation
page read and write
23D4C158000
trusted library allocation
page read and write
23D4BE41000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4D9F2000
trusted library allocation
page read and write
350000
heap
page read and write
23D4F4E4000
trusted library allocation
page read and write
23D4E6D6000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4B4CF000
heap
page read and write
23D53F7F000
trusted library allocation
page read and write
3170000
heap
page read and write
213C7786000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D4CFE0000
trusted library allocation
page read and write
23D4E3A8000
trusted library allocation
page read and write
23D4C13D000
trusted library allocation
page read and write
23D55A78000
trusted library allocation
page read and write
23D5430C000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
22D68378000
heap
page read and write
23D4F9A1000
trusted library allocation
page read and write
23D55A33000
trusted library allocation
page read and write
23D4F8B5000
trusted library allocation
page read and write
23D4F40F000
trusted library allocation
page read and write
23D53E23000
trusted library allocation
page read and write
23D586EC000
trusted library allocation
page read and write
23D4D796000
trusted library allocation
page read and write
23D4F4D6000
trusted library allocation
page read and write
23D4F3CD000
trusted library allocation
page read and write
23D4BBE0000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
213C7C60000
trusted library section
page readonly
23D4D786000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4D9B6000
trusted library allocation
page read and write
23D50CB3000
trusted library allocation
page read and write
23D4F9DF000
trusted library allocation
page read and write
23D4BB92000
trusted library allocation
page read and write
23D4CADF000
trusted library allocation
page read and write
BFD464C000
stack
page read and write
23D57DFB000
trusted library allocation
page read and write
23D48D9A000
trusted library allocation
page read and write
23D55AB7000
trusted library allocation
page read and write
23D47C00000
trusted library allocation
page read and write
23D4DFCB000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D4D791000
trusted library allocation
page read and write
22D681C8000
trusted library allocation
page read and write
23D57BAB000
trusted library allocation
page read and write
23D47BF0000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
BFD51D8000
stack
page read and write
23D42B3B000
heap
page read and write
23D55A9C000
trusted library allocation
page read and write
213C834D000
heap
page read and write
22D6815B000
trusted library allocation
page read and write
35B1000
heap
page read and write
23D55A84000
trusted library allocation
page read and write
23D48A6A000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D42B27000
heap
page read and write
23D42B40000
heap
page read and write
23D55233000
trusted library allocation
page read and write
23D57DC1000
trusted library allocation
page read and write
23D53F7F000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4CB4E000
trusted library allocation
page read and write
1EEA4182000
heap
page read and write
23D4CADF000
trusted library allocation
page read and write
23D4E6A4000
trusted library allocation
page read and write
23D3DA6C000
heap
page read and write
23D42B4F000
heap
page read and write
23D48AC4000
trusted library allocation
page read and write
1EEA415F000
heap
page read and write
23D53E40000
trusted library allocation
page read and write
23D4D959000
trusted library allocation
page read and write
23D57A94000
trusted library allocation
page read and write
23D585FB000
trusted library allocation
page read and write
23D586B0000
trusted library allocation
page read and write
23D4CB9E000
trusted library allocation
page read and write
23D5859F000
trusted library allocation
page read and write
23D5733A000
trusted library allocation
page read and write
23D54343000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D4F9D5000
trusted library allocation
page read and write
23D4B5D9000
trusted library allocation
page read and write
23D4F6DE000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4E2C9000
trusted library allocation
page read and write
23D50C69000
trusted library allocation
page read and write
23D55AB7000
trusted library allocation
page read and write
23D4CFF7000
trusted library allocation
page read and write
23D4F945000
trusted library allocation
page read and write
23D57E8C000
heap
page read and write
23D4FA99000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4E1BA000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D5798C000
trusted library allocation
page read and write
23D57967000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D540CF000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
22D6820F000
trusted library allocation
page read and write
23D4D288000
trusted library allocation
page read and write
23D4CB59000
trusted library allocation
page read and write
23D4CEB7000
trusted library allocation
page read and write
23D5851A000
trusted library allocation
page read and write
213C7703000
trusted library allocation
page read and write
23D4CDC5000
trusted library allocation
page read and write
23D57AF0000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4B4D3000
heap
page read and write
23D4FAB7000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D42B24000
heap
page read and write
23D57CF6000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
213C835C000
heap
page read and write
23D4CAD0000
trusted library allocation
page read and write
23D4B4D6000
heap
page read and write
23D4F496000
trusted library allocation
page read and write
23D4F8DA000
trusted library allocation
page read and write
23D4D6E2000
trusted library allocation
page read and write
213C7600000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4CEC4000
trusted library allocation
page read and write
23D5858F000
trusted library allocation
page read and write
23D4D23A000
trusted library allocation
page read and write
23D540C1000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D4DA9B000
trusted library allocation
page read and write
23D55105000
trusted library allocation
page read and write
23D4E2DD000
trusted library allocation
page read and write
2400003F000
trusted library allocation
page read and write
23D4B9A1000
trusted library allocation
page read and write
1CB2ABE000
stack
page read and write
23D42B49000
heap
page read and write
23D3DA63000
heap
page read and write
23D4CE5A000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
23D4CB76000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D4F467000
trusted library allocation
page read and write
23D55AC9000
trusted library allocation
page read and write
23D4F964000
trusted library allocation
page read and write
23D4D830000
trusted library allocation
page read and write
23D4D7AF000
trusted library allocation
page read and write
23D4BBCE000
trusted library allocation
page read and write
23D53FCB000
trusted library allocation
page read and write
23D42B30000
heap
page read and write
23D4CB8F000
trusted library allocation
page read and write
23D4B4E2000
heap
page read and write
23D4CB33000
trusted library allocation
page read and write
23D4CEC8000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4D798000
trusted library allocation
page read and write
23D48DB9000
trusted library allocation
page read and write
23D540EE000
trusted library allocation
page read and write
23D42B61000
heap
page read and write
23D4CB7E000
trusted library allocation
page read and write
22D68215000
trusted library allocation
page read and write
23D57AF8000
trusted library allocation
page read and write
23D4FA0F000
trusted library allocation
page read and write
23D55A85000
trusted library allocation
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D4D2B6000
trusted library allocation
page read and write
23D4DE5F000
trusted library allocation
page read and write
23D57AFE000
trusted library allocation
page read and write
23D4BB8E000
trusted library allocation
page read and write
23D57C6B000
trusted library allocation
page read and write
213C775C000
trusted library allocation
page read and write
23D586CE000
trusted library allocation
page read and write
23D4BBB3000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D47B66000
trusted library allocation
page read and write
23D4BA68000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D57DF1000
trusted library allocation
page read and write
23D57D7E000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4E36B000
trusted library allocation
page read and write
226BC3D0000
heap
page read and write
23D4CFC8000
trusted library allocation
page read and write
23D4CBA3000
trusted library allocation
page read and write
23D579AD000
trusted library allocation
page read and write
22D67FA6000
heap
page read and write
23D42B3E000
heap
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D48DF6000
trusted library allocation
page read and write
23D54093000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4D843000
trusted library allocation
page read and write
23D57652000
trusted library allocation
page read and write
23D573B7000
trusted library allocation
page read and write
23D4E359000
trusted library allocation
page read and write
23D4FAD2000
trusted library allocation
page read and write
23D4BBC7000
trusted library allocation
page read and write
23D4FADE000
trusted library allocation
page read and write
23D4F998000
trusted library allocation
page read and write
23D4F47C000
trusted library allocation
page read and write
23D4F8DA000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D58633000
trusted library allocation
page read and write
23D4BB3D000
trusted library allocation
page read and write
23D4D8DD000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D42B59000
heap
page read and write
23D42B53000
heap
page read and write
23D4E4B8000
trusted library allocation
page read and write
23D42B65000
heap
page read and write
23D48DFE000
trusted library allocation
page read and write
23D579E6000
trusted library allocation
page read and write
23D4E37E000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D42B2D000
heap
page read and write
23D563A3000
trusted library allocation
page read and write
23D4BDF6000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4F820000
trusted library allocation
page read and write
213C8360000
heap
page read and write
23D540F7000
trusted library allocation
page read and write
23D4B58A000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4CFDA000
trusted library allocation
page read and write
23D586BC000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
BFD9ABE000
unkown
page readonly
23D50C46000
trusted library allocation
page read and write
23D4FA86000
trusted library allocation
page read and write
23D55A9C000
trusted library allocation
page read and write
23D58658000
trusted library allocation
page read and write
23D4F4F6000
trusted library allocation
page read and write
23D4CED3000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4D775000
trusted library allocation
page read and write
23D4D88F000
trusted library allocation
page read and write
23D4CEB9000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D55A75000
trusted library allocation
page read and write
23D4BA83000
trusted library allocation
page read and write
23D4B92F000
trusted library allocation
page read and write
23D540FD000
trusted library allocation
page read and write
23D55137000
trusted library allocation
page read and write
23D551C5000
trusted library allocation
page read and write
23D585E3000
trusted library allocation
page read and write
23D57DAF000
trusted library allocation
page read and write
23D54457000
trusted library allocation
page read and write
23D4CBC0000
trusted library allocation
page read and write
23D573F1000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
213C7CA0000
trusted library allocation
page read and write
B98000
heap
page read and write
23D4E393000
trusted library allocation
page read and write
1EEA4172000
heap
page read and write
23D4E37E000
trusted library allocation
page read and write
23D4E4BF000
trusted library allocation
page read and write
23D4BA8D000
trusted library allocation
page read and write
23D4E64B000
trusted library allocation
page read and write
23D57B97000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D4CED3000
trusted library allocation
page read and write
23D4D946000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4FA8F000
trusted library allocation
page read and write
23D4CA46000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D58593000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D4F7E9000
trusted library allocation
page read and write
23D5862E000
trusted library allocation
page read and write
23D4FA34000
trusted library allocation
page read and write
23D4BBA8000
trusted library allocation
page read and write
23D4D876000
trusted library allocation
page read and write
23D4B9B8000
trusted library allocation
page read and write
35B0000
heap
page read and write
23D57AD5000
trusted library allocation
page read and write
213C7762000
trusted library allocation
page read and write
23D57A98000
trusted library allocation
page read and write
23D48A83000
trusted library allocation
page read and write
23D4E370000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4B2B3000
trusted library allocation
page read and write
23D4B4F8000
heap
page read and write
23D42B2E000
heap
page read and write
22D67CA0000
unclassified section
page readonly
23D42B33000
heap
page read and write
23D54089000
trusted library allocation
page read and write
23D4DDDD000
trusted library allocation
page read and write
23D4B487000
heap
page read and write
23D42B15000
heap
page read and write
23D4E3B8000
trusted library allocation
page read and write
23D586CE000
trusted library allocation
page read and write
23D543C5000
trusted library allocation
page read and write
23D4DDEE000
trusted library allocation
page read and write
23D55AC9000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D4CA89000
trusted library allocation
page read and write
23D53E4A000
trusted library allocation
page read and write
23D57A4E000
trusted library allocation
page read and write
23D57D09000
trusted library allocation
page read and write
23D48CBB000
trusted library allocation
page read and write
23D4D7C7000
trusted library allocation
page read and write
23D4D988000
trusted library allocation
page read and write
23D57DDF000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
22D67FA4000
heap
page read and write
23D4BBBB000
trusted library allocation
page read and write
23D4B2D4000
trusted library allocation
page read and write
23D540D6000
trusted library allocation
page read and write
23D4E6AA000
trusted library allocation
page read and write
213C83A1000
heap
page read and write
23D58647000
trusted library allocation
page read and write
23D573AF000
trusted library allocation
page read and write
23D5509E000
trusted library allocation
page read and write
23D54284000
trusted library allocation
page read and write
23D4E0FD000
trusted library allocation
page read and write
23D57BE0000
trusted library allocation
page read and write
23D4CAD9000
trusted library allocation
page read and write
23D4B4E8000
heap
page read and write
23D57AA0000
trusted library allocation
page read and write
23D48A16000
trusted library allocation
page read and write
23D4C11F000
trusted library allocation
page read and write
23D4CD37000
trusted library allocation
page read and write
213C8467000
heap
page read and write
23D58697000
trusted library allocation
page read and write
23D4CEE1000
trusted library allocation
page read and write
BFD7A3E000
unkown
page readonly
1CAF9D8000
stack
page read and write
23D4BCD9000
trusted library allocation
page read and write
23D57647000
trusted library allocation
page read and write
23D4BB9A000
trusted library allocation
page read and write
23D4D882000
trusted library allocation
page read and write
23D57DA4000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4E43D000
trusted library allocation
page read and write
213C83E1000
heap
page read and write
BE5000
heap
page read and write
23D4D766000
trusted library allocation
page read and write
23D586BA000
trusted library allocation
page read and write
23D4E353000
trusted library allocation
page read and write
23D540FD000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4F4E2000
trusted library allocation
page read and write
23D4C18F000
trusted library allocation
page read and write
23D4C18F000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4E3A0000
trusted library allocation
page read and write
23D42B1B000
heap
page read and write
213C8421000
heap
page read and write
23D47CA3000
trusted library allocation
page read and write
23D4BBCC000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D53F3C000
trusted library allocation
page read and write
23D55A47000
trusted library allocation
page read and write
23D4D224000
trusted library allocation
page read and write
23D4CEE7000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D57633000
trusted library allocation
page read and write
23D4FA2E000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4BBC7000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D57D5A000
trusted library allocation
page read and write
23D50C51000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
213C8458000
heap
page read and write
23D57DE7000
trusted library allocation
page read and write
23D42B31000
heap
page read and write
23D4F47F000
trusted library allocation
page read and write
23D550E5000
trusted library allocation
page read and write
23D4D774000
trusted library allocation
page read and write
23D4BC9E000
trusted library allocation
page read and write
A60000
unkown
page readonly
23D57DFB000
trusted library allocation
page read and write
23D57DF1000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D57E01000
heap
page read and write
23D4F47C000
trusted library allocation
page read and write
23D4E0D9000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4CE7E000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
23D4D882000
trusted library allocation
page read and write
23D540EE000
trusted library allocation
page read and write
23D4D280000
trusted library allocation
page read and write
23D56386000
trusted library allocation
page read and write
23D4D791000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D42B4F000
heap
page read and write
23D42B36000
heap
page read and write
BFD79FE000
unkown
page readonly
23D55148000
trusted library allocation
page read and write
23D4FACC000
trusted library allocation
page read and write
23D4D796000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4FAA1000
trusted library allocation
page read and write
23D4CBE4000
trusted library allocation
page read and write
23D4D8CE000
trusted library allocation
page read and write
23D57C0A000
trusted library allocation
page read and write
213C83F1000
heap
page read and write
23D573AA000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D42B5C000
heap
page read and write
23D48CBC000
trusted library allocation
page read and write
23D4F017000
trusted library allocation
page read and write
23D4CD78000
trusted library allocation
page read and write
23D4FA8F000
trusted library allocation
page read and write
23D4F0B2000
trusted library allocation
page read and write
23D50C39000
trusted library allocation
page read and write
23D4D236000
trusted library allocation
page read and write
23D4C188000
trusted library allocation
page read and write
23D57A92000
trusted library allocation
page read and write
23D42B38000
heap
page read and write
23D42B0F000
heap
page read and write
23D4D7CA000
trusted library allocation
page read and write
23D4B9B8000
trusted library allocation
page read and write
23D4F4E2000
trusted library allocation
page read and write
23D4B2FD000
trusted library allocation
page read and write
226BC2E0000
unclassified section
page readonly
23D42B1F000
heap
page read and write
23D55A84000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
22D68212000
trusted library allocation
page read and write
D0CCFFE000
stack
page read and write
23D42B1F000
heap
page read and write
23D4BA52000
trusted library allocation
page read and write
23D4BB71000
trusted library allocation
page read and write
23D48CA3000
trusted library allocation
page read and write
23D4D788000
trusted library allocation
page read and write
23D48D94000
trusted library allocation
page read and write
23D58616000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D42B4F000
heap
page read and write
23D585C7000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D4DD93000
trusted library allocation
page read and write
23D53EE5000
trusted library allocation
page read and write
226BC85D000
trusted library allocation
page read and write
23D50C7D000
trusted library allocation
page read and write
23D4D9CC000
trusted library allocation
page read and write
23D4D886000
trusted library allocation
page read and write
FE5C7FE000
stack
page read and write
23D42B48000
heap
page read and write
23D4D873000
trusted library allocation
page read and write
9DB000
stack
page read and write
23D42B25000
heap
page read and write
23D4D7C7000
trusted library allocation
page read and write
23D4DDF4000
trusted library allocation
page read and write
23D48AAB000
trusted library allocation
page read and write
23D53F16000
trusted library allocation
page read and write
23D4CA89000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
213C7D80000
heap
page read and write
226BC390000
heap
page read and write
23D42B58000
heap
page read and write
23D4B47D000
heap
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D53EFA000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D4C8BA000
trusted library allocation
page read and write
23D57974000
trusted library allocation
page read and write
226BC80C000
trusted library allocation
page read and write
23D4F4EF000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
213C77C7000
trusted library allocation
page read and write
23D4F85B000
trusted library allocation
page read and write
23D4D84B000
trusted library allocation
page read and write
22D68181000
trusted library allocation
page read and write
23D3DA56000
heap
page read and write
23D50C4A000
trusted library allocation
page read and write
23D4D7C7000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D55A64000
trusted library allocation
page read and write
23D57DB4000
trusted library allocation
page read and write
23D4B261000
trusted library allocation
page read and write
23D4CBE0000
trusted library allocation
page read and write
BFD4708000
stack
page read and write
23D4CA2B000
trusted library allocation
page read and write
23D474C4000
trusted library allocation
page read and write
23D4BB9A000
trusted library allocation
page read and write
23D48CB8000
trusted library allocation
page read and write
23D4DCEA000
trusted library allocation
page read and write
23D55A94000
trusted library allocation
page read and write
23D4BED7000
trusted library allocation
page read and write
226BC593000
heap
page read and write
23D4D8D3000
trusted library allocation
page read and write
23D57DC0000
trusted library allocation
page read and write
23D53E5C000
trusted library allocation
page read and write
23D4E593000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D5634D000
trusted library allocation
page read and write
D0CB5DE000
unkown
page readonly
23D4E375000
trusted library allocation
page read and write
23D4D737000
trusted library allocation
page read and write
23D4D922000
trusted library allocation
page read and write
23D4E392000
trusted library allocation
page read and write
23D579DE000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D5518A000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D57DA9000
trusted library allocation
page read and write
23D4FAB1000
trusted library allocation
page read and write
23D4B224000
trusted library allocation
page read and write
23D4B962000
trusted library allocation
page read and write
23D4C161000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
D0CD7FE000
unkown
page readonly
23D579DA000
trusted library allocation
page read and write
23D4D9FE000
trusted library allocation
page read and write
B34000
unkown
page readonly
23D42B3D000
heap
page read and write
23D53E93000
trusted library allocation
page read and write
23D4B507000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D4CB45000
trusted library allocation
page read and write
23D4B224000
trusted library allocation
page read and write
23D4B2DA000
trusted library allocation
page read and write
23D4CAE1000
trusted library allocation
page read and write
23D4C1C3000
trusted library allocation
page read and write
23D4F95E000
trusted library allocation
page read and write
23D4F8D4000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
BCB000
heap
page read and write
23D4FA99000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4B4D6000
heap
page read and write
23D5763A000
trusted library allocation
page read and write
23D4CB88000
trusted library allocation
page read and write
23D540A9000
trusted library allocation
page read and write
23D57D87000
trusted library allocation
page read and write
23D579AD000
trusted library allocation
page read and write
23D542A2000
trusted library allocation
page read and write
23D4E1BF000
trusted library allocation
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D586C9000
trusted library allocation
page read and write
23D585B4000
trusted library allocation
page read and write
23D4CA4C000
trusted library allocation
page read and write
213C77E7000
trusted library allocation
page read and write
23D4C123000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D47AF6000
trusted library allocation
page read and write
23D4DD5F000
trusted library allocation
page read and write
23D4E333000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4CBF4000
trusted library allocation
page read and write
23D4BBAC000
trusted library allocation
page read and write
23D4FAC3000
trusted library allocation
page read and write
23D42B54000
heap
page read and write
23D4BB3F000
trusted library allocation
page read and write
23D55AFC000
trusted library allocation
page read and write
23D4D2ED000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
23D573F6000
trusted library allocation
page read and write
23D4B2DB000
trusted library allocation
page read and write
23D50D15000
trusted library allocation
page read and write
344000
heap
page read and write
23D4DF8C000
trusted library allocation
page read and write
23D4FACD000
trusted library allocation
page read and write
23D4F4F6000
trusted library allocation
page read and write
23D47481000
trusted library allocation
page read and write
1EEA5CC0000
heap
page read and write
23D4F0EA000
trusted library allocation
page read and write
23D4F881000
trusted library allocation
page read and write
23D57BB7000
trusted library allocation
page read and write
23D4B4CF000
heap
page read and write
23D50C69000
trusted library allocation
page read and write
23D4B4F6000
heap
page read and write
23D4B99B000
trusted library allocation
page read and write
23D4E214000
trusted library allocation
page read and write
23D4D28B000
trusted library allocation
page read and write
23D4BBAE000
trusted library allocation
page read and write
BB4000
heap
page read and write
BC3000
heap
page read and write
2AF7D200000
trusted library allocation
page read and write
23D4E4B2000
trusted library allocation
page read and write
23D4CA56000
trusted library allocation
page read and write
23D4D2EA000
trusted library allocation
page read and write
23D4F837000
trusted library allocation
page read and write
23D4E387000
trusted library allocation
page read and write
340000
heap
page read and write
23D4CB7E000
trusted library allocation
page read and write
23D54993000
trusted library allocation
page read and write
23D4F881000
trusted library allocation
page read and write
23D50D15000
trusted library allocation
page read and write
23D55AC0000
trusted library allocation
page read and write
23D42B16000
heap
page read and write
23D42B4F000
heap
page read and write
B2C000
unkown
page read and write
213C7700000
trusted library allocation
page read and write
23D4D2C1000
trusted library allocation
page read and write
23D4F464000
trusted library allocation
page read and write
23D4B5FA000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D42B1D000
heap
page read and write
23D42B2A000
heap
page read and write
23D540E7000
trusted library allocation
page read and write
23D4D778000
trusted library allocation
page read and write
23D4F4E4000
trusted library allocation
page read and write
23D48A2A000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D42B15000
heap
page read and write
23D57AF2000
trusted library allocation
page read and write
23D4E3AE000
trusted library allocation
page read and write
23D4CA84000
trusted library allocation
page read and write
23D57AFC000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D50D88000
trusted library allocation
page read and write
23D48DA7000
trusted library allocation
page read and write
23D540FA000
trusted library allocation
page read and write
23D4D7B7000
trusted library allocation
page read and write
226BC8C4000
trusted library allocation
page read and write
B30000
unkown
page write copy
23D42B40000
heap
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4CB7E000
trusted library allocation
page read and write
23D57E35000
heap
page read and write
23D4D8D1000
trusted library allocation
page read and write
23D4B4F4000
heap
page read and write
1CB11FE000
unkown
page readonly
23D58587000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
BB9000
heap
page read and write
23D54341000
trusted library allocation
page read and write
23D4BA51000
trusted library allocation
page read and write
23D57AC9000
trusted library allocation
page read and write
23D4CB7C000
trusted library allocation
page read and write
23D4F0A2000
trusted library allocation
page read and write
23D576AF000
trusted library allocation
page read and write
23D56341000
trusted library allocation
page read and write
23D55A82000
trusted library allocation
page read and write
23D4D7A5000
trusted library allocation
page read and write
BC7000
heap
page read and write
23D540CF000
trusted library allocation
page read and write
23D56307000
trusted library allocation
page read and write
23D57AFE000
trusted library allocation
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D57AA0000
trusted library allocation
page read and write
23D57F53000
heap
page read and write
23D42B1D000
heap
page read and write
23D5442E000
trusted library allocation
page read and write
23D4D243000
trusted library allocation
page read and write
23D4B559000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4CEF5000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D4C87D000
trusted library allocation
page read and write
213C75B2000
unclassified section
page read and write
213C7360000
unclassified section
page readonly
23D4C123000
trusted library allocation
page read and write
23D4FA30000
trusted library allocation
page read and write
23D4DF98000
trusted library allocation
page read and write
23D4E3D0000
trusted library allocation
page read and write
213C83FC000
heap
page read and write
23D42B40000
heap
page read and write
23D4F4FA000
trusted library allocation
page read and write
23D586D6000
trusted library allocation
page read and write
23D4C18F000
trusted library allocation
page read and write
23D4DD63000
trusted library allocation
page read and write
23D4BB9A000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4C1EF000
trusted library allocation
page read and write
23D4DED3000
trusted library allocation
page read and write
23D4D74E000
trusted library allocation
page read and write
23D4CEF2000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4D211000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4D750000
trusted library allocation
page read and write
23D4C106000
trusted library allocation
page read and write
23D4D946000
trusted library allocation
page read and write
23D540F7000
trusted library allocation
page read and write
23D57A9A000
trusted library allocation
page read and write
23D57D98000
trusted library allocation
page read and write
23D5795E000
trusted library allocation
page read and write
23D4D7C5000
trusted library allocation
page read and write
1910000
heap
page read and write
23D4CAD7000
trusted library allocation
page read and write
23D4E6D2000
trusted library allocation
page read and write
23D4FA88000
trusted library allocation
page read and write
23D48A50000
trusted library allocation
page read and write
23D4D778000
trusted library allocation
page read and write
23D4F6E0000
trusted library allocation
page read and write
23D4CE27000
trusted library allocation
page read and write
23D4E32E000
trusted library allocation
page read and write
23D4BBCC000
trusted library allocation
page read and write
213C75D6000
heap
page read and write
BFD71FE000
stack
page read and write
23D551AC000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
213C83E8000
heap
page read and write
23D48DC4000
trusted library allocation
page read and write
1EEA5BA6000
heap
page read and write
23D4B563000
trusted library allocation
page read and write
1CAEF9E000
unkown
page readonly
23D42B65000
heap
page read and write
23D4DDC5000
trusted library allocation
page read and write
23D4D7C5000
trusted library allocation
page read and write
23D586BC000
trusted library allocation
page read and write
23D4C1B6000
trusted library allocation
page read and write
23D53FFE000
trusted library allocation
page read and write
23D42B66000
heap
page read and write
23D4B90F000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D56406000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D42B1E000
heap
page read and write
23D4BA83000
trusted library allocation
page read and write
23D57D98000
trusted library allocation
page read and write
226BC88F000
trusted library allocation
page read and write
213C8300000
heap
page read and write
23D4B5D1000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D5736A000
trusted library allocation
page read and write
213C842B000
heap
page read and write
23D4B4D3000
heap
page read and write
BC6000
heap
page read and write
23D551A3000
trusted library allocation
page read and write
BFD92BE000
stack
page read and write
23D4D247000
trusted library allocation
page read and write
23D57DA6000
trusted library allocation
page read and write
23D58682000
trusted library allocation
page read and write
23D4F8BD000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D57AF4000
trusted library allocation
page read and write
23D4F945000
trusted library allocation
page read and write
23D4DFA8000
trusted library allocation
page read and write
23D57AF6000
trusted library allocation
page read and write
23D58545000
trusted library allocation
page read and write
213C836C000
heap
page read and write
23D3DA6C000
heap
page read and write
23D4F80D000
trusted library allocation
page read and write
23D54A4E000
trusted library allocation
page read and write
23D57C04000
trusted library allocation
page read and write
23D4DDC5000
trusted library allocation
page read and write
23D4D8D7000
trusted library allocation
page read and write
23D4C1A4000
trusted library allocation
page read and write
23D48C86000
trusted library allocation
page read and write
23D54500000
trusted library allocation
page read and write
23D4CFCD000
trusted library allocation
page read and write
23D4E3A0000
trusted library allocation
page read and write
23D56457000
trusted library allocation
page read and write
23D42B4B000
heap
page read and write
23D57DE3000
trusted library allocation
page read and write
23D550C8000
trusted library allocation
page read and write
23D55A6E000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D4D794000
trusted library allocation
page read and write
23D57373000
trusted library allocation
page read and write
23D550A2000
trusted library allocation
page read and write
2A027FE000
stack
page read and write
23D4BBBB000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D57D7A000
trusted library allocation
page read and write
23D4BDFE000
trusted library allocation
page read and write
23D57AC6000
trusted library allocation
page read and write
23D585EC000
trusted library allocation
page read and write
23D57D98000
trusted library allocation
page read and write
23D4BB92000
trusted library allocation
page read and write
23D4E348000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D579E2000
trusted library allocation
page read and write
23D4FAA9000
trusted library allocation
page read and write
BCA000
heap
page read and write
23D57DC4000
trusted library allocation
page read and write
23D586F0000
trusted library allocation
page read and write
23D50CAE000
trusted library allocation
page read and write
23D57F53000
heap
page read and write
23D53E2F000
trusted library allocation
page read and write
23D4B4FC000
heap
page read and write
23D586F0000
trusted library allocation
page read and write
23D57A94000
trusted library allocation
page read and write
23D3DA56000
heap
page read and write
23D4B4F6000
heap
page read and write
23D47A2F000
trusted library allocation
page read and write
23D5858A000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4D7AF000
trusted library allocation
page read and write
23D5793B000
trusted library allocation
page read and write
23D4CF40000
trusted library allocation
page read and write
23D48D50000
trusted library allocation
page read and write
23D56305000
trusted library allocation
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D4E34D000
trusted library allocation
page read and write
23D4B4F6000
heap
page read and write
23D4CA96000
trusted library allocation
page read and write
23D4B2FD000
trusted library allocation
page read and write
23D5768F000
trusted library allocation
page read and write
23D4F7E9000
trusted library allocation
page read and write
23D4E6E8000
trusted library allocation
page read and write
23D4CBE6000
trusted library allocation
page read and write
23D57AF2000
trusted library allocation
page read and write
23D4F4FA000
trusted library allocation
page read and write
23D4B4DB000
heap
page read and write
23D4CEFB000
trusted library allocation
page read and write
1EEA4307000
trusted library allocation
page read and write
23D4DD90000
trusted library allocation
page read and write
213C7CD0000
trusted library allocation
page read and write
23D57D76000
trusted library allocation
page read and write
23D540FA000
trusted library allocation
page read and write
23D57BA4000
trusted library allocation
page read and write
23D4FAA1000
trusted library allocation
page read and write
23D4C17F000
trusted library allocation
page read and write
23D53ECB000
trusted library allocation
page read and write
23D4C16F000
trusted library allocation
page read and write
23D540DF000
trusted library allocation
page read and write
23D57E5C000
heap
page read and write
213C8400000
heap
page read and write
23D47BFE000
trusted library allocation
page read and write
23D53F38000
trusted library allocation
page read and write
23D4B99E000
trusted library allocation
page read and write
23D4D89A000
trusted library allocation
page read and write
23D4F8BD000
trusted library allocation
page read and write
23D4D8CE000
trusted library allocation
page read and write
23D586D3000
trusted library allocation
page read and write
D0CB4DE000
unkown
page readonly
23D4F0F5000
trusted library allocation
page read and write
23D57DE7000
trusted library allocation
page read and write
23D4F860000
trusted library allocation
page read and write
23D4E3FA000
trusted library allocation
page read and write
23D53E6A000
trusted library allocation
page read and write
23D4CD6A000
trusted library allocation
page read and write
23D4DDAA000
trusted library allocation
page read and write
23D42B5F000
heap
page read and write
23D42B4F000
heap
page read and write
23D4D788000
trusted library allocation
page read and write
23D4CA96000
trusted library allocation
page read and write
23D50C84000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4B5D9000
trusted library allocation
page read and write
23D50DA8000
trusted library allocation
page read and write
344000
heap
page read and write
23D42B48000
heap
page read and write
23D4F44A000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4BB6C000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D585AA000
trusted library allocation
page read and write
23D4BBBE000
trusted library allocation
page read and write
23D58556000
trusted library allocation
page read and write
23D4E1C9000
trusted library allocation
page read and write
23D4D82B000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4E4AE000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D47BF0000
trusted library allocation
page read and write
23D4CF43000
trusted library allocation
page read and write
BE2000
heap
page read and write
23D4CA74000
trusted library allocation
page read and write
23D4F0B2000
trusted library allocation
page read and write
23D4CB37000
trusted library allocation
page read and write
23D57CBE000
trusted library allocation
page read and write
23D4F428000
trusted library allocation
page read and write
23D4BB6E000
trusted library allocation
page read and write
23D57C35000
trusted library allocation
page read and write
213C73C8000
remote allocation
page execute read
1EEA418A000
heap
page read and write
23D50C6E000
trusted library allocation
page read and write
23D4B984000
trusted library allocation
page read and write
23D42B54000
heap
page read and write
226BC879000
trusted library allocation
page read and write
23D57AD5000
trusted library allocation
page read and write
23D4E396000
trusted library allocation
page read and write
23D4C133000
trusted library allocation
page read and write
23D4C17F000
trusted library allocation
page read and write
23D4CA26000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D48D56000
trusted library allocation
page read and write
23D48D57000
trusted library allocation
page read and write
23D4F0FA000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D5855F000
trusted library allocation
page read and write
23D579E8000
trusted library allocation
page read and write
23D42B33000
heap
page read and write
23D55A4B000
trusted library allocation
page read and write
9BF000
stack
page read and write
23D4B4A3000
heap
page read and write
23D42B4F000
heap
page read and write
23D4B232000
trusted library allocation
page read and write
23D57A9C000
trusted library allocation
page read and write
23D4E3F6000
trusted library allocation
page read and write
23D50C84000
trusted library allocation
page read and write
23D4CA0A000
trusted library allocation
page read and write
344000
heap
page read and write
23D4D842000
trusted library allocation
page read and write
23D540BE000
trusted library allocation
page read and write
23D4E3B8000
trusted library allocation
page read and write
23D4F860000
trusted library allocation
page read and write
22D67F00000
heap
page read and write
23D42B4E000
heap
page read and write
23D42B24000
heap
page read and write
23D4CFFE000
trusted library allocation
page read and write
23D55AAA000
trusted library allocation
page read and write
23D4BA85000
trusted library allocation
page read and write
23D4D785000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D57A94000
trusted library allocation
page read and write
23D4E2DD000
trusted library allocation
page read and write
23D4D9AC000
trusted library allocation
page read and write
23D55086000
trusted library allocation
page read and write
23D4BE6A000
trusted library allocation
page read and write
226BC420000
heap
page readonly
23D4FAD5000
trusted library allocation
page read and write
23D57AFE000
trusted library allocation
page read and write
23D4D8E6000
trusted library allocation
page read and write
23D4C1C4000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4F6CF000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D42B2B000
heap
page read and write
23D4F9D2000
trusted library allocation
page read and write
23D42B6C000
heap
page read and write
23D42B24000
heap
page read and write
23D42B2E000
heap
page read and write
23D57DE3000
trusted library allocation
page read and write
23D57DF2000
trusted library allocation
page read and write
23D4E2D3000
trusted library allocation
page read and write
23D42B3E000
heap
page read and write
23D4CEC8000
trusted library allocation
page read and write
23D5408C000
trusted library allocation
page read and write
23D47BFE000
trusted library allocation
page read and write
23D50CA4000
trusted library allocation
page read and write
23D4FA39000
trusted library allocation
page read and write
23D4E137000
trusted library allocation
page read and write
23D4C144000
trusted library allocation
page read and write
23D4BA83000
trusted library allocation
page read and write
35B1000
heap
page read and write
23D42B2E000
heap
page read and write
213C8309000
heap
page read and write
23D4E0A7000
trusted library allocation
page read and write
22D68196000
trusted library allocation
page read and write
23D57DEB000
trusted library allocation
page read and write
23D4E3A9000
trusted library allocation
page read and write
23D57BAB000
trusted library allocation
page read and write
23D4DD05000
trusted library allocation
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D4BBA1000
trusted library allocation
page read and write
226BCB00000
trusted library allocation
page read and write
23D4CAE4000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
22D681CB000
trusted library allocation
page read and write
23D4F0AD000
trusted library allocation
page read and write
23D5442C000
trusted library allocation
page read and write
23D42B1A000
heap
page read and write
23D4F80D000
trusted library allocation
page read and write
23D5630C000
trusted library allocation
page read and write
23D4CB5B000
trusted library allocation
page read and write
23D50CB3000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4CF28000
trusted library allocation
page read and write
23D4CE9B000
trusted library allocation
page read and write
23D4FA99000
trusted library allocation
page read and write
23D4BA8D000
trusted library allocation
page read and write
23D4E387000
trusted library allocation
page read and write
23D4E0AF000
trusted library allocation
page read and write
23D4E0E4000
trusted library allocation
page read and write
23D57D88000
trusted library allocation
page read and write
23D4E1C6000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D42B40000
heap
page read and write
23D4BB9A000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D57AEE000
trusted library allocation
page read and write
344000
heap
page read and write
23D540FA000
trusted library allocation
page read and write
23D4CA59000
trusted library allocation
page read and write
23D586AB000
trusted library allocation
page read and write
23D4CF30000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D4E36B000
trusted library allocation
page read and write
23D4D105000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4DD82000
trusted library allocation
page read and write
23D42B37000
heap
page read and write
23D42B1D000
heap
page read and write
213C83EC000
heap
page read and write
23D42B1D000
heap
page read and write
23D57A9E000
trusted library allocation
page read and write
23D57BF1000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
23D4CBE0000
trusted library allocation
page read and write
BCC000
heap
page read and write
23D4CAD0000
trusted library allocation
page read and write
23D4CBC3000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4DFBC000
trusted library allocation
page read and write
23D4F860000
trusted library allocation
page read and write
23D4B4F2000
heap
page read and write
23D4C1AB000
trusted library allocation
page read and write
23D4F0AA000
trusted library allocation
page read and write
23D4E389000
trusted library allocation
page read and write
23D55A33000
trusted library allocation
page read and write
23D4D256000
trusted library allocation
page read and write
23D562E5000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4DF5B000
trusted library allocation
page read and write
23D4E0FD000
trusted library allocation
page read and write
FE5BFFF000
stack
page read and write
23D42B50000
heap
page read and write
23D4F43E000
trusted library allocation
page read and write
23D4CAB3000
trusted library allocation
page read and write
23D586A3000
trusted library allocation
page read and write
3174000
heap
page read and write
23D57AF4000
trusted library allocation
page read and write
23D50CAE000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
213C7DB3000
heap
page read and write
23D5502F000
trusted library allocation
page read and write
23D4C140000
trusted library allocation
page read and write
23D586D8000
trusted library allocation
page read and write
23D55A84000
trusted library allocation
page read and write
23D573E4000
trusted library allocation
page read and write
23D55AC3000
trusted library allocation
page read and write
23D4FACD000
trusted library allocation
page read and write
23D57BC6000
trusted library allocation
page read and write
23D4FAF5000
trusted library allocation
page read and write
213C8458000
heap
page read and write
23D4BA85000
trusted library allocation
page read and write
23D4E09B000
trusted library allocation
page read and write
23D4C194000
trusted library allocation
page read and write
23D4F47C000
trusted library allocation
page read and write
23D57CA8000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4E6B8000
trusted library allocation
page read and write
23D4FA99000
trusted library allocation
page read and write
23D585D1000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D5765D000
trusted library allocation
page read and write
23D4C17A000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D57E01000
heap
page read and write
23D48CF3000
trusted library allocation
page read and write
23D53ECC000
trusted library allocation
page read and write
213C7CB4000
unkown
page execute read
23D50CB9000
trusted library allocation
page read and write
23D55AA3000
trusted library allocation
page read and write
23D55A72000
trusted library allocation
page read and write
23D4E1B7000
trusted library allocation
page read and write
23D4C1AA000
trusted library allocation
page read and write
23D4DCF2000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D4F4DA000
trusted library allocation
page read and write
23D55A6E000
trusted library allocation
page read and write
23D50C6E000
trusted library allocation
page read and write
23D4FA3E000
trusted library allocation
page read and write
23D57C3E000
trusted library allocation
page read and write
23D48C98000
trusted library allocation
page read and write
23D4F68D000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D42B2E000
heap
page read and write
213C842B000
heap
page read and write
23D4E642000
trusted library allocation
page read and write
23D586F0000
trusted library allocation
page read and write
23D55206000
trusted library allocation
page read and write
23D4BBCE000
trusted library allocation
page read and write
23D4E615000
trusted library allocation
page read and write
23D57A9E000
trusted library allocation
page read and write
23D57AF0000
trusted library allocation
page read and write
23D50C4C000
trusted library allocation
page read and write
23D540E7000
trusted library allocation
page read and write
23D4E191000
trusted library allocation
page read and write
213C7748000
trusted library allocation
page read and write
23D4E33A000
trusted library allocation
page read and write
23D42B18000
heap
page read and write
BFD69FE000
unkown
page readonly
23D4E2D3000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D47AFE000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D586A9000
trusted library allocation
page read and write
23D4BA5E000
trusted library allocation
page read and write
23D4D238000
trusted library allocation
page read and write
23D540E7000
trusted library allocation
page read and write
23D4CD9D000
trusted library allocation
page read and write
23D57DE3000
trusted library allocation
page read and write
23D4D2B8000
trusted library allocation
page read and write
23D42B26000
heap
page read and write
23D4FAF7000
trusted library allocation
page read and write
23D563C5000
trusted library allocation
page read and write
23D53E19000
trusted library allocation
page read and write
213C7CC0000
unkown
page execute read
23D42B40000
heap
page read and write
213C843B000
heap
page read and write
23D50C9F000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D57D8B000
trusted library allocation
page read and write
23D4B588000
trusted library allocation
page read and write
23D4F8CC000
trusted library allocation
page read and write
23D4E627000
trusted library allocation
page read and write
23D4CEB2000
trusted library allocation
page read and write
23D4B2B4000
trusted library allocation
page read and write
23D4B2AC000
trusted library allocation
page read and write
23D4D2E1000
trusted library allocation
page read and write
23D4D7C1000
trusted library allocation
page read and write
23D4FAE9000
trusted library allocation
page read and write
23D4CA93000
trusted library allocation
page read and write
BE8000
heap
page read and write
23D56F00000
trusted library allocation
page read and write
23D4D7FD000
trusted library allocation
page read and write
23D4BB7C000
trusted library allocation
page read and write
213C7D90000
heap
page read and write
23D585FD000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D585FD000
trusted library allocation
page read and write
23D55A47000
trusted library allocation
page read and write
23D56348000
trusted library allocation
page read and write
23D4B5FA000
trusted library allocation
page read and write
344000
heap
page read and write
23D4CA5C000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4D7F7000
trusted library allocation
page read and write
23D4B261000
trusted library allocation
page read and write
23D4E4F4000
trusted library allocation
page read and write
23D4E650000
trusted library allocation
page read and write
23D4D85E000
trusted library allocation
page read and write
BFD468E000
unkown
page readonly
23D57D5D000
trusted library allocation
page read and write
23D4FA85000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D42B3D000
heap
page read and write
23D4E441000
trusted library allocation
page read and write
23D57D52000
trusted library allocation
page read and write
23D4F0A5000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D5522E000
trusted library allocation
page read and write
23D4E3F2000
trusted library allocation
page read and write
23D5408E000
trusted library allocation
page read and write
23D4D7C7000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D42B4E000
heap
page read and write
23D57CF6000
trusted library allocation
page read and write
23D48DC4000
trusted library allocation
page read and write
23D4DD93000
trusted library allocation
page read and write
23D50C02000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D55A6E000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D4F964000
trusted library allocation
page read and write
213C83E6000
heap
page read and write
23D4C13D000
trusted library allocation
page read and write
23D4E39E000
trusted library allocation
page read and write
23D48AAB000
trusted library allocation
page read and write
23D48E35000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4BA8B000
trusted library allocation
page read and write
23D42B66000
heap
page read and write
23D42B27000
heap
page read and write
23D58622000
trusted library allocation
page read and write
23D57AC6000
trusted library allocation
page read and write
23D4BDF3000
trusted library allocation
page read and write
23D50CB3000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4C18F000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4E2DD000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D57D79000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D42B3B000
heap
page read and write
23D53F4C000
trusted library allocation
page read and write
23D4F9D5000
trusted library allocation
page read and write
23D586B9000
trusted library allocation
page read and write
23D58595000
trusted library allocation
page read and write
23D4B580000
trusted library allocation
page read and write
23D586A9000
trusted library allocation
page read and write
23D55514000
trusted library allocation
page read and write
23D4F4D8000
trusted library allocation
page read and write
23D48CD7000
trusted library allocation
page read and write
23D4D887000
trusted library allocation
page read and write
22D6815D000
trusted library allocation
page read and write
23D57DC9000
trusted library allocation
page read and write
23D4B984000
trusted library allocation
page read and write
23D53FFD000
trusted library allocation
page read and write
226BC7F0000
heap
page read and write
23D4D83B000
trusted library allocation
page read and write
BC6000
heap
page read and write
23D42B4F000
heap
page read and write
23D4FADF000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D57AA0000
trusted library allocation
page read and write
23D57998000
trusted library allocation
page read and write
23D55AC2000
trusted library allocation
page read and write
23D4F47F000
trusted library allocation
page read and write
23D57DC9000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4CB33000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D57DB4000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D47A76000
trusted library allocation
page read and write
23D4F80F000
trusted library allocation
page read and write
23D57DF6000
trusted library allocation
page read and write
23D47BDA000
trusted library allocation
page read and write
2AF7D20A000
trusted library allocation
page read and write
23D586EA000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D42B2E000
heap
page read and write
23D4CA89000
trusted library allocation
page read and write
23D4D2E1000
trusted library allocation
page read and write
23D57D98000
trusted library allocation
page read and write
23D57AC9000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D42B24000
heap
page read and write
23D4DCEB000
trusted library allocation
page read and write
23D4FA2E000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D42B53000
heap
page read and write
23D4DF85000
trusted library allocation
page read and write
23D4D9CA000
trusted library allocation
page read and write
23D55A43000
trusted library allocation
page read and write
23D57AF8000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
1EEA5BB7000
heap
page read and write
23D42B0E000
heap
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D57DAE000
trusted library allocation
page read and write
23D4D86E000
trusted library allocation
page read and write
23D4FAC8000
trusted library allocation
page read and write
23D586D3000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D585B4000
trusted library allocation
page read and write
23D4FA8F000
trusted library allocation
page read and write
22D68200000
trusted library allocation
page read and write
22D68203000
trusted library allocation
page read and write
23D4F05D000
trusted library allocation
page read and write
23D4E196000
trusted library allocation
page read and write
23D4DEC9000
trusted library allocation
page read and write
23D4CA9D000
trusted library allocation
page read and write
213C7540000
heap
page read and write
23D4E47D000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D50DE8000
trusted library allocation
page read and write
23D57DB8000
trusted library allocation
page read and write
23D57DF1000
trusted library allocation
page read and write
23D42B38000
heap
page read and write
23D543A3000
trusted library allocation
page read and write
23D4E6E2000
trusted library allocation
page read and write
1CAEFDE000
stack
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D4F4FA000
trusted library allocation
page read and write
22D67D80000
heap
page read and write
23D42B21000
heap
page read and write
23D4E5C3000
trusted library allocation
page read and write
23D4F9BE000
trusted library allocation
page read and write
23D4F47F000
trusted library allocation
page read and write
23D54ACE000
trusted library allocation
page read and write
23D4C1AA000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
A61000
unkown
page execute read
226BC36B000
remote allocation
page execute read
23D4FAFB000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
213C8421000
heap
page read and write
23D4D941000
trusted library allocation
page read and write
213C8301000
heap
page read and write
23D57BE5000
trusted library allocation
page read and write
23D5510C000
trusted library allocation
page read and write
23D585BA000
trusted library allocation
page read and write
226BCA00000
trusted library allocation
page read and write
23D50C58000
trusted library allocation
page read and write
23D4BA5D000
trusted library allocation
page read and write
23D55193000
trusted library allocation
page read and write
23D4E3A0000
trusted library allocation
page read and write
23D4F940000
trusted library allocation
page read and write
23D4CF32000
trusted library allocation
page read and write
23D4CA98000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
22D68147000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B52000
heap
page read and write
23D42B49000
heap
page read and write
23D57AF6000
trusted library allocation
page read and write
185E000
stack
page read and write
23D4CFE2000
trusted library allocation
page read and write
23D48D4A000
trusted library allocation
page read and write
23D4D7B7000
trusted library allocation
page read and write
213C7719000
trusted library allocation
page read and write
23D58597000
trusted library allocation
page read and write
22D67F30000
unclassified section
page readonly
23D4E4E7000
trusted library allocation
page read and write
23D4FACC000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
213C83F1000
heap
page read and write
23D54401000
trusted library allocation
page read and write
23D47B26000
trusted library allocation
page read and write
23D4D780000
trusted library allocation
page read and write
23D57DDA000
trusted library allocation
page read and write
23D4CA91000
trusted library allocation
page read and write
23D4BD36000
trusted library allocation
page read and write
23D4B4ED000
heap
page read and write
23D4D8EE000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D4B9A1000
trusted library allocation
page read and write
23D57956000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D47B1A000
trusted library allocation
page read and write
23D4F467000
trusted library allocation
page read and write
23D4B2DB000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D4BA68000
trusted library allocation
page read and write
23D57A98000
trusted library allocation
page read and write
23D4F688000
trusted library allocation
page read and write
23D586A6000
trusted library allocation
page read and write
23D55A64000
trusted library allocation
page read and write
23D4BB71000
trusted library allocation
page read and write
23D58597000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
213C8203000
trusted library allocation
page read and write
23D48D9A000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D4E370000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B0F000
heap
page read and write
23D4CDB6000
trusted library allocation
page read and write
23D4F8D4000
trusted library allocation
page read and write
23D54097000
trusted library allocation
page read and write
23D579E8000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D57E01000
heap
page read and write
1EEA4090000
heap
page read and write
23D42B38000
heap
page read and write
23D4E3FC000
trusted library allocation
page read and write
23D4E3AE000
trusted library allocation
page read and write
226BC43F000
unclassified section
page read and write
23D42B4A000
heap
page read and write
23D42B24000
heap
page read and write
23D4E3D0000
trusted library allocation
page read and write
23D4C15A000
trusted library allocation
page read and write
23D4E6CC000
trusted library allocation
page read and write
23D4BB9A000
trusted library allocation
page read and write
23D4BEE2000
trusted library allocation
page read and write
23D4CA89000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4B4D3000
heap
page read and write
23D50DD8000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D55257000
trusted library allocation
page read and write
23D57A9C000
trusted library allocation
page read and write
B2C000
unkown
page write copy
23D57D7E000
trusted library allocation
page read and write
23D57D58000
trusted library allocation
page read and write
23D4FAAB000
trusted library allocation
page read and write
23D579E4000
trusted library allocation
page read and write
23D4D767000
trusted library allocation
page read and write
23D57BBC000
trusted library allocation
page read and write
23D4F9BC000
trusted library allocation
page read and write
23D4BB6C000
trusted library allocation
page read and write
23D4D840000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4E3C7000
trusted library allocation
page read and write
23D42B2B000
heap
page read and write
23D42B13000
heap
page read and write
23D57BEB000
trusted library allocation
page read and write
23D579E2000
trusted library allocation
page read and write
23D543E4000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D48D92000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4FABA000
trusted library allocation
page read and write
23D4B4E3000
heap
page read and write
23D42B1C000
heap
page read and write
23D4E5CF000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
BE2000
heap
page read and write
23D4C1BD000
trusted library allocation
page read and write
23D4FA8C000
trusted library allocation
page read and write
23D4BBA1000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D57A56000
trusted library allocation
page read and write
23D4FA85000
trusted library allocation
page read and write
226BC8A2000
trusted library allocation
page read and write
23D4D2B4000
trusted library allocation
page read and write
23D48DA3000
trusted library allocation
page read and write
23D4BA68000
trusted library allocation
page read and write
23D55A43000
trusted library allocation
page read and write
23D4B22A000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D42B38000
heap
page read and write
23D4BBBE000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D5798C000
trusted library allocation
page read and write
23D4F8B5000
trusted library allocation
page read and write
23D42B9C000
heap
page read and write
23D42B4F000
heap
page read and write
23D57E01000
heap
page read and write
23D4F09A000
trusted library allocation
page read and write
23D540E7000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4F808000
trusted library allocation
page read and write
23D4E69B000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D55A9C000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
BC3000
heap
page read and write
23D42B4F000
heap
page read and write
23D585AD000
trusted library allocation
page read and write
23D5799D000
trusted library allocation
page read and write
23D4E2D8000
trusted library allocation
page read and write
23D4CE54000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D42B3B000
heap
page read and write
23D4B4CF000
heap
page read and write
23D4CEC0000
trusted library allocation
page read and write
23D4B2FD000
trusted library allocation
page read and write
23D4D949000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4B4F1000
heap
page read and write
23D42B27000
heap
page read and write
23D4D299000
trusted library allocation
page read and write
23D57CC1000
trusted library allocation
page read and write
23D4CEB1000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D48DB9000
trusted library allocation
page read and write
23D4B9F8000
trusted library allocation
page read and write
213C772F000
trusted library allocation
page read and write
23D4F05D000
trusted library allocation
page read and write
23D4D2EA000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D4DD5B000
trusted library allocation
page read and write
23D55AAB000
trusted library allocation
page read and write
3B6A2E71E000
trusted library allocation
page read and write
23D4D766000
trusted library allocation
page read and write
23D4E3AA000
trusted library allocation
page read and write
23D586A9000
trusted library allocation
page read and write
23D4CFE8000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D42B4F000
heap
page read and write
23D42B3D000
heap
page read and write
23D4FAD5000
trusted library allocation
page read and write
23D4FAF5000
trusted library allocation
page read and write
23D4CE24000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4F9C3000
trusted library allocation
page read and write
23D4E489000
trusted library allocation
page read and write
23D4BD72000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4DCF2000
trusted library allocation
page read and write
23D573AD000
trusted library allocation
page read and write
23D4CD53000
trusted library allocation
page read and write
22D68110000
trusted library allocation
page read and write
344000
heap
page read and write
226BC3B0000
heap
page read and write
23D54093000
trusted library allocation
page read and write
23D56D02000
trusted library allocation
page read and write
23D54967000
trusted library allocation
page read and write
213C8429000
heap
page read and write
23D4C196000
trusted library allocation
page read and write
22D68100000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4C194000
trusted library allocation
page read and write
22D67D1E000
remote allocation
page execute read
23D57D6C000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D42B5A000
heap
page read and write
23D42B3D000
heap
page read and write
23D4E4E7000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4CBF7000
trusted library allocation
page read and write
23D4E38B000
trusted library allocation
page read and write
23D4BBA1000
trusted library allocation
page read and write
23D50CD1000
trusted library allocation
page read and write
23D4C19F000
trusted library allocation
page read and write
23D57BEC000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4CED6000
trusted library allocation
page read and write
23D4C185000
trusted library allocation
page read and write
23D4BB71000
trusted library allocation
page read and write
23D4D75F000
trusted library allocation
page read and write
22D67DFA000
heap
page read and write
23D42B29000
heap
page read and write
23D42B24000
heap
page read and write
23D4B4DF000
heap
page read and write
23D4E6A0000
trusted library allocation
page read and write
23D4F9A1000
trusted library allocation
page read and write
23D4F4D8000
trusted library allocation
page read and write
213C75BF000
unclassified section
page read and write
23D4FA45000
trusted library allocation
page read and write
23D4C15F000
trusted library allocation
page read and write
213C7777000
trusted library allocation
page read and write
23D540F7000
trusted library allocation
page read and write
23D48DF1000
trusted library allocation
page read and write
23D4C1EF000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D58643000
trusted library allocation
page read and write
23D55A85000
trusted library allocation
page read and write
23D58617000
trusted library allocation
page read and write
23D4CAE4000
trusted library allocation
page read and write
23D4CB2B000
trusted library allocation
page read and write
23D4F0EA000
trusted library allocation
page read and write
23D4E34D000
trusted library allocation
page read and write
23D55105000
trusted library allocation
page read and write
23D474B3000
trusted library allocation
page read and write
23D57E6A000
heap
page read and write
23D4FAF1000
trusted library allocation
page read and write
23D4D2E6000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
23D53F32000
trusted library allocation
page read and write
213C835C000
heap
page read and write
23D55A72000
trusted library allocation
page read and write
23D4CB8C000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4E3FC000
trusted library allocation
page read and write
23D4B2EF000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B4A000
heap
page read and write
23D4CA9D000
trusted library allocation
page read and write
23D4B963000
trusted library allocation
page read and write
23D4FAAC000
trusted library allocation
page read and write
23D4F4EF000
trusted library allocation
page read and write
BBB000
heap
page read and write
23D58556000
trusted library allocation
page read and write
23D57E71000
heap
page read and write
23D4DFEC000
trusted library allocation
page read and write
23D4CE24000
trusted library allocation
page read and write
23D4E3D0000
trusted library allocation
page read and write
23D4D763000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4D8FA000
trusted library allocation
page read and write
344000
heap
page read and write
23D42B27000
heap
page read and write
213C83E3000
heap
page read and write
23D47498000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4E491000
trusted library allocation
page read and write
23D4E445000
trusted library allocation
page read and write
1EEA418A000
heap
page read and write
23D42B5D000
heap
page read and write
23D55A4B000
trusted library allocation
page read and write
23D4BB6A000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D4CEC3000
trusted library allocation
page read and write
23D4D92F000
trusted library allocation
page read and write
21DF2E91000
trusted library allocation
page execute read
23D4B29E000
trusted library allocation
page read and write
23D48CF3000
trusted library allocation
page read and write
2AF7D100000
trusted library allocation
page read and write
23D4F075000
trusted library allocation
page read and write
23D579E0000
trusted library allocation
page read and write
23D57E4C000
heap
page read and write
23D4E6F2000
trusted library allocation
page read and write
23D4DEB7000
trusted library allocation
page read and write
23D57C2C000
trusted library allocation
page read and write
23D586BC000
trusted library allocation
page read and write
B90000
heap
page read and write
23D48AE3000
trusted library allocation
page read and write
23D50C40000
trusted library allocation
page read and write
23D4DD9F000
trusted library allocation
page read and write
23D4F4F6000
trusted library allocation
page read and write
23D4C152000
trusted library allocation
page read and write
23D540EE000
trusted library allocation
page read and write
23D4E353000
trusted library allocation
page read and write
23D585AD000
trusted library allocation
page read and write
23D4BD3D000
trusted library allocation
page read and write
23D4CEFB000
trusted library allocation
page read and write
23D4E3B7000
trusted library allocation
page read and write
23D4D226000
trusted library allocation
page read and write
226BC8B6000
trusted library allocation
page read and write
213C8360000
heap
page read and write
BE4000
heap
page read and write
226BC8AB000
trusted library allocation
page read and write
23D48D43000
trusted library allocation
page read and write
23D4F04E000
trusted library allocation
page read and write
23D4C1C4000
trusted library allocation
page read and write
23D57998000
trusted library allocation
page read and write
23D4D213000
trusted library allocation
page read and write
23D4D9C7000
trusted library allocation
page read and write
213C83E8000
heap
page read and write
23D4B4F8000
heap
page read and write
23D579E8000
trusted library allocation
page read and write
23D4BDFA000
trusted library allocation
page read and write
23D4D2FE000
trusted library allocation
page read and write
226BC432000
unclassified section
page read and write
23D4E2A0000
trusted library allocation
page read and write
23D573BD000
trusted library allocation
page read and write
23D47BDF000
trusted library allocation
page read and write
23D4C161000
trusted library allocation
page read and write
23D551AC000
trusted library allocation
page read and write
23D4F4E2000
trusted library allocation
page read and write
23D4CBA1000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4BB78000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4C191000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D4D93E000
trusted library allocation
page read and write
23D4B47B000
heap
page read and write
23D42B38000
heap
page read and write
23D4B25F000
trusted library allocation
page read and write
23D53F3A000
trusted library allocation
page read and write
23D4E489000
trusted library allocation
page read and write
23D42B3E000
heap
page read and write
23D57DAE000
trusted library allocation
page read and write
23D48D33000
trusted library allocation
page read and write
23D4FAA1000
trusted library allocation
page read and write
23D47B1E000
trusted library allocation
page read and write
23D4D7FD000
trusted library allocation
page read and write
23D4B9B5000
trusted library allocation
page read and write
23D4CD6C000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D4D96C000
trusted library allocation
page read and write
23D57974000
trusted library allocation
page read and write
AFC000
unkown
page readonly
23D42B25000
heap
page read and write
2A01FFE000
stack
page read and write
23D57A94000
trusted library allocation
page read and write
23D4F837000
trusted library allocation
page read and write
23D4CB6B000
trusted library allocation
page read and write
1EEA5BA0000
heap
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D48D89000
trusted library allocation
page read and write
213C8369000
heap
page read and write
23D4BA57000
trusted library allocation
page read and write
23D579E6000
trusted library allocation
page read and write
23D563AC000
trusted library allocation
page read and write
23D4F9CB000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D4CB27000
trusted library allocation
page read and write
22D68238000
trusted library allocation
page read and write
23D53ED6000
trusted library allocation
page read and write
23D4E3A0000
trusted library allocation
page read and write
23D53E2F000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4B4F6000
heap
page read and write
23D4E47D000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4E3FC000
trusted library allocation
page read and write
23D5855F000
trusted library allocation
page read and write
23D4D82E000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
BFD82BE000
stack
page read and write
23D4FA85000
trusted library allocation
page read and write
23D4B25F000
trusted library allocation
page read and write
23D4C15F000
trusted library allocation
page read and write
23D4D299000
trusted library allocation
page read and write
23D4F4E4000
trusted library allocation
page read and write
23D4F012000
trusted library allocation
page read and write
23D4E3AE000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D57DE3000
trusted library allocation
page read and write
23D4B4F2000
heap
page read and write
23D50CAE000
trusted library allocation
page read and write
23D50C69000
trusted library allocation
page read and write
23D48AD4000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
BD4000
heap
page read and write
23D4BBD9000
trusted library allocation
page read and write
23D4C17F000
trusted library allocation
page read and write
23D586B9000
trusted library allocation
page read and write
23D4E0A9000
trusted library allocation
page read and write
23D4BBA1000
trusted library allocation
page read and write
23D4B22A000
trusted library allocation
page read and write
23D57CD3000
trusted library allocation
page read and write
23D57AF6000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
1EEA3F80000
heap
page read and write
23D53ECB000
trusted library allocation
page read and write
61C60303000
trusted library allocation
page read and write
23D4F017000
trusted library allocation
page read and write
23D4BDD0000
trusted library allocation
page read and write
23D4CDC5000
trusted library allocation
page read and write
23D50C7E000
trusted library allocation
page read and write
23D57DFE000
trusted library allocation
page read and write
22D68112000
trusted library allocation
page read and write
23D585AA000
trusted library allocation
page read and write
23D57DDF000
trusted library allocation
page read and write
23D4E6AC000
trusted library allocation
page read and write
23D579DC000
trusted library allocation
page read and write
9FE000
stack
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D42B1F000
heap
page read and write
23D4E3AA000
trusted library allocation
page read and write
23D42B38000
heap
page read and write
23D4F9AD000
trusted library allocation
page read and write
23D57DFB000
trusted library allocation
page read and write
213C8467000
heap
page read and write
23D4D8B3000
trusted library allocation
page read and write
23D4C1B6000
trusted library allocation
page read and write
1CB123E000
unkown
page readonly
23D57DAF000
trusted library allocation
page read and write
23D53FCB000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D53FCF000
trusted library allocation
page read and write
213C83E0000
heap
page read and write
22D67DEF000
unclassified section
page read and write
23D4BB8C000
trusted library allocation
page read and write
213C7350000
unclassified section
page readonly
23D53FBF000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D57D63000
trusted library allocation
page read and write
23D57A96000
trusted library allocation
page read and write
23D4BA3F000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
1EEA4070000
heap
page read and write
213C843B000
heap
page read and write
23D586A3000
trusted library allocation
page read and write
23D4D102000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D53FCF000
trusted library allocation
page read and write
23D57F51000
heap
page read and write
23D42B1F000
heap
page read and write
23D57E47000
heap
page read and write
D0CE7FE000
unkown
page readonly
23D42B2A000
heap
page read and write
23D42B1F000
heap
page read and write
23D57BF1000
trusted library allocation
page read and write
23D57DF6000
trusted library allocation
page read and write
23D4E3C3000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4B586000
trusted library allocation
page read and write
23D4D780000
trusted library allocation
page read and write
23D4CEF2000
trusted library allocation
page read and write
213C7723000
trusted library allocation
page read and write
213C77CE000
trusted library allocation
page read and write
23D4F964000
trusted library allocation
page read and write
BFD47CE000
stack
page read and write
23D47BDF000
trusted library allocation
page read and write
23D57C9D000
trusted library allocation
page read and write
23D542E5000
trusted library allocation
page read and write
23D57DB4000
trusted library allocation
page read and write
23D4B4C9000
heap
page read and write
23D4DF08000
trusted library allocation
page read and write
23D4F017000
trusted library allocation
page read and write
23D4B21D000
trusted library allocation
page read and write
23D4FA96000
trusted library allocation
page read and write
23D4C8E5000
trusted library allocation
page read and write
23D4D2C5000
trusted library allocation
page read and write
23D586D8000
trusted library allocation
page read and write
23D4B216000
trusted library allocation
page read and write
23D57DD1000
trusted library allocation
page read and write
23D4D2E6000
trusted library allocation
page read and write
23D48CFB000
trusted library allocation
page read and write
23D4FAF5000
trusted library allocation
page read and write
23D4C1C3000
trusted library allocation
page read and write
23D4F4D8000
trusted library allocation
page read and write
23D4B4F2000
heap
page read and write
23D57D6B000
trusted library allocation
page read and write
23D4CB33000
trusted library allocation
page read and write
23D4DDB6000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4D9D2000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4F458000
trusted library allocation
page read and write
23D4F39E000
trusted library allocation
page read and write
226BC600000
trusted library allocation
page read and write
23D4CE5E000
trusted library allocation
page read and write
23D4E14B000
trusted library allocation
page read and write
22D68167000
trusted library allocation
page read and write
23D4B25F000
trusted library allocation
page read and write
23D4D766000
trusted library allocation
page read and write
23D4E5BA000
trusted library allocation
page read and write
23D57A96000
trusted library allocation
page read and write
213C83E9000
heap
page read and write
23D57DFC000
trusted library allocation
page read and write
23D4D7AF000
trusted library allocation
page read and write
23D5642E000
trusted library allocation
page read and write
213C83EC000
heap
page read and write
23D576DD000
trusted library allocation
page read and write
23D50C4A000
trusted library allocation
page read and write
23D540EE000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4B9D9000
trusted library allocation
page read and write
23D50D48000
trusted library allocation
page read and write
23D57DAB000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4E4C2000
trusted library allocation
page read and write
23D57AC9000
trusted library allocation
page read and write
213C83F1000
heap
page read and write
23D4E35B000
trusted library allocation
page read and write
23D579DA000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D53F76000
trusted library allocation
page read and write
BC9000
heap
page read and write
23D4CA97000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B2E000
heap
page read and write
23D5498A000
trusted library allocation
page read and write
23D50CA4000
trusted library allocation
page read and write
22D681B1000
trusted library allocation
page read and write
23D586BC000
trusted library allocation
page read and write
23D53FBF000
trusted library allocation
page read and write
23D48DC4000
trusted library allocation
page read and write
226BC8B2000
trusted library allocation
page read and write
23D57DDC000
trusted library allocation
page read and write
23D4D7FD000
trusted library allocation
page read and write
23D4B29E000
trusted library allocation
page read and write
23D5860E000
trusted library allocation
page read and write
23D54305000
trusted library allocation
page read and write
23D4B4CE000
heap
page read and write
23D42B25000
heap
page read and write
23D54A38000
trusted library allocation
page read and write
23D57DA6000
trusted library allocation
page read and write
23D42B30000
heap
page read and write
23D55AB7000
trusted library allocation
page read and write
23D5869F000
trusted library allocation
page read and write
23D4FA8C000
trusted library allocation
page read and write
23D4CE43000
trusted library allocation
page read and write
23D4CA84000
trusted library allocation
page read and write
23D4E3EF000
trusted library allocation
page read and write
23D4BD92000
trusted library allocation
page read and write
23D5769F000
trusted library allocation
page read and write
23D4D86E000
trusted library allocation
page read and write
BC0000
heap
page read and write
23D57CBE000
trusted library allocation
page read and write
23D4E6A2000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4F9DF000
trusted library allocation
page read and write
23D50CD7000
trusted library allocation
page read and write
22D68198000
trusted library allocation
page read and write
23D540FA000
trusted library allocation
page read and write
23D54386000
trusted library allocation
page read and write
23D4BB64000
trusted library allocation
page read and write
22D68103000
trusted library allocation
page read and write
23D4D8EE000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D53F44000
trusted library allocation
page read and write
23D4CEC4000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D57AEE000
trusted library allocation
page read and write
23D4BA68000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4B2D6000
trusted library allocation
page read and write
226BC7F6000
heap
page read and write
23D42B53000
heap
page read and write
23D4D765000
trusted library allocation
page read and write
23D4B4F2000
heap
page read and write
23D57A9E000
trusted library allocation
page read and write
23D4E3F2000
trusted library allocation
page read and write
23D4B2C1000
trusted library allocation
page read and write
23D4C89E000
trusted library allocation
page read and write
23D57695000
trusted library allocation
page read and write
23D4CA91000
trusted library allocation
page read and write
23D4B4CC000
heap
page read and write
23D4C1BA000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4BD74000
trusted library allocation
page read and write
23D576F6000
trusted library allocation
page read and write
23D4FAF5000
trusted library allocation
page read and write
23D48D4F000
trusted library allocation
page read and write
226BC2F0000
unclassified section
page readonly
23D42B2D000
heap
page read and write
23D42B3D000
heap
page read and write
23D4CAB6000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D4BBCC000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D42B4E000
heap
page read and write
23D42B2E000
heap
page read and write
23D4D83D000
trusted library allocation
page read and write
23D4E37F000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D57DC9000
trusted library allocation
page read and write
23D4D299000
trusted library allocation
page read and write
23D4F0F2000
trusted library allocation
page read and write
1CB22BE000
unkown
page readonly
23D5522C000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D42B1D000
heap
page read and write
23D53EE0000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D54700000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
226BC900000
heap
page read and write
23D42B53000
heap
page read and write
23D4BBD9000
trusted library allocation
page read and write
23D53E99000
trusted library allocation
page read and write
23D48DDE000
trusted library allocation
page read and write
23D57BF1000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4FA8C000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D4BB9D000
trusted library allocation
page read and write
23D58597000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D47BE3000
trusted library allocation
page read and write
23D56401000
trusted library allocation
page read and write
23D4B2D8000
trusted library allocation
page read and write
23D54433000
trusted library allocation
page read and write
23D42B58000
heap
page read and write
22D6816E000
trusted library allocation
page read and write
23D56DA8000
trusted library allocation
page read and write
23D4BBAC000
trusted library allocation
page read and write
213C8467000
heap
page read and write
2AF7CF50000
heap
page read and write
23D4E4F4000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D579DE000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D50CFB000
trusted library allocation
page read and write
23D579E6000
trusted library allocation
page read and write
23D50C4C000
trusted library allocation
page read and write
213C837F000
heap
page read and write
23D5636D000
trusted library allocation
page read and write
23D4D7FD000
trusted library allocation
page read and write
23D54A6D000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
226BC370000
unclassified section
page readonly
23D47AFB000
trusted library allocation
page read and write
23D4F8DC000
trusted library allocation
page read and write
23D5427B000
trusted library allocation
page read and write
23D4FAD2000
trusted library allocation
page read and write
23D4CEEE000
trusted library allocation
page read and write
23D4B4E3000
heap
page read and write
23D4D87C000
trusted library allocation
page read and write
23D4D753000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
23D4E393000
trusted library allocation
page read and write
23D4B2FD000
trusted library allocation
page read and write
1EEA4183000
heap
page read and write
23D57E01000
heap
page read and write
23D4CE82000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D57DB4000
trusted library allocation
page read and write
213C7590000
heap
page readonly
23D57C29000
trusted library allocation
page read and write
344000
heap
page read and write
23D4CA3C000
trusted library allocation
page read and write
23D4CA89000
trusted library allocation
page read and write
23D4DD9F000
trusted library allocation
page read and write
BDB000
heap
page read and write
23D42B49000
heap
page read and write
23D4E370000
trusted library allocation
page read and write
23D4F8BD000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D540FD000
trusted library allocation
page read and write
23D4D778000
trusted library allocation
page read and write
23D48D56000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D42B1F000
heap
page read and write
23D57DC7000
trusted library allocation
page read and write
23D4E34D000
trusted library allocation
page read and write
23D57AFC000
trusted library allocation
page read and write
23D4B4E8000
heap
page read and write
23D5793D000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D5867D000
trusted library allocation
page read and write
D0CDFFE000
stack
page read and write
23D4B800000
trusted library allocation
page read and write
23D57E01000
heap
page read and write
23D4B4F7000
heap
page read and write
23D42B49000
heap
page read and write
23D57934000
trusted library allocation
page read and write
23D57C59000
trusted library allocation
page read and write
23D57BC6000
trusted library allocation
page read and write
23D4E387000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
226BC849000
trusted library allocation
page read and write
D0CB49E000
stack
page read and write
23D573B9000
trusted library allocation
page read and write
23D4E4F8000
trusted library allocation
page read and write
BE2000
heap
page read and write
23D4BBAE000
trusted library allocation
page read and write
23D4E280000
trusted library allocation
page read and write
23D4E36B000
trusted library allocation
page read and write
23D4E37E000
trusted library allocation
page read and write
23D57BB7000
trusted library allocation
page read and write
23D57A45000
trusted library allocation
page read and write
213C8225000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
23D4D791000
trusted library allocation
page read and write
23D4FA19000
trusted library allocation
page read and write
23D4749E000
trusted library allocation
page read and write
23D4E2C5000
trusted library allocation
page read and write
23D57666000
trusted library allocation
page read and write
23D57DE1000
trusted library allocation
page read and write
23D50C4C000
trusted library allocation
page read and write
23D4CD76000
trusted library allocation
page read and write
23D4D949000
trusted library allocation
page read and write
BFD7ABE000
unkown
page readonly
23D4FA34000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D573AF000
trusted library allocation
page read and write
23D4E343000
trusted library allocation
page read and write
23D57666000
trusted library allocation
page read and write
23D57685000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4FAC8000
trusted library allocation
page read and write
23D4C1FC000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D4D7B7000
trusted library allocation
page read and write
23D57DF1000
trusted library allocation
page read and write
D0CBFD8000
stack
page read and write
23D4D95C000
trusted library allocation
page read and write
226BC5A0000
unclassified section
page readonly
1EEA418A000
heap
page read and write
23D4BB7C000
trusted library allocation
page read and write
23D585FD000
trusted library allocation
page read and write
23D4E479000
trusted library allocation
page read and write
23D53ED6000
trusted library allocation
page read and write
23D4CE3A000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D4E5EB000
trusted library allocation
page read and write
23D573B9000
trusted library allocation
page read and write
23D53F7F000
trusted library allocation
page read and write
23D4DF8C000
trusted library allocation
page read and write
23D4F9BE000
trusted library allocation
page read and write
23D4D966000
trusted library allocation
page read and write
23D57DDF000
trusted library allocation
page read and write
23D48C72000
trusted library allocation
page read and write
23D4C15A000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D42B27000
heap
page read and write
23D4F9D5000
trusted library allocation
page read and write
23D48E38000
trusted library allocation
page read and write
23D4E091000
trusted library allocation
page read and write
23D4BBF5000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D585F5000
trusted library allocation
page read and write
23D4D8AF000
trusted library allocation
page read and write
23D55150000
trusted library allocation
page read and write
23D58549000
trusted library allocation
page read and write
23D58616000
trusted library allocation
page read and write
23D4F9D2000
trusted library allocation
page read and write
23D4DDB9000
trusted library allocation
page read and write
23D4B9D4000
trusted library allocation
page read and write
23D4CB2D000
trusted library allocation
page read and write
23D4BD77000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D4CA91000
trusted library allocation
page read and write
23D48D7F000
trusted library allocation
page read and write
23D4F7F5000
trusted library allocation
page read and write
213C8364000
heap
page read and write
23D4D842000
trusted library allocation
page read and write
23D579FE000
trusted library allocation
page read and write
23D4E1E7000
trusted library allocation
page read and write
23D4D95C000
trusted library allocation
page read and write
23D4B2BB000
trusted library allocation
page read and write
23D563E4000
trusted library allocation
page read and write
23D57DF9000
trusted library allocation
page read and write
23D4E13B000
trusted library allocation
page read and write
23D4E3D1000
trusted library allocation
page read and write
23D4CA38000
trusted library allocation
page read and write
23D4BD7B000
trusted library allocation
page read and write
226BC813000
trusted library allocation
page read and write
23D4F881000
trusted library allocation
page read and write
22D67F20000
heap
page read and write
23D4D218000
trusted library allocation
page read and write
23D57967000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D57DF7000
trusted library allocation
page read and write
35B1000
heap
page read and write
23D42B1C000
heap
page read and write
23D57AF8000
trusted library allocation
page read and write
1EEA416D000
heap
page read and write
23D57DEE000
trusted library allocation
page read and write
23D4E445000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
213C837D000
heap
page read and write
23D4F9BE000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4E3FA000
trusted library allocation
page read and write
23D53FCB000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D50CB3000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D42B48000
heap
page read and write
23D57E01000
heap
page read and write
23D58618000
trusted library allocation
page read and write
23D57AF4000
trusted library allocation
page read and write
23D57C54000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
23D4B4E2000
heap
page read and write
23D4CADA000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
BDF000
heap
page read and write
23D579E4000
trusted library allocation
page read and write
23D4F3AE000
trusted library allocation
page read and write
23D57998000
trusted library allocation
page read and write
23D42B48000
heap
page read and write
23D55A4B000
trusted library allocation
page read and write
3B6A2E724000
trusted library allocation
page read and write
23D48AC8000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
22D6821C000
trusted library allocation
page read and write
23D4E322000
trusted library allocation
page read and write
23D4BDDA000
trusted library allocation
page read and write
23D54AF1000
trusted library allocation
page read and write
23D4D87C000
trusted library allocation
page read and write
23D4E37D000
trusted library allocation
page read and write
213C83EC000
heap
page read and write
23D57925000
trusted library allocation
page read and write
23D4CB5B000
trusted library allocation
page read and write
23D4F9DF000
trusted library allocation
page read and write
2D9000
stack
page read and write
23D5796C000
trusted library allocation
page read and write
23D50CAE000
trusted library allocation
page read and write
23D585BA000
trusted library allocation
page read and write
23D57AFC000
trusted library allocation
page read and write
23D4D210000
trusted library allocation
page read and write
BFD7A7E000
stack
page read and write
1CB32BE000
unkown
page readonly
23D4B22D000
trusted library allocation
page read and write
23D4E39E000
trusted library allocation
page read and write
23D4BA90000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4DFC1000
trusted library allocation
page read and write
22D67DF0000
heap
page read and write
213C8363000
heap
page read and write
23D4E3A0000
trusted library allocation
page read and write
23D5860E000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D47BAF000
trusted library allocation
page read and write
226BC430000
unclassified section
page read and write
23D42B4A000
heap
page read and write
1CAEEDB000
stack
page read and write
23D4F4E2000
trusted library allocation
page read and write
23D4FA38000
trusted library allocation
page read and write
23D4DDB6000
trusted library allocation
page read and write
23D4B9D4000
trusted library allocation
page read and write
23D4D86C000
trusted library allocation
page read and write
213C7710000
trusted library allocation
page read and write
226BC811000
trusted library allocation
page read and write
23D540FA000
trusted library allocation
page read and write
23D4E48D000
trusted library allocation
page read and write
23D57AC9000
trusted library allocation
page read and write
23D57C52000
trusted library allocation
page read and write
23D57DFB000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
226BC590000
heap
page read and write
23D4F4D6000
trusted library allocation
page read and write
213C73D0000
unclassified section
page readonly
23D4BB92000
trusted library allocation
page read and write
23D4D769000
trusted library allocation
page read and write
B22000
unkown
page readonly
2AF7CFDA000
heap
page read and write
23D57BC8000
trusted library allocation
page read and write
23D543AC000
trusted library allocation
page read and write
23D4DD90000
trusted library allocation
page read and write
23D48AC8000
trusted library allocation
page read and write
23D4E2D8000
trusted library allocation
page read and write
23D57D6B000
trusted library allocation
page read and write
23D474A6000
trusted library allocation
page read and write
23D57DDA000
trusted library allocation
page read and write
22D68370000
heap
page read and write
23D4D798000
trusted library allocation
page read and write
23D48DBE000
trusted library allocation
page read and write
23D4E2D3000
trusted library allocation
page read and write
23D57CD3000
trusted library allocation
page read and write
23D57DC7000
trusted library allocation
page read and write
23D58618000
trusted library allocation
page read and write
23D47C00000
trusted library allocation
page read and write
23D4E4CD000
trusted library allocation
page read and write
226BC824000
trusted library allocation
page read and write
23D57C10000
trusted library allocation
page read and write
23D48DDD000
trusted library allocation
page read and write
23D54905000
trusted library allocation
page read and write
213C83FC000
heap
page read and write
23D57C70000
trusted library allocation
page read and write
23D53FF2000
trusted library allocation
page read and write
23D4F4D1000
trusted library allocation
page read and write
226BC8F6000
trusted library allocation
page read and write
23D4C8CE000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D57AF0000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
23D4C144000
trusted library allocation
page read and write
22D67DE2000
unclassified section
page read and write
23D4BBBB000
trusted library allocation
page read and write
23D586BF000
trusted library allocation
page read and write
23D586CE000
trusted library allocation
page read and write
23D48D96000
trusted library allocation
page read and write
23D4E49B000
trusted library allocation
page read and write
BDD000
heap
page read and write
23D474C9000
trusted library allocation
page read and write
213C7715000
trusted library allocation
page read and write
23D55186000
trusted library allocation
page read and write
23D57A9A000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D54100000
trusted library allocation
page read and write
23D540B3000
trusted library allocation
page read and write
23D57100000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4CAC0000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
213C8445000
heap
page read and write
23D4CADF000
trusted library allocation
page read and write
23D47B17000
trusted library allocation
page read and write
23D42B53000
heap
page read and write
23D4B4F2000
heap
page read and write
23D42B2D000
heap
page read and write
23D4D7CA000
trusted library allocation
page read and write
23D4E2D8000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4B4E2000
heap
page read and write
23D4E4E7000
trusted library allocation
page read and write
23D4E387000
trusted library allocation
page read and write
23D540E9000
trusted library allocation
page read and write
23D4D7CA000
trusted library allocation
page read and write
23D4BA68000
trusted library allocation
page read and write
23D42B54000
heap
page read and write
23D53F6C000
trusted library allocation
page read and write
23D48D50000
trusted library allocation
page read and write
23D57D98000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D4BBD9000
trusted library allocation
page read and write
23D53FBF000
trusted library allocation
page read and write
23D57AFE000
trusted library allocation
page read and write
23D54406000
trusted library allocation
page read and write
23D585E3000
trusted library allocation
page read and write
23D57A98000
trusted library allocation
page read and write
23D4D7C5000
trusted library allocation
page read and write
23D4CFFD000
trusted library allocation
page read and write
23D42B4C000
heap
page read and write
23D4F95E000
trusted library allocation
page read and write
23D4CBFC000
trusted library allocation
page read and write
23D57326000
trusted library allocation
page read and write
213C83E6000
heap
page read and write
23D576F6000
trusted library allocation
page read and write
213C8445000
heap
page read and write
23D4CB5B000
trusted library allocation
page read and write
23D55800000
trusted library allocation
page read and write
23D585D1000
trusted library allocation
page read and write
23D4E5B6000
trusted library allocation
page read and write
23D4E36B000
trusted library allocation
page read and write
23D4DF74000
trusted library allocation
page read and write
23D4CEA0000
trusted library allocation
page read and write
23D4F038000
trusted library allocation
page read and write
23D4F4DA000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D4E4F8000
trusted library allocation
page read and write
23D5798C000
trusted library allocation
page read and write
23D4E4CF000
trusted library allocation
page read and write
23D54093000
trusted library allocation
page read and write
23D4B984000
trusted library allocation
page read and write
23D4BB92000
trusted library allocation
page read and write
23D4D700000
trusted library allocation
page read and write
23D586A3000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4D9BD000
trusted library allocation
page read and write
BFD61FE000
stack
page read and write
23D4C8C2000
trusted library allocation
page read and write
23D42B1F000
heap
page read and write
23D42B2D000
heap
page read and write
23D4CBF2000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D57974000
trusted library allocation
page read and write
23D4B4F4000
heap
page read and write
23D4E585000
trusted library allocation
page read and write
23D4B582000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D4B2FD000
trusted library allocation
page read and write
23D4BD46000
trusted library allocation
page read and write
23D4F0A5000
trusted library allocation
page read and write
23D4F8F8000
trusted library allocation
page read and write
23D4D7C5000
trusted library allocation
page read and write
BFD470B000
stack
page read and write
23D42B1D000
heap
page read and write
23D42B2A000
heap
page read and write
23D4D244000
trusted library allocation
page read and write
23D57AC6000
trusted library allocation
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D573E4000
trusted library allocation
page read and write
23D4C108000
trusted library allocation
page read and write
23D5862D000
trusted library allocation
page read and write
23D4F3B9000
trusted library allocation
page read and write
23D540FD000
trusted library allocation
page read and write
23D4BBC2000
trusted library allocation
page read and write
23D57D5C000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D4D7BE000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D53FFD000
trusted library allocation
page read and write
23D4C1A2000
trusted library allocation
page read and write
23D4B24E000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D42B3D000
heap
page read and write
23D53FFA000
trusted library allocation
page read and write
23D58614000
trusted library allocation
page read and write
23D4D83D000
trusted library allocation
page read and write
23D58622000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D573E2000
trusted library allocation
page read and write
23D57AC6000
trusted library allocation
page read and write
23D4F8BD000
trusted library allocation
page read and write
23D4D7CA000
trusted library allocation
page read and write
23D586EE000
trusted library allocation
page read and write
23D4D8F7000
trusted library allocation
page read and write
23D4FAD3000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4CA7E000
trusted library allocation
page read and write
23D54348000
trusted library allocation
page read and write
23D53F6C000
trusted library allocation
page read and write
23D57AA0000
trusted library allocation
page read and write
23D4CB7C000
trusted library allocation
page read and write
23D57D84000
trusted library allocation
page read and write
23D57DFB000
trusted library allocation
page read and write
23D42B4A000
heap
page read and write
23D42B0F000
heap
page read and write
23D42B4A000
heap
page read and write
23D585F5000
trusted library allocation
page read and write
23D4E09D000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D4E3A8000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D4BDDA000
trusted library allocation
page read and write
23D4E19B000
trusted library allocation
page read and write
23D4CF3B000
trusted library allocation
page read and write
23D57E35000
heap
page read and write
23D48CCF000
trusted library allocation
page read and write
23D55AB7000
trusted library allocation
page read and write
23D48DA5000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D4E14B000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4D842000
trusted library allocation
page read and write
23D4FABA000
trusted library allocation
page read and write
23D4C17F000
trusted library allocation
page read and write
23D55A6B000
trusted library allocation
page read and write
23D4F9CB000
trusted library allocation
page read and write
23D57A96000
trusted library allocation
page read and write
23D53E93000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
23D585D1000
trusted library allocation
page read and write
23D42B4B000
heap
page read and write
23D4F0AA000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
AFC000
unkown
page readonly
23D4F4F6000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4BA21000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D58606000
trusted library allocation
page read and write
23D53F4C000
trusted library allocation
page read and write
23D4E4AE000
trusted library allocation
page read and write
23D4BAA0000
trusted library allocation
page read and write
23D4BA64000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D4FAFB000
trusted library allocation
page read and write
23D4E61C000
trusted library allocation
page read and write
23D573E8000
trusted library allocation
page read and write
23D4B2DA000
trusted library allocation
page read and write
23D5514D000
trusted library allocation
page read and write
23D4CADD000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4F8D8000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4E6ED000
trusted library allocation
page read and write
23D4D2F9000
trusted library allocation
page read and write
23D5766C000
trusted library allocation
page read and write
23D540F7000
trusted library allocation
page read and write
23D4F94A000
trusted library allocation
page read and write
23D4E370000
trusted library allocation
page read and write
23D586C9000
trusted library allocation
page read and write
23D53F76000
trusted library allocation
page read and write
23D55A9C000
trusted library allocation
page read and write
23D5852C000
trusted library allocation
page read and write
23D4BAD6000
trusted library allocation
page read and write
23D4DF85000
trusted library allocation
page read and write
23D4CB33000
trusted library allocation
page read and write
23D57DC1000
trusted library allocation
page read and write
23D4F4EF000
trusted library allocation
page read and write
23D579DC000
trusted library allocation
page read and write
23D4E1F9000
trusted library allocation
page read and write
23D48D41000
trusted library allocation
page read and write
213C83F2000
heap
page read and write
23D4F0FA000
trusted library allocation
page read and write
23D57AD5000
trusted library allocation
page read and write
23D4E623000
trusted library allocation
page read and write
23D42B25000
heap
page read and write
23D4F8F2000
trusted library allocation
page read and write
23D53FCB000
trusted library allocation
page read and write
23D4B929000
trusted library allocation
page read and write
23D4F8BF000
trusted library allocation
page read and write
23D573F5000
trusted library allocation
page read and write
23D57DC4000
trusted library allocation
page read and write
23D42B2B000
heap
page read and write
23D50C7E000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D57A56000
trusted library allocation
page read and write
23D53FCF000
trusted library allocation
page read and write
23D4E389000
trusted library allocation
page read and write
23D4D9A7000
trusted library allocation
page read and write
23D4B233000
trusted library allocation
page read and write
23D53E99000
trusted library allocation
page read and write
23D53EF7000
trusted library allocation
page read and write
23D4F4EF000
trusted library allocation
page read and write
213C776F000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4BB8C000
trusted library allocation
page read and write
23D55A87000
trusted library allocation
page read and write
23D42B31000
heap
page read and write
23D42B4F000
heap
page read and write
23D4D8E6000
trusted library allocation
page read and write
23D4BA40000
trusted library allocation
page read and write
23D57DAB000
trusted library allocation
page read and write
23D58611000
trusted library allocation
page read and write
23D57D89000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
22D68219000
trusted library allocation
page read and write
23D4FAAC000
trusted library allocation
page read and write
23D4748A000
trusted library allocation
page read and write
23D47BF0000
trusted library allocation
page read and write
23D57CA8000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D4D235000
trusted library allocation
page read and write
2A007FE000
stack
page read and write
23D4D10A000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D57954000
trusted library allocation
page read and write
23D57654000
trusted library allocation
page read and write
23D4BDF9000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4F699000
trusted library allocation
page read and write
213C83B9000
heap
page read and write
23D586D8000
trusted library allocation
page read and write
23D53EB9000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4CA84000
trusted library allocation
page read and write
23D4BA48000
trusted library allocation
page read and write
23D42B38000
heap
page read and write
23D57954000
trusted library allocation
page read and write
226BC440000
heap
page read and write
23D586A6000
trusted library allocation
page read and write
23D50CB3000
trusted library allocation
page read and write
23D585FB000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
1EEA5BA7000
heap
page read and write
D0CEFFE000
stack
page read and write
23D579DC000
trusted library allocation
page read and write
23D4C18F000
trusted library allocation
page read and write
23D42B1C000
heap
page read and write
23D4E38B000
trusted library allocation
page read and write
23D4DEF2000
trusted library allocation
page read and write
23D42B5A000
heap
page read and write
23D4BB90000
trusted library allocation
page read and write
23D4E451000
trusted library allocation
page read and write
23D42B0F000
heap
page read and write
23D4E172000
trusted library allocation
page read and write
23D42B4E000
heap
page read and write
23D4B9A1000
trusted library allocation
page read and write
22D67FA0000
heap
page read and write
23D57AF6000
trusted library allocation
page read and write
23D4B21A000
trusted library allocation
page read and write
23D4CE5C000
trusted library allocation
page read and write
23D4C1A4000
trusted library allocation
page read and write
23D42B15000
heap
page read and write
23D586D3000
trusted library allocation
page read and write
23D57BDB000
trusted library allocation
page read and write
23D4E656000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D57DEA000
trusted library allocation
page read and write
23D573B7000
trusted library allocation
page read and write
23D4CB59000
trusted library allocation
page read and write
23D4D8B3000
trusted library allocation
page read and write
23D585B1000
trusted library allocation
page read and write
23D4E396000
trusted library allocation
page read and write
23D57DDF000
trusted library allocation
page read and write
23D48DBB000
trusted library allocation
page read and write
23D55AA3000
trusted library allocation
page read and write
23D48AEA000
trusted library allocation
page read and write
23D4F95E000
trusted library allocation
page read and write
21DF2E70000
trusted library allocation
page execute read
23D4D7CA000
trusted library allocation
page read and write
23D4D2B8000
trusted library allocation
page read and write
23D4B9B8000
trusted library allocation
page read and write
23D53F4A000
trusted library allocation
page read and write
23D4C133000
trusted library allocation
page read and write
23D4BB6A000
trusted library allocation
page read and write
23D4D798000
trusted library allocation
page read and write
23D4F93C000
trusted library allocation
page read and write
23D54307000
trusted library allocation
page read and write
23D4BBBB000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D42B1D000
heap
page read and write
23D42B49000
heap
page read and write
23D42B1F000
heap
page read and write
23D48DF6000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D42B5D000
heap
page read and write
23D576DD000
trusted library allocation
page read and write
23D4F4D6000
trusted library allocation
page read and write
23D5491C000
trusted library allocation
page read and write
23D4CD61000
trusted library allocation
page read and write
2A017FE000
stack
page read and write
23D42B15000
heap
page read and write
23D4F9C3000
trusted library allocation
page read and write
23D4DF10000
trusted library allocation
page read and write
23D4DE51000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D42B24000
heap
page read and write
22D68000000
trusted library allocation
page read and write
23D54093000
trusted library allocation
page read and write
226BCA03000
trusted library allocation
page read and write
23D4B58D000
trusted library allocation
page read and write
23D47BA7000
trusted library allocation
page read and write
23D42B4F000
heap
page read and write
23D57FC2000
heap
page read and write
23D47BFE000
trusted library allocation
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D4D7C1000
trusted library allocation
page read and write
D0CB59E000
stack
page read and write
23D579E4000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4DF74000
trusted library allocation
page read and write
23D4FAE3000
trusted library allocation
page read and write
23D585AA000
trusted library allocation
page read and write
23D42B50000
heap
page read and write
23D42B52000
heap
page read and write
23D50C4C000
trusted library allocation
page read and write
23D4CB7C000
trusted library allocation
page read and write
23D42B5D000
heap
page read and write
23D4D238000
trusted library allocation
page read and write
23D4FA93000
trusted library allocation
page read and write
23D57DF6000
trusted library allocation
page read and write
23D4F4D1000
trusted library allocation
page read and write
23D579E8000
trusted library allocation
page read and write
23D4E36B000
trusted library allocation
page read and write
23D57BE5000
trusted library allocation
page read and write
23D579DE000
trusted library allocation
page read and write
23D4B4D6000
heap
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D4E56A000
trusted library allocation
page read and write
BFD8ABE000
unkown
page readonly
23D4C199000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D4D244000
trusted library allocation
page read and write
23D540FD000
trusted library allocation
page read and write
23D58533000
trusted library allocation
page read and write
23D4E3CF000
trusted library allocation
page read and write
23D4BA85000
trusted library allocation
page read and write
23D58593000
trusted library allocation
page read and write
23D4D840000
trusted library allocation
page read and write
23D4B561000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4CEBC000
trusted library allocation
page read and write
23D4D2FE000
trusted library allocation
page read and write
145E000
stack
page read and write
23D4B2BF000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4CAAC000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
23D50CD1000
trusted library allocation
page read and write
226BC800000
trusted library allocation
page read and write
2AF7D3A0000
heap
page read and write
23D42B1D000
heap
page read and write
23D4F820000
trusted library allocation
page read and write
23D4B29A000
trusted library allocation
page read and write
23D4F9DF000
trusted library allocation
page read and write
22D67DD0000
heap
page readonly
23D4C8E7000
trusted library allocation
page read and write
23D4B2CC000
trusted library allocation
page read and write
23D4FABA000
trusted library allocation
page read and write
23D48DBB000
trusted library allocation
page read and write
23D4F940000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4E1EF000
trusted library allocation
page read and write
23D4BBA8000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D42B52000
heap
page read and write
23D4B29A000
trusted library allocation
page read and write
23D42B2D000
heap
page read and write
23D4D76C000
trusted library allocation
page read and write
23D4CEA5000
trusted library allocation
page read and write
23D42B27000
heap
page read and write
23D4CA04000
trusted library allocation
page read and write
23D4F09A000
trusted library allocation
page read and write
23D4D886000
trusted library allocation
page read and write
23D4CB59000
trusted library allocation
page read and write
23D585E3000
trusted library allocation
page read and write
23D4BBE2000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4E397000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
23D4E4CF000
trusted library allocation
page read and write
22D681A5000
trusted library allocation
page read and write
23D4B232000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D50C84000
trusted library allocation
page read and write
23D4F4FA000
trusted library allocation
page read and write
23D57DAE000
trusted library allocation
page read and write
23D4BB6C000
trusted library allocation
page read and write
23D53F6C000
trusted library allocation
page read and write
213C83F1000
heap
page read and write
23D4E11C000
trusted library allocation
page read and write
22D6812E000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
23D42B57000
heap
page read and write
23D4E0AD000
trusted library allocation
page read and write
23D42B1D000
heap
page read and write
23D42B2D000
heap
page read and write
23D4F6D0000
trusted library allocation
page read and write
23D4CA89000
trusted library allocation
page read and write
23D53FF8000
trusted library allocation
page read and write
213C75D4000
heap
page read and write
23D4D738000
trusted library allocation
page read and write
226BC7F4000
heap
page read and write
23D4B25F000
trusted library allocation
page read and write
23D42B1E000
heap
page read and write
23D4F6E0000
trusted library allocation
page read and write
23D57CF6000
trusted library allocation
page read and write
23D4BDF1000
trusted library allocation
page read and write
23D4D2FB000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
22D67D60000
heap
page read and write
23D4E3C3000
trusted library allocation
page read and write
23D53F00000
trusted library allocation
page read and write
23D57D7E000
trusted library allocation
page read and write
23D586B0000
trusted library allocation
page read and write
23D47B7E000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D551E4000
trusted library allocation
page read and write
23D4FA36000
trusted library allocation
page read and write
23D585B4000
trusted library allocation
page read and write
23D4B47D000
heap
page read and write
23D4CA84000
trusted library allocation
page read and write
23D4FA93000
trusted library allocation
page read and write
23D4E2DD000
trusted library allocation
page read and write
23D57DE7000
trusted library allocation
page read and write
23D48A53000
trusted library allocation
page read and write
213C77BC000
trusted library allocation
page read and write
23D4E38B000
trusted library allocation
page read and write
23D58595000
trusted library allocation
page read and write
23D4D235000
trusted library allocation
page read and write
23D4BAA7000
trusted library allocation
page read and write
23D4BB49000
trusted library allocation
page read and write
23D42B9B000
heap
page read and write
23D4F8D4000
trusted library allocation
page read and write
23D4F0AD000
trusted library allocation
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D4D876000
trusted library allocation
page read and write
2A7FDFF000
stack
page read and write
23D4D771000
trusted library allocation
page read and write
23D4BB7E000
trusted library allocation
page read and write
23D4DFDC000
trusted library allocation
page read and write
23D4F467000
trusted library allocation
page read and write
23D4E3B1000
trusted library allocation
page read and write
23D4E11C000
trusted library allocation
page read and write
23D57DE7000
trusted library allocation
page read and write
23D4E1E2000
trusted library allocation
page read and write
23D42B29000
heap
page read and write
23D57FC2000
heap
page read and write
23D42B2D000
heap
page read and write
23D42B24000
heap
page read and write
23D4CFFD000
trusted library allocation
page read and write
23D4B4E3000
heap
page read and write
23D42B1D000
heap
page read and write
23D579E0000
trusted library allocation
page read and write
23D4B941000
trusted library allocation
page read and write
23D540D6000
trusted library allocation
page read and write
23D42B57000
heap
page read and write
23D4F835000
trusted library allocation
page read and write
23D4CF1E000
trusted library allocation
page read and write
23D42B49000
heap
page read and write
23D4B9D4000
trusted library allocation
page read and write
23D540EE000
trusted library allocation
page read and write
23D56343000
trusted library allocation
page read and write
23D57DA9000
trusted library allocation
page read and write
23D5860F000
trusted library allocation
page read and write
23D4FADF000
trusted library allocation
page read and write
23D50CAE000
trusted library allocation
page read and write
23D5858C000
trusted library allocation
page read and write
23D4FAAF000
trusted library allocation
page read and write
23D4CAF6000
trusted library allocation
page read and write
23D4D2C5000
trusted library allocation
page read and write
23D579DA000
trusted library allocation
page read and write
23D579DA000
trusted library allocation
page read and write
23D4BA4C000
trusted library allocation
page read and write
23D579AD000
trusted library allocation
page read and write
23D42B1A000
heap
page read and write
213C8459000
heap
page read and write
23D4D296000
trusted library allocation
page read and write
23D4E353000
trusted library allocation
page read and write
23D53FF8000
trusted library allocation
page read and write
23D4FAFD000
trusted library allocation
page read and write
213C73F0000
heap
page read and write
23D4E4F8000
trusted library allocation
page read and write
226BC876000
trusted library allocation
page read and write
23D42B24000
heap
page read and write
23D4D7CA000
trusted library allocation
page read and write
23D4B271000
trusted library allocation
page read and write
23D4E39E000
trusted library allocation
page read and write
23D4BA7F000
trusted library allocation
page read and write
23D54090000
trusted library allocation
page read and write
FE5CFFE000
stack
page read and write
23D48CEF000
trusted library allocation
page read and write
23D53F7F000
trusted library allocation
page read and write
23D4CEFD000
trusted library allocation
page read and write
23D4CDAD000
trusted library allocation
page read and write
23D4F0A2000
trusted library allocation
page read and write
23D47BE3000
trusted library allocation
page read and write
23D54380000
trusted library allocation
page read and write
23D42B3D000
heap
page read and write
213C835F000
heap
page read and write
23D3DA63000
heap
page read and write
23D42B1D000
heap
page read and write
23D4D833000
trusted library allocation
page read and write
23D4E4B2000
trusted library allocation
page read and write
23D4D85B000
trusted library allocation
page read and write
23D57EB8000
heap
page read and write
23D4CAF0000
trusted library allocation
page read and write
23D4FAB1000
trusted library allocation
page read and write
23D4E3F2000
trusted library allocation
page read and write
23D42B3B000
heap
page read and write
D0CB55E000
unkown
page readonly
23D4CA60000
trusted library allocation
page read and write
23D4C138000
trusted library allocation
page read and write
23D42B40000
heap
page read and write
23D42B4E000
heap
page read and write
23D4CE56000
trusted library allocation
page read and write
23D47490000
trusted library allocation
page read and write
1EEA5BB5000
heap
page read and write
23D55A64000
trusted library allocation
page read and write
23D4D821000
trusted library allocation
page read and write
23D42B52000
heap
page read and write
23D4FA85000
trusted library allocation
page read and write
23D4E358000
trusted library allocation
page read and write
23D4BDCA000
trusted library allocation
page read and write
23D4BB81000
trusted library allocation
page read and write
23D42B5B000
heap
page read and write
23D42B3D000
heap
page read and write
1CB09FE000
stack
page read and write
23D53FCB000
trusted library allocation
page read and write
23D4E4F4000
trusted library allocation
page read and write
23D42B0E000
heap
page read and write
23D42B53000
heap
page read and write
23D586D6000
trusted library allocation
page read and write
23D4E396000
trusted library allocation
page read and write
23D4D273000
trusted library allocation
page read and write
23D42B2E000
heap
page read and write
23D48D47000
trusted library allocation
page read and write
23D55141000
trusted library allocation
page read and write
23D585C7000
trusted library allocation
page read and write
23D57E8C000
heap
page read and write
23D4E1D2000
trusted library allocation
page read and write
23D4D83B000
trusted library allocation
page read and write
23D4D798000
trusted library allocation
page read and write
23D4B4D3000
heap
page read and write
23D4BB85000
trusted library allocation
page read and write
23D540C1000
trusted library allocation
page read and write
23D5511C000
trusted library allocation
page read and write
23D585B4000
trusted library allocation
page read and write
23D4CFFA000
trusted library allocation
page read and write
23D42B22000
heap
page read and write
There are 3794 hidden memdumps, click here to show them.