IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2b1537bb-c451-4845-8722-2557b2f6c92c.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2b1537bb-c451-4845-8722-2557b2f6c92c.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ccd71-570b-4ec6-9efb-49c2bc0fae2b} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b434a6dd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4492 -parentBuildID 20230927232528 -prefsHandle 4484 -prefMapHandle 4480 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69ecc336-1658-46c0-bf13-e6d8ee36fde7} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b44571ce10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b99be95-6a32-4891-a374-7f066e98cf3f} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b446b75b10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2B4482C4000
trusted library allocation
page read and write
2B45149C000
trusted library allocation
page read and write
2B4509B2000
trusted library allocation
page read and write
2B446BAC000
trusted library allocation
page read and write
2B446710000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B448DBC000
trusted library allocation
page read and write
2B43B884000
heap
page read and write
2B44496F000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4451EC000
trusted library allocation
page read and write
2B4469E3000
trusted library allocation
page read and write
2B44721C000
trusted library allocation
page read and write
2B450C78000
heap
page read and write
2B44746F000
trusted library allocation
page read and write
2B4477A8000
trusted library allocation
page read and write
2B444B63000
trusted library allocation
page read and write
2B44C9E1000
trusted library allocation
page read and write
19AD1420000
trusted library allocation
page read and write
2B44CAF9000
trusted library allocation
page read and write
2B4469F9000
trusted library allocation
page read and write
1D11DDA0000
heap
page read and write
2B4468EE000
trusted library allocation
page read and write
2B44771C000
trusted library allocation
page read and write
2B445ED9000
trusted library allocation
page read and write
2B4447F4000
trusted library allocation
page read and write
2B44437A000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B447762000
trusted library allocation
page read and write
2B450684000
trusted library allocation
page read and write
1D11EC6C000
heap
page read and write
2B450953000
trusted library allocation
page read and write
2B446A1E000
trusted library allocation
page read and write
2B4449F1000
trusted library allocation
page read and write
2B446D4C000
trusted library allocation
page read and write
2B4450C6000
trusted library allocation
page read and write
2B4421A5000
heap
page read and write
1235000
heap
page read and write
2B445865000
trusted library allocation
page read and write
2B451459000
trusted library allocation
page read and write
2B44746B000
trusted library allocation
page read and write
208D2F90000
heap
page read and write
2B43B882000
heap
page read and write
2B451459000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B43B857000
heap
page read and write
2B43B851000
heap
page read and write
2B44C948000
trusted library allocation
page read and write
2B4449C9000
trusted library allocation
page read and write
2B445012000
trusted library allocation
page read and write
2B44CC97000
trusted library allocation
page read and write
19AD140C000
trusted library allocation
page read and write
2B45120D000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CB93000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
36F0000
trusted library allocation
page read and write
2B4450C2000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B450C7C000
heap
page read and write
2B444B98000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B450370000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
1D11EC44000
heap
page read and write
2B43B89E000
heap
page read and write
2B45154E000
trusted library allocation
page read and write
2B442B9C000
trusted library allocation
page read and write
2B445EAF000
trusted library allocation
page read and write
2B4409E4000
trusted library allocation
page read and write
2B45123E000
trusted library allocation
page read and write
2B44244C000
trusted library allocation
page read and write
2B4481C2000
trusted library allocation
page read and write
2B45149A000
trusted library allocation
page read and write
2B4466F7000
trusted library allocation
page read and write
2B44C91D000
trusted library allocation
page read and write
2B4481FB000
trusted library allocation
page read and write
2B44C79B000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B44C7D5000
trusted library allocation
page read and write
2B45123E000
trusted library allocation
page read and write
2B45098F000
trusted library allocation
page read and write
2B445785000
trusted library allocation
page read and write
2B43B85C000
heap
page read and write
2B43B897000
heap
page read and write
2B43B860000
heap
page read and write
2B4482D9000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B450340000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B43B89D000
heap
page read and write
2B43B860000
heap
page read and write
2B43B8BF000
heap
page read and write
2B44F02F000
trusted library allocation
page read and write
2B451255000
trusted library allocation
page read and write
1154000
heap
page read and write
2B43B898000
heap
page read and write
2B43B8C7000
heap
page read and write
2B445F81000
trusted library allocation
page read and write
2B446BA2000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B4515D1000
trusted library allocation
page read and write
2B448893000
trusted library allocation
page read and write
2B44723C000
trusted library allocation
page read and write
2B4473E0000
trusted library allocation
page read and write
2B451488000
trusted library allocation
page read and write
2B4477E3000
trusted library allocation
page read and write
2B44F201000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B4474E6000
trusted library allocation
page read and write
2B444CC3000
trusted library allocation
page read and write
1D11EB7D000
heap
page read and write
2B451486000
trusted library allocation
page read and write
2B4463EE000
trusted library allocation
page read and write
2B4444DA000
trusted library allocation
page read and write
2B445A3A000
trusted library allocation
page read and write
2B442B66000
trusted library allocation
page read and write
1ECE000
stack
page read and write
2B4472D9000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4450F9000
trusted library allocation
page read and write
2B446624000
trusted library allocation
page read and write
19AD12C9000
trusted library allocation
page read and write
2B4469F1000
trusted library allocation
page read and write
B9B19FE000
stack
page read and write
2B44C7DB000
trusted library allocation
page read and write
2B4460E8000
trusted library allocation
page read and write
2B445E66000
trusted library allocation
page read and write
2B447778000
trusted library allocation
page read and write
2B44097F000
trusted library allocation
page read and write
2B44C9F1000
trusted library allocation
page read and write
2B43B87D000
heap
page read and write
2B444721000
trusted library allocation
page read and write
1D11DF86000
trusted library allocation
page read and write
2B44672F000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B4466F5000
trusted library allocation
page read and write
2B440990000
trusted library allocation
page read and write
2B448FC8000
trusted library allocation
page read and write
2B4458EC000
trusted library allocation
page read and write
2B4449E2000
trusted library allocation
page read and write
2B445FAF000
trusted library allocation
page read and write
2B44471D000
trusted library allocation
page read and write
2B44C969000
trusted library allocation
page read and write
2B4474E3000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B446443000
trusted library allocation
page read and write
2B447425000
trusted library allocation
page read and write
2B442176000
heap
page read and write
2B442186000
heap
page read and write
2B43B881000
heap
page read and write
2B441E37000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B87C000
heap
page read and write
1D11EB6C000
heap
page read and write
2B43B896000
heap
page read and write
2B44C99A000
trusted library allocation
page read and write
2B4506ED000
trusted library allocation
page read and write
2B43B864000
heap
page read and write
2B446D45000
trusted library allocation
page read and write
B77E0FD000
stack
page read and write
2B446BAA000
trusted library allocation
page read and write
2B44C8E6000
trusted library allocation
page read and write
2B4449B1000
trusted library allocation
page read and write
2B44CA8A000
trusted library allocation
page read and write
19AD1266000
trusted library allocation
page read and write
2B4421A0000
heap
page read and write
2B43B858000
heap
page read and write
2B441E24000
trusted library allocation
page read and write
2B4449C7000
trusted library allocation
page read and write
2959A450000
heap
page read and write
2B44C968000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
1D11EC58000
heap
page read and write
2B4474ED000
trusted library allocation
page read and write
2B445EF1000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B445AB4000
trusted library allocation
page read and write
2B44CB06000
trusted library allocation
page read and write
2B4490AC000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
B9AF9FA000
stack
page read and write
2B43B868000
heap
page read and write
2B450386000
trusted library allocation
page read and write
2B449101000
trusted library allocation
page read and write
2B44EED5000
trusted library allocation
page read and write
2B44608C000
trusted library allocation
page read and write
2B449157000
trusted library allocation
page read and write
2B4515A8000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B4514E3000
trusted library allocation
page read and write
19AD105A000
heap
page read and write
2B444A00000
trusted library allocation
page read and write
2B446757000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B44697F000
trusted library allocation
page read and write
2B44649E000
trusted library allocation
page read and write
2B43B868000
heap
page read and write
2B446D87000
trusted library allocation
page read and write
2B43B89B000
heap
page read and write
2B448360000
trusted library allocation
page read and write
2B442178000
heap
page read and write
2B447432000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B450BF6000
heap
page read and write
2B43B885000
heap
page read and write
2B442B8C000
trusted library allocation
page read and write
2B440B23000
trusted library allocation
page read and write
2B44219B000
heap
page read and write
2B43B884000
heap
page read and write
2B43B8C6000
heap
page read and write
2B43B87C000
heap
page read and write
2B43B87A000
heap
page read and write
2B4481CD000
trusted library allocation
page read and write
2B447418000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B44904D000
trusted library allocation
page read and write
2B445ED9000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B445E2D000
trusted library allocation
page read and write
2B444476000
trusted library allocation
page read and write
2B44219D000
heap
page read and write
2B445A6E000
trusted library allocation
page read and write
2B450340000
trusted library allocation
page read and write
2B44912E000
trusted library allocation
page read and write
2B444480000
trusted library allocation
page read and write
2B4457A5000
trusted library allocation
page read and write
2B444CFC000
trusted library allocation
page read and write
2B444BD2000
trusted library allocation
page read and write
2B44C91D000
trusted library allocation
page read and write
2B4483CD000
trusted library allocation
page read and write
1D11EB60000
heap
page read and write
2B4474EB000
trusted library allocation
page read and write
2B4453CB000
trusted library allocation
page read and write
2B446CE0000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
11A0000
heap
page read and write
2B44670F000
trusted library allocation
page read and write
2B44CE0F000
trusted library allocation
page read and write
2B446A3A000
trusted library allocation
page read and write
2B450697000
trusted library allocation
page read and write
2B4449F0000
trusted library allocation
page read and write
2B4464AF000
trusted library allocation
page read and write
2B4515CF000
trusted library allocation
page read and write
2B4469CB000
trusted library allocation
page read and write
2B4473DC000
trusted library allocation
page read and write
2B444CB9000
trusted library allocation
page read and write
2B44CD16000
trusted library allocation
page read and write
2B4481D8000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B445AC3000
trusted library allocation
page read and write
1D11EBE8000
heap
page read and write
2B43B852000
heap
page read and write
105E000
stack
page read and write
2B44CAE1000
trusted library allocation
page read and write
2B446D4D000
trusted library allocation
page read and write
2B4466AF000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
1D11EB09000
heap
page read and write
2B44676F000
trusted library allocation
page read and write
19AD1410000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B44F137000
trusted library allocation
page read and write
2B4477A5000
trusted library allocation
page read and write
2B4466E9000
trusted library allocation
page read and write
2B442B38000
trusted library allocation
page read and write
2B446736000
trusted library allocation
page read and write
2B451579000
trusted library allocation
page read and write
2B4466C0000
trusted library allocation
page read and write
2B43B8C0000
heap
page read and write
2B43B882000
heap
page read and write
2B444C4C000
trusted library allocation
page read and write
2B4506E5000
trusted library allocation
page read and write
19AD125B000
trusted library allocation
page read and write
2B44CA33000
trusted library allocation
page read and write
2B448398000
trusted library allocation
page read and write
2B446E98000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B44CA0C000
trusted library allocation
page read and write
2B4447FB000
trusted library allocation
page read and write
2B44F0A3000
trusted library allocation
page read and write
2B45038F000
trusted library allocation
page read and write
2B446735000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B44708B000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4507A8000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B447284000
trusted library allocation
page read and write
2B446BA8000
trusted library allocation
page read and write
2B4449B8000
trusted library allocation
page read and write
2B4477FB000
trusted library allocation
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B448D1A000
trusted library allocation
page read and write
2B441E6F000
trusted library allocation
page read and write
2B4458E2000
trusted library allocation
page read and write
2B4507DA000
trusted library allocation
page read and write
1D11E620000
trusted library allocation
page read and write
2B44CEA1000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B442178000
heap
page read and write
2B44749A000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B4444D5000
trusted library allocation
page read and write
2B444B63000
trusted library allocation
page read and write
2B44CACC000
trusted library allocation
page read and write
1D11EC58000
heap
page read and write
2B43B89E000
heap
page read and write
2B446D9C000
trusted library allocation
page read and write
2B4483F5000
trusted library allocation
page read and write
2B45035B000
trusted library allocation
page read and write
2B4450BD000
trusted library allocation
page read and write
2B44CB18000
trusted library allocation
page read and write
2B43B895000
heap
page read and write
2B451249000
trusted library allocation
page read and write
2B4483C4000
trusted library allocation
page read and write
2B4468B0000
trusted library allocation
page read and write
2B44671D000
trusted library allocation
page read and write
2B446DA2000
trusted library allocation
page read and write
2B450340000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44EEF4000
trusted library allocation
page read and write
2B4421BD000
heap
page read and write
1D11EB6C000
heap
page read and write
2B446CFE000
trusted library allocation
page read and write
2B44658B000
trusted library allocation
page read and write
852000
unkown
page readonly
2B444CFC000
trusted library allocation
page read and write
2B4460BB000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B441E65000
trusted library allocation
page read and write
2B451236000
trusted library allocation
page read and write
2B450C3E000
heap
page read and write
2B44219D000
heap
page read and write
2B446CDD000
trusted library allocation
page read and write
2B451444000
trusted library allocation
page read and write
2B4473B3000
trusted library allocation
page read and write
1D11E006000
heap
page read and write
B77D7FE000
stack
page read and write
2B4483BC000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B446FCA000
trusted library allocation
page read and write
2B44C9A2000
trusted library allocation
page read and write
2B44775E000
trusted library allocation
page read and write
2B43B895000
heap
page read and write
2B43B8BE000
heap
page read and write
1D11DD30000
heap
page read and write
2B446EEB000
trusted library allocation
page read and write
2B444B9A000
trusted library allocation
page read and write
2B446DD4000
trusted library allocation
page read and write
2B44CAA2000
trusted library allocation
page read and write
2B4514E8000
trusted library allocation
page read and write
2B445E92000
trusted library allocation
page read and write
124B000
heap
page read and write
9EE1FFE000
unkown
page readonly
2B43B885000
heap
page read and write
2B43B89D000
heap
page read and write
2B441DF6000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B4483B0000
trusted library allocation
page read and write
2B441E74000
trusted library allocation
page read and write
2B450351000
trusted library allocation
page read and write
2B43B897000
heap
page read and write
2B43B8C0000
heap
page read and write
2B441E6F000
trusted library allocation
page read and write
2B446975000
trusted library allocation
page read and write
2B44CE8E000
trusted library allocation
page read and write
19AD1281000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4474A0000
trusted library allocation
page read and write
2B4469F5000
trusted library allocation
page read and write
2B446B95000
trusted library allocation
page read and write
2B4474B8000
trusted library allocation
page read and write
2B4483CD000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B43B87C000
heap
page read and write
2B44CA75000
trusted library allocation
page read and write
2B446A10000
trusted library allocation
page read and write
2B4449E6000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B4458CB000
trusted library allocation
page read and write
2B44F10C000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B4409E0000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B44888A000
trusted library allocation
page read and write
2B44217B000
heap
page read and write
2B44CC8B000
trusted library allocation
page read and write
2B446DAF000
trusted library allocation
page read and write
1D11EBE3000
heap
page read and write
2B4483ED000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B43B87A000
heap
page read and write
2B446E93000
trusted library allocation
page read and write
2B446D87000
trusted library allocation
page read and write
2B442B45000
trusted library allocation
page read and write
2B446DB5000
trusted library allocation
page read and write
2B44FD80000
trusted library allocation
page read and write
2B445145000
trusted library allocation
page read and write
208D3320000
heap
page read and write
2B446EA0000
trusted library allocation
page read and write
2B44CEEF000
trusted library allocation
page read and write
2B4474CC000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B43B8C6000
heap
page read and write
2B445A3A000
trusted library allocation
page read and write
2B441E40000
trusted library allocation
page read and write
2B44CAB2000
trusted library allocation
page read and write
2B445EAC000
trusted library allocation
page read and write
2B44CADD000
trusted library allocation
page read and write
2B44698A000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B43B861000
heap
page read and write
124B000
heap
page read and write
208D325F000
trusted library allocation
page read and write
2B44CE0D000
trusted library allocation
page read and write
1D11EB8A000
heap
page read and write
2B446438000
trusted library allocation
page read and write
2B445A56000
trusted library allocation
page read and write
2B44C88A000
trusted library allocation
page read and write
2B44CE27000
trusted library allocation
page read and write
2B45122B000
trusted library allocation
page read and write
2B450636000
trusted library allocation
page read and write
2B44CE91000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B4450F1000
trusted library allocation
page read and write
3C11000
heap
page read and write
2B43B850000
heap
page read and write
2B446DFD000
trusted library allocation
page read and write
2B44815F000
trusted library allocation
page read and write
2B4477BA000
trusted library allocation
page read and write
2B4450EE000
trusted library allocation
page read and write
2B450C0D000
heap
page read and write
2B44672A000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B4419C1000
trusted library allocation
page read and write
2B445FCE000
trusted library allocation
page read and write
2B4477EA000
trusted library allocation
page read and write
2B4473D9000
trusted library allocation
page read and write
2B44778F000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B43B868000
heap
page read and write
2B446D63000
trusted library allocation
page read and write
1D11DF6A000
trusted library allocation
page read and write
2B446DB5000
trusted library allocation
page read and write
2B44CA1E000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B43B890000
heap
page read and write
2B44C9CB000
trusted library allocation
page read and write
2B441D8B000
trusted library allocation
page read and write
2B447240000
trusted library allocation
page read and write
2B446BCA000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B447462000
trusted library allocation
page read and write
2B450999000
trusted library allocation
page read and write
2B446F63000
trusted library allocation
page read and write
2B44698C000
trusted library allocation
page read and write
2B4402BF000
trusted library allocation
page read and write
2B444CA3000
trusted library allocation
page read and write
2B4451F0000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B44C8D4000
trusted library allocation
page read and write
2B441EF4000
trusted library allocation
page read and write
2B446BF5000
trusted library allocation
page read and write
2B4481F6000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
1D11DF6F000
trusted library allocation
page read and write
2B441EAC000
trusted library allocation
page read and write
2B4483B1000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B441E58000
trusted library allocation
page read and write
2B44CCC1000
trusted library allocation
page read and write
2B446F35000
trusted library allocation
page read and write
2B4483C4000
trusted library allocation
page read and write
2B44CC73000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B44CADD000
trusted library allocation
page read and write
2B451473000
trusted library allocation
page read and write
2B44CC85000
trusted library allocation
page read and write
2B44C923000
trusted library allocation
page read and write
2B4469F5000
trusted library allocation
page read and write
2B449043000
trusted library allocation
page read and write
2B4477B1000
trusted library allocation
page read and write
2B447479000
trusted library allocation
page read and write
2B446FCF000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B4483B0000
trusted library allocation
page read and write
2B44776A000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4483BC000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B449007000
trusted library allocation
page read and write
2B44447B000
trusted library allocation
page read and write
2B44CE32000
trusted library allocation
page read and write
2B43B8D4000
heap
page read and write
2B4465B0000
trusted library allocation
page read and write
2B446E34000
trusted library allocation
page read and write
1D11EBA1000
heap
page read and write
2B444CBE000
trusted library allocation
page read and write
2B445EB9000
trusted library allocation
page read and write
2B4402C4000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B43B885000
heap
page read and write
2B44217B000
heap
page read and write
2B449086000
trusted library allocation
page read and write
2B449041000
trusted library allocation
page read and write
2B44672C000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B44724B000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B446841000
trusted library allocation
page read and write
2B44CC5C000
trusted library allocation
page read and write
2B44C8A7000
trusted library allocation
page read and write
2B446706000
trusted library allocation
page read and write
860000
unkown
page write copy
2B4483C9000
trusted library allocation
page read and write
2B4408F6000
trusted library allocation
page read and write
2B4503F2000
trusted library allocation
page read and write
2B44CCE3000
trusted library allocation
page read and write
9EE0FFE000
unkown
page readonly
2B446450000
trusted library allocation
page read and write
2B4503C3000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4450E1000
trusted library allocation
page read and write
2B44672C000
trusted library allocation
page read and write
2B4514DA000
trusted library allocation
page read and write
2B44CAC9000
trusted library allocation
page read and write
2B4471DE000
trusted library allocation
page read and write
2B4474DB000
trusted library allocation
page read and write
1D3989F0000
heap
page read and write
2B450BC1000
heap
page read and write
2B445AFE000
trusted library allocation
page read and write
2B446F00000
trusted library allocation
page read and write
2B44F143000
trusted library allocation
page read and write
2B446E22000
trusted library allocation
page read and write
2B43B8A5000
heap
page read and write
2B446D56000
trusted library allocation
page read and write
2B44906D000
trusted library allocation
page read and write
2B4450F8000
trusted library allocation
page read and write
2B444B59000
trusted library allocation
page read and write
2B444C45000
trusted library allocation
page read and write
1D11EBFD000
heap
page read and write
2B43B8C1000
heap
page read and write
610C47E000
unkown
page readonly
2B44C91B000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B451541000
trusted library allocation
page read and write
2B44748D000
trusted library allocation
page read and write
2B44CAD2000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B45067A000
trusted library allocation
page read and write
2B4469F5000
trusted library allocation
page read and write
1D11EBEB000
heap
page read and write
2B43B87A000
heap
page read and write
2B43B896000
heap
page read and write
208D2FF0000
heap
page read and write
1D11DD6A000
heap
page read and write
1D398970000
heap
page read and write
2B43B87C000
heap
page read and write
2B44CE17000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B44C981000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B445FAF000
trusted library allocation
page read and write
2B450650000
trusted library allocation
page read and write
610D57E000
unkown
page readonly
9EE17FE000
stack
page read and write
2B43B882000
heap
page read and write
2B44CE9D000
trusted library allocation
page read and write
2B445F94000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B442BCB000
trusted library allocation
page read and write
2B446469000
trusted library allocation
page read and write
2B446DAC000
trusted library allocation
page read and write
2B4447AA000
trusted library allocation
page read and write
2B4470C1000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
2B446D9F000
trusted library allocation
page read and write
1D11EC3B000
heap
page read and write
2B44D000000
trusted library allocation
page read and write
2B4503C7000
trusted library allocation
page read and write
2B44CA24000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B441D54000
trusted library allocation
page read and write
1D11EBF1000
heap
page read and write
2B4443D8000
trusted library allocation
page read and write
2B4447E7000
trusted library allocation
page read and write
2B444B84000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
B9AF9FF000
stack
page read and write
2B446736000
trusted library allocation
page read and write
2B44CCE9000
trusted library allocation
page read and write
2B446736000
trusted library allocation
page read and write
2B446EEB000
trusted library allocation
page read and write
2B446E30000
trusted library allocation
page read and write
2B451255000
trusted library allocation
page read and write
2B44CEDC000
trusted library allocation
page read and write
2B4515D9000
trusted library allocation
page read and write
2B43B864000
heap
page read and write
2B448395000
trusted library allocation
page read and write
2B43B88B000
heap
page read and write
2B44712F000
trusted library allocation
page read and write
2B447797000
trusted library allocation
page read and write
2B446710000
trusted library allocation
page read and write
2B448157000
trusted library allocation
page read and write
2B43B8C7000
heap
page read and write
2B44C8E6000
trusted library allocation
page read and write
2B446A92000
trusted library allocation
page read and write
2B442B8A000
trusted library allocation
page read and write
2B44217B000
heap
page read and write
2B441EC0000
trusted library allocation
page read and write
2B44C930000
trusted library allocation
page read and write
2B43B8CA000
heap
page read and write
2B43B852000
heap
page read and write
2B4471B8000
trusted library allocation
page read and write
1D11EC58000
heap
page read and write
2B44C7DF000
trusted library allocation
page read and write
2B440917000
trusted library allocation
page read and write
2B44098D000
trusted library allocation
page read and write
2B446EEB000
trusted library allocation
page read and write
2B441E37000
trusted library allocation
page read and write
2B445F5A000
trusted library allocation
page read and write
2B44771C000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B4477B1000
trusted library allocation
page read and write
2B4507FE000
trusted library allocation
page read and write
2B45120D000
trusted library allocation
page read and write
2B4424C8000
trusted library allocation
page read and write
2B4447F0000
trusted library allocation
page read and write
2B4483A8000
trusted library allocation
page read and write
2B43B85C000
heap
page read and write
2B43B88C000
heap
page read and write
2B44091E000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B8CA000
heap
page read and write
2B4449BE000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44CEE2000
trusted library allocation
page read and write
2B447089000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4472BC000
trusted library allocation
page read and write
2B44CDC5000
trusted library allocation
page read and write
2B445A28000
trusted library allocation
page read and write
2B44CA8A000
trusted library allocation
page read and write
2B44C964000
trusted library allocation
page read and write
2B446D26000
trusted library allocation
page read and write
2B44742F000
trusted library allocation
page read and write
1D11EC2D000
heap
page read and write
1D11EB5C000
heap
page read and write
2B44CE32000
trusted library allocation
page read and write
2B44C7CC000
trusted library allocation
page read and write
2B444CA0000
trusted library allocation
page read and write
2B44C995000
trusted library allocation
page read and write
2B4466F2000
trusted library allocation
page read and write
2B445EB9000
trusted library allocation
page read and write
2B442B60000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B446061000
trusted library allocation
page read and write
2B4474AB000
trusted library allocation
page read and write
2B4449BE000
trusted library allocation
page read and write
1D11DFF3000
trusted library allocation
page read and write
2B450949000
trusted library allocation
page read and write
2B445FCE000
trusted library allocation
page read and write
2B442B84000
trusted library allocation
page read and write
2B44CE11000
trusted library allocation
page read and write
2B440298000
trusted library allocation
page read and write
2B44CDBA000
trusted library allocation
page read and write
2B44C7E7000
trusted library allocation
page read and write
124B000
heap
page read and write
2B4477CD000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B446487000
trusted library allocation
page read and write
2B44CEE3000
trusted library allocation
page read and write
1D11DFBA000
trusted library allocation
page read and write
2B451234000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4469FE000
trusted library allocation
page read and write
2B446DA6000
trusted library allocation
page read and write
864000
unkown
page readonly
2B441F3A000
trusted library allocation
page read and write
2B450BFF000
heap
page read and write
2B441E31000
trusted library allocation
page read and write
2B445EA0000
trusted library allocation
page read and write
2B4449C9000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B448FC8000
trusted library allocation
page read and write
2B44CCBB000
trusted library allocation
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B4477A8000
trusted library allocation
page read and write
2B4477A5000
trusted library allocation
page read and write
2B4514B0000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B44675F000
trusted library allocation
page read and write
9EDF5FE000
stack
page read and write
2B44745B000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B446E8C000
trusted library allocation
page read and write
2B4447C7000
trusted library allocation
page read and write
2B446A23000
trusted library allocation
page read and write
2B449041000
trusted library allocation
page read and write
2B4474B8000
trusted library allocation
page read and write
2B44C87F000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4477B9000
trusted library allocation
page read and write
1236000
heap
page read and write
2B43B881000
heap
page read and write
2B44F1AC000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
610A11D000
stack
page read and write
2B444C92000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B44775C000
trusted library allocation
page read and write
2B4460C0000
trusted library allocation
page read and write
B77F93E000
stack
page read and write
2B450336000
trusted library allocation
page read and write
790000
unkown
page readonly
2B446E11000
trusted library allocation
page read and write
2B44CE53000
trusted library allocation
page read and write
2B44588D000
trusted library allocation
page read and write
1D39A5BC000
heap
page read and write
2B44CA78000
trusted library allocation
page read and write
2B444C3B000
trusted library allocation
page read and write
2B4483F8000
trusted library allocation
page read and write
2B446D87000
trusted library allocation
page read and write
2B44CE04000
trusted library allocation
page read and write
208D2EB0000
unclassified section
page readonly
2B446D9C000
trusted library allocation
page read and write
2B44CAC4000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44F0E5000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B882000
heap
page read and write
2B43B88F000
heap
page read and write
2B45023F000
trusted library allocation
page read and write
2B446ED4000
trusted library allocation
page read and write
2B446DAA000
trusted library allocation
page read and write
2B450265000
trusted library allocation
page read and write
2B445EB9000
trusted library allocation
page read and write
2B446710000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B857000
heap
page read and write
1229000
heap
page read and write
2B45030A000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B44CC5F000
trusted library allocation
page read and write
2959A459000
heap
page read and write
1D11EB7F000
heap
page read and write
2B448850000
trusted library allocation
page read and write
2B44CED0000
trusted library allocation
page read and write
2B44CC5A000
trusted library allocation
page read and write
2B444CFC000
trusted library allocation
page read and write
2B4449E6000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B445F70000
trusted library allocation
page read and write
2B445E33000
trusted library allocation
page read and write
2B44CD44000
trusted library allocation
page read and write
2B4466E9000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4469F5000
trusted library allocation
page read and write
19AD141D000
trusted library allocation
page read and write
2B442B8C000
trusted library allocation
page read and write
2B445A36000
trusted library allocation
page read and write
2B4477B9000
trusted library allocation
page read and write
2B44CE0D000
trusted library allocation
page read and write
2B4481DD000
trusted library allocation
page read and write
2B444983000
trusted library allocation
page read and write
2B44CCFE000
trusted library allocation
page read and write
2B44C934000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B450CA1000
heap
page read and write
2B43B88F000
heap
page read and write
2B448392000
trusted library allocation
page read and write
2B44912C000
trusted library allocation
page read and write
2B4447F4000
trusted library allocation
page read and write
2B442179000
heap
page read and write
2B441950000
trusted library allocation
page read and write
2B4421C1000
heap
page read and write
2B446AB3000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B442BA2000
trusted library allocation
page read and write
2B43B8C0000
heap
page read and write
2B44CEA3000
trusted library allocation
page read and write
2B451247000
trusted library allocation
page read and write
2B4471A0000
trusted library allocation
page read and write
2B451594000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B4469A9000
trusted library allocation
page read and write
2B448FA2000
trusted library allocation
page read and write
2B4444F6000
trusted library allocation
page read and write
2B446CDD000
trusted library allocation
page read and write
2B447272000
trusted library allocation
page read and write
2B44C977000
trusted library allocation
page read and write
2B4483FD000
trusted library allocation
page read and write
2B4474ED000
trusted library allocation
page read and write
2B446EE7000
trusted library allocation
page read and write
2B4507A6000
trusted library allocation
page read and write
2B4473A9000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B43B8BE000
heap
page read and write
2B44492F000
trusted library allocation
page read and write
1D11E47F000
unclassified section
page read and write
2B446DAC000
trusted library allocation
page read and write
2B43B8C1000
heap
page read and write
2B446709000
trusted library allocation
page read and write
2B44CC76000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44645F000
trusted library allocation
page read and write
1154000
heap
page read and write
19AD1414000
trusted library allocation
page read and write
2B45031D000
trusted library allocation
page read and write
2B4457C0000
trusted library allocation
page read and write
2B448396000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B4447A6000
trusted library allocation
page read and write
1D11EC6C000
heap
page read and write
2B44CE4B000
trusted library allocation
page read and write
2B445F3E000
trusted library allocation
page read and write
B77E93E000
stack
page read and write
2B441EDE000
trusted library allocation
page read and write
2B4515AC000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B4447DF000
trusted library allocation
page read and write
2B44836A000
trusted library allocation
page read and write
2B44817B000
trusted library allocation
page read and write
2B451240000
trusted library allocation
page read and write
2B44CCE9000
trusted library allocation
page read and write
2B44438F000
trusted library allocation
page read and write
2B44648C000
trusted library allocation
page read and write
2B44CAE1000
trusted library allocation
page read and write
2B44C851000
trusted library allocation
page read and write
2B4463B6000
trusted library allocation
page read and write
2B44CDC9000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B4474CA000
trusted library allocation
page read and write
2B4447F0000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B44C957000
trusted library allocation
page read and write
2B44CA30000
trusted library allocation
page read and write
2B4449CB000
trusted library allocation
page read and write
2B45076B000
trusted library allocation
page read and write
2B4473F9000
trusted library allocation
page read and write
2B44684E000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B441E55000
trusted library allocation
page read and write
1D11E490000
heap
page read and write
2B4409FE000
trusted library allocation
page read and write
1D11EBFD000
heap
page read and write
1D11E004000
heap
page read and write
2B44C7DF000
trusted library allocation
page read and write
2B4464E9000
trusted library allocation
page read and write
2B441E63000
trusted library allocation
page read and write
2B447085000
trusted library allocation
page read and write
2B43B8CC000
heap
page read and write
2B442441000
trusted library allocation
page read and write
2B445EF9000
trusted library allocation
page read and write
2B446D79000
trusted library allocation
page read and write
2B44C7C8000
trusted library allocation
page read and write
2B4514E3000
trusted library allocation
page read and write
2B447175000
trusted library allocation
page read and write
2B449007000
trusted library allocation
page read and write
2B441E64000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B4419E2000
trusted library allocation
page read and write
1D11EBE9000
heap
page read and write
2B44CED7000
trusted library allocation
page read and write
2B445AC3000
trusted library allocation
page read and write
2B45068E000
trusted library allocation
page read and write
2B43B8CF000
heap
page read and write
2B441DA8000
trusted library allocation
page read and write
2B44082F000
trusted library allocation
page read and write
2B446DA2000
trusted library allocation
page read and write
2B451434000
trusted library allocation
page read and write
2B44E5A8000
trusted library allocation
page read and write
2B451478000
trusted library allocation
page read and write
610C3FE000
unkown
page readonly
2B4506E1000
trusted library allocation
page read and write
2B43B8CE000
heap
page read and write
2B44CCE3000
trusted library allocation
page read and write
2B445EAF000
trusted library allocation
page read and write
2B446498000
trusted library allocation
page read and write
2B446981000
trusted library allocation
page read and write
2B4454F8000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B450BC1000
heap
page read and write
2B43B88F000
heap
page read and write
2B44CE39000
trusted library allocation
page read and write
2B44740A000
trusted library allocation
page read and write
2B448367000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B44CE1B000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B445A30000
trusted library allocation
page read and write
2B450349000
trusted library allocation
page read and write
2B451246000
trusted library allocation
page read and write
2B44C75F000
trusted library allocation
page read and write
2B4481CF000
trusted library allocation
page read and write
610ED7E000
stack
page read and write
B77BD9E000
unkown
page readonly
2B44CB85000
trusted library allocation
page read and write
2B4450EE000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
1D11EC44000
heap
page read and write
2B445A26000
trusted library allocation
page read and write
2B43B906000
heap
page read and write
208D32F5000
trusted library allocation
page read and write
2B446783000
trusted library allocation
page read and write
2B44775B000
trusted library allocation
page read and write
2B43B890000
heap
page read and write
2B4453FE000
trusted library allocation
page read and write
2B45035E000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B4481AA000
trusted library allocation
page read and write
2B43B8C0000
heap
page read and write
2B445EBF000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B45146B000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B43B885000
heap
page read and write
2B43B890000
heap
page read and write
2B43B885000
heap
page read and write
2B43B884000
heap
page read and write
2B44F167000
trusted library allocation
page read and write
19AD10F4000
heap
page read and write
2B4402A9000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B43B882000
heap
page read and write
2B43B861000
heap
page read and write
791000
unkown
page execute read
2B43B861000
heap
page read and write
2B451215000
trusted library allocation
page read and write
2B44CAC4000
trusted library allocation
page read and write
2B43B85B000
heap
page read and write
2B43B86A000
heap
page read and write
2B44CAF6000
trusted library allocation
page read and write
1154000
heap
page read and write
2B446FA4000
trusted library allocation
page read and write
2B446998000
trusted library allocation
page read and write
2B44CB08000
trusted library allocation
page read and write
2B445A6B000
trusted library allocation
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B446DDB000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B44CC78000
trusted library allocation
page read and write
2B446744000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B4444D2000
trusted library allocation
page read and write
2B44899E000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B44508E000
trusted library allocation
page read and write
A6533FC000
stack
page read and write
2B445A91000
trusted library allocation
page read and write
2B445E9D000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B4514ED000
trusted library allocation
page read and write
2B444C5B000
trusted library allocation
page read and write
2B44CEF9000
trusted library allocation
page read and write
2B44CAE1000
trusted library allocation
page read and write
2B446DD6000
trusted library allocation
page read and write
2B4472C2000
trusted library allocation
page read and write
2B44CB63000
trusted library allocation
page read and write
2B44689C000
trusted library allocation
page read and write
2B4481C0000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44C8FC000
trusted library allocation
page read and write
2B44CC5F000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B4477F1000
trusted library allocation
page read and write
2B44672A000
trusted library allocation
page read and write
2B43B858000
heap
page read and write
2B441EAA000
trusted library allocation
page read and write
2B44CE21000
trusted library allocation
page read and write
2B44C940000
trusted library allocation
page read and write
2B444C7F000
trusted library allocation
page read and write
1233000
heap
page read and write
2B44CD19000
trusted library allocation
page read and write
2B450335000
trusted library allocation
page read and write
2B4458B0000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
2B441EEF000
trusted library allocation
page read and write
2B44749A000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B446DAC000
trusted library allocation
page read and write
2B448331000
trusted library allocation
page read and write
2B450653000
trusted library allocation
page read and write
1D398A30000
heap
page read and write
2B43B885000
heap
page read and write
2B43B857000
heap
page read and write
2B4409BF000
trusted library allocation
page read and write
1D11DF48000
trusted library allocation
page read and write
1D11EB7D000
heap
page read and write
85C000
unkown
page write copy
2B448867000
trusted library allocation
page read and write
2B441EDE000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B446DBC000
trusted library allocation
page read and write
2B44CB10000
trusted library allocation
page read and write
2B446983000
trusted library allocation
page read and write
2B449157000
trusted library allocation
page read and write
2B446DA2000
trusted library allocation
page read and write
2B4474BE000
trusted library allocation
page read and write
1D11DC1E000
remote allocation
page execute read
2B446D7C000
trusted library allocation
page read and write
2B44CA7C000
trusted library allocation
page read and write
2B451440000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B446D82000
trusted library allocation
page read and write
2B44CA85000
trusted library allocation
page read and write
2B44694E000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B43B8BE000
heap
page read and write
2B446B8C000
trusted library allocation
page read and write
1229000
heap
page read and write
2B4509C1000
trusted library allocation
page read and write
2B44C977000
trusted library allocation
page read and write
2B45035E000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44776E000
trusted library allocation
page read and write
19AD127A000
trusted library allocation
page read and write
2B4477AB000
trusted library allocation
page read and write
2B44F18A000
trusted library allocation
page read and write
2B44CED9000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
1D11EB00000
heap
page read and write
2B450C4D000
heap
page read and write
19AD1100000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B4449C7000
trusted library allocation
page read and write
2B4447C2000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B446DC4000
trusted library allocation
page read and write
2B444933000
trusted library allocation
page read and write
2B44CAC4000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B446D45000
trusted library allocation
page read and write
2B4421A9000
heap
page read and write
2B446710000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B45125B000
trusted library allocation
page read and write
2B4462D5000
trusted library allocation
page read and write
2B44CC4E000
trusted library allocation
page read and write
2B4474C4000
trusted library allocation
page read and write
2B4469F5000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B447272000
trusted library allocation
page read and write
2B4419B2000
trusted library allocation
page read and write
2B441E52000
trusted library allocation
page read and write
2B450265000
trusted library allocation
page read and write
2B44C952000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B44775E000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B450335000
trusted library allocation
page read and write
2B448F86000
trusted library allocation
page read and write
2B45097F000
trusted library allocation
page read and write
2B44CAB2000
trusted library allocation
page read and write
2B44CEE3000
trusted library allocation
page read and write
2B44EE62000
trusted library allocation
page read and write
2B441E3D000
trusted library allocation
page read and write
2B43B8C1000
heap
page read and write
2B43B87C000
heap
page read and write
2B43B861000
heap
page read and write
2B44499E000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B4474C4000
trusted library allocation
page read and write
2B4477AB000
trusted library allocation
page read and write
2B44CE35000
trusted library allocation
page read and write
2B44689C000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
121F000
heap
page read and write
2B4477E3000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
2B44CE24000
trusted library allocation
page read and write
2B4506E3000
trusted library allocation
page read and write
2B4443C1000
trusted library allocation
page read and write
2B447270000
trusted library allocation
page read and write
2B441EC3000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B446B7A000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B44896D000
trusted library allocation
page read and write
2B4466FA000
trusted library allocation
page read and write
2B441D61000
trusted library allocation
page read and write
2B446BAC000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CADB000
trusted library allocation
page read and write
2B4460FD000
trusted library allocation
page read and write
2B4466E0000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4474F6000
trusted library allocation
page read and write
2B44434C000
trusted library allocation
page read and write
2B4473EF000
trusted library allocation
page read and write
2B4469EB000
trusted library allocation
page read and write
1229000
heap
page read and write
2B450340000
trusted library allocation
page read and write
2B4471C4000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B446D7C000
trusted library allocation
page read and write
2B44CE21000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
19AD0EAD000
remote allocation
page execute read
19AD1247000
trusted library allocation
page read and write
2B44CB88000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B44CEE7000
trusted library allocation
page read and write
2B44CABE000
trusted library allocation
page read and write
2B44C8FC000
trusted library allocation
page read and write
2B450C31000
heap
page read and write
2B43B864000
heap
page read and write
2B45124D000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B45125B000
trusted library allocation
page read and write
2B441EB6000
trusted library allocation
page read and write
2B44CB9B000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B450C2A000
heap
page read and write
2B43B85A000
heap
page read and write
2B4449B8000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B43B89D000
heap
page read and write
2B445E66000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B447424000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B44536D000
trusted library allocation
page read and write
2B43B858000
heap
page read and write
2B445F4F000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B4508E4000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B445E83000
trusted library allocation
page read and write
2B448323000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44CCC7000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B450953000
trusted library allocation
page read and write
2B44C7C0000
trusted library allocation
page read and write
2B446C83000
trusted library allocation
page read and write
2B446A2D000
trusted library allocation
page read and write
2B4515BE000
trusted library allocation
page read and write
2B450349000
trusted library allocation
page read and write
2B4443EF000
trusted library allocation
page read and write
2B446D8C000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B444B8F000
trusted library allocation
page read and write
2B451234000
trusted library allocation
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B440871000
trusted library allocation
page read and write
2B44C858000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B447424000
trusted library allocation
page read and write
2B447720000
trusted library allocation
page read and write
610DD7E000
stack
page read and write
2B450982000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B446A04000
trusted library allocation
page read and write
2B4503C5000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44F11C000
trusted library allocation
page read and write
2B44CEB2000
trusted library allocation
page read and write
2B45122B000
trusted library allocation
page read and write
2B446050000
trusted library allocation
page read and write
208D2FC3000
heap
page read and write
2B4421FE000
heap
page read and write
2B450BC1000
heap
page read and write
2B446CF5000
trusted library allocation
page read and write
2959A700000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B444CB2000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B43B88F000
heap
page read and write
2B43B885000
heap
page read and write
2B446B87000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B445F42000
trusted library allocation
page read and write
2B4449A7000
trusted library allocation
page read and write
2B441EA2000
trusted library allocation
page read and write
1D11EBFD000
heap
page read and write
2B4449F1000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CE1F000
trusted library allocation
page read and write
2B44C940000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B45067A000
trusted library allocation
page read and write
2B446B6B000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4449A7000
trusted library allocation
page read and write
2B446BD6000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B449005000
trusted library allocation
page read and write
2B441E28000
trusted library allocation
page read and write
1D11EBE6000
heap
page read and write
2B441EC3000
trusted library allocation
page read and write
2B44814E000
trusted library allocation
page read and write
2B44CB9E000
trusted library allocation
page read and write
2B4467B6000
trusted library allocation
page read and write
2B446F14000
trusted library allocation
page read and write
2B4449DE000
trusted library allocation
page read and write
2B4472EF000
trusted library allocation
page read and write
2B446493000
trusted library allocation
page read and write
2B44218E000
heap
page read and write
2B44CEAE000
trusted library allocation
page read and write
2B4449B1000
trusted library allocation
page read and write
2B4481C0000
trusted library allocation
page read and write
2B445E61000
trusted library allocation
page read and write
2B4447A8000
trusted library allocation
page read and write
2B4477E3000
trusted library allocation
page read and write
1D398960000
heap
page read and write
2B44CA8C000
trusted library allocation
page read and write
2B449133000
trusted library allocation
page read and write
2B446DE4000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B446949000
trusted library allocation
page read and write
123B000
heap
page read and write
2B4474A0000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B444B6A000
trusted library allocation
page read and write
2B4515BB000
trusted library allocation
page read and write
2B44672C000
trusted library allocation
page read and write
2B441EA5000
trusted library allocation
page read and write
2B442185000
heap
page read and write
2B43B88F000
heap
page read and write
2B43B8BF000
heap
page read and write
2B442189000
heap
page read and write
1D11DDE0000
heap
page readonly
2B446740000
trusted library allocation
page read and write
2B45143F000
trusted library allocation
page read and write
2B448388000
trusted library allocation
page read and write
2B446956000
trusted library allocation
page read and write
2B444C85000
trusted library allocation
page read and write
2B44831D000
trusted library allocation
page read and write
2B446D67000
trusted library allocation
page read and write
2B44C9F3000
trusted library allocation
page read and write
2B446BEA000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
1154000
heap
page read and write
2B4477B1000
trusted library allocation
page read and write
2B44CBA8000
trusted library allocation
page read and write
2B44647B000
trusted library allocation
page read and write
610ABD8000
stack
page read and write
2B43B860000
heap
page read and write
1D11E637000
unkown
page execute read
2B448195000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
2B44713F000
trusted library allocation
page read and write
2B4506EB000
trusted library allocation
page read and write
2B44648E000
trusted library allocation
page read and write
2B44CAA2000
trusted library allocation
page read and write
110E000
stack
page read and write
2B4477AD000
trusted library allocation
page read and write
9EDFDFE000
unkown
page readonly
2B450697000
trusted library allocation
page read and write
2B44CABE000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B446963000
trusted library allocation
page read and write
2B4421FD000
heap
page read and write
2B43B861000
heap
page read and write
2B451250000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B4464E0000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B43B8C6000
heap
page read and write
2B442B6F000
trusted library allocation
page read and write
2B451209000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B43B8BE000
heap
page read and write
2B4421BD000
heap
page read and write
2B441E55000
trusted library allocation
page read and write
2B44F09E000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4419A8000
trusted library allocation
page read and write
2B4462D8000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B450999000
trusted library allocation
page read and write
2B4471B1000
trusted library allocation
page read and write
2B44EE55000
trusted library allocation
page read and write
2B4469DE000
trusted library allocation
page read and write
2B446BDD000
trusted library allocation
page read and write
2B446EE4000
trusted library allocation
page read and write
2B451240000
trusted library allocation
page read and write
2B4509CE000
trusted library allocation
page read and write
1D11EBF1000
heap
page read and write
2B43B857000
heap
page read and write
2B44CBA0000
trusted library allocation
page read and write
2B446FBF000
trusted library allocation
page read and write
2B447462000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44687A000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B44749A000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44CA9E000
trusted library allocation
page read and write
2B4469FE000
trusted library allocation
page read and write
2B4460E5000
trusted library allocation
page read and write
1D11DF81000
trusted library allocation
page read and write
1D11EB63000
heap
page read and write
2B44CCE9000
trusted library allocation
page read and write
B9B11FE000
stack
page read and write
2B43B897000
heap
page read and write
1D11EBE1000
heap
page read and write
2B43B85C000
heap
page read and write
2B442B56000
trusted library allocation
page read and write
2B446A27000
trusted library allocation
page read and write
1D11DD60000
heap
page read and write
2B44CE11000
trusted library allocation
page read and write
2B4509F4000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
C5A000
stack
page read and write
2B4503C5000
trusted library allocation
page read and write
2B4477F5000
trusted library allocation
page read and write
2B4477EA000
trusted library allocation
page read and write
2B4449E2000
trusted library allocation
page read and write
2B4458A1000
trusted library allocation
page read and write
2B4469D0000
trusted library allocation
page read and write
2B445EFC000
trusted library allocation
page read and write
2B446B85000
trusted library allocation
page read and write
2B450953000
trusted library allocation
page read and write
2B4447AA000
trusted library allocation
page read and write
2B4483C9000
trusted library allocation
page read and write
2B44607B000
trusted library allocation
page read and write
2B44CC4C000
trusted library allocation
page read and write
19AD1296000
trusted library allocation
page read and write
2B448139000
trusted library allocation
page read and write
2B44777F000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B440926000
trusted library allocation
page read and write
2B44672F000
trusted library allocation
page read and write
2B445E80000
trusted library allocation
page read and write
2B445124000
trusted library allocation
page read and write
2B44C832000
trusted library allocation
page read and write
A6543FF000
stack
page read and write
2B445A70000
trusted library allocation
page read and write
2B450751000
trusted library allocation
page read and write
2B44CAD1000
trusted library allocation
page read and write
2B4447B3000
trusted library allocation
page read and write
9EDFE3B000
stack
page read and write
2B4471E6000
trusted library allocation
page read and write
2B446456000
trusted library allocation
page read and write
2B4483FD000
trusted library allocation
page read and write
2B44C79F000
trusted library allocation
page read and write
2B446D90000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B45149A000
trusted library allocation
page read and write
2B4470EA000
trusted library allocation
page read and write
2B4466D8000
trusted library allocation
page read and write
9EE07FE000
stack
page read and write
122A000
heap
page read and write
2B44CDC9000
trusted library allocation
page read and write
2B4449A7000
trusted library allocation
page read and write
2B444B57000
trusted library allocation
page read and write
2B4447E1000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B445EA0000
trusted library allocation
page read and write
2B4506C7000
trusted library allocation
page read and write
2B451415000
trusted library allocation
page read and write
2B446B6D000
trusted library allocation
page read and write
2B45037A000
trusted library allocation
page read and write
2B44F14D000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4447FB000
trusted library allocation
page read and write
2B4483E2000
trusted library allocation
page read and write
2B44CABE000
trusted library allocation
page read and write
2B4507A4000
trusted library allocation
page read and write
1D11EC59000
heap
page read and write
208D3249000
trusted library allocation
page read and write
2B447479000
trusted library allocation
page read and write
2B43B8CA000
heap
page read and write
2B44CDBE000
trusted library allocation
page read and write
2B44CDC3000
trusted library allocation
page read and write
2B44C8C1000
trusted library allocation
page read and write
1D11EB4D000
heap
page read and write
2B446B68000
trusted library allocation
page read and write
2B446F63000
trusted library allocation
page read and write
2B44CD3A000
trusted library allocation
page read and write
2B450C1C000
heap
page read and write
2B4514F1000
trusted library allocation
page read and write
2B4451E7000
trusted library allocation
page read and write
2B43B890000
heap
page read and write
2B4462CF000
trusted library allocation
page read and write
208D32B0000
trusted library allocation
page read and write
1D11EC58000
heap
page read and write
2B445A36000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
2B445F6D000
trusted library allocation
page read and write
2B44677C000
trusted library allocation
page read and write
2B447715000
trusted library allocation
page read and write
2B447483000
trusted library allocation
page read and write
2B43B897000
heap
page read and write
2B446B6B000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B43B857000
heap
page read and write
2B447718000
trusted library allocation
page read and write
2B44832E000
trusted library allocation
page read and write
2B44F257000
trusted library allocation
page read and write
2B446850000
trusted library allocation
page read and write
208D2F70000
heap
page read and write
2B446734000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
3C11000
heap
page read and write
2B45038A000
trusted library allocation
page read and write
2B44CC4C000
trusted library allocation
page read and write
2B4465C3000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B441EC3000
trusted library allocation
page read and write
2B44CAAF000
trusted library allocation
page read and write
2B446D8F000
trusted library allocation
page read and write
2B448F86000
trusted library allocation
page read and write
2B44496F000
trusted library allocation
page read and write
2B4449F1000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
1D398C00000
trusted library allocation
page read and write
2B4468B9000
trusted library allocation
page read and write
852000
unkown
page readonly
1D11EC77000
heap
page read and write
2B451240000
trusted library allocation
page read and write
2B441EAF000
trusted library allocation
page read and write
2B4469F8000
trusted library allocation
page read and write
2B4450FA000
trusted library allocation
page read and write
2B4509CE000
trusted library allocation
page read and write
2B44C9FB000
trusted library allocation
page read and write
1D398A63000
heap
page read and write
2B43B857000
heap
page read and write
2B450BC1000
heap
page read and write
123E000
heap
page read and write
2B445FA4000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B43B88F000
heap
page read and write
2B43B869000
heap
page read and write
2B442BCB000
trusted library allocation
page read and write
2B450999000
trusted library allocation
page read and write
2B451496000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44C934000
trusted library allocation
page read and write
2B44646C000
trusted library allocation
page read and write
2B444C92000
trusted library allocation
page read and write
2B44649B000
trusted library allocation
page read and write
2B44CE42000
trusted library allocation
page read and write
2B445A3A000
trusted library allocation
page read and write
2B44C975000
trusted library allocation
page read and write
2B44649F000
trusted library allocation
page read and write
1D11DF64000
trusted library allocation
page read and write
2B446922000
trusted library allocation
page read and write
2B4514E8000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4482CD000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
19AD12B7000
trusted library allocation
page read and write
208D3270000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B446B9A000
trusted library allocation
page read and write
2B44CCC3000
trusted library allocation
page read and write
2B44CE2B000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B43B8BE000
heap
page read and write
2B444BCF000
trusted library allocation
page read and write
2B445EC3000
trusted library allocation
page read and write
2B4490A3000
trusted library allocation
page read and write
1150000
heap
page read and write
2B43B899000
heap
page read and write
2B44CBA8000
trusted library allocation
page read and write
1D11E5A0000
trusted library section
page readonly
2B43B885000
heap
page read and write
2B441E58000
trusted library allocation
page read and write
2B4444DA000
trusted library allocation
page read and write
2B44C7D5000
trusted library allocation
page read and write
2B44CADB000
trusted library allocation
page read and write
2B446CE1000
trusted library allocation
page read and write
2B444969000
trusted library allocation
page read and write
2B4509C1000
trusted library allocation
page read and write
2B45068E000
trusted library allocation
page read and write
2B447483000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
1D11EC77000
heap
page read and write
2B446728000
trusted library allocation
page read and write
2B4483ED000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B896000
heap
page read and write
2B43B881000
heap
page read and write
2B44CE39000
trusted library allocation
page read and write
B7007FE000
unkown
page readonly
2B4514F7000
trusted library allocation
page read and write
2B446DA1000
trusted library allocation
page read and write
2B44E100000
trusted library allocation
page read and write
2B4483ED000
trusted library allocation
page read and write
2B4477C7000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
1D11DF9F000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4477F3000
trusted library allocation
page read and write
1D11EBF1000
heap
page read and write
2B446FAA000
trusted library allocation
page read and write
2B441D6E000
trusted library allocation
page read and write
2B4464F2000
trusted library allocation
page read and write
2B44CE4F000
trusted library allocation
page read and write
2B4444CB000
trusted library allocation
page read and write
19AD0EB0000
unclassified section
page readonly
2B442B9C000
trusted library allocation
page read and write
2B445A4E000
trusted library allocation
page read and write
2B45098B000
trusted library allocation
page read and write
2B44491D000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B446DA1000
trusted library allocation
page read and write
2B441E31000
trusted library allocation
page read and write
19AD122E000
trusted library allocation
page read and write
2B44EED5000
trusted library allocation
page read and write
2B444AF0000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B446706000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B4515E1000
trusted library allocation
page read and write
2B44C964000
trusted library allocation
page read and write
2B445E60000
trusted library allocation
page read and write
2B4515F0000
trusted library allocation
page read and write
1D39A5AB000
heap
page read and write
2B444964000
trusted library allocation
page read and write
2B441EA2000
trusted library allocation
page read and write
1222000
heap
page read and write
2B43B869000
heap
page read and write
2B44C98E000
trusted library allocation
page read and write
2B4462F9000
trusted library allocation
page read and write
2B43B8A0000
heap
page read and write
2B4449F0000
trusted library allocation
page read and write
2B441E4A000
trusted library allocation
page read and write
2B4469AB000
trusted library allocation
page read and write
2B450621000
trusted library allocation
page read and write
2B446E9E000
trusted library allocation
page read and write
2B4469D8000
trusted library allocation
page read and write
1154000
heap
page read and write
2B43B88C000
heap
page read and write
2B43B89D000
heap
page read and write
2B43B857000
heap
page read and write
1224000
heap
page read and write
2B44CCE3000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B85C000
heap
page read and write
2B43B860000
heap
page read and write
2B44CC7D000
trusted library allocation
page read and write
2B45124B000
trusted library allocation
page read and write
2B4450F1000
trusted library allocation
page read and write
2B44F206000
trusted library allocation
page read and write
2B44609F000
trusted library allocation
page read and write
2B445EBF000
trusted library allocation
page read and write
208D3224000
trusted library allocation
page read and write
2B44577E000
trusted library allocation
page read and write
2B43B8C1000
heap
page read and write
2B446EE4000
trusted library allocation
page read and write
2B447784000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B446ECC000
trusted library allocation
page read and write
2B446DA2000
trusted library allocation
page read and write
2B444474000
trusted library allocation
page read and write
2B448FE5000
trusted library allocation
page read and write
2B43B864000
heap
page read and write
2B4444BF000
trusted library allocation
page read and write
1D11DC20000
unclassified section
page readonly
2B43B8C6000
heap
page read and write
1D11EC44000
heap
page read and write
2B43B860000
heap
page read and write
2B444C87000
trusted library allocation
page read and write
864000
unkown
page readonly
2B446D82000
trusted library allocation
page read and write
208D331F000
unclassified section
page read and write
2B446D7C000
trusted library allocation
page read and write
2B44CEDE000
trusted library allocation
page read and write
1D398BD0000
heap
page read and write
2B44097D000
trusted library allocation
page read and write
2B446CF4000
trusted library allocation
page read and write
2B44C9E1000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B447799000
trusted library allocation
page read and write
2B447784000
trusted library allocation
page read and write
2B44EE5A000
trusted library allocation
page read and write
2B445FAF000
trusted library allocation
page read and write
2B448327000
trusted library allocation
page read and write
2B43B874000
heap
page read and write
2B43B854000
heap
page read and write
2B44CADB000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B451255000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B44CE36000
trusted library allocation
page read and write
2B4402B3000
trusted library allocation
page read and write
2B44217B000
heap
page read and write
2B447782000
trusted library allocation
page read and write
2B4469F1000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B448D34000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B4515B1000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B44219D000
heap
page read and write
2B4421A5000
heap
page read and write
2B4477A5000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B43B889000
heap
page read and write
208D3213000
trusted library allocation
page read and write
2B451481000
trusted library allocation
page read and write
2B44CEA1000
trusted library allocation
page read and write
2B4483FD000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B43B852000
heap
page read and write
2B4449E6000
trusted library allocation
page read and write
2B447171000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B44CD89000
trusted library allocation
page read and write
2B44F087000
trusted library allocation
page read and write
2B4483D0000
trusted library allocation
page read and write
2B450295000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
1D11EBFD000
heap
page read and write
2B446D87000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B446D8C000
trusted library allocation
page read and write
2B441F23000
trusted library allocation
page read and write
2B4421BD000
heap
page read and write
1154000
heap
page read and write
2B43B85A000
heap
page read and write
2B446B68000
trusted library allocation
page read and write
2B44F148000
trusted library allocation
page read and write
2B4474EB000
trusted library allocation
page read and write
2B444C3B000
trusted library allocation
page read and write
124E000
heap
page read and write
2B44C923000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4402EF000
trusted library allocation
page read and write
1D11EB5C000
heap
page read and write
2B43B85A000
heap
page read and write
1D39A5B7000
heap
page read and write
2B44CA26000
trusted library allocation
page read and write
2B4477E3000
trusted library allocation
page read and write
2B45120B000
trusted library allocation
page read and write
2B4477EA000
trusted library allocation
page read and write
2B4509F4000
trusted library allocation
page read and write
2B4515BE000
trusted library allocation
page read and write
1D11E000000
heap
page read and write
2B4509CE000
trusted library allocation
page read and write
2B44CA24000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4443B1000
trusted library allocation
page read and write
2B441DF4000
trusted library allocation
page read and write
2B44CEDC000
trusted library allocation
page read and write
82C000
unkown
page readonly
102F000
stack
page read and write
2B4469CE000
trusted library allocation
page read and write
2B444BAF000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B43B8A0000
heap
page read and write
2B450C05000
heap
page read and write
2B43B885000
heap
page read and write
2B4471AD000
trusted library allocation
page read and write
208D3276000
trusted library allocation
page read and write
1D11DF2F000
trusted library allocation
page read and write
2B444B84000
trusted library allocation
page read and write
2B440A00000
trusted library allocation
page read and write
2B45121C000
trusted library allocation
page read and write
2B44F141000
trusted library allocation
page read and write
2B446EE7000
trusted library allocation
page read and write
1154000
heap
page read and write
2B4469F1000
trusted library allocation
page read and write
2B44F233000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B447784000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B445AB4000
trusted library allocation
page read and write
2B446D8F000
trusted library allocation
page read and write
2B43B895000
heap
page read and write
2B445EF1000
trusted library allocation
page read and write
2B4462F7000
trusted library allocation
page read and write
2B44CEA1000
trusted library allocation
page read and write
2B446B85000
trusted library allocation
page read and write
208D3268000
trusted library allocation
page read and write
2B446973000
trusted library allocation
page read and write
2B44CDF1000
trusted library allocation
page read and write
2B44CE1B000
trusted library allocation
page read and write
2B44720A000
trusted library allocation
page read and write
2B44CD7A000
trusted library allocation
page read and write
2B44E300000
trusted library allocation
page read and write
2B43B8C7000
heap
page read and write
2B441D65000
trusted library allocation
page read and write
2B445E86000
trusted library allocation
page read and write
2B44219F000
heap
page read and write
2B441EBA000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4483E6000
trusted library allocation
page read and write
1254000
heap
page read and write
2B446D8F000
trusted library allocation
page read and write
2B446F87000
trusted library allocation
page read and write
2B442B86000
trusted library allocation
page read and write
2B450940000
trusted library allocation
page read and write
19AD1040000
heap
page readonly
2B43B896000
heap
page read and write
2B447125000
trusted library allocation
page read and write
2B43B897000
heap
page read and write
2B446735000
trusted library allocation
page read and write
2B4469D0000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
1D11E4C2000
heap
page read and write
1D11DFB2000
trusted library allocation
page read and write
2B4508C3000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B4402CA000
trusted library allocation
page read and write
19AD0E30000
unclassified section
page readonly
2B44C9B9000
trusted library allocation
page read and write
2959A430000
heap
page read and write
2B43B87D000
heap
page read and write
2B43B87C000
heap
page read and write
2B4506E9000
trusted library allocation
page read and write
2B446728000
trusted library allocation
page read and write
2B444B7E000
trusted library allocation
page read and write
2B445A6E000
trusted library allocation
page read and write
2B447496000
trusted library allocation
page read and write
2B44CED6000
trusted library allocation
page read and write
2B446E3C000
trusted library allocation
page read and write
2B44CA75000
trusted library allocation
page read and write
2B4483F5000
trusted library allocation
page read and write
2B44CE3B000
trusted library allocation
page read and write
2B4402EF000
trusted library allocation
page read and write
2B44CEF9000
trusted library allocation
page read and write
2B45026A000
trusted library allocation
page read and write
2B4450D6000
trusted library allocation
page read and write
2B442B89000
trusted library allocation
page read and write
2B4483D0000
trusted library allocation
page read and write
2B445E98000
trusted library allocation
page read and write
2B450349000
trusted library allocation
page read and write
B77BDDE000
stack
page read and write
2B445EAA000
trusted library allocation
page read and write
2B4515EE000
trusted library allocation
page read and write
2B4466FA000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44CADD000
trusted library allocation
page read and write
2B4509C5000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B4466F0000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B4483C4000
trusted library allocation
page read and write
2B442B5F000
trusted library allocation
page read and write
2B442B86000
trusted library allocation
page read and write
2B445EBB000
trusted library allocation
page read and write
2B4477B9000
trusted library allocation
page read and write
2B44CAB2000
trusted library allocation
page read and write
2B441ECA000
trusted library allocation
page read and write
2B446AB3000
trusted library allocation
page read and write
19AD1090000
unclassified section
page read and write
2B442B9C000
trusted library allocation
page read and write
208D3312000
unclassified section
page read and write
2B4449C2000
trusted library allocation
page read and write
2B44CAA6000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B44CA98000
trusted library allocation
page read and write
2B445FC3000
trusted library allocation
page read and write
2B447500000
trusted library allocation
page read and write
2B44670B000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4450D6000
trusted library allocation
page read and write
2B4457D3000
trusted library allocation
page read and write
2B44715F000
trusted library allocation
page read and write
208D33D0000
heap
page read and write
2B44CE9D000
trusted library allocation
page read and write
2B442185000
heap
page read and write
2B43B88F000
heap
page read and write
2B446DFD000
trusted library allocation
page read and write
2B4464AF000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
37D4000
heap
page read and write
2B4507CE000
trusted library allocation
page read and write
2B446BB1000
trusted library allocation
page read and write
2959A800000
heap
page read and write
2B43B88F000
heap
page read and write
2B44CEBF000
trusted library allocation
page read and write
2B4450D6000
trusted library allocation
page read and write
2B44CAAD000
trusted library allocation
page read and write
2B4449C9000
trusted library allocation
page read and write
1D11EBEB000
heap
page read and write
2B449133000
trusted library allocation
page read and write
2B445F91000
trusted library allocation
page read and write
2B451531000
trusted library allocation
page read and write
19AD126E000
trusted library allocation
page read and write
2B444CBE000
trusted library allocation
page read and write
1154000
heap
page read and write
2B4457E5000
trusted library allocation
page read and write
2B451473000
trusted library allocation
page read and write
1D11EC58000
heap
page read and write
2B4449AE000
trusted library allocation
page read and write
2B4469F8000
trusted library allocation
page read and write
2B441E6F000
trusted library allocation
page read and write
2B450295000
trusted library allocation
page read and write
2B446D72000
trusted library allocation
page read and write
2B4470E8000
trusted library allocation
page read and write
2B444CC8000
trusted library allocation
page read and write
2B449101000
trusted library allocation
page read and write
2B446F2C000
trusted library allocation
page read and write
2B4447EE000
trusted library allocation
page read and write
2B4449A0000
trusted library allocation
page read and write
19AD0E20000
unclassified section
page readonly
2B446D2B000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B4444BB000
trusted library allocation
page read and write
2B4421C7000
heap
page read and write
2B4421BD000
heap
page read and write
2B447466000
trusted library allocation
page read and write
2B4503B6000
trusted library allocation
page read and write
2B447281000
trusted library allocation
page read and write
2B441D5E000
trusted library allocation
page read and write
2B4483A8000
trusted library allocation
page read and write
2B4453E0000
trusted library allocation
page read and write
2B451253000
trusted library allocation
page read and write
2B4483E2000
trusted library allocation
page read and write
1D11EB69000
heap
page read and write
2B43B881000
heap
page read and write
2B43B8BE000
heap
page read and write
2B43B850000
heap
page read and write
208D3265000
trusted library allocation
page read and write
208D32F0000
trusted library allocation
page read and write
2B445ED9000
trusted library allocation
page read and write
1D11EB69000
heap
page read and write
2B43B88C000
heap
page read and write
2B43B885000
heap
page read and write
2B4477AD000
trusted library allocation
page read and write
2B446EC5000
trusted library allocation
page read and write
2B45156C000
trusted library allocation
page read and write
2B44778A000
trusted library allocation
page read and write
2B44C7D0000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B44CDED000
trusted library allocation
page read and write
2B44CDBE000
trusted library allocation
page read and write
2B44CE8E000
trusted library allocation
page read and write
2B446BE4000
trusted library allocation
page read and write
2B43B8E9000
heap
page read and write
1D11EBF1000
heap
page read and write
2B4481B8000
trusted library allocation
page read and write
2B44CB20000
trusted library allocation
page read and write
2959A70A000
trusted library allocation
page read and write
B9B09FE000
stack
page read and write
2B43B899000
heap
page read and write
2B4514B0000
trusted library allocation
page read and write
2B4514E8000
trusted library allocation
page read and write
2B44725F000
trusted library allocation
page read and write
2B4419D1000
trusted library allocation
page read and write
2B4477B1000
trusted library allocation
page read and write
2B44C8D4000
trusted library allocation
page read and write
2B44C9CB000
trusted library allocation
page read and write
2B446D93000
trusted library allocation
page read and write
2B4474E6000
trusted library allocation
page read and write
2B446D0D000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B4483D0000
trusted library allocation
page read and write
2B445037000
trusted library allocation
page read and write
2B444C39000
trusted library allocation
page read and write
2B4421A9000
heap
page read and write
1D11E472000
unclassified section
page read and write
2B444962000
trusted library allocation
page read and write
2B4460A1000
trusted library allocation
page read and write
2B446D4A000
trusted library allocation
page read and write
2B441E83000
trusted library allocation
page read and write
2B444CD6000
trusted library allocation
page read and write
19AD1264000
trusted library allocation
page read and write
2B441980000
trusted library allocation
page read and write
2B446EE7000
trusted library allocation
page read and write
2B44CA9E000
trusted library allocation
page read and write
2B44894E000
trusted library allocation
page read and write
2B4447B3000
trusted library allocation
page read and write
2B4483C4000
trusted library allocation
page read and write
2B444C94000
trusted library allocation
page read and write
2B442B9C000
trusted library allocation
page read and write
208D3500000
trusted library allocation
page read and write
2B4450F1000
trusted library allocation
page read and write
2B444C8E000
trusted library allocation
page read and write
2B4444CB000
trusted library allocation
page read and write
2B4515F2000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4509CE000
trusted library allocation
page read and write
2B4468FB000
trusted library allocation
page read and write
2B446DD6000
trusted library allocation
page read and write
1D11DFC7000
trusted library allocation
page read and write
2B44C7E7000
trusted library allocation
page read and write
10C0000
heap
page read and write
2B43B88C000
heap
page read and write
2B45066B000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B450C59000
heap
page read and write
2B4508D1000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B446712000
trusted library allocation
page read and write
2B4473B3000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B44CA8A000
trusted library allocation
page read and write
2B446DE4000
trusted library allocation
page read and write
2B4421CB000
heap
page read and write
19AD0EE3000
heap
page read and write
2B43B87A000
heap
page read and write
2959A410000
heap
page read and write
2B44F06D000
trusted library allocation
page read and write
2B4466AC000
trusted library allocation
page read and write
2B43B900000
heap
page read and write
2B44C788000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4449E6000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4483E6000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B4483E6000
trusted library allocation
page read and write
2B44CCC3000
trusted library allocation
page read and write
2B444B98000
trusted library allocation
page read and write
2B44C883000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B44676E000
trusted library allocation
page read and write
2B4483ED000
trusted library allocation
page read and write
2B44CAD1000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
2B446B5A000
trusted library allocation
page read and write
2B44CCCE000
trusted library allocation
page read and write
2B447199000
trusted library allocation
page read and write
2B4474A0000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4449BE000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
610D4BE000
stack
page read and write
208D3281000
trusted library allocation
page read and write
2B44587D000
trusted library allocation
page read and write
19AD1272000
trusted library allocation
page read and write
2B44CDC7000
trusted library allocation
page read and write
2B4477A3000
trusted library allocation
page read and write
2B447270000
trusted library allocation
page read and write
2B4469F7000
trusted library allocation
page read and write
2B446944000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B4469FE000
trusted library allocation
page read and write
2B43B8D4000
heap
page read and write
2B44219D000
heap
page read and write
2B45032D000
trusted library allocation
page read and write
1D11EBB9000
heap
page read and write
2B43B884000
heap
page read and write
2B447447000
trusted library allocation
page read and write
2B4464DA000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B447429000
trusted library allocation
page read and write
19AD1262000
trusted library allocation
page read and write
1D11EC77000
heap
page read and write
2B448141000
trusted library allocation
page read and write
2B447286000
trusted library allocation
page read and write
2B4509C1000
trusted library allocation
page read and write
208D3219000
trusted library allocation
page read and write
1D398A62000
heap
page read and write
104F000
stack
page read and write
2B446D38000
trusted library allocation
page read and write
2B4450FD000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B44685B000
trusted library allocation
page read and write
2B446E9C000
trusted library allocation
page read and write
2B442437000
trusted library allocation
page read and write
2B4514E6000
trusted library allocation
page read and write
2B446DE2000
trusted library allocation
page read and write
2B44692B000
trusted library allocation
page read and write
19AD1050000
heap
page read and write
2B43B890000
heap
page read and write
2B446DC4000
trusted library allocation
page read and write
2B4481D4000
trusted library allocation
page read and write
A653BFF000
stack
page read and write
1D11DF0A000
trusted library allocation
page read and write
2B4419C7000
trusted library allocation
page read and write
2B447466000
trusted library allocation
page read and write
2B44CAEB000
trusted library allocation
page read and write
2B449086000
trusted library allocation
page read and write
2B44CC7D000
trusted library allocation
page read and write
1D11EB9C000
heap
page read and write
2B4443D4000
trusted library allocation
page read and write
2B446D65000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4469FE000
trusted library allocation
page read and write
2B451594000
trusted library allocation
page read and write
2B44CB85000
trusted library allocation
page read and write
2B446D56000
trusted library allocation
page read and write
2B447184000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B446D0D000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B44CEE7000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B43B88C000
heap
page read and write
2B442B53000
trusted library allocation
page read and write
2B4447C7000
trusted library allocation
page read and write
2B45075B000
trusted library allocation
page read and write
2B450349000
trusted library allocation
page read and write
2B450970000
trusted library allocation
page read and write
2B44CEF9000
trusted library allocation
page read and write
2B44091A000
trusted library allocation
page read and write
2B44CECE000
trusted library allocation
page read and write
2B451224000
trusted library allocation
page read and write
1D11EA04000
trusted library allocation
page read and write
1D11EBEB000
heap
page read and write
1D11EBF1000
heap
page read and write
2B446BD8000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B445E9D000
trusted library allocation
page read and write
19AD1298000
trusted library allocation
page read and write
2B445AC1000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B444B0A000
trusted library allocation
page read and write
2B4474BE000
trusted library allocation
page read and write
2B446983000
trusted library allocation
page read and write
2B4477C7000
trusted library allocation
page read and write
2B447774000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B4469F8000
trusted library allocation
page read and write
2B43B884000
heap
page read and write
2B446744000
trusted library allocation
page read and write
2B441E37000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B446CF0000
trusted library allocation
page read and write
2B4469C0000
trusted library allocation
page read and write
2B45027F000
trusted library allocation
page read and write
2B44CD07000
trusted library allocation
page read and write
2B440913000
trusted library allocation
page read and write
2B446E7F000
trusted library allocation
page read and write
2B444C8E000
trusted library allocation
page read and write
2B4477C3000
trusted library allocation
page read and write
1D11E613000
unkown
page execute read
2B44CC5C000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
610A15E000
unkown
page readonly
2B444351000
trusted library allocation
page read and write
103B000
stack
page read and write
2B44743B000
trusted library allocation
page read and write
2B4466F0000
trusted library allocation
page read and write
2B44CADB000
trusted library allocation
page read and write
2B448133000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44CACC000
trusted library allocation
page read and write
19AD1500000
heap
page read and write
2B445E33000
trusted library allocation
page read and write
2B451431000
trusted library allocation
page read and write
208D3506000
trusted library allocation
page read and write
208D3600000
trusted library allocation
page read and write
2B446D8C000
trusted library allocation
page read and write
2B4481B8000
trusted library allocation
page read and write
2B446EC2000
trusted library allocation
page read and write
610A1D8000
stack
page read and write
2B43B857000
heap
page read and write
2B4477C9000
trusted library allocation
page read and write
2B446983000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CE2B000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B44CC73000
trusted library allocation
page read and write
2B4482DC000
trusted library allocation
page read and write
2B446CFC000
trusted library allocation
page read and write
2B446F8A000
trusted library allocation
page read and write
2B44C952000
trusted library allocation
page read and write
1D11EB60000
heap
page read and write
2B44778B000
trusted library allocation
page read and write
2B445A6D000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CA11000
trusted library allocation
page read and write
2B441E88000
trusted library allocation
page read and write
19AD125D000
trusted library allocation
page read and write
2B445F68000
trusted library allocation
page read and write
2B445E3B000
trusted library allocation
page read and write
2B4465C3000
trusted library allocation
page read and write
2B44C7DB000
trusted library allocation
page read and write
2B44CAD1000
trusted library allocation
page read and write
2B448837000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
9EDE5D8000
stack
page read and write
2B44CE1D000
trusted library allocation
page read and write
2B4471F4000
trusted library allocation
page read and write
2B4508DB000
trusted library allocation
page read and write
1D11EBEB000
heap
page read and write
2B43B869000
heap
page read and write
2B4471FB000
trusted library allocation
page read and write
2B45124D000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B446475000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B44708B000
trusted library allocation
page read and write
2B445EAF000
trusted library allocation
page read and write
2B4474ED000
trusted library allocation
page read and write
2B444C87000
trusted library allocation
page read and write
2B4469A9000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CBAF000
trusted library allocation
page read and write
2B44C987000
trusted library allocation
page read and write
2B445EF1000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4473E4000
trusted library allocation
page read and write
2B44CA21000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B44C9ED000
trusted library allocation
page read and write
2B4477AB000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B45079E000
trusted library allocation
page read and write
2B4469D0000
trusted library allocation
page read and write
2B446D9F000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B44CA96000
trusted library allocation
page read and write
2B44CD4E000
trusted library allocation
page read and write
2B43B8A0000
heap
page read and write
2B44684A000
trusted library allocation
page read and write
B77E03E000
unkown
page readonly
2B448938000
trusted library allocation
page read and write
1D11DFC2000
trusted library allocation
page read and write
2B44672F000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
19AD1403000
trusted library allocation
page read and write
2B4462FE000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
B77E0BE000
unkown
page readonly
2B44CC2E000
trusted library allocation
page read and write
2B446DD6000
trusted library allocation
page read and write
2B44CC2E000
trusted library allocation
page read and write
208D328E000
trusted library allocation
page read and write
2B446913000
trusted library allocation
page read and write
2B44CEE1000
trusted library allocation
page read and write
2B4514B2000
trusted library allocation
page read and write
2B4460B2000
trusted library allocation
page read and write
2B446DA2000
trusted library allocation
page read and write
2B4409BF000
trusted library allocation
page read and write
1D11EBF1000
heap
page read and write
1D11EBE8000
heap
page read and write
2B446F24000
trusted library allocation
page read and write
2B4466FD000
trusted library allocation
page read and write
208D33E0000
heap
page read and write
2B441EC3000
trusted library allocation
page read and write
2B43B858000
heap
page read and write
2B4471E6000
trusted library allocation
page read and write
2B441F29000
trusted library allocation
page read and write
2B4477E3000
trusted library allocation
page read and write
2B446DE4000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B444925000
trusted library allocation
page read and write
1D11EB60000
heap
page read and write
1D398D00000
trusted library allocation
page read and write
2B446D93000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B449048000
trusted library allocation
page read and write
2B4515EA000
trusted library allocation
page read and write
2B43B87D000
heap
page read and write
2B440876000
trusted library allocation
page read and write
2B451257000
trusted library allocation
page read and write
2B446F61000
trusted library allocation
page read and write
2B44649B000
trusted library allocation
page read and write
2B44CDF3000
trusted library allocation
page read and write
2B449048000
trusted library allocation
page read and write
2B446D0A000
trusted library allocation
page read and write
2B44CDF3000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B4473D9000
trusted library allocation
page read and write
2B446913000
trusted library allocation
page read and write
123F000
heap
page read and write
1D11EB69000
heap
page read and write
2B43B882000
heap
page read and write
2B4449A0000
trusted library allocation
page read and write
2B43B8CA000
heap
page read and write
2B444CFC000
trusted library allocation
page read and write
2B4449B8000
trusted library allocation
page read and write
2B4515E4000
trusted library allocation
page read and write
2B44645A000
trusted library allocation
page read and write
2B446BF9000
trusted library allocation
page read and write
2B445A56000
trusted library allocation
page read and write
2B4468B0000
trusted library allocation
page read and write
2B445FDD000
trusted library allocation
page read and write
2B44CE3D000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B4421A5000
heap
page read and write
2B44CA90000
trusted library allocation
page read and write
2B450351000
trusted library allocation
page read and write
2B4482E1000
trusted library allocation
page read and write
2B445A30000
trusted library allocation
page read and write
2B4482C4000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B43B8BE000
heap
page read and write
2B44672C000
trusted library allocation
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B446D13000
trusted library allocation
page read and write
2B446706000
trusted library allocation
page read and write
2B44835E000
trusted library allocation
page read and write
2B450335000
trusted library allocation
page read and write
2B446728000
trusted library allocation
page read and write
2B442178000
heap
page read and write
2B44219D000
heap
page read and write
2B44CADD000
trusted library allocation
page read and write
2B4450EE000
trusted library allocation
page read and write
2B450658000
trusted library allocation
page read and write
2B4465C3000
trusted library allocation
page read and write
2B4449B8000
trusted library allocation
page read and write
2B446BB2000
trusted library allocation
page read and write
2B447496000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44498C000
trusted library allocation
page read and write
2B445E8F000
trusted library allocation
page read and write
2B44435F000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B43B88A000
heap
page read and write
2B4477C1000
trusted library allocation
page read and write
2B450340000
trusted library allocation
page read and write
85C000
unkown
page read and write
2B43B88B000
heap
page read and write
2B4483CB000
trusted library allocation
page read and write
1D11EBFD000
heap
page read and write
2B4449DE000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
2B448173000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B446E39000
trusted library allocation
page read and write
2B446970000
trusted library allocation
page read and write
2B445A36000
trusted library allocation
page read and write
2B4469D8000
trusted library allocation
page read and write
2B45125E000
trusted library allocation
page read and write
2B446448000
trusted library allocation
page read and write
2B44CC90000
trusted library allocation
page read and write
2B446FCC000
trusted library allocation
page read and write
1D11EBF2000
heap
page read and write
2B450351000
trusted library allocation
page read and write
2B4474AB000
trusted library allocation
page read and write
2B4483F5000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B4481C2000
trusted library allocation
page read and write
2B4477B9000
trusted library allocation
page read and write
2B4471B8000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B446BE7000
trusted library allocation
page read and write
2B4506E3000
trusted library allocation
page read and write
2B444C52000
trusted library allocation
page read and write
2B444476000
trusted library allocation
page read and write
2B451215000
trusted library allocation
page read and write
2B43B8E0000
heap
page read and write
2B4449A7000
trusted library allocation
page read and write
2B44CEA3000
trusted library allocation
page read and write
2B4447DA000
trusted library allocation
page read and write
2B446975000
trusted library allocation
page read and write
2B44471D000
trusted library allocation
page read and write
2B44672C000
trusted library allocation
page read and write
3C11000
heap
page read and write
2B45125B000
trusted library allocation
page read and write
2B44F0C8000
trusted library allocation
page read and write
2B44698A000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B43B885000
heap
page read and write
2B44900C000
trusted library allocation
page read and write
2B44F1A3000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B4463E6000
trusted library allocation
page read and write
2B44CD89000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B43B850000
heap
page read and write
2B446BD7000
trusted library allocation
page read and write
2B4466D8000
trusted library allocation
page read and write
2B4447F0000
trusted library allocation
page read and write
2B444BC5000
trusted library allocation
page read and write
2B4515CF000
trusted library allocation
page read and write
2B4468B9000
trusted library allocation
page read and write
1D11DF5F000
trusted library allocation
page read and write
2B4409AF000
trusted library allocation
page read and write
2B44CADD000
trusted library allocation
page read and write
2B446DFD000
trusted library allocation
page read and write
2B44676C000
trusted library allocation
page read and write
2B445F4F000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B451488000
trusted library allocation
page read and write
2B4481E8000
trusted library allocation
page read and write
2B451255000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CDFE000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
2B449106000
trusted library allocation
page read and write
2B44FB00000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B43B885000
heap
page read and write
2B43B877000
heap
page read and write
2B445AC3000
trusted library allocation
page read and write
2B4469F1000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
B77BD5E000
stack
page read and write
2B44CEEF000
trusted library allocation
page read and write
2B444CCD000
trusted library allocation
page read and write
2B445F97000
trusted library allocation
page read and write
2B4477B6000
trusted library allocation
page read and write
2B4473EF000
trusted library allocation
page read and write
2B44C91F000
trusted library allocation
page read and write
2B445066000
trusted library allocation
page read and write
2B43B8E9000
heap
page read and write
2B447418000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B446692000
trusted library allocation
page read and write
2B44492C000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B442B85000
trusted library allocation
page read and write
1D11EBEB000
heap
page read and write
2B444CBB000
trusted library allocation
page read and write
2B450961000
trusted library allocation
page read and write
2B446712000
trusted library allocation
page read and write
2B446DAF000
trusted library allocation
page read and write
2B44CAA6000
trusted library allocation
page read and write
2B44C995000
trusted library allocation
page read and write
2B450351000
trusted library allocation
page read and write
2B44683A000
trusted library allocation
page read and write
2B43B8E6000
heap
page read and write
2B4464CE000
trusted library allocation
page read and write
2B449502000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B4421BD000
heap
page read and write
1154000
heap
page read and write
2B4473DE000
trusted library allocation
page read and write
2B4469F1000
trusted library allocation
page read and write
2B4470C3000
trusted library allocation
page read and write
2B448392000
trusted library allocation
page read and write
2B4466E3000
trusted library allocation
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B45123D000
trusted library allocation
page read and write
2B446D4C000
trusted library allocation
page read and write
2B4473BC000
trusted library allocation
page read and write
2B4509B2000
trusted library allocation
page read and write
2B44CB9B000
trusted library allocation
page read and write
2B446A0B000
trusted library allocation
page read and write
1D398A37000
heap
page read and write
B77E07E000
stack
page read and write
2B44CE30000
trusted library allocation
page read and write
2B441E31000
trusted library allocation
page read and write
2B4449B6000
trusted library allocation
page read and write
2B44708E000
trusted library allocation
page read and write
2B44474B000
trusted library allocation
page read and write
2B444723000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
1D11EBE8000
heap
page read and write
2B4477F3000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B449005000
trusted library allocation
page read and write
1228000
heap
page read and write
2B43B885000
heap
page read and write
2B44CAC9000
trusted library allocation
page read and write
2B444CA5000
trusted library allocation
page read and write
2B44CB9B000
trusted library allocation
page read and write
2B444C56000
trusted library allocation
page read and write
2B4503CB000
trusted library allocation
page read and write
2B4490E4000
trusted library allocation
page read and write
2B441EB6000
trusted library allocation
page read and write
2B4506E7000
trusted library allocation
page read and write
208D32A0000
trusted library allocation
page read and write
1D11EC58000
heap
page read and write
124B000
heap
page read and write
2B43B857000
heap
page read and write
2B441E74000
trusted library allocation
page read and write
2B4477BE000
trusted library allocation
page read and write
2B4468DA000
trusted library allocation
page read and write
2B44CC25000
trusted library allocation
page read and write
2B4506E9000
trusted library allocation
page read and write
2B445F47000
trusted library allocation
page read and write
1D11E610000
unkown
page execute read
2B4477B6000
trusted library allocation
page read and write
2B446BD8000
trusted library allocation
page read and write
2B446D9A000
trusted library allocation
page read and write
2B44C932000
trusted library allocation
page read and write
2B44CB9E000
trusted library allocation
page read and write
208D33D6000
heap
page read and write
2B44513D000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B441E99000
trusted library allocation
page read and write
2B44CEBF000
trusted library allocation
page read and write
3C10000
heap
page read and write
2B44E502000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
208D2F30000
unclassified section
page readonly
2B43B869000
heap
page read and write
2B4421BD000
heap
page read and write
1D11EBE6000
heap
page read and write
2B44CA8E000
trusted library allocation
page read and write
610D53E000
stack
page read and write
1D11EC21000
heap
page read and write
2B447483000
trusted library allocation
page read and write
2B445ED9000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44CE14000
trusted library allocation
page read and write
9EDFF7E000
unkown
page readonly
2B441EAF000
trusted library allocation
page read and write
2B446728000
trusted library allocation
page read and write
1D11EB8A000
heap
page read and write
2B444969000
trusted library allocation
page read and write
2B4449DE000
trusted library allocation
page read and write
2B44671A000
trusted library allocation
page read and write
2B442B86000
trusted library allocation
page read and write
2B445FBD000
trusted library allocation
page read and write
2B4421A6000
heap
page read and write
2B44709D000
trusted library allocation
page read and write
B77F13E000
unkown
page readonly
2B44CA1E000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B445E7D000
trusted library allocation
page read and write
2B44C9DC000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B4507AA000
trusted library allocation
page read and write
2B44C7E3000
trusted library allocation
page read and write
2B4466F7000
trusted library allocation
page read and write
2B44CC5A000
trusted library allocation
page read and write
2B44881C000
trusted library allocation
page read and write
2B44912C000
trusted library allocation
page read and write
2B45023C000
trusted library allocation
page read and write
2B441DFC000
trusted library allocation
page read and write
610CC7E000
stack
page read and write
1D11EBE3000
heap
page read and write
2B44C7FC000
trusted library allocation
page read and write
2B4421E0000
heap
page read and write
2B43B851000
heap
page read and write
208D32C3000
trusted library allocation
page read and write
2B445EBD000
trusted library allocation
page read and write
2B45079C000
trusted library allocation
page read and write
2B441E58000
trusted library allocation
page read and write
2B4464AB000
trusted library allocation
page read and write
2B44728B000
trusted library allocation
page read and write
2B444CBB000
trusted library allocation
page read and write
2B44F107000
trusted library allocation
page read and write
2B446D8A000
trusted library allocation
page read and write
790000
unkown
page readonly
2B4409CB000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B44C975000
trusted library allocation
page read and write
2B446731000
trusted library allocation
page read and write
2B44CC0E000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B446719000
trusted library allocation
page read and write
2B448D36000
trusted library allocation
page read and write
2B44CDC3000
trusted library allocation
page read and write
2B446D3D000
trusted library allocation
page read and write
2B441E87000
trusted library allocation
page read and write
2B446F5B000
trusted library allocation
page read and write
2B4477DD000
trusted library allocation
page read and write
2B448195000
trusted library allocation
page read and write
2B44CEEF000
trusted library allocation
page read and write
2B447479000
trusted library allocation
page read and write
2B44C9ED000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B44838C000
trusted library allocation
page read and write
1D11EC6C000
heap
page read and write
2B446FAE000
trusted library allocation
page read and write
2B44CAA8000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
1D11EBEB000
heap
page read and write
2B4466F0000
trusted library allocation
page read and write
2B444796000
trusted library allocation
page read and write
2B446740000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B43B8CF000
heap
page read and write
2B4421A1000
heap
page read and write
2B43B882000
heap
page read and write
B9B01FD000
stack
page read and write
2B446D56000
trusted library allocation
page read and write
2B446726000
trusted library allocation
page read and write
2B445FA4000
trusted library allocation
page read and write
37D0000
heap
page read and write
2B43B869000
heap
page read and write
2B44CD21000
trusted library allocation
page read and write
2B4421BD000
heap
page read and write
2B4447E4000
trusted library allocation
page read and write
2B446FA4000
trusted library allocation
page read and write
1D11EC00000
heap
page read and write
208D3203000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B4509F4000
trusted library allocation
page read and write
2B43B88B000
heap
page read and write
2B4506AC000
trusted library allocation
page read and write
2B4449B1000
trusted library allocation
page read and write
2B447248000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
2B43B897000
heap
page read and write
2B44CEF9000
trusted library allocation
page read and write
2B447500000
trusted library allocation
page read and write
2B450961000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CD42000
trusted library allocation
page read and write
2B448D32000
trusted library allocation
page read and write
2B449043000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B4508C9000
trusted library allocation
page read and write
2B444BF7000
trusted library allocation
page read and write
2B4469C0000
trusted library allocation
page read and write
122D000
heap
page read and write
2B446D9C000
trusted library allocation
page read and write
2B4469D8000
trusted library allocation
page read and write
2B44C9C7000
trusted library allocation
page read and write
2B43B890000
heap
page read and write
2B44CA27000
trusted library allocation
page read and write
2B44670F000
trusted library allocation
page read and write
2B446767000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44CAC9000
trusted library allocation
page read and write
2B44CEAE000
trusted library allocation
page read and write
2B448308000
trusted library allocation
page read and write
208D3310000
unclassified section
page read and write
2B445ED9000
trusted library allocation
page read and write
2B441E4A000
trusted library allocation
page read and write
2B4515CF000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B43B851000
heap
page read and write
2B4503C7000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B441EDE000
trusted library allocation
page read and write
2B4469EB000
trusted library allocation
page read and write
2B44CA15000
trusted library allocation
page read and write
2B44C7CC000
trusted library allocation
page read and write
2B446A7C000
trusted library allocation
page read and write
2B446D36000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B43B8AC000
heap
page read and write
2B445EF1000
trusted library allocation
page read and write
2B4509C1000
trusted library allocation
page read and write
2B44CCD9000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B88F000
heap
page read and write
2B44CE3D000
trusted library allocation
page read and write
2B44CA85000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B43B857000
heap
page read and write
2B450270000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
208D2F10000
remote allocation
page read and write
2B43B8C1000
heap
page read and write
208D2EA0000
unclassified section
page readonly
2B441D2A000
trusted library allocation
page read and write
2B4470A1000
trusted library allocation
page read and write
2B4483A8000
trusted library allocation
page read and write
19AD1300000
unclassified section
page readonly
2B4460AA000
trusted library allocation
page read and write
2B4507E1000
trusted library allocation
page read and write
2B444B90000
trusted library allocation
page read and write
2B44C975000
trusted library allocation
page read and write
2B451478000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B885000
heap
page read and write
2B44C98A000
trusted library allocation
page read and write
2B4466E0000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B43B881000
heap
page read and write
2B43B88F000
heap
page read and write
2B445F9D000
trusted library allocation
page read and write
2B441D92000
trusted library allocation
page read and write
2B4471F4000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B4402C6000
trusted library allocation
page read and write
2B445A46000
trusted library allocation
page read and write
2B44CAC4000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B44687A000
trusted library allocation
page read and write
2B445AB6000
trusted library allocation
page read and write
1D11DBB0000
unclassified section
page readonly
2B43B881000
heap
page read and write
2B444C5B000
trusted library allocation
page read and write
2B448173000
trusted library allocation
page read and write
2B44CC2E000
trusted library allocation
page read and write
2B44CE69000
trusted library allocation
page read and write
2B445A5F000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B44CC93000
trusted library allocation
page read and write
2B43B8C3000
heap
page read and write
2B44CE30000
trusted library allocation
page read and write
2B4490A7000
trusted library allocation
page read and write
2B4473CE000
trusted library allocation
page read and write
2B446D8C000
trusted library allocation
page read and write
2B441E3C000
trusted library allocation
page read and write
2B450684000
trusted library allocation
page read and write
2B446DAF000
trusted library allocation
page read and write
2B4477AB000
trusted library allocation
page read and write
9EDFEBC000
stack
page read and write
2B445F5C000
trusted library allocation
page read and write
2B4477E0000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4472B8000
trusted library allocation
page read and write
2B446BD2000
trusted library allocation
page read and write
2B450BC1000
heap
page read and write
2B43B88C000
heap
page read and write
2B43B881000
heap
page read and write
2B44C9F6000
trusted library allocation
page read and write
2B442B81000
trusted library allocation
page read and write
2B4515E1000
trusted library allocation
page read and write
2B446DE4000
trusted library allocation
page read and write
1154000
heap
page read and write
2B43B885000
heap
page read and write
2B43B860000
heap
page read and write
1D11EBAA000
heap
page read and write
2B44CAC9000
trusted library allocation
page read and write
2B4449E2000
trusted library allocation
page read and write
2B446CED000
trusted library allocation
page read and write
1D11DF5C000
trusted library allocation
page read and write
2B4421BD000
heap
page read and write
791000
unkown
page execute read
2B44CAA8000
trusted library allocation
page read and write
2B448FE5000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B4515CF000
trusted library allocation
page read and write
2B4473E0000
trusted library allocation
page read and write
2B4515CF000
trusted library allocation
page read and write
2B43B889000
heap
page read and write
2B43B884000
heap
page read and write
2B441D9B000
trusted library allocation
page read and write
2B44EEFD000
trusted library allocation
page read and write
2B446744000
trusted library allocation
page read and write
2B446728000
trusted library allocation
page read and write
2B441E52000
trusted library allocation
page read and write
2B4450F3000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
2B445A67000
trusted library allocation
page read and write
2B4515F5000
trusted library allocation
page read and write
2B4450DE000
trusted library allocation
page read and write
1D39A5A0000
heap
page read and write
2B4469F5000
trusted library allocation
page read and write
2B4457DD000
trusted library allocation
page read and write
2B44C8E9000
trusted library allocation
page read and write
2B44CAE7000
trusted library allocation
page read and write
1D11DF14000
trusted library allocation
page read and write
1D11EB5F000
heap
page read and write
2B4477B6000
trusted library allocation
page read and write
2B4469B0000
trusted library allocation
page read and write
2B4515B1000
trusted library allocation
page read and write
2B446DE0000
trusted library allocation
page read and write
2B43B86B000
heap
page read and write
1ACD000
stack
page read and write
2B43B875000
heap
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B4515DB000
trusted library allocation
page read and write
2B44CA2D000
trusted library allocation
page read and write
2B4421A9000
heap
page read and write
2B451253000
trusted library allocation
page read and write
2B4449A5000
trusted library allocation
page read and write
2B446E9A000
trusted library allocation
page read and write
2B44CABE000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B44CAD1000
trusted library allocation
page read and write
2B44CE84000
trusted library allocation
page read and write
2B44C9D0000
trusted library allocation
page read and write
610A1DB000
stack
page read and write
2B43B87A000
heap
page read and write
2B4483D0000
trusted library allocation
page read and write
2B446F6E000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B43B885000
heap
page read and write
2B44817B000
trusted library allocation
page read and write
2B446DAD000
trusted library allocation
page read and write
2B44776A000
trusted library allocation
page read and write
208D32A8000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B446EC2000
trusted library allocation
page read and write
2B445EB9000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B4490E4000
trusted library allocation
page read and write
208D32DA000
trusted library allocation
page read and write
2B446B82000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B445EDD000
trusted library allocation
page read and write
2B44672F000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B44CE4C000
trusted library allocation
page read and write
2B44F22E000
trusted library allocation
page read and write
124B000
heap
page read and write
2B441E88000
trusted library allocation
page read and write
2B45146B000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B88F000
heap
page read and write
2B44C83E000
trusted library allocation
page read and write
2B441956000
trusted library allocation
page read and write
2B4449E2000
trusted library allocation
page read and write
2B441EC3000
trusted library allocation
page read and write
2B446973000
trusted library allocation
page read and write
1231000
heap
page read and write
2B43B861000
heap
page read and write
2B445A97000
trusted library allocation
page read and write
2B43B861000
heap
page read and write
2B440975000
trusted library allocation
page read and write
2B4466B5000
trusted library allocation
page read and write
2B45030C000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B450970000
trusted library allocation
page read and write
2B4449A5000
trusted library allocation
page read and write
2B448FA2000
trusted library allocation
page read and write
2B4477FB000
trusted library allocation
page read and write
2B444CBE000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B43B8BF000
heap
page read and write
2B4469FE000
trusted library allocation
page read and write
2B4489F1000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44812E000
trusted library allocation
page read and write
2B448388000
trusted library allocation
page read and write
2B447761000
trusted library allocation
page read and write
2B445ECF000
trusted library allocation
page read and write
2B44CD72000
trusted library allocation
page read and write
1D11DBA0000
unclassified section
page readonly
2B4449BE000
trusted library allocation
page read and write
2B4506EF000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B44CE0B000
trusted library allocation
page read and write
2B44697F000
trusted library allocation
page read and write
2B44695F000
trusted library allocation
page read and write
2B4463E4000
trusted library allocation
page read and write
2B44900C000
trusted library allocation
page read and write
2B442B5D000
trusted library allocation
page read and write
2B446D8A000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B446B68000
trusted library allocation
page read and write
2B446DAC000
trusted library allocation
page read and write
2B44830C000
trusted library allocation
page read and write
2B4483FD000
trusted library allocation
page read and write
2B4450EE000
trusted library allocation
page read and write
2B43B8BF000
heap
page read and write
2B445F1E000
trusted library allocation
page read and write
2B4483C8000
trusted library allocation
page read and write
2B451213000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
1D11EB69000
heap
page read and write
2B441E3C000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CADB000
trusted library allocation
page read and write
2B44CC43000
trusted library allocation
page read and write
2B446983000
trusted library allocation
page read and write
2B444B5C000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B43B858000
heap
page read and write
2B44CADD000
trusted library allocation
page read and write
2B446D30000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B43B860000
heap
page read and write
2B43B869000
heap
page read and write
1D11EB60000
heap
page read and write
208D3211000
trusted library allocation
page read and write
2B446C63000
trusted library allocation
page read and write
2B4466E6000
trusted library allocation
page read and write
2B446AEC000
trusted library allocation
page read and write
2B44CCE9000
trusted library allocation
page read and write
2B43B8FE000
heap
page read and write
2B444C92000
trusted library allocation
page read and write
2B4421BD000
heap
page read and write
2B44CEB2000
trusted library allocation
page read and write
2B4421BC000
heap
page read and write
2B44C977000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B4469B0000
trusted library allocation
page read and write
1239000
heap
page read and write
2B4449A5000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B444BA9000
trusted library allocation
page read and write
2B4474AB000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B444C8C000
trusted library allocation
page read and write
2B4507A2000
trusted library allocation
page read and write
2B445E97000
trusted library allocation
page read and write
2B446CAB000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B445A2B000
trusted library allocation
page read and write
2B4462DA000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
208D3200000
trusted library allocation
page read and write
2B4469C0000
trusted library allocation
page read and write
2B44F105000
trusted library allocation
page read and write
2B45072C000
trusted library allocation
page read and write
2B44CCC3000
trusted library allocation
page read and write
2B44906D000
trusted library allocation
page read and write
2B44CDBC000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B8C6000
heap
page read and write
2B448D36000
trusted library allocation
page read and write
2B4453D9000
trusted library allocation
page read and write
2B43B8CA000
heap
page read and write
2B445EB0000
trusted library allocation
page read and write
2B4447DF000
trusted library allocation
page read and write
2B4463FA000
trusted library allocation
page read and write
2B44472C000
trusted library allocation
page read and write
B77DFFE000
unkown
page readonly
1D11EA29000
trusted library allocation
page read and write
208D3100000
trusted library allocation
page read and write
2B44778F000
trusted library allocation
page read and write
2B440926000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B4515D3000
trusted library allocation
page read and write
2B444C65000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B447790000
trusted library allocation
page read and write
2B441DA2000
trusted library allocation
page read and write
19AD0EE0000
heap
page read and write
2B451486000
trusted library allocation
page read and write
2B442B63000
trusted library allocation
page read and write
2B445F0F000
trusted library allocation
page read and write
2B4447E4000
trusted library allocation
page read and write
2B44C9B9000
trusted library allocation
page read and write
2B43B899000
heap
page read and write
2B44C9DC000
trusted library allocation
page read and write
2B4477FD000
trusted library allocation
page read and write
2B4458A7000
trusted library allocation
page read and write
2B4469D0000
trusted library allocation
page read and write
2B44672C000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
610F57E000
unkown
page readonly
1D11E480000
trusted library allocation
page read and write
2B450697000
trusted library allocation
page read and write
2959A560000
heap
page read and write
2B446987000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4469D8000
trusted library allocation
page read and write
2B4477FB000
trusted library allocation
page read and write
2B44CAC4000
trusted library allocation
page read and write
2B4490A3000
trusted library allocation
page read and write
2B44CCE9000
trusted library allocation
page read and write
2B44CCE3000
trusted library allocation
page read and write
208D2FC0000
heap
page read and write
2B4490A7000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B43B863000
heap
page read and write
2B44217B000
heap
page read and write
2B451481000
trusted library allocation
page read and write
2B44C9F6000
trusted library allocation
page read and write
2B44CAC1000
trusted library allocation
page read and write
2B44C874000
trusted library allocation
page read and write
2B44CEE7000
trusted library allocation
page read and write
19AD10F0000
heap
page read and write
2B43B885000
heap
page read and write
2B447408000
trusted library allocation
page read and write
123C000
heap
page read and write
2B43B8C0000
heap
page read and write
2B44835A000
trusted library allocation
page read and write
1D11EBE0000
heap
page read and write
2B44CACF000
trusted library allocation
page read and write
2B4473A7000
trusted library allocation
page read and write
2B445A52000
trusted library allocation
page read and write
2B4462E3000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B444CD8000
trusted library allocation
page read and write
2B45125C000
trusted library allocation
page read and write
2B445778000
trusted library allocation
page read and write
2B44746B000
trusted library allocation
page read and write
2B4468CE000
trusted library allocation
page read and write
1D11EC77000
heap
page read and write
2B444792000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4515BB000
trusted library allocation
page read and write
2B44904D000
trusted library allocation
page read and write
1D11EB60000
heap
page read and write
610D4FE000
unkown
page readonly
2B4490C5000
trusted library allocation
page read and write
2B4457B9000
trusted library allocation
page read and write
2B445EF9000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B446D77000
trusted library allocation
page read and write
2B446EF3000
trusted library allocation
page read and write
2B44CD3E000
trusted library allocation
page read and write
2B4483CB000
trusted library allocation
page read and write
2B4474E6000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4474EB000
trusted library allocation
page read and write
19AD1092000
unclassified section
page read and write
2B43B885000
heap
page read and write
1D11EC6C000
heap
page read and write
2B446BF5000
trusted library allocation
page read and write
2B450349000
trusted library allocation
page read and write
2B4449AE000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B4443FB000
trusted library allocation
page read and write
2B446EF4000
trusted library allocation
page read and write
2B4447A6000
trusted library allocation
page read and write
2B44C7C8000
trusted library allocation
page read and write
2B445F47000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B4506C7000
trusted library allocation
page read and write
2B4474C4000
trusted library allocation
page read and write
2B4468C9000
trusted library allocation
page read and write
2B4468EB000
trusted library allocation
page read and write
208D3340000
unclassified section
page readonly
2B43B852000
heap
page read and write
2B44C87F000
trusted library allocation
page read and write
2B446DA6000
trusted library allocation
page read and write
19AD1212000
trusted library allocation
page read and write
2B446712000
trusted library allocation
page read and write
19AD1210000
trusted library allocation
page read and write
2B44CD46000
trusted library allocation
page read and write
2B44CAA8000
trusted library allocation
page read and write
1D39A5AC000
heap
page read and write
2B44CEAE000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B446EA0000
trusted library allocation
page read and write
1239000
heap
page read and write
2B44CE3B000
trusted library allocation
page read and write
2B45123D000
trusted library allocation
page read and write
2B4477A5000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B441D6D000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4506AC000
trusted library allocation
page read and write
2B446EC8000
trusted library allocation
page read and write
2B44CEEF000
trusted library allocation
page read and write
2959A707000
trusted library allocation
page read and write
2B441960000
trusted library allocation
page read and write
2B45155A000
trusted library allocation
page read and write
2B445E3B000
trusted library allocation
page read and write
2B446D72000
trusted library allocation
page read and write
2B440982000
trusted library allocation
page read and write
2B442B81000
trusted library allocation
page read and write
2B442B9C000
trusted library allocation
page read and write
2B4481AA000
trusted library allocation
page read and write
2B4477C5000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B43B889000
heap
page read and write
2B446DE4000
trusted library allocation
page read and write
2B4421AB000
heap
page read and write
2B4503C1000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B448188000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
1D11EC6C000
heap
page read and write
2B4450B9000
trusted library allocation
page read and write
19AD0FD0000
heap
page read and write
2B44CC3D000
trusted library allocation
page read and write
2B446712000
trusted library allocation
page read and write
2B446D8E000
trusted library allocation
page read and write
A5659F24000
trusted library allocation
page read and write
1D11DF03000
trusted library allocation
page read and write
2B444CB2000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4449AE000
trusted library allocation
page read and write
2B444494000
trusted library allocation
page read and write
2B43B8C9000
heap
page read and write
2B449106000
trusted library allocation
page read and write
2B445F8F000
trusted library allocation
page read and write
2B4449B1000
trusted library allocation
page read and write
2B450335000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B444B6A000
trusted library allocation
page read and write
2B447439000
trusted library allocation
page read and write
2B4450FA000
trusted library allocation
page read and write
2B44C767000
trusted library allocation
page read and write
2B44CAA6000
trusted library allocation
page read and write
2B444CC3000
trusted library allocation
page read and write
2B450949000
trusted library allocation
page read and write
2B444CB7000
trusted library allocation
page read and write
2B446F45000
trusted library allocation
page read and write
2B445EF9000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B8FE000
heap
page read and write
2B44CA98000
trusted library allocation
page read and write
1208000
heap
page read and write
2B44778F000
trusted library allocation
page read and write
2B4449CD000
trusted library allocation
page read and write
2B446726000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CE42000
trusted library allocation
page read and write
2B4515AE000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B45035B000
trusted library allocation
page read and write
2B4468F6000
trusted library allocation
page read and write
2B446BFD000
trusted library allocation
page read and write
2B447462000
trusted library allocation
page read and write
2B4449AE000
trusted library allocation
page read and write
2B444B7E000
trusted library allocation
page read and write
2B447717000
trusted library allocation
page read and write
1D398A53000
heap
page read and write
2B44E700000
trusted library allocation
page read and write
2B4473D0000
trusted library allocation
page read and write
2B4463DC000
trusted library allocation
page read and write
2B4466D6000
trusted library allocation
page read and write
2B446D7C000
trusted library allocation
page read and write
2B44EE57000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44694C000
trusted library allocation
page read and write
2B446DAF000
trusted library allocation
page read and write
2B44499A000
trusted library allocation
page read and write
2B441E74000
trusted library allocation
page read and write
2B45035B000
trusted library allocation
page read and write
2B43B884000
heap
page read and write
2B445F54000
trusted library allocation
page read and write
2B44CDED000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4457F1000
trusted library allocation
page read and write
2B44CAA2000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44C952000
trusted library allocation
page read and write
2B44770F000
trusted library allocation
page read and write
2B44029E000
trusted library allocation
page read and write
2B445EF9000
trusted library allocation
page read and write
2B444B91000
trusted library allocation
page read and write
2B451249000
trusted library allocation
page read and write
2B445A27000
trusted library allocation
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B44CED9000
trusted library allocation
page read and write
1D11EA00000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B43B87C000
heap
page read and write
2B4477AD000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B43B8C6000
heap
page read and write
1D11EBE9000
heap
page read and write
2B44CE09000
trusted library allocation
page read and write
2B444CD3000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B444366000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B447466000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B445E61000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B447222000
trusted library allocation
page read and write
2B44F22C000
trusted library allocation
page read and write
2B451240000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4447FB000
trusted library allocation
page read and write
2B444CBB000
trusted library allocation
page read and write
2B444B8B000
trusted library allocation
page read and write
2959A45F000
heap
page read and write
2B4450F8000
trusted library allocation
page read and write
2B4514F1000
trusted library allocation
page read and write
2B4477FB000
trusted library allocation
page read and write
208D3300000
heap
page readonly
1D11EC77000
heap
page read and write
2B43B89D000
heap
page read and write
2B43B85C000
heap
page read and write
2B4469F1000
trusted library allocation
page read and write
2B448D58000
trusted library allocation
page read and write
19AD1200000
trusted library allocation
page read and write
2B445F3B000
trusted library allocation
page read and write
2B4469FE000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B446D56000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
19AD10A0000
heap
page read and write
2B4506E5000
trusted library allocation
page read and write
2B445F38000
trusted library allocation
page read and write
2B4464DD000
trusted library allocation
page read and write
2B44F1AC000
trusted library allocation
page read and write
2B44CAFE000
trusted library allocation
page read and write
2B44473E000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
208D360C000
trusted library allocation
page read and write
2B448338000
trusted library allocation
page read and write
2B44CDBC000
trusted library allocation
page read and write
2B4477EA000
trusted library allocation
page read and write
2B4483E2000
trusted library allocation
page read and write
2B4483CD000
trusted library allocation
page read and write
2B442BCB000
trusted library allocation
page read and write
2B4468DC000
trusted library allocation
page read and write
2B45126E000
trusted library allocation
page read and write
2B44CDF5000
trusted library allocation
page read and write
2B44493B000
trusted library allocation
page read and write
2B451236000
trusted library allocation
page read and write
2B4506E7000
trusted library allocation
page read and write
2B450683000
trusted library allocation
page read and write
2B4515EC000
trusted library allocation
page read and write
2B446D41000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B43B87A000
heap
page read and write
2B4444EE000
trusted library allocation
page read and write
2B446D9C000
trusted library allocation
page read and write
19AD109F000
unclassified section
page read and write
2B44472C000
trusted library allocation
page read and write
2B451255000
trusted library allocation
page read and write
2B4477E7000
trusted library allocation
page read and write
2B44CE24000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B444B8B000
trusted library allocation
page read and write
2B4449CD000
trusted library allocation
page read and write
2B446966000
trusted library allocation
page read and write
2B44838F000
trusted library allocation
page read and write
2B447292000
trusted library allocation
page read and write
2B44CB12000
trusted library allocation
page read and write
2B450C49000
heap
page read and write
2B445E85000
trusted library allocation
page read and write
2B44CCFE000
trusted library allocation
page read and write
2B43B8C0000
heap
page read and write
2B4409AF000
trusted library allocation
page read and write
2B45149C000
trusted library allocation
page read and write
2B445FA1000
trusted library allocation
page read and write
2B44779E000
trusted library allocation
page read and write
2B44CED6000
trusted library allocation
page read and write
2B448346000
trusted library allocation
page read and write
2B44CA7D000
trusted library allocation
page read and write
1254000
heap
page read and write
2B43B8AC000
heap
page read and write
2B44C7C0000
trusted library allocation
page read and write
2B44F193000
trusted library allocation
page read and write
2B445E9D000
trusted library allocation
page read and write
2B446E5F000
trusted library allocation
page read and write
2B4483C9000
trusted library allocation
page read and write
2B450CA3000
heap
page read and write
97DC0A1000
trusted library allocation
page execute read
2B44F1C5000
trusted library allocation
page read and write
2B4421A9000
heap
page read and write
2B446B90000
trusted library allocation
page read and write
2B4490AC000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44CC76000
trusted library allocation
page read and write
2B44746B000
trusted library allocation
page read and write
208D33D4000
heap
page read and write
1D11EB60000
heap
page read and write
1154000
heap
page read and write
101F000
stack
page read and write
2B447089000
trusted library allocation
page read and write
2B4483F8000
trusted library allocation
page read and write
2B451576000
trusted library allocation
page read and write
2B44199C000
trusted library allocation
page read and write
2B445E83000
trusted library allocation
page read and write
2B44CB88000
trusted library allocation
page read and write
2B4458BA000
trusted library allocation
page read and write
2B44C800000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B446A7C000
trusted library allocation
page read and write
2B43B8AC000
heap
page read and write
2B448D6C000
trusted library allocation
page read and write
1222000
heap
page read and write
2B44C99A000
trusted library allocation
page read and write
2B4477CD000
trusted library allocation
page read and write
1D11DF74000
trusted library allocation
page read and write
2B45035B000
trusted library allocation
page read and write
2B70003F000
trusted library allocation
page read and write
2B4506E1000
trusted library allocation
page read and write
123D000
heap
page read and write
2B43B858000
heap
page read and write
2B4449A7000
trusted library allocation
page read and write
2B4483F8000
trusted library allocation
page read and write
2B44217A000
heap
page read and write
2B43B8BF000
heap
page read and write
19AD12B4000
trusted library allocation
page read and write
2B446D20000
trusted library allocation
page read and write
2B448805000
trusted library allocation
page read and write
2B446EEB000
trusted library allocation
page read and write
11E0000
heap
page read and write
2B4469F1000
trusted library allocation
page read and write
19AD10F6000
heap
page read and write
2B446EC8000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B441D73000
trusted library allocation
page read and write
2B4449A5000
trusted library allocation
page read and write
2B44CE1D000
trusted library allocation
page read and write
2B4402DF000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B440966000
trusted library allocation
page read and write
2B4454F3000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
A6533FF000
stack
page read and write
2B446D88000
trusted library allocation
page read and write
2B43B889000
heap
page read and write
2B43B861000
heap
page read and write
2B44CEB2000
trusted library allocation
page read and write
2B446F27000
trusted library allocation
page read and write
2B446CB8000
trusted library allocation
page read and write
2B44CAC9000
trusted library allocation
page read and write
2B445E7B000
trusted library allocation
page read and write
2B4477DD000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B44CB59000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
19AD120D000
trusted library allocation
page read and write
2B448377000
trusted library allocation
page read and write
2B44F084000
trusted library allocation
page read and write
2B43B862000
heap
page read and write
2B448366000
trusted library allocation
page read and write
2B4469F3000
trusted library allocation
page read and write
2B4464CE000
trusted library allocation
page read and write
1D11EC22000
heap
page read and write
19AD1417000
trusted library allocation
page read and write
2B44CEE7000
trusted library allocation
page read and write
1256000
heap
page read and write
2B45149C000
trusted library allocation
page read and write
2B445E80000
trusted library allocation
page read and write
2B4470EA000
trusted library allocation
page read and write
122E000
heap
page read and write
2B4477B6000
trusted library allocation
page read and write
2B446E81000
trusted library allocation
page read and write
2B4477ED000
trusted library allocation
page read and write
2B441EDE000
trusted library allocation
page read and write
2B4450E1000
trusted library allocation
page read and write
2B4408FB000
trusted library allocation
page read and write
1D3989F5000
heap
page read and write
2B43B857000
heap
page read and write
2B43B852000
heap
page read and write
2B446D9C000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B442178000
heap
page read and write
2B4509C1000
trusted library allocation
page read and write
2B44CEE3000
trusted library allocation
page read and write
1D11EC77000
heap
page read and write
2B43B857000
heap
page read and write
2B444C98000
trusted library allocation
page read and write
2B445EF1000
trusted library allocation
page read and write
2B44742D000
trusted library allocation
page read and write
2B4506B0000
trusted library allocation
page read and write
2B4477B9000
trusted library allocation
page read and write
2B45159F000
trusted library allocation
page read and write
2B4483CB000
trusted library allocation
page read and write
2B446987000
trusted library allocation
page read and write
2B4473DC000
trusted library allocation
page read and write
2B44669D000
trusted library allocation
page read and write
2B4458D5000
trusted library allocation
page read and write
2B44676E000
trusted library allocation
page read and write
2B4514FD000
trusted library allocation
page read and write
1D11E670000
heap
page read and write
2B4449E6000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B442BA2000
trusted library allocation
page read and write
2B4447F4000
trusted library allocation
page read and write
2B44F1E4000
trusted library allocation
page read and write
2B4449C7000
trusted library allocation
page read and write
2B44F0CE000
trusted library allocation
page read and write
2B44F105000
trusted library allocation
page read and write
2B44814A000
trusted library allocation
page read and write
2B44CCC1000
trusted library allocation
page read and write
2B446CFE000
trusted library allocation
page read and write
2B43B869000
heap
page read and write
2B45035B000
trusted library allocation
page read and write
2B446A19000
trusted library allocation
page read and write
2B44746F000
trusted library allocation
page read and write
2B44CCE0000
trusted library allocation
page read and write
1233000
heap
page read and write
2B446BF2000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B4447A8000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B43B88F000
heap
page read and write
2B4419B1000
trusted library allocation
page read and write
2B44CEF9000
trusted library allocation
page read and write
2B43B8C6000
heap
page read and write
2B4447DA000
trusted library allocation
page read and write
2B445F97000
trusted library allocation
page read and write
1D398D07000
trusted library allocation
page read and write
2B44CE4F000
trusted library allocation
page read and write
2B442178000
heap
page read and write
2B44C9CB000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B44CB0E000
trusted library allocation
page read and write
2B442B63000
trusted library allocation
page read and write
2B44F186000
trusted library allocation
page read and write
2B440A00000
trusted library allocation
page read and write
2B446F73000
trusted library allocation
page read and write
2B446DAF000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B451247000
trusted library allocation
page read and write
1D11EB64000
heap
page read and write
2B43B85C000
heap
page read and write
2B445A48000
trusted library allocation
page read and write
2B440281000
trusted library allocation
page read and write
2B4460D8000
trusted library allocation
page read and write
2B4466DB000
trusted library allocation
page read and write
2B44CD25000
trusted library allocation
page read and write
2B446726000
trusted library allocation
page read and write
2B44CB88000
trusted library allocation
page read and write
19AD1438000
trusted library allocation
page read and write
1D11EC79000
heap
page read and write
2B441EDE000
trusted library allocation
page read and write
2B44CB85000
trusted library allocation
page read and write
2B45026B000
trusted library allocation
page read and write
1D11EBE8000
heap
page read and write
2B45023F000
trusted library allocation
page read and write
2B446E22000
trusted library allocation
page read and write
1239000
heap
page read and write
2B43B87C000
heap
page read and write
2B441EA2000
trusted library allocation
page read and write
2B44CA96000
trusted library allocation
page read and write
2B445021000
trusted library allocation
page read and write
2B44CE26000
trusted library allocation
page read and write
2B4409DB000
trusted library allocation
page read and write
2B446987000
trusted library allocation
page read and write
2B446987000
trusted library allocation
page read and write
2B44643F000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
2B445E94000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B43B85A000
heap
page read and write
2B445E92000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
122C000
heap
page read and write
208D325D000
trusted library allocation
page read and write
2B4490C5000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B43B857000
heap
page read and write
2B43B890000
heap
page read and write
2B441EBE000
trusted library allocation
page read and write
2B445ACA000
trusted library allocation
page read and write
2B43B850000
heap
page read and write
2B45028E000
trusted library allocation
page read and write
2B4481C7000
trusted library allocation
page read and write
2B44CD7A000
trusted library allocation
page read and write
2B4473E6000
trusted library allocation
page read and write
2B44CC0E000
trusted library allocation
page read and write
2B4453F0000
trusted library allocation
page read and write
1D11EC2A000
heap
page read and write
2B450949000
trusted library allocation
page read and write
2B444BD2000
trusted library allocation
page read and write
2B44F0F1000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
2B444B94000
trusted library allocation
page read and write
2B441E24000
trusted library allocation
page read and write
2B4450EE000
trusted library allocation
page read and write
2B444C5D000
trusted library allocation
page read and write
2B4474BE000
trusted library allocation
page read and write
2B44CADD000
trusted library allocation
page read and write
2B445A56000
trusted library allocation
page read and write
2B446D4A000
trusted library allocation
page read and write
2B4481E1000
trusted library allocation
page read and write
1160000
heap
page read and write
2B446EA0000
trusted library allocation
page read and write
2B446710000
trusted library allocation
page read and write
2B446728000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B44CB34000
trusted library allocation
page read and write
2B44CDC5000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B45069C000
trusted library allocation
page read and write
19AD0FF0000
heap
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B446DAD000
trusted library allocation
page read and write
1D11EC21000
heap
page read and write
2B4483DC000
trusted library allocation
page read and write
2B44746F000
trusted library allocation
page read and write
2B444CC3000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B43B885000
heap
page read and write
2B43B8C6000
heap
page read and write
2B44C83C000
trusted library allocation
page read and write
2959A600000
trusted library allocation
page read and write
2B4469D8000
trusted library allocation
page read and write
2B450351000
trusted library allocation
page read and write
208D3278000
trusted library allocation
page read and write
2B4474B8000
trusted library allocation
page read and write
2B4488AC000
trusted library allocation
page read and write
2B445F6B000
trusted library allocation
page read and write
2B447199000
trusted library allocation
page read and write
2B447174000
trusted library allocation
page read and write
2B45144D000
trusted library allocation
page read and write
2B445E92000
trusted library allocation
page read and write
2B442B62000
trusted library allocation
page read and write
2B446A09000
trusted library allocation
page read and write
2B444F90000
trusted library allocation
page read and write
1D11DF77000
trusted library allocation
page read and write
2B441D65000
trusted library allocation
page read and write
2B445F24000
trusted library allocation
page read and write
2B441D7B000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B446709000
trusted library allocation
page read and write
2B44CEA3000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B43B858000
heap
page read and write
5C012403000
trusted library allocation
page read and write
19AD1432000
trusted library allocation
page read and write
2B4489CE000
trusted library allocation
page read and write
2B445EF9000
trusted library allocation
page read and write
2B446C23000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B446F32000
trusted library allocation
page read and write
2B4447C2000
trusted library allocation
page read and write
1D11EBA8000
heap
page read and write
2B4453D7000
trusted library allocation
page read and write
2B44671A000
trusted library allocation
page read and write
2B446CFC000
trusted library allocation
page read and write
2B4514B0000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B4469F3000
trusted library allocation
page read and write
2B44CCCA000
trusted library allocation
page read and write
2B44CDC0000
trusted library allocation
page read and write
2B4468E7000
trusted library allocation
page read and write
1D11EC44000
heap
page read and write
2B446E37000
trusted library allocation
page read and write
2B44C80E000
trusted library allocation
page read and write
2B45148D000
trusted library allocation
page read and write
2B447784000
trusted library allocation
page read and write
2B44838C000
trusted library allocation
page read and write
2B446743000
trusted library allocation
page read and write
19AD0ED0000
heap
page read and write
2B4477F3000
trusted library allocation
page read and write
2B4450E2000
trusted library allocation
page read and write
2B450C07000
heap
page read and write
2B43B8CE000
heap
page read and write
2B44649B000
trusted library allocation
page read and write
19AD0E90000
remote allocation
page read and write
2B44C80B000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
19AD1203000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4477FB000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B445FA4000
trusted library allocation
page read and write
2B4402F6000
trusted library allocation
page read and write
2B4483B0000
trusted library allocation
page read and write
2B446EF3000
trusted library allocation
page read and write
2B444723000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B4469F8000
trusted library allocation
page read and write
2B44748D000
trusted library allocation
page read and write
2B446E2E000
trusted library allocation
page read and write
2B4508F7000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B442B9C000
trusted library allocation
page read and write
2B4470E8000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B44CE9D000
trusted library allocation
page read and write
2B4449AE000
trusted library allocation
page read and write
2B446699000
trusted library allocation
page read and write
2B44F1A7000
trusted library allocation
page read and write
2B446D72000
trusted library allocation
page read and write
2B450970000
trusted library allocation
page read and write
2B447496000
trusted library allocation
page read and write
2B44CA35000
trusted library allocation
page read and write
1154000
heap
page read and write
2B43B87A000
heap
page read and write
1D11EB5C000
heap
page read and write
2B43B861000
heap
page read and write
2B43B882000
heap
page read and write
2B446ECC000
trusted library allocation
page read and write
2B442B1D000
trusted library allocation
page read and write
2B44CDF8000
trusted library allocation
page read and write
2B446510000
trusted library allocation
page read and write
2B446712000
trusted library allocation
page read and write
2B4450C2000
trusted library allocation
page read and write
2B4509B2000
trusted library allocation
page read and write
2B4466EA000
trusted library allocation
page read and write
2B4449B8000
trusted library allocation
page read and write
2B446D13000
trusted library allocation
page read and write
2B4450F1000
trusted library allocation
page read and write
208D2F23000
remote allocation
page execute read
2B44C9D0000
trusted library allocation
page read and write
2B4449A5000
trusted library allocation
page read and write
2B43B8C1000
heap
page read and write
2B44CAB4000
trusted library allocation
page read and write
2B44F16D000
trusted library allocation
page read and write
610E57E000
unkown
page readonly
2B44C83C000
trusted library allocation
page read and write
2B43B88B000
heap
page read and write
2B43B885000
heap
page read and write
2B4473E4000
trusted library allocation
page read and write
2B442B52000
trusted library allocation
page read and write
2B442B9C000
trusted library allocation
page read and write
2B44CC4E000
trusted library allocation
page read and write
2B43B85A000
heap
page read and write
2B446D19000
trusted library allocation
page read and write
2B4468C9000
trusted library allocation
page read and write
2B450C31000
heap
page read and write
1D11E600000
trusted library allocation
page read and write
2B44CB29000
trusted library allocation
page read and write
2B44C816000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B44CD0D000
trusted library allocation
page read and write
9EDFEFE000
unkown
page readonly
1D11EB8D000
heap
page read and write
2B442B47000
trusted library allocation
page read and write
2B44478B000
trusted library allocation
page read and write
1D11EC2A000
heap
page read and write
2B444721000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
1D11EC3B000
heap
page read and write
2B43B85C000
heap
page read and write
2B446950000
trusted library allocation
page read and write
2B44C9FB000
trusted library allocation
page read and write
2B44CEBF000
trusted library allocation
page read and write
2B4477DD000
trusted library allocation
page read and write
2B450BF5000
heap
page read and write
2B44CCFE000
trusted library allocation
page read and write
2B43B888000
heap
page read and write
2B43B861000
heap
page read and write
1D11EC2A000
heap
page read and write
2B43B882000
heap
page read and write
1D11E4A0000
heap
page read and write
2B4469C0000
trusted library allocation
page read and write
2B4506ED000
trusted library allocation
page read and write
2B44C85C000
trusted library allocation
page read and write
2B44CAB2000
trusted library allocation
page read and write
2B446CED000
trusted library allocation
page read and write
2B44C7D0000
trusted library allocation
page read and write
2B441E55000
trusted library allocation
page read and write
2B446965000
trusted library allocation
page read and write
2B442179000
heap
page read and write
B9B21FF000
stack
page read and write
2B4477A8000
trusted library allocation
page read and write
2B446F63000
trusted library allocation
page read and write
208D2FFA000
heap
page read and write
2B4454F3000
trusted library allocation
page read and write
2B44CEDE000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4507A0000
trusted library allocation
page read and write
2B4451C1000
trusted library allocation
page read and write
2B446DC4000
trusted library allocation
page read and write
1D11DC40000
heap
page read and write
2B446DDA000
trusted library allocation
page read and write
2B44CC95000
trusted library allocation
page read and write
2B4444FD000
trusted library allocation
page read and write
2B4447E4000
trusted library allocation
page read and write
2B4466C2000
trusted library allocation
page read and write
2B4508FD000
trusted library allocation
page read and write
2B44CDF5000
trusted library allocation
page read and write
2B4477A8000
trusted library allocation
page read and write
2B44912E000
trusted library allocation
page read and write
2B43B889000
heap
page read and write
2B43B875000
heap
page read and write
2B4473DE000
trusted library allocation
page read and write
2B444BAC000
trusted library allocation
page read and write
2B445A93000
trusted library allocation
page read and write
2B444976000
trusted library allocation
page read and write
2B445A91000
trusted library allocation
page read and write
2B446D2B000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B446726000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
2B45020B000
trusted library allocation
page read and write
2B451240000
trusted library allocation
page read and write
1D11DF12000
trusted library allocation
page read and write
2B4508E2000
trusted library allocation
page read and write
2B44CAB2000
trusted library allocation
page read and write
2B4466C5000
trusted library allocation
page read and write
2B45158B000
trusted library allocation
page read and write
208D3230000
trusted library allocation
page read and write
2B4506EF000
trusted library allocation
page read and write
2B4457EC000
trusted library allocation
page read and write
2B444C39000
trusted library allocation
page read and write
2B43B8C0000
heap
page read and write
2B445EAF000
trusted library allocation
page read and write
610BBFE000
stack
page read and write
1D11EC77000
heap
page read and write
2B43B857000
heap
page read and write
2B441E4E000
trusted library allocation
page read and write
2B43B87C000
heap
page read and write
2B4460DB000
trusted library allocation
page read and write
9EDFE7E000
unkown
page readonly
2B43B851000
heap
page read and write
2B446740000
trusted library allocation
page read and write
2B4466A1000
trusted library allocation
page read and write
2B451413000
trusted library allocation
page read and write
1D11EC3B000
heap
page read and write
2B43B88B000
heap
page read and write
2B44CCF9000
trusted library allocation
page read and write
2B44CBA8000
trusted library allocation
page read and write
2B44CA2B000
trusted library allocation
page read and write
2B4421A9000
heap
page read and write
2B4477C7000
trusted library allocation
page read and write
2B44CE0F000
trusted library allocation
page read and write
2B44779E000
trusted library allocation
page read and write
2B445ED9000
trusted library allocation
page read and write
19AD12E9000
trusted library allocation
page read and write
2B43B889000
heap
page read and write
1D11DF00000
trusted library allocation
page read and write
2B448D21000
trusted library allocation
page read and write
2B43B8C3000
heap
page read and write
2B4468DF000
trusted library allocation
page read and write
1251000
heap
page read and write
2B43B87C000
heap
page read and write
1D11DFE8000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
1D398A4E000
heap
page read and write
2B44EE5E000
trusted library allocation
page read and write
2B446966000
trusted library allocation
page read and write
2B4419AD000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B446D8C000
trusted library allocation
page read and write
1D11DF10000
trusted library allocation
page read and write
2B44CAE1000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B4450F9000
trusted library allocation
page read and write
1D11EBE0000
heap
page read and write
2B445A52000
trusted library allocation
page read and write
1D11DF23000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
1D11EC6C000
heap
page read and write
2B43B857000
heap
page read and write
2B44C977000
trusted library allocation
page read and write
2B446D19000
trusted library allocation
page read and write
2B44682D000
trusted library allocation
page read and write
1D3989A0000
heap
page read and write
2B446D06000
trusted library allocation
page read and write
2B44099A000
trusted library allocation
page read and write
2B43B890000
heap
page read and write
2B44672F000
trusted library allocation
page read and write
2B446EF3000
trusted library allocation
page read and write
2B445AC1000
trusted library allocation
page read and write
2B4466ED000
trusted library allocation
page read and write
B77C7D8000
stack
page read and write
2B4450DB000
trusted library allocation
page read and write
2B446ADB000
trusted library allocation
page read and write
2B45122C000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B43B869000
heap
page read and write
2B44C98E000
trusted library allocation
page read and write
2B445FDD000
trusted library allocation
page read and write
2B43B857000
heap
page read and write
B77E13E000
unkown
page readonly
610D47E000
unkown
page readonly
124B000
heap
page read and write
2B446DA2000
trusted library allocation
page read and write
2B4470EA000
trusted library allocation
page read and write
2B43B889000
heap
page read and write
2B43B88F000
heap
page read and write
2B44C975000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B43B8BE000
heap
page read and write
2B4469C8000
trusted library allocation
page read and write
1D11EB01000
heap
page read and write
2B4469C0000
trusted library allocation
page read and write
2B446513000
trusted library allocation
page read and write
2B44CAE8000
trusted library allocation
page read and write
2B43B89D000
heap
page read and write
2B44699E000
trusted library allocation
page read and write
2B441F36000
trusted library allocation
page read and write
2B442B82000
trusted library allocation
page read and write
2B43B877000
heap
page read and write
1D11EBE0000
heap
page read and write
97DBFF1000
trusted library allocation
page execute read
2B43B860000
heap
page read and write
2B4483F5000
trusted library allocation
page read and write
2B445EA0000
trusted library allocation
page read and write
2B44CC9A000
trusted library allocation
page read and write
2B450332000
trusted library allocation
page read and write
2B43B896000
heap
page read and write
2B4460B0000
trusted library allocation
page read and write
2B4503F2000
trusted library allocation
page read and write
2B43B89B000
heap
page read and write
2B44CAE1000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B44CAD2000
trusted library allocation
page read and write
2B4514B0000
trusted library allocation
page read and write
2B4483F8000
trusted library allocation
page read and write
19AD12A4000
trusted library allocation
page read and write
2B4408FE000
trusted library allocation
page read and write
2B441E5D000
trusted library allocation
page read and write
2B446D9A000
trusted library allocation
page read and write
19AD1400000
trusted library allocation
page read and write
2B444798000
trusted library allocation
page read and write
B9B29FE000
stack
page read and write
1D11EB6C000
heap
page read and write
2B444C9A000
trusted library allocation
page read and write
2B441E2A000
trusted library allocation
page read and write
2B4449BE000
trusted library allocation
page read and write
2B44CDBA000
trusted library allocation
page read and write
2B442B5D000
trusted library allocation
page read and write
2B43B8C8000
heap
page read and write
2B4470C3000
trusted library allocation
page read and write
2B4469FE000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B451255000
trusted library allocation
page read and write
2B4477DD000
trusted library allocation
page read and write
2B4483BC000
trusted library allocation
page read and write
2B444F9D000
trusted library allocation
page read and write
2B44CDC7000
trusted library allocation
page read and write
2B43B898000
heap
page read and write
2B4515BE000
trusted library allocation
page read and write
2B43B88F000
heap
page read and write
2B446847000
trusted library allocation
page read and write
2B44C7E3000
trusted library allocation
page read and write
2B444CBE000
trusted library allocation
page read and write
2B446490000
trusted library allocation
page read and write
A5659F1E000
trusted library allocation
page read and write
124B000
heap
page read and write
2B44CAAF000
trusted library allocation
page read and write
9EDFF3E000
stack
page read and write
2B4477A5000
trusted library allocation
page read and write
2B44CDC0000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B4506EB000
trusted library allocation
page read and write
2B4483B4000
trusted library allocation
page read and write
2B446844000
trusted library allocation
page read and write
2B446989000
trusted library allocation
page read and write
2B4419C1000
trusted library allocation
page read and write
2B44CC83000
trusted library allocation
page read and write
2B446717000
trusted library allocation
page read and write
2B451236000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B446441000
trusted library allocation
page read and write
124B000
heap
page read and write
2B440AA3000
trusted library allocation
page read and write
2B43B89E000
heap
page read and write
2B446EA0000
trusted library allocation
page read and write
2B4449C9000
trusted library allocation
page read and write
2B4444CE000
trusted library allocation
page read and write
2B450961000
trusted library allocation
page read and write
2B4514E3000
trusted library allocation
page read and write
19AD1422000
trusted library allocation
page read and write
2B44CA79000
trusted library allocation
page read and write
2B4421EB000
heap
page read and write
2B442B4C000
trusted library allocation
page read and write
2B4483E6000
trusted library allocation
page read and write
2B4502A8000
trusted library allocation
page read and write
2B446970000
trusted library allocation
page read and write
2B446E91000
trusted library allocation
page read and write
2B44CB34000
trusted library allocation
page read and write
2B43B882000
heap
page read and write
1D11E470000
unclassified section
page read and write
2B44CABE000
trusted library allocation
page read and write
2B44CC55000
trusted library allocation
page read and write
2B4449C7000
trusted library allocation
page read and write
2B45125B000
trusted library allocation
page read and write
2B44CC0A000
trusted library allocation
page read and write
2B45124D000
trusted library allocation
page read and write
114E000
stack
page read and write
2B43B87C000
heap
page read and write
2B440290000
trusted library allocation
page read and write
2B445774000
trusted library allocation
page read and write
2B448984000
trusted library allocation
page read and write
2B44CAF6000
trusted library allocation
page read and write
2B4477E4000
trusted library allocation
page read and write
19AD1223000
trusted library allocation
page read and write
2B446F2C000
trusted library allocation
page read and write
2B43B8C1000
heap
page read and write
2B44217B000
heap
page read and write
2B4421C7000
heap
page read and write
2B43B87A000
heap
page read and write
2B4477CD000
trusted library allocation
page read and write
2B4477C7000
trusted library allocation
page read and write
208D320C000
trusted library allocation
page read and write
2B43B87A000
heap
page read and write
2B43B88F000
heap
page read and write
2B4469D8000
trusted library allocation
page read and write
2B4409A3000
trusted library allocation
page read and write
2B448188000
trusted library allocation
page read and write
2B44C8C1000
trusted library allocation
page read and write
2B446BDD000
trusted library allocation
page read and write
2B44CADD000
trusted library allocation
page read and write
2B450BE6000
heap
page read and write
2B445EAF000
trusted library allocation
page read and write
2B4514E6000
trusted library allocation
page read and write
2B442BA2000
trusted library allocation
page read and write
2B44CE1F000
trusted library allocation
page read and write
1200000
heap
page read and write
2B43B87F000
heap
page read and write
2B444CAE000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B43B869000
heap
page read and write
2B43B885000
heap
page read and write
2B45122E000
trusted library allocation
page read and write
2B44CAF9000
trusted library allocation
page read and write
2B43B88C000
heap
page read and write
2B446EF3000
trusted library allocation
page read and write
1D11DE00000
trusted library allocation
page read and write
2B44715B000
trusted library allocation
page read and write
2B4449E2000
trusted library allocation
page read and write
2B441EA5000
trusted library allocation
page read and write
82C000
unkown
page readonly
2B446853000
trusted library allocation
page read and write
2B4483E2000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B445E4F000
trusted library allocation
page read and write
2B4449C7000
trusted library allocation
page read and write
2B43B881000
heap
page read and write
2B43B857000
heap
page read and write
2B44CEE7000
trusted library allocation
page read and write
2B44C98A000
trusted library allocation
page read and write
2B446A54000
trusted library allocation
page read and write
2B44C91D000
trusted library allocation
page read and write
2B447245000
trusted library allocation
page read and write
2B44697F000
trusted library allocation
page read and write
2B44672F000
trusted library allocation
page read and write
2B4450F1000
trusted library allocation
page read and write
2B43B890000
heap
page read and write
1154000
heap
page read and write
2B43B861000
heap
page read and write
2B442B5F000
trusted library allocation
page read and write
2B442178000
heap
page read and write
2B445EE7000
trusted library allocation
page read and write
2B4449CE000
trusted library allocation
page read and write
2B447773000
trusted library allocation
page read and write
2B4483C6000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B442B84000
trusted library allocation
page read and write
2B43B897000
heap
page read and write
2B446CC8000
trusted library allocation
page read and write
2B444C4D000
trusted library allocation
page read and write
2B43B885000
heap
page read and write
2B4503C3000
trusted library allocation
page read and write
2B445AB6000
trusted library allocation
page read and write
2B44F150000
trusted library allocation
page read and write
1D11EB60000
heap
page read and write
2B445883000
trusted library allocation
page read and write
2B43B87F000
heap
page read and write
2B43B896000
heap
page read and write
2B447774000
trusted library allocation
page read and write
2B43B852000
heap
page read and write
2B43B8BE000
heap
page read and write
2B44CEEF000
trusted library allocation
page read and write
2B445E97000
trusted library allocation
page read and write
2B451252000
trusted library allocation
page read and write
2B44698A000
trusted library allocation
page read and write
2B43B8AC000
heap
page read and write
2B44671D000
trusted library allocation
page read and write
208D320E000
trusted library allocation
page read and write
1D11DF62000
trusted library allocation
page read and write
2B446B6B000
trusted library allocation
page read and write
2B43B89B000
heap
page read and write
2B4477C0000
trusted library allocation
page read and write
2B45068E000
trusted library allocation
page read and write
2B440823000
trusted library allocation
page read and write
2B43B8BE000
heap
page read and write
2B44748D000
trusted library allocation
page read and write
2B446ADD000
trusted library allocation
page read and write
2B442B9C000
trusted library allocation
page read and write
2B44CCBB000
trusted library allocation
page read and write
2B4515BB000
trusted library allocation
page read and write
2B44838F000
trusted library allocation
page read and write
2B43B851000
heap
page read and write
2B446CF0000
trusted library allocation
page read and write
2B4509B2000
trusted library allocation
page read and write
2B44219E000
heap
page read and write
208D2F50000
heap
page read and write
2B445A6B000
trusted library allocation
page read and write
2B441EDE000
trusted library allocation
page read and write
2B4421FE000
heap
page read and write
2B444C5E000
trusted library allocation
page read and write
2B43B860000
heap
page read and write
2B44C7A3000
trusted library allocation
page read and write
2B4503B6000
trusted library allocation
page read and write
2B44CE14000
trusted library allocation
page read and write
There are 3793 hidden memdumps, click here to show them.