IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1368c3a8-f1b9-47de-a242-3470f7873c03.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1368c3a8-f1b9-47de-a242-3470f7873c03.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2136 -prefMapHandle 2128 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a90225e5-1a13-485c-aeb4-192db47fb31d} 6716 "\\.\pipe\gecko-crash-server-pipe.6716" 23fc5e70510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4076 -parentBuildID 20230927232528 -prefsHandle 4040 -prefMapHandle 4088 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e447b4b1-3211-4e31-ad51-780d08c0e274} 6716 "\\.\pipe\gecko-crash-server-pipe.6716" 23fd935e010 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5140 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 2416 -prefMapHandle 2344 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {915562e4-fc6e-4f2d-894c-d4fa67ebfb29} 6716 "\\.\pipe\gecko-crash-server-pipe.6716" 23fdaa06310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.110
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.208.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
142.250.181.110
youtube.com
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
23FCCC1E000
heap
page read and write
23FE05E5000
trusted library allocation
page read and write
23FDDFE5000
trusted library allocation
page read and write
23FD5919000
heap
page read and write
23FDDBF9000
trusted library allocation
page read and write
343121403000
trusted library allocation
page read and write
11BC7C91000
trusted library allocation
page execute read
23FCCBE2000
heap
page read and write
23FDA948000
trusted library allocation
page read and write
23FD78FB000
trusted library allocation
page read and write
23FD753E000
trusted library allocation
page read and write
23FD73E6000
trusted library allocation
page read and write
23FD97D5000
trusted library allocation
page read and write
23FDE462000
trusted library allocation
page read and write
27935700000
heap
page read and write
23FD6A35000
trusted library allocation
page read and write
23FD60DF000
trusted library allocation
page read and write
23FDDE37000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD9500000
trusted library allocation
page read and write
23FD83A3000
trusted library allocation
page read and write
23FD6E5A000
trusted library allocation
page read and write
23FD7ABD000
trusted library allocation
page read and write
23FD15DD000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD763F000
trusted library allocation
page read and write
23FDA9F0000
trusted library allocation
page read and write
23FD93D0000
trusted library allocation
page read and write
23FD58A5000
heap
page read and write
27935D4D000
heap
page read and write
23FD1C26000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCBE8000
heap
page read and write
23FD5902000
heap
page read and write
23FCCBDD000
heap
page read and write
23FD7C77000
trusted library allocation
page read and write
27935281000
trusted library allocation
page read and write
23FD7C6B000
trusted library allocation
page read and write
23FD5DB6000
trusted library allocation
page read and write
23FD7A51000
trusted library allocation
page read and write
23FD15F8000
trusted library allocation
page read and write
23FDA713000
trusted library allocation
page read and write
2420003F000
trusted library allocation
page read and write
23FD750B000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
F759E3E000
stack
page read and write
23FCCBE2000
heap
page read and write
23FD62C1000
trusted library allocation
page read and write
23FE0EA5000
trusted library allocation
page read and write
18A0000
heap
page read and write
23FDE23B000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FD766E000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FE068A000
trusted library allocation
page read and write
23FD6140000
trusted library allocation
page read and write
23FE07BE000
trusted library allocation
page read and write
23FD7893000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FDDBEB000
trusted library allocation
page read and write
23FE07E4000
trusted library allocation
page read and write
23FDDEE9000
trusted library allocation
page read and write
23FD6A57000
trusted library allocation
page read and write
23FD5570000
trusted library allocation
page read and write
20EAC980000
unclassified section
page readonly
23FCCC39000
heap
page read and write
23FD7998000
trusted library allocation
page read and write
23FDE0A5000
trusted library allocation
page read and write
23FD9747000
trusted library allocation
page read and write
23FD6E6F000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FCCC1E000
heap
page read and write
23FE0A33000
trusted library allocation
page read and write
23FD9F0C000
heap
page read and write
23FE0248000
trusted library allocation
page read and write
23FD7B92000
trusted library allocation
page read and write
3D54000
heap
page read and write
23FD6E76000
trusted library allocation
page read and write
23FD6E2D000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FCCC42000
heap
page read and write
23FD944D000
trusted library allocation
page read and write
23FD84EE000
trusted library allocation
page read and write
23FD972A000
trusted library allocation
page read and write
23FDE4F7000
trusted library allocation
page read and write
20EAC9F5000
remote allocation
page execute read
27DFB111000
trusted library allocation
page read and write
23FE0EA2000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD5DAE000
trusted library allocation
page read and write
23FDE4DF000
trusted library allocation
page read and write
23FDA972000
trusted library allocation
page read and write
23FD6EB4000
trusted library allocation
page read and write
23FD7967000
trusted library allocation
page read and write
23FD6E88000
trusted library allocation
page read and write
23FD7C67000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
1684000
heap
page read and write
20EACE72000
trusted library allocation
page read and write
23FD77D6000
trusted library allocation
page read and write
85FCDFE000
unkown
page readonly
23FD6997000
trusted library allocation
page read and write
23FDE2ED000
trusted library allocation
page read and write
23FD80B5000
trusted library allocation
page read and write
23FD2C56000
trusted library allocation
page read and write
23FD5DC7000
trusted library allocation
page read and write
23FD2CB1000
trusted library allocation
page read and write
23FD5D73000
trusted library allocation
page read and write
23FD5905000
heap
page read and write
23FDAACD000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD65C6000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FD65E2000
trusted library allocation
page read and write
23FD60DB000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD1CB8000
trusted library allocation
page read and write
20EAD012000
trusted library allocation
page read and write
23FD7673000
trusted library allocation
page read and write
23FD1CE4000
trusted library allocation
page read and write
23FD7667000
trusted library allocation
page read and write
23FD81FE000
trusted library allocation
page read and write
23FDF83C000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FD7979000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD6956000
trusted library allocation
page read and write
23FD69E3000
trusted library allocation
page read and write
23FDE1EF000
trusted library allocation
page read and write
23FD764B000
trusted library allocation
page read and write
23FD6E1D000
trusted library allocation
page read and write
23FE03CB000
trusted library allocation
page read and write
23FD66D7000
trusted library allocation
page read and write
23FD69D8000
trusted library allocation
page read and write
23FDE244000
trusted library allocation
page read and write
23FDDEC2000
trusted library allocation
page read and write
23FDE400000
trusted library allocation
page read and write
23FD9B33000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FDE0A8000
trusted library allocation
page read and write
23FD7625000
trusted library allocation
page read and write
23FE07BB000
trusted library allocation
page read and write
23FD791A000
trusted library allocation
page read and write
23FD6296000
trusted library allocation
page read and write
11BC7C26000
trusted library allocation
page execute read
27935E2A000
heap
page read and write
23FD7B58000
trusted library allocation
page read and write
23FE0763000
trusted library allocation
page read and write
23FD9FF2000
heap
page read and write
23FD97F4000
trusted library allocation
page read and write
23FE0EA5000
trusted library allocation
page read and write
23FD7C31000
trusted library allocation
page read and write
23FD72B4000
trusted library allocation
page read and write
23FCCC42000
heap
page read and write
23FDE0CC000
trusted library allocation
page read and write
23FD79DA000
trusted library allocation
page read and write
23FD1CB8000
trusted library allocation
page read and write
23FDDE04000
trusted library allocation
page read and write
23FD9417000
trusted library allocation
page read and write
23FE0F67000
trusted library allocation
page read and write
23FD7AB5000
trusted library allocation
page read and write
23FD1CA0000
trusted library allocation
page read and write
23FD77A2000
trusted library allocation
page read and write
23FE0686000
trusted library allocation
page read and write
23FD1CB8000
trusted library allocation
page read and write
23FD6058000
trusted library allocation
page read and write
23FD7941000
trusted library allocation
page read and write
23FE072C000
trusted library allocation
page read and write
23FDE206000
trusted library allocation
page read and write
23FDDBF1000
trusted library allocation
page read and write
23FD9737000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6E32000
trusted library allocation
page read and write
23FD75F7000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
27935DFD000
heap
page read and write
23FD66DA000
trusted library allocation
page read and write
23FD78BA000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD5926000
heap
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FDE4DF000
trusted library allocation
page read and write
23FD6B27000
trusted library allocation
page read and write
23FD80FC000
trusted library allocation
page read and write
23FD7929000
trusted library allocation
page read and write
23FD6A52000
trusted library allocation
page read and write
85FBBFE000
unkown
page readonly
23FD7688000
trusted library allocation
page read and write
23FD79FC000
trusted library allocation
page read and write
23FCCC37000
heap
page read and write
23FD6181000
trusted library allocation
page read and write
23FE06FA000
trusted library allocation
page read and write
1F4E8650000
heap
page read and write
23FDE0D5000
trusted library allocation
page read and write
23FD2CB2000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD97D5000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
27935D5C000
heap
page read and write
23FCCC17000
heap
page read and write
23FD61A2000
trusted library allocation
page read and write
23FDDEA3000
trusted library allocation
page read and write
23FE102F000
trusted library allocation
page read and write
23FD7C2A000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FD60F9000
trusted library allocation
page read and write
23FDA902000
trusted library allocation
page read and write
23FD6512000
trusted library allocation
page read and write
23FD5539000
trusted library allocation
page read and write
23FD89FC000
trusted library allocation
page read and write
23FD79C2000
trusted library allocation
page read and write
23FD5C8A000
trusted library allocation
page read and write
23FD7670000
trusted library allocation
page read and write
23FDDCA4000
trusted library allocation
page read and write
23FCCC2B000
heap
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FD69B3000
trusted library allocation
page read and write
20EACE5D000
trusted library allocation
page read and write
20EAC970000
unclassified section
page readonly
23FD60F9000
trusted library allocation
page read and write
20EACF00000
heap
page read and write
23FCCBD6000
heap
page read and write
23FDDBF9000
trusted library allocation
page read and write
23FD6CA7000
trusted library allocation
page read and write
23FCCC15000
heap
page read and write
23FD58F5000
heap
page read and write
23FD7627000
trusted library allocation
page read and write
1899000
heap
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD62BB000
trusted library allocation
page read and write
23FD94B2000
trusted library allocation
page read and write
23FE0746000
trusted library allocation
page read and write
23FE0F93000
trusted library allocation
page read and write
23FD97B1000
trusted library allocation
page read and write
23FD6E37000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FDE2C6000
trusted library allocation
page read and write
23FE07EE000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FD6992000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
27935C00000
trusted library allocation
page read and write
23FD9B01000
trusted library allocation
page read and write
23FDDE61000
trusted library allocation
page read and write
23FD9704000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD792B000
trusted library allocation
page read and write
23FE0EEF000
trusted library allocation
page read and write
23FD73EE000
trusted library allocation
page read and write
23FCCBE0000
heap
page read and write
23FD7AA1000
trusted library allocation
page read and write
23FD58A5000
heap
page read and write
23FDF532000
trusted library allocation
page read and write
1819791E000
trusted library allocation
page read and write
23FD97DF000
trusted library allocation
page read and write
23FCCBCA000
heap
page read and write
23FCCBE7000
heap
page read and write
23FD7670000
trusted library allocation
page read and write
23FD6EE2000
trusted library allocation
page read and write
27935DFD000
heap
page read and write
23FD7953000
trusted library allocation
page read and write
23FD73D8000
trusted library allocation
page read and write
28764A20000
heap
page read and write
23FD62A4000
trusted library allocation
page read and write
23FD751D000
trusted library allocation
page read and write
23FD976D000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FE07D5000
trusted library allocation
page read and write
23FD797F000
trusted library allocation
page read and write
23FDE21C000
trusted library allocation
page read and write
23FD791A000
trusted library allocation
page read and write
23FD6BEE000
trusted library allocation
page read and write
23FDDB82000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD73F2000
trusted library allocation
page read and write
27935D5F000
heap
page read and write
F7562FE000
stack
page read and write
23FCCBC2000
heap
page read and write
27935E69000
heap
page read and write
23FE10CE000
trusted library allocation
page read and write
23FD5F9A000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FD97B1000
trusted library allocation
page read and write
23FD6534000
trusted library allocation
page read and write
23FCCBE0000
heap
page read and write
23FD866C000
trusted library allocation
page read and write
23FDDF9C000
trusted library allocation
page read and write
23FD6AC7000
trusted library allocation
page read and write
23FD6076000
trusted library allocation
page read and write
23FD7648000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD6EE2000
trusted library allocation
page read and write
23FD6086000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD6A92000
trusted library allocation
page read and write
23FD761B000
trusted library allocation
page read and write
23FE0EA5000
trusted library allocation
page read and write
23FD603F000
trusted library allocation
page read and write
23FD6518000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD6363000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD79F4000
trusted library allocation
page read and write
287667BB000
heap
page read and write
23FE0E83000
trusted library allocation
page read and write
23FD7977000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD852D000
trusted library allocation
page read and write
23FD58C7000
heap
page read and write
23FD5926000
heap
page read and write
23FCCC15000
heap
page read and write
23FD5906000
heap
page read and write
23FD73BD000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FD94B8000
trusted library allocation
page read and write
23FD2CE2000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD6E2E000
trusted library allocation
page read and write
23FD5DCB000
trusted library allocation
page read and write
23FD5541000
trusted library allocation
page read and write
23FD78F7000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD69E9000
trusted library allocation
page read and write
23FD6287000
trusted library allocation
page read and write
23FD6CE8000
trusted library allocation
page read and write
287667AB000
heap
page read and write
23FE0E6A000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD78EA000
trusted library allocation
page read and write
23FD5DE6000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FD6141000
trusted library allocation
page read and write
23FD5DB8000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FD87A4000
trusted library allocation
page read and write
23FE0686000
trusted library allocation
page read and write
23FD58CC000
heap
page read and write
27935D09000
heap
page read and write
23FDDE18000
trusted library allocation
page read and write
23FE0759000
trusted library allocation
page read and write
23FD97B3000
trusted library allocation
page read and write
206E000
stack
page read and write
23FE0FAC000
trusted library allocation
page read and write
23FD1CFE000
trusted library allocation
page read and write
23FDE042000
trusted library allocation
page read and write
23FD94A4000
trusted library allocation
page read and write
23FD6E32000
trusted library allocation
page read and write
23FDE245000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
23FD7873000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD77EF000
trusted library allocation
page read and write
23FE0A69000
trusted library allocation
page read and write
23FD9751000
trusted library allocation
page read and write
23FD6297000
trusted library allocation
page read and write
23FE0370000
trusted library allocation
page read and write
23FD6B3C000
trusted library allocation
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FD76B4000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
20EACE67000
trusted library allocation
page read and write
23FD6B19000
trusted library allocation
page read and write
23FD65D6000
trusted library allocation
page read and write
23FDDEE9000
trusted library allocation
page read and write
23FD948A000
trusted library allocation
page read and write
23FDDF84000
trusted library allocation
page read and write
23FD6A92000
trusted library allocation
page read and write
23FD80FC000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD5522000
trusted library allocation
page read and write
23FD6A31000
trusted library allocation
page read and write
23FDA713000
trusted library allocation
page read and write
23FD6239000
trusted library allocation
page read and write
27934D00000
unclassified section
page readonly
23FD5913000
heap
page read and write
23FD62AB000
trusted library allocation
page read and write
23FD97C7000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD7667000
trusted library allocation
page read and write
23FDA953000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD7929000
trusted library allocation
page read and write
23FD80C8000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FE0EC9000
trusted library allocation
page read and write
23FD744F000
trusted library allocation
page read and write
23FD6E76000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FD9F2C000
heap
page read and write
23FD78EA000
trusted library allocation
page read and write
287667C1000
heap
page read and write
23FCCC1E000
heap
page read and write
23FE0A73000
trusted library allocation
page read and write
23FD7A65000
trusted library allocation
page read and write
23FE067E000
trusted library allocation
page read and write
23FDA983000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FD1C26000
trusted library allocation
page read and write
23FDA965000
trusted library allocation
page read and write
23FD9F83000
heap
page read and write
23FE0AD9000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD7686000
trusted library allocation
page read and write
23FD7798000
trusted library allocation
page read and write
23FD6A06000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FE0F05000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD69ED000
trusted library allocation
page read and write
23FD695F000
trusted library allocation
page read and write
23FD762D000
trusted library allocation
page read and write
C44000
unkown
page readonly
28764EF0000
heap
page read and write
23FD6293000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FD69AE000
trusted library allocation
page read and write
23FD6973000
trusted library allocation
page read and write
23FD6A6B000
trusted library allocation
page read and write
23FD639A000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FDA9BC000
trusted library allocation
page read and write
23FD58F8000
heap
page read and write
23FD7C8A000
trusted library allocation
page read and write
23FD7922000
trusted library allocation
page read and write
23FD9FF3000
heap
page read and write
23FD6E24000
trusted library allocation
page read and write
23FDA96F000
trusted library allocation
page read and write
28764D00000
trusted library allocation
page read and write
23FD9460000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FE0A45000
trusted library allocation
page read and write
23FD60B4000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD7AFB000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
279351D0000
unkown
page execute read
23FCCC0C000
heap
page read and write
23FD6EAA000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD6ED5000
trusted library allocation
page read and write
23FD6646000
trusted library allocation
page read and write
23FE07BE000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FD7941000
trusted library allocation
page read and write
23FE0E53000
trusted library allocation
page read and write
27935E59000
heap
page read and write
20EACEAE000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD628D000
trusted library allocation
page read and write
23FE0A6C000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FDE1E4000
trusted library allocation
page read and write
23FD7D53000
trusted library allocation
page read and write
23FDE4F7000
trusted library allocation
page read and write
23FCCBD5000
heap
page read and write
23FD601C000
trusted library allocation
page read and write
27935D7D000
heap
page read and write
27935C0B000
trusted library allocation
page read and write
23FD7643000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD86B9000
trusted library allocation
page read and write
23FD6163000
trusted library allocation
page read and write
23FD60CA000
trusted library allocation
page read and write
23FD6260000
trusted library allocation
page read and write
23FD7C31000
trusted library allocation
page read and write
23FD66C1000
trusted library allocation
page read and write
23FD6181000
trusted library allocation
page read and write
23FD7AD0000
trusted library allocation
page read and write
23FE07B6000
trusted library allocation
page read and write
18A8000
heap
page read and write
23FD7655000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
279351D7000
unkown
page execute read
23FCCBD7000
heap
page read and write
F75633E000
unkown
page readonly
23FD7B25000
trusted library allocation
page read and write
23FD9774000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
287667C0000
heap
page read and write
23FD60B7000
trusted library allocation
page read and write
27935D7F000
heap
page read and write
23FCCBD6000
heap
page read and write
1870000
heap
page read and write
23FDDDCB000
trusted library allocation
page read and write
23FD6076000
trusted library allocation
page read and write
23FD7BE0000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD69F8000
trusted library allocation
page read and write
23FD78D1000
trusted library allocation
page read and write
27935E69000
heap
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD629B000
trusted library allocation
page read and write
23FD7935000
trusted library allocation
page read and write
23FD15DF000
trusted library allocation
page read and write
23FD615D000
trusted library allocation
page read and write
23FD787C000
trusted library allocation
page read and write
23FD78DA000
trusted library allocation
page read and write
23FD74DA000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
20EACE5B000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD7B12000
trusted library allocation
page read and write
23FD2CA8000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FD5D62000
trusted library allocation
page read and write
23FE106D000
trusted library allocation
page read and write
23FD65A0000
trusted library allocation
page read and write
23FDE27D000
trusted library allocation
page read and write
23FDDCE8000
trusted library allocation
page read and write
C3C000
unkown
page read and write
23FCCC38000
heap
page read and write
27DFACE0000
unclassified section
page readonly
23FCCC38000
heap
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FCCBE7000
heap
page read and write
23FD69E3000
trusted library allocation
page read and write
23FD5D29000
trusted library allocation
page read and write
23FD7973000
trusted library allocation
page read and write
23FD973B000
trusted library allocation
page read and write
27935E44000
heap
page read and write
23FD7B0D000
trusted library allocation
page read and write
23FD7C00000
trusted library allocation
page read and write
23FD699C000
trusted library allocation
page read and write
23FD7798000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD971D000
trusted library allocation
page read and write
23FD975D000
trusted library allocation
page read and write
23FD79CB000
trusted library allocation
page read and write
23FDDE26000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD9EFC000
heap
page read and write
23FCCBE2000
heap
page read and write
23FD6AC5000
trusted library allocation
page read and write
23FD73EF000
trusted library allocation
page read and write
23FD9716000
trusted library allocation
page read and write
27935DE8000
heap
page read and write
23FCCC2A000
heap
page read and write
23FCCC22000
heap
page read and write
23FD6267000
trusted library allocation
page read and write
23FE07A3000
trusted library allocation
page read and write
23FD60A7000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
23FD7AFB000
trusted library allocation
page read and write
27935DFD000
heap
page read and write
23FDDF50000
trusted library allocation
page read and write
23FDE1B6000
trusted library allocation
page read and write
23FD89A3000
trusted library allocation
page read and write
23FD79D7000
trusted library allocation
page read and write
23FDE024000
trusted library allocation
page read and write
27935DE8000
heap
page read and write
23FDFBA8000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6028000
trusted library allocation
page read and write
1F4E8800000
trusted library allocation
page read and write
23FD65A8000
trusted library allocation
page read and write
23FD6064000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCC24000
heap
page read and write
23FD5913000
heap
page read and write
23FCCC29000
heap
page read and write
23FD7E80000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD798C000
trusted library allocation
page read and write
23FD80C8000
trusted library allocation
page read and write
23FDE47C000
trusted library allocation
page read and write
23FD7643000
trusted library allocation
page read and write
23FD7D9F000
trusted library allocation
page read and write
23FD7877000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD6AC5000
trusted library allocation
page read and write
23FD69B8000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD698C000
trusted library allocation
page read and write
23FD78B0000
trusted library allocation
page read and write
23FD6252000
trusted library allocation
page read and write
23FD694A000
trusted library allocation
page read and write
23FDE0E6000
trusted library allocation
page read and write
23FDA97A000
trusted library allocation
page read and write
23FD797F000
trusted library allocation
page read and write
23FDE2FD000
trusted library allocation
page read and write
23FD89D9000
trusted library allocation
page read and write
23FD6C61000
trusted library allocation
page read and write
23FDA9A3000
trusted library allocation
page read and write
23FD5C86000
trusted library allocation
page read and write
23FE0752000
trusted library allocation
page read and write
23FD7614000
trusted library allocation
page read and write
23FD618A000
trusted library allocation
page read and write
23FD7651000
trusted library allocation
page read and write
23FD5592000
trusted library allocation
page read and write
23FD99E5000
trusted library allocation
page read and write
3CD0000
trusted library allocation
page read and write
27DFADE0000
heap
page read and write
23FD5A46000
trusted library allocation
page read and write
23FD69C3000
trusted library allocation
page read and write
23FE0AC9000
trusted library allocation
page read and write
23FD5DE6000
trusted library allocation
page read and write
23FD60C3000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD7672000
trusted library allocation
page read and write
18C3000
heap
page read and write
23FE0643000
trusted library allocation
page read and write
23FD65A0000
trusted library allocation
page read and write
23FD78A1000
trusted library allocation
page read and write
23FE0641000
trusted library allocation
page read and write
27935D60000
heap
page read and write
1895000
heap
page read and write
23FDE2DE000
trusted library allocation
page read and write
ABEE9FE000
stack
page read and write
23FD63CF000
trusted library allocation
page read and write
27935E69000
heap
page read and write
23FD5DAE000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD5DF1000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FCCC30000
heap
page read and write
23FDE189000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FDE420000
trusted library allocation
page read and write
23FD5F6D000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FD1CE4000
trusted library allocation
page read and write
23FD7DD9000
trusted library allocation
page read and write
23FD5F65000
trusted library allocation
page read and write
23FDE0B0000
trusted library allocation
page read and write
23FD7891000
trusted library allocation
page read and write
23FDDF71000
trusted library allocation
page read and write
23FDDBF5000
trusted library allocation
page read and write
23FDDCF5000
trusted library allocation
page read and write
20EACA20000
heap
page read and write
23FD7506000
trusted library allocation
page read and write
23FCCC3D000
heap
page read and write
23FDA95D000
trusted library allocation
page read and write
23FD7B2C000
trusted library allocation
page read and write
23FD1C19000
trusted library allocation
page read and write
23FD60C3000
trusted library allocation
page read and write
23FD556F000
trusted library allocation
page read and write
27935C0D000
trusted library allocation
page read and write
27935E77000
heap
page read and write
23FCCC1E000
heap
page read and write
23FDDEE3000
trusted library allocation
page read and write
23FD6E37000
trusted library allocation
page read and write
23FDE0ED000
trusted library allocation
page read and write
23FD973C000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD630A000
trusted library allocation
page read and write
27935E21000
heap
page read and write
23FD6064000
trusted library allocation
page read and write
23FD615D000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD6E1C000
trusted library allocation
page read and write
23FD7B36000
trusted library allocation
page read and write
23FDE0A8000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
279351E0000
trusted library allocation
page read and write
23FD9756000
trusted library allocation
page read and write
27935D69000
heap
page read and write
23FDA945000
trusted library allocation
page read and write
23FCCBD8000
heap
page read and write
23FD63D2000
trusted library allocation
page read and write
23FD2FF2000
trusted library allocation
page read and write
23FD9A0C000
trusted library allocation
page read and write
23FD65BA000
trusted library allocation
page read and write
23FDDE77000
trusted library allocation
page read and write
23FD6A43000
trusted library allocation
page read and write
23FD784E000
trusted library allocation
page read and write
23FE0EA2000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD5DDE000
trusted library allocation
page read and write
23FD6590000
trusted library allocation
page read and write
23FCCBDE000
heap
page read and write
23FD7A87000
trusted library allocation
page read and write
20EACB30000
unclassified section
page readonly
23FE072E000
trusted library allocation
page read and write
23FD62C3000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD97BB000
trusted library allocation
page read and write
23FDA9B3000
trusted library allocation
page read and write
23FD93C8000
trusted library allocation
page read and write
23FD8655000
trusted library allocation
page read and write
23FD846E000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD7BE4000
trusted library allocation
page read and write
23FD6189000
trusted library allocation
page read and write
23FD7995000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FD79F7000
trusted library allocation
page read and write
23FD5D7D000
trusted library allocation
page read and write
23FD97AD000
trusted library allocation
page read and write
23FD88B2000
trusted library allocation
page read and write
23FD7657000
trusted library allocation
page read and write
23FD7974000
trusted library allocation
page read and write
23FDDCD8000
trusted library allocation
page read and write
27935D63000
heap
page read and write
1F4E890A000
trusted library allocation
page read and write
23FD97FB000
trusted library allocation
page read and write
69081FF000
stack
page read and write
23FCCC17000
heap
page read and write
23FD9EA1000
heap
page read and write
23FDFB02000
trusted library allocation
page read and write
23FD5DF0000
trusted library allocation
page read and write
23FCCC37000
heap
page read and write
23FD7DFE000
trusted library allocation
page read and write
23FD6B5C000
trusted library allocation
page read and write
23FD7AC5000
trusted library allocation
page read and write
23FD606C000
trusted library allocation
page read and write
23FD9472000
trusted library allocation
page read and write
23FD9AAC000
trusted library allocation
page read and write
23FD79FC000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FCCBD8000
heap
page read and write
23FCCC2A000
heap
page read and write
23FDA9C5000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FD7DE9000
trusted library allocation
page read and write
23FD7B4C000
trusted library allocation
page read and write
23FD78FB000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FDDD4A000
trusted library allocation
page read and write
23FD6A6B000
trusted library allocation
page read and write
1894000
heap
page read and write
18C3000
heap
page read and write
23FD5CDA000
trusted library allocation
page read and write
1684000
heap
page read and write
160E000
stack
page read and write
23FD5906000
heap
page read and write
23FD63AC000
trusted library allocation
page read and write
20EACE9F000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FD7AC2000
trusted library allocation
page read and write
23FE0AC9000
trusted library allocation
page read and write
23FDDBE7000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FD60C3000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FDDBF1000
trusted library allocation
page read and write
23FE03E0000
trusted library allocation
page read and write
23FDDF78000
trusted library allocation
page read and write
23FD7D41000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
27DFB103000
trusted library allocation
page read and write
23FD7B45000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FD9725000
trusted library allocation
page read and write
23FD6138000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FDE4D8000
trusted library allocation
page read and write
23FD6EB4000
trusted library allocation
page read and write
23FD6060000
trusted library allocation
page read and write
27DFADAA000
heap
page read and write
23FE0706000
trusted library allocation
page read and write
23FD7678000
trusted library allocation
page read and write
23FCCBEA000
heap
page read and write
23FD5906000
heap
page read and write
23FD97F8000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD5DAE000
trusted library allocation
page read and write
23FE072C000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FCCBD8000
heap
page read and write
279351C0000
trusted library allocation
page read and write
28764D0A000
trusted library allocation
page read and write
23FD7664000
trusted library allocation
page read and write
23FD5AEF000
trusted library allocation
page read and write
23FD9A05000
trusted library allocation
page read and write
23FD7643000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD58CE000
heap
page read and write
23FD69EB000
trusted library allocation
page read and write
23FD7998000
trusted library allocation
page read and write
23FD58C8000
heap
page read and write
23FD73BD000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD942D000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD9774000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FDDBD8000
trusted library allocation
page read and write
23FD97D5000
trusted library allocation
page read and write
23FD856E000
trusted library allocation
page read and write
20EACE81000
trusted library allocation
page read and write
23FD7AFB000
trusted library allocation
page read and write
23FD6AC5000
trusted library allocation
page read and write
23FCCC7D000
heap
page read and write
23FCCC3D000
heap
page read and write
23FD65D6000
trusted library allocation
page read and write
27934EA0000
heap
page read and write
23FCCBE7000
heap
page read and write
23FD791E000
trusted library allocation
page read and write
B71000
unkown
page execute read
23FCCBCE000
heap
page read and write
23FD5DC9000
trusted library allocation
page read and write
23FD7DF9000
trusted library allocation
page read and write
23FD77EA000
trusted library allocation
page read and write
23FD80FA000
trusted library allocation
page read and write
23FD6B28000
trusted library allocation
page read and write
23FD5E36000
trusted library allocation
page read and write
23FD62A5000
trusted library allocation
page read and write
23FE0EA5000
trusted library allocation
page read and write
23FDDED9000
trusted library allocation
page read and write
23FD835E000
trusted library allocation
page read and write
23FD7B29000
trusted library allocation
page read and write
23FE111C000
trusted library allocation
page read and write
23FD60DF000
trusted library allocation
page read and write
23FDE2ED000
trusted library allocation
page read and write
27935E3B000
heap
page read and write
23FDDEDF000
trusted library allocation
page read and write
23FD7C1A000
trusted library allocation
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FD7B58000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FD5DA5000
trusted library allocation
page read and write
23FD5DDE000
trusted library allocation
page read and write
23FD94B8000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD7A3C000
trusted library allocation
page read and write
27935DF0000
heap
page read and write
23FE0680000
trusted library allocation
page read and write
23FD58D6000
heap
page read and write
23FD7953000
trusted library allocation
page read and write
23FDDEE7000
trusted library allocation
page read and write
23FD6956000
trusted library allocation
page read and write
23FDA965000
trusted library allocation
page read and write
23FD624B000
trusted library allocation
page read and write
23FE06F2000
trusted library allocation
page read and write
23FDDE37000
trusted library allocation
page read and write
23FD6EB4000
trusted library allocation
page read and write
23FDE1B2000
trusted library allocation
page read and write
23FD69B3000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD7856000
trusted library allocation
page read and write
23FD778D000
trusted library allocation
page read and write
23FD623B000
trusted library allocation
page read and write
F75637E000
stack
page read and write
23FD9767000
trusted library allocation
page read and write
23FD5D7B000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD663D000
trusted library allocation
page read and write
23FD65A1000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
8374603000
trusted library allocation
page read and write
23FDE2B5000
trusted library allocation
page read and write
19A61D8000
stack
page read and write
28764AFF000
heap
page read and write
23FD6058000
trusted library allocation
page read and write
23FD60F9000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD762B000
trusted library allocation
page read and write
23FD79BE000
trusted library allocation
page read and write
23FE063C000
trusted library allocation
page read and write
23FD6045000
trusted library allocation
page read and write
23FD7685000
trusted library allocation
page read and write
23FDE2AA000
trusted library allocation
page read and write
23FD7935000
trusted library allocation
page read and write
23FE02A5000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD58AE000
heap
page read and write
23FD69B0000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
18BA000
heap
page read and write
23FD7630000
trusted library allocation
page read and write
27DFAD80000
heap
page read and write
23FCCC2F000
heap
page read and write
23FD603F000
trusted library allocation
page read and write
23FD79D7000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FD7C22000
trusted library allocation
page read and write
23FD976A000
trusted library allocation
page read and write
23FD766E000
trusted library allocation
page read and write
23FD65E2000
trusted library allocation
page read and write
23FDA9F0000
trusted library allocation
page read and write
23FD6AB0000
trusted library allocation
page read and write
23FD60C3000
trusted library allocation
page read and write
23FD6956000
trusted library allocation
page read and write
23FD976A000
trusted library allocation
page read and write
23FE0ECE000
trusted library allocation
page read and write
23FD6ED5000
trusted library allocation
page read and write
23FE07B0000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD6A4E000
trusted library allocation
page read and write
23FD2FB1000
trusted library allocation
page read and write
23FD73E1000
trusted library allocation
page read and write
23FDF816000
trusted library allocation
page read and write
23FD5DC9000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FD6030000
trusted library allocation
page read and write
23FDE229000
trusted library allocation
page read and write
23FD84A3000
trusted library allocation
page read and write
23FD9B57000
trusted library allocation
page read and write
23FE10F1000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FDDDC1000
trusted library allocation
page read and write
23FD62BE000
trusted library allocation
page read and write
23FD5901000
heap
page read and write
27935DE3000
heap
page read and write
23FD7C6F000
trusted library allocation
page read and write
23FD9706000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD6E62000
trusted library allocation
page read and write
23FD743F000
trusted library allocation
page read and write
23FDDFE2000
trusted library allocation
page read and write
23FD8396000
trusted library allocation
page read and write
23FD7939000
trusted library allocation
page read and write
C32000
unkown
page readonly
23FCCC2A000
heap
page read and write
23FD6386000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD602B000
trusted library allocation
page read and write
27935DF0000
heap
page read and write
23FD78FD000
trusted library allocation
page read and write
85FBC7E000
unkown
page readonly
23FD5906000
heap
page read and write
23FD5904000
heap
page read and write
23FD6BCA000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD61CB000
trusted library allocation
page read and write
23FD8645000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FD6046000
trusted library allocation
page read and write
23FD7682000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD58FE000
heap
page read and write
23FCCC1D000
heap
page read and write
19A7A3E000
unkown
page readonly
23FD5CE1000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD792E000
trusted library allocation
page read and write
23FD5E39000
trusted library allocation
page read and write
23FD6535000
trusted library allocation
page read and write
23FDDDDF000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD7B43000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD62FC000
trusted library allocation
page read and write
23FD78AD000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
27935D60000
heap
page read and write
23FDE051000
trusted library allocation
page read and write
23FCCBBC000
heap
page read and write
23FDDF9A000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD6AB0000
trusted library allocation
page read and write
23FD94F8000
trusted library allocation
page read and write
23FD5A4C000
trusted library allocation
page read and write
23FD5DBE000
trusted library allocation
page read and write
23FE0ACD000
trusted library allocation
page read and write
23FCCBE3000
heap
page read and write
23FD5535000
trusted library allocation
page read and write
23FD7457000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
27DFB1B1000
trusted library allocation
page read and write
23FDDBB9000
trusted library allocation
page read and write
23FDDBE7000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
20EACE2E000
trusted library allocation
page read and write
23FD94B0000
trusted library allocation
page read and write
27DFB17C000
trusted library allocation
page read and write
23FD9500000
trusted library allocation
page read and write
23FD69B8000
trusted library allocation
page read and write
23FD7B5F000
trusted library allocation
page read and write
23FD5531000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
23FE079F000
trusted library allocation
page read and write
23FDDE1D000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD7BF1000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FD97C3000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FD79D4000
trusted library allocation
page read and write
ABEB9FF000
stack
page read and write
23FDE037000
trusted library allocation
page read and write
23FD7664000
trusted library allocation
page read and write
23FDE2B5000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD6A49000
trusted library allocation
page read and write
23FD859B000
trusted library allocation
page read and write
23FD697B000
trusted library allocation
page read and write
23FD7941000
trusted library allocation
page read and write
23FDA983000
trusted library allocation
page read and write
20EAD016000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
23FD69BD000
trusted library allocation
page read and write
23FD6A6B000
trusted library allocation
page read and write
23FDDBF5000
trusted library allocation
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FE07F0000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD89CA000
trusted library allocation
page read and write
23FDDB8E000
trusted library allocation
page read and write
23FD9486000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD76F6000
trusted library allocation
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FE05F5000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
27DFAF40000
unclassified section
page read and write
23FCCC2F000
heap
page read and write
23FD694B000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD5906000
heap
page read and write
23FDE1EC000
trusted library allocation
page read and write
23FD87B6000
trusted library allocation
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FDA032000
heap
page read and write
23FD55BE000
trusted library allocation
page read and write
23FD753C000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD974C000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
23FDDDB0000
trusted library allocation
page read and write
23FD6EDC000
trusted library allocation
page read and write
23FD81DC000
trusted library allocation
page read and write
246E000
stack
page read and write
23FDE482000
trusted library allocation
page read and write
23FD6145000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FE0232000
trusted library allocation
page read and write
23FD1CFE000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FD97D5000
trusted library allocation
page read and write
23FD5541000
trusted library allocation
page read and write
23FD6919000
trusted library allocation
page read and write
23FD7498000
trusted library allocation
page read and write
23FD7B43000
trusted library allocation
page read and write
28764B02000
heap
page read and write
23FCCBE1000
heap
page read and write
23FCCBC2000
heap
page read and write
23FD6239000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FD7C6B000
trusted library allocation
page read and write
23FD6143000
trusted library allocation
page read and write
23FDE464000
trusted library allocation
page read and write
23FE0E5D000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FCCC3D000
heap
page read and write
23FD62D9000
trusted library allocation
page read and write
1684000
heap
page read and write
23FE0757000
trusted library allocation
page read and write
23FE03D7000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FCCBE6000
heap
page read and write
23FD55C8000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FD5A33000
trusted library allocation
page read and write
23FDE233000
trusted library allocation
page read and write
23FD7632000
trusted library allocation
page read and write
27935218000
trusted library allocation
page read and write
23FDE2B9000
trusted library allocation
page read and write
27935DE9000
heap
page read and write
23FD83E3000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD6189000
trusted library allocation
page read and write
27935210000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
28764AD0000
heap
page read and write
23FD69E3000
trusted library allocation
page read and write
23FD5D33000
trusted library allocation
page read and write
23FD2CC0000
trusted library allocation
page read and write
23FDDF9C000
trusted library allocation
page read and write
27DFB172000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD79DA000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FDE2A1000
trusted library allocation
page read and write
23FD639A000
trusted library allocation
page read and write
23FD7915000
trusted library allocation
page read and write
23FD6A0C000
trusted library allocation
page read and write
23FD89C2000
trusted library allocation
page read and write
23FDE249000
trusted library allocation
page read and write
279352E9000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
27935DF0000
heap
page read and write
23FCCBD7000
heap
page read and write
23FD7665000
trusted library allocation
page read and write
23FD7669000
trusted library allocation
page read and write
23FD9AC5000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD58AC000
heap
page read and write
23FDF800000
trusted library allocation
page read and write
23FD15EF000
trusted library allocation
page read and write
23FDE237000
trusted library allocation
page read and write
23FDA9FD000
trusted library allocation
page read and write
23FD7632000
trusted library allocation
page read and write
23FD97CB000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD83CC000
trusted library allocation
page read and write
23FD77DB000
trusted library allocation
page read and write
23FD6075000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD5DBE000
trusted library allocation
page read and write
23FD7A84000
trusted library allocation
page read and write
23FCCC28000
heap
page read and write
23FD1C13000
trusted library allocation
page read and write
23FD9774000
trusted library allocation
page read and write
23FD9771000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD75DB000
trusted library allocation
page read and write
23FCCBEA000
heap
page read and write
23FD797F000
trusted library allocation
page read and write
23FD792E000
trusted library allocation
page read and write
23FDE0CC000
trusted library allocation
page read and write
23FD62D7000
trusted library allocation
page read and write
23FD9B2E000
trusted library allocation
page read and write
23FDE2D3000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FE0745000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FDE1D8000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FCCBD7000
heap
page read and write
23FD79D7000
trusted library allocation
page read and write
23FDDCAF000
trusted library allocation
page read and write
23FD696E000
trusted library allocation
page read and write
23FD6A59000
trusted library allocation
page read and write
23FE0EED000
trusted library allocation
page read and write
23FD5F43000
trusted library allocation
page read and write
23FD6B4C000
trusted library allocation
page read and write
23FD75CB000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD7DE3000
trusted library allocation
page read and write
23FD625E000
trusted library allocation
page read and write
23FD97FB000
trusted library allocation
page read and write
23FD60CA000
trusted library allocation
page read and write
23FDDDA1000
trusted library allocation
page read and write
23FD740B000
trusted library allocation
page read and write
23FD5528000
trusted library allocation
page read and write
23FD7697000
trusted library allocation
page read and write
23FDE44E000
trusted library allocation
page read and write
27DFB1DB000
trusted library allocation
page read and write
23FCCBE3000
heap
page read and write
23FCCBE0000
heap
page read and write
279351D9000
unkown
page execute read
23FD97F8000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FCCBF7000
heap
page read and write
27935D5C000
heap
page read and write
23FD7499000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FE0A43000
trusted library allocation
page read and write
23FDE25E000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FD5926000
heap
page read and write
23FD2FC3000
trusted library allocation
page read and write
23FDDEDF000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD7687000
trusted library allocation
page read and write
23FDDFE5000
trusted library allocation
page read and write
23FD7912000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FCCC24000
heap
page read and write
23FE0754000
trusted library allocation
page read and write
23FD78AD000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FDE064000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FCCC0E000
heap
page read and write
23FD6A67000
trusted library allocation
page read and write
23FD9450000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
27934F00000
trusted library allocation
page read and write
23FD787C000
trusted library allocation
page read and write
23FD7959000
trusted library allocation
page read and write
23FD6B7F000
trusted library allocation
page read and write
23FD97F8000
trusted library allocation
page read and write
23FDA996000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FD62CE000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD94F8000
trusted library allocation
page read and write
23FDE2ED000
trusted library allocation
page read and write
20EAD010000
trusted library allocation
page read and write
23FD948D000
trusted library allocation
page read and write
23FD971D000
trusted library allocation
page read and write
23FE0728000
trusted library allocation
page read and write
23FDDBD4000
trusted library allocation
page read and write
23FD79B7000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FDA709000
trusted library allocation
page read and write
23FD5DAB000
trusted library allocation
page read and write
27935DF2000
heap
page read and write
23FD5926000
heap
page read and write
23FD58FE000
heap
page read and write
23FD698E000
trusted library allocation
page read and write
27DFB149000
trusted library allocation
page read and write
23FDDCCE000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD69E9000
trusted library allocation
page read and write
23FD7A23000
trusted library allocation
page read and write
85FBC3B000
stack
page read and write
23FCCC2A000
heap
page read and write
23FDE084000
trusted library allocation
page read and write
23FDA9BD000
trusted library allocation
page read and write
23FD6AC7000
trusted library allocation
page read and write
23FCCBE3000
heap
page read and write
23FDDEE7000
trusted library allocation
page read and write
23FD7DAA000
trusted library allocation
page read and write
23FD6C7B000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD1C82000
trusted library allocation
page read and write
23FDE0E6000
trusted library allocation
page read and write
23FDDEFB000
trusted library allocation
page read and write
23FCCBE0000
heap
page read and write
23FD697B000
trusted library allocation
page read and write
23FD5D8E000
trusted library allocation
page read and write
23FD608C000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FDE240000
trusted library allocation
page read and write
18B2000
heap
page read and write
23FD9496000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD629B000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FDDDC3000
trusted library allocation
page read and write
23FD9488000
trusted library allocation
page read and write
23FE0E62000
trusted library allocation
page read and write
23FD974F000
trusted library allocation
page read and write
27DFB10E000
trusted library allocation
page read and write
23FD2C82000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FD6EA7000
trusted library allocation
page read and write
23FD7993000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD7457000
trusted library allocation
page read and write
23FD79F7000
trusted library allocation
page read and write
23FD6A46000
trusted library allocation
page read and write
23FDDCFC000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6980000
trusted library allocation
page read and write
23FE03DF000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD6521000
trusted library allocation
page read and write
23FD618C000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
163E000
stack
page read and write
23FDE0E9000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FE0ABB000
trusted library allocation
page read and write
23FCCC2B000
heap
page read and write
23FDDE05000
trusted library allocation
page read and write
23FD7DD9000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD843B000
trusted library allocation
page read and write
23FDDEF0000
trusted library allocation
page read and write
287667B1000
heap
page read and write
23FD79D4000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
27935D60000
heap
page read and write
23FD5913000
heap
page read and write
23FD9477000
trusted library allocation
page read and write
23FD83EF000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
18BA000
heap
page read and write
23FCCC24000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
23FDE237000
trusted library allocation
page read and write
23FCCC2B000
heap
page read and write
23FD8072000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FDA9B3000
trusted library allocation
page read and write
23FDE031000
trusted library allocation
page read and write
23FD83C2000
trusted library allocation
page read and write
23FD62BB000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FD7879000
trusted library allocation
page read and write
23FDE1A9000
trusted library allocation
page read and write
23FDA948000
trusted library allocation
page read and write
23FD9B2C000
trusted library allocation
page read and write
23FD7D73000
trusted library allocation
page read and write
23FD7913000
trusted library allocation
page read and write
27935E58000
heap
page read and write
23FD97C3000
trusted library allocation
page read and write
23FD6A52000
trusted library allocation
page read and write
23FD9765000
trusted library allocation
page read and write
23FDDE1D000
trusted library allocation
page read and write
23FD630A000
trusted library allocation
page read and write
27935286000
trusted library allocation
page read and write
23FCCBF5000
heap
page read and write
23FE07B0000
trusted library allocation
page read and write
23FDE1FC000
trusted library allocation
page read and write
23FD97B1000
trusted library allocation
page read and write
23FD8617000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD9480000
trusted library allocation
page read and write
23FD69ED000
trusted library allocation
page read and write
23FD6490000
trusted library allocation
page read and write
23FD976A000
trusted library allocation
page read and write
23FCCC35000
heap
page read and write
23FCCC3F000
heap
page read and write
23FD1CB0000
trusted library allocation
page read and write
4191000
heap
page read and write
23FCCC1D000
heap
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD8348000
trusted library allocation
page read and write
23FD97DA000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FD87CC000
trusted library allocation
page read and write
23FD7AD2000
trusted library allocation
page read and write
23FCCBD5000
heap
page read and write
23FD65BA000
trusted library allocation
page read and write
23FD79DC000
trusted library allocation
page read and write
23FCCBF7000
heap
page read and write
23FD6E82000
trusted library allocation
page read and write
23FD60F9000
trusted library allocation
page read and write
23FDA983000
trusted library allocation
page read and write
23FD87A2000
trusted library allocation
page read and write
23FD76B2000
trusted library allocation
page read and write
23FD7A38000
trusted library allocation
page read and write
23FD6963000
trusted library allocation
page read and write
19A79FE000
unkown
page readonly
23FDA945000
trusted library allocation
page read and write
23FE05D3000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD7866000
trusted library allocation
page read and write
23FD7B65000
trusted library allocation
page read and write
23FD69ED000
trusted library allocation
page read and write
23FE11AC000
trusted library allocation
page read and write
23FD6E12000
trusted library allocation
page read and write
23FDE4ED000
trusted library allocation
page read and write
23FD69B8000
trusted library allocation
page read and write
23FD766B000
trusted library allocation
page read and write
ABEC1FE000
stack
page read and write
23FD7B58000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FE0A3F000
trusted library allocation
page read and write
23FE06C5000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
27935DE9000
heap
page read and write
23FCCC17000
heap
page read and write
23FD77FB000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FD5CC9000
trusted library allocation
page read and write
23FD97F8000
trusted library allocation
page read and write
23FD5DAE000
trusted library allocation
page read and write
27935196000
heap
page read and write
23FCCBDF000
heap
page read and write
23FD5E23000
trusted library allocation
page read and write
23FD73C8000
trusted library allocation
page read and write
23FD73FB000
trusted library allocation
page read and write
23FE0A00000
trusted library allocation
page read and write
23FD7E00000
trusted library allocation
page read and write
23FDA654000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
23FD6CFA000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FD66E5000
trusted library allocation
page read and write
23FD5B4F000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD9470000
trusted library allocation
page read and write
23FD768B000
trusted library allocation
page read and write
27DFAD54000
remote allocation
page execute read
23FD2CC7000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FCCBE1000
heap
page read and write
23FD6943000
trusted library allocation
page read and write
23FD6E89000
trusted library allocation
page read and write
23FDE45D000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FD5CA1000
trusted library allocation
page read and write
23FDE229000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
23FD79CB000
trusted library allocation
page read and write
23FD9A43000
trusted library allocation
page read and write
23FD7B85000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD6C66000
trusted library allocation
page read and write
23FD786C000
trusted library allocation
page read and write
23FD7CA0000
trusted library allocation
page read and write
23FD5F60000
trusted library allocation
page read and write
23FDDCA5000
trusted library allocation
page read and write
23FD7BB6000
trusted library allocation
page read and write
23FE0778000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD80C8000
trusted library allocation
page read and write
23FDA715000
trusted library allocation
page read and write
23FDE0F8000
trusted library allocation
page read and write
23FDA9A3000
trusted library allocation
page read and write
23FD5F65000
trusted library allocation
page read and write
23FD6396000
trusted library allocation
page read and write
28764B03000
heap
page read and write
23FD2FFE000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FD7B45000
trusted library allocation
page read and write
27DFADA0000
heap
page read and write
23FD697B000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
20EAD00C000
trusted library allocation
page read and write
23FD78F2000
trusted library allocation
page read and write
23FD5D1F000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FCCC27000
heap
page read and write
23FE0E44000
trusted library allocation
page read and write
23FD860A000
trusted library allocation
page read and write
23FE02B8000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FE0AA3000
trusted library allocation
page read and write
23FE0F37000
trusted library allocation
page read and write
23FDA942000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD7B8F000
trusted library allocation
page read and write
23FD97C7000
trusted library allocation
page read and write
27DFB1C4000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FCCC6B000
heap
page read and write
23FD76C0000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD6A52000
trusted library allocation
page read and write
23FD602D000
trusted library allocation
page read and write
189C000
heap
page read and write
23FCCC2E000
heap
page read and write
23FD6159000
trusted library allocation
page read and write
23FD5FE1000
trusted library allocation
page read and write
23FD65A4000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD5906000
heap
page read and write
23FD946C000
trusted library allocation
page read and write
23FD6B79000
trusted library allocation
page read and write
23FD9EEE000
heap
page read and write
19A833E000
stack
page read and write
23FD7E00000
trusted library allocation
page read and write
27935200000
trusted library allocation
page read and write
23FD7A7E000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
2793525C000
trusted library allocation
page read and write
23FDA9D3000
trusted library allocation
page read and write
23FD845A000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
27935DE6000
heap
page read and write
23FD7B36000
trusted library allocation
page read and write
23FD75F2000
trusted library allocation
page read and write
20EAD019000
trusted library allocation
page read and write
23FD1CC7000
trusted library allocation
page read and write
23FD79DC000
trusted library allocation
page read and write
2793526B000
trusted library allocation
page read and write
23FD78F7000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FCCC24000
heap
page read and write
23FCCC32000
heap
page read and write
23FCCC12000
heap
page read and write
23FD7BD9000
trusted library allocation
page read and write
23FD763F000
trusted library allocation
page read and write
23FD780A000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD6351000
trusted library allocation
page read and write
23FD696E000
trusted library allocation
page read and write
23FD7AC5000
trusted library allocation
page read and write
23FD7524000
trusted library allocation
page read and write
27935E44000
heap
page read and write
27DFB10C000
trusted library allocation
page read and write
23FD7AD0000
trusted library allocation
page read and write
27DFB15D000
trusted library allocation
page read and write
23FD697C000
trusted library allocation
page read and write
23FD80FC000
trusted library allocation
page read and write
18AE000
heap
page read and write
23FCCC16000
heap
page read and write
23FD75CB000
trusted library allocation
page read and write
23FE0AC9000
trusted library allocation
page read and write
23FCCBDB000
heap
page read and write
23FD639C000
trusted library allocation
page read and write
23FCCC32000
heap
page read and write
23FD7667000
trusted library allocation
page read and write
23FDE2AA000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
27935D8A000
heap
page read and write
23FD6AC7000
trusted library allocation
page read and write
287667A8000
heap
page read and write
23FE0EB1000
trusted library allocation
page read and write
23FD7B8D000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FD5905000
heap
page read and write
23FCCBE6000
heap
page read and write
23FCCC16000
heap
page read and write
23FD9F58000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD85A3000
trusted library allocation
page read and write
287667BA000
heap
page read and write
23FD2CD9000
trusted library allocation
page read and write
27934D80000
unclassified section
page readonly
279352BA000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FDE172000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
1810000
heap
page read and write
23FDDDB7000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
20EACA00000
unclassified section
page readonly
20EACB10000
heap
page read and write
23FD7868000
trusted library allocation
page read and write
23FD697B000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
85FBCBD000
stack
page read and write
27935E3B000
heap
page read and write
23FCCC1E000
heap
page read and write
23FD5F6E000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FE0E6D000
trusted library allocation
page read and write
23FD6140000
trusted library allocation
page read and write
23FCCC31000
heap
page read and write
23FD5B86000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FD7657000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD9775000
trusted library allocation
page read and write
23FD78CA000
trusted library allocation
page read and write
23FD6EAA000
trusted library allocation
page read and write
23FDE20A000
trusted library allocation
page read and write
20EACAAA000
heap
page read and write
23FD6997000
trusted library allocation
page read and write
23FD66F6000
trusted library allocation
page read and write
23FD79F7000
trusted library allocation
page read and write
27DFB176000
trusted library allocation
page read and write
23FE07EE000
trusted library allocation
page read and write
1F4E8659000
heap
page read and write
23FD796F000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD5A35000
trusted library allocation
page read and write
23FD7B5B000
trusted library allocation
page read and write
23FDE23D000
trusted library allocation
page read and write
23FD86C1000
trusted library allocation
page read and write
23FDDCAD000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FDDCEB000
trusted library allocation
page read and write
23FD7987000
trusted library allocation
page read and write
23FD976A000
trusted library allocation
page read and write
23FE06F8000
trusted library allocation
page read and write
23FDDDF9000
trusted library allocation
page read and write
23FD7AFB000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FDDCEB000
trusted library allocation
page read and write
23FD7BF8000
trusted library allocation
page read and write
23FD7C4E000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FDDC77000
trusted library allocation
page read and write
23FD76A9000
trusted library allocation
page read and write
23FD9F11000
heap
page read and write
23FD6EE6000
trusted library allocation
page read and write
23FDE274000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD62A5000
trusted library allocation
page read and write
3CB0000
heap
page read and write
23FD15BF000
trusted library allocation
page read and write
23FDDBE2000
trusted library allocation
page read and write
23FD7655000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FCCC6D000
heap
page read and write
23FCCC1D000
heap
page read and write
27935E77000
heap
page read and write
23FD85D3000
trusted library allocation
page read and write
23FE0763000
trusted library allocation
page read and write
23FD5B8A000
trusted library allocation
page read and write
23FD5DBE000
trusted library allocation
page read and write
23FD7BA2000
trusted library allocation
page read and write
23FCCBDE000
heap
page read and write
23FDDC32000
trusted library allocation
page read and write
23FD857F000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD89E4000
trusted library allocation
page read and write
23FD1C8C000
trusted library allocation
page read and write
23FD6B83000
trusted library allocation
page read and write
19A7B3E000
unkown
page readonly
23FD5913000
heap
page read and write
27DFAE50000
heap
page readonly
23FDE22C000
trusted library allocation
page read and write
23FD9753000
trusted library allocation
page read and write
23FD75CF000
trusted library allocation
page read and write
23FD97F0000
trusted library allocation
page read and write
23FD7C88000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD97F4000
trusted library allocation
page read and write
23FD6C8B000
trusted library allocation
page read and write
23FD69B3000
trusted library allocation
page read and write
23FDE2B9000
trusted library allocation
page read and write
23FDDFEE000
trusted library allocation
page read and write
23FD7C75000
trusted library allocation
page read and write
23FD762D000
trusted library allocation
page read and write
23FD75CF000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FD63C4000
trusted library allocation
page read and write
23FDA6C6000
trusted library allocation
page read and write
23FD89F0000
trusted library allocation
page read and write
C3C000
unkown
page write copy
27935278000
trusted library allocation
page read and write
F7563BE000
unkown
page readonly
23FCCC22000
heap
page read and write
23FD6EB9000
trusted library allocation
page read and write
23FD85E9000
trusted library allocation
page read and write
23FD5DA5000
trusted library allocation
page read and write
23FE1193000
trusted library allocation
page read and write
23FD97C7000
trusted library allocation
page read and write
20EACA60000
heap
page read and write
23FDDFAC000
trusted library allocation
page read and write
27935D6C000
heap
page read and write
23FCCBEA000
heap
page read and write
23FDDCFB000
trusted library allocation
page read and write
23FD618B000
trusted library allocation
page read and write
23FD97DE000
trusted library allocation
page read and write
23FD7C2A000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD7753000
trusted library allocation
page read and write
23FD8787000
trusted library allocation
page read and write
23FD7B5B000
trusted library allocation
page read and write
23FD65C0000
trusted library allocation
page read and write
23FD6C1F000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD97BB000
trusted library allocation
page read and write
23FD6BE1000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
27DFB200000
heap
page read and write
23FD6A7D000
trusted library allocation
page read and write
20EACEB7000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD79FC000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD7851000
trusted library allocation
page read and write
23FD624D000
trusted library allocation
page read and write
23FD7D9F000
trusted library allocation
page read and write
23FDE2FD000
trusted library allocation
page read and write
23FDE2DE000
trusted library allocation
page read and write
20EACB00000
unclassified section
page read and write
23FD9B06000
trusted library allocation
page read and write
23FD7BF1000
trusted library allocation
page read and write
23FD1BFB000
trusted library allocation
page read and write
23FD93ED000
trusted library allocation
page read and write
23FCCBCB000
heap
page read and write
ABEE1FF000
stack
page read and write
23FDE0DB000
trusted library allocation
page read and write
28764AD7000
heap
page read and write
23FD694F000
trusted library allocation
page read and write
23FD6245000
trusted library allocation
page read and write
23FD7667000
trusted library allocation
page read and write
23FD78A8000
trusted library allocation
page read and write
23FD556D000
trusted library allocation
page read and write
23FD80C2000
trusted library allocation
page read and write
20EACB02000
unclassified section
page read and write
23FD9EDF000
heap
page read and write
23FD629B000
trusted library allocation
page read and write
23FD899D000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD6186000
trusted library allocation
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FD58C8000
heap
page read and write
23FCCBDD000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD78AD000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FD7BC4000
trusted library allocation
page read and write
23FD6ED7000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FD6AED000
trusted library allocation
page read and write
23FD6E82000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FD7923000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FD6C69000
trusted library allocation
page read and write
23FD6956000
trusted library allocation
page read and write
23FDE0B2000
trusted library allocation
page read and write
23FE077F000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FD6CD0000
trusted library allocation
page read and write
23FD5A42000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FD8337000
trusted library allocation
page read and write
23FCCC32000
heap
page read and write
27935E58000
heap
page read and write
23FD60DB000
trusted library allocation
page read and write
23FD6E20000
trusted library allocation
page read and write
23FD62CD000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FCCC16000
heap
page read and write
23FD5DC7000
trusted library allocation
page read and write
23FD5CE3000
trusted library allocation
page read and write
23FD7DFE000
trusted library allocation
page read and write
23FD79F7000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD7C79000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FD7B3E000
trusted library allocation
page read and write
27935203000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FCCBE8000
heap
page read and write
23FD7643000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD79DA000
trusted library allocation
page read and write
23FD75DB000
trusted library allocation
page read and write
23FE0EA2000
trusted library allocation
page read and write
23FD65B0000
trusted library allocation
page read and write
23FD2C69000
trusted library allocation
page read and write
23FD58A6000
heap
page read and write
23FCCC33000
heap
page read and write
23FD6C26000
trusted library allocation
page read and write
23FD5B00000
trusted library allocation
page read and write
23FD7670000
trusted library allocation
page read and write
23FD97CB000
trusted library allocation
page read and write
23FDDCD5000
trusted library allocation
page read and write
27DFB303000
trusted library allocation
page read and write
23FD9478000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD694B000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD85AD000
trusted library allocation
page read and write
23FD618C000
trusted library allocation
page read and write
23FD556F000
trusted library allocation
page read and write
23FD5DF1000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
28764AFF000
heap
page read and write
23FE0EA6000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FD6582000
trusted library allocation
page read and write
23FD611D000
trusted library allocation
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
20EACE12000
trusted library allocation
page read and write
23FD80B5000
trusted library allocation
page read and write
23FD62A5000
trusted library allocation
page read and write
23FDDCDA000
trusted library allocation
page read and write
23FD6067000
trusted library allocation
page read and write
23FDF53C000
trusted library allocation
page read and write
23FD6E15000
trusted library allocation
page read and write
23FD7643000
trusted library allocation
page read and write
27934D74000
remote allocation
page execute read
23FD69E9000
trusted library allocation
page read and write
23FD7BE9000
trusted library allocation
page read and write
23FE0E89000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FDDCE4000
trusted library allocation
page read and write
23FDDBD8000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD7BD7000
trusted library allocation
page read and write
23FD7DFE000
trusted library allocation
page read and write
23FD6249000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
1F4E8A80000
heap
page read and write
23FE0778000
trusted library allocation
page read and write
23FD6ED6000
trusted library allocation
page read and write
23FD97F0000
trusted library allocation
page read and write
23FDDBD4000
trusted library allocation
page read and write
23FD5FE7000
trusted library allocation
page read and write
27935D64000
heap
page read and write
23FCCC2A000
heap
page read and write
23FE0EF0000
trusted library allocation
page read and write
23FD9490000
trusted library allocation
page read and write
23FD767D000
trusted library allocation
page read and write
23FD7AD8000
trusted library allocation
page read and write
23FD65B0000
trusted library allocation
page read and write
23FE0EAA000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD58B8000
heap
page read and write
23FCCBE0000
heap
page read and write
23FDE0ED000
trusted library allocation
page read and write
23FDDEE9000
trusted library allocation
page read and write
23FE0F1C000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FDE117000
trusted library allocation
page read and write
27935E44000
heap
page read and write
23FD69E3000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD5DC7000
trusted library allocation
page read and write
23FD976A000
trusted library allocation
page read and write
23FD5DB8000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD9775000
trusted library allocation
page read and write
23FDDD8D000
trusted library allocation
page read and write
23FD76C0000
trusted library allocation
page read and write
23FE0A1F000
trusted library allocation
page read and write
23FD94B4000
trusted library allocation
page read and write
23FD6E58000
trusted library allocation
page read and write
23FD6AF5000
trusted library allocation
page read and write
23FD62BE000
trusted library allocation
page read and write
23FD97FD000
trusted library allocation
page read and write
ABEC9FE000
stack
page read and write
23FD58F5000
heap
page read and write
23FCCC1E000
heap
page read and write
23FCCBC2000
heap
page read and write
23FD79AB000
trusted library allocation
page read and write
23FD88CA000
trusted library allocation
page read and write
23FD9742000
trusted library allocation
page read and write
23FD78A1000
trusted library allocation
page read and write
23FD60F9000
trusted library allocation
page read and write
C40000
unkown
page write copy
23FD61A2000
trusted library allocation
page read and write
23FD5B92000
trusted library allocation
page read and write
23FD792E000
trusted library allocation
page read and write
F75963E000
unkown
page readonly
23FCCC22000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD6974000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCBE3000
heap
page read and write
23FD6B79000
trusted library allocation
page read and write
23FD6359000
trusted library allocation
page read and write
23FD6085000
trusted library allocation
page read and write
23FCCC0E000
heap
page read and write
23FE0394000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD77EA000
trusted library allocation
page read and write
23FD6E58000
trusted library allocation
page read and write
23FD7651000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FDDFAC000
trusted library allocation
page read and write
23FDE1AB000
trusted library allocation
page read and write
2793526F000
trusted library allocation
page read and write
85FDDFE000
unkown
page readonly
23FD5DA5000
trusted library allocation
page read and write
23FD7635000
trusted library allocation
page read and write
23FE0A7F000
trusted library allocation
page read and write
23FDE022000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD87F9000
trusted library allocation
page read and write
23FD6E71000
trusted library allocation
page read and write
23FCCBEA000
heap
page read and write
23FCCBE1000
heap
page read and write
23FD761E000
trusted library allocation
page read and write
23FD62C3000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FCCBE7000
heap
page read and write
23FD619C000
trusted library allocation
page read and write
23FD7B7A000
trusted library allocation
page read and write
23FD6A67000
trusted library allocation
page read and write
23FE03BE000
trusted library allocation
page read and write
23FDA635000
trusted library allocation
page read and write
23FD77DB000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FE0E4E000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FD83D9000
trusted library allocation
page read and write
23FDDFE2000
trusted library allocation
page read and write
23FDE21E000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD58F9000
heap
page read and write
23FDE22D000
trusted library allocation
page read and write
23FDDBEB000
trusted library allocation
page read and write
23FD6030000
trusted library allocation
page read and write
23FD945F000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD9774000
trusted library allocation
page read and write
23FD763F000
trusted library allocation
page read and write
23FDF500000
trusted library allocation
page read and write
23FD1B71000
trusted library allocation
page read and write
23FD7670000
trusted library allocation
page read and write
23FD86E6000
trusted library allocation
page read and write
4191000
heap
page read and write
23FCCC2A000
heap
page read and write
23FD7AC5000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FDDEB7000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD7AD0000
trusted library allocation
page read and write
23FD7D69000
trusted library allocation
page read and write
23FD5D9C000
trusted library allocation
page read and write
23FDDBDE000
trusted library allocation
page read and write
23FD97F4000
trusted library allocation
page read and write
23FE0252000
trusted library allocation
page read and write
23FD2C7D000
trusted library allocation
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FD5919000
heap
page read and write
23FD976C000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FE0AC5000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
27DFAD40000
remote allocation
page read and write
23FD79BE000
trusted library allocation
page read and write
23FDA731000
trusted library allocation
page read and write
23FCCBD8000
heap
page read and write
23FCCC1D000
heap
page read and write
23FCCBD2000
heap
page read and write
23FD694A000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD5926000
heap
page read and write
23FD97C7000
trusted library allocation
page read and write
23FD6A52000
trusted library allocation
page read and write
23FD7D29000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCBDD000
heap
page read and write
23FDE0A8000
trusted library allocation
page read and write
23FDE0C7000
trusted library allocation
page read and write
23FE0377000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD94C0000
trusted library allocation
page read and write
23FD697B000
trusted library allocation
page read and write
23FCCC35000
heap
page read and write
23FD615D000
trusted library allocation
page read and write
23FD6A60000
trusted library allocation
page read and write
23FD6C4E000
trusted library allocation
page read and write
27935740000
heap
page read and write
23FD99C8000
trusted library allocation
page read and write
23FD6A06000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD75BF000
trusted library allocation
page read and write
27935DFD000
heap
page read and write
23FCCC35000
heap
page read and write
23FD1C7D000
trusted library allocation
page read and write
23FD8648000
trusted library allocation
page read and write
27DFAE00000
heap
page read and write
23FD6046000
trusted library allocation
page read and write
23FD6A38000
trusted library allocation
page read and write
20EAD01F000
trusted library allocation
page read and write
23FE064D000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD6624000
trusted library allocation
page read and write
23FD6076000
trusted library allocation
page read and write
23FD5D64000
trusted library allocation
page read and write
23FD787E000
trusted library allocation
page read and write
23FD9A86000
trusted library allocation
page read and write
23FD659B000
trusted library allocation
page read and write
23FCCBDA000
heap
page read and write
23FD79BE000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
287667C1000
heap
page read and write
27935180000
trusted library allocation
page read and write
23FDDDC1000
trusted library allocation
page read and write
23FDE0CC000
trusted library allocation
page read and write
23FD877E000
trusted library allocation
page read and write
23FD69E9000
trusted library allocation
page read and write
23FD1D00000
trusted library allocation
page read and write
23FD83EF000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FE06C1000
trusted library allocation
page read and write
23FD65E2000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FE03E0000
trusted library allocation
page read and write
23FD5592000
trusted library allocation
page read and write
23FD55D5000
trusted library allocation
page read and write
23FE0F8A000
trusted library allocation
page read and write
23FD79FC000
trusted library allocation
page read and write
23FD79CB000
trusted library allocation
page read and write
23FD6143000
trusted library allocation
page read and write
23FD1C76000
trusted library allocation
page read and write
69089FF000
stack
page read and write
23FD87DE000
trusted library allocation
page read and write
23FDDEF0000
trusted library allocation
page read and write
23FD9734000
trusted library allocation
page read and write
23FD6919000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCC2D000
heap
page read and write
23FDA062000
heap
page read and write
23FD87BF000
trusted library allocation
page read and write
23FCCBD6000
heap
page read and write
23FD6381000
trusted library allocation
page read and write
23FD83D9000
trusted library allocation
page read and write
F756DD8000
stack
page read and write
23FD61CB000
trusted library allocation
page read and write
23FE0A47000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FD77C5000
trusted library allocation
page read and write
23FE0E9D000
trusted library allocation
page read and write
23FD66D1000
trusted library allocation
page read and write
23FCCBDE000
heap
page read and write
27935D8A000
heap
page read and write
23FD62A2000
trusted library allocation
page read and write
23FD789C000
trusted library allocation
page read and write
23FDDE61000
trusted library allocation
page read and write
23FD629B000
trusted library allocation
page read and write
23FD695C000
trusted library allocation
page read and write
23FDA736000
trusted library allocation
page read and write
23FD7B08000
trusted library allocation
page read and write
23FD691D000
trusted library allocation
page read and write
23FD65BA000
trusted library allocation
page read and write
23FD8639000
trusted library allocation
page read and write
27DFB130000
trusted library allocation
page read and write
27935D60000
heap
page read and write
23FD5D69000
trusted library allocation
page read and write
23FD69ED000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD97D5000
trusted library allocation
page read and write
27DFB182000
trusted library allocation
page read and write
18A7000
heap
page read and write
23FD5DE6000
trusted library allocation
page read and write
23FDE141000
trusted library allocation
page read and write
23FD7935000
trusted library allocation
page read and write
23FD8895000
trusted library allocation
page read and write
27DFB124000
trusted library allocation
page read and write
23FDDF92000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD77B1000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD879F000
trusted library allocation
page read and write
23FD69B3000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD6C84000
trusted library allocation
page read and write
23FD85BE000
trusted library allocation
page read and write
20EACB0F000
unclassified section
page read and write
23FE0AD4000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD625E000
trusted library allocation
page read and write
23FD696B000
trusted library allocation
page read and write
23FD78E3000
trusted library allocation
page read and write
18A4000
heap
page read and write
23FDDCBF000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCC1D000
heap
page read and write
23FD6991000
trusted library allocation
page read and write
23FD2F90000
trusted library allocation
page read and write
23FD6363000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FDF832000
trusted library allocation
page read and write
27935DF0000
heap
page read and write
23FD7B8D000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FCCC2A000
heap
page read and write
23FD5D9A000
trusted library allocation
page read and write
23FDE259000
trusted library allocation
page read and write
23FD97C3000
trusted library allocation
page read and write
23FD7D6A000
trusted library allocation
page read and write
23FD6E37000
trusted library allocation
page read and write
23FD7B3E000
trusted library allocation
page read and write
27935E21000
heap
page read and write
23FD6E67000
trusted library allocation
page read and write
23FD5DAE000
trusted library allocation
page read and write
23FD94B0000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
23FD693C000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FD87AE000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD694F000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD6AB0000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FE06A7000
trusted library allocation
page read and write
23FCCBCF000
heap
page read and write
23FD7B48000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCBE8000
heap
page read and write
23FD6997000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD7D28000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD97F8000
trusted library allocation
page read and write
23FD93EF000
trusted library allocation
page read and write
27DFB400000
trusted library allocation
page read and write
20EACE03000
trusted library allocation
page read and write
23FDDCB6000
trusted library allocation
page read and write
23FD7969000
trusted library allocation
page read and write
23FD78F7000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD619C000
trusted library allocation
page read and write
23FDDF3A000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD7964000
trusted library allocation
page read and write
23FD9ED7000
heap
page read and write
23FD5DA0000
trusted library allocation
page read and write
23FD863D000
trusted library allocation
page read and write
23FD73C8000
trusted library allocation
page read and write
23FCCBCF000
heap
page read and write
23FD97F4000
trusted library allocation
page read and write
23FD77D6000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD638F000
trusted library allocation
page read and write
23FD9EC7000
heap
page read and write
23FD5539000
trusted library allocation
page read and write
23FDE1E9000
trusted library allocation
page read and write
23FCCBF7000
heap
page read and write
23FD6A6B000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
85FB3FE000
stack
page read and write
23FDE0DD000
trusted library allocation
page read and write
23FD7697000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FE0AC5000
trusted library allocation
page read and write
23FDDCDC000
trusted library allocation
page read and write
F757DFE000
stack
page read and write
23FD62BE000
trusted library allocation
page read and write
23FDE18C000
trusted library allocation
page read and write
23FD79F7000
trusted library allocation
page read and write
23FD7A75000
trusted library allocation
page read and write
23FD5DA5000
trusted library allocation
page read and write
23FD6E32000
trusted library allocation
page read and write
23FD6A6B000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD69ED000
trusted library allocation
page read and write
23FD972F000
trusted library allocation
page read and write
28764A10000
heap
page read and write
23FD9AE4000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FD697B000
trusted library allocation
page read and write
C0C000
unkown
page readonly
23FCCC17000
heap
page read and write
23FD6A49000
trusted library allocation
page read and write
23FDDE26000
trusted library allocation
page read and write
23FE03FD000
trusted library allocation
page read and write
20EACAA0000
heap
page read and write
23FD7870000
trusted library allocation
page read and write
23FD7929000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD69B3000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD79F7000
trusted library allocation
page read and write
23FD6A37000
trusted library allocation
page read and write
27935D8D000
heap
page read and write
27935E58000
heap
page read and write
23FD7C3C000
trusted library allocation
page read and write
27935D60000
heap
page read and write
23FD6A60000
trusted library allocation
page read and write
23FD7CE8000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
1684000
heap
page read and write
23FD6386000
trusted library allocation
page read and write
27935D69000
heap
page read and write
23FDDD96000
trusted library allocation
page read and write
23FD6387000
trusted library allocation
page read and write
23FD2C56000
trusted library allocation
page read and write
23FD94BB000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD99A2000
trusted library allocation
page read and write
23FD1CB0000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD7953000
trusted library allocation
page read and write
23FD6A37000
trusted library allocation
page read and write
27935264000
trusted library allocation
page read and write
27935DE1000
heap
page read and write
23FD73FB000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FE02FA000
trusted library allocation
page read and write
23FD6667000
trusted library allocation
page read and write
23FDE298000
trusted library allocation
page read and write
27935248000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD76B6000
trusted library allocation
page read and write
23FE0607000
trusted library allocation
page read and write
23FD97C7000
trusted library allocation
page read and write
23FD6A05000
trusted library allocation
page read and write
23FCCBE0000
heap
page read and write
23FD5DA5000
trusted library allocation
page read and write
23FD6E82000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD5DBE000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FCCC2A000
heap
page read and write
23FDDE70000
trusted library allocation
page read and write
23FD696B000
trusted library allocation
page read and write
23FD58FB000
heap
page read and write
23FDA9FD000
trusted library allocation
page read and write
23FD66E2000
trusted library allocation
page read and write
23FD1598000
trusted library allocation
page read and write
23FD65D6000
trusted library allocation
page read and write
23FCCBCE000
heap
page read and write
23FD5913000
heap
page read and write
23FCCBD5000
heap
page read and write
23FD62BE000
trusted library allocation
page read and write
23FDE019000
trusted library allocation
page read and write
23FCCBD6000
heap
page read and write
23FE0ABB000
trusted library allocation
page read and write
23FDE259000
trusted library allocation
page read and write
23FD62FC000
trusted library allocation
page read and write
23FD6AF5000
trusted library allocation
page read and write
23FD7C3C000
trusted library allocation
page read and write
23FD9498000
trusted library allocation
page read and write
23FE0E82000
trusted library allocation
page read and write
23FE0740000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD79CB000
trusted library allocation
page read and write
23FD2FDB000
trusted library allocation
page read and write
18C6000
heap
page read and write
23FD69ED000
trusted library allocation
page read and write
27935730000
heap
page read and write
23FD58AF000
heap
page read and write
23FDDBDE000
trusted library allocation
page read and write
23FE0E70000
trusted library allocation
page read and write
23FE1105000
trusted library allocation
page read and write
27935E3B000
heap
page read and write
27935E77000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD697B000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD6974000
trusted library allocation
page read and write
18C1000
heap
page read and write
23FD7AD8000
trusted library allocation
page read and write
23FD6566000
trusted library allocation
page read and write
23FD60C3000
trusted library allocation
page read and write
23FD69B2000
trusted library allocation
page read and write
23FD6CAF000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD7625000
trusted library allocation
page read and write
23FDE249000
trusted library allocation
page read and write
27934DA0000
heap
page read and write
23FD75F0000
trusted library allocation
page read and write
23FCCC3E000
heap
page read and write
23FE03F2000
trusted library allocation
page read and write
23FDE1A4000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FDA9F0000
trusted library allocation
page read and write
23FE03C2000
trusted library allocation
page read and write
23FDDDFC000
trusted library allocation
page read and write
23FD58F3000
heap
page read and write
23FD69E3000
trusted library allocation
page read and write
23FD696B000
trusted library allocation
page read and write
23FD7C7E000
trusted library allocation
page read and write
15FF000
stack
page read and write
23FD58FA000
heap
page read and write
23FDDCF8000
trusted library allocation
page read and write
23FD7BD1000
trusted library allocation
page read and write
23FD7BB8000
trusted library allocation
page read and write
23FD62C3000
trusted library allocation
page read and write
23FDE187000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD628D000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCC16000
heap
page read and write
2793529F000
trusted library allocation
page read and write
19A8BBE000
unkown
page readonly
23FD5D69000
trusted library allocation
page read and write
23FD87CF000
trusted library allocation
page read and write
23FD77BF000
trusted library allocation
page read and write
23FD87D6000
trusted library allocation
page read and write
23FE03C7000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FCCC1E000
heap
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FD7667000
trusted library allocation
page read and write
23FD6917000
trusted library allocation
page read and write
23FD887D000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCC3E000
heap
page read and write
23FD7A43000
trusted library allocation
page read and write
27935DFD000
heap
page read and write
23FD2C80000
trusted library allocation
page read and write
23FD6EB7000
trusted library allocation
page read and write
23FD79C2000
trusted library allocation
page read and write
23FD7A8A000
trusted library allocation
page read and write
23FD7C5B000
trusted library allocation
page read and write
23FE06AC000
trusted library allocation
page read and write
23FD7D6E000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FCCBCB000
heap
page read and write
23FD88E1000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FE0682000
trusted library allocation
page read and write
23FD848D000
trusted library allocation
page read and write
23FD6943000
trusted library allocation
page read and write
23FDDBE2000
trusted library allocation
page read and write
23FD6AB0000
trusted library allocation
page read and write
23FD7A9E000
trusted library allocation
page read and write
27934EE0000
heap
page read and write
23FE03FD000
trusted library allocation
page read and write
23FD628B000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FCCBE8000
heap
page read and write
23FCCBDD000
heap
page read and write
23FD79FC000
trusted library allocation
page read and write
23FD7C3C000
trusted library allocation
page read and write
23FE1137000
trusted library allocation
page read and write
23FD7632000
trusted library allocation
page read and write
23FD7929000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD6A61000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD93E0000
trusted library allocation
page read and write
F7563FE000
stack
page read and write
23FDDE8E000
trusted library allocation
page read and write
23FDDFEC000
trusted library allocation
page read and write
23FCCBDC000
heap
page read and write
18BA000
heap
page read and write
23FCCC34000
heap
page read and write
23FDDBB9000
trusted library allocation
page read and write
23FD6ECA000
trusted library allocation
page read and write
23FD7BE7000
trusted library allocation
page read and write
23FDDE0D000
trusted library allocation
page read and write
27934EAA000
heap
page read and write
19A71FE000
stack
page read and write
23FDDFF4000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FDE4ED000
trusted library allocation
page read and write
23FD7923000
trusted library allocation
page read and write
23FD79AB000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
189F000
heap
page read and write
23FD5D57000
trusted library allocation
page read and write
23FDE1B0000
trusted library allocation
page read and write
23FD7920000
trusted library allocation
page read and write
23FE0731000
trusted library allocation
page read and write
23FDE085000
trusted library allocation
page read and write
23FD80FA000
trusted library allocation
page read and write
23FD625D000
trusted library allocation
page read and write
23FD788B000
trusted library allocation
page read and write
23FD80FC000
trusted library allocation
page read and write
23FD799B000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCC1D000
heap
page read and write
23FDA922000
trusted library allocation
page read and write
23FD60DB000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FDDE2E000
trusted library allocation
page read and write
23FD5F92000
trusted library allocation
page read and write
23FE03D1000
trusted library allocation
page read and write
19A8B3E000
unkown
page readonly
23FD763D000
trusted library allocation
page read and write
23FCCBE4000
heap
page read and write
23FD8779000
trusted library allocation
page read and write
23FD7866000
trusted library allocation
page read and write
23FD7C79000
trusted library allocation
page read and write
27DFB11A000
trusted library allocation
page read and write
23FD78F7000
trusted library allocation
page read and write
23FCCC31000
heap
page read and write
23FD6962000
trusted library allocation
page read and write
23FE060C000
trusted library allocation
page read and write
27935C34000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD7B5D000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD7C4A000
trusted library allocation
page read and write
23FD84AB000
trusted library allocation
page read and write
23FD9F12000
heap
page read and write
23FCCC16000
heap
page read and write
23FD7868000
trusted library allocation
page read and write
23FE0E42000
trusted library allocation
page read and write
23FE03B8000
trusted library allocation
page read and write
23FD7AC2000
trusted library allocation
page read and write
23FD78D1000
trusted library allocation
page read and write
23FD7A87000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FD76B2000
trusted library allocation
page read and write
23FD6394000
trusted library allocation
page read and write
23FD7C55000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD9743000
trusted library allocation
page read and write
23FD58C8000
heap
page read and write
23FDDBC7000
trusted library allocation
page read and write
23FDDBE2000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD6063000
trusted library allocation
page read and write
279352F3000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD6E76000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD8328000
trusted library allocation
page read and write
23FD5E27000
trusted library allocation
page read and write
20EACE96000
trusted library allocation
page read and write
23FE07A9000
trusted library allocation
page read and write
23FD9765000
trusted library allocation
page read and write
23FD1CB4000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD7496000
trusted library allocation
page read and write
23FCCC39000
heap
page read and write
23FD61CB000
trusted library allocation
page read and write
23FD7C64000
trusted library allocation
page read and write
2793522F000
trusted library allocation
page read and write
23FD6533000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
27935DB9000
heap
page read and write
23FCCC1E000
heap
page read and write
23FD7485000
trusted library allocation
page read and write
23FDE232000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
69079FF000
stack
page read and write
23FD7BD1000
trusted library allocation
page read and write
23FE0648000
trusted library allocation
page read and write
23FD5887000
heap
page read and write
23FD79A5000
trusted library allocation
page read and write
23FE06B4000
trusted library allocation
page read and write
27935E2A000
heap
page read and write
27935DE3000
heap
page read and write
23FD80BA000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD837B000
trusted library allocation
page read and write
27DFB1F8000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
27935E00000
heap
page read and write
23FE0E89000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD97C7000
trusted library allocation
page read and write
23FD7998000
trusted library allocation
page read and write
23FD7DD9000
trusted library allocation
page read and write
27935E69000
heap
page read and write
23FD5926000
heap
page read and write
23FD614C000
trusted library allocation
page read and write
23FD659B000
trusted library allocation
page read and write
23FD6AC7000
trusted library allocation
page read and write
23FD97F4000
trusted library allocation
page read and write
23FD5DDE000
trusted library allocation
page read and write
23FD886C000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD76B6000
trusted library allocation
page read and write
23FD763F000
trusted library allocation
page read and write
23FDA709000
trusted library allocation
page read and write
1878000
heap
page read and write
23FD79AF000
trusted library allocation
page read and write
23FDE0C7000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD69E6000
trusted library allocation
page read and write
23FD78EA000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD7807000
trusted library allocation
page read and write
23FE06FE000
trusted library allocation
page read and write
27935762000
heap
page read and write
19A9C3E000
unkown
page readonly
85FBD7E000
unkown
page readonly
23FD7C55000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
27935D69000
heap
page read and write
23FD767D000
trusted library allocation
page read and write
23FD87E9000
trusted library allocation
page read and write
23FD69E3000
trusted library allocation
page read and write
23FDE1F3000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
1684000
heap
page read and write
23FE1167000
trusted library allocation
page read and write
23FD7BA0000
trusted library allocation
page read and write
23FD7B21000
trusted library allocation
page read and write
23FD6AC5000
trusted library allocation
page read and write
23FD7678000
trusted library allocation
page read and write
23FD753A000
trusted library allocation
page read and write
23FD696B000
trusted library allocation
page read and write
23FD5BF0000
trusted library allocation
page read and write
23FD8998000
trusted library allocation
page read and write
23FD72F0000
trusted library allocation
page read and write
27DFB169000
trusted library allocation
page read and write
23FD9AA7000
trusted library allocation
page read and write
27935DA8000
heap
page read and write
23FD58F9000
heap
page read and write
23FD6181000
trusted library allocation
page read and write
23FDAADA000
trusted library allocation
page read and write
23FCCC31000
heap
page read and write
23FD699C000
trusted library allocation
page read and write
23FD767D000
trusted library allocation
page read and write
23FD6A06000
trusted library allocation
page read and write
23FD7C64000
trusted library allocation
page read and write
23FDE2C6000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FCCC2B000
heap
page read and write
23FDAAF4000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
23FD63F7000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FD614C000
trusted library allocation
page read and write
23FD7BDC000
trusted library allocation
page read and write
23FD6049000
trusted library allocation
page read and write
23FDDEE3000
trusted library allocation
page read and write
23FD5F4E000
trusted library allocation
page read and write
23FD78F7000
trusted library allocation
page read and write
20EACE47000
trusted library allocation
page read and write
23FD6ED1000
trusted library allocation
page read and write
23FD94A8000
trusted library allocation
page read and write
23FD15C0000
trusted library allocation
page read and write
23FD7C39000
trusted library allocation
page read and write
23FD73AE000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
27935140000
trusted library section
page readonly
23FCCC1E000
heap
page read and write
23FD7D4D000
trusted library allocation
page read and write
1F4E8907000
trusted library allocation
page read and write
23FD7655000
trusted library allocation
page read and write
23FD7A46000
trusted library allocation
page read and write
85FBCFE000
unkown
page readonly
23FE05A3000
trusted library allocation
page read and write
23FD5D1C000
trusted library allocation
page read and write
23FD80C2000
trusted library allocation
page read and write
27935130000
unclassified section
page read and write
23FD5913000
heap
page read and write
23FD551E000
trusted library allocation
page read and write
23FD6A27000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD94FD000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
23FD9A48000
trusted library allocation
page read and write
23FD5CAA000
trusted library allocation
page read and write
23FD7AC5000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
20EAD000000
trusted library allocation
page read and write
23FD6AAE000
trusted library allocation
page read and write
23FD97B1000
trusted library allocation
page read and write
23FD7D14000
trusted library allocation
page read and write
23FCCC27000
heap
page read and write
23FD766B000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FD5565000
trusted library allocation
page read and write
23FDA95D000
trusted library allocation
page read and write
23FD2BCA000
trusted library allocation
page read and write
B70000
unkown
page readonly
23FE0C00000
trusted library allocation
page read and write
23FD6EFA000
trusted library allocation
page read and write
23FD6535000
trusted library allocation
page read and write
23FD2CC7000
trusted library allocation
page read and write
23FD769D000
trusted library allocation
page read and write
23FDDBE7000
trusted library allocation
page read and write
23FD89B9000
trusted library allocation
page read and write
23FD7620000
trusted library allocation
page read and write
23FD659D000
trusted library allocation
page read and write
23FD8437000
trusted library allocation
page read and write
23FDDC1E000
trusted library allocation
page read and write
23FD9746000
trusted library allocation
page read and write
23FE0EFC000
trusted library allocation
page read and write
23FE07FA000
trusted library allocation
page read and write
27DFAE63000
heap
page read and write
23FD66EF000
trusted library allocation
page read and write
23FCCC3D000
heap
page read and write
23FD77C5000
trusted library allocation
page read and write
23FD5903000
heap
page read and write
ABEB9FA000
stack
page read and write
23FD63CF000
trusted library allocation
page read and write
23FD7C6F000
trusted library allocation
page read and write
23FD2C60000
trusted library allocation
page read and write
23FE074A000
trusted library allocation
page read and write
23FCCC38000
heap
page read and write
23FD555B000
trusted library allocation
page read and write
23FD6089000
trusted library allocation
page read and write
23FE0AC5000
trusted library allocation
page read and write
4190000
heap
page read and write
23FDE021000
trusted library allocation
page read and write
23FD78FB000
trusted library allocation
page read and write
23FD93D9000
trusted library allocation
page read and write
23FD94FD000
trusted library allocation
page read and write
23FD7BC8000
trusted library allocation
page read and write
23FD6A50000
trusted library allocation
page read and write
27DFAD60000
unclassified section
page readonly
23FD6594000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD7BBC000
trusted library allocation
page read and write
23FD58AA000
heap
page read and write
23FD69BB000
trusted library allocation
page read and write
23FE0587000
trusted library allocation
page read and write
23FD9EE7000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD87E5000
trusted library allocation
page read and write
23FD69ED000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FD614B000
trusted library allocation
page read and write
23FD7499000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD79A3000
trusted library allocation
page read and write
23FD62BE000
trusted library allocation
page read and write
23FD6917000
trusted library allocation
page read and write
23FD6E11000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD69F8000
trusted library allocation
page read and write
23FCCBBC000
heap
page read and write
20EACF04000
heap
page read and write
23FD7935000
trusted library allocation
page read and write
23FD6291000
trusted library allocation
page read and write
23FD6E18000
trusted library allocation
page read and write
23FD6BA3000
trusted library allocation
page read and write
23FE0A73000
trusted library allocation
page read and write
23FD5DE6000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCBE8000
heap
page read and write
23FDA972000
trusted library allocation
page read and write
23FD614F000
trusted library allocation
page read and write
23FD6E0B000
trusted library allocation
page read and write
23FD7B75000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FDA972000
trusted library allocation
page read and write
23FDA9E8000
trusted library allocation
page read and write
23FDE0A5000
trusted library allocation
page read and write
23FD1590000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6E18000
trusted library allocation
page read and write
23FD7C86000
trusted library allocation
page read and write
20EACE6E000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FCCC2F000
heap
page read and write
23FDE254000
trusted library allocation
page read and write
23FD6C2C000
trusted library allocation
page read and write
23FD6AED000
trusted library allocation
page read and write
23FD7941000
trusted library allocation
page read and write
23FE0EAD000
trusted library allocation
page read and write
23FD76CD000
trusted library allocation
page read and write
23FD7879000
trusted library allocation
page read and write
27DFB40C000
trusted library allocation
page read and write
23FDE2D3000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD58BD000
heap
page read and write
17CE000
stack
page read and write
23FE05BE000
trusted library allocation
page read and write
23FE0E3D000
trusted library allocation
page read and write
23FD6B14000
trusted library allocation
page read and write
23FD73B3000
trusted library allocation
page read and write
23FDF516000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FCCBD7000
heap
page read and write
23FD74DA000
trusted library allocation
page read and write
23FD623B000
trusted library allocation
page read and write
23FD93CC000
trusted library allocation
page read and write
287667A6000
heap
page read and write
23FDDBDE000
trusted library allocation
page read and write
23FD6A60000
trusted library allocation
page read and write
23FD75C7000
trusted library allocation
page read and write
23FD8450000
trusted library allocation
page read and write
23FE0655000
trusted library allocation
page read and write
23FDE074000
trusted library allocation
page read and write
F75863E000
unkown
page readonly
23FD5F70000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6A35000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FE1150000
trusted library allocation
page read and write
23FCCBDC000
heap
page read and write
23FD766E000
trusted library allocation
page read and write
23FDDFEC000
trusted library allocation
page read and write
23FDA71E000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD69B8000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD97BD000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
27935D5C000
heap
page read and write
23FDDBA5000
trusted library allocation
page read and write
23FCCBF7000
heap
page read and write
23FCCC0C000
heap
page read and write
23FCCC1E000
heap
page read and write
4191000
heap
page read and write
23FD6147000
trusted library allocation
page read and write
23FDE0D9000
trusted library allocation
page read and write
23FDE4E1000
trusted library allocation
page read and write
10A8D403000
trusted library allocation
page read and write
23FD615D000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD8536000
trusted library allocation
page read and write
20EACAF0000
heap
page readonly
23FD7751000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCC1D000
heap
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FDE0D6000
trusted library allocation
page read and write
23FD9F3A000
heap
page read and write
23FD7673000
trusted library allocation
page read and write
23FD766E000
trusted library allocation
page read and write
23FD97DE000
trusted library allocation
page read and write
23FDE244000
trusted library allocation
page read and write
28764EF5000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD7D5D000
trusted library allocation
page read and write
23FD6354000
trusted library allocation
page read and write
23FD6394000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD899B000
trusted library allocation
page read and write
23FD834B000
trusted library allocation
page read and write
23FD7969000
trusted library allocation
page read and write
23FDDBD4000
trusted library allocation
page read and write
23FD5FA8000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD7AFB000
trusted library allocation
page read and write
23FD9759000
trusted library allocation
page read and write
23FD5DC2000
trusted library allocation
page read and write
23FE024D000
trusted library allocation
page read and write
23FD97C3000
trusted library allocation
page read and write
23FDE42B000
trusted library allocation
page read and write
23FD9EA1000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD7488000
trusted library allocation
page read and write
18BA000
heap
page read and write
23FDDCFB000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD7ABD000
trusted library allocation
page read and write
23FDDCA9000
trusted library allocation
page read and write
23FD7959000
trusted library allocation
page read and write
20EACE7B000
trusted library allocation
page read and write
23FD6E72000
trusted library allocation
page read and write
23FD946C000
trusted library allocation
page read and write
23FD9771000
trusted library allocation
page read and write
23FD787E000
trusted library allocation
page read and write
27DFAF70000
unclassified section
page readonly
23FD97F8000
trusted library allocation
page read and write
23FD5902000
heap
page read and write
23FE073B000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FCCC28000
heap
page read and write
23FD80BA000
trusted library allocation
page read and write
23FD778D000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
1680000
heap
page read and write
23FD15CB000
trusted library allocation
page read and write
23FD5DBE000
trusted library allocation
page read and write
1F4E8660000
heap
page read and write
23FD97DE000
trusted library allocation
page read and write
23FD5CCC000
trusted library allocation
page read and write
23FD5DB3000
trusted library allocation
page read and write
23FD73D8000
trusted library allocation
page read and write
27935D60000
heap
page read and write
23FCCC1D000
heap
page read and write
20EACEE7000
trusted library allocation
page read and write
23FD638A000
trusted library allocation
page read and write
23FCCBDB000
heap
page read and write
23FCCBCA000
heap
page read and write
23FE07DA000
trusted library allocation
page read and write
23FDE21C000
trusted library allocation
page read and write
27935212000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FDA736000
trusted library allocation
page read and write
23FD8539000
trusted library allocation
page read and write
23FD69B0000
trusted library allocation
page read and write
23FD6AC7000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
162F000
stack
page read and write
23FD9EA1000
heap
page read and write
23FD6A9A000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD6A30000
trusted library allocation
page read and write
28764AEE000
heap
page read and write
23FDA72E000
trusted library allocation
page read and write
23FD5D9C000
trusted library allocation
page read and write
23FDE223000
trusted library allocation
page read and write
23FD5DC7000
trusted library allocation
page read and write
23FD6AAE000
trusted library allocation
page read and write
23FD7B8B000
trusted library allocation
page read and write
27935E58000
heap
page read and write
23FDE417000
trusted library allocation
page read and write
23FD1C1E000
trusted library allocation
page read and write
23FDA715000
trusted library allocation
page read and write
23FD78A5000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD625B000
trusted library allocation
page read and write
23FD6A67000
trusted library allocation
page read and write
23FDE270000
trusted library allocation
page read and write
23FDA934000
trusted library allocation
page read and write
23FD7686000
trusted library allocation
page read and write
20EACF06000
heap
page read and write
23FD7A74000
trusted library allocation
page read and write
23FD7920000
trusted library allocation
page read and write
27935223000
trusted library allocation
page read and write
23FD97B1000
trusted library allocation
page read and write
23FD5DCD000
trusted library allocation
page read and write
279352BC000
trusted library allocation
page read and write
23FD7610000
trusted library allocation
page read and write
23FD945D000
trusted library allocation
page read and write
279352C5000
trusted library allocation
page read and write
23FD69E3000
trusted library allocation
page read and write
23FD84F2000
trusted library allocation
page read and write
23FDE1FD000
trusted library allocation
page read and write
3CD0000
trusted library allocation
page read and write
23FDA95D000
trusted library allocation
page read and write
23FE06FC000
trusted library allocation
page read and write
23FD7C22000
trusted library allocation
page read and write
23FCCBDE000
heap
page read and write
23FD76CF000
trusted library allocation
page read and write
23FD7660000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FCCC1D000
heap
page read and write
23FDDDB3000
trusted library allocation
page read and write
23FD9474000
trusted library allocation
page read and write
18BA000
heap
page read and write
23FD5887000
heap
page read and write
23FD7D9F000
trusted library allocation
page read and write
23FD7C7E000
trusted library allocation
page read and write
19A57FC000
stack
page read and write
23FD97C3000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FDDC3C000
trusted library allocation
page read and write
23FD6CCD000
trusted library allocation
page read and write
27DFB307000
trusted library allocation
page read and write
23FD6EE2000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
23FCCC23000
heap
page read and write
23FDDE56000
trusted library allocation
page read and write
23FE077F000
trusted library allocation
page read and write
23FD1C17000
trusted library allocation
page read and write
23FD6BF9000
trusted library allocation
page read and write
23FD6287000
trusted library allocation
page read and write
23FD763D000
trusted library allocation
page read and write
23FD76FA000
trusted library allocation
page read and write
23FD9A4D000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FD55CB000
trusted library allocation
page read and write
C32000
unkown
page readonly
23FD69ED000
trusted library allocation
page read and write
18BF000
heap
page read and write
23FD6A24000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FDDFF4000
trusted library allocation
page read and write
23FD83B2000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD7D35000
trusted library allocation
page read and write
27935DF0000
heap
page read and write
23FDDEC6000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FD7664000
trusted library allocation
page read and write
23FD69E3000
trusted library allocation
page read and write
F758E3E000
stack
page read and write
23FE0ADB000
trusted library allocation
page read and write
23FD63AF000
trusted library allocation
page read and write
23FD7B75000
trusted library allocation
page read and write
23FD638F000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FDE2A1000
trusted library allocation
page read and write
19AAC3E000
unkown
page readonly
23FCCC3E000
heap
page read and write
23FD7765000
trusted library allocation
page read and write
23FE118A000
trusted library allocation
page read and write
23FD5535000
trusted library allocation
page read and write
23FD766E000
trusted library allocation
page read and write
23FD79FC000
trusted library allocation
page read and write
27935DF0000
heap
page read and write
23FD1B2F000
trusted library allocation
page read and write
23FD791E000
trusted library allocation
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD9A41000
trusted library allocation
page read and write
27935E77000
heap
page read and write
23FD62C5000
trusted library allocation
page read and write
23FE0752000
trusted library allocation
page read and write
23FD7512000
trusted library allocation
page read and write
23FD899F000
trusted library allocation
page read and write
23FD6A52000
trusted library allocation
page read and write
23FD1CEF000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD77EF000
trusted library allocation
page read and write
27935E2D000
heap
page read and write
23FD58FE000
heap
page read and write
23FD1BFE000
trusted library allocation
page read and write
23FD798A000
trusted library allocation
page read and write
1891000
heap
page read and write
23FD7C47000
trusted library allocation
page read and write
23FE064A000
trusted library allocation
page read and write
23FD7B15000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD93E9000
trusted library allocation
page read and write
27935D7D000
heap
page read and write
23FCCC2A000
heap
page read and write
23FE0E89000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FCCBCF000
heap
page read and write
23FCCC23000
heap
page read and write
23FD786C000
trusted library allocation
page read and write
23FD6163000
trusted library allocation
page read and write
23FE0F50000
trusted library allocation
page read and write
23FD6067000
trusted library allocation
page read and write
23FDDE2D000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FDDDFE000
trusted library allocation
page read and write
23FE07FC000
trusted library allocation
page read and write
23FD6931000
trusted library allocation
page read and write
23FCCBE2000
heap
page read and write
23FD6A24000
trusted library allocation
page read and write
23FDA96F000
trusted library allocation
page read and write
85FA3D8000
stack
page read and write
23FD616F000
trusted library allocation
page read and write
23FDE4FB000
trusted library allocation
page read and write
23FD763F000
trusted library allocation
page read and write
23FD62C3000
trusted library allocation
page read and write
23FD79B2000
trusted library allocation
page read and write
2793525F000
trusted library allocation
page read and write
23FCCBDB000
heap
page read and write
23FD97F4000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
1F4E8900000
trusted library allocation
page read and write
1F4E8610000
heap
page read and write
23FCCBE8000
heap
page read and write
23FE0EFC000
trusted library allocation
page read and write
23FD7C86000
trusted library allocation
page read and write
16B0000
heap
page read and write
23FD7670000
trusted library allocation
page read and write
23FD1B76000
trusted library allocation
page read and write
23FD7877000
trusted library allocation
page read and write
23FDAACD000
trusted library allocation
page read and write
23FD602D000
trusted library allocation
page read and write
20EAD100000
heap
page read and write
23FD69B3000
trusted library allocation
page read and write
23FCCBEA000
heap
page read and write
ABED1FE000
stack
page read and write
23FD89D3000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FD7AC5000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD972F000
trusted library allocation
page read and write
23FD6B1B000
trusted library allocation
page read and write
23FD69ED000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FD7935000
trusted library allocation
page read and write
23FCCC34000
heap
page read and write
23FD60C1000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD627D000
trusted library allocation
page read and write
23FD84B1000
trusted library allocation
page read and write
23FD86C7000
trusted library allocation
page read and write
23FD97F4000
trusted library allocation
page read and write
23FD58AA000
heap
page read and write
27935D60000
heap
page read and write
85FC5FE000
stack
page read and write
23FD80B2000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FDE22F000
trusted library allocation
page read and write
23FD97DE000
trusted library allocation
page read and write
23FD5919000
heap
page read and write
23FD2C60000
trusted library allocation
page read and write
23FE07BB000
trusted library allocation
page read and write
23FD7667000
trusted library allocation
page read and write
1F4E85D0000
heap
page read and write
23FDDDA9000
trusted library allocation
page read and write
23FD6028000
trusted library allocation
page read and write
23FD766B000
trusted library allocation
page read and write
23FD97DE000
trusted library allocation
page read and write
23FD769D000
trusted library allocation
page read and write
23FD1C66000
trusted library allocation
page read and write
23FD6A30000
trusted library allocation
page read and write
23FDE0CF000
trusted library allocation
page read and write
23FD767D000
trusted library allocation
page read and write
23FD62BB000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
23FD97CB000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD6B8E000
trusted library allocation
page read and write
123A000
stack
page read and write
23FE07B0000
trusted library allocation
page read and write
287667B5000
heap
page read and write
23FD76A7000
trusted library allocation
page read and write
23FDE178000
trusted library allocation
page read and write
23FD6B38000
trusted library allocation
page read and write
23FD7612000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FDE20E000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD76FA000
trusted library allocation
page read and write
23FD80BF000
trusted library allocation
page read and write
23FD79DC000
trusted library allocation
page read and write
3D50000
heap
page read and write
23FD97CB000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6C90000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FDDFEE000
trusted library allocation
page read and write
23FD9986000
trusted library allocation
page read and write
23FD7664000
trusted library allocation
page read and write
27935D9C000
heap
page read and write
23FD62D1000
trusted library allocation
page read and write
23FD79CB000
trusted library allocation
page read and write
23FDDEE7000
trusted library allocation
page read and write
23FD79BE000
trusted library allocation
page read and write
23FD8032000
trusted library allocation
page read and write
27935E79000
heap
page read and write
27DFAFF4000
heap
page read and write
23FD7995000
trusted library allocation
page read and write
23FCCC15000
heap
page read and write
27935E58000
heap
page read and write
23FD8371000
trusted library allocation
page read and write
23FDE43C000
trusted library allocation
page read and write
23FD6060000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
F7585FE000
unkown
page readonly
27DFACD0000
unclassified section
page readonly
23FDA97A000
trusted library allocation
page read and write
23FD69E3000
trusted library allocation
page read and write
23FE07B1000
trusted library allocation
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FD5D9A000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FD7CA0000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
27DFB178000
trusted library allocation
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FD6392000
trusted library allocation
page read and write
23FCCC3D000
heap
page read and write
23FD766B000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FE02FE000
trusted library allocation
page read and write
23FD7C1A000
trusted library allocation
page read and write
23FD7917000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FDDDF3000
trusted library allocation
page read and write
27935DAA000
heap
page read and write
23FD97C3000
trusted library allocation
page read and write
23FD62A9000
trusted library allocation
page read and write
23FD58FE000
heap
page read and write
23FCCC27000
heap
page read and write
23FCCC2F000
heap
page read and write
23FD7935000
trusted library allocation
page read and write
27935DE0000
heap
page read and write
23FD7688000
trusted library allocation
page read and write
23FD697E000
trusted library allocation
page read and write
23FD5D8E000
trusted library allocation
page read and write
23FE079F000
trusted library allocation
page read and write
23FD6357000
trusted library allocation
page read and write
23FD78BA000
trusted library allocation
page read and write
27DFB18F000
trusted library allocation
page read and write
23FD69B2000
trusted library allocation
page read and write
23FDA646000
trusted library allocation
page read and write
23FD69E9000
trusted library allocation
page read and write
23FDDBF9000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD7935000
trusted library allocation
page read and write
23FD5DCD000
trusted library allocation
page read and write
23FD5545000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD15B3000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FD58B8000
heap
page read and write
23FD7B3C000
trusted library allocation
page read and write
23FE0ECE000
trusted library allocation
page read and write
23FD7D22000
trusted library allocation
page read and write
23FE0A47000
trusted library allocation
page read and write
23FD7AAE000
trusted library allocation
page read and write
23FCCC31000
heap
page read and write
23FD5DA0000
trusted library allocation
page read and write
23FD73F5000
trusted library allocation
page read and write
23FD783A000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD1CBC000
trusted library allocation
page read and write
23FDDCBA000
trusted library allocation
page read and write
23FD787E000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD6A67000
trusted library allocation
page read and write
23FD89EB000
trusted library allocation
page read and write
23FE0E5D000
trusted library allocation
page read and write
23FD798C000
trusted library allocation
page read and write
23FDE03B000
trusted library allocation
page read and write
23FE0ACD000
trusted library allocation
page read and write
27DFB113000
trusted library allocation
page read and write
23FD62B2000
trusted library allocation
page read and write
23FD89B6000
trusted library allocation
page read and write
23FDA987000
trusted library allocation
page read and write
23FE0688000
trusted library allocation
page read and write
23FD58F5000
heap
page read and write
27DFAFF0000
heap
page read and write
20EACB83000
heap
page read and write
23FD69F8000
trusted library allocation
page read and write
27935DE6000
heap
page read and write
23FD69B0000
trusted library allocation
page read and write
27935DE8000
heap
page read and write
23FD7647000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD62FC000
trusted library allocation
page read and write
23FDE0A2000
trusted library allocation
page read and write
23FD97C7000
trusted library allocation
page read and write
23FE0AD0000
trusted library allocation
page read and write
23FD7DEB000
trusted library allocation
page read and write
23FD8670000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD86EE000
trusted library allocation
page read and write
85FD5FE000
stack
page read and write
23FD6058000
trusted library allocation
page read and write
23FDDEF7000
trusted library allocation
page read and write
27DFB000000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD97F8000
trusted library allocation
page read and write
23FE0624000
trusted library allocation
page read and write
27DFB15F000
trusted library allocation
page read and write
28764AF3000
heap
page read and write
23FCCC1D000
heap
page read and write
23FCCC1D000
heap
page read and write
23FD5DC9000
trusted library allocation
page read and write
23FDE1B4000
trusted library allocation
page read and write
23FD7B2F000
trusted library allocation
page read and write
23FD861B000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD78FB000
trusted library allocation
page read and write
23FD7C30000
trusted library allocation
page read and write
85FBD3E000
stack
page read and write
20EACEC8000
trusted library allocation
page read and write
23FCCBD5000
heap
page read and write
23FD74DA000
trusted library allocation
page read and write
23FD2C86000
trusted library allocation
page read and write
23FD625B000
trusted library allocation
page read and write
23FDA97A000
trusted library allocation
page read and write
23FD65C6000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD69B8000
trusted library allocation
page read and write
23FDDE9E000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FE0A45000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
279352C7000
trusted library allocation
page read and write
23FDDBD8000
trusted library allocation
page read and write
23FD88A6000
trusted library allocation
page read and write
18BA000
heap
page read and write
23FD97BB000
trusted library allocation
page read and write
23FD77A2000
trusted library allocation
page read and write
23FDA96F000
trusted library allocation
page read and write
27935000000
heap
page read and write
27DFB165000
trusted library allocation
page read and write
23FD60B1000
trusted library allocation
page read and write
23FD9727000
trusted library allocation
page read and write
F75A63E000
unkown
page readonly
23FCCC2E000
heap
page read and write
23FD97CB000
trusted library allocation
page read and write
23FCCBE0000
heap
page read and write
23FD85AC000
trusted library allocation
page read and write
23FD73E6000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD6A49000
trusted library allocation
page read and write
23FD75E3000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD6E72000
trusted library allocation
page read and write
23FD767D000
trusted library allocation
page read and write
23FCCBD2000
heap
page read and write
23FD947E000
trusted library allocation
page read and write
23FD7C39000
trusted library allocation
page read and write
23FD6980000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD6A57000
trusted library allocation
page read and write
23FD9748000
trusted library allocation
page read and write
27935E22000
heap
page read and write
23FD7AC2000
trusted library allocation
page read and write
23FDE2E0000
trusted library allocation
page read and write
23FD636A000
trusted library allocation
page read and write
23FD6291000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
2793513F000
unclassified section
page read and write
23FCCC0E000
heap
page read and write
23FCCC42000
heap
page read and write
B71000
unkown
page execute read
23FD942A000
trusted library allocation
page read and write
23FD761E000
trusted library allocation
page read and write
23FD5DB8000
trusted library allocation
page read and write
23FD79F7000
trusted library allocation
page read and write
23FCCC30000
heap
page read and write
23FCCC33000
heap
page read and write
23FD78FB000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FCCBBE000
heap
page read and write
23FD87CA000
trusted library allocation
page read and write
23FCCBD8000
heap
page read and write
23FD97A7000
trusted library allocation
page read and write
27935194000
heap
page read and write
23FD1CC7000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD7A79000
trusted library allocation
page read and write
23FD79FC000
trusted library allocation
page read and write
23FDE035000
trusted library allocation
page read and write
180D000
stack
page read and write
23FE0605000
trusted library allocation
page read and write
23FDE4FB000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FD7775000
trusted library allocation
page read and write
23FCCBD7000
heap
page read and write
23FD6381000
trusted library allocation
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
27935E77000
heap
page read and write
23FCCC24000
heap
page read and write
23FD6EE6000
trusted library allocation
page read and write
23FD7D79000
trusted library allocation
page read and write
23FD8576000
trusted library allocation
page read and write
23FD862F000
trusted library allocation
page read and write
23FDA062000
heap
page read and write
23FD2CD4000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD7C27000
trusted library allocation
page read and write
23FD9AA3000
trusted library allocation
page read and write
23FD6035000
trusted library allocation
page read and write
23FD6B4E000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FDDBF1000
trusted library allocation
page read and write
23FE07C0000
trusted library allocation
page read and write
23FD83CC000
trusted library allocation
page read and write
23FD7BC2000
trusted library allocation
page read and write
23FCCC37000
heap
page read and write
23FD6E58000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FCCC33000
heap
page read and write
23FD7643000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
651F2104000
trusted library allocation
page read and write
23FD97DE000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FDE1D4000
trusted library allocation
page read and write
23FDDBA5000
trusted library allocation
page read and write
23FDDBEB000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
19A943E000
stack
page read and write
23FD60AF000
trusted library allocation
page read and write
23FD6181000
trusted library allocation
page read and write
23FD55AE000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD854E000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD6943000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FD78B0000
trusted library allocation
page read and write
23FE06F0000
trusted library allocation
page read and write
23FD795E000
trusted library allocation
page read and write
23FD60CA000
trusted library allocation
page read and write
23FD743F000
trusted library allocation
page read and write
279351F6000
unkown
page execute read
27DFAFF6000
heap
page read and write
23FD7635000
trusted library allocation
page read and write
23FD6A57000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FCCBDD000
heap
page read and write
23FCCC22000
heap
page read and write
23FD6147000
trusted library allocation
page read and write
23FD5F75000
trusted library allocation
page read and write
23FDE259000
trusted library allocation
page read and write
23FD6060000
trusted library allocation
page read and write
23FD7B87000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
27935D6C000
heap
page read and write
23FDE224000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
23FD8475000
trusted library allocation
page read and write
23FD76B4000
trusted library allocation
page read and write
23FCCC73000
heap
page read and write
20EACE23000
trusted library allocation
page read and write
23FD1C93000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD796B000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FE109E000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD75C7000
trusted library allocation
page read and write
23FE05C8000
trusted library allocation
page read and write
23FDDFDD000
trusted library allocation
page read and write
23FE06E4000
trusted library allocation
page read and write
23FD2F90000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FCCC29000
heap
page read and write
23FD792E000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD7664000
trusted library allocation
page read and write
23FE0246000
trusted library allocation
page read and write
23FD795B000
trusted library allocation
page read and write
23FD2FD5000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD76AB000
trusted library allocation
page read and write
23FD652B000
trusted library allocation
page read and write
23FD65BA000
trusted library allocation
page read and write
23FD9740000
trusted library allocation
page read and write
23FD9A07000
trusted library allocation
page read and write
23FD97C3000
trusted library allocation
page read and write
18C3000
heap
page read and write
23FCCC22000
heap
page read and write
23FD7D4D000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD859E000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FD1581000
trusted library allocation
page read and write
23FE0E55000
trusted library allocation
page read and write
23FD97D5000
trusted library allocation
page read and write
23FD6305000
trusted library allocation
page read and write
27934D10000
unclassified section
page readonly
23FD69C0000
trusted library allocation
page read and write
23FD7AB0000
trusted library allocation
page read and write
23FDE4E6000
trusted library allocation
page read and write
23FDE415000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD6931000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD65B0000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD69BC000
trusted library allocation
page read and write
23FDA917000
trusted library allocation
page read and write
23FD6B88000
trusted library allocation
page read and write
27935E77000
heap
page read and write
23FD5BD9000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
23FD60F9000
trusted library allocation
page read and write
23FDDF9E000
trusted library allocation
page read and write
23FD9479000
trusted library allocation
page read and write
23FD5DE2000
trusted library allocation
page read and write
23FD58FB000
heap
page read and write
28764D07000
trusted library allocation
page read and write
23FD79D7000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FD6E37000
trusted library allocation
page read and write
23FD58AC000
heap
page read and write
23FD740B000
trusted library allocation
page read and write
23FD6991000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD77E6000
trusted library allocation
page read and write
23FD787C000
trusted library allocation
page read and write
20EACB80000
heap
page read and write
23FD58F8000
heap
page read and write
23FD8642000
trusted library allocation
page read and write
23FD6153000
trusted library allocation
page read and write
23FDE0E7000
trusted library allocation
page read and write
19A7ABB000
stack
page read and write
ABED9FF000
stack
page read and write
23FDDEB0000
trusted library allocation
page read and write
23FD7B5B000
trusted library allocation
page read and write
27935190000
heap
page read and write
23FD65A0000
trusted library allocation
page read and write
23FD78E3000
trusted library allocation
page read and write
23FD2CA3000
trusted library allocation
page read and write
23FCCBE7000
heap
page read and write
23FE0755000
trusted library allocation
page read and write
23FD798A000
trusted library allocation
page read and write
23FD15A6000
trusted library allocation
page read and write
23FD6EDE000
trusted library allocation
page read and write
27935E77000
heap
page read and write
C0C000
unkown
page readonly
23FD8798000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD94A8000
trusted library allocation
page read and write
23FD7775000
trusted library allocation
page read and write
23FD5DCE000
trusted library allocation
page read and write
23FDE0C7000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FDDBF5000
trusted library allocation
page read and write
23FDA987000
trusted library allocation
page read and write
23FD6B1D000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FD62C3000
trusted library allocation
page read and write
23FCCC33000
heap
page read and write
23FD6B7F000
trusted library allocation
page read and write
23FD62B9000
trusted library allocation
page read and write
23FD7AD0000
trusted library allocation
page read and write
23FD7B53000
trusted library allocation
page read and write
23FDDCAA000
trusted library allocation
page read and write
23FD6260000
trusted library allocation
page read and write
23FD87E1000
trusted library allocation
page read and write
23FDE092000
trusted library allocation
page read and write
23FD65BA000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FD78FD000
trusted library allocation
page read and write
23FE0733000
trusted library allocation
page read and write
23FD7953000
trusted library allocation
page read and write
23FD7648000
trusted library allocation
page read and write
23FD602B000
trusted library allocation
page read and write
27935E2A000
heap
page read and write
20EACA40000
heap
page read and write
23FD75DE000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD78B0000
trusted library allocation
page read and write
B70000
unkown
page readonly
23FD6E12000
trusted library allocation
page read and write
23FDA9FD000
trusted library allocation
page read and write
23FD762F000
trusted library allocation
page read and write
23FD93D5000
trusted library allocation
page read and write
23FD766B000
trusted library allocation
page read and write
23FD6597000
trusted library allocation
page read and write
23FD6B38000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD62BB000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD5926000
heap
page read and write
23FCCBDF000
heap
page read and write
23FD58AF000
heap
page read and write
23FDE208000
trusted library allocation
page read and write
23FD60CA000
trusted library allocation
page read and write
23FD6917000
trusted library allocation
page read and write
23FD80FA000
trusted library allocation
page read and write
23FD7D73000
trusted library allocation
page read and write
23FD6A0E000
trusted library allocation
page read and write
23FDE283000
trusted library allocation
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FD80BA000
trusted library allocation
page read and write
23FD9494000
trusted library allocation
page read and write
23FCCC24000
heap
page read and write
23FD6A45000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FDDF9E000
trusted library allocation
page read and write
23FD6AF5000
trusted library allocation
page read and write
23FD75BF000
trusted library allocation
page read and write
23FD5906000
heap
page read and write
23FD7993000
trusted library allocation
page read and write
23FD7969000
trusted library allocation
page read and write
23FCCC5E000
heap
page read and write
23FD5F5E000
trusted library allocation
page read and write
23FDDEE3000
trusted library allocation
page read and write
23FD6BD8000
trusted library allocation
page read and write
23FD6297000
trusted library allocation
page read and write
23FE07EE000
trusted library allocation
page read and write
27935D00000
heap
page read and write
23FCCC22000
heap
page read and write
27935E69000
heap
page read and write
23FD973B000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FCCC42000
heap
page read and write
23FD73F5000
trusted library allocation
page read and write
23FD6B8E000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
23FD766E000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
23FE066D000
trusted library allocation
page read and write
23FDDE70000
trusted library allocation
page read and write
23FD15C6000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD6962000
trusted library allocation
page read and write
23FD6E86000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FD69C0000
trusted library allocation
page read and write
23FD1BF6000
trusted library allocation
page read and write
23FD15BF000
trusted library allocation
page read and write
23FD5DF1000
trusted library allocation
page read and write
23FDDEFB000
trusted library allocation
page read and write
11BC7C6C000
trusted library allocation
page execute read
23FCCC0C000
heap
page read and write
23FD7A61000
trusted library allocation
page read and write
23FD5DA5000
trusted library allocation
page read and write
23FD69C3000
trusted library allocation
page read and write
23FCCC38000
heap
page read and write
23FE0EC4000
trusted library allocation
page read and write
23FD5CD7000
trusted library allocation
page read and write
23FD87DC000
trusted library allocation
page read and write
23FD79DC000
trusted library allocation
page read and write
23FD604F000
trusted library allocation
page read and write
23FD6B4E000
trusted library allocation
page read and write
23FD9A6D000
trusted library allocation
page read and write
23FDE218000
trusted library allocation
page read and write
23FD97A7000
trusted library allocation
page read and write
23FD7879000
trusted library allocation
page read and write
23FD5F8B000
trusted library allocation
page read and write
23FD78FB000
trusted library allocation
page read and write
23FDE2FD000
trusted library allocation
page read and write
23FD97D5000
trusted library allocation
page read and write
23FD6B89000
trusted library allocation
page read and write
23FD6E0E000
trusted library allocation
page read and write
23FD619C000
trusted library allocation
page read and write
23FD6970000
trusted library allocation
page read and write
23FD58F8000
heap
page read and write
23FD740B000
trusted library allocation
page read and write
27935040000
heap
page readonly
23FD5DAE000
trusted library allocation
page read and write
23FD6AF5000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FDDEAA000
trusted library allocation
page read and write
23FD697E000
trusted library allocation
page read and write
19AA43E000
stack
page read and write
23FD58F5000
heap
page read and write
23FD78EA000
trusted library allocation
page read and write
23FDDE95000
trusted library allocation
page read and write
23FDDC00000
trusted library allocation
page read and write
23FD798A000
trusted library allocation
page read and write
23FDE4E6000
trusted library allocation
page read and write
23FD1CB4000
trusted library allocation
page read and write
23FD62A5000
trusted library allocation
page read and write
23FDE0A5000
trusted library allocation
page read and write
23FD6ED6000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FE0EF2000
trusted library allocation
page read and write
23FD1B23000
trusted library allocation
page read and write
23FD6EFD000
trusted library allocation
page read and write
23FD7993000
trusted library allocation
page read and write
23FD6997000
trusted library allocation
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FE07BE000
trusted library allocation
page read and write
23FD97F8000
trusted library allocation
page read and write
20EACE00000
trusted library allocation
page read and write
23FD86F3000
trusted library allocation
page read and write
27935DE0000
heap
page read and write
23FD7995000
trusted library allocation
page read and write
23FD603D000
trusted library allocation
page read and write
C44000
unkown
page readonly
23FCCC2A000
heap
page read and write
23FD9EA1000
heap
page read and write
23FD6AC5000
trusted library allocation
page read and write
23FD941E000
trusted library allocation
page read and write
23FDA983000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
23FCCC1D000
heap
page read and write
23FD7AAE000
trusted library allocation
page read and write
23FD5DF0000
trusted library allocation
page read and write
27935E69000
heap
page read and write
23FD97CB000
trusted library allocation
page read and write
28764A50000
heap
page read and write
23FD77BF000
trusted library allocation
page read and write
23FD766B000
trusted library allocation
page read and write
27DFAF4F000
unclassified section
page read and write
23FD858B000
trusted library allocation
page read and write
23FCCC77000
heap
page read and write
23FD78FB000
trusted library allocation
page read and write
27935E44000
heap
page read and write
27DFAF50000
heap
page read and write
2610000
heap
page read and write
23FD6BBD000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD87D3000
trusted library allocation
page read and write
19A7AB8000
stack
page read and write
23FD69E6000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD6E04000
trusted library allocation
page read and write
23FE05C0000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FCCBDD000
heap
page read and write
23FD69B0000
trusted library allocation
page read and write
23FDDEFB000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD69B2000
trusted library allocation
page read and write
23FD97BB000
trusted library allocation
page read and write
23FD69E9000
trusted library allocation
page read and write
23FDDF8B000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD975D000
trusted library allocation
page read and write
23FD7AFB000
trusted library allocation
page read and write
23FD77E1000
trusted library allocation
page read and write
23FCCBE1000
heap
page read and write
27935DE0000
heap
page read and write
23FD7AC3000
trusted library allocation
page read and write
23FD6963000
trusted library allocation
page read and write
23FD6152000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
27935DA1000
heap
page read and write
23FD6AED000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FDE25E000
trusted library allocation
page read and write
23FD9767000
trusted library allocation
page read and write
27935132000
unclassified section
page read and write
23FD5B74000
trusted library allocation
page read and write
23FD6C22000
trusted library allocation
page read and write
23FDE1EF000
trusted library allocation
page read and write
23FD7643000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD5D3B000
trusted library allocation
page read and write
20EAD032000
trusted library allocation
page read and write
287667B6000
heap
page read and write
23FD5D6F000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FE0759000
trusted library allocation
page read and write
23FD79CC000
trusted library allocation
page read and write
23FD60F3000
trusted library allocation
page read and write
23FDE4D5000
trusted library allocation
page read and write
23FD614C000
trusted library allocation
page read and write
23FD6280000
trusted library allocation
page read and write
23FDE0E2000
trusted library allocation
page read and write
23FD86EB000
trusted library allocation
page read and write
23FE05E5000
trusted library allocation
page read and write
28764C00000
trusted library allocation
page read and write
23FD79CB000
trusted library allocation
page read and write
23FDDCF5000
trusted library allocation
page read and write
23FE037A000
trusted library allocation
page read and write
23FDE220000
trusted library allocation
page read and write
23FD608F000
trusted library allocation
page read and write
23FD7805000
trusted library allocation
page read and write
23FE0ABB000
trusted library allocation
page read and write
23FDDB6A000
trusted library allocation
page read and write
23FD159E000
trusted library allocation
page read and write
23FD776E000
trusted library allocation
page read and write
23FDE15C000
trusted library allocation
page read and write
23FD5913000
heap
page read and write
23FD636A000
trusted library allocation
page read and write
23FD79C2000
trusted library allocation
page read and write
23FDAADA000
trusted library allocation
page read and write
23FCCC2F000
heap
page read and write
23FD6E71000
trusted library allocation
page read and write
23FD6A92000
trusted library allocation
page read and write
27DFB163000
trusted library allocation
page read and write
23FCCC16000
heap
page read and write
23FDA953000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD5DB8000
trusted library allocation
page read and write
20EAD003000
trusted library allocation
page read and write
23FD7D52000
trusted library allocation
page read and write
161B000
stack
page read and write
23FD62FC000
trusted library allocation
page read and write
23FD62B6000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FCCC16000
heap
page read and write
27935D01000
heap
page read and write
23FCCC24000
heap
page read and write
23FDA953000
trusted library allocation
page read and write
20EACD00000
trusted library allocation
page read and write
23FD764B000
trusted library allocation
page read and write
23FD6163000
trusted library allocation
page read and write
23FD85D3000
trusted library allocation
page read and write
11BC7D71000
trusted library allocation
page execute read
23FD5D0F000
trusted library allocation
page read and write
23FDA676000
trusted library allocation
page read and write
23FD6EB9000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD7AA1000
trusted library allocation
page read and write
23FD5DE6000
trusted library allocation
page read and write
23FD78FB000
trusted library allocation
page read and write
23FD6A0C000
trusted library allocation
page read and write
23FD6B5C000
trusted library allocation
page read and write
23FDDCE8000
trusted library allocation
page read and write
23FDAAF4000
trusted library allocation
page read and write
23FD6A57000
trusted library allocation
page read and write
23FD65E2000
trusted library allocation
page read and write
23FE0A6C000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FD743F000
trusted library allocation
page read and write
23FD6A67000
trusted library allocation
page read and write
23FD97F8000
trusted library allocation
page read and write
23FD6EF2000
trusted library allocation
page read and write
23FD58F9000
heap
page read and write
23FD65D6000
trusted library allocation
page read and write
23FE0E3E000
trusted library allocation
page read and write
23FD7670000
trusted library allocation
page read and write
23FD86DD000
trusted library allocation
page read and write
23FD5B77000
trusted library allocation
page read and write
23FD6CB1000
trusted library allocation
page read and write
23FD97DF000
trusted library allocation
page read and write
23FD629B000
trusted library allocation
page read and write
23FD61A2000
trusted library allocation
page read and write
23FD69E9000
trusted library allocation
page read and write
23FE06F4000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FCCBD6000
heap
page read and write
23FD97BD000
trusted library allocation
page read and write
23FD69E6000
trusted library allocation
page read and write
23FD6064000
trusted library allocation
page read and write
23FE05CA000
trusted library allocation
page read and write
23FD7C2A000
trusted library allocation
page read and write
23FE07BB000
trusted library allocation
page read and write
23FD5F29000
trusted library allocation
page read and write
23FD79DC000
trusted library allocation
page read and write
23FD5535000
trusted library allocation
page read and write
23FD697B000
trusted library allocation
page read and write
23FD7D48000
trusted library allocation
page read and write
23FD97B4000
trusted library allocation
page read and write
287667A0000
heap
page read and write
23FCCC2F000
heap
page read and write
23FD7D25000
trusted library allocation
page read and write
23FD7B46000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FE03C0000
trusted library allocation
page read and write
23FDDCE2000
trusted library allocation
page read and write
23FD777B000
trusted library allocation
page read and write
23FD6381000
trusted library allocation
page read and write
23FD78EA000
trusted library allocation
page read and write
23FD5DC7000
trusted library allocation
page read and write
23FD7802000
trusted library allocation
page read and write
23FD2BCA000
trusted library allocation
page read and write
23FD7AAA000
trusted library allocation
page read and write
23FDE22E000
trusted library allocation
page read and write
23FD6091000
trusted library allocation
page read and write
189D000
heap
page read and write
23FCCC0C000
heap
page read and write
23FE0790000
trusted library allocation
page read and write
23FD15EF000
trusted library allocation
page read and write
23FD6530000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD6952000
trusted library allocation
page read and write
23FE06F6000
trusted library allocation
page read and write
23FE06A3000
trusted library allocation
page read and write
23FD79DA000
trusted library allocation
page read and write
23FDE199000
trusted library allocation
page read and write
23FD6E2A000
trusted library allocation
page read and write
23FD65B0000
trusted library allocation
page read and write
23FD9ED6000
heap
page read and write
23FCCC28000
heap
page read and write
23FCCC1E000
heap
page read and write
23FCCC2A000
heap
page read and write
23FD9482000
trusted library allocation
page read and write
23FDA920000
trusted library allocation
page read and write
23FD7B10000
trusted library allocation
page read and write
23FD1C7F000
trusted library allocation
page read and write
23FE03B3000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD976D000
trusted library allocation
page read and write
23FD7D73000
trusted library allocation
page read and write
23FD78E3000
trusted library allocation
page read and write
23FE0A1B000
trusted library allocation
page read and write
23FDE23D000
trusted library allocation
page read and write
23FDE1AD000
trusted library allocation
page read and write
23FD6A7D000
trusted library allocation
page read and write
23FE0255000
trusted library allocation
page read and write
23FD8772000
trusted library allocation
page read and write
23FCCC23000
heap
page read and write
23FCCC0C000
heap
page read and write
23FD65B0000
trusted library allocation
page read and write
23FDDE7F000
trusted library allocation
page read and write
23FE0790000
trusted library allocation
page read and write
23FDE222000
trusted library allocation
page read and write
23FD6186000
trusted library allocation
page read and write
27DFAE60000
heap
page read and write
23FD6291000
trusted library allocation
page read and write
23FD15DD000
trusted library allocation
page read and write
23FDDE56000
trusted library allocation
page read and write
23FD1C93000
trusted library allocation
page read and write
23FD77FA000
trusted library allocation
page read and write
69079FC000
stack
page read and write
23FD974A000
trusted library allocation
page read and write
19A8B7E000
stack
page read and write
23FCCBD7000
heap
page read and write
28766790000
heap
page read and write
23FD5F6B000
trusted library allocation
page read and write
23FD80FA000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FD58F5000
heap
page read and write
23FD69E9000
trusted library allocation
page read and write
23FE0640000
trusted library allocation
page read and write
23FDE0D5000
trusted library allocation
page read and write
27DFB170000
trusted library allocation
page read and write
20EACE10000
trusted library allocation
page read and write
23FD7672000
trusted library allocation
page read and write
23FD79D4000
trusted library allocation
page read and write
23FD7660000
trusted library allocation
page read and write
23FDE1E2000
trusted library allocation
page read and write
23FCCC38000
heap
page read and write
1F4E85F0000
heap
page read and write
23FCCC16000
heap
page read and write
23FCCC1E000
heap
page read and write
23FD79DC000
trusted library allocation
page read and write
23FD79F4000
trusted library allocation
page read and write
23FD62FC000
trusted library allocation
page read and write
27935D69000
heap
page read and write
23FD6E2B000
trusted library allocation
page read and write
23FCCBE8000
heap
page read and write
23FE0EA2000
trusted library allocation
page read and write
23FCCC1D000
heap
page read and write
23FDA707000
trusted library allocation
page read and write
23FD649D000
trusted library allocation
page read and write
23FDE0E6000
trusted library allocation
page read and write
27DFB100000
trusted library allocation
page read and write
23FD638E000
trusted library allocation
page read and write
27935DE8000
heap
page read and write
23FD69C0000
trusted library allocation
page read and write
23FDDFB9000
trusted library allocation
page read and write
23FCCBDD000
heap
page read and write
20EACE62000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD618C000
trusted library allocation
page read and write
27DFB1AA000
trusted library allocation
page read and write
23FD7B52000
trusted library allocation
page read and write
23FD79C4000
trusted library allocation
page read and write
1684000
heap
page read and write
23FCCC22000
heap
page read and write
27935D6C000
heap
page read and write
23FD78BA000
trusted library allocation
page read and write
23FE0EC9000
trusted library allocation
page read and write
23FD78BA000
trusted library allocation
page read and write
23FD6AF5000
trusted library allocation
page read and write
23FD89A9000
trusted library allocation
page read and write
23FD9FF3000
heap
page read and write
23FE0701000
trusted library allocation
page read and write
23FCCC29000
heap
page read and write
23FD69E6000
trusted library allocation
page read and write
23FD602D000
trusted library allocation
page read and write
23FD6C59000
trusted library allocation
page read and write
23FD6AC3000
trusted library allocation
page read and write
23FE0EA5000
trusted library allocation
page read and write
27935E58000
heap
page read and write
23FDE240000
trusted library allocation
page read and write
23FD58BE000
heap
page read and write
23FD7AD0000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FD5DC9000
trusted library allocation
page read and write
19A8BFE000
stack
page read and write
23FD6A0E000
trusted library allocation
page read and write
23FCCC2E000
heap
page read and write
23FD698C000
trusted library allocation
page read and write
23FD944E000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD97BD000
trusted library allocation
page read and write
23FDDF1E000
trusted library allocation
page read and write
23FD5CFD000
trusted library allocation
page read and write
23FDDC1A000
trusted library allocation
page read and write
23FD6CA1000
trusted library allocation
page read and write
23FDDF96000
trusted library allocation
page read and write
23FDE0E4000
trusted library allocation
page read and write
23FCCC0C000
heap
page read and write
23FD7987000
trusted library allocation
page read and write
23FDA996000
trusted library allocation
page read and write
23FDE04A000
trusted library allocation
page read and write
23FE0630000
trusted library allocation
page read and write
23FDA965000
trusted library allocation
page read and write
23FE03FD000
trusted library allocation
page read and write
23FCCC1E000
heap
page read and write
23FE1084000
trusted library allocation
page read and write
23FD5926000
heap
page read and write
23FD9421000
trusted library allocation
page read and write
23FCCC2A000
heap
page read and write
23FCCC0C000
heap
page read and write
23FCCBE7000
heap
page read and write
23FD5F73000
trusted library allocation
page read and write
23FD87D8000
trusted library allocation
page read and write
23FD6359000
trusted library allocation
page read and write
27935276000
trusted library allocation
page read and write
23FD7B28000
trusted library allocation
page read and write
23FD61CB000
trusted library allocation
page read and write
23FDE157000
trusted library allocation
page read and write
23FD6166000
trusted library allocation
page read and write
23FCCBE3000
heap
page read and write
23FD6931000
trusted library allocation
page read and write
23FE072E000
trusted library allocation
page read and write
23FD79AF000
trusted library allocation
page read and write
23FD78FD000
trusted library allocation
page read and write
23FD2C9C000
trusted library allocation
page read and write
1684000
heap
page read and write
23FD63AC000
trusted library allocation
page read and write
23FCCC22000
heap
page read and write
23FD58F5000
heap
page read and write
23FCCC2A000
heap
page read and write
20EAC9E0000
remote allocation
page read and write
23FD6BB5000
trusted library allocation
page read and write
23FD6AB0000
trusted library allocation
page read and write
23FD7669000
trusted library allocation
page read and write
23FDE024000
trusted library allocation
page read and write
23FD5DA7000
trusted library allocation
page read and write
23FD751A000
trusted library allocation
page read and write
23FE0684000
trusted library allocation
page read and write
23FD5546000
trusted library allocation
page read and write
23FDDDE3000
trusted library allocation
page read and write
23FD5D6F000
trusted library allocation
page read and write
23FD1CBC000
trusted library allocation
page read and write
23FD6067000
trusted library allocation
page read and write
23FD5DB8000
trusted library allocation
page read and write
23FD7A3F000
trusted library allocation
page read and write
23FD76C6000
trusted library allocation
page read and write
27DFAF42000
unclassified section
page read and write
23FD60A7000
trusted library allocation
page read and write
23FCCBDF000
heap
page read and write
23FD8556000
trusted library allocation
page read and write
23FD5590000
trusted library allocation
page read and write
19A8C3E000
unkown
page readonly
27DFB300000
trusted library allocation
page read and write
23FDDE0D000
trusted library allocation
page read and write
23FDE270000
trusted library allocation
page read and write
23FD777B000
trusted library allocation
page read and write
23FCCC17000
heap
page read and write
23FD6B3C000
trusted library allocation
page read and write
23FCCBE6000
heap
page read and write
23FD6297000
trusted library allocation
page read and write
There are 3815 hidden memdumps, click here to show them.