IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5949e2ad-d4bf-4154-8303-ee11df99a20c.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5949e2ad-d4bf-4154-8303-ee11df99a20c.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9e3fb81-0d0b-4a1e-b8d8-29e002a660ae} 7688 "\\.\pipe\gecko-crash-server-pipe.7688" 21cc8270710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1320 -parentBuildID 20230927232528 -prefsHandle 2692 -prefMapHandle 1060 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fde0a241-5872-4d7e-a943-4e71d11b0b1b} 7688 "\\.\pipe\gecko-crash-server-pipe.7688" 21cd504ae10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1556 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 1540 -prefMapHandle 5028 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83d56f2c-6efd-41a2-b64b-1bd529b5955a} 7688 "\\.\pipe\gecko-crash-server-pipe.7688" 21cdbe8e710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://contile.services.mozilla.com/SELECT
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://www.google.com/complete/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.174
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.174
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
13AF000
heap
page read and write
malicious
21CD99B1000
trusted library allocation
page read and write
21CDA2DF000
trusted library allocation
page read and write
21CD81C3000
trusted library allocation
page read and write
21CD9329000
trusted library allocation
page read and write
21CE04D4000
trusted library allocation
page read and write
21CD8DD9000
trusted library allocation
page read and write
21CD947B000
trusted library allocation
page read and write
1F605F2A000
heap
page read and write
21CDA9B2000
trusted library allocation
page read and write
21CD885D000
trusted library allocation
page read and write
1F605E7D000
heap
page read and write
21CDFFB1000
trusted library allocation
page read and write
21CD8D41000
trusted library allocation
page read and write
21CDFFB6000
trusted library allocation
page read and write
21CD8D69000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF01B000
heap
page read and write
21CD9751000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CCF023000
heap
page read and write
1FDB9B96000
trusted library allocation
page read and write
21CD868C000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF012000
heap
page read and write
21CD967B000
trusted library allocation
page read and write
21CD8A7C000
trusted library allocation
page read and write
1F605EE9000
heap
page read and write
21CCF049000
heap
page read and write
21CCF011000
heap
page read and write
21CCF049000
heap
page read and write
21CD960E000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF012000
heap
page read and write
21CCF023000
heap
page read and write
21CD90B2000
trusted library allocation
page read and write
21CD56C4000
trusted library allocation
page read and write
1FDB9D1C000
trusted library allocation
page read and write
21CD8887000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CCF012000
heap
page read and write
21CD8F3D000
trusted library allocation
page read and write
21CD518B000
trusted library allocation
page read and write
21CDB327000
trusted library allocation
page read and write
21CD8DC8000
trusted library allocation
page read and write
21CE0043000
trusted library allocation
page read and write
1FDB9E08000
heap
page read and write
21CCF011000
heap
page read and write
21CCEFFD000
heap
page read and write
21CE1F6B000
trusted library allocation
page read and write
21CE02EA000
trusted library allocation
page read and write
21CD8DF9000
trusted library allocation
page read and write
21CD80E8000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
1F605EF1000
heap
page read and write
21CE027F000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CE02AB000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCF016000
heap
page read and write
15E69360000
heap
page read and write
21CD90B8000
trusted library allocation
page read and write
21CE3B23000
trusted library allocation
page read and write
21CE1FE3000
trusted library allocation
page read and write
21CD8C36000
trusted library allocation
page read and write
21CD8FB1000
trusted library allocation
page read and write
21CD972F000
trusted library allocation
page read and write
21CD9826000
trusted library allocation
page read and write
21CDBEFD000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD521A000
trusted library allocation
page read and write
1F605E60000
heap
page read and write
21CDB6F9000
trusted library allocation
page read and write
21CDB351000
trusted library allocation
page read and write
21CE04AF000
trusted library allocation
page read and write
21CDFFA7000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF004000
heap
page read and write
21CDB3ED000
trusted library allocation
page read and write
21CDB6A9000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
1F605EF1000
heap
page read and write
21CCEFFF000
heap
page read and write
21CE36E4000
trusted library allocation
page read and write
21CDA089000
trusted library allocation
page read and write
21CCF021000
heap
page read and write
21CCF009000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD97D1000
trusted library allocation
page read and write
1FDB9B98000
trusted library allocation
page read and write
21CD8890000
trusted library allocation
page read and write
21CDBED5000
trusted library allocation
page read and write
21CDA489000
trusted library allocation
page read and write
21CD86B1000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF004000
heap
page read and write
21CD8D4A000
trusted library allocation
page read and write
21CD887A000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
E977DFE000
unkown
page readonly
21CE1BAC000
trusted library allocation
page read and write
21CE1BA3000
trusted library allocation
page read and write
21CD81B0000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
1F604DDC000
remote allocation
page execute read
21CCF017000
heap
page read and write
21CCF01B000
heap
page read and write
21CD8CC1000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD3F71000
trusted library allocation
page read and write
21CE252C000
trusted library allocation
page read and write
21CDAAB5000
trusted library allocation
page read and write
21CD97E3000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CE00F8000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD808D000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD3981000
trusted library allocation
page read and write
21CD96FA000
trusted library allocation
page read and write
21CD4FD7000
trusted library allocation
page read and write
21CD93E3000
trusted library allocation
page read and write
21CD9353000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF027000
heap
page read and write
21CDA28B000
trusted library allocation
page read and write
21CE3E6C000
trusted library allocation
page read and write
21CE3900000
trusted library allocation
page read and write
21CD8862000
trusted library allocation
page read and write
1F605F2A000
heap
page read and write
21CCF02F000
heap
page read and write
21CE449E000
trusted library allocation
page read and write
21CDA556000
trusted library allocation
page read and write
21CE06BE000
trusted library allocation
page read and write
21CE063F000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD8F46000
trusted library allocation
page read and write
21CCF024000
heap
page read and write
940000
heap
page read and write
21CE06B8000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF012000
heap
page read and write
21CCF034000
heap
page read and write
1F605EA1000
heap
page read and write
21CDAAC9000
trusted library allocation
page read and write
20364581000
trusted library allocation
page read and write
21CDFF8B000
trusted library allocation
page read and write
1FDB9C70000
heap
page read and write
21CE36EB000
trusted library allocation
page read and write
1FDB9B14000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
15E694D0000
heap
page read and write
21CCF012000
heap
page read and write
21CD4FFD000
trusted library allocation
page read and write
21CD595F000
heap
page read and write
21CDFF6F000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD8D48000
trusted library allocation
page read and write
21CD9759000
trusted library allocation
page read and write
21CD8C69000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD9727000
trusted library allocation
page read and write
E9773FE000
stack
page read and write
21CCF04A000
heap
page read and write
21CD9712000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD97D8000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9720000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CE02C8000
trusted library allocation
page read and write
15E69607000
trusted library allocation
page read and write
21CD937F000
trusted library allocation
page read and write
21CD94C2000
trusted library allocation
page read and write
21CD9DF6000
trusted library allocation
page read and write
21CD9488000
trusted library allocation
page read and write
21CDAAC1000
trusted library allocation
page read and write
21CE0192000
trusted library allocation
page read and write
21CD9968000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD818A000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CE1B01000
heap
page read and write
21CE032B000
trusted library allocation
page read and write
21CE00F1000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
21CDB3B5000
trusted library allocation
page read and write
21CE1F32000
trusted library allocation
page read and write
21CDA410000
trusted library allocation
page read and write
21CDB6BB000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CDB6F0000
trusted library allocation
page read and write
21CD9277000
trusted library allocation
page read and write
21CD9D96000
trusted library allocation
page read and write
21CD90D0000
trusted library allocation
page read and write
21CDB66B000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF027000
heap
page read and write
21CE3B3B000
trusted library allocation
page read and write
21CD52DD000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE0119000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF025000
heap
page read and write
21CD96F8000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CD8D75000
trusted library allocation
page read and write
21CD9DA8000
trusted library allocation
page read and write
109DBFF000
stack
page read and write
21CDB4CC000
trusted library allocation
page read and write
21CDA5CB000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF03A000
heap
page read and write
21CE3E81000
trusted library allocation
page read and write
21CD94FA000
trusted library allocation
page read and write
21CDA6FB000
trusted library allocation
page read and write
1FDB9B72000
trusted library allocation
page read and write
21CD9743000
trusted library allocation
page read and write
21CD3998000
trusted library allocation
page read and write
21CD971C000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD52EB000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD905D000
trusted library allocation
page read and write
21CE3F35000
trusted library allocation
page read and write
21CDFFE1000
trusted library allocation
page read and write
21CD974E000
trusted library allocation
page read and write
E977DBD000
stack
page read and write
1F605F77000
heap
page read and write
21CE03FE000
trusted library allocation
page read and write
21CD56CF000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CDFFD5000
trusted library allocation
page read and write
21CE1BA7000
trusted library allocation
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8F7C000
trusted library allocation
page read and write
21CE02D5000
trusted library allocation
page read and write
21CDB36D000
trusted library allocation
page read and write
21CD9451000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCEFFE000
heap
page read and write
21CCF00F000
heap
page read and write
21CD8FDD000
trusted library allocation
page read and write
21CD885D000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
1FDB9790000
unclassified section
page readonly
21CCF008000
heap
page read and write
21CD947B000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CE0675000
trusted library allocation
page read and write
21CD88D1000
trusted library allocation
page read and write
21CDB7ED000
trusted library allocation
page read and write
21CD8CF2000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
1F6056D0000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CE0251000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CDAA44000
trusted library allocation
page read and write
21CDFFA5000
trusted library allocation
page read and write
1F605186000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF027000
heap
page read and write
21CD8FA1000
trusted library allocation
page read and write
21CD8D88000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
21CCF06B000
heap
page read and write
21CE2E00000
trusted library allocation
page read and write
21CDA9C0000
trusted library allocation
page read and write
21CD907A000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
21CD813B000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
1F605E7F000
heap
page read and write
1FDB9B6E000
trusted library allocation
page read and write
21CE0036000
trusted library allocation
page read and write
21CD968F000
trusted library allocation
page read and write
21CE3F92000
trusted library allocation
page read and write
21CE3EC7000
trusted library allocation
page read and write
21CD8FF2000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD937F000
trusted library allocation
page read and write
21CE1C33000
trusted library allocation
page read and write
21CDFF91000
trusted library allocation
page read and write
21CD8AE2000
trusted library allocation
page read and write
21CCF014000
heap
page read and write
21CCF01C000
heap
page read and write
21CE1BE4000
trusted library allocation
page read and write
21CD9727000
trusted library allocation
page read and write
2676E020000
heap
page read and write
21CD52DD000
trusted library allocation
page read and write
1F605EFD000
heap
page read and write
21CCF01A000
heap
page read and write
21CCF075000
heap
page read and write
21CCF03A000
heap
page read and write
21CD8CBD000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF012000
heap
page read and write
21CE0655000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CD993B000
trusted library allocation
page read and write
1F60510A000
trusted library allocation
page read and write
21CE3F97000
trusted library allocation
page read and write
1F605F00000
heap
page read and write
E977C7E000
unkown
page readonly
21CE02D3000
trusted library allocation
page read and write
21CDFFC8000
trusted library allocation
page read and write
21CD9851000
trusted library allocation
page read and write
21CE03FE000
trusted library allocation
page read and write
1F605200000
trusted library section
page readonly
21CDA9DF000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF02C000
heap
page read and write
21CD8CD1000
trusted library allocation
page read and write
21CE47B7000
trusted library allocation
page read and write
21CDAA63000
trusted library allocation
page read and write
21CDBEE1000
trusted library allocation
page read and write
21CD4F18000
trusted library allocation
page read and write
21CD97CD000
trusted library allocation
page read and write
21CD90CD000
trusted library allocation
page read and write
21CD9743000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD947B000
trusted library allocation
page read and write
21CD9408000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF027000
heap
page read and write
21CCF017000
heap
page read and write
21CE04F0000
trusted library allocation
page read and write
8F38FBE000
unkown
page readonly
21CDBECC000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCF027000
heap
page read and write
21CCF033000
heap
page read and write
21CCF000000
heap
page read and write
21CE063F000
trusted library allocation
page read and write
21CE1830000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CE00B5000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD9663000
trusted library allocation
page read and write
1F605E5C000
heap
page read and write
21CD9692000
trusted library allocation
page read and write
21CD8F40000
trusted library allocation
page read and write
21CD9DA8000
trusted library allocation
page read and write
21CD86C3000
trusted library allocation
page read and write
2036455F000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CE02CA000
trusted library allocation
page read and write
21CD88DB000
trusted library allocation
page read and write
21CD816F000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD96E5000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF034000
heap
page read and write
21CCF011000
heap
page read and write
21CCF006000
heap
page read and write
21CE00E9000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
21CD5979000
heap
page read and write
21CCF012000
heap
page read and write
21CD8CA2000
trusted library allocation
page read and write
21CD9830000
trusted library allocation
page read and write
21CD9DA8000
trusted library allocation
page read and write
21CD9DFE000
trusted library allocation
page read and write
21CD9693000
trusted library allocation
page read and write
21CD8817000
trusted library allocation
page read and write
21CDB340000
trusted library allocation
page read and write
21CDFF00000
trusted library allocation
page read and write
21CE3BE0000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CD8D8F000
trusted library allocation
page read and write
109B3FF000
stack
page read and write
21CE0653000
trusted library allocation
page read and write
21CDB327000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CE0649000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD975D000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
203645F8000
trusted library allocation
page read and write
21CDAAE9000
trusted library allocation
page read and write
21CDAA85000
trusted library allocation
page read and write
21CE0165000
trusted library allocation
page read and write
21CD9DB4000
trusted library allocation
page read and write
21CD5930000
heap
page read and write
21CD9DEC000
trusted library allocation
page read and write
21CD7F8A000
trusted library allocation
page read and write
21CD8D32000
trusted library allocation
page read and write
21CD4FFD000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
21CE06AE000
trusted library allocation
page read and write
21CD8CA6000
trusted library allocation
page read and write
21CCF035000
heap
page read and write
21CD88C1000
trusted library allocation
page read and write
21CE0679000
trusted library allocation
page read and write
21CE1F55000
trusted library allocation
page read and write
21CD90D0000
trusted library allocation
page read and write
21CD8D42000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CE3BC6000
trusted library allocation
page read and write
21CD973A000
trusted library allocation
page read and write
21CE06BE000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CD96C2000
trusted library allocation
page read and write
21CE1F81000
trusted library allocation
page read and write
21CD9D75000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CD592D000
heap
page read and write
21CD96FC000
trusted library allocation
page read and write
21CE3E52000
trusted library allocation
page read and write
21CD90BD000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CD52B1000
trusted library allocation
page read and write
21CDA6FD000
trusted library allocation
page read and write
21CD4F3F000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD7F6B000
trusted library allocation
page read and write
21CE01BF000
trusted library allocation
page read and write
21CDA6FB000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD9F72000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
21CD8FD2000
trusted library allocation
page read and write
21CD9DA6000
trusted library allocation
page read and write
3BC1000
heap
page read and write
21CD92A6000
trusted library allocation
page read and write
21CD8D62000
trusted library allocation
page read and write
8F3CB3E000
stack
page read and write
21CE0657000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CE1C06000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CCF027000
heap
page read and write
21CDB3FC000
trusted library allocation
page read and write
21CD8199000
trusted library allocation
page read and write
21CDA6EE000
trusted library allocation
page read and write
21CD51C3000
trusted library allocation
page read and write
21CE00E9000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8C98000
trusted library allocation
page read and write
21CD8688000
trusted library allocation
page read and write
21CD96D3000
trusted library allocation
page read and write
21CDA94A000
trusted library allocation
page read and write
1F605EE0000
heap
page read and write
21CD9832000
trusted library allocation
page read and write
21CD808F000
trusted library allocation
page read and write
21CE06AC000
trusted library allocation
page read and write
21CCF020000
heap
page read and write
21CD975E000
trusted library allocation
page read and write
21CE3FD1000
trusted library allocation
page read and write
21CD9D75000
trusted library allocation
page read and write
21CDB9EA000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CE1F4B000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD886F000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE0192000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF007000
heap
page read and write
1FDB9930000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF02F000
heap
page read and write
21CCF027000
heap
page read and write
21CE1C01000
trusted library allocation
page read and write
15E69380000
heap
page read and write
21CD9666000
trusted library allocation
page read and write
21CD888B000
trusted library allocation
page read and write
21CD97C9000
trusted library allocation
page read and write
21CD39EF000
trusted library allocation
page read and write
21CD8FEA000
trusted library allocation
page read and write
21CCF009000
heap
page read and write
21CCF004000
heap
page read and write
21CCF024000
heap
page read and write
1F605000000
trusted library allocation
page read and write
21CDFFB4000
trusted library allocation
page read and write
21CE1F77000
trusted library allocation
page read and write
21CD8180000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD803D000
trusted library allocation
page read and write
21CD970F000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
21CD8CA2000
trusted library allocation
page read and write
21CD886F000
trusted library allocation
page read and write
21CE1F81000
trusted library allocation
page read and write
20364696000
heap
page read and write
21CD9746000
trusted library allocation
page read and write
21CD8CF8000
trusted library allocation
page read and write
21CE3E81000
trusted library allocation
page read and write
21CDB6A7000
trusted library allocation
page read and write
21CD94FA000
trusted library allocation
page read and write
21CDFFB6000
trusted library allocation
page read and write
21CCF003000
heap
page read and write
21CDA780000
trusted library allocation
page read and write
1F605F79000
heap
page read and write
21CCF027000
heap
page read and write
21CCF017000
heap
page read and write
21CE029E000
trusted library allocation
page read and write
21CDB6F9000
trusted library allocation
page read and write
21CD5929000
heap
page read and write
203645EE000
trusted library allocation
page read and write
21CE0092000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF049000
heap
page read and write
21CD9260000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CE02D0000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CDB3B8000
trusted library allocation
page read and write
21CD8FE2000
trusted library allocation
page read and write
21CE3FFA000
trusted library allocation
page read and write
21CD96F8000
trusted library allocation
page read and write
21CCF020000
heap
page read and write
21CE0106000
trusted library allocation
page read and write
1F605E7D000
heap
page read and write
21CCF016000
heap
page read and write
21CDB6F0000
trusted library allocation
page read and write
21CD8CC1000
trusted library allocation
page read and write
21CD8849000
trusted library allocation
page read and write
21CE03F5000
trusted library allocation
page read and write
21CDFFAA000
trusted library allocation
page read and write
21CD9233000
trusted library allocation
page read and write
21CD3FFE000
trusted library allocation
page read and write
21CDB7D2000
trusted library allocation
page read and write
21CE470F000
trusted library allocation
page read and write
21CDFFB4000
trusted library allocation
page read and write
1FDB9810000
unclassified section
page readonly
21CD9651000
trusted library allocation
page read and write
3870000
heap
page read and write
F8F737E000
stack
page read and write
21CD9DA3000
trusted library allocation
page read and write
20364574000
trusted library allocation
page read and write
1294000
heap
page read and write
21CDFF8B000
trusted library allocation
page read and write
1F6056C4000
unkown
page execute read
21CCF06B000
heap
page read and write
21CD56C8000
trusted library allocation
page read and write
21CD86EF000
trusted library allocation
page read and write
21CE06B0000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CE1FAD000
trusted library allocation
page read and write
21CDA959000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
203645B6000
trusted library allocation
page read and write
21CD8D75000
trusted library allocation
page read and write
21CD4F18000
trusted library allocation
page read and write
13B6000
heap
page read and write
21CD8CF8000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
21CD8163000
trusted library allocation
page read and write
21CE03B6000
trusted library allocation
page read and write
21CD96E7000
trusted library allocation
page read and write
21CCF042000
heap
page read and write
21CE00F8000
trusted library allocation
page read and write
15E6AF16000
heap
page read and write
21CD94A4000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CE010A000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF00A000
heap
page read and write
21CE04FE000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9D47000
trusted library allocation
page read and write
21CDFFA1000
trusted library allocation
page read and write
21CDC623000
trusted library allocation
page read and write
21CD8CD8000
trusted library allocation
page read and write
21CD9274000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD94CA000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD80D3000
trusted library allocation
page read and write
21CD90DC000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDA267000
trusted library allocation
page read and write
21CD8C5B000
trusted library allocation
page read and write
21CD8873000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CE1B53000
heap
page read and write
21CCF017000
heap
page read and write
21CD90F6000
trusted library allocation
page read and write
21CD8D88000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD96E3000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD7F65000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF039000
heap
page read and write
21CD8873000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD93CD000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF02E000
heap
page read and write
21CD590B000
heap
page read and write
21CDB909000
trusted library allocation
page read and write
21CE1FF5000
trusted library allocation
page read and write
21CD8DE1000
trusted library allocation
page read and write
21CD8CE9000
trusted library allocation
page read and write
21CE0687000
trusted library allocation
page read and write
21CE00F8000
trusted library allocation
page read and write
2676E0FA000
heap
page read and write
1FDB9C74000
heap
page read and write
21CCF047000
heap
page read and write
112F000
stack
page read and write
21CE0669000
trusted library allocation
page read and write
21CD8CE9000
trusted library allocation
page read and write
21CDB9E0000
trusted library allocation
page read and write
21CD7F77000
trusted library allocation
page read and write
1FDB9933000
heap
page read and write
21CCF003000
heap
page read and write
21CCF012000
heap
page read and write
21CD7F8E000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CE3B90000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CCF01B000
heap
page read and write
21CDFFB1000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD8C61000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF004000
heap
page read and write
21CD8C9E000
trusted library allocation
page read and write
21CD88FC000
trusted library allocation
page read and write
21CE3B92000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
13B7000
heap
page read and write
21CCF027000
heap
page read and write
21CE0653000
trusted library allocation
page read and write
21CD93E1000
trusted library allocation
page read and write
21CDB369000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF01C000
heap
page read and write
17697688000
trusted library allocation
page execute read
21CD967D000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CD97C4000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF035000
heap
page read and write
21CE3BE0000
trusted library allocation
page read and write
21CD974A000
trusted library allocation
page read and write
13BD000
heap
page read and write
21CD9346000
trusted library allocation
page read and write
21CD8887000
trusted library allocation
page read and write
20364360000
unclassified section
page readonly
21CD96E6000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CE1AC8000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF03C000
heap
page read and write
21CD97E3000
trusted library allocation
page read and write
21CE000F000
trusted library allocation
page read and write
21CDB3D8000
trusted library allocation
page read and write
21CE18D6000
trusted library allocation
page read and write
21CD8C76000
trusted library allocation
page read and write
21CD80D0000
trusted library allocation
page read and write
21CE0650000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF001000
heap
page read and write
21CD9743000
trusted library allocation
page read and write
21CDA54C000
trusted library allocation
page read and write
21CD97E0000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDAAA3000
trusted library allocation
page read and write
21CD975B000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF038000
heap
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF039000
heap
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CD8CD1000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CE1F9E000
trusted library allocation
page read and write
21CD90A3000
trusted library allocation
page read and write
13CE000
heap
page read and write
21CCF01E000
heap
page read and write
21CD522F000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF02C000
heap
page read and write
21CD8FC7000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD8F94000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCEFFE000
heap
page read and write
20364513000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
8F3B27E000
stack
page read and write
21CCF004000
heap
page read and write
21CCF025000
heap
page read and write
21CDB398000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD5989000
heap
page read and write
21CE003E000
trusted library allocation
page read and write
21CD80DD000
trusted library allocation
page read and write
21CE0040000
trusted library allocation
page read and write
21CE3FBF000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CCF034000
heap
page read and write
21CE0438000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CE00CD000
trusted library allocation
page read and write
21CD9253000
trusted library allocation
page read and write
21CDA5CF000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
20364690000
heap
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD9851000
trusted library allocation
page read and write
21CE02C6000
trusted library allocation
page read and write
21CD8F7C000
trusted library allocation
page read and write
21CE06C6000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
1F605E9C000
heap
page read and write
21CE0469000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDA980000
trusted library allocation
page read and write
21CD90B8000
trusted library allocation
page read and write
21CDB3B8000
trusted library allocation
page read and write
21CE03E0000
trusted library allocation
page read and write
21CE01A2000
trusted library allocation
page read and write
21CCF031000
heap
page read and write
21CD880D000
trusted library allocation
page read and write
21CDB42D000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE0700000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD9491000
trusted library allocation
page read and write
15E69389000
heap
page read and write
C4F67FF000
stack
page read and write
2676E307000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD9D3D000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCEFFD000
heap
page read and write
21CD94AA000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CCF004000
heap
page read and write
21CE3F41000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF004000
heap
page read and write
21CD8FF5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD5322000
trusted library allocation
page read and write
21CE00B7000
trusted library allocation
page read and write
21CD9752000
trusted library allocation
page read and write
21CDB3C7000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD8159000
trusted library allocation
page read and write
21CDB337000
trusted library allocation
page read and write
21CDB44D000
trusted library allocation
page read and write
21CD9491000
trusted library allocation
page read and write
21CD90A3000
trusted library allocation
page read and write
15E6960A000
trusted library allocation
page read and write
21CD9617000
trusted library allocation
page read and write
21CD4FA7000
trusted library allocation
page read and write
21CE1B02000
heap
page read and write
21CD809D000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CD8FA1000
trusted library allocation
page read and write
21CD39CB000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE04FC000
trusted library allocation
page read and write
21CDFFB6000
trusted library allocation
page read and write
1F605123000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CE3BD3000
trusted library allocation
page read and write
21CDFFA5000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE1F2D000
trusted library allocation
page read and write
21CD80CD000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD949E000
trusted library allocation
page read and write
21CD9D3D000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF049000
heap
page read and write
21CE04D2000
trusted library allocation
page read and write
21CE03F4000
trusted library allocation
page read and write
21CE026D000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
1F605E60000
heap
page read and write
1FDB9C00000
heap
page read and write
21CCF049000
heap
page read and write
21CDBED5000
trusted library allocation
page read and write
1F605E4D000
heap
page read and write
21CE06B4000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD937A000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CDB6CF000
trusted library allocation
page read and write
21CD8CD6000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CE03BE000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD8DD9000
trusted library allocation
page read and write
15E6935A000
heap
page read and write
21CE03DA000
trusted library allocation
page read and write
21CD8F43000
trusted library allocation
page read and write
C4F6FFE000
stack
page read and write
21CDA9B6000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
21CE00B9000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CCF017000
heap
page read and write
21CE04FE000
trusted library allocation
page read and write
E977D7E000
unkown
page readonly
21CCF03D000
heap
page read and write
21CCEFF5000
heap
page read and write
21CE47A3000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
1F605F2D000
heap
page read and write
21CCF06B000
heap
page read and write
21CDA9A8000
trusted library allocation
page read and write
F8F6A7E000
unkown
page readonly
21CCF001000
heap
page read and write
21CCEFFF000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
F8F7C7E000
unkown
page readonly
21CDB983000
trusted library allocation
page read and write
21CDA6BF000
trusted library allocation
page read and write
21CD7BB0000
trusted library allocation
page read and write
21CCF047000
heap
page read and write
21CDB322000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD9DAA000
trusted library allocation
page read and write
1FDB9BA7000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF045000
heap
page read and write
1F605181000
trusted library allocation
page read and write
21CD9039000
trusted library allocation
page read and write
21CCF010000
heap
page read and write
21CD97FE000
trusted library allocation
page read and write
21CD9DA5000
trusted library allocation
page read and write
21CD9683000
trusted library allocation
page read and write
2036490C000
trusted library allocation
page read and write
E9785FE000
stack
page read and write
21CE04F0000
trusted library allocation
page read and write
21CE06AC000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
1F605E6C000
heap
page read and write
21CCF011000
heap
page read and write
21CD8F7F000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
17697741000
trusted library allocation
page execute read
21CD9830000
trusted library allocation
page read and write
109C3FE000
stack
page read and write
21CDA9AD000
trusted library allocation
page read and write
21CE3E87000
trusted library allocation
page read and write
21CD3FF6000
trusted library allocation
page read and write
1F605100000
trusted library allocation
page read and write
21CE02A9000
trusted library allocation
page read and write
21CDB6A7000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF004000
heap
page read and write
21CDA0D7000
trusted library allocation
page read and write
21CD909B000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD90DC000
trusted library allocation
page read and write
1F605EE8000
heap
page read and write
21CCF023000
heap
page read and write
21CD9707000
trusted library allocation
page read and write
21CD4100000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
1F6056B0000
trusted library allocation
page read and write
21CD8092000
trusted library allocation
page read and write
21CD39DF000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
1F605E8A000
heap
page read and write
21CD8837000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CDAAC9000
trusted library allocation
page read and write
21CD92FD000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CD51BB000
trusted library allocation
page read and write
21CE00EE000
trusted library allocation
page read and write
21CD8FD2000
trusted library allocation
page read and write
1FDB997A000
heap
page read and write
21CE01FA000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
20364800000
trusted library allocation
page read and write
21CE02D0000
trusted library allocation
page read and write
21CE01BC000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
21CD964A000
trusted library allocation
page read and write
C40000
heap
page read and write
21CE4734000
trusted library allocation
page read and write
21CDA9A8000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CE0106000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD8FE2000
trusted library allocation
page read and write
21CDB398000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF017000
heap
page read and write
21CD9DFE000
trusted library allocation
page read and write
21CD9D8D000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD96D3000
trusted library allocation
page read and write
21CDB7DA000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD94DF000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9631000
trusted library allocation
page read and write
21CE1F38000
trusted library allocation
page read and write
21CD974E000
trusted library allocation
page read and write
21CD5682000
trusted library allocation
page read and write
1F605780000
heap
page read and write
21CCF01B000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD90E4000
trusted library allocation
page read and write
21CE4736000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD9842000
trusted library allocation
page read and write
21CDA5D5000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
1F605E5F000
heap
page read and write
21CD9385000
trusted library allocation
page read and write
21CDB6EE000
trusted library allocation
page read and write
21CE00FE000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
8F3A9FE000
stack
page read and write
21CCF040000
heap
page read and write
21CCF01C000
heap
page read and write
21CCF02C000
heap
page read and write
21CCF03C000
heap
page read and write
21CD88E9000
trusted library allocation
page read and write
21CD9826000
trusted library allocation
page read and write
20364524000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CE0115000
trusted library allocation
page read and write
21CD88CD000
trusted library allocation
page read and write
21CDA1B4000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CE03DD000
trusted library allocation
page read and write
21CD9493000
trusted library allocation
page read and write
21CD5687000
trusted library allocation
page read and write
21CE36E2000
trusted library allocation
page read and write
21CD40D2000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF011000
heap
page read and write
1F604FC2000
unclassified section
page read and write
21CCF00F000
heap
page read and write
21CD5240000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CCF02F000
heap
page read and write
F8F7BFE000
unkown
page readonly
21CE02F5000
trusted library allocation
page read and write
21CD86FA000
trusted library allocation
page read and write
21CDFF9E000
trusted library allocation
page read and write
21CD401E000
trusted library allocation
page read and write
F8F51D8000
stack
page read and write
21CD88E3000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
21CE3EC3000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD809D000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8133000
trusted library allocation
page read and write
21CD5182000
trusted library allocation
page read and write
21CE0647000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF016000
heap
page read and write
1F604E40000
heap
page read and write
21CD947D000
trusted library allocation
page read and write
21CD885F000
trusted library allocation
page read and write
21CE03F7000
trusted library allocation
page read and write
21CE473C000
trusted library allocation
page read and write
21CDFFC8000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CE0657000
trusted library allocation
page read and write
21CE03F7000
trusted library allocation
page read and write
21CD97E3000
trusted library allocation
page read and write
21CDAAEB000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CE1FB5000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF000000
heap
page read and write
21CD8FFC000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD887D000
trusted library allocation
page read and write
21CD81D0000
trusted library allocation
page read and write
21CD949A000
trusted library allocation
page read and write
21CDBEE1000
trusted library allocation
page read and write
1FDB9B5B000
trusted library allocation
page read and write
21CD96FA000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
13CE000
heap
page read and write
21CD86FC000
trusted library allocation
page read and write
15E6AF10000
heap
page read and write
21CD4F81000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCEFFF000
heap
page read and write
21CCF004000
heap
page read and write
21CD9055000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CDB7DF000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF005000
heap
page read and write
15E69371000
heap
page read and write
21CD96F4000
trusted library allocation
page read and write
21CD9488000
trusted library allocation
page read and write
21CD8887000
trusted library allocation
page read and write
21CE04C8000
trusted library allocation
page read and write
21CDA25D000
trusted library allocation
page read and write
21CDAAFD000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CE3FDC000
trusted library allocation
page read and write
13D7000
heap
page read and write
1F605F58000
heap
page read and write
21CD5336000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF06B000
heap
page read and write
21CD807F000
trusted library allocation
page read and write
2036433F000
unclassified section
page read and write
21CE01A2000
trusted library allocation
page read and write
21CD4FE6000
trusted library allocation
page read and write
21CE3000000
trusted library allocation
page read and write
13CE000
heap
page read and write
21CE3FA8000
trusted library allocation
page read and write
1FDB9BE7000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD92D1000
trusted library allocation
page read and write
1F605EF1000
heap
page read and write
21CCF007000
heap
page read and write
21CD5997000
heap
page read and write
15E692D0000
heap
page read and write
21CE03F7000
trusted library allocation
page read and write
21CCF009000
heap
page read and write
21CE3627000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD90DC000
trusted library allocation
page read and write
21CDA3F2000
trusted library allocation
page read and write
21CD9707000
trusted library allocation
page read and write
21CD8FB1000
trusted library allocation
page read and write
1F605E5C000
heap
page read and write
21CD886F000
trusted library allocation
page read and write
21CD81C3000
trusted library allocation
page read and write
21CCF006000
heap
page read and write
21CCEFFD000
heap
page read and write
21CDA29E000
trusted library allocation
page read and write
21CD972F000
trusted library allocation
page read and write
21CD5930000
heap
page read and write
21CCF06B000
heap
page read and write
21CCF006000
heap
page read and write
21CD81EA000
trusted library allocation
page read and write
21CE0266000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD7FCE000
trusted library allocation
page read and write
111F000
stack
page read and write
21CE028A000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF004000
heap
page read and write
21CE027D000
trusted library allocation
page read and write
21CDA9C0000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF03C000
heap
page read and write
21CD80CD000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF004000
heap
page read and write
21CE04D6000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD86CF000
trusted library allocation
page read and write
21CD8D4A000
trusted library allocation
page read and write
21CE362D000
trusted library allocation
page read and write
21CD81D8000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8F9B000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CD80A3000
trusted library allocation
page read and write
21CE360F000
trusted library allocation
page read and write
2676E0E0000
heap
page read and write
1FDB9B00000
trusted library allocation
page read and write
21CD51E3000
trusted library allocation
page read and write
21CD96FA000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF001000
heap
page read and write
21CD88C9000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
21CDA0A9000
trusted library allocation
page read and write
21CDBEB9000
trusted library allocation
page read and write
21CDBE8D000
trusted library allocation
page read and write
21CE3BEC000
trusted library allocation
page read and write
21CE0464000
trusted library allocation
page read and write
21CD90E3000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF023000
heap
page read and write
21CD9339000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CE442F000
trusted library allocation
page read and write
21CD96A9000
trusted library allocation
page read and write
21CE03B6000
trusted library allocation
page read and write
21CCF01F000
heap
page read and write
21CD9278000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD86EC000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD90F7000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD970B000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CD884A000
trusted library allocation
page read and write
21CDFFB6000
trusted library allocation
page read and write
21CE36E4000
trusted library allocation
page read and write
21CE1B35000
heap
page read and write
21CCF020000
heap
page read and write
21CE1FB5000
trusted library allocation
page read and write
C50000
heap
page read and write
21CD92D2000
trusted library allocation
page read and write
21CD86CF000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD90F6000
trusted library allocation
page read and write
21CE06B4000
trusted library allocation
page read and write
21CD970C000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF01E000
heap
page read and write
21CDFFE7000
trusted library allocation
page read and write
21CDB358000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
21CD93B9000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD8C9E000
trusted library allocation
page read and write
1F605E60000
heap
page read and write
21CDAAA3000
trusted library allocation
page read and write
21CDA2E7000
trusted library allocation
page read and write
1F605EE8000
heap
page read and write
21CD80D7000
trusted library allocation
page read and write
21CCF00E000
heap
page read and write
21CD908D000
trusted library allocation
page read and write
21CD9759000
trusted library allocation
page read and write
21CD975B000
trusted library allocation
page read and write
21CD4F43000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CE04C5000
trusted library allocation
page read and write
21CD9014000
trusted library allocation
page read and write
21CD7F5A000
trusted library allocation
page read and write
21CDA6C1000
trusted library allocation
page read and write
21CD9D4C000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD817E000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CDA962000
trusted library allocation
page read and write
8F3BB3E000
stack
page read and write
21CCF004000
heap
page read and write
21CD565E000
trusted library allocation
page read and write
21CD902A000
trusted library allocation
page read and write
1F6051B3000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9752000
trusted library allocation
page read and write
21CD5977000
heap
page read and write
21CCF027000
heap
page read and write
21CD97FE000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
13BA000
heap
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CE1B41000
trusted library allocation
page read and write
21CDFFB1000
trusted library allocation
page read and write
21CE1F82000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CE0276000
trusted library allocation
page read and write
21CDB674000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CD4FA7000
trusted library allocation
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD564E000
trusted library allocation
page read and write
1F60516A000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CE0178000
trusted library allocation
page read and write
21CCEFF5000
heap
page read and write
21CCF00F000
heap
page read and write
21CE3FEE000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CE00F6000
trusted library allocation
page read and write
21CDA9AD000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD9710000
trusted library allocation
page read and write
21CE018E000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD9689000
trusted library allocation
page read and write
21CDA4DA000
trusted library allocation
page read and write
21CD8CF5000
trusted library allocation
page read and write
21CD3F2F000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCF049000
heap
page read and write
21CE1F6E000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CE03FB000
trusted library allocation
page read and write
21CE3BE0000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF049000
heap
page read and write
21CD52FE000
trusted library allocation
page read and write
21CD9286000
trusted library allocation
page read and write
1FDB9B03000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF01E000
heap
page read and write
21CDB4AF000
trusted library allocation
page read and write
21CD7BFE000
trusted library allocation
page read and write
1FDB9780000
unclassified section
page readonly
21CCF023000
heap
page read and write
1F605E64000
heap
page read and write
21CCF011000
heap
page read and write
21CE02EA000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF009000
heap
page read and write
21CDA9B2000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CCF041000
heap
page read and write
21CCEFFE000
heap
page read and write
21CE18D8000
trusted library allocation
page read and write
21CE1B07000
trusted library allocation
page read and write
21CD88A3000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CDFFAD000
trusted library allocation
page read and write
1FDB9B0D000
trusted library allocation
page read and write
21CDA98F000
trusted library allocation
page read and write
21CDA9E3000
trusted library allocation
page read and write
21CD9098000
trusted library allocation
page read and write
21CDB6F9000
trusted library allocation
page read and write
21CD8C9A000
trusted library allocation
page read and write
21CD7F73000
trusted library allocation
page read and write
64BD9680000
trusted library allocation
page read and write
21CDB332000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CD7F6A000
trusted library allocation
page read and write
21CDA558000
trusted library allocation
page read and write
21CD9DA8000
trusted library allocation
page read and write
8F38F7B000
stack
page read and write
21CDA1BB000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CCF006000
heap
page read and write
21CCF027000
heap
page read and write
21CE03F7000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CD3F23000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD56F4000
trusted library allocation
page read and write
21CD9640000
trusted library allocation
page read and write
21CD80CE000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CDBA02000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CD9DF6000
trusted library allocation
page read and write
1FDB99F0000
unclassified section
page read and write
21CCF027000
heap
page read and write
21CE03C9000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD8875000
trusted library allocation
page read and write
21CD86F7000
trusted library allocation
page read and write
21CDA493000
trusted library allocation
page read and write
21CD80AD000
trusted library allocation
page read and write
21CD88A3000
trusted library allocation
page read and write
21CE04E8000
trusted library allocation
page read and write
21CE3700000
trusted library allocation
page read and write
F8F847E000
stack
page read and write
E978DFE000
unkown
page readonly
21CD8C45000
trusted library allocation
page read and write
21CD8188000
trusted library allocation
page read and write
21CE04EC000
trusted library allocation
page read and write
21CE03FE000
trusted library allocation
page read and write
21CDB6EE000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF021000
heap
page read and write
21CCF017000
heap
page read and write
21CCF01B000
heap
page read and write
1FDB9B2E000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CD9749000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD961A000
trusted library allocation
page read and write
21CD8CD7000
trusted library allocation
page read and write
21CD9D94000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD7BD2000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CE02D3000
trusted library allocation
page read and write
21CD9007000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD96E6000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
20364511000
trusted library allocation
page read and write
D32000
unkown
page readonly
21CE00E7000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF01B000
heap
page read and write
21CE02F3000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CDA5D7000
trusted library allocation
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CD5244000
trusted library allocation
page read and write
21CD906D000
trusted library allocation
page read and write
21CD519D000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
21CCF011000
heap
page read and write
21CE00C8000
trusted library allocation
page read and write
21CD88E3000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF003000
heap
page read and write
21CD407D000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF012000
heap
page read and write
21CCF023000
heap
page read and write
21CD861B000
trusted library allocation
page read and write
21CD9DE3000
trusted library allocation
page read and write
21CD7D00000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CE36CB000
trusted library allocation
page read and write
21CD8FB1000
trusted library allocation
page read and write
1F60515C000
trusted library allocation
page read and write
21CE4773000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE3615000
trusted library allocation
page read and write
21CD94FA000
trusted library allocation
page read and write
1F605F77000
heap
page read and write
21CDAAF0000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD9D45000
trusted library allocation
page read and write
21CE0165000
trusted library allocation
page read and write
21CD9DF6000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
21CDAAC1000
trusted library allocation
page read and write
21CE0679000
trusted library allocation
page read and write
21CCF03C000
heap
page read and write
21CDFFA5000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8D80000
trusted library allocation
page read and write
21CDA980000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD9D67000
trusted library allocation
page read and write
21CE06AE000
trusted library allocation
page read and write
21CD592A000
heap
page read and write
21CD7BF7000
trusted library allocation
page read and write
21CDAAF0000
trusted library allocation
page read and write
21CD8CBD000
trusted library allocation
page read and write
8F38FFD000
stack
page read and write
21CD8FC7000
trusted library allocation
page read and write
21CCF039000
heap
page read and write
21CD97C4000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CDBEDD000
trusted library allocation
page read and write
21CE04C5000
trusted library allocation
page read and write
21CD9826000
trusted library allocation
page read and write
21CDAA65000
trusted library allocation
page read and write
21CD96E0000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CE1F74000
trusted library allocation
page read and write
21CD566B000
trusted library allocation
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD96FC000
trusted library allocation
page read and write
21CD90B8000
trusted library allocation
page read and write
1F605F58000
heap
page read and write
21CCF01B000
heap
page read and write
21CE0187000
trusted library allocation
page read and write
21CE3BD6000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CDB9AB000
trusted library allocation
page read and write
21CDA6F9000
trusted library allocation
page read and write
C70000
unkown
page readonly
21CCF017000
heap
page read and write
21CE44CE000
trusted library allocation
page read and write
21CD869F000
trusted library allocation
page read and write
21CE02F9000
trusted library allocation
page read and write
21CD9D8F000
trusted library allocation
page read and write
21CD8FE0000
trusted library allocation
page read and write
21CDAA85000
trusted library allocation
page read and write
21CCF043000
heap
page read and write
21CCEFFD000
heap
page read and write
21CD90BD000
trusted library allocation
page read and write
21CE18F5000
trusted library allocation
page read and write
21CD9D9B000
trusted library allocation
page read and write
21CCF036000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD975B000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CCF023000
heap
page read and write
21CD9763000
trusted library allocation
page read and write
21CD9350000
trusted library allocation
page read and write
21CD7BA2000
trusted library allocation
page read and write
21CD8D0F000
trusted library allocation
page read and write
21CDAA4D000
trusted library allocation
page read and write
21CE03E6000
trusted library allocation
page read and write
21CD9749000
trusted library allocation
page read and write
21CD9DF6000
trusted library allocation
page read and write
D0C000
unkown
page readonly
21CCF01B000
heap
page read and write
21CD975D000
trusted library allocation
page read and write
21CDA28E000
trusted library allocation
page read and write
21CD96E2000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CE03F5000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CD7F8E000
trusted library allocation
page read and write
21CCF018000
heap
page read and write
21CD9D35000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCF001000
heap
page read and write
21CD8CF3000
trusted library allocation
page read and write
21CD526B000
trusted library allocation
page read and write
21CD39C1000
trusted library allocation
page read and write
21CD4F43000
trusted library allocation
page read and write
21CD970F000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CE0192000
trusted library allocation
page read and write
E977CBD000
stack
page read and write
1F605EFD000
heap
page read and write
21CE00F8000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
8D9000
stack
page read and write
21CE047F000
trusted library allocation
page read and write
21CDFF8F000
trusted library allocation
page read and write
21CD9451000
trusted library allocation
page read and write
21CD938D000
trusted library allocation
page read and write
21CE01C1000
trusted library allocation
page read and write
21CD8F50000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CDA6E1000
trusted library allocation
page read and write
1FDB9A00000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
1FDB99FF000
unclassified section
page read and write
21CD96F5000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF02F000
heap
page read and write
21CD9711000
trusted library allocation
page read and write
21CD7F55000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
21CE3B2D000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD803B000
trusted library allocation
page read and write
21CDB465000
trusted library allocation
page read and write
21CDA54F000
trusted library allocation
page read and write
21CE06FA000
trusted library allocation
page read and write
21CE03E4000
trusted library allocation
page read and write
21CE3661000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD97D1000
trusted library allocation
page read and write
21CE016B000
trusted library allocation
page read and write
21CE0416000
trusted library allocation
page read and write
21CDA5D3000
trusted library allocation
page read and write
21CD92FD000
trusted library allocation
page read and write
21CE36D1000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF00F000
heap
page read and write
21CCF004000
heap
page read and write
21CE36E2000
trusted library allocation
page read and write
21CD9749000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CCF06B000
heap
page read and write
21CCF00A000
heap
page read and write
21CD88DB000
trusted library allocation
page read and write
21CD5979000
heap
page read and write
21CDFFD5000
trusted library allocation
page read and write
1F605EF2000
heap
page read and write
21CD8D73000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CDAAC7000
trusted library allocation
page read and write
21CE029C000
trusted library allocation
page read and write
21CD39AB000
trusted library allocation
page read and write
21CD9826000
trusted library allocation
page read and write
21CD8F9F000
trusted library allocation
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE010A000
trusted library allocation
page read and write
21CD889F000
trusted library allocation
page read and write
21CE0320000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF08D000
heap
page read and write
21CCF034000
heap
page read and write
21CE04EC000
trusted library allocation
page read and write
21CD96D6000
trusted library allocation
page read and write
21CD973A000
trusted library allocation
page read and write
21CD9DB4000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8D1D000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CCF049000
heap
page read and write
21CD90B2000
trusted library allocation
page read and write
21CE01C1000
trusted library allocation
page read and write
21CD529E000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
20364900000
trusted library allocation
page read and write
21CD868E000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CCF012000
heap
page read and write
21CD9673000
trusted library allocation
page read and write
21CE3FE2000
trusted library allocation
page read and write
E9763D8000
stack
page read and write
21CE00B2000
trusted library allocation
page read and write
21CD9718000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
C4F77FE000
stack
page read and write
21CE06C6000
trusted library allocation
page read and write
21CD9F4E000
trusted library allocation
page read and write
1F605E8D000
heap
page read and write
21CD9707000
trusted library allocation
page read and write
21CD8DB6000
trusted library allocation
page read and write
21CE0491000
trusted library allocation
page read and write
21CDFF8F000
trusted library allocation
page read and write
21CCF031000
heap
page read and write
21CCF02E000
heap
page read and write
21CD923C000
trusted library allocation
page read and write
21CD9005000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CD962C000
trusted library allocation
page read and write
21CD7BFE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
8F3C33E000
unkown
page readonly
21CDB441000
trusted library allocation
page read and write
21CD9DF1000
trusted library allocation
page read and write
2676E300000
trusted library allocation
page read and write
21CDBECC000
trusted library allocation
page read and write
21CD92D7000
trusted library allocation
page read and write
21CDB99D000
trusted library allocation
page read and write
21CD8FF8000
trusted library allocation
page read and write
21CD88E3000
trusted library allocation
page read and write
21CD8873000
trusted library allocation
page read and write
1F604FD0000
trusted library allocation
page read and write
1F604D60000
unclassified section
page readonly
21CCF023000
heap
page read and write
21CCF033000
heap
page read and write
21CD599E000
heap
page read and write
21CE0181000
trusted library allocation
page read and write
203640D0000
unclassified section
page readonly
21CD97D8000
trusted library allocation
page read and write
21CD511E000
trusted library allocation
page read and write
21CD947B000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD9673000
trusted library allocation
page read and write
115E000
stack
page read and write
21CDA0B2000
trusted library allocation
page read and write
21CD517F000
trusted library allocation
page read and write
21CDAA63000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD869B000
trusted library allocation
page read and write
21CDBEDD000
trusted library allocation
page read and write
21CD96FD000
trusted library allocation
page read and write
21CD8CA6000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CE1FCA000
trusted library allocation
page read and write
1F605F21000
heap
page read and write
21CD973F000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD9744000
trusted library allocation
page read and write
21CE3B98000
trusted library allocation
page read and write
21CE0181000
trusted library allocation
page read and write
15E6AF1D000
heap
page read and write
21CE021F000
trusted library allocation
page read and write
21CE0278000
trusted library allocation
page read and write
21CD9D47000
trusted library allocation
page read and write
21CD817B000
trusted library allocation
page read and write
21CD9254000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CE0040000
trusted library allocation
page read and write
21CDA9B8000
trusted library allocation
page read and write
21CD96A0000
trusted library allocation
page read and write
21CDB352000
trusted library allocation
page read and write
21CDFF2D000
trusted library allocation
page read and write
21CE18D8000
trusted library allocation
page read and write
21CD532B000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD9DC3000
trusted library allocation
page read and write
21CD9D3A000
trusted library allocation
page read and write
C71000
unkown
page execute read
21CD9720000
trusted library allocation
page read and write
21CE02A9000
trusted library allocation
page read and write
21CD8882000
trusted library allocation
page read and write
21CDAAC7000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CE0491000
trusted library allocation
page read and write
21CDB9CB000
trusted library allocation
page read and write
21CD80A8000
trusted library allocation
page read and write
21CE04D0000
trusted library allocation
page read and write
21CD931E000
trusted library allocation
page read and write
21CD7BFA000
trusted library allocation
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CCF018000
heap
page read and write
21CD8FFC000
trusted library allocation
page read and write
21CD5238000
trusted library allocation
page read and write
21CDFFA7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8DCB000
trusted library allocation
page read and write
21CDB426000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF007000
heap
page read and write
21CCF017000
heap
page read and write
21CCF02F000
heap
page read and write
21CD513B000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CE0282000
trusted library allocation
page read and write
D0C000
unkown
page readonly
21CCF004000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD9270000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
21CD7B72000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CE1844000
trusted library allocation
page read and write
21CDFF91000
trusted library allocation
page read and write
21CD8CD1000
trusted library allocation
page read and write
21CDA5D5000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
1F605EE6000
heap
page read and write
21CCF06B000
heap
page read and write
21CDAA98000
trusted library allocation
page read and write
21CCF03A000
heap
page read and write
21CD4F67000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
1294000
heap
page read and write
21CE03E9000
trusted library allocation
page read and write
21CD8F94000
trusted library allocation
page read and write
21CD9D9B000
trusted library allocation
page read and write
21CD39EF000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDFF32000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF027000
heap
page read and write
21CDFF38000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CDA600000
trusted library allocation
page read and write
21CD9663000
trusted library allocation
page read and write
21CDA2CD000
trusted library allocation
page read and write
21CD8F1F000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CD8CDA000
trusted library allocation
page read and write
21CD7B21000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD92D7000
trusted library allocation
page read and write
21CD9755000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD5992000
heap
page read and write
15E69389000
heap
page read and write
21CCF023000
heap
page read and write
21CDA9D4000
trusted library allocation
page read and write
21CD9672000
trusted library allocation
page read and write
21CE3F78000
trusted library allocation
page read and write
21CDB6F9000
trusted library allocation
page read and write
21CCF03A000
heap
page read and write
1F605F69000
heap
page read and write
21CCF02C000
heap
page read and write
21CDFFEB000
trusted library allocation
page read and write
21CDA5C9000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
1F605F44000
heap
page read and write
21CE04FC000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD975B000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD599D000
heap
page read and write
21CCF01B000
heap
page read and write
21CE0045000
trusted library allocation
page read and write
21CD9666000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE3BEC000
trusted library allocation
page read and write
21CDFFA5000
trusted library allocation
page read and write
1FDB9B47000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
21CD8827000
trusted library allocation
page read and write
21CE027D000
trusted library allocation
page read and write
21CCF039000
heap
page read and write
1F605F58000
heap
page read and write
21CE032F000
trusted library allocation
page read and write
21CDA5CF000
trusted library allocation
page read and write
21CE0435000
trusted library allocation
page read and write
21CD9600000
trusted library allocation
page read and write
21CD8F61000
trusted library allocation
page read and write
1F604DEA000
heap
page read and write
1294000
heap
page read and write
21CD8C73000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
20364332000
unclassified section
page read and write
21CD8FE5000
trusted library allocation
page read and write
21CDA598000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE03FB000
trusted library allocation
page read and write
21CD9DAA000
trusted library allocation
page read and write
1F6051CE000
trusted library allocation
page read and write
21CDAABF000
trusted library allocation
page read and write
21CE3652000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF004000
heap
page read and write
21CDA946000
trusted library allocation
page read and write
21CD8CC1000
trusted library allocation
page read and write
21CE010A000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF017000
heap
page read and write
21CCEFFE000
heap
page read and write
21CE001F000
trusted library allocation
page read and write
1294000
heap
page read and write
2676E0F0000
heap
page read and write
21CD4F52000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CDB337000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF045000
heap
page read and write
21CE18DA000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CDB9D3000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCEFFF000
heap
page read and write
21CE01A3000
trusted library allocation
page read and write
1F605F58000
heap
page read and write
21CCF06B000
heap
page read and write
21CD9651000
trusted library allocation
page read and write
1F605EE3000
heap
page read and write
21CE02EA000
trusted library allocation
page read and write
21CDFF34000
trusted library allocation
page read and write
1FDB9940000
heap
page read and write
1F605E01000
heap
page read and write
21CD80E4000
trusted library allocation
page read and write
21CD909B000
trusted library allocation
page read and write
21CD8AD7000
trusted library allocation
page read and write
21CE00EE000
trusted library allocation
page read and write
21CD962C000
trusted library allocation
page read and write
21CD928E000
trusted library allocation
page read and write
21CD5920000
heap
page read and write
21CCF045000
heap
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD8FFA000
trusted library allocation
page read and write
21CE045C000
trusted library allocation
page read and write
21CE363D000
trusted library allocation
page read and write
21CCEFF1000
heap
page read and write
21CE01BF000
trusted library allocation
page read and write
21CE4728000
trusted library allocation
page read and write
21CDFFEB000
trusted library allocation
page read and write
21CDAAFD000
trusted library allocation
page read and write
21CD8882000
trusted library allocation
page read and write
21CD8096000
trusted library allocation
page read and write
21CD7BCF000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF033000
heap
page read and write
21CE44F1000
trusted library allocation
page read and write
21CD906F000
trusted library allocation
page read and write
21CCF047000
heap
page read and write
21CD97DD000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
176976F0000
trusted library allocation
page execute read
21CD7B7A000
trusted library allocation
page read and write
21CD8F40000
trusted library allocation
page read and write
21CDB346000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF012000
heap
page read and write
21CD9666000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
8F3B2BE000
unkown
page readonly
21CD8D27000
trusted library allocation
page read and write
1FDB9B61000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CD7F7C000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD9663000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CD80E8000
trusted library allocation
page read and write
21CD903F000
trusted library allocation
page read and write
1F605EE8000
heap
page read and write
21CD90B2000
trusted library allocation
page read and write
21CD9752000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CCF049000
heap
page read and write
21CD5908000
heap
page read and write
21CD7BCF000
trusted library allocation
page read and write
21CE1C2C000
trusted library allocation
page read and write
21CDA9A6000
trusted library allocation
page read and write
21CD9751000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD7F63000
trusted library allocation
page read and write
21CE00B4000
trusted library allocation
page read and write
21CD967F000
trusted library allocation
page read and write
21CD90CB000
trusted library allocation
page read and write
21CDB30F000
trusted library allocation
page read and write
21CD4F1F000
trusted library allocation
page read and write
21CD966A000
trusted library allocation
page read and write
21CE04AA000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CE3BEA000
trusted library allocation
page read and write
F8F61FE000
stack
page read and write
21CCF02E000
heap
page read and write
21CD96E1000
trusted library allocation
page read and write
21CDBE9A000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
21CD8FFC000
trusted library allocation
page read and write
21CE0657000
trusted library allocation
page read and write
21CE03FB000
trusted library allocation
page read and write
21CD4F66000
trusted library allocation
page read and write
21CD96D7000
trusted library allocation
page read and write
21CD9096000
trusted library allocation
page read and write
1FDB9BC8000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF017000
heap
page read and write
21CCF034000
heap
page read and write
21CCF011000
heap
page read and write
21CD8DCB000
trusted library allocation
page read and write
21CD947E000
trusted library allocation
page read and write
1FDB9802000
remote allocation
page execute read
21CCF01E000
heap
page read and write
21CCF00A000
heap
page read and write
21CCF06B000
heap
page read and write
21CDB3EB000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CE0196000
trusted library allocation
page read and write
21CD96E3000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD9D69000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF02A000
heap
page read and write
21CCF016000
heap
page read and write
21CD8FB1000
trusted library allocation
page read and write
21CD90E3000
trusted library allocation
page read and write
21CE1FB0000
trusted library allocation
page read and write
21CCF003000
heap
page read and write
21CCF027000
heap
page read and write
21CCF034000
heap
page read and write
21CD9835000
trusted library allocation
page read and write
21CD4026000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
1F605E69000
heap
page read and write
21CD8D48000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CDFFCF000
trusted library allocation
page read and write
21CCEFFD000
heap
page read and write
21CD9663000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD9666000
trusted library allocation
page read and write
21CD81EE000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD8C3C000
trusted library allocation
page read and write
21CD9D94000
trusted library allocation
page read and write
21CD997D000
trusted library allocation
page read and write
21CD889F000
trusted library allocation
page read and write
21CDA558000
trusted library allocation
page read and write
21CCF009000
heap
page read and write
21CCF011000
heap
page read and write
21CCF023000
heap
page read and write
21CCF004000
heap
page read and write
21CE064C000
trusted library allocation
page read and write
21CD81E3000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF012000
heap
page read and write
21CD971C000
trusted library allocation
page read and write
21CD8F5D000
trusted library allocation
page read and write
21CDAA44000
trusted library allocation
page read and write
1F605EFD000
heap
page read and write
21CD97D1000
trusted library allocation
page read and write
21CDFFE7000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CE0243000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD40F6000
trusted library allocation
page read and write
21CDFFF1000
trusted library allocation
page read and write
21CE3F62000
trusted library allocation
page read and write
F8F7BBE000
stack
page read and write
21CCF04B000
heap
page read and write
21CCF00D000
heap
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CE0645000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF023000
heap
page read and write
21CCF004000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF012000
heap
page read and write
21CD7F8E000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD8D1A000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CD598C000
heap
page read and write
21CD96C2000
trusted library allocation
page read and write
21CCF003000
heap
page read and write
21CE0649000
trusted library allocation
page read and write
109B3FA000
stack
page read and write
21CD974E000
trusted library allocation
page read and write
21CD8163000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9651000
trusted library allocation
page read and write
21CE00C5000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CE3B55000
trusted library allocation
page read and write
F8F6AF8000
stack
page read and write
21CCF00F000
heap
page read and write
21CD97E3000
trusted library allocation
page read and write
21CD80E4000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF011000
heap
page read and write
21CDA498000
trusted library allocation
page read and write
21CD869B000
trusted library allocation
page read and write
21CD8AD9000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD886C000
trusted library allocation
page read and write
21CD9D3A000
trusted library allocation
page read and write
21CD8873000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD8683000
trusted library allocation
page read and write
203641C3000
heap
page read and write
21CD8F2C000
trusted library allocation
page read and write
21CD9613000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD817E000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF01B000
heap
page read and write
1F605EE9000
heap
page read and write
21CE0304000
trusted library allocation
page read and write
21CCF039000
heap
page read and write
21CCF016000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
1F604FC0000
unclassified section
page read and write
21CDB319000
trusted library allocation
page read and write
21CDAA65000
trusted library allocation
page read and write
21CD529E000
trusted library allocation
page read and write
21CD8C9E000
trusted library allocation
page read and write
21CE03C2000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD8698000
trusted library allocation
page read and write
21CD8C9E000
trusted library allocation
page read and write
21CD8691000
trusted library allocation
page read and write
21CD8860000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD93ED000
trusted library allocation
page read and write
21CE04EA000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF033000
heap
page read and write
21CCF016000
heap
page read and write
21CDA94F000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9744000
trusted library allocation
page read and write
21CE00E7000
trusted library allocation
page read and write
21CD9DFE000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF040000
heap
page read and write
21CCF00A000
heap
page read and write
21CCF027000
heap
page read and write
21CD88C3000
trusted library allocation
page read and write
21CDA1B4000
trusted library allocation
page read and write
21CD8FE7000
trusted library allocation
page read and write
21CD8847000
trusted library allocation
page read and write
21CD5239000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CE03E6000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF017000
heap
page read and write
21CCF00A000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF017000
heap
page read and write
1F605F69000
heap
page read and write
21CE1F7F000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD7F6A000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF008000
heap
page read and write
20364320000
heap
page readonly
1F605F69000
heap
page read and write
21CCF011000
heap
page read and write
21CCF00F000
heap
page read and write
21CCF016000
heap
page read and write
21CE1C57000
trusted library allocation
page read and write
21CD8F9B000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CCF011000
heap
page read and write
21CCF027000
heap
page read and write
21CD93AA000
trusted library allocation
page read and write
21CE1B02000
heap
page read and write
21CDA489000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDA0C5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD97E3000
trusted library allocation
page read and write
21CE024C000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD568F000
trusted library allocation
page read and write
21CD598A000
heap
page read and write
21CCEFF5000
heap
page read and write
21CCF023000
heap
page read and write
21CE02D3000
trusted library allocation
page read and write
21CD52F6000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
1F605E6C000
heap
page read and write
1FDB9B23000
trusted library allocation
page read and write
21CD5174000
trusted library allocation
page read and write
21CD9DC2000
trusted library allocation
page read and write
21CD8C73000
trusted library allocation
page read and write
F8F69FE000
unkown
page readonly
21CE3BCB000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CCF02E000
heap
page read and write
21CD99BF000
trusted library allocation
page read and write
21CE3645000
trusted library allocation
page read and write
21CE00E9000
trusted library allocation
page read and write
21CCF03A000
heap
page read and write
21CCF049000
heap
page read and write
21CD80A8000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CCF023000
heap
page read and write
20364570000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
203640C0000
unclassified section
page readonly
21CD97C9000
trusted library allocation
page read and write
21CD96E3000
trusted library allocation
page read and write
21CD90BD000
trusted library allocation
page read and write
E977C3E000
stack
page read and write
21CCF01E000
heap
page read and write
21CDB6F0000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDBECC000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD9270000
trusted library allocation
page read and write
21CE446D000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CCF009000
heap
page read and write
21CDB69F000
trusted library allocation
page read and write
21CE03DA000
trusted library allocation
page read and write
21CD4FC2000
trusted library allocation
page read and write
21CDA6EE000
trusted library allocation
page read and write
21CD8C39000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
1F605F77000
heap
page read and write
21CD94EE000
trusted library allocation
page read and write
21CD4FA7000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
1F605F21000
heap
page read and write
21CCF021000
heap
page read and write
21CE1B4D000
heap
page read and write
1F605E00000
heap
page read and write
21CCF023000
heap
page read and write
21CD4FD3000
trusted library allocation
page read and write
21CD51A4000
trusted library allocation
page read and write
21CD9BBC000
trusted library allocation
page read and write
21CDB36D000
trusted library allocation
page read and write
21CE0675000
trusted library allocation
page read and write
21CD8CC1000
trusted library allocation
page read and write
21CD8D30000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CDA5D1000
trusted library allocation
page read and write
21CDB64F000
trusted library allocation
page read and write
1FDB9B81000
trusted library allocation
page read and write
21CD7B33000
trusted library allocation
page read and write
21CE1AE5000
trusted library allocation
page read and write
21CDAA80000
trusted library allocation
page read and write
21CDFFE1000
trusted library allocation
page read and write
21CD8C5B000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CE1B6D000
trusted library allocation
page read and write
21CE3E87000
trusted library allocation
page read and write
21CD887E000
trusted library allocation
page read and write
21CE011E000
trusted library allocation
page read and write
15E6AF18000
heap
page read and write
21CCF012000
heap
page read and write
21CCF01C000
heap
page read and write
21CD8873000
trusted library allocation
page read and write
21CE01A2000
trusted library allocation
page read and write
21CCEFF5000
heap
page read and write
1FDB9B65000
trusted library allocation
page read and write
21CD88E9000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
20364150000
unclassified section
page readonly
1F605F77000
heap
page read and write
21CCF03B000
heap
page read and write
21CD8C9A000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF005000
heap
page read and write
21CE1FF5000
trusted library allocation
page read and write
21CE03C6000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD96E6000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD972F000
trusted library allocation
page read and write
21CD966B000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDB332000
trusted library allocation
page read and write
21CE18DC000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CDB3D8000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CD5107000
trusted library allocation
page read and write
21CD88E6000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CD9451000
trusted library allocation
page read and write
39E645F24000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
20364530000
trusted library allocation
page read and write
1F604DE0000
heap
page read and write
21CE00C1000
trusted library allocation
page read and write
21CD4FDB000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CDBEDD000
trusted library allocation
page read and write
21CDB9A6000
trusted library allocation
page read and write
21CD8CBD000
trusted library allocation
page read and write
21CD970C000
trusted library allocation
page read and write
1F605161000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9653000
trusted library allocation
page read and write
21CCF021000
heap
page read and write
21CE3B7E000
trusted library allocation
page read and write
21CE3200000
trusted library allocation
page read and write
21CE00B2000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE0253000
trusted library allocation
page read and write
21CD96E2000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCF039000
heap
page read and write
21CD9D47000
trusted library allocation
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCF016000
heap
page read and write
21CD88F7000
trusted library allocation
page read and write
15E6937F000
heap
page read and write
21CE03E0000
trusted library allocation
page read and write
21CDFF46000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CDA91E000
trusted library allocation
page read and write
21CD86CF000
trusted library allocation
page read and write
21CDB346000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF03A000
heap
page read and write
21CE4792000
trusted library allocation
page read and write
2676E060000
heap
page read and write
21CE18D6000
trusted library allocation
page read and write
21CD908F000
trusted library allocation
page read and write
1F605115000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD90D0000
trusted library allocation
page read and write
21CE00BE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD90D0000
trusted library allocation
page read and write
1F605EE6000
heap
page read and write
1F605EE1000
heap
page read and write
21CE18F7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDA9A0000
trusted library allocation
page read and write
21CD9666000
trusted library allocation
page read and write
21CDA083000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD885F000
trusted library allocation
page read and write
21CD970C000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
21CDA6F9000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
D32000
unkown
page readonly
21CCF033000
heap
page read and write
2676E200000
trusted library allocation
page read and write
20364400000
trusted library allocation
page read and write
21CE0235000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF025000
heap
page read and write
21CCF02C000
heap
page read and write
1FDB99B0000
heap
page read and write
21CCF027000
heap
page read and write
21CCF06B000
heap
page read and write
21CD8F6C000
trusted library allocation
page read and write
1FDB9D0D000
trusted library allocation
page read and write
21CE02DC000
trusted library allocation
page read and write
21CD906A000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8125000
trusted library allocation
page read and write
21CE02BC000
trusted library allocation
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CD90A3000
trusted library allocation
page read and write
21CD9744000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CDA9D4000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
1F605E69000
heap
page read and write
21CE018E000
trusted library allocation
page read and write
21CE04E8000
trusted library allocation
page read and write
21CD8F71000
trusted library allocation
page read and write
1F605EE3000
heap
page read and write
21CE068B000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD966B000
trusted library allocation
page read and write
114F000
stack
page read and write
21CCF023000
heap
page read and write
21CCF011000
heap
page read and write
21CCF023000
heap
page read and write
21CCF012000
heap
page read and write
21CD86F2000
trusted library allocation
page read and write
21CE3BCB000
trusted library allocation
page read and write
21CDFF5F000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD9031000
trusted library allocation
page read and write
21CDA534000
trusted library allocation
page read and write
21CD5C29000
trusted library allocation
page read and write
21CD527B000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD5979000
heap
page read and write
21CD4FD7000
trusted library allocation
page read and write
21CDB9C8000
trusted library allocation
page read and write
1F605E8A000
heap
page read and write
21CCF004000
heap
page read and write
21CCF023000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
21CD885D000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CD8FE0000
trusted library allocation
page read and write
21CE1898000
trusted library allocation
page read and write
21CE1B01000
heap
page read and write
21CCF011000
heap
page read and write
1F604D70000
unclassified section
page readonly
21CD592F000
heap
page read and write
1F6056E2000
unkown
page execute read
21CD5132000
trusted library allocation
page read and write
21CE068C000
trusted library allocation
page read and write
21CE06C4000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
1294000
heap
page read and write
21CD8CCC000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9842000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CD9451000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CCF01B000
heap
page read and write
1F605178000
trusted library allocation
page read and write
21CD90B2000
trusted library allocation
page read and write
21CDAA52000
trusted library allocation
page read and write
21CD399E000
trusted library allocation
page read and write
21CDA6FD000
trusted library allocation
page read and write
21CE04EE000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDAAB5000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF01E000
heap
page read and write
21CD964E000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF012000
heap
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD8F60000
trusted library allocation
page read and write
21CCF037000
heap
page read and write
20364807000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD889F000
trusted library allocation
page read and write
21CD8AFE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD4F1C000
trusted library allocation
page read and write
21CD983A000
trusted library allocation
page read and write
21CE0213000
trusted library allocation
page read and write
21CD8D6C000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF01C000
heap
page read and write
21CCF00A000
heap
page read and write
21CDA6C1000
trusted library allocation
page read and write
21CDB4AF000
trusted library allocation
page read and write
21CE18DA000
trusted library allocation
page read and write
13B2000
heap
page read and write
21CDB48D000
trusted library allocation
page read and write
21CE1F35000
trusted library allocation
page read and write
2036450C000
trusted library allocation
page read and write
21CD9BDB000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE02EA000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
15E69350000
heap
page read and write
21CD3F76000
trusted library allocation
page read and write
21CD4FAA000
trusted library allocation
page read and write
21CD8D32000
trusted library allocation
page read and write
21CD88E3000
trusted library allocation
page read and write
21CCF042000
heap
page read and write
21CD9651000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF027000
heap
page read and write
21CE03E6000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
1F605F77000
heap
page read and write
21CCF044000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF00A000
heap
page read and write
21CE0660000
trusted library allocation
page read and write
21CE03DA000
trusted library allocation
page read and write
21CD908D000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF02E000
heap
page read and write
21CD8CCC000
trusted library allocation
page read and write
21CD901B000
trusted library allocation
page read and write
21CD8AC6000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD90CD000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD975B000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
1F605173000
trusted library allocation
page read and write
21CDB4F4000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CD94FA000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE4732000
trusted library allocation
page read and write
21CCF00D000
heap
page read and write
21CD903B000
trusted library allocation
page read and write
21CE00E7000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CD7F7A000
trusted library allocation
page read and write
21CD80CF000
trusted library allocation
page read and write
21CDA598000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CDB319000
trusted library allocation
page read and write
15E6936C000
heap
page read and write
21CCF01E000
heap
page read and write
21CDFF8F000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
8F399D8000
stack
page read and write
21CD9763000
trusted library allocation
page read and write
21CE03DD000
trusted library allocation
page read and write
21CD8094000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF01E000
heap
page read and write
21CD96E7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9763000
trusted library allocation
page read and write
21CD88FE000
trusted library allocation
page read and write
21CE00B2000
trusted library allocation
page read and write
21CD8CCC000
trusted library allocation
page read and write
21CD80DB000
trusted library allocation
page read and write
21CD8C56000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CDA554000
trusted library allocation
page read and write
21CE3B8C000
trusted library allocation
page read and write
21CE0638000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9826000
trusted library allocation
page read and write
203645D6000
trusted library allocation
page read and write
21CD521A000
trusted library allocation
page read and write
21CD86AC000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CD8FFA000
trusted library allocation
page read and write
21CDA6C7000
trusted library allocation
page read and write
21CDBEFE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CDB444000
trusted library allocation
page read and write
21CD9023000
trusted library allocation
page read and write
21CD90E4000
trusted library allocation
page read and write
21CD948A000
trusted library allocation
page read and write
21CD7F6B000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD9689000
trusted library allocation
page read and write
21CD8D37000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CDA6A3000
trusted library allocation
page read and write
21CD8D8B000
trusted library allocation
page read and write
1F605F44000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
21CE01BC000
trusted library allocation
page read and write
21CDFFA7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF01E000
heap
page read and write
21CD94EA000
trusted library allocation
page read and write
21CDB674000
trusted library allocation
page read and write
21CE3BC0000
trusted library allocation
page read and write
21CDBEC2000
trusted library allocation
page read and write
21CE4792000
trusted library allocation
page read and write
21CDAAF8000
trusted library allocation
page read and write
1F605E60000
heap
page read and write
21CDA2BD000
trusted library allocation
page read and write
21CE3BEC000
trusted library allocation
page read and write
21CD8849000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD8FF2000
trusted library allocation
page read and write
21CD96F8000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CD9D8F000
trusted library allocation
page read and write
D3C000
unkown
page read and write
21CD8C8C000
trusted library allocation
page read and write
21CDB751000
trusted library allocation
page read and write
21CE3BD3000
trusted library allocation
page read and write
21CD8FC7000
trusted library allocation
page read and write
21CE3402000
trusted library allocation
page read and write
21CD8179000
trusted library allocation
page read and write
21CE0161000
trusted library allocation
page read and write
21CD94EF000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF03D000
heap
page read and write
1F604FCF000
unclassified section
page read and write
21CD7F65000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD9663000
trusted library allocation
page read and write
21CD94A1000
trusted library allocation
page read and write
21CCF047000
heap
page read and write
E9795FE000
stack
page read and write
21CCF042000
heap
page read and write
1F605112000
trusted library allocation
page read and write
21CDFFF1000
trusted library allocation
page read and write
1398000
heap
page read and write
21CD8DD9000
trusted library allocation
page read and write
21CD96E7000
trusted library allocation
page read and write
21CE1FAD000
trusted library allocation
page read and write
20364340000
heap
page read and write
203645B0000
trusted library allocation
page read and write
21CD9759000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CE0107000
trusted library allocation
page read and write
21CE03FB000
trusted library allocation
page read and write
21CDB48A000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF004000
heap
page read and write
21CCF01B000
heap
page read and write
21CCF027000
heap
page read and write
21CD8F61000
trusted library allocation
page read and write
21CD9D9B000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
3BC1000
heap
page read and write
21CD8161000
trusted library allocation
page read and write
21CD39B3000
trusted library allocation
page read and write
1FDB9970000
heap
page read and write
21CD933D000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CE03E9000
trusted library allocation
page read and write
21CD8D62000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD88A3000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF03D000
heap
page read and write
21CCF004000
heap
page read and write
21CD9689000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9D96000
trusted library allocation
page read and write
21CD97D1000
trusted library allocation
page read and write
21CD9069000
trusted library allocation
page read and write
21CE03E9000
trusted library allocation
page read and write
21CDAA53000
trusted library allocation
page read and write
21CD8D1D000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CE032D000
trusted library allocation
page read and write
15E69765000
heap
page read and write
21CE3B94000
trusted library allocation
page read and write
21CD3FFB000
trusted library allocation
page read and write
21CE027A000
trusted library allocation
page read and write
21CD81C8000
trusted library allocation
page read and write
21CE1834000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD96E6000
trusted library allocation
page read and write
20364500000
trusted library allocation
page read and write
21CD8F5A000
trusted library allocation
page read and write
21CDAA7B000
trusted library allocation
page read and write
21CD80D0000
trusted library allocation
page read and write
21CD4F45000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CE02EA000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8FEA000
trusted library allocation
page read and write
21CD96B1000
trusted library allocation
page read and write
21CDB9E4000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF02E000
heap
page read and write
21CCF017000
heap
page read and write
21CD8D8F000
trusted library allocation
page read and write
21CDBEE1000
trusted library allocation
page read and write
203646A8000
heap
page read and write
21CDB9C6000
trusted library allocation
page read and write
21CDA9F3000
trusted library allocation
page read and write
21CD591F000
heap
page read and write
21CE1B71000
heap
page read and write
21CD964E000
trusted library allocation
page read and write
15E69760000
heap
page read and write
21CCF06B000
heap
page read and write
21CD973B000
trusted library allocation
page read and write
21CD8DCB000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD905B000
trusted library allocation
page read and write
21CD813B000
trusted library allocation
page read and write
21CCF01D000
heap
page read and write
21CD4FCA000
trusted library allocation
page read and write
21CD8D46000
trusted library allocation
page read and write
21CDAAF6000
trusted library allocation
page read and write
15E6AF2A000
heap
page read and write
21CE03F7000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
1294000
heap
page read and write
21CDA9B8000
trusted library allocation
page read and write
21CD8F97000
trusted library allocation
page read and write
21CE06B8000
trusted library allocation
page read and write
21CD9692000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9763000
trusted library allocation
page read and write
21CDB3C7000
trusted library allocation
page read and write
21CD96E5000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF017000
heap
page read and write
21CE1BE3000
heap
page read and write
1FDB9D12000
trusted library allocation
page read and write
21CE00A7000
trusted library allocation
page read and write
21CD9378000
trusted library allocation
page read and write
21CDB356000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE36EB000
trusted library allocation
page read and write
21CD8DB6000
trusted library allocation
page read and write
21CDA4DA000
trusted library allocation
page read and write
21CE00C8000
trusted library allocation
page read and write
21CD9705000
trusted library allocation
page read and write
21CD5116000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
1FDB99A5000
heap
page read and write
21CE3661000
trusted library allocation
page read and write
21CD39BF000
trusted library allocation
page read and write
21CD908D000
trusted library allocation
page read and write
21CCF035000
heap
page read and write
21CD8CE0000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
1FDB9D14000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
15E69600000
trusted library allocation
page read and write
21CD86F9000
trusted library allocation
page read and write
21CCF031000
heap
page read and write
21CCF034000
heap
page read and write
1F604FA0000
heap
page readonly
21CDA3FE000
trusted library allocation
page read and write
1F604F50000
heap
page read and write
21CE02A5000
trusted library allocation
page read and write
21CDA3D0000
trusted library allocation
page read and write
21CDB6F0000
trusted library allocation
page read and write
E977CFE000
unkown
page readonly
21CCF002000
heap
page read and write
21CD906A000
trusted library allocation
page read and write
21CD88E9000
trusted library allocation
page read and write
21CE3EB9000
trusted library allocation
page read and write
21CD869B000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CE011E000
trusted library allocation
page read and write
21CE03E4000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CD96E7000
trusted library allocation
page read and write
21CE02DF000
trusted library allocation
page read and write
21CDFF8B000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CE02DC000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD940A000
trusted library allocation
page read and write
21CD816B000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF03C000
heap
page read and write
21CE1B86000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CCF023000
heap
page read and write
21CD974C000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CD92A4000
trusted library allocation
page read and write
21CD97E3000
trusted library allocation
page read and write
21CD963B000
trusted library allocation
page read and write
21CDBEE9000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CDFFA2000
trusted library allocation
page read and write
21CD8CA2000
trusted library allocation
page read and write
21CD8873000
trusted library allocation
page read and write
21CCF01A000
heap
page read and write
1FDB9B12000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD599E000
heap
page read and write
21CE00D5000
trusted library allocation
page read and write
21CD8694000
trusted library allocation
page read and write
21CD906D000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CDBED9000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD97E3000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD523D000
trusted library allocation
page read and write
21CDFFAD000
trusted library allocation
page read and write
21CE1B02000
heap
page read and write
21CD8058000
trusted library allocation
page read and write
21CE4761000
trusted library allocation
page read and write
21CD9286000
trusted library allocation
page read and write
21CD8FE0000
trusted library allocation
page read and write
21CDB362000
trusted library allocation
page read and write
21CCF006000
heap
page read and write
21CE0153000
trusted library allocation
page read and write
1F605F3B000
heap
page read and write
21CDA243000
trusted library allocation
page read and write
21CD94A1000
trusted library allocation
page read and write
21CD8D2B000
trusted library allocation
page read and write
21CD8C9E000
trusted library allocation
page read and write
21CD921C000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE3F59000
trusted library allocation
page read and write
21CCF002000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF01E000
heap
page read and write
21CD7F3C000
trusted library allocation
page read and write
21CD39C5000
trusted library allocation
page read and write
21CD908E000
trusted library allocation
page read and write
21CE1F7F000
trusted library allocation
page read and write
21CD90CD000
trusted library allocation
page read and write
21CD962D000
trusted library allocation
page read and write
21CE03FE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CDFFCF000
trusted library allocation
page read and write
21CDBEE9000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
98E000
stack
page read and write
21CD9DE8000
trusted library allocation
page read and write
21CE0645000
trusted library allocation
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CD8FEA000
trusted library allocation
page read and write
21CD56FE000
trusted library allocation
page read and write
21CD9BE1000
trusted library allocation
page read and write
21CD9D35000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD7F5B000
trusted library allocation
page read and write
21CD4080000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CDB322000
trusted library allocation
page read and write
21CDBED0000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD8CDA000
trusted library allocation
page read and write
21CD4F45000
trusted library allocation
page read and write
21CD8CDA000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
21CE18F5000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF02F000
heap
page read and write
21CD81CA000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDA1A7000
trusted library allocation
page read and write
21CCEFFD000
heap
page read and write
21CDAA35000
trusted library allocation
page read and write
21CD9DF4000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD9FAD000
trusted library allocation
page read and write
21CD96FD000
trusted library allocation
page read and write
21CD96E7000
trusted library allocation
page read and write
21CDBEB9000
trusted library allocation
page read and write
21CD4076000
trusted library allocation
page read and write
1FDB9B79000
trusted library allocation
page read and write
21CD99E1000
trusted library allocation
page read and write
21CE18DC000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF012000
heap
page read and write
21CD92DB000
trusted library allocation
page read and write
21CD7B60000
trusted library allocation
page read and write
21CDB64A000
trusted library allocation
page read and write
21CD933E000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CCF008000
heap
page read and write
203645A6000
trusted library allocation
page read and write
21CCF034000
heap
page read and write
21CCF016000
heap
page read and write
21CCEFFE000
heap
page read and write
21CCF01B000
heap
page read and write
21CD88C9000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
1F605110000
trusted library allocation
page read and write
21CDB3EB000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CCF001000
heap
page read and write
21CE1FAE000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD5109000
trusted library allocation
page read and write
21CCF01F000
heap
page read and write
21CCF012000
heap
page read and write
21CDB3BF000
trusted library allocation
page read and write
21CDA2D3000
trusted library allocation
page read and write
21CCF040000
heap
page read and write
21CCF023000
heap
page read and write
21CD88B3000
trusted library allocation
page read and write
21CD8DC8000
trusted library allocation
page read and write
21CE36D1000
trusted library allocation
page read and write
21CDA074000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CE1F8D000
trusted library allocation
page read and write
21CE00B9000
trusted library allocation
page read and write
21CD8C96000
trusted library allocation
page read and write
21CDB6EE000
trusted library allocation
page read and write
1F604E20000
unclassified section
page readonly
21CD8D92000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CD9720000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CD8FF5000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD908D000
trusted library allocation
page read and write
1390000
heap
page read and write
21CD4FF2000
trusted library allocation
page read and write
C4F67FC000
stack
page read and write
21CDB98C000
trusted library allocation
page read and write
21CD90B2000
trusted library allocation
page read and write
21CDFF91000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CD983C000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
21CCF012000
heap
page read and write
21CD97C9000
trusted library allocation
page read and write
21CE0655000
trusted library allocation
page read and write
21CCEFF5000
heap
page read and write
21CD9BEE000
trusted library allocation
page read and write
21CE00F8000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF009000
heap
page read and write
21CD4013000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CCF06B000
heap
page read and write
21CDB30F000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
21CDB369000
trusted library allocation
page read and write
21CDBED0000
trusted library allocation
page read and write
F8F6AFB000
stack
page read and write
21CDBEB5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD88DB000
trusted library allocation
page read and write
21CD8F8A000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CD9743000
trusted library allocation
page read and write
21CD4026000
trusted library allocation
page read and write
21CD8CBD000
trusted library allocation
page read and write
1F605EE0000
heap
page read and write
21CCF027000
heap
page read and write
21CDB31B000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
1F605F44000
heap
page read and write
21CD8F71000
trusted library allocation
page read and write
21CD8136000
trusted library allocation
page read and write
21CD9713000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD4FD3000
trusted library allocation
page read and write
21CCF020000
heap
page read and write
21CD8698000
trusted library allocation
page read and write
21CDA5C9000
trusted library allocation
page read and write
21CD886F000
trusted library allocation
page read and write
21CD964A000
trusted library allocation
page read and write
21CDBED9000
trusted library allocation
page read and write
21CE029C000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CDB43B000
trusted library allocation
page read and write
21CD8FFA000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CE06F0000
trusted library allocation
page read and write
21CE3EB0000
trusted library allocation
page read and write
21CD8FFA000
trusted library allocation
page read and write
21CDB31B000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CCF016000
heap
page read and write
21CD4082000
trusted library allocation
page read and write
21CD96F5000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CE0687000
trusted library allocation
page read and write
21CDA1BB000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8890000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CE3EB9000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CE06C4000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
1F605EF1000
heap
page read and write
21CDB6EE000
trusted library allocation
page read and write
21CD8804000
trusted library allocation
page read and write
21CDA5D3000
trusted library allocation
page read and write
21CE1FE3000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CDA95E000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CD9399000
trusted library allocation
page read and write
21CD88F9000
trusted library allocation
page read and write
21CD8CF8000
trusted library allocation
page read and write
21CD56F4000
trusted library allocation
page read and write
21CD9D3A000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF049000
heap
page read and write
21CCF015000
heap
page read and write
21CCF007000
heap
page read and write
21CD96FC000
trusted library allocation
page read and write
21CD90BD000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD97DD000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD5663000
trusted library allocation
page read and write
21CD9002000
trusted library allocation
page read and write
1F6051F3000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CD966F000
trusted library allocation
page read and write
21CD8F9F000
trusted library allocation
page read and write
21CD3990000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF033000
heap
page read and write
21CCF01C000
heap
page read and write
21CD9719000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD8CD1000
trusted library allocation
page read and write
21CDA26E000
trusted library allocation
page read and write
21CDFFA1000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9294000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD9707000
trusted library allocation
page read and write
1F6051BA000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF023000
heap
page read and write
21CD9DFE000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CD814E000
trusted library allocation
page read and write
E979DFE000
unkown
page readonly
1F605E60000
heap
page read and write
1F605E63000
heap
page read and write
21CD4FA7000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
21CD9096000
trusted library allocation
page read and write
1F605EAA000
heap
page read and write
21CE00CA000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CD9712000
trusted library allocation
page read and write
21CE1F77000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
1F605246000
heap
page read and write
21CD86FC000
trusted library allocation
page read and write
21CE064C000
trusted library allocation
page read and write
21CD948B000
trusted library allocation
page read and write
21CE03C6000
trusted library allocation
page read and write
21CD8CEE000
trusted library allocation
page read and write
21CD5926000
heap
page read and write
1F605F69000
heap
page read and write
21CD963B000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF023000
heap
page read and write
D44000
unkown
page readonly
21CCF033000
heap
page read and write
21CCF06B000
heap
page read and write
21CD96D4000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD86EC000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE0171000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD8C98000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD9692000
trusted library allocation
page read and write
21CDBEFD000
trusted library allocation
page read and write
21CD8DB6000
trusted library allocation
page read and write
21CDAAD0000
trusted library allocation
page read and write
21CD9010000
trusted library allocation
page read and write
1290000
heap
page read and write
21CD8FE2000
trusted library allocation
page read and write
21CE3BDB000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDB30A000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CCF00F000
heap
page read and write
21CCF02C000
heap
page read and write
13CE000
heap
page read and write
21CD99C2000
trusted library allocation
page read and write
21CE0660000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CE04AA000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
21CD8FEC000
trusted library allocation
page read and write
1F605EB9000
heap
page read and write
21CDAABF000
trusted library allocation
page read and write
1F605148000
trusted library allocation
page read and write
21CD8D51000
trusted library allocation
page read and write
1FDB9D00000
trusted library allocation
page read and write
1FDB9D37000
trusted library allocation
page read and write
21CDB7E1000
trusted library allocation
page read and write
21CD4F43000
trusted library allocation
page read and write
21CE018E000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD88FE000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
21CD9D3D000
trusted library allocation
page read and write
21CDB3FC000
trusted library allocation
page read and write
21CD928A000
trusted library allocation
page read and write
21CD8FEC000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF02B000
heap
page read and write
21CDA5FB000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CDFF16000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CCF012000
heap
page read and write
21CE3E76000
trusted library allocation
page read and write
21CDFF23000
trusted library allocation
page read and write
21CE0647000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCF042000
heap
page read and write
21CE1F55000
trusted library allocation
page read and write
21CD981E000
trusted library allocation
page read and write
1F605E69000
heap
page read and write
21CD9DA6000
trusted library allocation
page read and write
21CD949D000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CCF00F000
heap
page read and write
21CDAA80000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
203641C0000
heap
page read and write
21CD7F5B000
trusted library allocation
page read and write
21CE34A8000
trusted library allocation
page read and write
13BB000
heap
page read and write
21CE00CB000
trusted library allocation
page read and write
21CDAABA000
trusted library allocation
page read and write
21CD8FD8000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD8F71000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF02C000
heap
page read and write
21CD529C000
trusted library allocation
page read and write
15E692F0000
heap
page read and write
21CDFF8F000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
1F605F3B000
heap
page read and write
21CDA5CB000
trusted library allocation
page read and write
21CE04CA000
trusted library allocation
page read and write
21CD9299000
trusted library allocation
page read and write
21CD4FAA000
trusted library allocation
page read and write
21CD960E000
trusted library allocation
page read and write
109BBFE000
stack
page read and write
21CD905D000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDB917000
trusted library allocation
page read and write
21CD80CD000
trusted library allocation
page read and write
21CD8FA1000
trusted library allocation
page read and write
21CE00E7000
trusted library allocation
page read and write
21CD9BFA000
trusted library allocation
page read and write
21CD96E3000
trusted library allocation
page read and write
21CD8FD2000
trusted library allocation
page read and write
21CD9D8F000
trusted library allocation
page read and write
21CDB95F000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
21CD8CE1000
trusted library allocation
page read and write
21CD8837000
trusted library allocation
page read and write
21CCF00E000
heap
page read and write
21CDA3EA000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDB356000
trusted library allocation
page read and write
21CD887D000
trusted library allocation
page read and write
21CD8FE7000
trusted library allocation
page read and write
21CD527B000
trusted library allocation
page read and write
21CD92DC000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CDA9DF000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CDA264000
trusted library allocation
page read and write
C70000
unkown
page readonly
21CCF021000
heap
page read and write
21CCF023000
heap
page read and write
21CE018E000
trusted library allocation
page read and write
21CD9499000
trusted library allocation
page read and write
21CD9763000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF03A000
heap
page read and write
21CE3B4C000
trusted library allocation
page read and write
21CE1B43000
trusted library allocation
page read and write
21CD901B000
trusted library allocation
page read and write
21CD88C5000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CD8DF9000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD97C4000
trusted library allocation
page read and write
21CD8FFC000
trusted library allocation
page read and write
21CD9762000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD8FE5000
trusted library allocation
page read and write
21CE0141000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCF00A000
heap
page read and write
21CD960E000
trusted library allocation
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCF011000
heap
page read and write
21CCF007000
heap
page read and write
1FDB9D03000
trusted library allocation
page read and write
21CD94FA000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD7FCE000
trusted library allocation
page read and write
21CD94FA000
trusted library allocation
page read and write
21CD8FD8000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CD7BDA000
trusted library allocation
page read and write
1FDB9E00000
heap
page read and write
21CCF016000
heap
page read and write
21CD962C000
trusted library allocation
page read and write
21CD8686000
trusted library allocation
page read and write
21CDA6A3000
trusted library allocation
page read and write
21CDB3B5000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CE04CC000
trusted library allocation
page read and write
21CD8C34000
trusted library allocation
page read and write
21CD524D000
trusted library allocation
page read and write
21CD90BE000
trusted library allocation
page read and write
21CD80D3000
trusted library allocation
page read and write
21CE0481000
trusted library allocation
page read and write
21CD96DE000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CE01EB000
trusted library allocation
page read and write
21CD8CE2000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD921B000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CDAAF6000
trusted library allocation
page read and write
203645C3000
trusted library allocation
page read and write
21CDB3F3000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE1B36000
heap
page read and write
21CDAAEB000
trusted library allocation
page read and write
21CDB9A6000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE0633000
trusted library allocation
page read and write
21CDFF38000
trusted library allocation
page read and write
21CDB3ED000
trusted library allocation
page read and write
21CE00EC000
trusted library allocation
page read and write
21CD8F97000
trusted library allocation
page read and write
21CDB993000
trusted library allocation
page read and write
21CE1FA1000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CD983A000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF027000
heap
page read and write
21CE1F2F000
trusted library allocation
page read and write
D44000
unkown
page readonly
21CE0092000
trusted library allocation
page read and write
21CDB7BB000
trusted library allocation
page read and write
21CE3BC6000
trusted library allocation
page read and write
21CDA5D7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8C63000
trusted library allocation
page read and write
21CDA5FB000
trusted library allocation
page read and write
1F605E6C000
heap
page read and write
21CCF00F000
heap
page read and write
21CE3EB9000
trusted library allocation
page read and write
21CCF021000
heap
page read and write
21CCEFFE000
heap
page read and write
21CCF01C000
heap
page read and write
D3C000
unkown
page write copy
21CCF01B000
heap
page read and write
21CDA5CD000
trusted library allocation
page read and write
2036458E000
trusted library allocation
page read and write
21CD9747000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD5989000
heap
page read and write
3874000
heap
page read and write
21CCF011000
heap
page read and write
21CCF04B000
heap
page read and write
21CCF012000
heap
page read and write
21CCF011000
heap
page read and write
21CD8C4E000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CDAABA000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCF027000
heap
page read and write
1F6057B1000
heap
page read and write
1F6056C8000
unkown
page execute read
21CCF007000
heap
page read and write
21CD40D2000
trusted library allocation
page read and write
21CD591F000
heap
page read and write
21CD8D37000
trusted library allocation
page read and write
21CD9636000
trusted library allocation
page read and write
21CE00F1000
trusted library allocation
page read and write
21CCF04A000
heap
page read and write
21CD8CA6000
trusted library allocation
page read and write
21CD967B000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD886C000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF021000
heap
page read and write
21CD5142000
trusted library allocation
page read and write
21CDA9C7000
trusted library allocation
page read and write
21CDA5D1000
trusted library allocation
page read and write
21CDBEB2000
trusted library allocation
page read and write
21CE0157000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF023000
heap
page read and write
21CDFF48000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CD8CF2000
trusted library allocation
page read and write
21CD8FF5000
trusted library allocation
page read and write
21CCF03D000
heap
page read and write
21CD9832000
trusted library allocation
page read and write
21CD8847000
trusted library allocation
page read and write
21CD90D2000
trusted library allocation
page read and write
21CD52F6000
trusted library allocation
page read and write
21CCF036000
heap
page read and write
21CD9672000
trusted library allocation
page read and write
21CDFFEB000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CD968F000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
1F605D17000
trusted library allocation
page read and write
1FDB99F2000
unclassified section
page read and write
1F60515F000
trusted library allocation
page read and write
21CD8CD9000
trusted library allocation
page read and write
21CE0261000
trusted library allocation
page read and write
21CD7F70000
trusted library allocation
page read and write
21CE0186000
trusted library allocation
page read and write
21CD974C000
trusted library allocation
page read and write
1294000
heap
page read and write
21CCF033000
heap
page read and write
21CD8FD8000
trusted library allocation
page read and write
21CE1AA3000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CCF06B000
heap
page read and write
21CD962E000
trusted library allocation
page read and write
21CD908D000
trusted library allocation
page read and write
21CDFF8B000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CD9DA6000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
21CD8F8A000
trusted library allocation
page read and write
21CD90E6000
trusted library allocation
page read and write
21CCF025000
heap
page read and write
21CDFFE7000
trusted library allocation
page read and write
8F3B1FE000
unkown
page readonly
21CE1832000
trusted library allocation
page read and write
21CD9847000
trusted library allocation
page read and write
21CD9DC2000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CDB3F3000
trusted library allocation
page read and write
21CE0012000
trusted library allocation
page read and write
21CDAAF8000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CDAA5A000
trusted library allocation
page read and write
21CE0149000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CDAAC5000
trusted library allocation
page read and write
21CD8882000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD86EC000
trusted library allocation
page read and write
21CE3BD6000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8CD1000
trusted library allocation
page read and write
21CE1FC8000
trusted library allocation
page read and write
21CDA540000
trusted library allocation
page read and write
9D0000
heap
page read and write
21CE1F74000
trusted library allocation
page read and write
21CCF042000
heap
page read and write
21CD8809000
trusted library allocation
page read and write
21CDA9B6000
trusted library allocation
page read and write
203642A0000
heap
page read and write
21CD52D6000
trusted library allocation
page read and write
21CD869E000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CE00B9000
trusted library allocation
page read and write
21CE3B90000
trusted library allocation
page read and write
21CD88D3000
trusted library allocation
page read and write
21CD7B61000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8D2B000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
3BC0000
heap
page read and write
21CCF01F000
heap
page read and write
21CCF00F000
heap
page read and write
21CD964E000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD88A3000
trusted library allocation
page read and write
21CE1BC5000
trusted library allocation
page read and write
21CE253D000
trusted library allocation
page read and write
21CD56F4000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD961A000
trusted library allocation
page read and write
21CE36EB000
trusted library allocation
page read and write
21CE47B7000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF049000
heap
page read and write
21CDB7ED000
trusted library allocation
page read and write
20364516000
trusted library allocation
page read and write
21CD8F92000
trusted library allocation
page read and write
21CD8D2F000
trusted library allocation
page read and write
21CD8CA6000
trusted library allocation
page read and write
E977BFE000
unkown
page readonly
21CCEFFE000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD9232000
trusted library allocation
page read and write
21CE4738000
trusted library allocation
page read and write
21CD8058000
trusted library allocation
page read and write
1F605F22000
heap
page read and write
21CE0669000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD8D67000
trusted library allocation
page read and write
21CD7F63000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
1FDB9BB7000
trusted library allocation
page read and write
21CD4FFD000
trusted library allocation
page read and write
21CD5644000
trusted library allocation
page read and write
21CD5989000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF004000
heap
page read and write
21CE02E8000
trusted library allocation
page read and write
21CD8CED000
trusted library allocation
page read and write
21CE1B4D000
trusted library allocation
page read and write
21CDB3BF000
trusted library allocation
page read and write
21CD9739000
trusted library allocation
page read and write
21CD8FF2000
trusted library allocation
page read and write
21CDBED0000
trusted library allocation
page read and write
21CD8D24000
trusted library allocation
page read and write
20364694000
heap
page read and write
21CD8C96000
trusted library allocation
page read and write
21CE0685000
trusted library allocation
page read and write
21CDA256000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CE002B000
trusted library allocation
page read and write
21CD90E4000
trusted library allocation
page read and write
1FDB9E05000
heap
page read and write
1769771E000
trusted library allocation
page execute read
21CD960E000
trusted library allocation
page read and write
21CD8F97000
trusted library allocation
page read and write
21CDA6C7000
trusted library allocation
page read and write
15E6AF2D000
heap
page read and write
21CD8CCC000
trusted library allocation
page read and write
21CD97FE000
trusted library allocation
page read and write
21CE04CE000
trusted library allocation
page read and write
21CD968F000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD86A7000
trusted library allocation
page read and write
21CD960C000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CDA9C7000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE3EF3000
trusted library allocation
page read and write
113B000
stack
page read and write
21CCF016000
heap
page read and write
1F605F3B000
heap
page read and write
21CD8185000
trusted library allocation
page read and write
21CD8D48000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCEFFE000
heap
page read and write
21CDA9E3000
trusted library allocation
page read and write
21CDB6FE000
trusted library allocation
page read and write
21CDB6EE000
trusted library allocation
page read and write
21CD96A0000
trusted library allocation
page read and write
21CD80DF000
trusted library allocation
page read and write
21CE013A000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD9692000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9D2D000
trusted library allocation
page read and write
21CD9DC2000
trusted library allocation
page read and write
21CE3E5B000
trusted library allocation
page read and write
21CCF020000
heap
page read and write
1F605E5C000
heap
page read and write
21CD887D000
trusted library allocation
page read and write
21CE3BDB000
trusted library allocation
page read and write
21CD9DAA000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
1FDB9B7B000
trusted library allocation
page read and write
21CD94DE000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
15E6AF1E000
heap
page read and write
21CD968F000
trusted library allocation
page read and write
21CD81F9000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF049000
heap
page read and write
21CDB3DF000
trusted library allocation
page read and write
21CD96E2000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CDFF5F000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD9631000
trusted library allocation
page read and write
21CD9390000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD970F000
trusted library allocation
page read and write
21CD4F45000
trusted library allocation
page read and write
21CDA663000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
21CD9712000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
1F6051C7000
trusted library allocation
page read and write
1F6058E0000
heap
page read and write
21CCF000000
heap
page read and write
21CD52B1000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CD51F5000
trusted library allocation
page read and write
1F605176000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF06B000
heap
page read and write
21CE1F81000
trusted library allocation
page read and write
1294000
heap
page read and write
21CD9839000
trusted library allocation
page read and write
21CDA1AE000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF025000
heap
page read and write
21CDA9A6000
trusted library allocation
page read and write
21CE3BBD000
trusted library allocation
page read and write
1294000
heap
page read and write
21CCF004000
heap
page read and write
21CCF033000
heap
page read and write
21CD9FBA000
trusted library allocation
page read and write
21CD88E9000
trusted library allocation
page read and write
21CD9378000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE0119000
trusted library allocation
page read and write
21CE36CB000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CE3B84000
trusted library allocation
page read and write
1F605103000
trusted library allocation
page read and write
21CCF044000
heap
page read and write
21CCF01E000
heap
page read and write
21CD80A8000
trusted library allocation
page read and write
1F605F69000
heap
page read and write
21CD81F9000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CE1B05000
trusted library allocation
page read and write
21CD94A4000
trusted library allocation
page read and write
21CD8C63000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CE06FA000
trusted library allocation
page read and write
21CDAAD0000
trusted library allocation
page read and write
21CD8DCC000
trusted library allocation
page read and write
21CD90E4000
trusted library allocation
page read and write
21CE06B0000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF012000
heap
page read and write
21CE00E9000
trusted library allocation
page read and write
21CD9763000
trusted library allocation
page read and write
21CD886C000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD8CBD000
trusted library allocation
page read and write
21CE3654000
trusted library allocation
page read and write
21CDFFE1000
trusted library allocation
page read and write
21CE18BB000
trusted library allocation
page read and write
21CDFF6F000
trusted library allocation
page read and write
21CD88F9000
trusted library allocation
page read and write
1FDB99E0000
heap
page readonly
1F605EF1000
heap
page read and write
2676E30A000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
D40000
unkown
page write copy
2648B1903000
trusted library allocation
page read and write
21CD9720000
trusted library allocation
page read and write
21CD8DD9000
trusted library allocation
page read and write
21CD8C98000
trusted library allocation
page read and write
21CD9325000
trusted library allocation
page read and write
21CE00CA000
trusted library allocation
page read and write
21CDA3C9000
trusted library allocation
page read and write
21CE04EA000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
21CD7F5C000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD9728000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
1FDB9B5D000
trusted library allocation
page read and write
21CD8D24000
trusted library allocation
page read and write
109D3FF000
stack
page read and write
21CDB45C000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD8DC8000
trusted library allocation
page read and write
21CDFF91000
trusted library allocation
page read and write
21CD4FD3000
trusted library allocation
page read and write
21CDB91A000
trusted library allocation
page read and write
21CE0198000
trusted library allocation
page read and write
21CE00C5000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CDA4A5000
trusted library allocation
page read and write
21CD96F3000
trusted library allocation
page read and write
1F605EA8000
heap
page read and write
21CD968F000
trusted library allocation
page read and write
21CCF038000
heap
page read and write
39E645F1E000
trusted library allocation
page read and write
F8F8C7E000
unkown
page readonly
21CD964E000
trusted library allocation
page read and write
1FDB9C76000
heap
page read and write
21CCF020000
heap
page read and write
21CDB4FD000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CD9666000
trusted library allocation
page read and write
21CDAAE9000
trusted library allocation
page read and write
21CE36E4000
trusted library allocation
page read and write
2036414A000
remote allocation
page execute read
21CD8F9F000
trusted library allocation
page read and write
1F605F59000
heap
page read and write
1F605D04000
trusted library allocation
page read and write
21CDFF97000
trusted library allocation
page read and write
21CE03C2000
trusted library allocation
page read and write
21CDA0AF000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
1B8E000
stack
page read and write
21CCF027000
heap
page read and write
21CCF016000
heap
page read and write
20364549000
trusted library allocation
page read and write
21CD949D000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CD960E000
trusted library allocation
page read and write
15E69500000
trusted library allocation
page read and write
21CDA486000
trusted library allocation
page read and write
21CCF00F000
heap
page read and write
21CCF06B000
heap
page read and write
21CD972F000
trusted library allocation
page read and write
21CD5930000
heap
page read and write
21CD9D45000
trusted library allocation
page read and write
21CD99FC000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CCF04B000
heap
page read and write
21CD887A000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CDFFAA000
trusted library allocation
page read and write
21CD99D2000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD96F3000
trusted library allocation
page read and write
21CD9237000
trusted library allocation
page read and write
21CCF01F000
heap
page read and write
21CCF049000
heap
page read and write
20364130000
remote allocation
page read and write
21CCF020000
heap
page read and write
21CDB3D1000
trusted library allocation
page read and write
21CD972F000
trusted library allocation
page read and write
21CD880D000
trusted library allocation
page read and write
21CD4F1F000
trusted library allocation
page read and write
21CD808B000
trusted library allocation
page read and write
21CCF006000
heap
page read and write
21CD973C000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDAAC5000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CD8FDD000
trusted library allocation
page read and write
21CD5188000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF045000
heap
page read and write
21CD8F7F000
trusted library allocation
page read and write
21CD8047000
trusted library allocation
page read and write
21CE00F1000
trusted library allocation
page read and write
21CD96E1000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDA5CD000
trusted library allocation
page read and write
21CE3612000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
21CCF031000
heap
page read and write
21CD8862000
trusted library allocation
page read and write
21CD90D0000
trusted library allocation
page read and write
21CE04EE000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
21CCF02C000
heap
page read and write
21CDA6BF000
trusted library allocation
page read and write
1FDB9B94000
trusted library allocation
page read and write
1F605F69000
heap
page read and write
203646A0000
heap
page read and write
21CE02DC000
trusted library allocation
page read and write
21CE01BC000
trusted library allocation
page read and write
21CE02DF000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CD886F000
trusted library allocation
page read and write
21CD9DE3000
trusted library allocation
page read and write
21CDFF74000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD962E000
trusted library allocation
page read and write
21CE4484000
trusted library allocation
page read and write
21CD8188000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE03D4000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CCF027000
heap
page read and write
21CCF002000
heap
page read and write
1F605F77000
heap
page read and write
21CE0192000
trusted library allocation
page read and write
21CD8FE5000
trusted library allocation
page read and write
21CE0047000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF015000
heap
page read and write
21CE047F000
trusted library allocation
page read and write
1F8E000
stack
page read and write
21CCF00A000
heap
page read and write
21CD8186000
trusted library allocation
page read and write
21CD907C000
trusted library allocation
page read and write
21CD9023000
trusted library allocation
page read and write
1F605F58000
heap
page read and write
21CE00C0000
trusted library allocation
page read and write
21CDFF2D000
trusted library allocation
page read and write
21CD80AD000
trusted library allocation
page read and write
21CE03BE000
trusted library allocation
page read and write
21CD868E000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE00DF000
trusted library allocation
page read and write
21CD8882000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
21CD4FAA000
trusted library allocation
page read and write
21CD8CA2000
trusted library allocation
page read and write
1F604F30000
heap
page read and write
21CE3B75000
trusted library allocation
page read and write
1F605240000
heap
page read and write
21CE02DC000
trusted library allocation
page read and write
21CD9720000
trusted library allocation
page read and write
21CD8D4A000
trusted library allocation
page read and write
21CE01F1000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CD96D7000
trusted library allocation
page read and write
21CDFFF1000
trusted library allocation
page read and write
1F605165000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCF020000
heap
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD92E5000
trusted library allocation
page read and write
21CD90CD000
trusted library allocation
page read and write
21CDA0EF000
trusted library allocation
page read and write
21CD908D000
trusted library allocation
page read and write
21CD928C000
trusted library allocation
page read and write
21CD88C1000
trusted library allocation
page read and write
21CDAA35000
trusted library allocation
page read and write
21CD97D8000
trusted library allocation
page read and write
21CD869B000
trusted library allocation
page read and write
21CD97C9000
trusted library allocation
page read and write
21CE47A3000
trusted library allocation
page read and write
21CD8C9E000
trusted library allocation
page read and write
21CD8CE1000
trusted library allocation
page read and write
21CD5227000
trusted library allocation
page read and write
21CCEFE8000
heap
page read and write
21CD94A4000
trusted library allocation
page read and write
1FDB9D32000
trusted library allocation
page read and write
21CD597A000
heap
page read and write
21CCF00A000
heap
page read and write
21CE01FD000
trusted library allocation
page read and write
21CE3B92000
trusted library allocation
page read and write
21CD96E2000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CCF00D000
heap
page read and write
21CD5264000
trusted library allocation
page read and write
21CD88E9000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CD97E3000
trusted library allocation
page read and write
21CD8D8F000
trusted library allocation
page read and write
21CD52EB000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CDA9A0000
trusted library allocation
page read and write
21CE00AF000
trusted library allocation
page read and write
21CDB6AD000
trusted library allocation
page read and write
21CDFFE1000
trusted library allocation
page read and write
21CDA247000
trusted library allocation
page read and write
21CD8F71000
trusted library allocation
page read and write
21CD94EA000
trusted library allocation
page read and write
21CD8D2F000
trusted library allocation
page read and write
21CD9274000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
1294000
heap
page read and write
21CDB30A000
trusted library allocation
page read and write
21CE02A5000
trusted library allocation
page read and write
109CBFE000
stack
page read and write
21CD8C98000
trusted library allocation
page read and write
21CD96A9000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
1FDB9B67000
trusted library allocation
page read and write
1F6051C2000
trusted library allocation
page read and write
21CE00F1000
trusted library allocation
page read and write
21CD90B8000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF009000
heap
page read and write
21CCEFFE000
heap
page read and write
21CCF008000
heap
page read and write
21CCF01B000
heap
page read and write
21CD9823000
trusted library allocation
page read and write
21CD5248000
trusted library allocation
page read and write
21CE1B27000
heap
page read and write
21CD90D4000
trusted library allocation
page read and write
1F60516F000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD8CE4000
trusted library allocation
page read and write
21CD934B000
trusted library allocation
page read and write
21CD9656000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
20364170000
heap
page read and write
203645F3000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CD7F6F000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD9666000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
2676E040000
heap
page read and write
21CD8D42000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CD529C000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CE00E2000
trusted library allocation
page read and write
21CD80A5000
trusted library allocation
page read and write
21CD8FCA000
trusted library allocation
page read and write
21CCF08D000
heap
page read and write
21CE02C3000
trusted library allocation
page read and write
21CD8D8F000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CCEFE4000
heap
page read and write
21CD973C000
trusted library allocation
page read and write
21CD9845000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CD8C9A000
trusted library allocation
page read and write
21CD4F52000
trusted library allocation
page read and write
21CDA982000
trusted library allocation
page read and write
1F605E69000
heap
page read and write
21CCF027000
heap
page read and write
21CDB3D1000
trusted library allocation
page read and write
21CD96C2000
trusted library allocation
page read and write
21CCEFFD000
heap
page read and write
21CCF02C000
heap
page read and write
21CCF02E000
heap
page read and write
21CD80E4000
trusted library allocation
page read and write
21CD8D46000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
20364805000
trusted library allocation
page read and write
21CDFF38000
trusted library allocation
page read and write
21CDA2BD000
trusted library allocation
page read and write
21CD94CC000
trusted library allocation
page read and write
21CE1828000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CD4018000
trusted library allocation
page read and write
21CD8D75000
trusted library allocation
page read and write
21CD8FEA000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CE0653000
trusted library allocation
page read and write
21CD93AC000
trusted library allocation
page read and write
1FDB9B10000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CE0481000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CCF06B000
heap
page read and write
21CE3B94000
trusted library allocation
page read and write
1FDB97F0000
remote allocation
page read and write
21CD81EA000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD8827000
trusted library allocation
page read and write
21CE1B0C000
trusted library allocation
page read and write
21CD900A000
trusted library allocation
page read and write
21CCF02C000
heap
page read and write
203642DA000
heap
page read and write
21CCEFFD000
heap
page read and write
20364190000
heap
page read and write
21CD96DB000
trusted library allocation
page read and write
21CD90DC000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
3BC1000
heap
page read and write
21CD8C9A000
trusted library allocation
page read and write
21CD8FF8000
trusted library allocation
page read and write
21CE00A6000
trusted library allocation
page read and write
21CD86EE000
trusted library allocation
page read and write
21CE3EFA000
trusted library allocation
page read and write
1294000
heap
page read and write
21CD4066000
trusted library allocation
page read and write
21CE1B48000
trusted library allocation
page read and write
21CD97DD000
trusted library allocation
page read and write
21CD8887000
trusted library allocation
page read and write
21CE03E4000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCEFFE000
heap
page read and write
21CE00E2000
trusted library allocation
page read and write
21CD904B000
trusted library allocation
page read and write
F8F6B7E000
unkown
page readonly
21CD7FCE000
trusted library allocation
page read and write
21CE03AF000
trusted library allocation
page read and write
21CD7F65000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CCF011000
heap
page read and write
21CCF023000
heap
page read and write
21CCF015000
heap
page read and write
21CCF039000
heap
page read and write
21CDAA5A000
trusted library allocation
page read and write
F8F947E000
stack
page read and write
21CE0637000
trusted library allocation
page read and write
20364330000
unclassified section
page read and write
21CCEFFF000
heap
page read and write
21CDFFA1000
trusted library allocation
page read and write
21CD9DC0000
trusted library allocation
page read and write
21CDA4F5000
trusted library allocation
page read and write
21CDB4FE000
trusted library allocation
page read and write
21CD9D9B000
trusted library allocation
page read and write
21CD512D000
trusted library allocation
page read and write
8F3B23E000
unkown
page readonly
21CE1885000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD9346000
trusted library allocation
page read and write
21CD4F1B000
trusted library allocation
page read and write
21CD9D4A000
trusted library allocation
page read and write
21CD94A9000
trusted library allocation
page read and write
21CCF011000
heap
page read and write
21CDFFB1000
trusted library allocation
page read and write
21CDA9F3000
trusted library allocation
page read and write
21CD974E000
trusted library allocation
page read and write
21CDB4F4000
trusted library allocation
page read and write
21CDB6F0000
trusted library allocation
page read and write
21CD9DFE000
trusted library allocation
page read and write
21CD9705000
trusted library allocation
page read and write
21CDFF9E000
trusted library allocation
page read and write
21CD90F6000
trusted library allocation
page read and write
21CD8FF2000
trusted library allocation
page read and write
21CD9D4C000
trusted library allocation
page read and write
21CE364F000
trusted library allocation
page read and write
21CD96DF000
trusted library allocation
page read and write
21CD86C3000
trusted library allocation
page read and write
1F6051E8000
trusted library allocation
page read and write
21CD9954000
trusted library allocation
page read and write
21CD974C000
trusted library allocation
page read and write
21CD5908000
heap
page read and write
21CE1FF5000
trusted library allocation
page read and write
21CE00D5000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
13BE000
heap
page read and write
21CD930E000
trusted library allocation
page read and write
21CDB70B000
trusted library allocation
page read and write
21CDAA7B000
trusted library allocation
page read and write
21CCF020000
heap
page read and write
1F605F58000
heap
page read and write
21CCF01F000
heap
page read and write
21CDBEE9000
trusted library allocation
page read and write
21CDB6B8000
trusted library allocation
page read and write
21CE00F1000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CD90B2000
trusted library allocation
page read and write
21CD8D37000
trusted library allocation
page read and write
21CE1C2E000
trusted library allocation
page read and write
21CD9719000
trusted library allocation
page read and write
21CD8699000
trusted library allocation
page read and write
21CE01BC000
trusted library allocation
page read and write
21CD903C000
trusted library allocation
page read and write
21CD8CD7000
trusted library allocation
page read and write
1F605EE0000
heap
page read and write
21CCF004000
heap
page read and write
21CD8C98000
trusted library allocation
page read and write
21CD8685000
trusted library allocation
page read and write
21CD990B000
trusted library allocation
page read and write
21CE0221000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CD9D9B000
trusted library allocation
page read and write
21CDB358000
trusted library allocation
page read and write
21CDA4F5000
trusted library allocation
page read and write
21CCF039000
heap
page read and write
21CD9663000
trusted library allocation
page read and write
1F605790000
heap
page read and write
21CCF02F000
heap
page read and write
21CD8FF8000
trusted library allocation
page read and write
21CD8FB9000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CD86C3000
trusted library allocation
page read and write
21CD5220000
trusted library allocation
page read and write
21CD9692000
trusted library allocation
page read and write
21CD968F000
trusted library allocation
page read and write
21CD40F6000
trusted library allocation
page read and write
21CE4730000
trusted library allocation
page read and write
21CCF009000
heap
page read and write
21CD5274000
trusted library allocation
page read and write
21CD8CA7000
trusted library allocation
page read and write
21CDAA4D000
trusted library allocation
page read and write
21CD7F9E000
trusted library allocation
page read and write
21CD8CE4000
trusted library allocation
page read and write
21CCF02F000
heap
page read and write
21CCF04B000
heap
page read and write
21CD9D94000
trusted library allocation
page read and write
21CD7B84000
trusted library allocation
page read and write
21CE3643000
trusted library allocation
page read and write
21CCF00E000
heap
page read and write
21CCF02C000
heap
page read and write
15E69389000
heap
page read and write
21CCF017000
heap
page read and write
21CDA3F6000
trusted library allocation
page read and write
21CD51E4000
trusted library allocation
page read and write
21CD8FF2000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CE03F5000
trusted library allocation
page read and write
21CE0660000
trusted library allocation
page read and write
21CD7F82000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CD90B8000
trusted library allocation
page read and write
21CD8CA9000
trusted library allocation
page read and write
21CDBEC7000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD93C9000
trusted library allocation
page read and write
21CD96D2000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
9CE000
stack
page read and write
21CCF01C000
heap
page read and write
21CD8DC8000
trusted library allocation
page read and write
21CD88E3000
trusted library allocation
page read and write
21CD8F7F000
trusted library allocation
page read and write
21CCEFE7000
heap
page read and write
21CCF049000
heap
page read and write
21CE3EEC000
trusted library allocation
page read and write
21CD40FE000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CCF017000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF00F000
heap
page read and write
21CDFFA7000
trusted library allocation
page read and write
21CD90C5000
trusted library allocation
page read and write
21CD8D1A000
trusted library allocation
page read and write
21CD80A2000
trusted library allocation
page read and write
21CE1A87000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CD8698000
trusted library allocation
page read and write
21CDA394000
trusted library allocation
page read and write
21CD93D2000
trusted library allocation
page read and write
21CCF007000
heap
page read and write
21CD90D6000
trusted library allocation
page read and write
21CE3FB5000
trusted library allocation
page read and write
21CE1FFB000
trusted library allocation
page read and write
21CD8F9F000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD92BB000
trusted library allocation
page read and write
21CE365A000
trusted library allocation
page read and write
21CD9DBC000
trusted library allocation
page read and write
1F605F77000
heap
page read and write
F8F9C7E000
unkown
page readonly
21CDB6F9000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CDB995000
trusted library allocation
page read and write
21CDB66B000
trusted library allocation
page read and write
20364503000
trusted library allocation
page read and write
21CD90BD000
trusted library allocation
page read and write
21CDAA98000
trusted library allocation
page read and write
21CD81D0000
trusted library allocation
page read and write
21CD9014000
trusted library allocation
page read and write
21CD9743000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD9673000
trusted library allocation
page read and write
21CE03AF000
trusted library allocation
page read and write
21CD8C3D000
trusted library allocation
page read and write
21CD8163000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF017000
heap
page read and write
21CD885F000
trusted library allocation
page read and write
21CD8DDD000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF004000
heap
page read and write
21CE0165000
trusted library allocation
page read and write
21CDA27A000
trusted library allocation
page read and write
21CE0115000
trusted library allocation
page read and write
21CDB79F000
trusted library allocation
page read and write
21CD5274000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CE473A000
trusted library allocation
page read and write
21CDB7D2000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CD8C83000
trusted library allocation
page read and write
1F605E09000
heap
page read and write
21CDA1AF000
trusted library allocation
page read and write
21CD7BFE000
trusted library allocation
page read and write
21CDFFC8000
trusted library allocation
page read and write
21CDA0BA000
trusted library allocation
page read and write
21CD900C000
trusted library allocation
page read and write
21CCF001000
heap
page read and write
21CD8FF2000
trusted library allocation
page read and write
1F605F2A000
heap
page read and write
203642D0000
heap
page read and write
21CD8D70000
trusted library allocation
page read and write
1F605E60000
heap
page read and write
21CE0323000
trusted library allocation
page read and write
21CD591F000
heap
page read and write
1FDB9830000
heap
page read and write
21CE18D1000
trusted library allocation
page read and write
21CD8FEF000
trusted library allocation
page read and write
21CD80EF000
trusted library allocation
page read and write
21CE0047000
trusted library allocation
page read and write
21CD8DB6000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
21CCF021000
heap
page read and write
21CE3E64000
trusted library allocation
page read and write
21CDB472000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CD9390000
trusted library allocation
page read and write
21CDB664000
trusted library allocation
page read and write
21CD4FEC000
trusted library allocation
page read and write
F8F6A3D000
stack
page read and write
21CCF01B000
heap
page read and write
21CD8C58000
trusted library allocation
page read and write
1F605EF1000
heap
page read and write
21CD8F54000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CE00F1000
trusted library allocation
page read and write
21CD4FFD000
trusted library allocation
page read and write
21CD8847000
trusted library allocation
page read and write
21CDA552000
trusted library allocation
page read and write
1294000
heap
page read and write
21CD88DB000
trusted library allocation
page read and write
1F605EE8000
heap
page read and write
21CCEFFE000
heap
page read and write
21CD96B1000
trusted library allocation
page read and write
21CCF017000
heap
page read and write
21CD96FD000
trusted library allocation
page read and write
21CD9842000
trusted library allocation
page read and write
21CD967F000
trusted library allocation
page read and write
21CD96D4000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CDAA53000
trusted library allocation
page read and write
21CDFF3C000
trusted library allocation
page read and write
21CCF01E000
heap
page read and write
21CD88DB000
trusted library allocation
page read and write
21CCF000000
heap
page read and write
21CCEFFF000
heap
page read and write
21CD8DB6000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
20364578000
trusted library allocation
page read and write
21CCF008000
heap
page read and write
21CD887A000
trusted library allocation
page read and write
21CD96DB000
trusted library allocation
page read and write
20364566000
trusted library allocation
page read and write
21CD80DF000
trusted library allocation
page read and write
21CE0655000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CD9680000
trusted library allocation
page read and write
21CD974E000
trusted library allocation
page read and write
21CD94F2000
trusted library allocation
page read and write
21CE03FE000
trusted library allocation
page read and write
21CE0026000
trusted library allocation
page read and write
21CE252E000
trusted library allocation
page read and write
C71000
unkown
page execute read
21CCF01B000
heap
page read and write
21CD99F9000
trusted library allocation
page read and write
15E692B0000
heap
page read and write
21CE1F7F000
trusted library allocation
page read and write
21CDBED9000
trusted library allocation
page read and write
21CE0160000
trusted library allocation
page read and write
21CD809D000
trusted library allocation
page read and write
21CD568F000
trusted library allocation
page read and write
21CDB340000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CD92DF000
trusted library allocation
page read and write
21CD96FC000
trusted library allocation
page read and write
21CD4F54000
trusted library allocation
page read and write
21CE0307000
trusted library allocation
page read and write
21CD8694000
trusted library allocation
page read and write
21CD9743000
trusted library allocation
page read and write
21CD88B3000
trusted library allocation
page read and write
21CDB679000
trusted library allocation
page read and write
21CDA98F000
trusted library allocation
page read and write
21CCF02E000
heap
page read and write
21CCEFE4000
heap
page read and write
21CCF016000
heap
page read and write
21CE3E9C000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CDA955000
trusted library allocation
page read and write
20364569000
trusted library allocation
page read and write
21CD9D4A000
trusted library allocation
page read and write
21CE186E000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
21CD96E6000
trusted library allocation
page read and write
21CD93FE000
trusted library allocation
page read and write
21CD9783000
trusted library allocation
page read and write
21CD90E6000
trusted library allocation
page read and write
21CD8F94000
trusted library allocation
page read and write
21CE03F2000
trusted library allocation
page read and write
21CD8CC1000
trusted library allocation
page read and write
21CD88CA000
trusted library allocation
page read and write
21CE3B6C000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CDFF9E000
trusted library allocation
page read and write
21CCEFFF000
heap
page read and write
21CDB3DF000
trusted library allocation
page read and write
21CE3B16000
trusted library allocation
page read and write
21CD9DAA000
trusted library allocation
page read and write
21CD80CD000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD9851000
trusted library allocation
page read and write
21CDA2C1000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CDBEC5000
trusted library allocation
page read and write
21CD8C98000
trusted library allocation
page read and write
21CE0685000
trusted library allocation
page read and write
21CD96D7000
trusted library allocation
page read and write
21CD90C7000
trusted library allocation
page read and write
21CE1F6B000
trusted library allocation
page read and write
21CD8D75000
trusted library allocation
page read and write
21CCF021000
heap
page read and write
21CE028A000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDFFC8000
trusted library allocation
page read and write
21CCF045000
heap
page read and write
21CD96E7000
trusted library allocation
page read and write
21CCF04B000
heap
page read and write
2036455D000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCEFE4000
heap
page read and write
13CE000
heap
page read and write
1F60512F000
trusted library allocation
page read and write
21CCF033000
heap
page read and write
21CCEFFF000
heap
page read and write
21CCF01E000
heap
page read and write
21CCF004000
heap
page read and write
21CCF008000
heap
page read and write
21CE1FB5000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CE0244000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD970F000
trusted library allocation
page read and write
21CE026B000
trusted library allocation
page read and write
1F605F44000
heap
page read and write
21CD813B000
trusted library allocation
page read and write
F8F7C3E000
stack
page read and write
21CE06F0000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CD9DE7000
trusted library allocation
page read and write
21CDB95F000
trusted library allocation
page read and write
21CD8C42000
trusted library allocation
page read and write
21CD9739000
trusted library allocation
page read and write
21CCEFFE000
heap
page read and write
21CDA3A4000
trusted library allocation
page read and write
21CCF023000
heap
page read and write
21CE00FD000
trusted library allocation
page read and write
1294000
heap
page read and write
21CD8199000
trusted library allocation
page read and write
21CD8849000
trusted library allocation
page read and write
21CD9692000
trusted library allocation
page read and write
21CD9664000
trusted library allocation
page read and write
21CE36E2000
trusted library allocation
page read and write
21CCF004000
heap
page read and write
21CD8D51000
trusted library allocation
page read and write
21CD90D1000
trusted library allocation
page read and write
21CD7BCB000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CD8D5F000
trusted library allocation
page read and write
1F605E60000
heap
page read and write
21CD93F6000
trusted library allocation
page read and write
21CD80CF000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
21CCF01C000
heap
page read and write
21CD97C9000
trusted library allocation
page read and write
21CE00CF000
trusted library allocation
page read and write
21CDA96C000
trusted library allocation
page read and write
8F3D33E000
unkown
page readonly
21CDA3C3000
trusted library allocation
page read and write
21CD947D000
trusted library allocation
page read and write
21CE1B02000
heap
page read and write
21CCF02C000
heap
page read and write
21CDFF39000
trusted library allocation
page read and write
21CD962C000
trusted library allocation
page read and write
21CD8F9F000
trusted library allocation
page read and write
1F605244000
heap
page read and write
21CDA7B3000
trusted library allocation
page read and write
21CD92DE000
trusted library allocation
page read and write
21CD9651000
trusted library allocation
page read and write
17697686000
trusted library allocation
page execute read
21CD8873000
trusted library allocation
page read and write
21CD9830000
trusted library allocation
page read and write
21CCF049000
heap
page read and write
21CCF00F000
heap
page read and write
21CD96D2000
trusted library allocation
page read and write
21CE0047000
trusted library allocation
page read and write
21CCF005000
heap
page read and write
21CCF033000
heap
page read and write
21CE0464000
trusted library allocation
page read and write
E977D3E000
stack
page read and write
21CDBED5000
trusted library allocation
page read and write
21CD8091000
trusted library allocation
page read and write
21CCF00A000
heap
page read and write
21CD948B000
trusted library allocation
page read and write
21CD9835000
trusted library allocation
page read and write
21CD599E000
heap
page read and write
21CD4F67000
trusted library allocation
page read and write
21CE02E4000
trusted library allocation
page read and write
21CCF016000
heap
page read and write
176976A1000
trusted library allocation
page execute read
21CD9D4C000
trusted library allocation
page read and write
21CD974A000
trusted library allocation
page read and write
21CE1FE3000
trusted library allocation
page read and write
21CCF002000
heap
page read and write
21CCEFFF000
heap
page read and write
21CDA982000
trusted library allocation
page read and write
21CD980B000
trusted library allocation
page read and write
21CD7FA5000
trusted library allocation
page read and write
21CD8FDD000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CCF027000
heap
page read and write
21CCF016000
heap
page read and write
21CD7F1F000
trusted library allocation
page read and write
21CD961A000
trusted library allocation
page read and write
21CCEFFD000
heap
page read and write
21CCF01B000
heap
page read and write
21CD974D000
trusted library allocation
page read and write
1FDB9C20000
unclassified section
page readonly
21CD9484000
trusted library allocation
page read and write
21CCF01C000
heap
page read and write
21CE1FFB000
trusted library allocation
page read and write
21CDA6E1000
trusted library allocation
page read and write
21CD39BF000
trusted library allocation
page read and write
21CD9835000
trusted library allocation
page read and write
21CD86F3000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
1F605D00000
trusted library allocation
page read and write
21CCF012000
heap
page read and write
21CCF03D000
heap
page read and write
21CD96C2000
trusted library allocation
page read and write
21CD8D5E000
trusted library allocation
page read and write
21CD9826000
trusted library allocation
page read and write
21CD947E000
trusted library allocation
page read and write
21CE02CD000
trusted library allocation
page read and write
21CCF06B000
heap
page read and write
21CE02AF000
trusted library allocation
page read and write
21CE00C1000
trusted library allocation
page read and write
21CCF027000
heap
page read and write
21CDB7AB000
trusted library allocation
page read and write
21CCF01B000
heap
page read and write
21CDB909000
trusted library allocation
page read and write
21CD88E5000
trusted library allocation
page read and write
21CDA54E000
trusted library allocation
page read and write
21CD8FB1000
trusted library allocation
page read and write
There are 4107 hidden memdumps, click here to show them.