IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2a8e31d2-c61f-4da1-9ef7-265c5bccd399.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2a8e31d2-c61f-4da1-9ef7-265c5bccd399.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24840072-f694-4f48-95a1-da79ede47ec3} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1dc27c6e310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38509e27-cf62-4645-91ed-874a587441d6} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1dc39da2e10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5196 -prefMapHandle 5344 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b434bde-b94a-4a39-974d-2f8b7ed056e3} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1dc4178a710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://crl.microsoft
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://crl.microso
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
http://crl.microsoom/p
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
http://detectportal.firefox.comA
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.16.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.206.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.16.206
youtube.com
United States
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1DC3FA80000
trusted library allocation
page read and write
1DC3FA7B000
trusted library allocation
page read and write
1D26B669000
heap
page read and write
1DC3FED6000
trusted library allocation
page read and write
1DC3FA88000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA05000
heap
page read and write
1DC3AFCE000
trusted library allocation
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC38D55000
trusted library allocation
page read and write
1DC3FEFE000
trusted library allocation
page read and write
1D26B5F1000
heap
page read and write
1DC420AB000
trusted library allocation
page read and write
1DC391E1000
trusted library allocation
page read and write
1DC3AFBB000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3769A000
trusted library allocation
page read and write
1DC2E9FE000
heap
page read and write
1DC3F9D8000
trusted library allocation
page read and write
1DC38DC0000
trusted library allocation
page read and write
1DC39EDF000
trusted library allocation
page read and write
1DC39497000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3B08D000
trusted library allocation
page read and write
1D26A9F1000
trusted library allocation
page read and write
1DC39135000
trusted library allocation
page read and write
1D26B57F000
heap
page read and write
1DC2E9E0000
heap
page read and write
69F31FC000
stack
page read and write
14B4000
heap
page read and write
1DC38D70000
trusted library allocation
page read and write
1DC34C94000
trusted library allocation
page read and write
1DC2EA63000
heap
page read and write
1DC3916F000
trusted library allocation
page read and write
130B000
stack
page read and write
1DC436ED000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3F944000
trusted library allocation
page read and write
1DC33AEB000
trusted library allocation
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC3B3A3000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC36F33000
trusted library allocation
page read and write
1DC419ED000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC33ADC000
trusted library allocation
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DC402D0000
trusted library allocation
page read and write
1DC43B05000
trusted library allocation
page read and write
1DC3893C000
trusted library allocation
page read and write
1DC3A349000
trusted library allocation
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1D26A977000
trusted library allocation
page read and write
1DEDFD11000
trusted library allocation
page read and write
1DC3769C000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC421FA000
trusted library allocation
page read and write
1DC3339E000
trusted library allocation
page read and write
1DC391C6000
trusted library allocation
page read and write
1DC39CA0000
trusted library allocation
page read and write
1DC3A595000
trusted library allocation
page read and write
1DC3A59A000
trusted library allocation
page read and write
1DC3899D000
trusted library allocation
page read and write
1DC374C8000
heap
page read and write
1D26AE82000
heap
page read and write
1DC3FBA0000
trusted library allocation
page read and write
23E49C47000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3AFEE000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC4224D000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3B0BF000
trusted library allocation
page read and write
1DC389A1000
trusted library allocation
page read and write
1DC3B8A2000
trusted library allocation
page read and write
1DC391C6000
trusted library allocation
page read and write
1DC37CBF000
trusted library allocation
page read and write
1DC38DC0000
trusted library allocation
page read and write
1DC3FC2B000
trusted library allocation
page read and write
1DC3F8DB000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3FC83000
trusted library allocation
page read and write
1DC2EA7E000
heap
page read and write
1DC39EC4000
trusted library allocation
page read and write
1DC3FA88000
trusted library allocation
page read and write
1DC3FEE2000
trusted library allocation
page read and write
1DC3AFDB000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC39E82000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC394A0000
trusted library allocation
page read and write
1DC3A5CF000
trusted library allocation
page read and write
1DC395FD000
trusted library allocation
page read and write
23E49F00000
heap
page read and write
1DC391CC000
trusted library allocation
page read and write
1DC3B3AA000
trusted library allocation
page read and write
1D26B621000
heap
page read and write
1DC389C3000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC2E9F0000
heap
page read and write
1D26B5EC000
heap
page read and write
AFFB1FE000
unkown
page readonly
1DC2EA3C000
heap
page read and write
1DC2EA0B000
heap
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC419E6000
trusted library allocation
page read and write
1DC3FA5C000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3A587000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3946D000
trusted library allocation
page read and write
1DC42333000
trusted library allocation
page read and write
1DC3FFDA000
trusted library allocation
page read and write
1DC38990000
trusted library allocation
page read and write
1DC4179E000
trusted library allocation
page read and write
1DC37483000
heap
page read and write
1DC33A8B000
trusted library allocation
page read and write
1D26B5E6000
heap
page read and write
3B60000
heap
page read and write
1DC39070000
trusted library allocation
page read and write
23E49C12000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC2E9F5000
heap
page read and write
2673C60A000
trusted library allocation
page read and write
23E49CE6000
trusted library allocation
page read and write
1D26B030000
heap
page read and write
1DC41775000
trusted library allocation
page read and write
1DC3FA18000
trusted library allocation
page read and write
1DC3A35B000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC38484000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC3714F000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC38DA0000
trusted library allocation
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC3FE9C000
trusted library allocation
page read and write
1D26B5B9000
heap
page read and write
1DC38D57000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3B0C3000
trusted library allocation
page read and write
1DC4172F000
trusted library allocation
page read and write
1DC3FFAD000
trusted library allocation
page read and write
1DC2EA95000
heap
page read and write
1DC3F8ED000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC39537000
trusted library allocation
page read and write
1DC374AF000
heap
page read and write
1DC3F97A000
trusted library allocation
page read and write
1DC38D2E000
trusted library allocation
page read and write
1D26A95F000
trusted library allocation
page read and write
20DA23E000
unkown
page readonly
1DC3A28F000
trusted library allocation
page read and write
1DC3A313000
trusted library allocation
page read and write
1DC38000000
trusted library allocation
page read and write
1DC394ED000
trusted library allocation
page read and write
1DC3AF8B000
trusted library allocation
page read and write
1DC2EA2F000
heap
page read and write
1DC3FAFD000
trusted library allocation
page read and write
1DC3B3FE000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC2EA63000
heap
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC33923000
trusted library allocation
page read and write
1DC3F8D5000
trusted library allocation
page read and write
1DC33ACC000
trusted library allocation
page read and write
23E49A30000
heap
page read and write
1DC2EA0B000
heap
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC2E9FA000
heap
page read and write
1DC2EA7E000
heap
page read and write
1DC391E8000
trusted library allocation
page read and write
1DC3A36F000
trusted library allocation
page read and write
1DC389FE000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC382DF000
trusted library allocation
page read and write
1DC3B0C8000
trusted library allocation
page read and write
1DC3A1E8000
trusted library allocation
page read and write
1DC393CA000
trusted library allocation
page read and write
1DC3F9C1000
trusted library allocation
page read and write
1DC3774B000
trusted library allocation
page read and write
1DC3BE6A000
heap
page read and write
1DC3FC55000
trusted library allocation
page read and write
1DC3A2D2000
trusted library allocation
page read and write
1DC420B5000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC419A8000
trusted library allocation
page read and write
1DC34C25000
trusted library allocation
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC3B9C5000
trusted library allocation
page read and write
1DC3FC40000
trusted library allocation
page read and write
1DC2EA14000
heap
page read and write
1DC37CD7000
trusted library allocation
page read and write
1DC38D55000
trusted library allocation
page read and write
1DC389B2000
trusted library allocation
page read and write
1DC39FEC000
trusted library allocation
page read and write
1DC3A5EF000
trusted library allocation
page read and write
1DC3FAB7000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC371CD000
trusted library allocation
page read and write
1DC3FA9E000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC37C2E000
trusted library allocation
page read and write
1DEDFDDB000
trusted library allocation
page read and write
1DC3FC16000
trusted library allocation
page read and write
1DC3F8A8000
trusted library allocation
page read and write
1DC38D07000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FC59000
trusted library allocation
page read and write
1DC2EA95000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3AF26000
trusted library allocation
page read and write
1DC391F8000
trusted library allocation
page read and write
1DC3A353000
trusted library allocation
page read and write
1DC37894000
trusted library allocation
page read and write
1DC392FD000
trusted library allocation
page read and write
1D26B669000
heap
page read and write
1DC3A3C4000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1D26A890000
heap
page read and write
1DC3A5F6000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC39189000
trusted library allocation
page read and write
1DC34CEB000
trusted library allocation
page read and write
1DC3822E000
trusted library allocation
page read and write
1DC37C7F000
trusted library allocation
page read and write
1DC2EA05000
heap
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3767C000
trusted library allocation
page read and write
1DC420A4000
trusted library allocation
page read and write
1DC371F4000
trusted library allocation
page read and write
20D5FAE000
unkown
page readonly
1DC38DA6000
trusted library allocation
page read and write
1DC3916F000
trusted library allocation
page read and write
1DC38D59000
trusted library allocation
page read and write
1DC3FC11000
trusted library allocation
page read and write
1DEDFDB7000
trusted library allocation
page read and write
1DEDFD46000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC2E9EF000
heap
page read and write
20D5F2E000
unkown
page readonly
1DC2EA3C000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC41F71000
trusted library allocation
page read and write
1DC3A00A000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3A4A3000
trusted library allocation
page read and write
1DC3F9F6000
trusted library allocation
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC3A5FA000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
201D5150000
heap
page read and write
1DC2E9F3000
heap
page read and write
1DC3FA31000
trusted library allocation
page read and write
1DC34ACC000
trusted library allocation
page read and write
1DC3FE3C000
trusted library allocation
page read and write
1DC38959000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC2EA4D000
heap
page read and write
1D26B569000
heap
page read and write
1DC421EB000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC2EA4C000
heap
page read and write
1DC3A35B000
trusted library allocation
page read and write
15D0000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC3B338000
trusted library allocation
page read and write
201D55B0000
heap
page read and write
1DC37CE8000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3AFF4000
trusted library allocation
page read and write
1DC3FA7B000
trusted library allocation
page read and write
1DC3FC62000
trusted library allocation
page read and write
1DC2EA5F000
heap
page read and write
2673C360000
heap
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC38F79000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC389BC000
trusted library allocation
page read and write
1DC420AC000
trusted library allocation
page read and write
1DC3FA36000
trusted library allocation
page read and write
1DC3FBD8000
trusted library allocation
page read and write
1DC402CF000
trusted library allocation
page read and write
1DC382CA000
trusted library allocation
page read and write
1DC419ED000
trusted library allocation
page read and write
1DC3FE5D000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC3A2BA000
trusted library allocation
page read and write
F02000
unkown
page readonly
23E49C6E000
trusted library allocation
page read and write
1DC3FA4D000
trusted library allocation
page read and write
1DC378D6000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2EA76000
heap
page read and write
1DEDFBA0000
heap
page read and write
1DC3B9E4000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3BA01000
trusted library allocation
page read and write
1DC39083000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC382DC000
trusted library allocation
page read and write
1DC42078000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3F993000
trusted library allocation
page read and write
1DC39CC6000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39B9F000
trusted library allocation
page read and write
1DC4192F000
trusted library allocation
page read and write
1DC3FA1C000
trusted library allocation
page read and write
1DEDF9F0000
unclassified section
page readonly
1DC3F94E000
trusted library allocation
page read and write
1DC3FC47000
trusted library allocation
page read and write
1DC37873000
trusted library allocation
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC39083000
trusted library allocation
page read and write
1DC3AF80000
trusted library allocation
page read and write
23E49C00000
trusted library allocation
page read and write
1DC3AF66000
trusted library allocation
page read and write
1DC3F988000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
15F367E000
stack
page read and write
1DC3A5BB000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
AFF91BE000
stack
page read and write
1DC39CC4000
trusted library allocation
page read and write
1DC3B39C000
trusted library allocation
page read and write
1DC3F94E000
trusted library allocation
page read and write
1DC2EA14000
heap
page read and write
1DC38F4C000
trusted library allocation
page read and write
1DC3A3AF000
trusted library allocation
page read and write
69F41FF000
stack
page read and write
1DC374C2000
heap
page read and write
1DC3F93C000
trusted library allocation
page read and write
1DC38D55000
trusted library allocation
page read and write
E40000
unkown
page readonly
69F31FF000
stack
page read and write
1DC38ED9000
trusted library allocation
page read and write
1DEDFDF6000
trusted library allocation
page read and write
1DC3FFB5000
trusted library allocation
page read and write
1DC3FFC7000
trusted library allocation
page read and write
1D26A6E0000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3905B000
trusted library allocation
page read and write
1DC333B3000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC394EF000
trusted library allocation
page read and write
1DC3A04D000
trusted library allocation
page read and write
1DC394D4000
trusted library allocation
page read and write
1DC3B948000
trusted library allocation
page read and write
1DC2EA50000
heap
page read and write
1DC2EA47000
heap
page read and write
1DC34CF6000
trusted library allocation
page read and write
1DC3FBA7000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39CDD000
trusted library allocation
page read and write
1DC34ACC000
trusted library allocation
page read and write
1DC3A3C8000
trusted library allocation
page read and write
23E49E1D000
trusted library allocation
page read and write
1DC3B0E0000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC394E8000
trusted library allocation
page read and write
1DC39148000
trusted library allocation
page read and write
166F000
heap
page read and write
1D26B621000
heap
page read and write
1DC3A489000
trusted library allocation
page read and write
AFF807B000
stack
page read and write
1DC39094000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC33A66000
trusted library allocation
page read and write
1DC38479000
trusted library allocation
page read and write
1DC34CC7000
trusted library allocation
page read and write
1DC3FB50000
trusted library allocation
page read and write
1D26A962000
trusted library allocation
page read and write
1DC34C9D000
trusted library allocation
page read and write
1D26B622000
heap
page read and write
1DC42333000
trusted library allocation
page read and write
1DC3AFD3000
trusted library allocation
page read and write
1DC3849D000
trusted library allocation
page read and write
1DC39092000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC41200000
trusted library allocation
page read and write
1DC3AF38000
trusted library allocation
page read and write
201D6D65000
heap
page read and write
1DC3A3AF000
trusted library allocation
page read and write
1DC38477000
trusted library allocation
page read and write
1DC3F9D8000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC39398000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3FCFE000
trusted library allocation
page read and write
1DC38444000
trusted library allocation
page read and write
1DC3789A000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3935B000
trusted library allocation
page read and write
1DC3B335000
trusted library allocation
page read and write
1DC3A339000
trusted library allocation
page read and write
1DC2E9F8000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC36FF7000
trusted library allocation
page read and write
1D26B5E0000
heap
page read and write
1DC397FD000
trusted library allocation
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC2E9FF000
heap
page read and write
1D26B5E9000
heap
page read and write
131F000
stack
page read and write
1D26A986000
trusted library allocation
page read and write
23E49C65000
trusted library allocation
page read and write
1DC2EA32000
heap
page read and write
1D26B55C000
heap
page read and write
1DC390EB000
trusted library allocation
page read and write
1DC37C8D000
trusted library allocation
page read and write
1DC3FF5A000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FB0D000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DEDFDC4000
trusted library allocation
page read and write
1DC420B5000
trusted library allocation
page read and write
1DC41F93000
trusted library allocation
page read and write
1DC2E9D1000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC3B3FA000
trusted library allocation
page read and write
1DC39C53000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3AFFD000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3A336000
trusted library allocation
page read and write
1DC3BE35000
heap
page read and write
1DC378BB000
trusted library allocation
page read and write
1DC3A407000
trusted library allocation
page read and write
23E49C03000
trusted library allocation
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC37CC2000
trusted library allocation
page read and write
1DC3FF8A000
trusted library allocation
page read and write
1DC3AFD3000
trusted library allocation
page read and write
1DC3B3EE000
trusted library allocation
page read and write
1DC39546000
trusted library allocation
page read and write
1DC34C62000
trusted library allocation
page read and write
1DC2E9E6000
heap
page read and write
1DC2E9F4000
heap
page read and write
1DC378AA000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC2EA5F000
heap
page read and write
1DC421FC000
trusted library allocation
page read and write
1DC3FFB8000
trusted library allocation
page read and write
1DC3FFD6000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
2673C3B0000
heap
page read and write
1DC38965000
trusted library allocation
page read and write
1D26B669000
heap
page read and write
1DC3A3B2000
trusted library allocation
page read and write
1DC3AF91000
trusted library allocation
page read and write
1DC39DC6000
trusted library allocation
page read and write
1DC3FB3C000
trusted library allocation
page read and write
1DC3FC62000
trusted library allocation
page read and write
1DC3938E000
trusted library allocation
page read and write
1DC39546000
trusted library allocation
page read and write
1DC2EA3B000
heap
page read and write
23E49E3D000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC39306000
trusted library allocation
page read and write
1DC3A3FA000
trusted library allocation
page read and write
1DC39002000
trusted library allocation
page read and write
1D26B63B000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC37761000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC39163000
trusted library allocation
page read and write
1DC3F9F2000
trusted library allocation
page read and write
201D5280000
heap
page read and write
23E49E03000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC2EA59000
heap
page read and write
1DC3FC11000
trusted library allocation
page read and write
1DC38D9A000
trusted library allocation
page read and write
1DC37865000
trusted library allocation
page read and write
1DC3FAB9000
trusted library allocation
page read and write
1D26A9BD000
trusted library allocation
page read and write
1DC384CD000
trusted library allocation
page read and write
1DC3FC69000
trusted library allocation
page read and write
1DC378D1000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1DC419CB000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3A4D0000
trusted library allocation
page read and write
20D8A3E000
stack
page read and write
1DC2EA3C000
heap
page read and write
1DC3B3D9000
trusted library allocation
page read and write
1D26A974000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC3FFCE000
trusted library allocation
page read and write
1DC3FBE3000
trusted library allocation
page read and write
1DC41905000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC39175000
trusted library allocation
page read and write
1DC3A29D000
trusted library allocation
page read and write
1DC3918D000
trusted library allocation
page read and write
3FB15081E000
trusted library allocation
page read and write
1DC41F6F000
trusted library allocation
page read and write
1DC390C1000
trusted library allocation
page read and write
1DC421E5000
trusted library allocation
page read and write
1DC2EA7E000
heap
page read and write
1DC39DA7000
trusted library allocation
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC39083000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FEF0000
trusted library allocation
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC394A0000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC38477000
trusted library allocation
page read and write
1DC39FE0000
trusted library allocation
page read and write
1DC38A54000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC34AC9000
trusted library allocation
page read and write
1DC2E9E6000
heap
page read and write
1DC3B3D7000
trusted library allocation
page read and write
1DC3FA80000
trusted library allocation
page read and write
1DC3AFEE000
trusted library allocation
page read and write
1DC2EA59000
heap
page read and write
1DC39CF1000
trusted library allocation
page read and write
1DC3FBE5000
trusted library allocation
page read and write
1DC2EA11000
heap
page read and write
1DC39CE1000
trusted library allocation
page read and write
1DC41FF7000
trusted library allocation
page read and write
1DC3AFEC000
trusted library allocation
page read and write
1DC3F93F000
trusted library allocation
page read and write
1DC374A5000
heap
page read and write
1DEE0100000
trusted library allocation
page read and write
1DC3AFDB000
trusted library allocation
page read and write
23E49CB7000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC38214000
trusted library allocation
page read and write
1D26A910000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9F1000
heap
page read and write
1D26B644000
heap
page read and write
1DC37C90000
trusted library allocation
page read and write
1DC3FC55000
trusted library allocation
page read and write
1DC39086000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC38AE0000
trusted library allocation
page read and write
1DC384F1000
trusted library allocation
page read and write
1DC3906E000
trusted library allocation
page read and write
1DC3958B000
trusted library allocation
page read and write
1DC3B34C000
trusted library allocation
page read and write
1D26B55C000
heap
page read and write
15F0B1E000
stack
page read and write
1DC37CE7000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC43400000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3B34C000
trusted library allocation
page read and write
1DC37770000
trusted library allocation
page read and write
1DC3AF44000
trusted library allocation
page read and write
1DC3FBEE000
trusted library allocation
page read and write
1DC3FC37000
trusted library allocation
page read and write
AFFA1FE000
unkown
page readonly
1DC3FA4D000
trusted library allocation
page read and write
1DC38F1E000
trusted library allocation
page read and write
1DC3FAB3000
trusted library allocation
page read and write
1DC382DC000
trusted library allocation
page read and write
1DC3A28F000
trusted library allocation
page read and write
1DC2E9FD000
heap
page read and write
1DC2EA02000
heap
page read and write
1D26A5B0000
heap
page read and write
1DC37CCB000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC3906E000
trusted library allocation
page read and write
1DC3AF73000
trusted library allocation
page read and write
1DC378AE000
trusted library allocation
page read and write
1DC3FA3C000
trusted library allocation
page read and write
1DC2EA50000
heap
page read and write
1DC3945A000
trusted library allocation
page read and write
1DC3A4DB000
trusted library allocation
page read and write
1DC3954B000
trusted library allocation
page read and write
1DEDF9EC000
remote allocation
page execute read
1DC3FA88000
trusted library allocation
page read and write
1DC34CAA000
trusted library allocation
page read and write
1DC2EA3B000
heap
page read and write
1DC38A4E000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC376C9000
trusted library allocation
page read and write
1DC389A1000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC2EA51000
heap
page read and write
1DC3FA36000
trusted library allocation
page read and write
1DC421BE000
trusted library allocation
page read and write
1DC3FBC7000
trusted library allocation
page read and write
1DC3FB4B000
trusted library allocation
page read and write
1DC34CDD000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC419EA000
trusted library allocation
page read and write
1DC3FFEE000
trusted library allocation
page read and write
1DC3822E000
trusted library allocation
page read and write
1DC391C6000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC3A359000
trusted library allocation
page read and write
1DC3773F000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3FA05000
trusted library allocation
page read and write
1DC3FAB3000
trusted library allocation
page read and write
1DC33A75000
trusted library allocation
page read and write
1DC395DB000
trusted library allocation
page read and write
1DC3FAB3000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC2E9E9000
heap
page read and write
1DC39563000
trusted library allocation
page read and write
1DC39187000
trusted library allocation
page read and write
1DC3FC18000
trusted library allocation
page read and write
1DC3FC47000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38975000
trusted library allocation
page read and write
23E49D84000
heap
page read and write
1DC391C1000
trusted library allocation
page read and write
1DC3768F000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
201D5172000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC394C4000
trusted library allocation
page read and write
1DC37C72000
trusted library allocation
page read and write
15F0B5E000
unkown
page readonly
1DC38479000
trusted library allocation
page read and write
1DC3F9F2000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3A359000
trusted library allocation
page read and write
1DC3A100000
trusted library allocation
page read and write
1DC3AFEC000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC2EA4C000
heap
page read and write
1DC3B3DD000
trusted library allocation
page read and write
1DC3FBB2000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC2EA4C000
heap
page read and write
1DC3A3A5000
trusted library allocation
page read and write
1DC3FAB7000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC34C42000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3788F000
trusted library allocation
page read and write
1DC3841A000
trusted library allocation
page read and write
1DC39079000
trusted library allocation
page read and write
1DC43667000
trusted library allocation
page read and write
1DC3A1F8000
trusted library allocation
page read and write
1DC39092000
trusted library allocation
page read and write
1DC37690000
trusted library allocation
page read and write
1DC2E9DC000
heap
page read and write
1DC390AA000
trusted library allocation
page read and write
1DC3FEB0000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC391FC000
trusted library allocation
page read and write
1DC38496000
trusted library allocation
page read and write
1DC39141000
trusted library allocation
page read and write
1DC33A91000
trusted library allocation
page read and write
1DC38D57000
trusted library allocation
page read and write
1DC38D48000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1D26A9C7000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC2E9FA000
heap
page read and write
1DC38D90000
trusted library allocation
page read and write
1DC391F3000
trusted library allocation
page read and write
1DC39123000
trusted library allocation
page read and write
1DC3A37F000
trusted library allocation
page read and write
1DC3FFC0000
trusted library allocation
page read and write
1DC390B0000
trusted library allocation
page read and write
1DC3FBB6000
trusted library allocation
page read and write
1DC3A3AF000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC395F8000
trusted library allocation
page read and write
132E000
stack
page read and write
1DC389C7000
trusted library allocation
page read and write
1DC36FC0000
trusted library allocation
page read and write
1DC394F0000
trusted library allocation
page read and write
1DC3820D000
trusted library allocation
page read and write
1DC420F0000
trusted library allocation
page read and write
1DC391CE000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC402D4000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC390EF000
trusted library allocation
page read and write
1DC3FFA9000
trusted library allocation
page read and write
1DC37C5D000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC38D9A000
trusted library allocation
page read and write
1DC389ED000
trusted library allocation
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1DC417B7000
trusted library allocation
page read and write
1DC378D1000
trusted library allocation
page read and write
1DC3F93F000
trusted library allocation
page read and write
1DC2E9DC000
heap
page read and write
1DC39DA7000
trusted library allocation
page read and write
1DC3FC1F000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC389C0000
trusted library allocation
page read and write
1DC38F9C000
trusted library allocation
page read and write
1DC3A3CA000
trusted library allocation
page read and write
1DC390C8000
trusted library allocation
page read and write
1DC39070000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC39C7A000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC36FCB000
trusted library allocation
page read and write
1DC3948F000
trusted library allocation
page read and write
1DC3FAC0000
trusted library allocation
page read and write
1DC419B5000
trusted library allocation
page read and write
1DC38F7F000
trusted library allocation
page read and write
1DC3FAB9000
trusted library allocation
page read and write
1DC39CC3000
trusted library allocation
page read and write
1DC2EA45000
heap
page read and write
1DC3914B000
trusted library allocation
page read and write
1DC43002000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3FBE5000
trusted library allocation
page read and write
1DC37CFB000
trusted library allocation
page read and write
1D26A96F000
trusted library allocation
page read and write
1DC421FC000
trusted library allocation
page read and write
1D26A9E9000
trusted library allocation
page read and write
1DC39070000
trusted library allocation
page read and write
1DC37458000
heap
page read and write
1DC37459000
heap
page read and write
1DEDF9D0000
remote allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC371C8000
trusted library allocation
page read and write
1DC38424000
trusted library allocation
page read and write
1DC420F0000
trusted library allocation
page read and write
1DC3A5A6000
trusted library allocation
page read and write
1DC3F97F000
trusted library allocation
page read and write
1DC3775A000
trusted library allocation
page read and write
1DC3F97F000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
166F000
heap
page read and write
1DC3765B000
trusted library allocation
page read and write
1DC3AFCE000
trusted library allocation
page read and write
1DC2EA9F000
heap
page read and write
1DC34C6C000
trusted library allocation
page read and write
1DC37C52000
trusted library allocation
page read and write
1DEDFD0E000
trusted library allocation
page read and write
1DC2EA51000
heap
page read and write
1DC374A5000
heap
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2EA5B000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3A2BA000
trusted library allocation
page read and write
1DC3FCFE000
trusted library allocation
page read and write
AFF80FE000
unkown
page readonly
1DC3A3FA000
trusted library allocation
page read and write
1657000
heap
page read and write
1DC3A497000
trusted library allocation
page read and write
1DC3AF68000
trusted library allocation
page read and write
1DC39CC3000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC3F9F2000
trusted library allocation
page read and write
1DEDFD78000
trusted library allocation
page read and write
1DC3A3C2000
trusted library allocation
page read and write
1DC37163000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC38465000
trusted library allocation
page read and write
1DC3FECA000
trusted library allocation
page read and write
1DC2EA45000
heap
page read and write
1DC39148000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC37428000
heap
page read and write
1DC3FAB9000
trusted library allocation
page read and write
1DC3A00D000
trusted library allocation
page read and write
1DC391E1000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC37C2E000
trusted library allocation
page read and write
1DC3915E000
trusted library allocation
page read and write
1658000
heap
page read and write
1DC391D9000
trusted library allocation
page read and write
1DC3F906000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC39CF1000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3913F000
trusted library allocation
page read and write
23E49992000
unclassified section
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1DC3A4E1000
trusted library allocation
page read and write
2673C600000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3B3DD000
trusted library allocation
page read and write
201D6D60000
heap
page read and write
1DC36FDB000
trusted library allocation
page read and write
1DC38EA3000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC38433000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC3FEF8000
trusted library allocation
page read and write
D6E1B11000
trusted library allocation
page execute read
1DC3773C000
trusted library allocation
page read and write
1DC2EA79000
heap
page read and write
1DC3FE42000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC3FBF8000
trusted library allocation
page read and write
1DC3AFAF000
trusted library allocation
page read and write
1DC34CBC000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC2EA3B000
heap
page read and write
1DC3A5F6000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC3BE45000
heap
page read and write
1DC339F6000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1D26B5F1000
heap
page read and write
1DC2EA4C000
heap
page read and write
1DC38212000
trusted library allocation
page read and write
1DC3843D000
trusted library allocation
page read and write
1DC3A2C3000
trusted library allocation
page read and write
F0C000
unkown
page read and write
1DC2EA4C000
heap
page read and write
15F2E3E000
stack
page read and write
1DC382B9000
trusted library allocation
page read and write
1DC42306000
trusted library allocation
page read and write
1DC3A36F000
trusted library allocation
page read and write
1DC394BC000
trusted library allocation
page read and write
1DC3A297000
trusted library allocation
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1DC38D50000
trusted library allocation
page read and write
1DC349F0000
trusted library allocation
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1DC39543000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC3C6A3000
trusted library allocation
page read and write
1DC2EA09000
heap
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC38D1A000
trusted library allocation
page read and write
1DC38470000
trusted library allocation
page read and write
1DC3932E000
trusted library allocation
page read and write
1DC38D59000
trusted library allocation
page read and write
1DC3915E000
trusted library allocation
page read and write
1DC3FC59000
trusted library allocation
page read and write
1DC2EA52000
heap
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC3B9AC000
trusted library allocation
page read and write
1DC39DC4000
trusted library allocation
page read and write
201D55B5000
heap
page read and write
1DC3FBF6000
trusted library allocation
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC43632000
trusted library allocation
page read and write
1DC38FD5000
trusted library allocation
page read and write
1DC3FEB5000
trusted library allocation
page read and write
1DC3A023000
trusted library allocation
page read and write
1DC3F92A000
trusted library allocation
page read and write
1DC39CC3000
trusted library allocation
page read and write
1DC382B3000
trusted library allocation
page read and write
1DC3895B000
trusted library allocation
page read and write
1DC33A94000
trusted library allocation
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC3786E000
trusted library allocation
page read and write
1DC3895B000
trusted library allocation
page read and write
1DC3A29C000
trusted library allocation
page read and write
1DC38F97000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3A2BA000
trusted library allocation
page read and write
1DC2EA51000
heap
page read and write
1DC4209A000
trusted library allocation
page read and write
1DC33398000
trusted library allocation
page read and write
1DC34C3F000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DEDFD03000
trusted library allocation
page read and write
1DC43664000
trusted library allocation
page read and write
1DC394AA000
trusted library allocation
page read and write
1DC3FC16000
trusted library allocation
page read and write
1DC39CC3000
trusted library allocation
page read and write
23E497B1000
remote allocation
page execute read
1DC3FF70000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC34CEB000
trusted library allocation
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC3B3FA000
trusted library allocation
page read and write
1DC3FBF8000
trusted library allocation
page read and write
1DC39533000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1D26A66E000
heap
page read and write
1DC38930000
trusted library allocation
page read and write
1DC38E8F000
trusted library allocation
page read and write
1DC39CC6000
trusted library allocation
page read and write
1DC3944C000
trusted library allocation
page read and write
1DC39CC6000
trusted library allocation
page read and write
1DC395D8000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC38A5C000
trusted library allocation
page read and write
1DC34CC1000
trusted library allocation
page read and write
1DC3B9A3000
trusted library allocation
page read and write
1DC38C53000
trusted library allocation
page read and write
1DC38230000
trusted library allocation
page read and write
1DC38A3F000
trusted library allocation
page read and write
1DC3F8E3000
trusted library allocation
page read and write
1D26B5EC000
heap
page read and write
1DC3AFF4000
trusted library allocation
page read and write
1D26B5EC000
heap
page read and write
1DC2EA5B000
heap
page read and write
1DC42C00000
trusted library allocation
page read and write
1DC2EA0F000
heap
page read and write
1DC3FA80000
trusted library allocation
page read and write
1DC2EA5B000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC38487000
trusted library allocation
page read and write
1DC3FAB7000
trusted library allocation
page read and write
1DC3948A000
trusted library allocation
page read and write
1DC390D7000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3F8ED000
trusted library allocation
page read and write
1DC38AF1000
trusted library allocation
page read and write
1DC3FFAF000
trusted library allocation
page read and write
1DC3FC1F000
trusted library allocation
page read and write
1DC3AFE4000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC2EA32000
heap
page read and write
1DC3A2B4000
trusted library allocation
page read and write
1DC3AF1D000
trusted library allocation
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC33A26000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DEDFE74000
heap
page read and write
1DC3A5FA000
trusted library allocation
page read and write
1DC3B2EF000
trusted library allocation
page read and write
1DC394C0000
trusted library allocation
page read and write
1DC42357000
trusted library allocation
page read and write
23E49A33000
heap
page read and write
1DC3F97F000
trusted library allocation
page read and write
1DC2EA58000
heap
page read and write
1DC3FC37000
trusted library allocation
page read and write
1DC378CD000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC38D59000
trusted library allocation
page read and write
1DC39173000
trusted library allocation
page read and write
23E49C10000
trusted library allocation
page read and write
1DC3905F000
trusted library allocation
page read and write
1DC34AC9000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC2E9F7000
heap
page read and write
1DC39E70000
trusted library allocation
page read and write
1DC391B8000
trusted library allocation
page read and write
1D26A896000
heap
page read and write
1DC38D24000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC3FAB5000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC3F916000
trusted library allocation
page read and write
1DC3FC2B000
trusted library allocation
page read and write
1675000
heap
page read and write
1DC38226000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC37C5B000
trusted library allocation
page read and write
1DC3392F000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3FA9E000
trusted library allocation
page read and write
1DC3FFC7000
trusted library allocation
page read and write
1DC3F8B0000
trusted library allocation
page read and write
1DC3A1E6000
trusted library allocation
page read and write
1DC374CF000
heap
page read and write
1DC38D7B000
trusted library allocation
page read and write
1DC3890A000
trusted library allocation
page read and write
1DC3A3C2000
trusted library allocation
page read and write
201D5182000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC3914E000
trusted library allocation
page read and write
1DC390CF000
trusted library allocation
page read and write
1DC34C42000
trusted library allocation
page read and write
1630000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC42088000
trusted library allocation
page read and write
1DC3FBDD000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC37CF2000
trusted library allocation
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC2E9D4000
heap
page read and write
1DC3FF3B000
trusted library allocation
page read and write
1DC390C1000
trusted library allocation
page read and write
1DC38D6B000
trusted library allocation
page read and write
1DC419B5000
trusted library allocation
page read and write
1DC34CDC000
trusted library allocation
page read and write
1DC42088000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC38F2D000
trusted library allocation
page read and write
1DC389C0000
trusted library allocation
page read and write
1DC3FBAF000
trusted library allocation
page read and write
1DC34ACF000
trusted library allocation
page read and write
1DC3FFAF000
trusted library allocation
page read and write
1DC2E9F7000
heap
page read and write
1DC3FAFD000
trusted library allocation
page read and write
1DC37496000
heap
page read and write
1DC3BE71000
heap
page read and write
1DC3FB34000
trusted library allocation
page read and write
1DC3FFB8000
trusted library allocation
page read and write
222F000
stack
page read and write
1DC420FE000
trusted library allocation
page read and write
1DC402E8000
trusted library allocation
page read and write
1DC3AFC2000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9F1000
heap
page read and write
14B4000
heap
page read and write
1DC3FFD4000
trusted library allocation
page read and write
1DC390EF000
trusted library allocation
page read and write
1DC39385000
trusted library allocation
page read and write
1DC3FC37000
trusted library allocation
page read and write
1DC3F988000
trusted library allocation
page read and write
1DEDFBC0000
heap
page read and write
1DC384C3000
trusted library allocation
page read and write
1DC38A54000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC3F8F5000
trusted library allocation
page read and write
1DC420A0000
trusted library allocation
page read and write
1DC41781000
trusted library allocation
page read and write
1D26A99F000
trusted library allocation
page read and write
1DC390B0000
trusted library allocation
page read and write
1DC3AF21000
trusted library allocation
page read and write
1DC4220C000
trusted library allocation
page read and write
1DC39EF7000
trusted library allocation
page read and write
1DC38D5F000
trusted library allocation
page read and write
1DC382D7000
trusted library allocation
page read and write
1DC33A17000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3FAB7000
trusted library allocation
page read and write
1DC3F992000
trusted library allocation
page read and write
1DC37684000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3FBE9000
trusted library allocation
page read and write
1DC3FBE5000
trusted library allocation
page read and write
1DC3A3B9000
trusted library allocation
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1DC3FFE2000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC3AFEC000
trusted library allocation
page read and write
1DC419C1000
trusted library allocation
page read and write
1DC42248000
trusted library allocation
page read and write
23E49CE9000
trusted library allocation
page read and write
1DC38EC3000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3B2F5000
trusted library allocation
page read and write
1DC420C3000
trusted library allocation
page read and write
1DC3FF5A000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC37480000
heap
page read and write
1DC38D1A000
trusted library allocation
page read and write
1DC2EA60000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1DC3BEBC000
heap
page read and write
1DC420F9000
trusted library allocation
page read and write
1DC390C9000
trusted library allocation
page read and write
1DC394FB000
trusted library allocation
page read and write
1DC39DA2000
trusted library allocation
page read and write
1DC3A02E000
trusted library allocation
page read and write
1DEDFB10000
heap
page read and write
1DEDFA20000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3A359000
trusted library allocation
page read and write
1DC41F6B000
trusted library allocation
page read and write
AFF91FE000
unkown
page readonly
20D5F6E000
stack
page read and write
1DC3A388000
trusted library allocation
page read and write
1DC2E9DC000
heap
page read and write
D6E1AF1000
trusted library allocation
page execute read
1DC3FACD000
trusted library allocation
page read and write
15F4E7E000
unkown
page readonly
1DC3AFC2000
trusted library allocation
page read and write
1DC39548000
trusted library allocation
page read and write
1DC3F90A000
trusted library allocation
page read and write
1DC4207C000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC3B2DC000
trusted library allocation
page read and write
1DC39079000
trusted library allocation
page read and write
1DC3A5F1000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC2EA50000
heap
page read and write
1DC3A2D8000
trusted library allocation
page read and write
1DC3FA81000
trusted library allocation
page read and write
1DC3FBE9000
trusted library allocation
page read and write
1DC2EA05000
heap
page read and write
1DC34A77000
trusted library allocation
page read and write
1D26B5A1000
heap
page read and write
1DC3A028000
trusted library allocation
page read and write
1DC3AF6C000
trusted library allocation
page read and write
1DC3B884000
trusted library allocation
page read and write
1DC3FA53000
trusted library allocation
page read and write
1DC3906E000
trusted library allocation
page read and write
1DC38D4C000
trusted library allocation
page read and write
1DC419ED000
trusted library allocation
page read and write
1DC41741000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC378DC000
trusted library allocation
page read and write
1DC3FC8F000
trusted library allocation
page read and write
1DC3A2B8000
trusted library allocation
page read and write
1DC421F0000
trusted library allocation
page read and write
1DC38F88000
trusted library allocation
page read and write
1DC3A347000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC391C6000
trusted library allocation
page read and write
23E49C0D000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC3A355000
trusted library allocation
page read and write
1DC38D79000
trusted library allocation
page read and write
1DC389ED000
trusted library allocation
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DC3788C000
trusted library allocation
page read and write
1DC391FC000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC39094000
trusted library allocation
page read and write
1DC394F5000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC384CB000
trusted library allocation
page read and write
1DC3A3C2000
trusted library allocation
page read and write
1653000
heap
page read and write
1DC2EA5A000
heap
page read and write
1DC37883000
trusted library allocation
page read and write
1DC392CC000
trusted library allocation
page read and write
1DC3A31B000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC3B338000
trusted library allocation
page read and write
1DC3A29F000
trusted library allocation
page read and write
23E49C5B000
trusted library allocation
page read and write
1DC39CE4000
trusted library allocation
page read and write
1DC391C1000
trusted library allocation
page read and write
1DC2EA14000
heap
page read and write
1DC38D8D000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC3FB50000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC34CF6000
trusted library allocation
page read and write
AE46BFE000
stack
page read and write
1DC2EA4C000
heap
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC378A2000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC3FBE9000
trusted library allocation
page read and write
1DC3B3D1000
trusted library allocation
page read and write
1DC38D7B000
trusted library allocation
page read and write
1DC3A4DB000
trusted library allocation
page read and write
1DC3FFC7000
trusted library allocation
page read and write
1DC38949000
trusted library allocation
page read and write
1DC39E0B000
trusted library allocation
page read and write
1DC3F8DF000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3FFC4000
trusted library allocation
page read and write
1DC38983000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3A1CC000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC419DF000
trusted library allocation
page read and write
1DC3747B000
heap
page read and write
201D6D63000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC3FFB8000
trusted library allocation
page read and write
1DC34C33000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC2EA76000
heap
page read and write
1DC39198000
trusted library allocation
page read and write
1DC3A4DF000
trusted library allocation
page read and write
1DC2EA52000
heap
page read and write
1DC43688000
trusted library allocation
page read and write
1DC3783B000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC393BC000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC3FC8A000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39191000
trusted library allocation
page read and write
1DC3FA31000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC3FFAB000
trusted library allocation
page read and write
1DC36F19000
trusted library allocation
page read and write
1DC3FFCA000
trusted library allocation
page read and write
1DC38DF6000
trusted library allocation
page read and write
1DC38D42000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC38D4A000
trusted library allocation
page read and write
1DC41480000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA44000
heap
page read and write
23E497E0000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC3F8E3000
trusted library allocation
page read and write
1DC3A4D0000
trusted library allocation
page read and write
1DC3A29F000
trusted library allocation
page read and write
1DC3F995000
trusted library allocation
page read and write
1DC3FBFA000
trusted library allocation
page read and write
1DC41797000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC38AFB000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC333CB000
trusted library allocation
page read and write
1D26B56C000
heap
page read and write
1DC3893C000
trusted library allocation
page read and write
1DEE0000000
trusted library allocation
page read and write
1DC3A2C6000
trusted library allocation
page read and write
1DC3A2D2000
trusted library allocation
page read and write
1DEDFDAB000
trusted library allocation
page read and write
1DC3AF2F000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC2EA02000
heap
page read and write
1D26B669000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC43698000
trusted library allocation
page read and write
1DC3FF69000
trusted library allocation
page read and write
1DC37186000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC374A9000
heap
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC3A4DF000
trusted library allocation
page read and write
1DC3747F000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DC37C38000
trusted library allocation
page read and write
1DC3953D000
trusted library allocation
page read and write
1DC390D6000
trusted library allocation
page read and write
15F2DFE000
unkown
page readonly
1DC390C1000
trusted library allocation
page read and write
1DC38DFC000
trusted library allocation
page read and write
1DC39B81000
trusted library allocation
page read and write
2673C330000
heap
page read and write
1DEE0007000
trusted library allocation
page read and write
AE463FA000
stack
page read and write
1DC390B7000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC3A297000
trusted library allocation
page read and write
1DC3FE72000
trusted library allocation
page read and write
1DC2EA3B000
heap
page read and write
1DC3912D000
trusted library allocation
page read and write
1DC3FFD6000
trusted library allocation
page read and write
1DC34C79000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3A5BB000
trusted library allocation
page read and write
1DC3FFE5000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC3B378000
trusted library allocation
page read and write
1DC393E0000
trusted library allocation
page read and write
1DC38961000
trusted library allocation
page read and write
1D26A4A0000
heap
page read and write
1DC39C4F000
trusted library allocation
page read and write
1DC3A34B000
trusted library allocation
page read and write
1DEDFE76000
heap
page read and write
165B000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA5F000
heap
page read and write
1DC3A29F000
trusted library allocation
page read and write
1DC393C2000
trusted library allocation
page read and write
1D26A600000
heap
page readonly
1DC3FC18000
trusted library allocation
page read and write
1D26B5FD000
heap
page read and write
1DC39BF2000
trusted library allocation
page read and write
1DC34CA8000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC402FC000
trusted library allocation
page read and write
1DC389BB000
trusted library allocation
page read and write
1D26B5A8000
heap
page read and write
1D26B669000
heap
page read and write
23E49C7A000
trusted library allocation
page read and write
1DC3B0E0000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC2E9E9000
heap
page read and write
1DC2EA3B000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC38F9A000
trusted library allocation
page read and write
1DC33A1E000
trusted library allocation
page read and write
1DC2EA52000
heap
page read and write
1DC3A2AC000
trusted library allocation
page read and write
1DC2E9E5000
heap
page read and write
1DC41FF5000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC38933000
trusted library allocation
page read and write
1DC37866000
trusted library allocation
page read and write
1DC39CB4000
trusted library allocation
page read and write
1DC3A3C8000
trusted library allocation
page read and write
1DC3F95D000
trusted library allocation
page read and write
1DC3A564000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3B0D4000
trusted library allocation
page read and write
1DC392DF000
trusted library allocation
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC2EA3F000
heap
page read and write
1DC38926000
trusted library allocation
page read and write
1DC382BE000
trusted library allocation
page read and write
1DC3FB2C000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC3B3DB000
trusted library allocation
page read and write
1DC3FA05000
trusted library allocation
page read and write
1DC391D0000
trusted library allocation
page read and write
1DEDFD76000
trusted library allocation
page read and write
1D26B679000
heap
page read and write
1DC3FFB1000
trusted library allocation
page read and write
1D26A6F7000
unkown
page execute read
1DC38226000
trusted library allocation
page read and write
AFF5D9C000
stack
page read and write
1DC2EA43000
heap
page read and write
14B4000
heap
page read and write
EDC000
unkown
page readonly
1DC3939A000
trusted library allocation
page read and write
2673C250000
heap
page read and write
1DC38230000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3A03F000
trusted library allocation
page read and write
23E49E21000
trusted library allocation
page read and write
1DC417D2000
trusted library allocation
page read and write
1DC3FC2B000
trusted library allocation
page read and write
1D26B658000
heap
page read and write
23E49C81000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3A57C000
trusted library allocation
page read and write
1DC3B3D7000
trusted library allocation
page read and write
1DC371C8000
trusted library allocation
page read and write
1DC3FFEE000
trusted library allocation
page read and write
1DC378AA000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC3FAAC000
trusted library allocation
page read and write
1DC38487000
trusted library allocation
page read and write
1DC391C3000
trusted library allocation
page read and write
1DC33381000
trusted library allocation
page read and write
1DC2EA77000
heap
page read and write
1DC374AE000
heap
page read and write
1DC3B986000
trusted library allocation
page read and write
1DC3A28C000
trusted library allocation
page read and write
1DC3914E000
trusted library allocation
page read and write
1DC4219B000
trusted library allocation
page read and write
1DC3FF7F000
trusted library allocation
page read and write
1DC3A390000
trusted library allocation
page read and write
1DC34AC1000
trusted library allocation
page read and write
1DC39094000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2EA4D000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC3B3DB000
trusted library allocation
page read and write
1DC419D7000
trusted library allocation
page read and write
1DC39086000
trusted library allocation
page read and write
1DC39142000
trusted library allocation
page read and write
1DC3A59F000
trusted library allocation
page read and write
1DC3FBA9000
trusted library allocation
page read and write
1DC3A3C7000
trusted library allocation
page read and write
1DC420C9000
trusted library allocation
page read and write
1DC2E9FD000
heap
page read and write
1DC391A6000
trusted library allocation
page read and write
1DC3A5CF000
trusted library allocation
page read and write
1DC3A347000
trusted library allocation
page read and write
1DC38F52000
trusted library allocation
page read and write
1DC390AF000
trusted library allocation
page read and write
1DC402CF000
trusted library allocation
page read and write
1DC3BA57000
trusted library allocation
page read and write
1DC42076000
trusted library allocation
page read and write
3B64000
heap
page read and write
1DC2E9F1000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3953F000
trusted library allocation
page read and write
1DC38F9E000
trusted library allocation
page read and write
1DC395EC000
trusted library allocation
page read and write
1DC39E1B000
trusted library allocation
page read and write
1DC39DC0000
trusted library allocation
page read and write
1DC33971000
trusted library allocation
page read and write
201D5260000
heap
page read and write
1DC37464000
heap
page read and write
1DC3890E000
trusted library allocation
page read and write
1DC38AC3000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
2673C418000
heap
page read and write
1DC420B5000
trusted library allocation
page read and write
1DC3948D000
trusted library allocation
page read and write
1DEDFD72000
trusted library allocation
page read and write
1DC374A4000
heap
page read and write
1DC384B7000
trusted library allocation
page read and write
1D26A590000
heap
page read and write
1DC2EA02000
heap
page read and write
23E49E32000
trusted library allocation
page read and write
1DC39CD5000
trusted library allocation
page read and write
1DC3B320000
trusted library allocation
page read and write
1DC38928000
trusted library allocation
page read and write
1DC37CE8000
trusted library allocation
page read and write
1DC3FB9A000
trusted library allocation
page read and write
1DC374A5000
heap
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC339FE000
trusted library allocation
page read and write
1DC395AB000
trusted library allocation
page read and write
1DC3FC16000
trusted library allocation
page read and write
1DC3FF68000
trusted library allocation
page read and write
1DC38481000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC39417000
trusted library allocation
page read and write
1DC3FFC4000
trusted library allocation
page read and write
14B4000
heap
page read and write
1DC33A82000
trusted library allocation
page read and write
1DC3FEE2000
trusted library allocation
page read and write
AFF90FE000
unkown
page readonly
1D26B501000
heap
page read and write
1DC3A3C2000
trusted library allocation
page read and write
1DC39415000
trusted library allocation
page read and write
1DC3FA57000
trusted library allocation
page read and write
1DC3844B000
trusted library allocation
page read and write
1DC3FBDD000
trusted library allocation
page read and write
1DC390B7000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC41FF5000
trusted library allocation
page read and write
1DC37C4E000
trusted library allocation
page read and write
1DC3B3D9000
trusted library allocation
page read and write
1DC34CBE000
trusted library allocation
page read and write
1DC3A354000
trusted library allocation
page read and write
1DC38D4C000
trusted library allocation
page read and write
1DC3A0F0000
trusted library allocation
page read and write
1DC3B347000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC38AE7000
trusted library allocation
page read and write
1DC3F995000
trusted library allocation
page read and write
1DC37C38000
trusted library allocation
page read and write
1DC39CF1000
trusted library allocation
page read and write
1DC3774E000
trusted library allocation
page read and write
1DC3F944000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC333DF000
trusted library allocation
page read and write
1DC3B3DB000
trusted library allocation
page read and write
1638000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC42041000
trusted library allocation
page read and write
1DC3844B000
trusted library allocation
page read and write
166F000
heap
page read and write
1DC436B3000
trusted library allocation
page read and write
1DC3A4CC000
trusted library allocation
page read and write
1DC3FC8A000
trusted library allocation
page read and write
1DC37883000
trusted library allocation
page read and write
1DC3778C000
trusted library allocation
page read and write
1DC391A7000
trusted library allocation
page read and write
1DC3FF53000
trusted library allocation
page read and write
1DC3B36C000
trusted library allocation
page read and write
1DC3FABD000
trusted library allocation
page read and write
1DC3765B000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC43B67000
trusted library allocation
page read and write
1DC3FFB5000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
12FF000
stack
page read and write
1DC3900A000
trusted library allocation
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DC3914E000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
1DC2EA55000
heap
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC2EA45000
heap
page read and write
1DC3A2C9000
trusted library allocation
page read and write
1DC34C75000
trusted library allocation
page read and write
1DC36F60000
trusted library allocation
page read and write
1DC38D89000
trusted library allocation
page read and write
1DC34CA6000
trusted library allocation
page read and write
1D26B58A000
heap
page read and write
1DC37894000
trusted library allocation
page read and write
1DC38E94000
trusted library allocation
page read and write
1DC3FEAC000
trusted library allocation
page read and write
1DC3F94E000
trusted library allocation
page read and write
1DC3FA4D000
trusted library allocation
page read and write
1DC39097000
trusted library allocation
page read and write
1DC36F72000
trusted library allocation
page read and write
1DC395DB000
trusted library allocation
page read and write
1DC39394000
trusted library allocation
page read and write
1DC395D8000
trusted library allocation
page read and write
1DC38D34000
trusted library allocation
page read and write
1DC37777000
trusted library allocation
page read and write
1DC3FC4B000
trusted library allocation
page read and write
1DC39137000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC39DC4000
trusted library allocation
page read and write
1DC3BE36000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC3FFCA000
trusted library allocation
page read and write
1DC43623000
trusted library allocation
page read and write
1DC3F8E3000
trusted library allocation
page read and write
1DC391BD000
trusted library allocation
page read and write
1DEDFDF1000
trusted library allocation
page read and write
1DC3FBFA000
trusted library allocation
page read and write
1DC393F8000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC42078000
trusted library allocation
page read and write
1DC2EA05000
heap
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DC39486000
trusted library allocation
page read and write
1DC38AFB000
trusted library allocation
page read and write
1DC39CE1000
trusted library allocation
page read and write
1DC39548000
trusted library allocation
page read and write
1DC384CB000
trusted library allocation
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC37C8D000
trusted library allocation
page read and write
1DC402E8000
trusted library allocation
page read and write
1DC3A079000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC3FBE3000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC39DCB000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC39381000
trusted library allocation
page read and write
1DC394ED000
trusted library allocation
page read and write
1DC391BE000
trusted library allocation
page read and write
1DC41983000
trusted library allocation
page read and write
1DC436A2000
trusted library allocation
page read and write
1DC395DF000
trusted library allocation
page read and write
1DC37C5B000
trusted library allocation
page read and write
1DC39198000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DC3BEB8000
heap
page read and write
AFF917E000
unkown
page readonly
1DC37C5D000
trusted library allocation
page read and write
1DC38F31000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1D26B658000
heap
page read and write
1DC2E9F0000
heap
page read and write
69F39FE000
stack
page read and write
1DC2E9F5000
heap
page read and write
1DC4209A000
trusted library allocation
page read and write
1D26B57D000
heap
page read and write
1661000
heap
page read and write
1DC3946D000
trusted library allocation
page read and write
1DC39ED6000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC38DA5000
trusted library allocation
page read and write
1DC393FC000
trusted library allocation
page read and write
1DC39C90000
trusted library allocation
page read and write
1D26B5F2000
heap
page read and write
1DC3918B000
trusted library allocation
page read and write
1DC384CD000
trusted library allocation
page read and write
1DC2E9FE000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3A4DB000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC4174D000
trusted library allocation
page read and write
1DC402CF000
trusted library allocation
page read and write
1DC3A31B000
trusted library allocation
page read and write
1DC3FBDC000
trusted library allocation
page read and write
1DC3A390000
trusted library allocation
page read and write
1DC374D2000
heap
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC384C5000
trusted library allocation
page read and write
1DC2EA3B000
heap
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC3FA62000
trusted library allocation
page read and write
1DC4207E000
trusted library allocation
page read and write
1DC38EE6000
trusted library allocation
page read and write
1DC34CC1000
trusted library allocation
page read and write
1D26A900000
trusted library allocation
page read and write
1DC3FFB5000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC3FAC2000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DEDFD5D000
trusted library allocation
page read and write
201D518B000
heap
page read and write
1DC3A2D4000
trusted library allocation
page read and write
1DC420FD000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
201D516D000
heap
page read and write
1DC34D26000
trusted library allocation
page read and write
1DC391CD000
trusted library allocation
page read and write
1DC2EA63000
heap
page read and write
1DC3935E000
trusted library allocation
page read and write
1DC3A3B2000
trusted library allocation
page read and write
1DC3FFE6000
trusted library allocation
page read and write
1DC3A57C000
trusted library allocation
page read and write
1DC349A6000
trusted library allocation
page read and write
1DC3FE94000
trusted library allocation
page read and write
AFF913E000
stack
page read and write
15F0B9D000
stack
page read and write
1DC39364000
trusted library allocation
page read and write
1D26B5E8000
heap
page read and write
1DC39E9B000
trusted library allocation
page read and write
1DC395F8000
trusted library allocation
page read and write
1DC422A3000
trusted library allocation
page read and write
1DC3FE23000
trusted library allocation
page read and write
1DC3FBD8000
trusted library allocation
page read and write
1DC3915E000
trusted library allocation
page read and write
1DC3AFEE000
trusted library allocation
page read and write
1D26B564000
heap
page read and write
1DC38230000
trusted library allocation
page read and write
1DC34CC7000
trusted library allocation
page read and write
1DC3AF21000
trusted library allocation
page read and write
1DC2EA45000
heap
page read and write
1DC38451000
trusted library allocation
page read and write
1DC4219D000
trusted library allocation
page read and write
1DC3B0D4000
trusted library allocation
page read and write
1DC3FC55000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3B0E4000
trusted library allocation
page read and write
1DC389A8000
trusted library allocation
page read and write
1DC38D44000
trusted library allocation
page read and write
1DC34C2C000
trusted library allocation
page read and write
1DC39553000
trusted library allocation
page read and write
1DC3778E000
trusted library allocation
page read and write
1DC37C2E000
trusted library allocation
page read and write
1DC3A0B0000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC390B0000
trusted library allocation
page read and write
1DC38D2A000
trusted library allocation
page read and write
1DC3FA9E000
trusted library allocation
page read and write
1DC391BE000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC3B2DF000
trusted library allocation
page read and write
1DC3F8B0000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3B3AA000
trusted library allocation
page read and write
1DC33ADC000
trusted library allocation
page read and write
1DC42090000
trusted library allocation
page read and write
1DC391C6000
trusted library allocation
page read and write
1DC2EA4E000
heap
page read and write
1DC4368D000
trusted library allocation
page read and write
1DC420F0000
trusted library allocation
page read and write
1DC2EA67000
heap
page read and write
1DC38AE9000
trusted library allocation
page read and write
AFFA9FE000
stack
page read and write
1DC374A4000
heap
page read and write
1DC3B31B000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3A1F8000
trusted library allocation
page read and write
1DC41790000
trusted library allocation
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC3953D000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC436A2000
trusted library allocation
page read and write
1DC34AF5000
trusted library allocation
page read and write
1DC3FC59000
trusted library allocation
page read and write
1DC3F8CB000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3BA2E000
trusted library allocation
page read and write
1DC3FA6B000
trusted library allocation
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
1DC390FD000
trusted library allocation
page read and write
1DC421D0000
trusted library allocation
page read and write
1DC43B50000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FEFE000
trusted library allocation
page read and write
1DC2EA09000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC43B37000
trusted library allocation
page read and write
1DC3A3B9000
trusted library allocation
page read and write
1D26A400000
unclassified section
page readonly
1DC39DD3000
trusted library allocation
page read and write
1DC3A334000
trusted library allocation
page read and write
1DC37761000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC38E84000
trusted library allocation
page read and write
1DC3AFFD000
trusted library allocation
page read and write
1DC39148000
trusted library allocation
page read and write
1DC3B0E0000
trusted library allocation
page read and write
1D26A95C000
trusted library allocation
page read and write
1DC34C62000
trusted library allocation
page read and write
1DC3A37F000
trusted library allocation
page read and write
1DC3FA31000
trusted library allocation
page read and write
1DC3C602000
trusted library allocation
page read and write
1DC3A342000
trusted library allocation
page read and write
1DC43B8A000
trusted library allocation
page read and write
1DC39417000
trusted library allocation
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1D26B669000
heap
page read and write
AFF7FFE000
unkown
page readonly
1DC421EE000
trusted library allocation
page read and write
1DC3A37F000
trusted library allocation
page read and write
1D26A917000
trusted library allocation
page read and write
1DC39070000
trusted library allocation
page read and write
1DC3AF1D000
trusted library allocation
page read and write
1DC3B96D000
trusted library allocation
page read and write
1DC3F8DF000
trusted library allocation
page read and write
23E49CCB000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC39C8A000
trusted library allocation
page read and write
23E49C60000
trusted library allocation
page read and write
1D26B56C000
heap
page read and write
1DC4209D000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
2673C607000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC37CD5000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
14B4000
heap
page read and write
1DC3B378000
trusted library allocation
page read and write
1DC394FA000
trusted library allocation
page read and write
14B4000
heap
page read and write
1DC419C4000
trusted library allocation
page read and write
1DC42243000
trusted library allocation
page read and write
1DC38983000
trusted library allocation
page read and write
1DC392C2000
trusted library allocation
page read and write
1DC34CF6000
trusted library allocation
page read and write
1DC3944E000
trusted library allocation
page read and write
23E49C23000
trusted library allocation
page read and write
1D26B62A000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC2E9F0000
heap
page read and write
AE493FF000
stack
page read and write
1DC2EA3C000
heap
page read and write
1DC2E9F3000
heap
page read and write
1DC43681000
trusted library allocation
page read and write
1DC37462000
heap
page read and write
BE0000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC39079000
trusted library allocation
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC374A4000
heap
page read and write
1DC3F995000
trusted library allocation
page read and write
1DC2EA48000
heap
page read and write
20D9A3E000
stack
page read and write
1DC43638000
trusted library allocation
page read and write
1D26B5EC000
heap
page read and write
1DC2E9FF000
heap
page read and write
1D26A966000
trusted library allocation
page read and write
1DC2EA0E000
heap
page read and write
1DC3B3D7000
trusted library allocation
page read and write
1DC39C83000
trusted library allocation
page read and write
1DC3788F000
trusted library allocation
page read and write
1DC3A5C9000
trusted library allocation
page read and write
1DC39455000
trusted library allocation
page read and write
1DC37876000
trusted library allocation
page read and write
1DC3A4CC000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC420A2000
trusted library allocation
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1DC3FAB5000
trusted library allocation
page read and write
1D26A480000
unclassified section
page readonly
1DC2E9F5000
heap
page read and write
1DC39017000
trusted library allocation
page read and write
1DC3B347000
trusted library allocation
page read and write
1DC376F3000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC37C6A000
trusted library allocation
page read and write
1DC3FA5C000
trusted library allocation
page read and write
1DC392B1000
trusted library allocation
page read and write
1DC3A33D000
trusted library allocation
page read and write
1DC3AF85000
trusted library allocation
page read and write
1DC3A2D2000
trusted library allocation
page read and write
1DC3899C000
trusted library allocation
page read and write
1DC3908B000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3F92A000
trusted library allocation
page read and write
1DC34AEF000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3FA5C000
trusted library allocation
page read and write
166F000
heap
page read and write
1DC3914E000
trusted library allocation
page read and write
1DC3FBA9000
trusted library allocation
page read and write
1662000
heap
page read and write
1DC3FA9E000
trusted library allocation
page read and write
1DC37654000
trusted library allocation
page read and write
1DC39007000
trusted library allocation
page read and write
1DC3FE60000
trusted library allocation
page read and write
1DC34CA1000
trusted library allocation
page read and write
1DC2EA5B000
heap
page read and write
1DC374A5000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC38D6B000
trusted library allocation
page read and write
1DC3768A000
trusted library allocation
page read and write
1DC3A36F000
trusted library allocation
page read and write
1DC378DC000
trusted library allocation
page read and write
1DC3BEE1000
heap
page read and write
1DC3A2D4000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC37886000
trusted library allocation
page read and write
1DC422C5000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC382D7000
trusted library allocation
page read and write
1DC3A388000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC3A3AA000
trusted library allocation
page read and write
1DC39553000
trusted library allocation
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1DC38D90000
trusted library allocation
page read and write
1DC38DA5000
trusted library allocation
page read and write
1DC389D0000
trusted library allocation
page read and write
1DC3AF91000
trusted library allocation
page read and write
1DC37496000
heap
page read and write
1DC395D8000
trusted library allocation
page read and write
1DC34C79000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC34CBC000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC2E9F5000
heap
page read and write
1D26B5E9000
heap
page read and write
1DC378B9000
trusted library allocation
page read and write
1DC39FFC000
trusted library allocation
page read and write
1DC3FF70000
trusted library allocation
page read and write
1DC389ED000
trusted library allocation
page read and write
1DC3AFF4000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC39CB4000
trusted library allocation
page read and write
1DC34C3F000
trusted library allocation
page read and write
B2A000
stack
page read and write
1DC394D4000
trusted library allocation
page read and write
1DC3FA1C000
trusted library allocation
page read and write
1D26B5FD000
heap
page read and write
1DC3A33F000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1D26B55C000
heap
page read and write
1D26B42F000
trusted library allocation
page read and write
1DC389A8000
trusted library allocation
page read and write
1DC39D6A000
trusted library allocation
page read and write
1DC390BC000
trusted library allocation
page read and write
D6E1B21000
trusted library allocation
page execute read
1DC395F8000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC390D6000
trusted library allocation
page read and write
1DC38232000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC42088000
trusted library allocation
page read and write
1DC38232000
trusted library allocation
page read and write
1DC42325000
trusted library allocation
page read and write
1DC390AA000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC34CBC000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3A3CA000
trusted library allocation
page read and write
1DC3FFE2000
trusted library allocation
page read and write
1DC3A339000
trusted library allocation
page read and write
1DC3B3CF000
trusted library allocation
page read and write
1DC37781000
trusted library allocation
page read and write
1DC34CC7000
trusted library allocation
page read and write
1DC39025000
trusted library allocation
page read and write
1DC3918B000
trusted library allocation
page read and write
1DC2EA95000
heap
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC3FEE2000
trusted library allocation
page read and write
AFF5DDE000
unkown
page readonly
1DC39141000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC38D50000
trusted library allocation
page read and write
1DC3905F000
trusted library allocation
page read and write
23E49E19000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1D26B403000
trusted library allocation
page read and write
1DC2EA48000
heap
page read and write
1DC2EA3B000
heap
page read and write
1DEDFD7B000
trusted library allocation
page read and write
1DC395DC000
trusted library allocation
page read and write
1DC391F3000
trusted library allocation
page read and write
1DC37778000
trusted library allocation
page read and write
1DC38226000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F3000
heap
page read and write
1DC3B088000
trusted library allocation
page read and write
1D26B644000
heap
page read and write
1DC39CE4000
trusted library allocation
page read and write
1DC3B3D9000
trusted library allocation
page read and write
1DC37CED000
trusted library allocation
page read and write
1DEDFBCA000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3F900000
trusted library allocation
page read and write
1DC39152000
trusted library allocation
page read and write
1DC382B9000
trusted library allocation
page read and write
1DC38FFE000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC2EA03000
heap
page read and write
1DC3FA5C000
trusted library allocation
page read and write
1DC419C1000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC394DA000
trusted library allocation
page read and write
1DC36FB8000
trusted library allocation
page read and write
1DC3B2FA000
trusted library allocation
page read and write
1DC420B5000
trusted library allocation
page read and write
1D26B63B000
heap
page read and write
1DC3FAC5000
trusted library allocation
page read and write
1D26B5E1000
heap
page read and write
1DC3A35F000
trusted library allocation
page read and write
23E49E13000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9E9000
heap
page read and write
1DC38232000
trusted library allocation
page read and write
1DC38AFB000
trusted library allocation
page read and write
1DC421E2000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC389A4000
trusted library allocation
page read and write
1DC39B7E000
trusted library allocation
page read and write
1DC3A33E000
trusted library allocation
page read and write
1DC38D07000
trusted library allocation
page read and write
1DC3B086000
trusted library allocation
page read and write
1D26B62A000
heap
page read and write
1DC3F95D000
trusted library allocation
page read and write
1DC39360000
trusted library allocation
page read and write
1DC3A4C7000
trusted library allocation
page read and write
1DC3FFE5000
trusted library allocation
page read and write
1DC3949D000
trusted library allocation
page read and write
1DC38D92000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1D26B5E6000
heap
page read and write
1DC3FFEE000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC3B0EC000
trusted library allocation
page read and write
1DEDFE00000
unclassified section
page readonly
1DC3F97A000
trusted library allocation
page read and write
1DC417D2000
trusted library allocation
page read and write
23E49C73000
trusted library allocation
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC34C94000
trusted library allocation
page read and write
1DC389A1000
trusted library allocation
page read and write
1DEDFE80000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC3FA4D000
trusted library allocation
page read and write
1DC394E5000
trusted library allocation
page read and write
1DC39CB4000
trusted library allocation
page read and write
1DC3B3CF000
trusted library allocation
page read and write
1DC3F97F000
trusted library allocation
page read and write
1DC3FC4D000
trusted library allocation
page read and write
1D26B658000
heap
page read and write
1DC3764E000
trusted library allocation
page read and write
1DC394CD000
trusted library allocation
page read and write
1DC38E89000
trusted library allocation
page read and write
1DC3FBD4000
trusted library allocation
page read and write
1DC420A4000
trusted library allocation
page read and write
1DC2EA5B000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC3A3AA000
trusted library allocation
page read and write
1DC3F9F6000
trusted library allocation
page read and write
1DC38EB9000
trusted library allocation
page read and write
1DC2EA01000
heap
page read and write
1DC38487000
trusted library allocation
page read and write
1DC3B347000
trusted library allocation
page read and write
1DC3891F000
trusted library allocation
page read and write
1DC422AC000
trusted library allocation
page read and write
1DC38461000
trusted library allocation
page read and write
1DC3893F000
trusted library allocation
page read and write
1DC3916F000
trusted library allocation
page read and write
1DC3F97A000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC38D7F000
trusted library allocation
page read and write
1DEDFD49000
trusted library allocation
page read and write
1DC391A6000
trusted library allocation
page read and write
1DC3F8F1000
trusted library allocation
page read and write
1DC33A94000
trusted library allocation
page read and write
1DC38477000
trusted library allocation
page read and write
1DC3F988000
trusted library allocation
page read and write
1DC39CB6000
trusted library allocation
page read and write
1DC3BE5C000
heap
page read and write
1DC38D6B000
trusted library allocation
page read and write
1DC2EA54000
heap
page read and write
1DC2EA58000
heap
page read and write
1DC38949000
trusted library allocation
page read and write
1DC382C5000
trusted library allocation
page read and write
1DC38D85000
trusted library allocation
page read and write
1DC384E0000
trusted library allocation
page read and write
1DC3908B000
trusted library allocation
page read and write
1DEDFDB1000
trusted library allocation
page read and write
1DC394E8000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC3FEF0000
trusted library allocation
page read and write
1DC3FFD0000
trusted library allocation
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FBA7000
trusted library allocation
page read and write
1DC390CF000
trusted library allocation
page read and write
1DC2EA5B000
heap
page read and write
1DC3A2C9000
trusted library allocation
page read and write
1DC41796000
trusted library allocation
page read and write
1DC39DF7000
trusted library allocation
page read and write
1DC3AFC2000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC2E9E9000
heap
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC2EA63000
heap
page read and write
1DC37896000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3B3CF000
trusted library allocation
page read and write
1DC389BB000
trusted library allocation
page read and write
1DC378FC000
trusted library allocation
page read and write
1DC34C9D000
trusted library allocation
page read and write
1DC419ED000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC3A337000
trusted library allocation
page read and write
1DC3A5C9000
trusted library allocation
page read and write
1DC376AC000
trusted library allocation
page read and write
1DC42174000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC38D70000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1D26A969000
trusted library allocation
page read and write
1DC34C96000
trusted library allocation
page read and write
AFF88FE000
stack
page read and write
1DC33AF2000
trusted library allocation
page read and write
1DC3FEB0000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3FEBE000
trusted library allocation
page read and write
1DC3A386000
trusted library allocation
page read and write
201D6F30000
heap
page read and write
1DC3FBF3000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC2EA59000
heap
page read and write
1DC39D4C000
trusted library allocation
page read and write
1DC3A2B7000
trusted library allocation
page read and write
1DC3FFC0000
trusted library allocation
page read and write
1DC38F43000
trusted library allocation
page read and write
1DC3893F000
trusted library allocation
page read and write
1DC391F5000
trusted library allocation
page read and write
1DC34AE5000
trusted library allocation
page read and write
1DC39097000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC33AD9000
trusted library allocation
page read and write
1DC2EA32000
heap
page read and write
1DC3A59F000
trusted library allocation
page read and write
20D5E6B000
stack
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC34920000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC2E9D4000
heap
page read and write
1DC3A29F000
trusted library allocation
page read and write
1DC3A5C0000
trusted library allocation
page read and write
1DC3A3CD000
trusted library allocation
page read and write
1DC33A7E000
trusted library allocation
page read and write
1DC3AFCE000
trusted library allocation
page read and write
1DC38416000
trusted library allocation
page read and write
1DC37878000
trusted library allocation
page read and write
1DC393F1000
trusted library allocation
page read and write
1DC394DF000
trusted library allocation
page read and write
1DC39324000
trusted library allocation
page read and write
1DC34AC1000
trusted library allocation
page read and write
1DC390CF000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC3B941000
trusted library allocation
page read and write
23E4999F000
unclassified section
page read and write
1DC39311000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC391BA000
trusted library allocation
page read and write
1DC2E9FB000
heap
page read and write
1DC394A4000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC3FF70000
trusted library allocation
page read and write
1DC3A026000
trusted library allocation
page read and write
1DC3FEE9000
trusted library allocation
page read and write
1DC3937C000
trusted library allocation
page read and write
23E497A0000
remote allocation
page read and write
1DC2EA03000
heap
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1DC39083000
trusted library allocation
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC421B5000
trusted library allocation
page read and write
1DC389C4000
trusted library allocation
page read and write
1DC3F9F6000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38F34000
trusted library allocation
page read and write
1DC38485000
trusted library allocation
page read and write
1DC39EDB000
trusted library allocation
page read and write
1DC39442000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
23E49E0C000
trusted library allocation
page read and write
1DC39064000
trusted library allocation
page read and write
AE473FE000
stack
page read and write
1DEDF970000
heap
page read and write
1DC3FFA9000
trusted library allocation
page read and write
1DC3AF6A000
trusted library allocation
page read and write
1DC3B3FE000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC37500000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3A2B4000
trusted library allocation
page read and write
1DC38975000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC39563000
trusted library allocation
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1DC391E1000
trusted library allocation
page read and write
1DC34C25000
trusted library allocation
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC382C3000
trusted library allocation
page read and write
1DC3FF68000
trusted library allocation
page read and write
1DC38969000
trusted library allocation
page read and write
1DC39534000
trusted library allocation
page read and write
1DC3AF40000
trusted library allocation
page read and write
1DC3FC40000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC2E9F8000
heap
page read and write
1DC384C5000
trusted library allocation
page read and write
20D5EED000
stack
page read and write
1DC394DF000
trusted library allocation
page read and write
1DC38D47000
trusted library allocation
page read and write
1DC39141000
trusted library allocation
page read and write
2D4E2303000
trusted library allocation
page read and write
1DC378BE000
trusted library allocation
page read and write
1DC39CC6000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC34D22000
trusted library allocation
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC391BE000
trusted library allocation
page read and write
1DC3FC62000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC3A3A4000
trusted library allocation
page read and write
166F000
heap
page read and write
1DC394D4000
trusted library allocation
page read and write
1DC3956A000
trusted library allocation
page read and write
1DC389B2000
trusted library allocation
page read and write
1DC2EA59000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9F5000
heap
page read and write
1D26A92F000
trusted library allocation
page read and write
1DC38DAE000
trusted library allocation
page read and write
1DC3FEF3000
trusted library allocation
page read and write
1DC2EA67000
heap
page read and write
1DC2EA79000
heap
page read and write
1D26B563000
heap
page read and write
1D26A670000
trusted library section
page readonly
1DC2EA44000
heap
page read and write
1DC34CA8000
trusted library allocation
page read and write
1DC3905B000
trusted library allocation
page read and write
1DC3F8B6000
trusted library allocation
page read and write
1DC38A49000
trusted library allocation
page read and write
1DC43626000
trusted library allocation
page read and write
1DC41962000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC382DD000
trusted library allocation
page read and write
1DC3FFD6000
trusted library allocation
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC3AF54000
trusted library allocation
page read and write
1DC395DB000
trusted library allocation
page read and write
1DC382E1000
trusted library allocation
page read and write
1DC39068000
trusted library allocation
page read and write
1DC3FE67000
trusted library allocation
page read and write
1DC3B309000
trusted library allocation
page read and write
1DC3AFD3000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC391C6000
trusted library allocation
page read and write
15E0000
heap
page read and write
1DC36FCF000
trusted library allocation
page read and write
1DC3FA43000
trusted library allocation
page read and write
1DC3A595000
trusted library allocation
page read and write
1DC39035000
trusted library allocation
page read and write
1D26A9AE000
trusted library allocation
page read and write
1DC36F60000
trusted library allocation
page read and write
1DC2EA4E000
heap
page read and write
1DC3A359000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1D26A948000
trusted library allocation
page read and write
1DC3AF8B000
trusted library allocation
page read and write
1DC3786D000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC2EAA3000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC38928000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC37464000
heap
page read and write
1DC3FC7F000
trusted library allocation
page read and write
1D26B5E8000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1D26AE60000
heap
page read and write
20D69D8000
stack
page read and write
1DC3FA9E000
trusted library allocation
page read and write
1DC378BE000
trusted library allocation
page read and write
1DC3FBF0000
trusted library allocation
page read and write
1DC2E9FA000
heap
page read and write
1DC3A3C4000
trusted library allocation
page read and write
1DC394DF000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC382C3000
trusted library allocation
page read and write
1DC3913F000
trusted library allocation
page read and write
1DC37CBF000
trusted library allocation
page read and write
1DC39334000
trusted library allocation
page read and write
1DC38D6B000
trusted library allocation
page read and write
1DC3747B000
heap
page read and write
1DC3FA8A000
trusted library allocation
page read and write
1DC37C76000
trusted library allocation
page read and write
1DC39D73000
trusted library allocation
page read and write
1DC3AFBB000
trusted library allocation
page read and write
1D26A800000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
F10000
unkown
page write copy
1DC3A35B000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
14B4000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3FB2E000
trusted library allocation
page read and write
1DC378D6000
trusted library allocation
page read and write
1DC3FFAB000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3908B000
trusted library allocation
page read and write
1D26B5E0000
heap
page read and write
1DC43692000
trusted library allocation
page read and write
1DC2EA54000
heap
page read and write
1DC37885000
trusted library allocation
page read and write
23E49C96000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3FEB5000
trusted library allocation
page read and write
1DC3AF54000
trusted library allocation
page read and write
1DC3F8F1000
trusted library allocation
page read and write
1DC417AE000
trusted library allocation
page read and write
1DC394CD000
trusted library allocation
page read and write
1DC419C4000
trusted library allocation
page read and write
1DC3A4DF000
trusted library allocation
page read and write
1DC2EA59000
heap
page read and write
1DC39079000
trusted library allocation
page read and write
1DC3FAAE000
trusted library allocation
page read and write
23E4982A000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC419EA000
trusted library allocation
page read and write
201D6D6F000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC42E00000
trusted library allocation
page read and write
1DC3B3B8000
trusted library allocation
page read and write
1DC3A5D1000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3A349000
trusted library allocation
page read and write
1DC393E9000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC37496000
heap
page read and write
1DC390C9000
trusted library allocation
page read and write
1DC3A4D0000
trusted library allocation
page read and write
1DC3A2C9000
trusted library allocation
page read and write
1DC3B351000
trusted library allocation
page read and write
1DC378D4000
trusted library allocation
page read and write
1DC393C9000
trusted library allocation
page read and write
1DC4203F000
trusted library allocation
page read and write
1DC3F8DB000
trusted library allocation
page read and write
1DC378C4000
trusted library allocation
page read and write
1DC37458000
heap
page read and write
1DC3A5A6000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3A2D8000
trusted library allocation
page read and write
1DC3A33E000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC392E9000
trusted library allocation
page read and write
1DC34CF6000
trusted library allocation
page read and write
1DC39CA0000
trusted library allocation
page read and write
1DC43666000
trusted library allocation
page read and write
1DC39494000
trusted library allocation
page read and write
15F25FE000
stack
page read and write
1DC2E9FF000
heap
page read and write
1DC395F8000
trusted library allocation
page read and write
1DC3A4D8000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
15F2E7E000
unkown
page readonly
14B0000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3937F000
trusted library allocation
page read and write
1DC393BC000
trusted library allocation
page read and write
1DC4368D000
trusted library allocation
page read and write
1DC38E87000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC3AF68000
trusted library allocation
page read and write
E40000
unkown
page readonly
14B4000
heap
page read and write
1DC3FFCE000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3FAEA000
trusted library allocation
page read and write
1DC391F8000
trusted library allocation
page read and write
1DC4209D000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC378FC000
trusted library allocation
page read and write
1DC3C623000
trusted library allocation
page read and write
1DC34C9A000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC3AFE4000
trusted library allocation
page read and write
1DEDFD13000
trusted library allocation
page read and write
1DC4179D000
trusted library allocation
page read and write
1DC39C57000
trusted library allocation
page read and write
1DC2EA76000
heap
page read and write
1DC3AFEC000
trusted library allocation
page read and write
1DC3A456000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC3FEB8000
trusted library allocation
page read and write
1DC3FFDA000
trusted library allocation
page read and write
1DC2EA50000
heap
page read and write
1DC3766A000
trusted library allocation
page read and write
1DEE010C000
trusted library allocation
page read and write
1DC39C8D000
trusted library allocation
page read and write
1DC389C9000
trusted library allocation
page read and write
1DC3955B000
trusted library allocation
page read and write
1DC389B7000
trusted library allocation
page read and write
1DC3F9F2000
trusted library allocation
page read and write
1DC3A3A4000
trusted library allocation
page read and write
1DC3FA1C000
trusted library allocation
page read and write
1DC389CC000
trusted library allocation
page read and write
1DC3B3AA000
trusted library allocation
page read and write
1D26B400000
trusted library allocation
page read and write
1DC3913F000
trusted library allocation
page read and write
1DC3771F000
trusted library allocation
page read and write
1DC382BE000
trusted library allocation
page read and write
1DC39089000
trusted library allocation
page read and write
1DC3F90A000
trusted library allocation
page read and write
1DC3745E000
heap
page read and write
1DC3F94E000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2E9F5000
heap
page read and write
1D26B658000
heap
page read and write
1DC3913F000
trusted library allocation
page read and write
1DC389D0000
trusted library allocation
page read and write
1D26A62F000
unclassified section
page read and write
1DC37496000
heap
page read and write
1DC37C32000
trusted library allocation
page read and write
1DC2E9F7000
heap
page read and write
1DC42057000
trusted library allocation
page read and write
1DC3776D000
trusted library allocation
page read and write
1DC2EA5F000
heap
page read and write
1D26B54D000
heap
page read and write
1DC34C9D000
trusted library allocation
page read and write
1D26A6F2000
unkown
page execute read
1DC2EA0B000
heap
page read and write
1DC3A1AD000
trusted library allocation
page read and write
1DC39548000
trusted library allocation
page read and write
1DC37CAC000
trusted library allocation
page read and write
1DC38D50000
trusted library allocation
page read and write
201D6D78000
heap
page read and write
1DC37462000
heap
page read and write
1D26A9F3000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC349C7000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC3FFA9000
trusted library allocation
page read and write
1DC3A3B2000
trusted library allocation
page read and write
1DC2EA58000
heap
page read and write
1DC37462000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3BE3F000
heap
page read and write
1DC37464000
heap
page read and write
1DC41981000
trusted library allocation
page read and write
1DC3896F000
trusted library allocation
page read and write
1DC41966000
trusted library allocation
page read and write
1DC3A1ED000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC39353000
trusted library allocation
page read and write
1DC38FB7000
trusted library allocation
page read and write
1DC42286000
trusted library allocation
page read and write
1DC3B338000
trusted library allocation
page read and write
1DC3FBE6000
trusted library allocation
page read and write
1DC3918B000
trusted library allocation
page read and write
1DC3F9D8000
trusted library allocation
page read and write
1DC3A030000
trusted library allocation
page read and write
1DC37C5D000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2EA63000
heap
page read and write
1DC2EA50000
heap
page read and write
1DC3B0E0000
trusted library allocation
page read and write
AE483FF000
stack
page read and write
1DC3AF6A000
trusted library allocation
page read and write
1DC42396000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC39451000
trusted library allocation
page read and write
1DC38F86000
trusted library allocation
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC39FF8000
trusted library allocation
page read and write
1DC3949C000
trusted library allocation
page read and write
1DC382DF000
trusted library allocation
page read and write
1DC2E9E6000
heap
page read and write
1DC393A3000
trusted library allocation
page read and write
1DC3FB17000
trusted library allocation
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC394D4000
trusted library allocation
page read and write
1DC3FBB6000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC37755000
trusted library allocation
page read and write
1DC34CD5000
trusted library allocation
page read and write
1DC3FC27000
trusted library allocation
page read and write
1DC3C723000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3FC69000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3B351000
trusted library allocation
page read and write
1DC39C8D000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC419B1000
trusted library allocation
page read and write
1DC3B943000
trusted library allocation
page read and write
1DC382B9000
trusted library allocation
page read and write
1DC333A8000
trusted library allocation
page read and write
1DC39D73000
trusted library allocation
page read and write
1DC38206000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC3A2D2000
trusted library allocation
page read and write
1DC3A5AE000
trusted library allocation
page read and write
BDE000
stack
page read and write
3AD0000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38444000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC3FAF2000
trusted library allocation
page read and write
1DC34CEB000
trusted library allocation
page read and write
1DC3AF7A000
trusted library allocation
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1DC3905F000
trusted library allocation
page read and write
1DC389B4000
trusted library allocation
page read and write
2673C421000
heap
page read and write
1DC390FA000
trusted library allocation
page read and write
1DC3FE2F000
trusted library allocation
page read and write
1DC3912B000
trusted library allocation
page read and write
1DC3FAC5000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3F8C5000
trusted library allocation
page read and write
1DC2EA7E000
heap
page read and write
1DC3AFCE000
trusted library allocation
page read and write
1DC3938E000
trusted library allocation
page read and write
1DC2E9F6000
heap
page read and write
1DC34CEB000
trusted library allocation
page read and write
1DC2EA0F000
heap
page read and write
1D26B500000
heap
page read and write
1DC2E9EE000
heap
page read and write
1D26B5EC000
heap
page read and write
1DC2EA54000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3746A000
heap
page read and write
1DC3B0DD000
trusted library allocation
page read and write
1DC3F97F000
trusted library allocation
page read and write
1DC38983000
trusted library allocation
page read and write
1DC2E9D5000
heap
page read and write
1DC39CC1000
trusted library allocation
page read and write
1DC374A4000
heap
page read and write
23E499A0000
heap
page read and write
1DEDFD8F000
trusted library allocation
page read and write
1DC34AB7000
trusted library allocation
page read and write
1DC4174F000
trusted library allocation
page read and write
1DC3FBCF000
trusted library allocation
page read and write
1DC3916F000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
20D79FE000
stack
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC2EA55000
heap
page read and write
1DC391CA000
trusted library allocation
page read and write
1DC3FEC3000
trusted library allocation
page read and write
1DEDFD82000
trusted library allocation
page read and write
1DC3B3A3000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC394D6000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3948D000
trusted library allocation
page read and write
EDC000
unkown
page readonly
1DC3FF85000
trusted library allocation
page read and write
1DC3FA75000
trusted library allocation
page read and write
1D26A622000
unclassified section
page read and write
1DC3FAC2000
trusted library allocation
page read and write
1DC390BC000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC378AD000
trusted library allocation
page read and write
1DC3A35B000
trusted library allocation
page read and write
1DC39E84000
trusted library allocation
page read and write
1DC3A587000
trusted library allocation
page read and write
23E49800000
heap
page read and write
1DC3A321000
trusted library allocation
page read and write
1DC39CC6000
trusted library allocation
page read and write
1DC3F9E9000
trusted library allocation
page read and write
1DC38949000
trusted library allocation
page read and write
1DC3A2DD000
trusted library allocation
page read and write
1DC37CD7000
trusted library allocation
page read and write
1DC3896E000
trusted library allocation
page read and write
1DC3FC40000
trusted library allocation
page read and write
1DC38CFD000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3FED6000
trusted library allocation
page read and write
1DC39D6A000
trusted library allocation
page read and write
1DC43B93000
trusted library allocation
page read and write
1DC37C6F000
trusted library allocation
page read and write
1DC390F9000
trusted library allocation
page read and write
1DC3B94D000
trusted library allocation
page read and write
1DC3A2BF000
trusted library allocation
page read and write
1DC3FAFD000
trusted library allocation
page read and write
1DC39CD5000
trusted library allocation
page read and write
1D26B659000
heap
page read and write
1DC3F95D000
trusted library allocation
page read and write
1DC382F3000
trusted library allocation
page read and write
1DC389FC000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3A2D6000
trusted library allocation
page read and write
1DC3FFC4000
trusted library allocation
page read and write
1DC419B1000
trusted library allocation
page read and write
1DC37CFD000
trusted library allocation
page read and write
1DC3A4DF000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC39CEB000
trusted library allocation
page read and write
1DC3B329000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38A4E000
trusted library allocation
page read and write
1DC38D33000
trusted library allocation
page read and write
1DC38972000
trusted library allocation
page read and write
1DC4206F000
trusted library allocation
page read and write
1DC39543000
trusted library allocation
page read and write
1DC3FAB5000
trusted library allocation
page read and write
201D5183000
heap
page read and write
1DC3A4D0000
trusted library allocation
page read and write
1DC43B1C000
trusted library allocation
page read and write
1DC3FF58000
trusted library allocation
page read and write
1DC3718E000
trusted library allocation
page read and write
1DC3788E000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC37768000
trusted library allocation
page read and write
1DC3953D000
trusted library allocation
page read and write
1DC3FC18000
trusted library allocation
page read and write
165A000
heap
page read and write
1DC3AF2F000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
20D81FE000
unkown
page readonly
1DC390E4000
trusted library allocation
page read and write
1DC3F9F6000
trusted library allocation
page read and write
1DC3FFE2000
trusted library allocation
page read and write
1DC3A357000
trusted library allocation
page read and write
1DC3B0C9000
trusted library allocation
page read and write
1DC3AF38000
trusted library allocation
page read and write
1DC3B39C000
trusted library allocation
page read and write
1DC394FA000
trusted library allocation
page read and write
1DC333C0000
trusted library allocation
page read and write
1DC3A0B8000
trusted library allocation
page read and write
1DC37766000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1D26B55F000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC3AF62000
trusted library allocation
page read and write
1DC37C4E000
trusted library allocation
page read and write
1DC384C0000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC3A2D4000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC39FD4000
trusted library allocation
page read and write
1DC3A4D0000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3F995000
trusted library allocation
page read and write
1DC34CA6000
trusted library allocation
page read and write
1DC3A564000
trusted library allocation
page read and write
1DC39DC6000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC3788C000
trusted library allocation
page read and write
1DC389C9000
trusted library allocation
page read and write
23E49820000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC40000000
trusted library allocation
page read and write
1DC3FED6000
trusted library allocation
page read and write
1DC378FC000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC37447000
heap
page read and write
1DC2EA46000
heap
page read and write
1DC430A8000
trusted library allocation
page read and write
1DC394E5000
trusted library allocation
page read and write
1DC420F9000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC34CF4000
trusted library allocation
page read and write
1DC3918E000
trusted library allocation
page read and write
1DC3FEA6000
trusted library allocation
page read and write
1DC3A0D3000
trusted library allocation
page read and write
1DC3783D000
trusted library allocation
page read and write
1DC39EAA000
trusted library allocation
page read and write
1DC419C4000
trusted library allocation
page read and write
1DC3FFAD000
trusted library allocation
page read and write
1DC42187000
trusted library allocation
page read and write
1DC39593000
trusted library allocation
page read and write
1DC3FA80000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC3FE73000
trusted library allocation
page read and write
15F467E000
stack
page read and write
1DC2E9F4000
heap
page read and write
201D6D6C000
heap
page read and write
1674000
heap
page read and write
1DC3BE01000
heap
page read and write
1DC3FFD8000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC2EA58000
heap
page read and write
1DC3A5D1000
trusted library allocation
page read and write
1DC2E9FE000
heap
page read and write
1DC3B347000
trusted library allocation
page read and write
1DC3A59A000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC3A344000
trusted library allocation
page read and write
1DC38DF9000
trusted library allocation
page read and write
1DC38AE4000
trusted library allocation
page read and write
1DC38A3C000
trusted library allocation
page read and write
1DC38F05000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC3FAB9000
trusted library allocation
page read and write
1DC34CF4000
trusted library allocation
page read and write
1DC3F8E9000
trusted library allocation
page read and write
1DC3FAFD000
trusted library allocation
page read and write
B90000
heap
page read and write
1DC2EA31000
heap
page read and write
E41000
unkown
page execute read
1DC37CD5000
trusted library allocation
page read and write
1DC38949000
trusted library allocation
page read and write
1DC3FE54000
trusted library allocation
page read and write
1DC42205000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2EA95000
heap
page read and write
1DC37888000
trusted library allocation
page read and write
1DC3AFF4000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3A29C000
trusted library allocation
page read and write
1DC38D3C000
trusted library allocation
page read and write
1DC3FE3A000
trusted library allocation
page read and write
1DC39477000
trusted library allocation
page read and write
1DC333EF000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3A094000
trusted library allocation
page read and write
1DC4209A000
trusted library allocation
page read and write
1DC3FBA0000
trusted library allocation
page read and write
1DC376CF000
trusted library allocation
page read and write
1DC417B7000
trusted library allocation
page read and write
1D26A700000
trusted library allocation
page read and write
1DC38D4B000
trusted library allocation
page read and write
1DC39330000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC391D7000
trusted library allocation
page read and write
1DC3F92A000
trusted library allocation
page read and write
1DC3F9E9000
trusted library allocation
page read and write
1DC3FC8A000
trusted library allocation
page read and write
1DC3FFD8000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC37493000
heap
page read and write
1DC2E9F1000
heap
page read and write
1DC2EA46000
heap
page read and write
1DC38D34000
trusted library allocation
page read and write
1DC38D3F000
trusted library allocation
page read and write
1DC384C3000
trusted library allocation
page read and write
201D5130000
heap
page read and write
1DC38D40000
trusted library allocation
page read and write
1DC3FB4B000
trusted library allocation
page read and write
1DC2EA63000
heap
page read and write
1DC2EA4C000
heap
page read and write
1DC3A011000
trusted library allocation
page read and write
1DC41792000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC39155000
trusted library allocation
page read and write
1DC2EA42000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC37CD5000
trusted library allocation
page read and write
1DC38D26000
trusted library allocation
page read and write
1DC390B0000
trusted library allocation
page read and write
1DC3A5F1000
trusted library allocation
page read and write
1DC2EA01000
heap
page read and write
1DC34C75000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FFDA000
trusted library allocation
page read and write
165F000
heap
page read and write
1DC2EA02000
heap
page read and write
1D26B63B000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3B0D0000
trusted library allocation
page read and write
1DC3FA55000
trusted library allocation
page read and write
1DC38487000
trusted library allocation
page read and write
1DC3AF40000
trusted library allocation
page read and write
1DC38477000
trusted library allocation
page read and write
1DC382F7000
trusted library allocation
page read and write
1DC3FC4B000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC3F916000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC3FC1F000
trusted library allocation
page read and write
1DC38D3E000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC36FC9000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3FBE3000
trusted library allocation
page read and write
1DC3F8D5000
trusted library allocation
page read and write
1D26B57D000
heap
page read and write
1DC394E7000
trusted library allocation
page read and write
1DC38DAF000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC38AFE000
trusted library allocation
page read and write
1DC3B907000
trusted library allocation
page read and write
1DC3822E000
trusted library allocation
page read and write
1DC394E9000
trusted library allocation
page read and write
1DC2EA52000
heap
page read and write
1DC38FDA000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC391C6000
trusted library allocation
page read and write
1DC391D9000
trusted library allocation
page read and write
1DC34CC7000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC3FE36000
trusted library allocation
page read and write
1DC3B0DC000
trusted library allocation
page read and write
1DC382D5000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC36FDC000
trusted library allocation
page read and write
1DC2EA67000
heap
page read and write
F02000
unkown
page readonly
AE48BFF000
stack
page read and write
1DC2E9E9000
heap
page read and write
1DC2E9FB000
heap
page read and write
AFF77FE000
stack
page read and write
1DC3FEE5000
trusted library allocation
page read and write
23E49CAC000
trusted library allocation
page read and write
1DC384C5000
trusted library allocation
page read and write
1DC3FAF2000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC382B3000
trusted library allocation
page read and write
1DC39BAA000
trusted library allocation
page read and write
1DC378FC000
trusted library allocation
page read and write
1DC37492000
heap
page read and write
1DC38D79000
trusted library allocation
page read and write
1DC38479000
trusted library allocation
page read and write
1DC3FAF2000
trusted library allocation
page read and write
1D26B600000
heap
page read and write
1DC39187000
trusted library allocation
page read and write
1DC39563000
trusted library allocation
page read and write
1DC38FC4000
trusted library allocation
page read and write
1DC3A5EF000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2EA46000
heap
page read and write
1DC39CA0000
trusted library allocation
page read and write
1D26A47E000
remote allocation
page execute read
1DC38D82000
trusted library allocation
page read and write
1DC34C62000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DC3B90C000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC43BAC000
trusted library allocation
page read and write
1DC41772000
trusted library allocation
page read and write
1DC3841F000
trusted library allocation
page read and write
1DC382D5000
trusted library allocation
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC3B8C8000
trusted library allocation
page read and write
1DC395F4000
trusted library allocation
page read and write
1DC36F9B000
trusted library allocation
page read and write
1DC41993000
trusted library allocation
page read and write
1DC391D9000
trusted library allocation
page read and write
1DC391FE000
trusted library allocation
page read and write
1DC3A321000
trusted library allocation
page read and write
1DC391D9000
trusted library allocation
page read and write
1DC38CEC000
trusted library allocation
page read and write
1DC3FFAF000
trusted library allocation
page read and write
1DEDFE70000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3B0DC000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC38C9D000
trusted library allocation
page read and write
1DC39365000
trusted library allocation
page read and write
1DC3FF5A000
trusted library allocation
page read and write
23E49D86000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DEDFD0C000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC43698000
trusted library allocation
page read and write
1DC3FA0B000
trusted library allocation
page read and write
1DC33A13000
trusted library allocation
page read and write
1DC390CF000
trusted library allocation
page read and write
1DC39DFD000
trusted library allocation
page read and write
1DC389B2000
trusted library allocation
page read and write
1DC3FF7A000
trusted library allocation
page read and write
1DC38EB3000
trusted library allocation
page read and write
AFF99FE000
stack
page read and write
1DC39C6E000
trusted library allocation
page read and write
1DC34C75000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
14B4000
heap
page read and write
1DC3A353000
trusted library allocation
page read and write
1DC3FAB5000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
165F000
heap
page read and write
1DC34C63000
trusted library allocation
page read and write
1DC389B4000
trusted library allocation
page read and write
1D26B658000
heap
page read and write
1DC3934E000
trusted library allocation
page read and write
1DC382B9000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC37786000
trusted library allocation
page read and write
1DC36FDC000
trusted library allocation
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DEDFC00000
trusted library allocation
page read and write
1DC384CB000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC4207E000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC436A2000
trusted library allocation
page read and write
1DC378CE000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC382D5000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC395F8000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1D26B5E8000
heap
page read and write
1DC39097000
trusted library allocation
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39005000
trusted library allocation
page read and write
1D26B58A000
heap
page read and write
1DC39CB4000
trusted library allocation
page read and write
1DC39CF1000
trusted library allocation
page read and write
1DC43200000
trusted library allocation
page read and write
1DC37C27000
trusted library allocation
page read and write
1DC3B378000
trusted library allocation
page read and write
1DC39086000
trusted library allocation
page read and write
1DC39BAD000
trusted library allocation
page read and write
1DC391BD000
trusted library allocation
page read and write
1DC3A4DB000
trusted library allocation
page read and write
1DC2EAA3000
heap
page read and write
1DC38D50000
trusted library allocation
page read and write
1DC3FAC2000
trusted library allocation
page read and write
1DC3A3B2000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC3B87F000
trusted library allocation
page read and write
1DC384CD000
trusted library allocation
page read and write
1DC3A3CF000
trusted library allocation
page read and write
1DC436A4000
trusted library allocation
page read and write
1DC39132000
trusted library allocation
page read and write
1E2E000
stack
page read and write
1DC384DB000
trusted library allocation
page read and write
1DC393AD000
trusted library allocation
page read and write
1DC38AF4000
trusted library allocation
page read and write
1DC3B351000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC393C7000
trusted library allocation
page read and write
1DC34CBE000
trusted library allocation
page read and write
1D26B62D000
heap
page read and write
1DC42207000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC3F9F6000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC39092000
trusted library allocation
page read and write
1DC2EA67000
heap
page read and write
1DC391CA000
trusted library allocation
page read and write
1DC36F7A000
trusted library allocation
page read and write
1DC3FC11000
trusted library allocation
page read and write
1DC3FF73000
trusted library allocation
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC3F97A000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC3F8F1000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3F9CC000
trusted library allocation
page read and write
14B4000
heap
page read and write
1DC3FED6000
trusted library allocation
page read and write
1DC423A1000
trusted library allocation
page read and write
1DC39092000
trusted library allocation
page read and write
1DC382DF000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC34CFE000
trusted library allocation
page read and write
1D26B677000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DC393E3000
trusted library allocation
page read and write
1DC39060000
trusted library allocation
page read and write
1DC4226D000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC38D3C000
trusted library allocation
page read and write
1DC3A339000
trusted library allocation
page read and write
1DC3B3D1000
trusted library allocation
page read and write
1DC374A5000
heap
page read and write
1D26B644000
heap
page read and write
23E499C0000
unclassified section
page readonly
1DC2E9FF000
heap
page read and write
1DC3FB24000
trusted library allocation
page read and write
1DC394ED000
trusted library allocation
page read and write
1DEDFB80000
heap
page readonly
1DC2E9EE000
heap
page read and write
1DC3915E000
trusted library allocation
page read and write
1DC3896E000
trusted library allocation
page read and write
1DEDFD30000
trusted library allocation
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC43664000
trusted library allocation
page read and write
1DC38499000
trusted library allocation
page read and write
1DC392E7000
trusted library allocation
page read and write
1DC34C2D000
trusted library allocation
page read and write
1DC34C64000
trusted library allocation
page read and write
1DC36FCF000
trusted library allocation
page read and write
F0C000
unkown
page write copy
1DC37C3D000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3FE46000
trusted library allocation
page read and write
1DC3A2AE000
trusted library allocation
page read and write
1DC3FFAD000
trusted library allocation
page read and write
1DC39486000
trusted library allocation
page read and write
1DC422A7000
trusted library allocation
page read and write
1DC420AB000
trusted library allocation
page read and write
1DC3B0C8000
trusted library allocation
page read and write
1DC420C3000
trusted library allocation
page read and write
1DC3FAC0000
trusted library allocation
page read and write
1DEDFD5F000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3F8DB000
trusted library allocation
page read and write
1D26B62A000
heap
page read and write
1DC3BE01000
heap
page read and write
1DC3FC8F000
trusted library allocation
page read and write
1DC34AB8000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3B3FA000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA3F000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC3FEEB000
trusted library allocation
page read and write
1DC3788C000
trusted library allocation
page read and write
1DC3848A000
trusted library allocation
page read and write
1DC38479000
trusted library allocation
page read and write
1DC3AFFD000
trusted library allocation
page read and write
1DC422E4000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC37CC5000
trusted library allocation
page read and write
1DC393A1000
trusted library allocation
page read and write
1DC39C4D000
trusted library allocation
page read and write
1DC3A35B000
trusted library allocation
page read and write
1DC3FBF8000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1D26B560000
heap
page read and write
201D5300000
trusted library allocation
page read and write
23E49C5D000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC3FFCE000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC39DF8000
trusted library allocation
page read and write
1DC382DC000
trusted library allocation
page read and write
1DC3FAC0000
trusted library allocation
page read and write
1DC3FEC2000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC38D45000
trusted library allocation
page read and write
1DC384C7000
trusted library allocation
page read and write
1DC3B0DC000
trusted library allocation
page read and write
1DC38926000
trusted library allocation
page read and write
1DC34C6C000
trusted library allocation
page read and write
1DC3FEFE000
trusted library allocation
page read and write
1DC378C4000
trusted library allocation
page read and write
1DC3747B000
heap
page read and write
1D26A903000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC38972000
trusted library allocation
page read and write
1DC423D5000
trusted library allocation
page read and write
1DC3BE89000
heap
page read and write
1DC374A4000
heap
page read and write
1DC2E9EA000
heap
page read and write
1DC2EA05000
heap
page read and write
1DC390FD000
trusted library allocation
page read and write
1DC2EA05000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC3B0E2000
trusted library allocation
page read and write
1DC3FC59000
trusted library allocation
page read and write
1DC2EA60000
heap
page read and write
1DC37CE7000
trusted library allocation
page read and write
1DC2EA0C000
heap
page read and write
1DC37489000
heap
page read and write
1DC3F8ED000
trusted library allocation
page read and write
1DC38217000
trusted library allocation
page read and write
1DC37657000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DEDFD70000
trusted library allocation
page read and write
1DC3A01A000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9FB000
heap
page read and write
1DC394F6000
trusted library allocation
page read and write
1DC3FECA000
trusted library allocation
page read and write
1DC38D7B000
trusted library allocation
page read and write
1DC3FAFD000
trusted library allocation
page read and write
1DC38D60000
trusted library allocation
page read and write
1DC3BA06000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC436AF000
trusted library allocation
page read and write
1DC38983000
trusted library allocation
page read and write
1DC3905B000
trusted library allocation
page read and write
1DC382D7000
trusted library allocation
page read and write
1D26B5AA000
heap
page read and write
1DC391BE000
trusted library allocation
page read and write
1DC392C4000
trusted library allocation
page read and write
1DC3FBA4000
trusted library allocation
page read and write
1DC3A3CD000
trusted library allocation
page read and write
1DC38D3E000
trusted library allocation
page read and write
1DC391E3000
trusted library allocation
page read and write
1DC3903A000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC38451000
trusted library allocation
page read and write
1DC3F9E9000
trusted library allocation
page read and write
1DC3AFBB000
trusted library allocation
page read and write
1DC4232E000
trusted library allocation
page read and write
1DC3FFE5000
trusted library allocation
page read and write
1DC3FCB3000
trusted library allocation
page read and write
1DC39DD3000
trusted library allocation
page read and write
1DC3FF14000
trusted library allocation
page read and write
1DC3FEE2000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC3A3CA000
trusted library allocation
page read and write
23E49C2E000
trusted library allocation
page read and write
1DC38487000
trusted library allocation
page read and write
201D515A000
heap
page read and write
1DC3F94E000
trusted library allocation
page read and write
1DC34C6E000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC3F93F000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3FA18000
trusted library allocation
page read and write
1DC3845F000
trusted library allocation
page read and write
1DC34AF1000
trusted library allocation
page read and write
1DC38438000
trusted library allocation
page read and write
1DC402E8000
trusted library allocation
page read and write
1DC39553000
trusted library allocation
page read and write
1DC419DF000
trusted library allocation
page read and write
1DC2EA54000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3AF7C000
trusted library allocation
page read and write
1DC390AF000
trusted library allocation
page read and write
1DC390BC000
trusted library allocation
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC36FCB000
trusted library allocation
page read and write
1DC2EA59000
heap
page read and write
1DC3A31B000
trusted library allocation
page read and write
1DC3909F000
trusted library allocation
page read and write
1DC39079000
trusted library allocation
page read and write
1D26A9C4000
trusted library allocation
page read and write
1DC36F60000
trusted library allocation
page read and write
1DC38975000
trusted library allocation
page read and write
3FB150824000
trusted library allocation
page read and write
1DC3A3A7000
trusted library allocation
page read and write
1DEDFB30000
heap
page read and write
1DC34C42000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC36F33000
trusted library allocation
page read and write
1DC390FD000
trusted library allocation
page read and write
1DC378D4000
trusted library allocation
page read and write
39D1000
heap
page read and write
1DC37C5B000
trusted library allocation
page read and write
1DC3FBF8000
trusted library allocation
page read and write
1DC3A356000
trusted library allocation
page read and write
1DC34C98000
trusted library allocation
page read and write
1DC39097000
trusted library allocation
page read and write
1DC3BE8D000
heap
page read and write
1DC2E9E9000
heap
page read and write
1DC2EA5B000
heap
page read and write
1DC417FA000
trusted library allocation
page read and write
1DC423CC000
trusted library allocation
page read and write
1DC389DD000
trusted library allocation
page read and write
1DC3FFEE000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC37CF0000
trusted library allocation
page read and write
1DC37458000
heap
page read and write
1D26B56C000
heap
page read and write
1D26B569000
heap
page read and write
1DC3AFE4000
trusted library allocation
page read and write
14B4000
heap
page read and write
1DC417A4000
trusted library allocation
page read and write
1DC3710C000
trusted library allocation
page read and write
1D26B5F1000
heap
page read and write
1DC377CE000
trusted library allocation
page read and write
1DC37C0F000
trusted library allocation
page read and write
1DC37CF7000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC34CDD000
trusted library allocation
page read and write
1DC384DC000
trusted library allocation
page read and write
1DC3AFD3000
trusted library allocation
page read and write
1DC36F78000
trusted library allocation
page read and write
1DC34C6C000
trusted library allocation
page read and write
1D26AF70000
heap
page read and write
1DC384C3000
trusted library allocation
page read and write
1DC394E8000
trusted library allocation
page read and write
1DC39317000
trusted library allocation
page read and write
1DC395FA000
trusted library allocation
page read and write
1DC34CA6000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC3AF91000
trusted library allocation
page read and write
1DEDFD68000
trusted library allocation
page read and write
AE47BFE000
stack
page read and write
1DC42090000
trusted library allocation
page read and write
1DC33AD4000
trusted library allocation
page read and write
1DC3B3FE000
trusted library allocation
page read and write
1DC2EA3B000
heap
page read and write
1DC39ECC000
trusted library allocation
page read and write
1DC3946F000
trusted library allocation
page read and write
1DC2EA5F000
heap
page read and write
1DC391CC000
trusted library allocation
page read and write
1DC33A89000
trusted library allocation
page read and write
1DC2E9FE000
heap
page read and write
1DEDFD00000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC37C3A000
trusted library allocation
page read and write
1DC39413000
trusted library allocation
page read and write
1DC38DAE000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3A307000
trusted library allocation
page read and write
1DC2EA46000
heap
page read and write
1DC3A39F000
trusted library allocation
page read and write
1DC3917D000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
E3E000
stack
page read and write
1DC2E9FF000
heap
page read and write
1DC3FC47000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3891F000
trusted library allocation
page read and write
1DC3FFAB000
trusted library allocation
page read and write
1DC34C0E000
trusted library allocation
page read and write
1DC3A0FA000
trusted library allocation
page read and write
1D26B40B000
trusted library allocation
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1DC34AB8000
trusted library allocation
page read and write
1DC38EFE000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC420AB000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC3A569000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2E9D1000
heap
page read and write
1DC3FBCF000
trusted library allocation
page read and write
1DC3FC27000
trusted library allocation
page read and write
1DC39543000
trusted library allocation
page read and write
1DC39D85000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC391CA000
trusted library allocation
page read and write
1DC3FFB1000
trusted library allocation
page read and write
1DC33ACC000
trusted library allocation
page read and write
1DC39CDD000
trusted library allocation
page read and write
1DC3A569000
trusted library allocation
page read and write
23E49730000
unclassified section
page readonly
1DC2EA4A000
heap
page read and write
1DC3B0DC000
trusted library allocation
page read and write
1DC3BE71000
heap
page read and write
1DC3AFDE000
trusted library allocation
page read and write
1DC3A07C000
trusted library allocation
page read and write
1DC39189000
trusted library allocation
page read and write
1DC389A4000
trusted library allocation
page read and write
1D26B5F1000
heap
page read and write
1DC34C6E000
trusted library allocation
page read and write
23E49E00000
trusted library allocation
page read and write
1DC3FBF3000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC39546000
trusted library allocation
page read and write
1DC2EA43000
heap
page read and write
1DC2EA76000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC3FE43000
trusted library allocation
page read and write
1DC3FA75000
trusted library allocation
page read and write
1DC3AF7C000
trusted library allocation
page read and write
1DC419EA000
trusted library allocation
page read and write
1DC3A2C9000
trusted library allocation
page read and write
1DC417B3000
trusted library allocation
page read and write
1DC3FF73000
trusted library allocation
page read and write
1DC38223000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC42050000
trusted library allocation
page read and write
1DC395F8000
trusted library allocation
page read and write
1DC3FF58000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC395F2000
trusted library allocation
page read and write
1DC3FB4B000
trusted library allocation
page read and write
1DC3778E000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
23E49B00000
trusted library allocation
page read and write
1DC38D60000
trusted library allocation
page read and write
1D26A63A000
heap
page read and write
1DC3FBF3000
trusted library allocation
page read and write
1DC393B7000
trusted library allocation
page read and write
1DC3AFC2000
trusted library allocation
page read and write
1D26A912000
trusted library allocation
page read and write
E41000
unkown
page execute read
1DC42241000
trusted library allocation
page read and write
1DC3FEF6000
trusted library allocation
page read and write
1DC38D42000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3A56E000
trusted library allocation
page read and write
1DC3FFC0000
trusted library allocation
page read and write
1DC36FFE000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3F8F5000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3AF8C000
trusted library allocation
page read and write
1DC395DB000
trusted library allocation
page read and write
1DC2EA52000
heap
page read and write
1DC2E9F1000
heap
page read and write
1DC37877000
trusted library allocation
page read and write
1DC3A354000
trusted library allocation
page read and write
1DC39096000
trusted library allocation
page read and write
12EF000
stack
page read and write
1DC39152000
trusted library allocation
page read and write
1DC3A37F000
trusted library allocation
page read and write
1D26B5E3000
heap
page read and write
1DC3F8F5000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC38ED5000
trusted library allocation
page read and write
1DC3B33B000
trusted library allocation
page read and write
1DC34AF1000
trusted library allocation
page read and write
1DC3A3AF000
trusted library allocation
page read and write
1DC3930B000
trusted library allocation
page read and write
1DC3841A000
trusted library allocation
page read and write
1DC3FA18000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3A3CA000
trusted library allocation
page read and write
1D26B569000
heap
page read and write
1DC390D9000
trusted library allocation
page read and write
1DC42067000
trusted library allocation
page read and write
1DEDF973000
heap
page read and write
1DC3FFB1000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1D26B5E3000
heap
page read and write
1DC3A353000
trusted library allocation
page read and write
1DC43632000
trusted library allocation
page read and write
1DC2EA55000
heap
page read and write
1DC3BE01000
heap
page read and write
1DC3AFDB000
trusted library allocation
page read and write
F14000
unkown
page readonly
1D26B5FD000
heap
page read and write
1DC38CCB000
trusted library allocation
page read and write
1DC389C3000
trusted library allocation
page read and write
1DC2EA4C000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC2EA46000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC384CB000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC3FEC3000
trusted library allocation
page read and write
1DC3FA3C000
trusted library allocation
page read and write
1DC3B39C000
trusted library allocation
page read and write
1DC36F61000
trusted library allocation
page read and write
1DC3AF6C000
trusted library allocation
page read and write
1DC2E9F9000
heap
page read and write
1DC2EA44000
heap
page read and write
166F000
heap
page read and write
1DC395D3000
trusted library allocation
page read and write
1DC3906E000
trusted library allocation
page read and write
1DC3FBB2000
trusted library allocation
page read and write
1DC41F93000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC395D8000
trusted library allocation
page read and write
23E49740000
unclassified section
page readonly
1DC37894000
trusted library allocation
page read and write
1DC37C7D000
trusted library allocation
page read and write
1DC2E9EA000
heap
page read and write
1DC39C6B000
trusted library allocation
page read and write
1DC3A080000
trusted library allocation
page read and write
201D5400000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC43681000
trusted library allocation
page read and write
1D26B658000
heap
page read and write
1DC3AF26000
trusted library allocation
page read and write
1DC4218A000
trusted library allocation
page read and write
1DC2EA2B000
heap
page read and write
1DC420AB000
trusted library allocation
page read and write
1DC38461000
trusted library allocation
page read and write
1DC382B3000
trusted library allocation
page read and write
1DC34C11000
trusted library allocation
page read and write
1DC37489000
heap
page read and write
1DC3A3AA000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FAC0000
trusted library allocation
page read and write
1DC3BE01000
heap
page read and write
1DC4206C000
trusted library allocation
page read and write
1DC4232C000
trusted library allocation
page read and write
1DC3A169000
trusted library allocation
page read and write
1DC3AF62000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC2EA3E000
heap
page read and write
1DC3A321000
trusted library allocation
page read and write
1DC3AF44000
trusted library allocation
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC3A41E000
trusted library allocation
page read and write
15F15D8000
stack
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3B905000
trusted library allocation
page read and write
1DC38DDF000
trusted library allocation
page read and write
1DC420B5000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3FEF8000
trusted library allocation
page read and write
1DC37CD5000
trusted library allocation
page read and write
1DEDFD65000
trusted library allocation
page read and write
1DC3FBCF000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC39332000
trusted library allocation
page read and write
1DC374AE000
heap
page read and write
1DC417FA000
trusted library allocation
page read and write
1DC3AFEE000
trusted library allocation
page read and write
1DC3904B000
trusted library allocation
page read and write
1DC2E9FE000
heap
page read and write
1DC3778E000
trusted library allocation
page read and write
1DC3B092000
trusted library allocation
page read and write
1DC417F2000
trusted library allocation
page read and write
1DC395DF000
trusted library allocation
page read and write
1DC2EA32000
heap
page read and write
1DC3B9A7000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38416000
trusted library allocation
page read and write
1DC3A2BA000
trusted library allocation
page read and write
1DC3896E000
trusted library allocation
page read and write
1D26B5EC000
heap
page read and write
1DC41F69000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC39546000
trusted library allocation
page read and write
1DC339FB000
trusted library allocation
page read and write
1DC3849B000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3FBA0000
trusted library allocation
page read and write
1DC38F84000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1D26A410000
unclassified section
page readonly
201D518B000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC2EA4B000
heap
page read and write
1DC38D6B000
trusted library allocation
page read and write
1DC37877000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC2EA32000
heap
page read and write
1DC2E9F5000
heap
page read and write
2673C500000
trusted library allocation
page read and write
1DC3A2B4000
trusted library allocation
page read and write
1DC3949D000
trusted library allocation
page read and write
1DC3767E000
trusted library allocation
page read and write
1DC3FA80000
trusted library allocation
page read and write
1DC38E91000
trusted library allocation
page read and write
39D1000
heap
page read and write
1DC3845F000
trusted library allocation
page read and write
1DC3A339000
trusted library allocation
page read and write
1DC38D2E000
trusted library allocation
page read and write
1DC3BE26000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3FE20000
trusted library allocation
page read and write
1D26B59C000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC3893F000
trusted library allocation
page read and write
1DC37492000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC38A3F000
trusted library allocation
page read and write
1DC3F932000
trusted library allocation
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC3B33D000
trusted library allocation
page read and write
1DC3B335000
trusted library allocation
page read and write
1DC3F8D5000
trusted library allocation
page read and write
1DC39DFD000
trusted library allocation
page read and write
1DC2EA58000
heap
page read and write
1DC3746B000
heap
page read and write
1DC3B3EE000
trusted library allocation
page read and write
1DC382B3000
trusted library allocation
page read and write
1DC2EA53000
heap
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC34C98000
trusted library allocation
page read and write
1DC3A347000
trusted library allocation
page read and write
1DC38D4E000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
1DC3BA33000
trusted library allocation
page read and write
1DC38487000
trusted library allocation
page read and write
1DC2EA32000
heap
page read and write
1DC419D7000
trusted library allocation
page read and write
1DC3FAC2000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
AE463FF000
stack
page read and write
1DC38A4E000
trusted library allocation
page read and write
1DC38A54000
trusted library allocation
page read and write
1DC391A9000
trusted library allocation
page read and write
1653000
heap
page read and write
1DC3FBE9000
trusted library allocation
page read and write
1DC2EA55000
heap
page read and write
1DEDF960000
unclassified section
page readonly
1DEDFA00000
unclassified section
page readonly
1DC2E9F9000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1D26A9C0000
trusted library allocation
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC420FD000
trusted library allocation
page read and write
1DC3908F000
trusted library allocation
page read and write
1D26A981000
trusted library allocation
page read and write
1DC38477000
trusted library allocation
page read and write
1DC3918D000
trusted library allocation
page read and write
1DC4179D000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC38474000
trusted library allocation
page read and write
1DC3B347000
trusted library allocation
page read and write
1DEDFB90000
unclassified section
page read and write
1DC3A2DC000
trusted library allocation
page read and write
1DC394C3000
trusted library allocation
page read and write
1DC38484000
trusted library allocation
page read and write
1DC3A2D3000
trusted library allocation
page read and write
1DC2EA50000
heap
page read and write
1DC38961000
trusted library allocation
page read and write
1DC2EA31000
heap
page read and write
1DC3FAF9000
trusted library allocation
page read and write
1DC38DC5000
trusted library allocation
page read and write
1DC378D6000
trusted library allocation
page read and write
1DC3FAB9000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC38928000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC33390000
trusted library allocation
page read and write
1DC3A5AE000
trusted library allocation
page read and write
1DC3AFAE000
trusted library allocation
page read and write
1DC39187000
trusted library allocation
page read and write
1DC39BE7000
trusted library allocation
page read and write
1DC41929000
trusted library allocation
page read and write
1DC2EA67000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC3FA4F000
trusted library allocation
page read and write
1DC390AF000
trusted library allocation
page read and write
1DC3747F000
heap
page read and write
1DC3F8E9000
trusted library allocation
page read and write
1DC3A4DB000
trusted library allocation
page read and write
23E49980000
heap
page readonly
1D26A6B0000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC39C90000
trusted library allocation
page read and write
1DC402E8000
trusted library allocation
page read and write
1DC390BC000
trusted library allocation
page read and write
1DC3FE3C000
trusted library allocation
page read and write
1DC394C3000
trusted library allocation
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC3FEC2000
trusted library allocation
page read and write
1DC3948A000
trusted library allocation
page read and write
1DC3A047000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC3AFB8000
trusted library allocation
page read and write
1DC390E9000
trusted library allocation
page read and write
1DC2EA63000
heap
page read and write
1DC3A4C7000
trusted library allocation
page read and write
1D26B569000
heap
page read and write
1DC4368D000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC37766000
trusted library allocation
page read and write
1DC3A2C9000
trusted library allocation
page read and write
1DC39C8D000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC4209E000
trusted library allocation
page read and write
1D26A894000
heap
page read and write
1DC3FAB3000
trusted library allocation
page read and write
1DC3F8A7000
trusted library allocation
page read and write
1DC3FAB3000
trusted library allocation
page read and write
1DC39094000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC38939000
trusted library allocation
page read and write
1D26B5E8000
heap
page read and write
1DC39004000
trusted library allocation
page read and write
1DC37C3D000
trusted library allocation
page read and write
D6E1A71000
trusted library allocation
page execute read
1DC394E5000
trusted library allocation
page read and write
1DC3B338000
trusted library allocation
page read and write
23E49CC8000
trusted library allocation
page read and write
1DC390B7000
trusted library allocation
page read and write
1DC382BE000
trusted library allocation
page read and write
1DC378BB000
trusted library allocation
page read and write
1DC39086000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9EE000
heap
page read and write
3AD0000
trusted library allocation
page read and write
1DC2E9F0000
heap
page read and write
1DC3F97A000
trusted library allocation
page read and write
1DC2EA11000
heap
page read and write
1DC37678000
trusted library allocation
page read and write
1DC33A1B000
trusted library allocation
page read and write
1DC3A3AF000
trusted library allocation
page read and write
1DC39036000
trusted library allocation
page read and write
1DC38DA5000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DC3B347000
trusted library allocation
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC2EA0B000
heap
page read and write
1DC39198000
trusted library allocation
page read and write
1DC34C64000
trusted library allocation
page read and write
1DC2EA55000
heap
page read and write
1DC3FA5C000
trusted library allocation
page read and write
1DC3FECC000
trusted library allocation
page read and write
1DC2E9F3000
heap
page read and write
1DC436EF000
trusted library allocation
page read and write
1DC390FD000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F8000
heap
page read and write
1DC39189000
trusted library allocation
page read and write
1DC378BE000
trusted library allocation
page read and write
1DC3AFB8000
trusted library allocation
page read and write
1DC3B3EE000
trusted library allocation
page read and write
1DC3AF52000
trusted library allocation
page read and write
1DC37694000
trusted library allocation
page read and write
1DC393BA000
trusted library allocation
page read and write
1DC37C5F000
trusted library allocation
page read and write
1DC34C79000
trusted library allocation
page read and write
1DC3AF66000
trusted library allocation
page read and write
1DC389ED000
trusted library allocation
page read and write
1DC3BA2C000
trusted library allocation
page read and write
1DC3FBB2000
trusted library allocation
page read and write
1DC378C4000
trusted library allocation
page read and write
1DC37C57000
trusted library allocation
page read and write
1DC3FB37000
trusted library allocation
page read and write
201D518B000
heap
page read and write
1DC384CD000
trusted library allocation
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC3FEA7000
trusted library allocation
page read and write
1DC39DC0000
trusted library allocation
page read and write
1DC3FC0B000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3A3FA000
trusted library allocation
page read and write
1DC3A3AF000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC42198000
trusted library allocation
page read and write
1DC394E7000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3FA3C000
trusted library allocation
page read and write
1DC3A4D2000
trusted library allocation
page read and write
1DC2EA44000
heap
page read and write
1DC3B338000
trusted library allocation
page read and write
1DC3932C000
trusted library allocation
page read and write
1DC3A3CA000
trusted library allocation
page read and write
1DC394FA000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC3F995000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DEE0003000
trusted library allocation
page read and write
1DC389B7000
trusted library allocation
page read and write
1DC38D3E000
trusted library allocation
page read and write
1DC3AFB8000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC2EA48000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC39096000
trusted library allocation
page read and write
1DC3FB3C000
trusted library allocation
page read and write
1DC3A3D8000
trusted library allocation
page read and write
1DC2EA3E000
heap
page read and write
1DC417AE000
trusted library allocation
page read and write
1DC39148000
trusted library allocation
page read and write
20D923E000
unkown
page readonly
1DC2E9EF000
heap
page read and write
1DC37464000
heap
page read and write
1DC2E9EA000
heap
page read and write
1DC374A4000
heap
page read and write
1DC394E5000
trusted library allocation
page read and write
1DC3F9E9000
trusted library allocation
page read and write
1DC333C9000
trusted library allocation
page read and write
1DC3A407000
trusted library allocation
page read and write
1DC3B3D1000
trusted library allocation
page read and write
1DC2EA2B000
heap
page read and write
1D26B5E0000
heap
page read and write
1DC33A26000
trusted library allocation
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC390FD000
trusted library allocation
page read and write
1DC3FB90000
trusted library allocation
page read and write
1DC3A349000
trusted library allocation
page read and write
23E497C0000
unclassified section
page readonly
1DC3A4DB000
trusted library allocation
page read and write
1D26B509000
heap
page read and write
1DC402D4000
trusted library allocation
page read and write
1DC382CA000
trusted library allocation
page read and write
2673C410000
heap
page read and write
1DC391A6000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3BE4E000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC417F2000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC2EA02000
heap
page read and write
1DC349CA000
trusted library allocation
page read and write
1DC38F28000
trusted library allocation
page read and write
1DC3FE2D000
trusted library allocation
page read and write
1DC3AFE4000
trusted library allocation
page read and write
1DC42301000
trusted library allocation
page read and write
1DC3A349000
trusted library allocation
page read and write
1DC3A36F000
trusted library allocation
page read and write
1DC3F91A000
trusted library allocation
page read and write
1DC38969000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC3FBB9000
trusted library allocation
page read and write
1DC39D4D000
trusted library allocation
page read and write
1DC3954B000
trusted library allocation
page read and write
1DC38DB2000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2EA1C000
heap
page read and write
1DC419E0000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC39DCB000
trusted library allocation
page read and write
1DC3A284000
trusted library allocation
page read and write
1DC37671000
trusted library allocation
page read and write
1DC3AFDB000
trusted library allocation
page read and write
1DC38D55000
trusted library allocation
page read and write
1DC2EA76000
heap
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1DC3FCFE000
trusted library allocation
page read and write
1DC421A3000
trusted library allocation
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
1DC3FA0C000
trusted library allocation
page read and write
1DC39031000
trusted library allocation
page read and write
1DC2EA2F000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC38A5A000
trusted library allocation
page read and write
1DC38D89000
trusted library allocation
page read and write
1DEDFD63000
trusted library allocation
page read and write
1DC3FF58000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC37847000
trusted library allocation
page read and write
1DEDFB92000
unclassified section
page read and write
1DC3A06D000
trusted library allocation
page read and write
1DEDFB9F000
unclassified section
page read and write
1DC421F8000
trusted library allocation
page read and write
1DC4193C000
trusted library allocation
page read and write
1DC2E9E6000
heap
page read and write
1DC2E9F1000
heap
page read and write
1DC3A3A7000
trusted library allocation
page read and write
1650000
heap
page read and write
1DC3FBE9000
trusted library allocation
page read and write
1DC3A5C0000
trusted library allocation
page read and write
1DC39185000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC38D8D000
trusted library allocation
page read and write
15F3E7E000
unkown
page readonly
1DC3F95D000
trusted library allocation
page read and write
1DC3A4D3000
trusted library allocation
page read and write
1DC390AA000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39548000
trusted library allocation
page read and write
1DC2EA03000
heap
page read and write
1DC4195C000
trusted library allocation
page read and write
1DC38479000
trusted library allocation
page read and write
1D26B5F1000
heap
page read and write
1DC2E9F9000
heap
page read and write
1DC2E9EA000
heap
page read and write
15F0BDE000
unkown
page readonly
1DC2EA32000
heap
page read and write
1DC2E9FD000
heap
page read and write
1DC394E5000
trusted library allocation
page read and write
1DC42090000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC3BE47000
heap
page read and write
1D26B58D000
heap
page read and write
1DC389F3000
trusted library allocation
page read and write
1DC3BEE1000
heap
page read and write
1DC2E9F3000
heap
page read and write
1DC417A3000
trusted library allocation
page read and write
1D26B5F1000
heap
page read and write
1DC3F8E9000
trusted library allocation
page read and write
1DC3B87B000
trusted library allocation
page read and write
1DC3A56E000
trusted library allocation
page read and write
1DC394A4000
trusted library allocation
page read and write
1DC3AFB8000
trusted library allocation
page read and write
1DC41785000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3908B000
trusted library allocation
page read and write
1DC3748D000
heap
page read and write
1DC37C52000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2E9F1000
heap
page read and write
1D26A811000
unkown
page execute read
1DC39EEF000
trusted library allocation
page read and write
1DC38433000
trusted library allocation
page read and write
1DC3778A000
trusted library allocation
page read and write
1DC39E88000
trusted library allocation
page read and write
1DC378FC000
trusted library allocation
page read and write
39D1000
heap
page read and write
20D5EAE000
unkown
page readonly
201D540A000
trusted library allocation
page read and write
1DC3FAFD000
trusted library allocation
page read and write
1DC390C1000
trusted library allocation
page read and write
1DC417B3000
trusted library allocation
page read and write
1DC3F9D8000
trusted library allocation
page read and write
1DC3F8DF000
trusted library allocation
page read and write
1DC3FA4D000
trusted library allocation
page read and write
1DC38D30000
trusted library allocation
page read and write
1DC38479000
trusted library allocation
page read and write
1DC33B00000
trusted library allocation
page read and write
1DC421FC000
trusted library allocation
page read and write
1DC390EF000
trusted library allocation
page read and write
23E49D80000
heap
page read and write
1DC2EA47000
heap
page read and write
1DC2EA4D000
heap
page read and write
1DC38D98000
trusted library allocation
page read and write
1DC2EA47000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC390D3000
trusted library allocation
page read and write
1DC3BE6A000
heap
page read and write
1DC2EA56000
heap
page read and write
1DC2EA3C000
heap
page read and write
1DC2E9F0000
heap
page read and write
1DC3A4D5000
trusted library allocation
page read and write
1DC38A43000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2EA43000
heap
page read and write
1DC3FF53000
trusted library allocation
page read and write
201D5407000
trusted library allocation
page read and write
1DC3FC8F000
trusted library allocation
page read and write
201D6D79000
heap
page read and write
1DC3AFBB000
trusted library allocation
page read and write
1DC39362000
trusted library allocation
page read and write
1DC3F9D8000
trusted library allocation
page read and write
1DEDFD24000
trusted library allocation
page read and write
1DC2E9FF000
heap
page read and write
1DC2EA44000
heap
page read and write
1DC395EC000
trusted library allocation
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC390E4000
trusted library allocation
page read and write
1DC38D60000
trusted library allocation
page read and write
1DC38E9A000
trusted library allocation
page read and write
1DC3FAB7000
trusted library allocation
page read and write
1DC39494000
trusted library allocation
page read and write
1DC37C85000
trusted library allocation
page read and write
1DC39396000
trusted library allocation
page read and write
1DC3FFD8000
trusted library allocation
page read and write
1DC3FE93000
trusted library allocation
page read and write
1DC3A3C8000
trusted library allocation
page read and write
1DC378BB000
trusted library allocation
page read and write
1DC38A3D000
trusted library allocation
page read and write
1DC3A4D0000
trusted library allocation
page read and write
1DC34CBE000
trusted library allocation
page read and write
1DC389B7000
trusted library allocation
page read and write
1DC376B3000
trusted library allocation
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9EF000
heap
page read and write
1DC378A2000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DC2E9E9000
heap
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC390D7000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
23E49990000
unclassified section
page read and write
23E49930000
heap
page read and write
1DC34CBE000
trusted library allocation
page read and write
1DC3FAC9000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC2E9EE000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC3B34E000
trusted library allocation
page read and write
1DC39DA2000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC3A2BC000
trusted library allocation
page read and write
1DC3FFCA000
trusted library allocation
page read and write
1DC3FA4F000
trusted library allocation
page read and write
1DC2EA1C000
heap
page read and write
1DC37663000
trusted library allocation
page read and write
1DC3A385000
trusted library allocation
page read and write
1DC3FF3F000
trusted library allocation
page read and write
1DC3AFFD000
trusted library allocation
page read and write
1DC39D85000
trusted library allocation
page read and write
1DC3FB46000
trusted library allocation
page read and write
1DC377A5000
trusted library allocation
page read and write
1DC371CF000
trusted library allocation
page read and write
1DC41FF5000
trusted library allocation
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1DC3FA6A000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3FACD000
trusted library allocation
page read and write
1DC39C90000
trusted library allocation
page read and write
1DC390FB000
trusted library allocation
page read and write
1DC3A3B2000
trusted library allocation
page read and write
1DC2EA9F000
heap
page read and write
1DC3FC82000
trusted library allocation
page read and write
1DC395DB000
trusted library allocation
page read and write
1D26B644000
heap
page read and write
1DC2E9F5000
heap
page read and write
1DC2E9FF000
heap
page read and write
1DC3BE7E000
heap
page read and write
1DC389CC000
trusted library allocation
page read and write
F14000
unkown
page readonly
39D0000
heap
page read and write
1DC421C8000
trusted library allocation
page read and write
1DC3A2A6000
trusted library allocation
page read and write
1DC390AA000
trusted library allocation
page read and write
1DC3A2BA000
trusted library allocation
page read and write
1DC3FAB5000
trusted library allocation
page read and write
1DC3FA88000
trusted library allocation
page read and write
1DC391CA000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC38438000
trusted library allocation
page read and write
1DC2E9EE000
heap
page read and write
1DC34C6E000
trusted library allocation
page read and write
1DC38EF0000
trusted library allocation
page read and write
1DC38470000
trusted library allocation
page read and write
1DC2E9EF000
heap
page read and write
1DC3779E000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC393B7000
trusted library allocation
page read and write
1DC2EA3C000
heap
page read and write
1DC3B3A3000
trusted library allocation
page read and write
1DC2E9F1000
heap
page read and write
1DC39187000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC3FF73000
trusted library allocation
page read and write
1DC3A3CA000
trusted library allocation
page read and write
1DC3A40D000
trusted library allocation
page read and write
1DC3A3BF000
trusted library allocation
page read and write
1DC3F9F2000
trusted library allocation
page read and write
1DC2E9D3000
heap
page read and write
1DC382BE000
trusted library allocation
page read and write
1DC3954B000
trusted library allocation
page read and write
1D26A630000
heap
page read and write
1DC34CDC000
trusted library allocation
page read and write
AFF8078000
stack
page read and write
1DC43698000
trusted library allocation
page read and write
1DC3F9E9000
trusted library allocation
page read and write
1DC391DE000
trusted library allocation
page read and write
1DC3A29C000
trusted library allocation
page read and write
1DC3FEBE000
trusted library allocation
page read and write
1DC39163000
trusted library allocation
page read and write
1DC3FF53000
trusted library allocation
page read and write
1D26A620000
unclassified section
page read and write
1DC2E9F9000
heap
page read and write
1DC389FD000
trusted library allocation
page read and write
AFF67D8000
stack
page read and write
1DC391D0000
trusted library allocation
page read and write
1DC3895E000
trusted library allocation
page read and write
1DC2EA02000
heap
page read and write
1DC2E9F5000
heap
page read and write
1D26A923000
trusted library allocation
page read and write
1DC3FBF3000
trusted library allocation
page read and write
1DC38959000
trusted library allocation
page read and write
1DC3A3AA000
trusted library allocation
page read and write
1D26B560000
heap
page read and write
1DC3B3DD000
trusted library allocation
page read and write
1DC391B8000
trusted library allocation
page read and write
1DC33976000
trusted library allocation
page read and write
1DC3A2D2000
trusted library allocation
page read and write
1DC393B0000
trusted library allocation
page read and write
1DC3B8E5000
trusted library allocation
page read and write
1DC2EA32000
heap
page read and write
1DC33AF2000
trusted library allocation
page read and write
1DC2EA4D000
heap
page read and write
1DC3A34A000
trusted library allocation
page read and write
1DC395D8000
trusted library allocation
page read and write
1DC390B7000
trusted library allocation
page read and write
1DC3A467000
trusted library allocation
page read and write
1DC3A283000
trusted library allocation
page read and write
1DC3FA65000
trusted library allocation
page read and write
There are 3862 hidden memdumps, click here to show them.