IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b6cb4bf7-3608-450e-a7b2-a613317667e4.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b6cb4bf7-3608-450e-a7b2-a613317667e4.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P9BFAF1OZT6LU0VAPTPI.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UHHQGN9G4YEDR4FUV98U.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ad84ff0-c189-4f8b-8983-313fd05a1dce} 7892 "\\.\pipe\gecko-crash-server-pipe.7892" 1ca03a6eb10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3324 -parentBuildID 20230927232528 -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf1af811-354d-4a4d-898e-f4ed10d39640} 7892 "\\.\pipe\gecko-crash-server-pipe.7892" 1ca03a80510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5400 -prefMapHandle 5396 -prefsLen 33074 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5a4a761-3a0b-41ca-bac3-7ce3fba34f12} 7892 "\\.\pipe\gecko-crash-server-pipe.7892" 1ca1f6e3310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1CA1F3CB000
trusted library allocation
page read and write
1CA1BB39000
trusted library allocation
page read and write
1CA1532F000
trusted library allocation
page read and write
1CA0A8A7000
heap
page read and write
1CA2006A000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA14E93000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A8BC000
heap
page read and write
145486E0000
heap
page read and write
1CA14AF3000
trusted library allocation
page read and write
190FDC94000
heap
page read and write
1CA1BB44000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
1CA0A8B3000
heap
page read and write
190FE816000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA1BC53000
trusted library allocation
page read and write
1CA15EB8000
trusted library allocation
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA1BAB2000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
190FEA6C000
heap
page read and write
1CA162BB000
trusted library allocation
page read and write
1CA170F8000
trusted library allocation
page read and write
1CA15139000
trusted library allocation
page read and write
1CA1EDBD000
trusted library allocation
page read and write
190FE98D000
heap
page read and write
1CA142DC000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A8AD000
heap
page read and write
22811EDB000
trusted library allocation
page read and write
1CA15B9A000
trusted library allocation
page read and write
1CA142C5000
trusted library allocation
page read and write
1CA157E6000
trusted library allocation
page read and write
1CA14EE6000
trusted library allocation
page read and write
1CA0A88A000
heap
page read and write
1490000
heap
page read and write
1CA170AD000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14257000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA132A3000
heap
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1B836000
trusted library allocation
page read and write
1CA0A8E8000
heap
page read and write
1CA1F399000
trusted library allocation
page read and write
1CA14BFC000
trusted library allocation
page read and write
190FE804000
trusted library allocation
page read and write
1CA17A00000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA14C99000
trusted library allocation
page read and write
1CA1B7AB000
trusted library allocation
page read and write
1CA15BA0000
trusted library allocation
page read and write
1CA14FB7000
trusted library allocation
page read and write
1CA14FC1000
trusted library allocation
page read and write
1CA137C3000
trusted library allocation
page read and write
1CA132A7000
heap
page read and write
3737F3E000
unkown
page readonly
1CA12F94000
trusted library allocation
page read and write
1CA0F9DB000
trusted library allocation
page read and write
1CA161DD000
trusted library allocation
page read and write
1CA0A8FF000
heap
page read and write
190FEA77000
heap
page read and write
1BF5E390000
heap
page read and write
1CA161D0000
trusted library allocation
page read and write
190FE901000
heap
page read and write
1CA1C0EC000
trusted library allocation
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA14261000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA16145000
trusted library allocation
page read and write
1CA16DE9000
trusted library allocation
page read and write
1CA1636D000
trusted library allocation
page read and write
1CA151FD000
trusted library allocation
page read and write
59ABE7E000
unkown
page readonly
1CA15B87000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14FDA000
trusted library allocation
page read and write
3737FBE000
unkown
page readonly
1CA0A8A0000
heap
page read and write
1CA135B3000
trusted library allocation
page read and write
1CA137AC000
trusted library allocation
page read and write
1CA142D3000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0A8B3000
heap
page read and write
41000
unkown
page execute read
1CA161CB000
trusted library allocation
page read and write
1CA0A873000
heap
page read and write
1CA14E64000
trusted library allocation
page read and write
1CA15B87000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1B6C1000
trusted library allocation
page read and write
1CA161B3000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14199000
trusted library allocation
page read and write
1CA1EDB2000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A896000
heap
page read and write
1CA1BCC4000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA10978000
trusted library allocation
page read and write
1CA15EB4000
trusted library allocation
page read and write
1CA161D9000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
1CA142C2000
trusted library allocation
page read and write
1CA14AF6000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
22811E65000
trusted library allocation
page read and write
1CA0A8B4000
heap
page read and write
1CA161A7000
trusted library allocation
page read and write
1CA1B6D9000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA0A87B000
heap
page read and write
1CA0A865000
heap
page read and write
1CA1BBED000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
190FEA77000
heap
page read and write
1CA1BB2D000
trusted library allocation
page read and write
1CA1B73C000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA1E71C000
trusted library allocation
page read and write
1CA142BE000
trusted library allocation
page read and write
1CA16DE9000
trusted library allocation
page read and write
24C5632B000
heap
page read and write
1CA0A88E000
heap
page read and write
1CA15EA7000
trusted library allocation
page read and write
1CA14277000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA0F9E4000
trusted library allocation
page read and write
1CA1512A000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA15E00000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA1531B000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA1D333000
trusted library allocation
page read and write
1CA14A81000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA148D3000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA15BFE000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA161A7000
trusted library allocation
page read and write
1CA0A865000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA1BB39000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA1BCFE000
trusted library allocation
page read and write
1CA1D113000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA14AE2000
trusted library allocation
page read and write
145486A0000
remote allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1376F000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA15752000
trusted library allocation
page read and write
1CA14EF9000
trusted library allocation
page read and write
190FE969000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA1BBE7000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1474C000
trusted library allocation
page read and write
1CA1B7B5000
trusted library allocation
page read and write
24C5472D000
heap
page read and write
1CA15992000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1BBF7000
trusted library allocation
page read and write
1CA13779000
trusted library allocation
page read and write
1CA13768000
trusted library allocation
page read and write
1CA1E737000
trusted library allocation
page read and write
1CA147B3000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA13779000
trusted library allocation
page read and write
1CA12F51000
trusted library allocation
page read and write
1CA16DDC000
trusted library allocation
page read and write
1CA16DEB000
trusted library allocation
page read and write
1CA137FB000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0A89A000
heap
page read and write
AF56DFF000
stack
page read and write
1CA1B6D4000
trusted library allocation
page read and write
1CA1BCB4000
trusted library allocation
page read and write
1CA14F23000
trusted library allocation
page read and write
1CA172B0000
trusted library allocation
page read and write
1CA1B8EA000
trusted library allocation
page read and write
1CA15CD9000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8ED000
heap
page read and write
1CA1F3BE000
trusted library allocation
page read and write
1CA14FE8000
trusted library allocation
page read and write
1CA14266000
trusted library allocation
page read and write
3737FFE000
stack
page read and write
1CA14AF3000
trusted library allocation
page read and write
1CA14F89000
trusted library allocation
page read and write
1CA14FDA000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA200D9000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA108D6000
trusted library allocation
page read and write
1CA14268000
trusted library allocation
page read and write
1CA1BB29000
trusted library allocation
page read and write
190FEA58000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA1474F000
trusted library allocation
page read and write
1CA14FC4000
trusted library allocation
page read and write
1CA153ED000
trusted library allocation
page read and write
1CA1D207000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA14ACB000
trusted library allocation
page read and write
1CA14199000
trusted library allocation
page read and write
1CA1618B000
trusted library allocation
page read and write
1CA1BA46000
trusted library allocation
page read and write
1CA1356E000
trusted library allocation
page read and write
190FDDF3000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA14A8B000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
1CA16369000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA1328F000
heap
page read and write
1CA1426E000
trusted library allocation
page read and write
14548A10000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
190FDD2F000
trusted library allocation
page read and write
1CA108C3000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA1BACD000
trusted library allocation
page read and write
1CA1429C000
trusted library allocation
page read and write
1CA151FE000
trusted library allocation
page read and write
22811BE0000
unclassified section
page readonly
1CA14C6D000
trusted library allocation
page read and write
1CA1B6F9000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA20066000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA14FBE000
trusted library allocation
page read and write
1CA0A88A000
heap
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA13285000
heap
page read and write
1CA1328F000
heap
page read and write
1CA1D15A000
heap
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA14FD2000
trusted library allocation
page read and write
1CA10B27000
trusted library allocation
page read and write
22811BB0000
unclassified section
page read and write
1CA0A8DF000
heap
page read and write
1CA142C2000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA1E69E000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
114000
unkown
page readonly
1CA1C0EE000
trusted library allocation
page read and write
1CA1C069000
trusted library allocation
page read and write
1CA1363C000
trusted library allocation
page read and write
190FDD5C000
trusted library allocation
page read and write
1CA1C069000
trusted library allocation
page read and write
1CA14FC4000
trusted library allocation
page read and write
22811C76000
heap
page read and write
1CA14F55000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA15151000
trusted library allocation
page read and write
1CA172B0000
trusted library allocation
page read and write
1CA0F2DF000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA0A8B3000
heap
page read and write
190FE9E3000
heap
page read and write
1CA0A882000
heap
page read and write
1CA1512A000
trusted library allocation
page read and write
1CA1BAAF000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA1B9FA000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
1CA141E8000
trusted library allocation
page read and write
1CA1EB2F000
trusted library allocation
page read and write
4D8E3FF000
stack
page read and write
1CA0A8FE000
heap
page read and write
1497000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA13774000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA1C097000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
190FE964000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA137CE000
trusted library allocation
page read and write
1CA1BAFB000
trusted library allocation
page read and write
1CA0A86D000
heap
page read and write
190FDD10000
trusted library allocation
page read and write
1CA0F2BF000
trusted library allocation
page read and write
1CA145EF000
trusted library allocation
page read and write
1CA15B9A000
trusted library allocation
page read and write
1CA16388000
trusted library allocation
page read and write
1CA15151000
trusted library allocation
page read and write
24C546D0000
heap
page read and write
1CA14FDA000
trusted library allocation
page read and write
1CA132D2000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA163D1000
trusted library allocation
page read and write
1CA147B9000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA1E7AC000
trusted library allocation
page read and write
1CA163BF000
trusted library allocation
page read and write
1CA0A895000
heap
page read and write
24C54900000
trusted library allocation
page read and write
1CA1C0B5000
trusted library allocation
page read and write
1CA137FB000
trusted library allocation
page read and write
190FDD17000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA142A8000
trusted library allocation
page read and write
1CA0F982000
trusted library allocation
page read and write
1CA151FE000
trusted library allocation
page read and write
1CA1EDBF000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A886000
heap
page read and write
1CA1EDEC000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
1CA137DB000
trusted library allocation
page read and write
1CA135BA000
trusted library allocation
page read and write
1CA15DFD000
trusted library allocation
page read and write
1CA13AB7000
trusted library allocation
page read and write
1CA14241000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA14A86000
trusted library allocation
page read and write
114000
unkown
page readonly
1CA16146000
trusted library allocation
page read and write
190FDD73000
trusted library allocation
page read and write
1CA1BBED000
trusted library allocation
page read and write
1CA163A0000
trusted library allocation
page read and write
1CA0A8E1000
heap
page read and write
1CA0A875000
heap
page read and write
1CA12F87000
trusted library allocation
page read and write
1CA1B8E8000
trusted library allocation
page read and write
1CA1B8F8000
trusted library allocation
page read and write
1CA17042000
trusted library allocation
page read and write
1CA14C9B000
trusted library allocation
page read and write
1CA1B7A2000
trusted library allocation
page read and write
1CA10BC7000
trusted library allocation
page read and write
1CA0A8CF000
heap
page read and write
1CA1B7EA000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA1BB2F000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA1BAF7000
trusted library allocation
page read and write
1CA1EBCE000
trusted library allocation
page read and write
1CA15155000
trusted library allocation
page read and write
1CA14AFE000
trusted library allocation
page read and write
1CA0A873000
heap
page read and write
24C54870000
heap
page read and write
1CA16D76000
trusted library allocation
page read and write
1CA141F9000
trusted library allocation
page read and write
1CA1B8FC000
trusted library allocation
page read and write
1CA108A4000
trusted library allocation
page read and write
1CA137C0000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A871000
heap
page read and write
1CA170DE000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14FD2000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA14AD5000
trusted library allocation
page read and write
1CA0A8B7000
heap
page read and write
1CA14BF3000
trusted library allocation
page read and write
22811CE3000
heap
page read and write
1CA0A889000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA16397000
trusted library allocation
page read and write
190FE9F1000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA1329A000
heap
page read and write
1CA0A871000
heap
page read and write
1CA132C8000
heap
page read and write
1CA15BA8000
trusted library allocation
page read and write
1CA14F72000
trusted library allocation
page read and write
1CA16D64000
trusted library allocation
page read and write
22811E13000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA1329A000
heap
page read and write
1CA148AE000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14AE6000
trusted library allocation
page read and write
1CA145EF000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA17254000
trusted library allocation
page read and write
1CA135F5000
trusted library allocation
page read and write
1CA150B7000
trusted library allocation
page read and write
1CA15CD5000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA0A870000
heap
page read and write
1CA141D2000
trusted library allocation
page read and write
1CA1C0E8000
trusted library allocation
page read and write
1CA17019000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
190FEA44000
heap
page read and write
1CA14793000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA14C28000
trusted library allocation
page read and write
1CA14A48000
trusted library allocation
page read and write
1CA1BBFC000
trusted library allocation
page read and write
1CA1ED7E000
trusted library allocation
page read and write
1CA1B6D9000
trusted library allocation
page read and write
1CA12F8E000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1707D000
trusted library allocation
page read and write
1CA1EB00000
trusted library allocation
page read and write
1CA1618B000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
1CA1E900000
trusted library allocation
page read and write
190FDD65000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA15107000
trusted library allocation
page read and write
190FEA44000
heap
page read and write
1CA161B3000
trusted library allocation
page read and write
1CA14780000
trusted library allocation
page read and write
14548C1F000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA153D2000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
14548A03000
trusted library allocation
page read and write
1CA14CE7000
trusted library allocation
page read and write
1CA1BA60000
trusted library allocation
page read and write
1CA1BACF000
trusted library allocation
page read and write
1CA1379A000
trusted library allocation
page read and write
1CA0A878000
heap
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA1373D000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA153D2000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA10814000
trusted library allocation
page read and write
1CA0F9E0000
trusted library allocation
page read and write
1CA0F298000
trusted library allocation
page read and write
1CA1368D000
trusted library allocation
page read and write
1CA1328F000
heap
page read and write
38D720903000
trusted library allocation
page read and write
1CA14EEA000
trusted library allocation
page read and write
1CA15149000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA1512F000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1CA0A869000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA137FC000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
14A6000
heap
page read and write
1CA0A86C000
heap
page read and write
1CA1B7F8000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA1097C000
trusted library allocation
page read and write
1CA1427E000
trusted library allocation
page read and write
1CA1B6E7000
trusted library allocation
page read and write
1CA0A86D000
heap
page read and write
1CA150E4000
trusted library allocation
page read and write
1CA16D74000
trusted library allocation
page read and write
1CA0A90B000
heap
page read and write
1CA15EA7000
trusted library allocation
page read and write
AF555FE000
stack
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA0F8FE000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA1B7B5000
trusted library allocation
page read and write
1CA0A87C000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA16DFE000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1B8EC000
trusted library allocation
page read and write
1482000
heap
page read and write
1CA0A875000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA14C18000
trusted library allocation
page read and write
1CA1C0EA000
trusted library allocation
page read and write
1CA15135000
trusted library allocation
page read and write
1CA0A902000
heap
page read and write
1CA1ED84000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA16D55000
trusted library allocation
page read and write
1CA1C06D000
trusted library allocation
page read and write
190FEA2A000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA16D74000
trusted library allocation
page read and write
1CA1F38E000
trusted library allocation
page read and write
1CA1BCA8000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA14FC4000
trusted library allocation
page read and write
1CA1B6C1000
trusted library allocation
page read and write
147A000
heap
page read and write
1CA0F8FB000
trusted library allocation
page read and write
1CA0F876000
trusted library allocation
page read and write
1CA14E93000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
1CA14A92000
trusted library allocation
page read and write
1472000
heap
page read and write
1CA141C9000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA17231000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA137A1000
trusted library allocation
page read and write
1CA14A58000
trusted library allocation
page read and write
24C5631E000
heap
page read and write
1CA170BD000
trusted library allocation
page read and write
1CA15AAE000
trusted library allocation
page read and write
1CA0A86F000
heap
page read and write
1CA142DD000
trusted library allocation
page read and write
1CA14EB6000
trusted library allocation
page read and write
1CA1BBF2000
trusted library allocation
page read and write
1CA153D5000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA1B6F5000
trusted library allocation
page read and write
1CA14579000
trusted library allocation
page read and write
1CA1474C000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0A873000
heap
page read and write
1CA163B7000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14C07000
trusted library allocation
page read and write
211F000
stack
page read and write
1BF5E607000
trusted library allocation
page read and write
1CA1BBF2000
trusted library allocation
page read and write
1CA163B7000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA137C3000
trusted library allocation
page read and write
1CA14907000
trusted library allocation
page read and write
14548AE7000
trusted library allocation
page read and write
190FDC50000
trusted library section
page readonly
1CA10B9A000
trusted library allocation
page read and write
1CA15AAE000
trusted library allocation
page read and write
1CA1F37E000
trusted library allocation
page read and write
1CA1BB77000
trusted library allocation
page read and write
1CA147ED000
trusted library allocation
page read and write
1CA0A8E8000
heap
page read and write
1CA13087000
trusted library allocation
page read and write
1CA14BC6000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA14E36000
trusted library allocation
page read and write
1CA1B6A1000
trusted library allocation
page read and write
1CA14123000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA0A882000
heap
page read and write
1CA1BA15000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
3DE1000
heap
page read and write
22811B50000
heap
page read and write
1CA14E69000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
1497000
heap
page read and write
1CA14577000
trusted library allocation
page read and write
1CA14C61000
trusted library allocation
page read and write
1CA16378000
trusted library allocation
page read and write
1CA14EF5000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA1BAD1000
trusted library allocation
page read and write
1CA15AA5000
trusted library allocation
page read and write
1CA12F60000
trusted library allocation
page read and write
1CA16369000
trusted library allocation
page read and write
1CA1B98C000
trusted library allocation
page read and write
1CA1BAEF000
trusted library allocation
page read and write
1CA1B9E6000
trusted library allocation
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA13284000
heap
page read and write
1CA0A882000
heap
page read and write
1CA1F952000
trusted library allocation
page read and write
190FE800000
trusted library allocation
page read and write
146F000
heap
page read and write
1CA132AB000
heap
page read and write
1CA108AA000
trusted library allocation
page read and write
1CA145FC000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA145D1000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA15746000
trusted library allocation
page read and write
3DE0000
heap
page read and write
1CA14F64000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA14259000
trusted library allocation
page read and write
1CA17094000
trusted library allocation
page read and write
1CA1B8B5000
trusted library allocation
page read and write
1CA1BBED000
trusted library allocation
page read and write
1CA1BA62000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA16382000
trusted library allocation
page read and write
1CA1C05A000
trusted library allocation
page read and write
1CA1B779000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA15D9C000
trusted library allocation
page read and write
1CA1B9DE000
trusted library allocation
page read and write
1CA1F396000
trusted library allocation
page read and write
190FE280000
heap
page read and write
59AC6FE000
stack
page read and write
1CA15166000
trusted library allocation
page read and write
1CA1363D000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
AF545FE000
stack
page read and write
1CA0A861000
heap
page read and write
1CA1DE92000
trusted library allocation
page read and write
1CA1537F000
trusted library allocation
page read and write
1CA1427E000
trusted library allocation
page read and write
1CA1BAD7000
trusted library allocation
page read and write
22811E46000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA0A879000
heap
page read and write
1CA1B98A000
trusted library allocation
page read and write
1CA14EE6000
trusted library allocation
page read and write
40000
unkown
page readonly
1CA0A8AD000
heap
page read and write
1CA0A87C000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA1B6C1000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA1F365000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA0A892000
heap
page read and write
1CA14754000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
190FDD86000
trusted library allocation
page read and write
1CA1BA1F000
trusted library allocation
page read and write
1CA1B6DD000
trusted library allocation
page read and write
1CA1483E000
trusted library allocation
page read and write
1CA161DD000
trusted library allocation
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA0A878000
heap
page read and write
1CA1B7D6000
trusted library allocation
page read and write
1CA1C04C000
trusted library allocation
page read and write
1CA12F51000
trusted library allocation
page read and write
1CA15BB3000
trusted library allocation
page read and write
59ABDFE000
unkown
page readonly
3736F3E000
unkown
page readonly
1CA1BC5D000
trusted library allocation
page read and write
1CA14189000
trusted library allocation
page read and write
1CA0A895000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA142FA000
trusted library allocation
page read and write
1CA1BB44000
trusted library allocation
page read and write
1CA1F991000
trusted library allocation
page read and write
1CA1C0E6000
trusted library allocation
page read and write
190FE99C000
heap
page read and write
190FE95C000
heap
page read and write
1CA14FDE000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1328D000
heap
page read and write
190FDC42000
unclassified section
page read and write
1CA0A86B000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA14BB7000
trusted library allocation
page read and write
1CA14FC1000
trusted library allocation
page read and write
1CA153FE000
trusted library allocation
page read and write
1CA0A8B9000
heap
page read and write
1CA1D32E000
trusted library allocation
page read and write
1CA14757000
trusted library allocation
page read and write
1CA15179000
trusted library allocation
page read and write
190FE96C000
heap
page read and write
1CA1B8E0000
trusted library allocation
page read and write
1CA18402000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1D24D000
trusted library allocation
page read and write
1CA137D8000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA14BCA000
trusted library allocation
page read and write
1CA1B896000
trusted library allocation
page read and write
1CA0A87D000
heap
page read and write
1CA1D0E7000
heap
page read and write
1CA14FA0000
trusted library allocation
page read and write
1CA12F21000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A853000
heap
page read and write
1CA14F9A000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA142C7000
trusted library allocation
page read and write
22811E5F000
trusted library allocation
page read and write
190FDCE0000
unkown
page execute read
1CA1E6F1000
trusted library allocation
page read and write
1CA1C078000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA15B63000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA15367000
trusted library allocation
page read and write
1CA0A893000
heap
page read and write
1CA1B6E7000
trusted library allocation
page read and write
1CA15128000
trusted library allocation
page read and write
1CA13567000
trusted library allocation
page read and write
1CA13786000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA15BB3000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14AB1000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA0A8B6000
heap
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A8B4000
heap
page read and write
1CA13286000
heap
page read and write
1CA0A890000
heap
page read and write
14548B26000
heap
page read and write
1CA1BAE0000
trusted library allocation
page read and write
1CA15139000
trusted library allocation
page read and write
1CA16373000
trusted library allocation
page read and write
1CA16146000
trusted library allocation
page read and write
1CA15166000
trusted library allocation
page read and write
1CA1B6DD000
trusted library allocation
page read and write
1CA16DC8000
trusted library allocation
page read and write
110000
unkown
page write copy
1CA0A85B000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA14FF1000
trusted library allocation
page read and write
1CA1EE7C000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA159BE000
trusted library allocation
page read and write
1CA14E64000
trusted library allocation
page read and write
14548ACB000
trusted library allocation
page read and write
14548C32000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA14F6A000
trusted library allocation
page read and write
1CA14762000
trusted library allocation
page read and write
1CA14F7A000
trusted library allocation
page read and write
1CA1D185000
heap
page read and write
1CA0A8B7000
heap
page read and write
1CA0A8B5000
heap
page read and write
1CA1B7A3000
trusted library allocation
page read and write
1CA15C43000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA1BB2F000
trusted library allocation
page read and write
145488A0000
unclassified section
page read and write
1CA0A8DF000
heap
page read and write
3DE1000
heap
page read and write
1CA1B8E0000
trusted library allocation
page read and write
1CA141F2000
trusted library allocation
page read and write
1CA12F08000
trusted library allocation
page read and write
1CA1B8BA000
trusted library allocation
page read and write
1CA14FCB000
trusted library allocation
page read and write
1CA162CC000
trusted library allocation
page read and write
1CA14C6B000
trusted library allocation
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A888000
heap
page read and write
1CA1B69E000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0A87B000
heap
page read and write
1CA1DEB0000
trusted library allocation
page read and write
1CA1B8AE000
trusted library allocation
page read and write
1CA14BC6000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
14548A68000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA1475C000
trusted library allocation
page read and write
1CA1BA26000
trusted library allocation
page read and write
1CA14C59000
trusted library allocation
page read and write
1CA14747000
trusted library allocation
page read and write
1CA14EB8000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA16D8C000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
22811E6A000
trusted library allocation
page read and write
190FE260000
heap
page read and write
1CA14EEA000
trusted library allocation
page read and write
1CA13400000
trusted library allocation
page read and write
1CA0A893000
heap
page read and write
1CA0A8BB000
heap
page read and write
1CA1F968000
trusted library allocation
page read and write
373773E000
stack
page read and write
1CA0A86B000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA0A854000
heap
page read and write
190FDB00000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1D0A3000
heap
page read and write
1CA14FFA000
trusted library allocation
page read and write
1CA15EA4000
trusted library allocation
page read and write
1CA1D286000
trusted library allocation
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA137FB000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A87C000
heap
page read and write
1CA1616A000
trusted library allocation
page read and write
190FEA3B000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1B7E5000
trusted library allocation
page read and write
1CA14FCD000
trusted library allocation
page read and write
1CA1BBE7000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
190FE95C000
heap
page read and write
1CA0A908000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA137A1000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA13284000
heap
page read and write
24C54717000
heap
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA1636D000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A87C000
heap
page read and write
1CA14145000
trusted library allocation
page read and write
1CA12FAB000
trusted library allocation
page read and write
1CA0A88C000
heap
page read and write
1CA13284000
heap
page read and write
AF53DFF000
stack
page read and write
190FDD5F000
trusted library allocation
page read and write
1CA1426A000
trusted library allocation
page read and write
1CA1F995000
trusted library allocation
page read and write
1CA1FD37000
trusted library allocation
page read and write
1CA1510F000
trusted library allocation
page read and write
1CA170C1000
trusted library allocation
page read and write
1CA14257000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA0F2B3000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
190FEA77000
heap
page read and write
1CA0A8FE000
heap
page read and write
59A9BEE000
unkown
page readonly
1CA16382000
trusted library allocation
page read and write
1CA15C56000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
190FEA6C000
heap
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA0A85D000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA0A88E000
heap
page read and write
22811E78000
trusted library allocation
page read and write
1CA13582000
trusted library allocation
page read and write
1CA1DEA9000
trusted library allocation
page read and write
1CA0A865000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA13297000
heap
page read and write
1CA151E3000
trusted library allocation
page read and write
1CA1BC88000
trusted library allocation
page read and write
1CA14CDE000
trusted library allocation
page read and write
1CA1ED82000
trusted library allocation
page read and write
1CA1BAF6000
trusted library allocation
page read and write
1CA20066000
trusted library allocation
page read and write
1CA14AE3000
trusted library allocation
page read and write
1CA10B4E000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA10976000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
190FDC90000
heap
page read and write
1CA14CDE000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14EFB000
trusted library allocation
page read and write
1CA14CF6000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA0A877000
heap
page read and write
1CA1512A000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
22811EF5000
trusted library allocation
page read and write
AF53DFB000
stack
page read and write
1CA1B8F5000
trusted library allocation
page read and write
1CA16DD0000
trusted library allocation
page read and write
D60000
heap
page read and write
1CA15367000
trusted library allocation
page read and write
1CA1C0E6000
trusted library allocation
page read and write
1CA1BC5F000
trusted library allocation
page read and write
1CA1425E000
trusted library allocation
page read and write
1CA1424D000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA0A8DF000
heap
page read and write
190FEA6C000
heap
page read and write
1CA1F698000
trusted library allocation
page read and write
1CA14A2E000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
14A2000
heap
page read and write
22811E5D000
trusted library allocation
page read and write
1CA16D55000
trusted library allocation
page read and write
1CA13793000
trusted library allocation
page read and write
1CA1618B000
trusted library allocation
page read and write
1CA14BED000
trusted library allocation
page read and write
1CA142D1000
trusted library allocation
page read and write
1CA1BBF2000
trusted library allocation
page read and write
1CA1B7AB000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA14754000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1D20C000
trusted library allocation
page read and write
1CA15BC4000
trusted library allocation
page read and write
1CA148BB000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1B7EB000
trusted library allocation
page read and write
1CA137C0000
trusted library allocation
page read and write
1CA1ED7C000
trusted library allocation
page read and write
1CA14EB8000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA14EE1000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA1F6A5000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
190FD8F0000
unclassified section
page readonly
14548C00000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA161CB000
trusted library allocation
page read and write
1CA1B7F8000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
1CA1BB38000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA0A883000
heap
page read and write
1CA1B896000
trusted library allocation
page read and write
22811E49000
trusted library allocation
page read and write
1CA14AB1000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA15C5B000
trusted library allocation
page read and write
145486EA000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1357B000
trusted library allocation
page read and write
1CA0F9FE000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
145488A2000
unclassified section
page read and write
1CA14291000
trusted library allocation
page read and write
1CA13594000
trusted library allocation
page read and write
1CA13291000
heap
page read and write
1CA0A87B000
heap
page read and write
1CA0A854000
heap
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA0A8A7000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0F8F6000
trusted library allocation
page read and write
1CA1BB36000
trusted library allocation
page read and write
1CA1B6D4000
trusted library allocation
page read and write
1CA1E62F000
trusted library allocation
page read and write
1CA12F94000
trusted library allocation
page read and write
1CA15CA6000
trusted library allocation
page read and write
190FDD9F000
trusted library allocation
page read and write
190FDD76000
trusted library allocation
page read and write
190FEA21000
heap
page read and write
1CA142DC000
trusted library allocation
page read and write
1CA14FEB000
trusted library allocation
page read and write
3737F7E000
stack
page read and write
1CA15DEA000
trusted library allocation
page read and write
1CA15DFD000
trusted library allocation
page read and write
1CA12F4C000
trusted library allocation
page read and write
1CA1BBF5000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA151FB000
trusted library allocation
page read and write
147F2E4B000
trusted library allocation
page execute read
1CA1BAAF000
trusted library allocation
page read and write
1CA0F993000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA0A890000
heap
page read and write
1CA0A888000
heap
page read and write
1CA0F29E000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A861000
heap
page read and write
1CA1368E000
trusted library allocation
page read and write
1CA14EEE000
trusted library allocation
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA170F3000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
190FE969000
heap
page read and write
1CA13284000
heap
page read and write
1CA14EA3000
trusted library allocation
page read and write
1CA14F58000
trusted library allocation
page read and write
1CA15BA0000
trusted library allocation
page read and write
1CA0A873000
heap
page read and write
1CA14AAA000
trusted library allocation
page read and write
14548A98000
trusted library allocation
page read and write
1CA14199000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
190FDAE0000
heap
page read and write
14548AA3000
trusted library allocation
page read and write
1CA14C72000
trusted library allocation
page read and write
1CA1490A000
trusted library allocation
page read and write
190FE9E6000
heap
page read and write
1CA1F625000
trusted library allocation
page read and write
1CA16DE1000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A896000
heap
page read and write
DCE000
stack
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA14247000
trusted library allocation
page read and write
1CA14883000
trusted library allocation
page read and write
1CA1BAD7000
trusted library allocation
page read and write
1CA13286000
heap
page read and write
1CA161CB000
trusted library allocation
page read and write
1CA12FDC000
trusted library allocation
page read and write
1CA16D8C000
trusted library allocation
page read and write
1CA1B76F000
trusted library allocation
page read and write
1CA145C6000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA1BAE0000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA1424D000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA0A881000
heap
page read and write
1CA108EC000
trusted library allocation
page read and write
22811E24000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA14130000
trusted library allocation
page read and write
1CA0A892000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA1411A000
trusted library allocation
page read and write
1CA14E7E000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA0A865000
heap
page read and write
1CA0A8B4000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA1B9FA000
trusted library allocation
page read and write
1CA13567000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA15151000
trusted library allocation
page read and write
1CA1B6F5000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA14C54000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA170DE000
trusted library allocation
page read and write
1CA13683000
trusted library allocation
page read and write
1CA132B5000
heap
page read and write
1CA2003A000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA12F1F000
trusted library allocation
page read and write
1CA14FD1000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1BA9C000
trusted library allocation
page read and write
1CA163E7000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA1329A000
heap
page read and write
2120000
trusted library allocation
page read and write
1CA153F9000
trusted library allocation
page read and write
1CA14AF3000
trusted library allocation
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA13286000
heap
page read and write
1CA137B7000
trusted library allocation
page read and write
190FDD14000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
1CA10997000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA16DE9000
trusted library allocation
page read and write
87F9BFE000
stack
page read and write
1CA0A89B000
heap
page read and write
1CA14740000
trusted library allocation
page read and write
190FEA3B000
heap
page read and write
1CA132A4000
heap
page read and write
1CA15D49000
trusted library allocation
page read and write
1CA1BBFC000
trusted library allocation
page read and write
1CA0A86D000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1B8DC000
trusted library allocation
page read and write
1CA0F290000
trusted library allocation
page read and write
1CA1B897000
trusted library allocation
page read and write
1CA163CA000
trusted library allocation
page read and write
1CA12F60000
trusted library allocation
page read and write
1CA0A880000
heap
page read and write
1CA155EC000
trusted library allocation
page read and write
1CA14EEA000
trusted library allocation
page read and write
1CA0F97E000
trusted library allocation
page read and write
1CA15AA5000
trusted library allocation
page read and write
1CA1B6DD000
trusted library allocation
page read and write
1CA12FA2000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA0F926000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
87FA3FE000
unkown
page readonly
D80000
heap
page read and write
1CA145D1000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA10BA6000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA13582000
trusted library allocation
page read and write
1CA1F66A000
trusted library allocation
page read and write
190FE9F1000
heap
page read and write
1CA0A89C000
heap
page read and write
190FE94D000
heap
page read and write
1CA13758000
trusted library allocation
page read and write
1CA1B6E3000
trusted library allocation
page read and write
1CA1418B000
trusted library allocation
page read and write
1CA16DD0000
trusted library allocation
page read and write
1CA0A890000
heap
page read and write
1CA10BF5000
trusted library allocation
page read and write
1CA14FDA000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA1BC99000
trusted library allocation
page read and write
1CA0A850000
heap
page read and write
1CA15AAE000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA0A861000
heap
page read and write
1CA0A871000
heap
page read and write
13CE000
stack
page read and write
1CA2007B000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA17261000
trusted library allocation
page read and write
22811E76000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA0A871000
heap
page read and write
1CA1BA49000
trusted library allocation
page read and write
1CA14F00000
trusted library allocation
page read and write
22811EB1000
trusted library allocation
page read and write
190FD8E0000
unclassified section
page readonly
1CA0A89C000
heap
page read and write
1CA14FAD000
trusted library allocation
page read and write
1CA1FD67000
trusted library allocation
page read and write
1CA1EEE3000
trusted library allocation
page read and write
1CA1BB19000
trusted library allocation
page read and write
148C000
heap
page read and write
1CA0F9AA000
trusted library allocation
page read and write
1CA0A853000
heap
page read and write
1CA0A902000
heap
page read and write
1CA0A871000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA141E2000
trusted library allocation
page read and write
1CA172A6000
trusted library allocation
page read and write
24C54741000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA1EDEC000
trusted library allocation
page read and write
1CA157F8000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA0A8A0000
heap
page read and write
14548A5B000
trusted library allocation
page read and write
1CA1F694000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA14EBE000
trusted library allocation
page read and write
1CA1367B000
trusted library allocation
page read and write
1CA12FC3000
trusted library allocation
page read and write
1CA1B9E6000
trusted library allocation
page read and write
1CA0A908000
heap
page read and write
1CA147CC000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0A871000
heap
page read and write
1CA14CF0000
trusted library allocation
page read and write
1CA1F32D000
trusted library allocation
page read and write
1CA170CA000
trusted library allocation
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA1EB84000
trusted library allocation
page read and write
1CA1BA60000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1BF5E370000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA0A854000
heap
page read and write
1CA14CEB000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA153ED000
trusted library allocation
page read and write
14548A47000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
D84000
heap
page read and write
1CA14ACB000
trusted library allocation
page read and write
1CA145E9000
trusted library allocation
page read and write
1CA163E7000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA1ED7E000
trusted library allocation
page read and write
1CA155EC000
trusted library allocation
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA1BB61000
trusted library allocation
page read and write
1CA10887000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA1F34F000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
190FEA59000
heap
page read and write
1CA0F281000
trusted library allocation
page read and write
1CA1B853000
trusted library allocation
page read and write
1CA1BA5C000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14264000
trusted library allocation
page read and write
1CA10BBC000
trusted library allocation
page read and write
1CA17259000
trusted library allocation
page read and write
24C5631B000
heap
page read and write
1CA0A8DF000
heap
page read and write
190FDDE9000
trusted library allocation
page read and write
1CA1B8FA000
trusted library allocation
page read and write
1CA14134000
trusted library allocation
page read and write
1CA12F96000
trusted library allocation
page read and write
1CA16378000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8B2000
heap
page read and write
2120000
trusted library allocation
page read and write
149E000
heap
page read and write
148A000
heap
page read and write
1CA14FCD000
trusted library allocation
page read and write
1CA14FBC000
trusted library allocation
page read and write
1CA1BCFC000
trusted library allocation
page read and write
22811BB2000
unclassified section
page read and write
1CA13677000
trusted library allocation
page read and write
1CA14C34000
trusted library allocation
page read and write
190FEA6C000
heap
page read and write
1CA135BA000
trusted library allocation
page read and write
1CA15B63000
trusted library allocation
page read and write
373883E000
stack
page read and write
1CA137A1000
trusted library allocation
page read and write
1CA161E8000
trusted library allocation
page read and write
14548B20000
heap
page read and write
1CA1358A000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
190FDAAA000
heap
page read and write
1CA10C2A000
trusted library allocation
page read and write
1CA14AC3000
trusted library allocation
page read and write
1CA1B6E3000
trusted library allocation
page read and write
1CA14E40000
trusted library allocation
page read and write
1CA12F34000
trusted library allocation
page read and write
1CA142CC000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
148E000
heap
page read and write
1CA1F6B0000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
4D8EBFE000
stack
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA14F60000
trusted library allocation
page read and write
190FE96C000
heap
page read and write
1CA15DED000
trusted library allocation
page read and write
1CA1359D000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA1616A000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1B6D9000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA0A87C000
heap
page read and write
24C54B60000
heap
page read and write
190FEA58000
heap
page read and write
1CA15EB2000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1CA1ED80000
trusted library allocation
page read and write
1CA1B7C3000
trusted library allocation
page read and write
1CA1BBE7000
trusted library allocation
page read and write
1CA1C08A000
trusted library allocation
page read and write
1CA137A9000
trusted library allocation
page read and write
1CA1BAD7000
trusted library allocation
page read and write
1CA1F968000
trusted library allocation
page read and write
1CA1BA4F000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA1DEE5000
trusted library allocation
page read and write
1CA0A900000
heap
page read and write
1CA141F7000
trusted library allocation
page read and write
1CA0F823000
trusted library allocation
page read and write
1CA1BCF8000
trusted library allocation
page read and write
87FA4FE000
unkown
page readonly
1CA137BA000
trusted library allocation
page read and write
1CA1B7EF000
trusted library allocation
page read and write
14548C15000
trusted library allocation
page read and write
1CA1429C000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
190FDD23000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA0A882000
heap
page read and write
1CA15BA0000
trusted library allocation
page read and write
1CA1B6D9000
trusted library allocation
page read and write
87FACFE000
unkown
page read and write
190FDD78000
trusted library allocation
page read and write
1CA1B6EB000
trusted library allocation
page read and write
1CA1C037000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA1B805000
trusted library allocation
page read and write
1CA14E6C000
trusted library allocation
page read and write
1CA1B8E8000
trusted library allocation
page read and write
1CA1F9E1000
trusted library allocation
page read and write
1CA147FB000
trusted library allocation
page read and write
1CA1426E000
trusted library allocation
page read and write
4D8E3FC000
stack
page read and write
1CA14AF3000
trusted library allocation
page read and write
1CA13282000
heap
page read and write
1CA0A89A000
heap
page read and write
190FE9E0000
heap
page read and write
1CA0A88A000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA14A7D000
trusted library allocation
page read and write
1CA14C99000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA142A2000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA1B7E7000
trusted library allocation
page read and write
1CA150A4000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1CA141E2000
trusted library allocation
page read and write
1CA1D357000
trusted library allocation
page read and write
190FE9FD000
heap
page read and write
1CA14EA0000
trusted library allocation
page read and write
1CA0A855000
heap
page read and write
DC000
unkown
page readonly
24C546A0000
heap
page read and write
1CA1B6F5000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA17231000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA1EBF1000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1B7D9000
trusted library allocation
page read and write
1CA170BF000
trusted library allocation
page read and write
1CA1099A000
trusted library allocation
page read and write
1CA163E1000
trusted library allocation
page read and write
1CA15107000
trusted library allocation
page read and write
1CA14FDE000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA1BACD000
trusted library allocation
page read and write
1CA14112000
trusted library allocation
page read and write
1CA1425F000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA14AF0000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA1F38E000
trusted library allocation
page read and write
1CA15BD5000
trusted library allocation
page read and write
1CA1329A000
heap
page read and write
1CA0A882000
heap
page read and write
190FE9FD000
heap
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1BC3C101E000
trusted library allocation
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA141C0000
trusted library allocation
page read and write
1CA14773000
trusted library allocation
page read and write
1CA1C042000
trusted library allocation
page read and write
1CA14C89000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA15BC3000
trusted library allocation
page read and write
1CA17254000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
190FE808000
trusted library allocation
page read and write
1CA1BABB000
trusted library allocation
page read and write
1497000
heap
page read and write
1CA1B6E3000
trusted library allocation
page read and write
1CA142DD000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
22812007000
trusted library allocation
page read and write
1CA14247000
trusted library allocation
page read and write
1CA1596A000
trusted library allocation
page read and write
1CA142A2000
trusted library allocation
page read and write
190FE9E3000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA0A88E000
heap
page read and write
14548A23000
trusted library allocation
page read and write
41000
unkown
page execute read
1CA14EC5000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA14C5C000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA14BA1000
trusted library allocation
page read and write
1CA0A894000
heap
page read and write
1CA1328F000
heap
page read and write
1CA14A48000
trusted library allocation
page read and write
1CA142A6000
trusted library allocation
page read and write
1CA1BAE0000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA1B98E000
trusted library allocation
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA15B9A000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
190FE9F1000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA1427E000
trusted library allocation
page read and write
190FE969000
heap
page read and write
1CA14277000
trusted library allocation
page read and write
1CA172A9000
trusted library allocation
page read and write
1CA170C3000
trusted library allocation
page read and write
1CA1BCBC000
trusted library allocation
page read and write
1CA14CEF000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA0A86E000
heap
page read and write
1CA0A8A0000
heap
page read and write
190FE98A000
heap
page read and write
1CA142AD000
trusted library allocation
page read and write
1CA16DCB000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA1329A000
heap
page read and write
190FD960000
unclassified section
page readonly
1CA1085E000
trusted library allocation
page read and write
1CA1DEFA000
trusted library allocation
page read and write
1CA1F34F000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA1BA53000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA0A871000
heap
page read and write
1CA1517F000
trusted library allocation
page read and write
1CA2005C000
trusted library allocation
page read and write
1CA1426F000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
87F81FE000
unkown
page readonly
190FE96C000
heap
page read and write
1CA0A875000
heap
page read and write
1CA14EA3000
trusted library allocation
page read and write
1CA1FD8A000
trusted library allocation
page read and write
1CA15B87000
trusted library allocation
page read and write
1CA0A873000
heap
page read and write
1CA14AE3000
trusted library allocation
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA15BD5000
trusted library allocation
page read and write
1CA14F2F000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA1ED37000
trusted library allocation
page read and write
1CA153F9000
trusted library allocation
page read and write
1CA17066000
trusted library allocation
page read and write
1CA137AB000
trusted library allocation
page read and write
1CA14EE6000
trusted library allocation
page read and write
1CA1EDD0000
trusted library allocation
page read and write
190FEA2D000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA12F34000
trusted library allocation
page read and write
1CA16373000
trusted library allocation
page read and write
1CA1BAD3000
trusted library allocation
page read and write
1CA1483B000
trusted library allocation
page read and write
3DE1000
heap
page read and write
1CA14C41000
trusted library allocation
page read and write
1CA1B716000
trusted library allocation
page read and write
1CA0A8FF000
heap
page read and write
190FE9EC000
heap
page read and write
1CA1BAE0000
trusted library allocation
page read and write
1CA1B812000
trusted library allocation
page read and write
1CA1B6DD000
trusted library allocation
page read and write
1CA1B844000
trusted library allocation
page read and write
1CA16DCB000
trusted library allocation
page read and write
1CA1513A000
trusted library allocation
page read and write
1CA13082000
trusted library allocation
page read and write
1410000
heap
page read and write
1CA14EE6000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA14FDE000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8C4000
heap
page read and write
190FE9EC000
heap
page read and write
1CA13594000
trusted library allocation
page read and write
1CA1DEFA000
trusted library allocation
page read and write
1CA12FA5000
trusted library allocation
page read and write
1CA1B7B9000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
1CA0A870000
heap
page read and write
1CA14F41000
trusted library allocation
page read and write
1CA10BF6000
trusted library allocation
page read and write
1CA17254000
trusted library allocation
page read and write
1CA1F396000
trusted library allocation
page read and write
1CA0A893000
heap
page read and write
1CA12FD8000
trusted library allocation
page read and write
1CA1BCB8000
trusted library allocation
page read and write
1CA1EED7000
trusted library allocation
page read and write
1CA15325000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1BC91000
trusted library allocation
page read and write
147F2E61000
trusted library allocation
page execute read
1CA15BB3000
trusted library allocation
page read and write
1CA14147000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA0A870000
heap
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA12F72000
trusted library allocation
page read and write
1CA1BB2F000
trusted library allocation
page read and write
1CA14EB6000
trusted library allocation
page read and write
1CA16193000
trusted library allocation
page read and write
1CA1E6CE000
trusted library allocation
page read and write
1CA14A61000
trusted library allocation
page read and write
1CA1429F000
trusted library allocation
page read and write
190FDAA0000
heap
page read and write
1CA14EA0000
trusted library allocation
page read and write
1CA14FB5000
trusted library allocation
page read and write
1CA2006A000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
1CA0A871000
heap
page read and write
1CA14AE2000
trusted library allocation
page read and write
190FE95C000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA14241000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A854000
heap
page read and write
1CA0A871000
heap
page read and write
1476000
heap
page read and write
1CA1B7CD000
trusted library allocation
page read and write
3736DFE000
unkown
page readonly
1CA0A871000
heap
page read and write
D84000
heap
page read and write
14548C19000
trusted library allocation
page read and write
190FE9E0000
heap
page read and write
1CA15B63000
trusted library allocation
page read and write
1CA150F1000
trusted library allocation
page read and write
1CA15118000
trusted library allocation
page read and write
190FE9F2000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA12F21000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA17900000
trusted library allocation
page read and write
1CA14FD2000
trusted library allocation
page read and write
1CA1BBF2000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA15976000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA1F33D000
trusted library allocation
page read and write
1CA14A70000
trusted library allocation
page read and write
1CA1BABF000
trusted library allocation
page read and write
1CA1BB2D000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
1CA2004F000
trusted library allocation
page read and write
1CA14E57000
trusted library allocation
page read and write
1CA15EA7000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA1308F000
trusted library allocation
page read and write
1CA15ED4000
trusted library allocation
page read and write
1CA170CA000
trusted library allocation
page read and write
14548B30000
unclassified section
page readonly
1CA0A8A0000
heap
page read and write
1CA14A29000
trusted library allocation
page read and write
1CA0A894000
heap
page read and write
1CA1B9E6000
trusted library allocation
page read and write
1CA14A74000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14147000
trusted library allocation
page read and write
1CA12F94000
trusted library allocation
page read and write
145486C0000
unclassified section
page readonly
1CA0A89D000
heap
page read and write
1CA15E93000
trusted library allocation
page read and write
1CA15DED000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA0A882000
heap
page read and write
1CA14EEE000
trusted library allocation
page read and write
1CA1426E000
trusted library allocation
page read and write
1CA1F3B8000
trusted library allocation
page read and write
1CA1F625000
trusted library allocation
page read and write
1CA1367C000
trusted library allocation
page read and write
1CA1BE00000
trusted library allocation
page read and write
1CA1BAAD000
trusted library allocation
page read and write
1CA0A895000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA0A8A7000
heap
page read and write
1CA15149000
trusted library allocation
page read and write
1CA16143000
trusted library allocation
page read and write
1CA0A900000
heap
page read and write
1CA12F4C000
trusted library allocation
page read and write
190FEA58000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA12FEF000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
190FDCEC000
unkown
page execute read
1CA0A861000
heap
page read and write
1CA16F60000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1C0FE000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14AF3000
trusted library allocation
page read and write
190FEA58000
heap
page read and write
1CA1B8FC000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA1B8DC000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA161B3000
trusted library allocation
page read and write
1CA1B7D6000
trusted library allocation
page read and write
1CA132AC000
heap
page read and write
1CA0A8A7000
heap
page read and write
1CA1474E000
trusted library allocation
page read and write
1CA16DF1000
trusted library allocation
page read and write
1CA1426E000
trusted library allocation
page read and write
1450000
heap
page read and write
1CA1BCD5000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA15139000
trusted library allocation
page read and write
14548A72000
trusted library allocation
page read and write
1CA15B72000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA15D67000
trusted library allocation
page read and write
1CA14896000
trusted library allocation
page read and write
1CA1B6F5000
trusted library allocation
page read and write
3736E3E000
unkown
page readonly
1CA0A888000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA0A8DF000
heap
page read and write
14A4000
heap
page read and write
1CA1485A000
trusted library allocation
page read and write
1CA14EE1000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
228119DA000
remote allocation
page execute read
1CA109E6000
trusted library allocation
page read and write
1CA1479F000
trusted library allocation
page read and write
1CA1513A000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA0F91B000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA12F28000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA148CF000
trusted library allocation
page read and write
1CA132A3000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA14BB0000
trusted library allocation
page read and write
190FDCE5000
unkown
page execute read
1CA14AFE000
trusted library allocation
page read and write
1CA14EBE000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA0A861000
heap
page read and write
1CA13758000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA137A1000
trusted library allocation
page read and write
1CA1B8D9000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1378E000
trusted library allocation
page read and write
1CA14FD1000
trusted library allocation
page read and write
1CA151F3000
trusted library allocation
page read and write
1CA14266000
trusted library allocation
page read and write
1CA16D5A000
trusted library allocation
page read and write
1BF5E500000
trusted library allocation
page read and write
1CA161D9000
trusted library allocation
page read and write
22812003000
trusted library allocation
page read and write
1CA153FE000
trusted library allocation
page read and write
190FE969000
heap
page read and write
1CA16198000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A893000
heap
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA159D8000
trusted library allocation
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA1D2AC000
trusted library allocation
page read and write
1CA142A8000
trusted library allocation
page read and write
1CA1FD05000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA1081F000
trusted library allocation
page read and write
190FE963000
heap
page read and write
1CA1BA9C000
trusted library allocation
page read and write
1CA16DCE000
trusted library allocation
page read and write
190FE97D000
heap
page read and write
1CA14EBE000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA13282000
heap
page read and write
1CA1BC53000
trusted library allocation
page read and write
1CA14E55000
trusted library allocation
page read and write
1CA14AB2000
trusted library allocation
page read and write
1CA1B856000
trusted library allocation
page read and write
1CA0F917000
trusted library allocation
page read and write
1CA14FC4000
trusted library allocation
page read and write
1CA13757000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1328F000
heap
page read and write
1CA0A8B5000
heap
page read and write
1CA0A882000
heap
page read and write
1CA1377C000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA14768000
trusted library allocation
page read and write
1CA1512F000
trusted library allocation
page read and write
1CA1EE37000
trusted library allocation
page read and write
1CA15133000
trusted library allocation
page read and write
22811E72000
trusted library allocation
page read and write
1CA1F6DB000
trusted library allocation
page read and write
1CA0F9A1000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA0A882000
heap
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA14FF1000
trusted library allocation
page read and write
1CA142BA000
trusted library allocation
page read and write
1CA142A2000
trusted library allocation
page read and write
1CA137C3000
trusted library allocation
page read and write
1CA1C078000
trusted library allocation
page read and write
1CA1BAF5000
trusted library allocation
page read and write
1CA14EE6000
trusted library allocation
page read and write
1CA1EE7C000
trusted library allocation
page read and write
1CA172E2000
trusted library allocation
page read and write
1CA14799000
trusted library allocation
page read and write
1CA14271000
trusted library allocation
page read and write
1CA1368B000
trusted library allocation
page read and write
1CA1F694000
trusted library allocation
page read and write
1CA0F2BF000
trusted library allocation
page read and write
24C54710000
heap
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
1CA1F34F000
trusted library allocation
page read and write
1CA10BF6000
trusted library allocation
page read and write
1CA0A8A8000
heap
page read and write
1CA1BB12000
trusted library allocation
page read and write
1CA15379000
trusted library allocation
page read and write
1CA12FA7000
trusted library allocation
page read and write
1CA1ED37000
trusted library allocation
page read and write
1CA0A852000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA1D600000
trusted library allocation
page read and write
1CA16FDD000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA142BE000
trusted library allocation
page read and write
1CA1455F000
trusted library allocation
page read and write
14548900000
trusted library allocation
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA12F96000
trusted library allocation
page read and write
1CA1EF80000
trusted library allocation
page read and write
1CA14723000
trusted library allocation
page read and write
22811BA0000
heap
page readonly
190FDDBB000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1531B000
trusted library allocation
page read and write
1CA12FCD000
trusted library allocation
page read and write
1CA16D68000
trusted library allocation
page read and write
190FDDC2000
trusted library allocation
page read and write
1CA109BB000
trusted library allocation
page read and write
1CA14FAD000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
14A4000
heap
page read and write
1CA1B8B2000
trusted library allocation
page read and write
1480000
heap
page read and write
1CA1BA73000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA1DEEF000
trusted library allocation
page read and write
1CA1B980000
trusted library allocation
page read and write
1CA13285000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA0A896000
heap
page read and write
1CA137B7000
trusted library allocation
page read and write
1CA17231000
trusted library allocation
page read and write
1CA1B774000
trusted library allocation
page read and write
1CA153D5000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA1BA21000
trusted library allocation
page read and write
1CA1358A000
trusted library allocation
page read and write
1CA1BA9A000
trusted library allocation
page read and write
1CA163CA000
trusted library allocation
page read and write
1CA1F691000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA142CF000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA16397000
trusted library allocation
page read and write
1CA1410A000
trusted library allocation
page read and write
1CA14CE2000
trusted library allocation
page read and write
22811D00000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A854000
heap
page read and write
1CA1BB58000
trusted library allocation
page read and write
22811EB5000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA1C0EA000
trusted library allocation
page read and write
1CA163A9000
trusted library allocation
page read and write
1CA1BABD000
trusted library allocation
page read and write
1CA142A6000
trusted library allocation
page read and write
1CA1B6D4000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
10C000
unkown
page write copy
1CA1B6EB000
trusted library allocation
page read and write
22811BBF000
unclassified section
page read and write
1CA1C04A000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA1BAAB000
trusted library allocation
page read and write
87F81BB000
stack
page read and write
1BF5E3E0000
heap
page read and write
1CA1484E000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
22811B30000
heap
page read and write
1CA137B7000
trusted library allocation
page read and write
1CA1B6EB000
trusted library allocation
page read and write
1CA132A7000
heap
page read and write
190FDDAD000
trusted library allocation
page read and write
1CA16143000
trusted library allocation
page read and write
1CA1BA70000
trusted library allocation
page read and write
1CA1BAD7000
trusted library allocation
page read and write
1414000
heap
page read and write
3736EBB000
stack
page read and write
1CA15994000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0A8B6000
heap
page read and write
1CA10B9D000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA1F941000
trusted library allocation
page read and write
1CA1EDE3000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA1BAF7000
trusted library allocation
page read and write
1CA1B6D9000
trusted library allocation
page read and write
1CA1BB58000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14A70000
trusted library allocation
page read and write
1CA1C0F2000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA12FED000
trusted library allocation
page read and write
1CA13AFC000
trusted library allocation
page read and write
1CA14FD1000
trusted library allocation
page read and write
1CA0F96A000
trusted library allocation
page read and write
1CA16DD2000
trusted library allocation
page read and write
1CA1328F000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1B8E6000
trusted library allocation
page read and write
1CA1B7C3000
trusted library allocation
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA0A8FF000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA14261000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA150B4000
trusted library allocation
page read and write
1CA1328F000
heap
page read and write
1CA0A871000
heap
page read and write
1CA0A908000
heap
page read and write
1CA1B8DC000
trusted library allocation
page read and write
1CA13576000
trusted library allocation
page read and write
1CA1B6EB000
trusted library allocation
page read and write
22811E70000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
24C5631F000
heap
page read and write
1CA0A896000
heap
page read and write
1CA1C0E4000
trusted library allocation
page read and write
1CA1D13D000
heap
page read and write
1CA1F625000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA137A1000
trusted library allocation
page read and write
1CA1EE82000
trusted library allocation
page read and write
1CA1BAD4000
trusted library allocation
page read and write
1CA142C4000
trusted library allocation
page read and write
1CA141B5000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA161E8000
trusted library allocation
page read and write
1CA14889000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
190FE9E6000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA132A7000
heap
page read and write
1CA163D1000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA153CB000
trusted library allocation
page read and write
2180000
heap
page read and write
1CA16DEB000
trusted library allocation
page read and write
1CA12FED000
trusted library allocation
page read and write
14548773000
heap
page read and write
1CA1F6AB000
trusted library allocation
page read and write
1CA10B96000
trusted library allocation
page read and write
1CA1BCCD000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA15155000
trusted library allocation
page read and write
1CA1BB2D000
trusted library allocation
page read and write
1CA14C34000
trusted library allocation
page read and write
1CA14A82000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA1B7B5000
trusted library allocation
page read and write
1CA142FC000
trusted library allocation
page read and write
145488AF000
unclassified section
page read and write
1CA0A871000
heap
page read and write
40000
unkown
page readonly
1CA14E5B000
trusted library allocation
page read and write
22811E8F000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA1B6F9000
trusted library allocation
page read and write
1CA1E684000
trusted library allocation
page read and write
1CA14757000
trusted library allocation
page read and write
1CA14B94000
trusted library allocation
page read and write
1CA1BB49000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA0A891000
heap
page read and write
1CA161E8000
trusted library allocation
page read and write
1CA0A8E1000
heap
page read and write
1CA142C3000
trusted library allocation
page read and write
1CA1BCB6000
trusted library allocation
page read and write
1CA161D0000
trusted library allocation
page read and write
1CA1618B000
trusted library allocation
page read and write
228119C0000
remote allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A882000
heap
page read and write
190FD980000
heap
page read and write
1CA0A870000
heap
page read and write
1BF5E600000
trusted library allocation
page read and write
1CA10B81000
trusted library allocation
page read and write
1CA15D55000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA1474A000
trusted library allocation
page read and write
22811E62000
trusted library allocation
page read and write
1CA14A32000
trusted library allocation
page read and write
1CA16369000
trusted library allocation
page read and write
1CA14115000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA14E98000
trusted library allocation
page read and write
1CA16D3F000
trusted library allocation
page read and write
1CA13284000
heap
page read and write
1CA14F5B000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
24C56310000
heap
page read and write
1CA1B8FC000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1B9E4000
trusted library allocation
page read and write
1CA1ED78000
trusted library allocation
page read and write
1CA14E67000
trusted library allocation
page read and write
1CA1474C000
trusted library allocation
page read and write
1CA14F89000
trusted library allocation
page read and write
1CA132A7000
heap
page read and write
1CA1BAD4000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA13285000
heap
page read and write
1CA1BACA000
trusted library allocation
page read and write
1CA163FA000
trusted library allocation
page read and write
1CA14FD2000
trusted library allocation
page read and write
1CA14259000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1C0F0000
trusted library allocation
page read and write
1CA14EEA000
trusted library allocation
page read and write
1CA172B0000
trusted library allocation
page read and write
1CA1513B000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA1B8E8000
trusted library allocation
page read and write
1CA16DFE000
trusted library allocation
page read and write
1CA1486C000
trusted library allocation
page read and write
1CA142C7000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA1BA4B000
trusted library allocation
page read and write
1CA10BAA000
trusted library allocation
page read and write
1CA1BADB000
trusted library allocation
page read and write
1CA15CCB000
trusted library allocation
page read and write
1CA16198000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
87FA4BE000
stack
page read and write
1CA14130000
trusted library allocation
page read and write
1CA161B3000
trusted library allocation
page read and write
1CA0A892000
heap
page read and write
22811E11000
trusted library allocation
page read and write
190FDD81000
trusted library allocation
page read and write
1CA1B6E7000
trusted library allocation
page read and write
190FE9EC000
heap
page read and write
1CA13282000
heap
page read and write
1CA16388000
trusted library allocation
page read and write
1CA142A6000
trusted library allocation
page read and write
145488B0000
heap
page read and write
1CA12FC6000
trusted library allocation
page read and write
1CA1088A000
trusted library allocation
page read and write
1CA1F39B000
trusted library allocation
page read and write
14548C11000
trusted library allocation
page read and write
1CA1BBFC000
trusted library allocation
page read and write
1CA1366F000
trusted library allocation
page read and write
1CA1F39B000
trusted library allocation
page read and write
1CA16146000
trusted library allocation
page read and write
190FE909000
heap
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA15DED000
trusted library allocation
page read and write
1CA1B794000
trusted library allocation
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA1532D000
trusted library allocation
page read and write
1CA1BB2A000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA1098E000
trusted library allocation
page read and write
1CA1D306000
trusted library allocation
page read and write
1CA15A99000
trusted library allocation
page read and write
1CA130F4000
trusted library allocation
page read and write
1CA15BB3000
trusted library allocation
page read and write
1CA13597000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
59A9BAE000
stack
page read and write
1CA15383000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA1EED7000
trusted library allocation
page read and write
1CA15B72000
trusted library allocation
page read and write
1CA14288000
trusted library allocation
page read and write
1CA14259000
trusted library allocation
page read and write
190FE9EC000
heap
page read and write
1CA15EA7000
trusted library allocation
page read and write
1CA14F9C000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
190FE97F000
heap
page read and write
190FE9EC000
heap
page read and write
1CA15AA5000
trusted library allocation
page read and write
1CA1359B000
trusted library allocation
page read and write
1CA1C06D000
trusted library allocation
page read and write
1BC3C1024000
trusted library allocation
page read and write
1CA1BB36000
trusted library allocation
page read and write
1CA137AC000
trusted library allocation
page read and write
1CA1BA43000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA1C074000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA14757000
trusted library allocation
page read and write
1CA1B7EB000
trusted library allocation
page read and write
1CA1DEE7000
trusted library allocation
page read and write
1CA170E3000
trusted library allocation
page read and write
1CA12F74000
trusted library allocation
page read and write
190FEA77000
heap
page read and write
1CA15143000
trusted library allocation
page read and write
1CA15D31000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1B732000
trusted library allocation
page read and write
1CA0A908000
heap
page read and write
1CA170BD000
trusted library allocation
page read and write
1CA14A70000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA15155000
trusted library allocation
page read and write
1CA16378000
trusted library allocation
page read and write
190FDD48000
trusted library allocation
page read and write
1CA1353E000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA16DEB000
trusted library allocation
page read and write
1CA161ED000
trusted library allocation
page read and write
1CA1BBF5000
trusted library allocation
page read and write
1CA14BEA000
trusted library allocation
page read and write
1CA0FA00000
trusted library allocation
page read and write
37365FE000
stack
page read and write
1CA15CFD000
trusted library allocation
page read and write
1CA1BAAD000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA1477A000
trusted library allocation
page read and write
1CA15E9E000
trusted library allocation
page read and write
1CA14CDE000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA14E98000
trusted library allocation
page read and write
1CA1D205000
trusted library allocation
page read and write
1CA14CF0000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA14E50000
trusted library allocation
page read and write
1CA1BBED000
trusted library allocation
page read and write
14548A5D000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA1F33D000
trusted library allocation
page read and write
1CA163A0000
trusted library allocation
page read and write
1CA14A56000
trusted library allocation
page read and write
1CA151A3000
trusted library allocation
page read and write
1CA1B7CD000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
190FEA21000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA0A890000
heap
page read and write
1CA15A99000
trusted library allocation
page read and write
1CA1B6F1000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
13EF000
stack
page read and write
1CA130CF000
trusted library allocation
page read and write
1CA15F00000
trusted library allocation
page read and write
1CA163FA000
trusted library allocation
page read and write
1CA1F356000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA0A8B6000
heap
page read and write
1CA153C3000
trusted library allocation
page read and write
1CA14175000
trusted library allocation
page read and write
1CA14AF3000
trusted library allocation
page read and write
1CA0A88C000
heap
page read and write
1CA0A871000
heap
page read and write
1CA0F913000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A8FE000
heap
page read and write
190FE9B9000
heap
page read and write
1CA142A9000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA15EAC000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA1B771000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA0A896000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA16DD2000
trusted library allocation
page read and write
1BF5E740000
heap
page read and write
1CA1B8F3000
trusted library allocation
page read and write
1CA1577A000
trusted library allocation
page read and write
1CA137C7000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA161A7000
trusted library allocation
page read and write
190FEA6C000
heap
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14EE6000
trusted library allocation
page read and write
1CA132A9000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA132C8000
heap
page read and write
1CA0A894000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA1FDAC000
trusted library allocation
page read and write
1CA132A7000
heap
page read and write
1CA17259000
trusted library allocation
page read and write
1CA1B6E7000
trusted library allocation
page read and write
1CA1B7B5000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA132C8000
heap
page read and write
1CA0A8BB000
heap
page read and write
1CA2003C000
trusted library allocation
page read and write
1CA1B850000
trusted library allocation
page read and write
1CA14FC1000
trusted library allocation
page read and write
1CA1379A000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA14F48000
trusted library allocation
page read and write
1CA10C22000
trusted library allocation
page read and write
1CA0F966000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1429E000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1BF5E350000
heap
page read and write
1CA14CC4000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA14257000
trusted library allocation
page read and write
22811BC0000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA1426E000
trusted library allocation
page read and write
1CA14E99000
trusted library allocation
page read and write
1CA141D2000
trusted library allocation
page read and write
1CA1ED4A000
trusted library allocation
page read and write
1CA1BA5D000
trusted library allocation
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
190FDCA0000
trusted library allocation
page read and write
1CA1BA5C000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA15DFD000
trusted library allocation
page read and write
13BE000
stack
page read and write
1CA150F4000
trusted library allocation
page read and write
1CA15C7B000
trusted library allocation
page read and write
1CA1B94B000
trusted library allocation
page read and write
1CA1F6A1000
trusted library allocation
page read and write
1CA1616A000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA1B7EF000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
14548C13000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A8AD000
heap
page read and write
147F2EBC000
trusted library allocation
page execute read
1CA170F8000
trusted library allocation
page read and write
1CA15BD0000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA159CD000
trusted library allocation
page read and write
190FEA44000
heap
page read and write
1CA0A871000
heap
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA1ED82000
trusted library allocation
page read and write
190FE9E0000
heap
page read and write
1CA16D76000
trusted library allocation
page read and write
1CA1B8E0000
trusted library allocation
page read and write
1CA13567000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A89A000
heap
page read and write
1485000
heap
page read and write
1CA1707D000
trusted library allocation
page read and write
1CA137A3000
trusted library allocation
page read and write
1CA1F694000
trusted library allocation
page read and write
1CA15BD5000
trusted library allocation
page read and write
1CA12F61000
trusted library allocation
page read and write
1CA1B980000
trusted library allocation
page read and write
1CA1F66A000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA15EA4000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA1090D000
trusted library allocation
page read and write
1CA15EA0000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA1BBED000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA163EE000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA0A87C000
heap
page read and write
1CA1F39B000
trusted library allocation
page read and write
1CA14EF5000
trusted library allocation
page read and write
1CA14A68000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA145AC000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA145E9000
trusted library allocation
page read and write
1CA1086A000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
22811AF0000
heap
page read and write
1CA1EDA9000
trusted library allocation
page read and write
1CA1ED45000
trusted library allocation
page read and write
1CA1F37E000
trusted library allocation
page read and write
14548A60000
trusted library allocation
page read and write
1CA1C02A000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA147B6000
trusted library allocation
page read and write
147F2EE1000
trusted library allocation
page execute read
1CA137D2000
trusted library allocation
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA1EDDB000
trusted library allocation
page read and write
1CA147D2000
trusted library allocation
page read and write
14548A0B000
trusted library allocation
page read and write
1CA1D0AD000
heap
page read and write
1CA0A871000
heap
page read and write
1CA12F51000
trusted library allocation
page read and write
1CA14EC1000
trusted library allocation
page read and write
1CA16397000
trusted library allocation
page read and write
1CA163B2000
trusted library allocation
page read and write
1CA1F691000
trusted library allocation
page read and write
24C54690000
heap
page read and write
1CA0A882000
heap
page read and write
1CA14288000
trusted library allocation
page read and write
1CA1F6AB000
trusted library allocation
page read and write
1CA16D48000
trusted library allocation
page read and write
1CA159F0000
trusted library allocation
page read and write
22811E19000
trusted library allocation
page read and write
1CA13A0F000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1BA49000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA1367C000
trusted library allocation
page read and write
1CA153E0000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
190FE9E8000
heap
page read and write
1CA1B897000
trusted library allocation
page read and write
22811E15000
trusted library allocation
page read and write
1CA1B9DE000
trusted library allocation
page read and write
1CA14A92000
trusted library allocation
page read and write
1CA16D76000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA15BFE000
trusted library allocation
page read and write
14548A6E000
trusted library allocation
page read and write
1CA0F9FE000
trusted library allocation
page read and write
1CA20038000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA15145000
trusted library allocation
page read and write
373803E000
unkown
page readonly
1CA14C4A000
trusted library allocation
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA1379B000
trusted library allocation
page read and write
1CA14FBE000
trusted library allocation
page read and write
1CA1DEF7000
trusted library allocation
page read and write
1CA1BAB2000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA15B63000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
190FDD6A000
trusted library allocation
page read and write
1CA132C8000
heap
page read and write
1CA0A86A000
heap
page read and write
2281210C000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
190FEA44000
heap
page read and write
190FE9E9000
heap
page read and write
1CA137FB000
trusted library allocation
page read and write
1CA15EB2000
trusted library allocation
page read and write
1CA1EE82000
trusted library allocation
page read and write
1CA161DD000
trusted library allocation
page read and write
1CA108A4000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA1B8B2000
trusted library allocation
page read and write
1CA148F2000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA1B98E000
trusted library allocation
page read and write
1CA14EA0000
trusted library allocation
page read and write
1CA1BC61000
trusted library allocation
page read and write
1CA1B6F1000
trusted library allocation
page read and write
3736EB8000
stack
page read and write
1CA16382000
trusted library allocation
page read and write
59AB5FE000
stack
page read and write
1CA0A8AD000
heap
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA1C033000
trusted library allocation
page read and write
1CA1D301000
trusted library allocation
page read and write
1CA1635C000
trusted library allocation
page read and write
1CA163BF000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14264000
trusted library allocation
page read and write
1CA1BA33000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA0A871000
heap
page read and write
1CA1C0B5000
trusted library allocation
page read and write
1CA14F9A000
trusted library allocation
page read and write
1CA1C08B000
trusted library allocation
page read and write
1CA170E3000
trusted library allocation
page read and write
1CA12F33000
trusted library allocation
page read and write
1CA136A5000
trusted library allocation
page read and write
14548A00000
trusted library allocation
page read and write
1CA0A881000
heap
page read and write
1CA1477A000
trusted library allocation
page read and write
1CA1C0EC000
trusted library allocation
page read and write
1CA1B7F8000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA1BAEF000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14AF0000
trusted library allocation
page read and write
1CA13A2B000
trusted library allocation
page read and write
1CA142B5000
trusted library allocation
page read and write
1CA1D32C000
trusted library allocation
page read and write
1CA0A86D000
heap
page read and write
1CA14740000
trusted library allocation
page read and write
1CA0A908000
heap
page read and write
1CA1376C000
trusted library allocation
page read and write
1CA142BA000
trusted library allocation
page read and write
1CA161ED000
trusted library allocation
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA137C7000
trusted library allocation
page read and write
1CA1C0F0000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA14F8F000
trusted library allocation
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA15B9A000
trusted library allocation
page read and write
1CA1B7F8000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA14FE0000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A87D000
heap
page read and write
1CA1EB9E000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA14AF6000
trusted library allocation
page read and write
1CA14F72000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA1BC9C000
trusted library allocation
page read and write
1CA1F93A000
trusted library allocation
page read and write
1CA12FD1000
trusted library allocation
page read and write
1CA14BE3000
trusted library allocation
page read and write
1CA0A869000
heap
page read and write
1CA14F2B000
trusted library allocation
page read and write
190FE9E8000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA1B6F1000
trusted library allocation
page read and write
1CA1C0FE000
trusted library allocation
page read and write
1CA1D2E4000
trusted library allocation
page read and write
1CA163A9000
trusted library allocation
page read and write
1CA145EB000
trusted library allocation
page read and write
190FEA79000
heap
page read and write
1CA1B7B9000
trusted library allocation
page read and write
1CA1D2A3000
trusted library allocation
page read and write
190FDD12000
trusted library allocation
page read and write
228119E0000
unclassified section
page readonly
1CA10825000
trusted library allocation
page read and write
147E000
heap
page read and write
1CA1F9DD000
trusted library allocation
page read and write
1CA1475F000
trusted library allocation
page read and write
1CA1376F000
trusted library allocation
page read and write
22811C70000
heap
page read and write
1CA0A88E000
heap
page read and write
1CA14624000
trusted library allocation
page read and write
1CA16D41000
trusted library allocation
page read and write
1497000
heap
page read and write
1CA135CF000
trusted library allocation
page read and write
1CA15BD0000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA145FC000
trusted library allocation
page read and write
1CA15DFD000
trusted library allocation
page read and write
1CA147BA000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA15B80000
trusted library allocation
page read and write
1CA16193000
trusted library allocation
page read and write
190FDD03000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
190FDC96000
heap
page read and write
1CA0A8ED000
heap
page read and write
1CA1B7BB000
trusted library allocation
page read and write
1CA1BB36000
trusted library allocation
page read and write
1CA14754000
trusted library allocation
page read and write
22812100000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1C07B000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA0A89C000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA0A854000
heap
page read and write
1CA1B780000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA1BA68000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA1616A000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
190FEA6C000
heap
page read and write
1CA12F33000
trusted library allocation
page read and write
1CA15E95000
trusted library allocation
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
190FE960000
heap
page read and write
1CA15DA6000
trusted library allocation
page read and write
1CA1BBE7000
trusted library allocation
page read and write
1CA15BA8000
trusted library allocation
page read and write
1CA1422B000
trusted library allocation
page read and write
1CA1BA4F000
trusted library allocation
page read and write
190FE9E8000
heap
page read and write
190FEA00000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA14CDE000
trusted library allocation
page read and write
13DB000
stack
page read and write
1CA1426E000
trusted library allocation
page read and write
1CA1329A000
heap
page read and write
1CA109B2000
trusted library allocation
page read and write
1CA0A8ED000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA132A5000
heap
page read and write
1CA1ED7A000
trusted library allocation
page read and write
1CA1DEFA000
trusted library allocation
page read and write
1CA13758000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA151FD000
trusted library allocation
page read and write
1CA132C8000
heap
page read and write
1CA1B6F9000
trusted library allocation
page read and write
1CA0F2EF000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA14AB1000
trusted library allocation
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA14ACB000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA1DECD000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA15DA0000
trusted library allocation
page read and write
1CA16FAD000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA163C2000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA137B7000
trusted library allocation
page read and write
1CA161ED000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA161A7000
trusted library allocation
page read and write
1CA1ED76000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA1D1A3000
trusted library allocation
page read and write
1CA16F18000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA0F926000
trusted library allocation
page read and write
1CA14727000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA141F0000
trusted library allocation
page read and write
1CA163CF000
trusted library allocation
page read and write
1CA14EF5000
trusted library allocation
page read and write
1CA1BCC0000
trusted library allocation
page read and write
1CA1B841000
trusted library allocation
page read and write
1CA2006A000
trusted library allocation
page read and write
1CA15183000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA0F9A5000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA1F691000
trusted library allocation
page read and write
1CA14773000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA14FA5000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA14C24000
trusted library allocation
page read and write
1CA1F399000
trusted library allocation
page read and write
1CA163E1000
trusted library allocation
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA142BE000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA13AB4000
trusted library allocation
page read and write
1CA14EA3000
trusted library allocation
page read and write
1CA161CB000
trusted library allocation
page read and write
1CA142C2000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA137CE000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA16DC5000
trusted library allocation
page read and write
1CA14EE1000
trusted library allocation
page read and write
D5E000
stack
page read and write
1CA0A86B000
heap
page read and write
1CA0A87D000
heap
page read and write
1CA14A92000
trusted library allocation
page read and write
1CA14EE1000
trusted library allocation
page read and write
1CA1B8D9000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1BF5E60A000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1B6A1000
trusted library allocation
page read and write
190FE960000
heap
page read and write
1CA163CF000
trusted library allocation
page read and write
190FEA77000
heap
page read and write
1CA1351B000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA16D4C000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A870000
heap
page read and write
1CA14AB1000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA10BDD000
trusted library allocation
page read and write
1CA14E8E000
trusted library allocation
page read and write
1CA1B69C000
trusted library allocation
page read and write
1CA10BC1000
trusted library allocation
page read and write
1CA1F6A6000
trusted library allocation
page read and write
1CA0A865000
heap
page read and write
147A000
heap
page read and write
1CA157E6000
trusted library allocation
page read and write
1CA14780000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA14A6B000
trusted library allocation
page read and write
1CA1BBF2000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA1456B000
trusted library allocation
page read and write
1CA1ED7C000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1C0E2000
trusted library allocation
page read and write
1CA1BB33000
trusted library allocation
page read and write
1CA14EEE000
trusted library allocation
page read and write
1CA141F0000
trusted library allocation
page read and write
190FE9EC000
heap
page read and write
1CA0A854000
heap
page read and write
1CA0A888000
heap
page read and write
1CA17276000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA14A4F000
trusted library allocation
page read and write
1CA15166000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
22811EA7000
trusted library allocation
page read and write
1CA0A908000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA1BC5B000
trusted library allocation
page read and write
1CA1C0EE000
trusted library allocation
page read and write
1CA1DEB4000
trusted library allocation
page read and write
1CA1E500000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
22811E00000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
190FE9E1000
heap
page read and write
1CA1B79E000
trusted library allocation
page read and write
1CA0A911000
heap
page read and write
1CA1510F000
trusted library allocation
page read and write
190FDA70000
heap
page read and write
14548890000
heap
page readonly
1CA151F8000
trusted library allocation
page read and write
14548A66000
trusted library allocation
page read and write
190FE98A000
heap
page read and write
1CA14243000
trusted library allocation
page read and write
190FE360000
heap
page read and write
1CA1BA8D000
trusted library allocation
page read and write
1CA1D12A000
heap
page read and write
1CA16D5A000
trusted library allocation
page read and write
1CA137C3000
trusted library allocation
page read and write
1CA14272000
trusted library allocation
page read and write
1CA14ACE000
trusted library allocation
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA15149000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA1423C000
trusted library allocation
page read and write
190FDDC6000
trusted library allocation
page read and write
4D8F3FF000
stack
page read and write
1CA14EB6000
trusted library allocation
page read and write
1CA1EE62000
trusted library allocation
page read and write
24C56327000
heap
page read and write
1CA142B5000
trusted library allocation
page read and write
190FE9E8000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA1F9EA000
trusted library allocation
page read and write
1CA14EA3000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA14291000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA1C040000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA1B98C000
trusted library allocation
page read and write
1CA1BB67000
trusted library allocation
page read and write
1CA0A890000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA0A889000
heap
page read and write
1CA1BA43000
trusted library allocation
page read and write
1CA14C9B000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA17963000
trusted library allocation
page read and write
1CA1F965000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
14548A7A000
trusted library allocation
page read and write
1CA142A8000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA15325000
trusted library allocation
page read and write
1CA14AE6000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA14F55000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA13286000
heap
page read and write
1CA1EE37000
trusted library allocation
page read and write
190FDC40000
unclassified section
page read and write
1CA1D241000
trusted library allocation
page read and write
1CA14731000
trusted library allocation
page read and write
14548A81000
trusted library allocation
page read and write
1CA14C74000
trusted library allocation
page read and write
190FEA2A000
heap
page read and write
1CA10BA1000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA14AE6000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA0A891000
heap
page read and write
1CA0A871000
heap
page read and write
1CA13591000
trusted library allocation
page read and write
1CA15D9E000
trusted library allocation
page read and write
1CA1B6C1000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA0A86D000
heap
page read and write
D84000
heap
page read and write
1CA109B9000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A854000
heap
page read and write
1CA157F8000
trusted library allocation
page read and write
1CA13677000
trusted library allocation
page read and write
1CA14AF3000
trusted library allocation
page read and write
1CA0A895000
heap
page read and write
14548850000
heap
page read and write
1CA1BA49000
trusted library allocation
page read and write
1CA15140000
trusted library allocation
page read and write
147A000
heap
page read and write
1CA0A8AD000
heap
page read and write
190FDCF0000
unkown
page execute read
1CA142A6000
trusted library allocation
page read and write
1CA14FDA000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA142A2000
trusted library allocation
page read and write
14548A96000
trusted library allocation
page read and write
1CA14ACB000
trusted library allocation
page read and write
24C54A0A000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA1C046000
trusted library allocation
page read and write
1CA15BD0000
trusted library allocation
page read and write
1CA14C16000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0F9E1000
trusted library allocation
page read and write
1CA14768000
trusted library allocation
page read and write
1CA109A5000
trusted library allocation
page read and write
1CA14FC4000
trusted library allocation
page read and write
1CA1BCD7000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA13768000
trusted library allocation
page read and write
1CA12FC0000
trusted library allocation
page read and write
190FEA22000
heap
page read and write
1CA0A8DF000
heap
page read and write
190FE9F1000
heap
page read and write
1CA0A870000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0A896000
heap
page read and write
1CA0A87D000
heap
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA14FA7000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1EEEE000
trusted library allocation
page read and write
1CA0A908000
heap
page read and write
1CA14A56000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14C3C000
trusted library allocation
page read and write
1CA161D9000
trusted library allocation
page read and write
148C000
heap
page read and write
1CA1429E000
trusted library allocation
page read and write
1CA14A4F000
trusted library allocation
page read and write
1CA1635C000
trusted library allocation
page read and write
1CA13687000
trusted library allocation
page read and write
1CA13285000
heap
page read and write
1CA0A88C000
heap
page read and write
1CA0F91E000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA14134000
trusted library allocation
page read and write
1CA14747000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
14548A64000
trusted library allocation
page read and write
1CA15113000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA142F5000
trusted library allocation
page read and write
1CA12F60000
trusted library allocation
page read and write
1CA16D68000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA141F0000
trusted library allocation
page read and write
1CA1BA4F000
trusted library allocation
page read and write
1CA1B7BB000
trusted library allocation
page read and write
1CA1B98A000
trusted library allocation
page read and write
190FE9AA000
heap
page read and write
1CA14F9A000
trusted library allocation
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA135CF000
trusted library allocation
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA1BA23000
trusted library allocation
page read and write
1CA0A892000
heap
page read and write
AF54DFE000
stack
page read and write
1CA0A8A5000
heap
page read and write
1CA0A8BC000
heap
page read and write
59ACEFE000
unkown
page readonly
1CA12F1B000
trusted library allocation
page read and write
1CA15BA0000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1B7A2000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA1B98A000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1478E000
trusted library allocation
page read and write
190FDD6F000
trusted library allocation
page read and write
1CA15120000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA0A896000
heap
page read and write
13FE000
stack
page read and write
1CA17094000
trusted library allocation
page read and write
1CA1E7A8000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA1B8D9000
trusted library allocation
page read and write
1CA1BA8F000
trusted library allocation
page read and write
1CA14241000
trusted library allocation
page read and write
1CA170AD000
trusted library allocation
page read and write
1CA1F6EB000
trusted library allocation
page read and write
1CA12FDC000
trusted library allocation
page read and write
1CA16D48000
trusted library allocation
page read and write
1CA16D41000
trusted library allocation
page read and write
1CA170C3000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA15EA8000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA14F45000
trusted library allocation
page read and write
190FDD0A000
trusted library allocation
page read and write
1CA147C8000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA13655000
trusted library allocation
page read and write
1CA1BA42000
trusted library allocation
page read and write
1CA1BB58000
trusted library allocation
page read and write
1CA1EE7C000
trusted library allocation
page read and write
1CA14AA2000
trusted library allocation
page read and write
1CA14F82000
trusted library allocation
page read and write
1478000
heap
page read and write
1CA0A87B000
heap
page read and write
190FE450000
heap
page read and write
1CA14A8D000
trusted library allocation
page read and write
1CA14145000
trusted library allocation
page read and write
1CA1B6A1000
trusted library allocation
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA14AE2000
trusted library allocation
page read and write
1CA10BDC000
trusted library allocation
page read and write
1CA1F33D000
trusted library allocation
page read and write
1CA1426B000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA14156000
trusted library allocation
page read and write
1CA0F975000
trusted library allocation
page read and write
1CA13289000
heap
page read and write
1CA0A8A2000
heap
page read and write
1CA14127000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA0A854000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA1C0E2000
trusted library allocation
page read and write
1CA14FC8000
trusted library allocation
page read and write
1CA1EEEE000
trusted library allocation
page read and write
1CA14FDE000
trusted library allocation
page read and write
190FDC4F000
unclassified section
page read and write
1CA1C0E8000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA14EEA000
trusted library allocation
page read and write
1CA14FA5000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
190FE97D000
heap
page read and write
1CA15D9A000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA1BAAB000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
22811C74000
heap
page read and write
1CA14F8D000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
190FEA77000
heap
page read and write
1CA1BA1C000
trusted library allocation
page read and write
1CA17039000
trusted library allocation
page read and write
14548640000
unclassified section
page readonly
1CA16DCE000
trusted library allocation
page read and write
1CA14A92000
trusted library allocation
page read and write
1CA15746000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA1BAF6000
trusted library allocation
page read and write
1CA1C074000
trusted library allocation
page read and write
1CA10828000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA0A888000
heap
page read and write
1CA0A888000
heap
page read and write
1CA10BC7000
trusted library allocation
page read and write
1CA1BB51000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA13537000
trusted library allocation
page read and write
1CA14EE1000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A871000
heap
page read and write
1CA17063000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA0A889000
heap
page read and write
1CA15151000
trusted library allocation
page read and write
1CA153C9000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA0F871000
trusted library allocation
page read and write
1CA13282000
heap
page read and write
1CA163A4000
trusted library allocation
page read and write
1CA15151000
trusted library allocation
page read and write
1CA1BBE7000
trusted library allocation
page read and write
1CA14A90000
trusted library allocation
page read and write
1CA163A4000
trusted library allocation
page read and write
1CA1EEEE000
trusted library allocation
page read and write
1CA14268000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
87FA43C000
stack
page read and write
1CA15C59000
trusted library allocation
page read and write
1CA14A8B000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA1D0E0000
heap
page read and write
1CA14288000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA1F66A000
trusted library allocation
page read and write
1CA14E3B000
trusted library allocation
page read and write
87F8BD8000
stack
page read and write
14548C0F000
trusted library allocation
page read and write
1CA1D0EF000
heap
page read and write
1CA14F9A000
trusted library allocation
page read and write
190FE370000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA0A893000
heap
page read and write
1CA0A856000
heap
page read and write
1CA1EED7000
trusted library allocation
page read and write
1CA13284000
heap
page read and write
1CA1429E000
trusted library allocation
page read and write
1CA1B980000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA14FDC000
trusted library allocation
page read and write
1CA16198000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA16373000
trusted library allocation
page read and write
1CA1BABD000
trusted library allocation
page read and write
1CA1F958000
trusted library allocation
page read and write
1CA1BA60000
trusted library allocation
page read and write
1CA10B45000
trusted library allocation
page read and write
1CA137C0000
trusted library allocation
page read and write
22811E82000
trusted library allocation
page read and write
1CA1D243000
trusted library allocation
page read and write
1CA14C9B000
trusted library allocation
page read and write
1CA1E702000
trusted library allocation
page read and write
1CA1C022000
trusted library allocation
page read and write
1CA1B784000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA13788000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1458000
heap
page read and write
1CA10BF5000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA14902000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA0A8AD000
heap
page read and write
1CA170AF000
trusted library allocation
page read and write
1CA14A7F000
trusted library allocation
page read and write
1CA1D26D000
trusted library allocation
page read and write
1CA1532F000
trusted library allocation
page read and write
1CA0A8B2000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA0A8B3000
heap
page read and write
1CA15CEE000
trusted library allocation
page read and write
190FD959000
remote allocation
page execute read
1CA0A88B000
heap
page read and write
1CA1B6C1000
trusted library allocation
page read and write
1CA1BCD3000
trusted library allocation
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA14C89000
trusted library allocation
page read and write
1CA0F82F000
trusted library allocation
page read and write
1CA1BC8F000
trusted library allocation
page read and write
1CA0A85A000
heap
page read and write
1CA14747000
trusted library allocation
page read and write
1CA12F87000
trusted library allocation
page read and write
1CA14731000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA14277000
trusted library allocation
page read and write
1CA0A89D000
heap
page read and write
1CA16D3F000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA1B7AB000
trusted library allocation
page read and write
1CA0A8AD000
heap
page read and write
1CA14261000
trusted library allocation
page read and write
1CA1B9E4000
trusted library allocation
page read and write
1CA1B808000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA13683000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA151F8000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA20038000
trusted library allocation
page read and write
1CA14F1E000
trusted library allocation
page read and write
1CA1ED84000
trusted library allocation
page read and write
1CA15752000
trusted library allocation
page read and write
22811AFA000
heap
page read and write
1CA0A8B2000
heap
page read and write
1CA16198000
trusted library allocation
page read and write
1CA14BD0000
trusted library allocation
page read and write
1CA109DC000
trusted library allocation
page read and write
1CA142BA000
trusted library allocation
page read and write
22811E30000
trusted library allocation
page read and write
24C54A00000
trusted library allocation
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA1F37A000
trusted library allocation
page read and write
1CA0A854000
heap
page read and write
1CA14AC1000
trusted library allocation
page read and write
1CA161D0000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA15CB1000
trusted library allocation
page read and write
1CA14EA0000
trusted library allocation
page read and write
1CA14878000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A870000
heap
page read and write
1CA1F698000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA1D0A3000
heap
page read and write
1CA14764000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA1C07B000
trusted library allocation
page read and write
1CA1635C000
trusted library allocation
page read and write
1CA0A902000
heap
page read and write
1CA15EAE000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA132C8000
heap
page read and write
1CA10991000
trusted library allocation
page read and write
1CA14A74000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA1BABB000
trusted library allocation
page read and write
1CA1DEFB000
trusted library allocation
page read and write
1CA14BCA000
trusted library allocation
page read and write
1CA1BCCF000
trusted library allocation
page read and write
1CA15D4C000
trusted library allocation
page read and write
1CA1B79A000
trusted library allocation
page read and write
1D1F000
stack
page read and write
1CA147A5000
trusted library allocation
page read and write
1CA1EB6D000
trusted library allocation
page read and write
1CA1FD1C000
trusted library allocation
page read and write
1CA14C8C000
trusted library allocation
page read and write
14548AC8000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
1CA1F958000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA13297000
heap
page read and write
1CA1B6D4000
trusted library allocation
page read and write
1CA1EDEC000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
14548AB7000
trusted library allocation
page read and write
1CA15151000
trusted library allocation
page read and write
1CA0A87D000
heap
page read and write
1CA10B0C000
trusted library allocation
page read and write
1CA14C8C000
trusted library allocation
page read and write
14548A2E000
trusted library allocation
page read and write
1CA14759000
trusted library allocation
page read and write
24C54A07000
trusted library allocation
page read and write
14548B24000
heap
page read and write
1CA0A8AB000
heap
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA14FA1000
trusted library allocation
page read and write
1CA14FD1000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA13297000
heap
page read and write
24C5631A000
heap
page read and write
1CA1329A000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA15B80000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA1329A000
heap
page read and write
1CA1E705000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1BAF7000
trusted library allocation
page read and write
1CA1D0F4000
heap
page read and write
1CA14E44000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA1482D000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA13284000
heap
page read and write
1CA14AF6000
trusted library allocation
page read and write
1CA10818000
trusted library allocation
page read and write
1CA10825000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA1DE92000
trusted library allocation
page read and write
1CA16DC5000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA1BC8C000
trusted library allocation
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA16193000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA1BABF000
trusted library allocation
page read and write
1CA1ED7A000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA14257000
trusted library allocation
page read and write
1CA0A878000
heap
page read and write
1CA1329A000
heap
page read and write
1CA163EE000
trusted library allocation
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA1B79E000
trusted library allocation
page read and write
1CA1B98C000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA0A899000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA14FC6000
trusted library allocation
page read and write
1CA0A888000
heap
page read and write
24C54732000
heap
page read and write
1CA1BCCB000
trusted library allocation
page read and write
1CA1D2C5000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA14EEE000
trusted library allocation
page read and write
1CA2005C000
trusted library allocation
page read and write
1CA1418B000
trusted library allocation
page read and write
1CA10BF6000
trusted library allocation
page read and write
1CA1F322000
trusted library allocation
page read and write
1CA13285000
heap
page read and write
1CA10B14000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA10B8F000
trusted library allocation
page read and write
1CA13289000
heap
page read and write
1CA1B6E7000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA0A870000
heap
page read and write
1CA1ED31000
trusted library allocation
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA14FDE000
trusted library allocation
page read and write
1CA163E9000
trusted library allocation
page read and write
1CA1418B000
trusted library allocation
page read and write
102000
unkown
page readonly
1CA1BCD1000
trusted library allocation
page read and write
1CA1B6F9000
trusted library allocation
page read and write
1CA172A9000
trusted library allocation
page read and write
147F2E4B000
trusted library allocation
page execute read
87FA47E000
unkown
page readonly
1CA153ED000
trusted library allocation
page read and write
147F000
heap
page read and write
1CA10BF8000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA1B819000
trusted library allocation
page read and write
1CA14288000
trusted library allocation
page read and write
1CA1F9ED000
trusted library allocation
page read and write
1CA1F399000
trusted library allocation
page read and write
1CA1F37A000
trusted library allocation
page read and write
1CA16193000
trusted library allocation
page read and write
1CA14130000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA13688000
trusted library allocation
page read and write
190FEA3B000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA163B2000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA10BBE000
trusted library allocation
page read and write
59ABEFE000
unkown
page readonly
1CA1BA4F000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA161D0000
trusted library allocation
page read and write
1CA108AA000
trusted library allocation
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA13538000
trusted library allocation
page read and write
1CA1BBF5000
trusted library allocation
page read and write
1CA14AE4000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA14553000
trusted library allocation
page read and write
1CA1B6A1000
trusted library allocation
page read and write
1CA1F698000
trusted library allocation
page read and write
1CA0A896000
heap
page read and write
1CA0A889000
heap
page read and write
1CA16DE1000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA1BAD7000
trusted library allocation
page read and write
1CA14243000
trusted library allocation
page read and write
1CA151F8000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA1B8F1000
trusted library allocation
page read and write
1488000
heap
page read and write
AF55DFE000
stack
page read and write
1CA0A86B000
heap
page read and write
1CA0A892000
heap
page read and write
1CA0A86B000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA15AAE000
trusted library allocation
page read and write
1CA1532D000
trusted library allocation
page read and write
1CA137D2000
trusted library allocation
page read and write
1CA13747000
trusted library allocation
page read and write
1CA10BAB000
trusted library allocation
page read and write
1CA1475C000
trusted library allocation
page read and write
1CA14A2D000
trusted library allocation
page read and write
1CA16359000
trusted library allocation
page read and write
1CA1328F000
heap
page read and write
1CA142BA000
trusted library allocation
page read and write
1CA14FC8000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8A5000
heap
page read and write
190FE960000
heap
page read and write
1CA1B9DE000
trusted library allocation
page read and write
1CA14FC1000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA1E78A000
trusted library allocation
page read and write
24C54742000
heap
page read and write
1CA14259000
trusted library allocation
page read and write
1CA1D183000
heap
page read and write
1CA0A8AB000
heap
page read and write
22811950000
unclassified section
page readonly
10C000
unkown
page read and write
1CA172B0000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA0A86A000
heap
page read and write
1CA0A88A000
heap
page read and write
1CA14254000
trusted library allocation
page read and write
1CA14773000
trusted library allocation
page read and write
1CA1B8E8000
trusted library allocation
page read and write
1CA1B7EF000
trusted library allocation
page read and write
1CA1BADB000
trusted library allocation
page read and write
1CA13683000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1BB47000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA16DC8000
trusted library allocation
page read and write
1CA142FA000
trusted library allocation
page read and write
1CA14AE6000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA1F698000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA141FB000
trusted library allocation
page read and write
1CA1F950000
trusted library allocation
page read and write
1CA14EEE000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA16DE1000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA13286000
heap
page read and write
1CA1BB51000
trusted library allocation
page read and write
1CA1BACF000
trusted library allocation
page read and write
1CA12F9E000
trusted library allocation
page read and write
1CA14583000
trusted library allocation
page read and write
1CA14A82000
trusted library allocation
page read and write
1CA0F9AF000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA142C2000
trusted library allocation
page read and write
1CA147A0000
trusted library allocation
page read and write
1CA16359000
trusted library allocation
page read and write
1CA1379D000
trusted library allocation
page read and write
1CA1FD93000
trusted library allocation
page read and write
1CA15166000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA0A908000
heap
page read and write
1CA1427E000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA14FD2000
trusted library allocation
page read and write
1CA1BAC6000
trusted library allocation
page read and write
1CA12F28000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA14EF9000
trusted library allocation
page read and write
1CA1E66D000
trusted library allocation
page read and write
190FE9F1000
heap
page read and write
1CA1DEEB000
trusted library allocation
page read and write
1CA1C097000
trusted library allocation
page read and write
14548A12000
trusted library allocation
page read and write
1CA10818000
trusted library allocation
page read and write
14548720000
heap
page read and write
1CA15124000
trusted library allocation
page read and write
190FDCD0000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA10BC1000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA1BB1B000
trusted library allocation
page read and write
1CA0A88B000
heap
page read and write
1CA150CF000
trusted library allocation
page read and write
1CA1EEE3000
trusted library allocation
page read and write
1CA1FD50000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA16359000
trusted library allocation
page read and write
1CA1ED78000
trusted library allocation
page read and write
24C54B65000
heap
page read and write
1CA14A92000
trusted library allocation
page read and write
1CA15CD3000
trusted library allocation
page read and write
1CA1F9C6000
trusted library allocation
page read and write
1CA1B84D000
trusted library allocation
page read and write
1CA172F2000
trusted library allocation
page read and write
1CA10BDD000
trusted library allocation
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA14AAA000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA1BAD1000
trusted library allocation
page read and write
22811F00000
heap
page read and write
190FDC20000
heap
page readonly
1CA1375D000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA1D0D7000
heap
page read and write
D84000
heap
page read and write
1CA108FB000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
22811E03000
trusted library allocation
page read and write
1CA0A902000
heap
page read and write
1CA1DEDD000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA0A88C000
heap
page read and write
22811A00000
heap
page read and write
1CA14F29000
trusted library allocation
page read and write
1CA170F3000
trusted library allocation
page read and write
1CA14E98000
trusted library allocation
page read and write
1CA1369E000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
190FDCE9000
unkown
page execute read
1CA15A99000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA132A2000
heap
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA14247000
trusted library allocation
page read and write
1CA14AB2000
trusted library allocation
page read and write
1CA161D9000
trusted library allocation
page read and write
1CA1D0A3000
heap
page read and write
1CA1DEE7000
trusted library allocation
page read and write
1CA0A892000
heap
page read and write
1CA109AC000
trusted library allocation
page read and write
1CA0A8FF000
heap
page read and write
1CA1BAA7000
trusted library allocation
page read and write
1CA1BACD000
trusted library allocation
page read and write
1CA1BC63000
trusted library allocation
page read and write
1CA1B6F9000
trusted library allocation
page read and write
1CA1BAC6000
trusted library allocation
page read and write
1CA10BF5000
trusted library allocation
page read and write
1CA1639F000
trusted library allocation
page read and write
1CA12F34000
trusted library allocation
page read and write
1CA1356E000
trusted library allocation
page read and write
1CA1419D000
trusted library allocation
page read and write
1CA170AF000
trusted library allocation
page read and write
1CA12FE2000
trusted library allocation
page read and write
1CA1379B000
trusted library allocation
page read and write
1CA0A872000
heap
page read and write
1CA0A889000
heap
page read and write
1CA137A9000
trusted library allocation
page read and write
1BF5E3E9000
heap
page read and write
1CA0A902000
heap
page read and write
1CA1B6EB000
trusted library allocation
page read and write
14548740000
heap
page read and write
1CA16DD0000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA1BCC8000
trusted library allocation
page read and write
1CA142DD000
trusted library allocation
page read and write
1CA2007B000
trusted library allocation
page read and write
1CA1BADE000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA14E4A000
trusted library allocation
page read and write
1CA16DCE000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA15120000
trusted library allocation
page read and write
1CA14F35000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA132A3000
heap
page read and write
59ABE3E000
stack
page read and write
1CA16DFE000
trusted library allocation
page read and write
1CA13674000
trusted library allocation
page read and write
1CA1D187000
trusted library allocation
page read and write
1CA15CA1000
trusted library allocation
page read and write
1CA15122000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA14AF6000
trusted library allocation
page read and write
1CA14FEB000
trusted library allocation
page read and write
1CA14EB9000
trusted library allocation
page read and write
1CA15C53000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A89D000
heap
page read and write
1CA15DED000
trusted library allocation
page read and write
1CA159DF000
trusted library allocation
page read and write
1CA14EB8000
trusted library allocation
page read and write
1CA1B7EF000
trusted library allocation
page read and write
1CA1ED76000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
22812000000
trusted library allocation
page read and write
1CA1BA5C000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14FF8000
trusted library allocation
page read and write
1482000
heap
page read and write
1CA1E793000
trusted library allocation
page read and write
1CA1ED80000
trusted library allocation
page read and write
59AA5D8000
stack
page read and write
1CA13797000
trusted library allocation
page read and write
1CA153FE000
trusted library allocation
page read and write
14548770000
heap
page read and write
190FE9FD000
heap
page read and write
1CA0A891000
heap
page read and write
190FE900000
heap
page read and write
1CA0A88E000
heap
page read and write
1CA141AA000
trusted library allocation
page read and write
1CA14773000
trusted library allocation
page read and write
1CA14F6A000
trusted library allocation
page read and write
1CA108C3000
trusted library allocation
page read and write
1CA12F94000
trusted library allocation
page read and write
1CA14EFE000
trusted library allocation
page read and write
1CA16DDC000
trusted library allocation
page read and write
1CA14831000
trusted library allocation
page read and write
1CA14F8D000
trusted library allocation
page read and write
1CA13A62000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA1B94D000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA14175000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8BC000
heap
page read and write
1CA14C99000
trusted library allocation
page read and write
1CA1B6F1000
trusted library allocation
page read and write
1CA14247000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA12F1D000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A878000
heap
page read and write
1CA1B6D4000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA2006A000
trusted library allocation
page read and write
1CA14750000
trusted library allocation
page read and write
1CA14E3E000
trusted library allocation
page read and write
1CA1ED45000
trusted library allocation
page read and write
1CA14AEF000
trusted library allocation
page read and write
1CA13063000
trusted library allocation
page read and write
190FDCE3000
unkown
page execute read
190FEA58000
heap
page read and write
1CA130BC000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA14EF5000
trusted library allocation
page read and write
1CA13284000
heap
page read and write
22811CE0000
heap
page read and write
1CA1E750000
trusted library allocation
page read and write
1CA12F7A000
trusted library allocation
page read and write
1CA1704D000
trusted library allocation
page read and write
1CA1C0E4000
trusted library allocation
page read and write
1CA147FD000
trusted library allocation
page read and write
1CA12FDE000
trusted library allocation
page read and write
1CA13563000
trusted library allocation
page read and write
1CA14175000
trusted library allocation
page read and write
1CA1376B000
trusted library allocation
page read and write
1CA142B5000
trusted library allocation
page read and write
1CA1E767000
trusted library allocation
page read and write
1CA0A8B5000
heap
page read and write
1CA14EDD000
trusted library allocation
page read and write
1CA14BB5000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
1CA0A88A000
heap
page read and write
1CA1366C000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1EE82000
trusted library allocation
page read and write
1CA1636D000
trusted library allocation
page read and write
1CA15A99000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA14EC5000
trusted library allocation
page read and write
1CA14256000
trusted library allocation
page read and write
1CA1B8F1000
trusted library allocation
page read and write
1CA141C3000
trusted library allocation
page read and write
1CA14241000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
41000
unkown
page execute read
1CA14156000
trusted library allocation
page read and write
1CA14A90000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA0A882000
heap
page read and write
1CA0A8B7000
heap
page read and write
1CA14E79000
trusted library allocation
page read and write
1CA10BBE000
trusted library allocation
page read and write
1497000
heap
page read and write
1CA16DD2000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
D84000
heap
page read and write
373903E000
unkown
page readonly
1CA14BB9000
trusted library allocation
page read and write
1CA0A89C000
heap
page read and write
1CA0A892000
heap
page read and write
1CA13779000
trusted library allocation
page read and write
1CA137AB000
trusted library allocation
page read and write
22811E0C000
trusted library allocation
page read and write
1CA1D11E000
heap
page read and write
1CA1BADE000
trusted library allocation
page read and write
1CA15AA5000
trusted library allocation
page read and write
1CA1085A000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
14548D00000
heap
page read and write
1CA10BEB000
trusted library allocation
page read and write
1CA1361F000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA1422D000
trusted library allocation
page read and write
1CA0A875000
heap
page read and write
1CA147A2000
trusted library allocation
page read and write
1CA1B9FA000
trusted library allocation
page read and write
1CA0A8BC000
heap
page read and write
1CA1F965000
trusted library allocation
page read and write
190FDD00000
trusted library allocation
page read and write
1CA14288000
trusted library allocation
page read and write
1CA14FDE000
trusted library allocation
page read and write
1CA0A891000
heap
page read and write
1CA0A88B000
heap
page read and write
1CA0A878000
heap
page read and write
1CA1B700000
trusted library allocation
page read and write
1CA1BB49000
trusted library allocation
page read and write
1CA1B6A1000
trusted library allocation
page read and write
DC000
unkown
page readonly
1CA10BDD000
trusted library allocation
page read and write
190FEA77000
heap
page read and write
190FEA58000
heap
page read and write
1CA163A4000
trusted library allocation
page read and write
1472000
heap
page read and write
1CA14A90000
trusted library allocation
page read and write
1CA1C062000
trusted library allocation
page read and write
1CA1D248000
trusted library allocation
page read and write
1CA1C030000
trusted library allocation
page read and write
1CA0A87C000
heap
page read and write
1CA13282000
heap
page read and write
1CA15134000
trusted library allocation
page read and write
D10000
heap
page read and write
1CA1BA53000
trusted library allocation
page read and write
1CA16DF1000
trusted library allocation
page read and write
1CA161ED000
trusted library allocation
page read and write
1CA0A88E000
heap
page read and write
1CA1F971000
trusted library allocation
page read and write
1CA1B79A000
trusted library allocation
page read and write
1CA14B91000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA0A85B000
heap
page read and write
1CA15B72000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA0A878000
heap
page read and write
190FE9F1000
heap
page read and write
1CA0F9DB000
trusted library allocation
page read and write
1CA10BDC000
trusted library allocation
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8AD000
heap
page read and write
3734BDD000
stack
page read and write
1CA15DA2000
trusted library allocation
page read and write
1CA1B81E000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA162CF000
trusted library allocation
page read and write
1CA0A86C000
heap
page read and write
1CA1373B000
trusted library allocation
page read and write
1CA15D98000
trusted library allocation
page read and write
145486B8000
remote allocation
page execute read
1CA14EF9000
trusted library allocation
page read and write
1CA142F0000
trusted library allocation
page read and write
1CA14FF8000
trusted library allocation
page read and write
1CA1F32D000
trusted library allocation
page read and write
1CA163C2000
trusted library allocation
page read and write
14548630000
unclassified section
page readonly
1CA1476B000
trusted library allocation
page read and write
1CA14FFB000
trusted library allocation
page read and write
1CA16DC5000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA0A8E1000
heap
page read and write
1CA14185000
trusted library allocation
page read and write
1CA1EEE3000
trusted library allocation
page read and write
1CA1BCC2000
trusted library allocation
page read and write
1CA15DA4000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA14EB6000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
190FE9A8000
heap
page read and write
1CA16DC8000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA12F4C000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA132AD000
heap
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA1B7B5000
trusted library allocation
page read and write
1CA0A8B6000
heap
page read and write
1CA0A902000
heap
page read and write
D84000
heap
page read and write
1CA0A891000
heap
page read and write
1CA170C1000
trusted library allocation
page read and write
1CA1C0F2000
trusted library allocation
page read and write
1CA1308B000
trusted library allocation
page read and write
1CA0A89A000
heap
page read and write
1CA0A89A000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA1B8D5000
trusted library allocation
page read and write
1CA15B80000
trusted library allocation
page read and write
1430000
heap
page read and write
1CA163A9000
trusted library allocation
page read and write
1CA17261000
trusted library allocation
page read and write
1CA0A892000
heap
page read and write
1CA1085E000
trusted library allocation
page read and write
1CA1BB51000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA1BCFA000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA14EF1000
trusted library allocation
page read and write
1CA1B9E4000
trusted library allocation
page read and write
1CA109AC000
trusted library allocation
page read and write
1CA142E9000
trusted library allocation
page read and write
1CA1D0FE000
heap
page read and write
1CA15155000
trusted library allocation
page read and write
1CA12F21000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1B843000
trusted library allocation
page read and write
1CA1365A000
trusted library allocation
page read and write
1CA0A861000
heap
page read and write
1CA1F93C000
trusted library allocation
page read and write
1CA1B7AB000
trusted library allocation
page read and write
1CA16DCB000
trusted library allocation
page read and write
1CA15BA8000
trusted library allocation
page read and write
AF565FE000
stack
page read and write
1CA1DEFA000
trusted library allocation
page read and write
1CA14FCD000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A909000
heap
page read and write
1CA14F54000
trusted library allocation
page read and write
1CA0A8B4000
heap
page read and write
1CA137D6000
trusted library allocation
page read and write
1CA16388000
trusted library allocation
page read and write
1CA150D9000
trusted library allocation
page read and write
1CA1B8E6000
trusted library allocation
page read and write
1CA1B6F5000
trusted library allocation
page read and write
1CA0A8A5000
heap
page read and write
1CA14F8F000
trusted library allocation
page read and write
1CA14740000
trusted library allocation
page read and write
1CA12FDB000
trusted library allocation
page read and write
1CA16D8C000
trusted library allocation
page read and write
1CA1BA4F000
trusted library allocation
page read and write
1CA1577A000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA1512D000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA0A8FE000
heap
page read and write
1CA1359B000
trusted library allocation
page read and write
1CA1D2A7000
trusted library allocation
page read and write
24C5474D000
heap
page read and write
1CA161E8000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA14A1A000
trusted library allocation
page read and write
1CA0A8FE000
heap
page read and write
1CA172A6000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA148A1000
trusted library allocation
page read and write
1CA0A889000
heap
page read and write
1CA14C48000
trusted library allocation
page read and write
102000
unkown
page readonly
1CA1364B000
trusted library allocation
page read and write
1CA14FF2000
trusted library allocation
page read and write
1CA15BFE000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A8DF000
heap
page read and write
1CA0A8BC000
heap
page read and write
22811EC4000
trusted library allocation
page read and write
1CA14F89000
trusted library allocation
page read and write
1CA1B824000
trusted library allocation
page read and write
1CA13576000
trusted library allocation
page read and write
1CA148FD000
trusted library allocation
page read and write
1CA1429C000
trusted library allocation
page read and write
1CA1D1E5000
trusted library allocation
page read and write
1CA10992000
trusted library allocation
page read and write
87FB4FE000
unkown
page readonly
190FE9E9000
heap
page read and write
1CA0A896000
heap
page read and write
1CA15CD5000
trusted library allocation
page read and write
1CA0A8B3000
heap
page read and write
1CA0A871000
heap
page read and write
1CA0A871000
heap
page read and write
1CA1B8B2000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA0A8AB000
heap
page read and write
1CA17276000
trusted library allocation
page read and write
1CA0A900000
heap
page read and write
1CA0A8A0000
heap
page read and write
1CA16DDC000
trusted library allocation
page read and write
1CA13779000
trusted library allocation
page read and write
1CA1B98E000
trusted library allocation
page read and write
1CA14ADC000
trusted library allocation
page read and write
1CA1F36C000
trusted library allocation
page read and write
1CA1F971000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA0A8B7000
heap
page read and write
1CA14E6C000
trusted library allocation
page read and write
1CA14ABB000
trusted library allocation
page read and write
1CA0A899000
heap
page read and write
59ABEBE000
stack
page read and write
1CA16D4C000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA14FBC000
trusted library allocation
page read and write
1CA14A6D000
trusted library allocation
page read and write
1CA150AE000
trusted library allocation
page read and write
1CA14BFA000
trusted library allocation
page read and write
1CA10978000
trusted library allocation
page read and write
1CA0A86B000
heap
page read and write
1CA0A8A5000
heap
page read and write
1CA142B5000
trusted library allocation
page read and write
1CA1B6DD000
trusted library allocation
page read and write
1CA14FB5000
trusted library allocation
page read and write
1CA1BCBA000
trusted library allocation
page read and write
1CA15183000
trusted library allocation
page read and write
1CA1B6E3000
trusted library allocation
page read and write
1CA13297000
heap
page read and write
1CA14FBE000
trusted library allocation
page read and write
1CA13786000
trusted library allocation
page read and write
1CA13675000
trusted library allocation
page read and write
D84000
heap
page read and write
1CA132A2000
heap
page read and write
1CA0A861000
heap
page read and write
1CA163E9000
trusted library allocation
page read and write
1CA151F2000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
1CA14E99000
trusted library allocation
page read and write
1CA0A8A0000
heap
page read and write
1CA13758000
trusted library allocation
page read and write
1CA0A882000
heap
page read and write
1CA14ADF000
trusted library allocation
page read and write
1CA0A86A000
heap
page read and write
1CA136CE000
trusted library allocation
page read and write
1CA15379000
trusted library allocation
page read and write
14548C03000
trusted library allocation
page read and write
1CA0F2C7000
trusted library allocation
page read and write
190FEA2A000
heap
page read and write
1CA12FED000
trusted library allocation
page read and write
1CA14EF5000
trusted library allocation
page read and write
1CA0A8BB000
heap
page read and write
1CA0A900000
heap
page read and write
1CA1BA53000
trusted library allocation
page read and write
1CA1D1C8000
trusted library allocation
page read and write
1CA0A8A2000
heap
page read and write
14548C39000
trusted library allocation
page read and write
1CA14F3D000
trusted library allocation
page read and write
1CA0A87B000
heap
page read and write
37355D8000
stack
page read and write
1CA0A8B6000
heap
page read and write
CAA000
stack
page read and write
1CA142FD000
trusted library allocation
page read and write
1CA14A87000
trusted library allocation
page read and write
1CA1B6E3000
trusted library allocation
page read and write
1CA14905000
trusted library allocation
page read and write
1CA1ED4A000
trusted library allocation
page read and write
1CA14ACB000
trusted library allocation
page read and write
1CA15D3D000
trusted library allocation
page read and write
1CA0A85B000
heap
page read and write
1CA1D113000
heap
page read and write
1CA150D3000
trusted library allocation
page read and write
1CA16143000
trusted library allocation
page read and write
1CA14EB8000
trusted library allocation
page read and write
1CA1B8EC000
trusted library allocation
page read and write
1CA16D64000
trusted library allocation
page read and write
1CA145EB000
trusted library allocation
page read and write
1CA1B77C000
trusted library allocation
page read and write
1CA14A92000
trusted library allocation
page read and write
1CA162B5000
trusted library allocation
page read and write
190FE9A1000
heap
page read and write
1CA1085A000
trusted library allocation
page read and write
1CA1410A000
trusted library allocation
page read and write
1CA0A870000
heap
page read and write
1CA136A5000
trusted library allocation
page read and write
1CA14FDE000
trusted library allocation
page read and write
1CA14C9D000
trusted library allocation
page read and write
1CA16DF1000
trusted library allocation
page read and write
14548AB1000
trusted library allocation
page read and write
1CA0A871000
heap
page read and write
1CA1D0A3000
heap
page read and write
1CA161DD000
trusted library allocation
page read and write
1CA1B6F1000
trusted library allocation
page read and write
22811960000
unclassified section
page readonly
1CA0A8B3000
heap
page read and write
There are 3700 hidden memdumps, click here to show them.