IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2baf1c1-67a3-4dbf-b204-8d4bc03195f7.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2baf1c1-67a3-4dbf-b204-8d4bc03195f7.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ff868d4-e876-4eb3-90fc-8f920c308aec} 4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd4596e910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3860 -parentBuildID 20230927232528 -prefsHandle 3868 -prefMapHandle 3068 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5d50ed7-ac4a-4dd8-8fac-bb1be5cc9d47} 4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd57beff10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5036 -prefMapHandle 5084 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f165d4fc-795c-42a0-aec5-4aaa0c03c649} 4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd5763c310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://youtube.com/account?=hte
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://www.tsn.ca
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
dualstack.reddit.map.fastly.net
151.101.193.140
youtube-ui.l.google.com
142.250.181.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.181.78
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1DD5309C000
heap
page read and write
1DBB2F48000
trusted library allocation
page read and write
1DD58D28000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD563B5000
trusted library allocation
page read and write
1DD56ED4000
trusted library allocation
page read and write
1DD574BF000
trusted library allocation
page read and write
1DD4C76E000
heap
page read and write
1DD572D4000
trusted library allocation
page read and write
1DD5DCA8000
trusted library allocation
page read and write
1DD5D818000
trusted library allocation
page read and write
1DD4C77B000
heap
page read and write
BEA000
heap
page read and write
1DD58E9D000
trusted library allocation
page read and write
1DD55674000
trusted library allocation
page read and write
1DBB2CE0000
trusted library allocation
page read and write
1DD57EA8000
trusted library allocation
page read and write
1DD5701D000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD61014000
heap
page read and write
1DD529B5000
trusted library allocation
page read and write
1DD5825B000
trusted library allocation
page read and write
9DEE3E000
stack
page read and write
1DD530B3000
heap
page read and write
1DD5DB90000
trusted library allocation
page read and write
BF4000
heap
page read and write
1DD5744D000
trusted library allocation
page read and write
1DD575F6000
trusted library allocation
page read and write
1DD559D0000
trusted library allocation
page read and write
1DD4C78C000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD580CA000
trusted library allocation
page read and write
B70000
heap
page read and write
1DD559E0000
trusted library allocation
page read and write
1DBB3AF1000
heap
page read and write
1DD57795000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD539BA000
trusted library allocation
page read and write
1DD573AA000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD5D97A000
trusted library allocation
page read and write
1DD5DC87000
trusted library allocation
page read and write
1DD609E8000
trusted library allocation
page read and write
D7F000
heap
page read and write
236B2C41000
heap
page read and write
1DD5586A000
trusted library allocation
page read and write
1DD574B9000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD58D7F000
trusted library allocation
page read and write
2CC000
unkown
page write copy
1DD5DE63000
trusted library allocation
page read and write
1DD52AF2000
trusted library allocation
page read and write
1DD56A92000
trusted library allocation
page read and write
1DD529CE000
trusted library allocation
page read and write
1DD527FB000
trusted library allocation
page read and write
1DD57DC3000
trusted library allocation
page read and write
1DD574B9000
trusted library allocation
page read and write
1DD4C78F000
heap
page read and write
1DD54125000
trusted library allocation
page read and write
D9D000
heap
page read and write
1DD52AC7000
trusted library allocation
page read and write
1DD5F73E000
trusted library allocation
page read and write
1DD5603D000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD56E43000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD53933000
trusted library allocation
page read and write
1DD5DA4E000
trusted library allocation
page read and write
1DD5DC9A000
trusted library allocation
page read and write
1DD57872000
trusted library allocation
page read and write
1DD5DF20000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
1DBB3A01000
heap
page read and write
1DD4C771000
heap
page read and write
33D000
stack
page read and write
1DD4C75F000
heap
page read and write
1DD570DB000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
DCF000
heap
page read and write
1DD5DEE4000
trusted library allocation
page read and write
1DD56172000
trusted library allocation
page read and write
236B30A5000
heap
page read and write
1DD4C769000
heap
page read and write
1DD57220000
trusted library allocation
page read and write
1DD57872000
trusted library allocation
page read and write
1DD4C786000
heap
page read and write
1DD5F7B3000
trusted library allocation
page read and write
1DD59370000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD57442000
trusted library allocation
page read and write
1DD563FC000
trusted library allocation
page read and write
D46000
heap
page read and write
1DD60FAA000
heap
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD529C6000
trusted library allocation
page read and write
1DD530B3000
heap
page read and write
1DD4C755000
heap
page read and write
1DD4C775000
heap
page read and write
1DD4C777000
heap
page read and write
1DD4C783000
heap
page read and write
1DD56E67000
trusted library allocation
page read and write
1DD55665000
trusted library allocation
page read and write
E17000
heap
page read and write
1DD572C4000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5D9F7000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD58E46000
trusted library allocation
page read and write
1DD5DBEC000
trusted library allocation
page read and write
6C761FE000
stack
page read and write
1DD56E4E000
trusted library allocation
page read and write
1DD591FE000
trusted library allocation
page read and write
1DBB3A60000
heap
page read and write
1DD572BD000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD5567F000
trusted library allocation
page read and write
1DD58D19000
trusted library allocation
page read and write
1DD559E6000
trusted library allocation
page read and write
1DD590EC000
trusted library allocation
page read and write
1DD5F70C000
trusted library allocation
page read and write
1DD53928000
trusted library allocation
page read and write
1DD5DB6C000
trusted library allocation
page read and write
D46000
heap
page read and write
1DD61014000
heap
page read and write
1DD5DF2C000
trusted library allocation
page read and write
1DD529C3000
trusted library allocation
page read and write
1E877D00000
heap
page read and write
1DD52990000
trusted library allocation
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD5739B000
trusted library allocation
page read and write
1DD5820A000
trusted library allocation
page read and write
1DD530B8000
heap
page read and write
1DD607AA000
trusted library allocation
page read and write
1DD60C60000
trusted library allocation
page read and write
1DD5F7D9000
trusted library allocation
page read and write
1DD5DBAF000
trusted library allocation
page read and write
1DD5916B000
trusted library allocation
page read and write
1DD57068000
trusted library allocation
page read and write
1DD4C7C1000
heap
page read and write
1DD57882000
trusted library allocation
page read and write
1DD581F0000
trusted library allocation
page read and write
1DD5D712000
trusted library allocation
page read and write
1DD559E0000
trusted library allocation
page read and write
1DD582D1000
trusted library allocation
page read and write
1DD559BA000
trusted library allocation
page read and write
1DD561C3000
trusted library allocation
page read and write
174E000
stack
page read and write
1DD560A1000
trusted library allocation
page read and write
1DD56A67000
trusted library allocation
page read and write
1DD5735C000
trusted library allocation
page read and write
1DD5936B000
trusted library allocation
page read and write
1DD580D5000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD58E74000
trusted library allocation
page read and write
1DD56E83000
trusted library allocation
page read and write
1DD55BBA000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD54143000
trusted library allocation
page read and write
1DD5757E000
trusted library allocation
page read and write
1DD56154000
trusted library allocation
page read and write
1DD59C24000
trusted library allocation
page read and write
1DD56362000
trusted library allocation
page read and write
1DD609CE000
trusted library allocation
page read and write
1DD57543000
trusted library allocation
page read and write
1DD577FB000
trusted library allocation
page read and write
1DD582F8000
trusted library allocation
page read and write
1DD563AF000
trusted library allocation
page read and write
1DD56DDF000
trusted library allocation
page read and write
1DD580FD000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD56A73000
trusted library allocation
page read and write
1DD5637B000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD4C788000
heap
page read and write
1DD591F6000
trusted library allocation
page read and write
1DD54189000
trusted library allocation
page read and write
1DD5DCFA000
trusted library allocation
page read and write
1DD591A5000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
DA9000
heap
page read and write
1DD57088000
trusted library allocation
page read and write
1DD58069000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
191E1C0C000
trusted library allocation
page read and write
1DD5D8B8000
trusted library allocation
page read and write
1DD55891000
trusted library allocation
page read and write
1DD5D9BA000
trusted library allocation
page read and write
BC5000
heap
page read and write
DBA000
heap
page read and write
1DD591E4000
trusted library allocation
page read and write
201000
unkown
page execute read
1DD5DE8B000
trusted library allocation
page read and write
1E877B67000
trusted library allocation
page read and write
1DD530AA000
heap
page read and write
1DD563D1000
trusted library allocation
page read and write
1DD5DF38000
trusted library allocation
page read and write
1DD57312000
trusted library allocation
page read and write
1DBB2C00000
heap
page readonly
1DD5779A000
trusted library allocation
page read and write
1DD58273000
trusted library allocation
page read and write
E83C83E000
unkown
page readonly
1DD5DA47000
trusted library allocation
page read and write
1DD5DEBA000
trusted library allocation
page read and write
1DD57484000
trusted library allocation
page read and write
1DD52AC1000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
9DCB6E000
unkown
page readonly
1DD52AFE000
trusted library allocation
page read and write
1DD56E83000
trusted library allocation
page read and write
1DD560E5000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD578B5000
trusted library allocation
page read and write
1DD539F5000
trusted library allocation
page read and write
1DD580BC000
trusted library allocation
page read and write
1DD5DF12000
trusted library allocation
page read and write
191E1A86000
trusted library allocation
page read and write
1DD59199000
trusted library allocation
page read and write
1DD57ED7000
trusted library allocation
page read and write
1DD56F8D000
trusted library allocation
page read and write
1DD5DFC1000
trusted library allocation
page read and write
1DD578DB000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD572BD000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD57079000
trusted library allocation
page read and write
1DD60C5A000
trusted library allocation
page read and write
1DD57741000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD575F3000
trusted library allocation
page read and write
1DD577CB000
trusted library allocation
page read and write
1DD56E59000
trusted library allocation
page read and write
1DD57244000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD530D1000
heap
page read and write
1DD57793000
trusted library allocation
page read and write
1DD53972000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD539EC000
trusted library allocation
page read and write
5A9D3E000
stack
page read and write
1DD5DEA0000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD577B2000
trusted library allocation
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD607E0000
trusted library allocation
page read and write
1DD58089000
trusted library allocation
page read and write
1DD574E0000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD4C7BC000
heap
page read and write
1DD5F383000
trusted library allocation
page read and write
1DD4C777000
heap
page read and write
1DD4C789000
heap
page read and write
1DD4C783000
heap
page read and write
1DD58158000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD572C8000
trusted library allocation
page read and write
1DD57244000
trusted library allocation
page read and write
1DD58DEF000
trusted library allocation
page read and write
1DD5DC7F000
trusted library allocation
page read and write
1DD560B7000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD58EB0000
trusted library allocation
page read and write
1DD56AC3000
trusted library allocation
page read and write
236B2BA0000
heap
page read and write
1DD559B8000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5567B000
trusted library allocation
page read and write
1DD511F9000
trusted library allocation
page read and write
E04000
heap
page read and write
9BE000
stack
page read and write
1DD5DE5F000
trusted library allocation
page read and write
1DD56161000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD559B4000
trusted library allocation
page read and write
1DD59044000
trusted library allocation
page read and write
191E1A13000
trusted library allocation
page read and write
1DD56E6E000
trusted library allocation
page read and write
191E1AF2000
trusted library allocation
page read and write
1DD56112000
trusted library allocation
page read and write
1DD57240000
trusted library allocation
page read and write
D16000
heap
page read and write
1DD5DE55000
trusted library allocation
page read and write
4E993FF000
stack
page read and write
1DD4C774000
heap
page read and write
1DD4C7C7000
heap
page read and write
1DD559A3000
trusted library allocation
page read and write
1DD53926000
trusted library allocation
page read and write
1DD5181E000
trusted library allocation
page read and write
1DD5DE8D000
trusted library allocation
page read and write
1DD60C9E000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD57264000
trusted library allocation
page read and write
1DD607AE000
trusted library allocation
page read and write
D80000
heap
page read and write
1DD60FAA000
heap
page read and write
1DD577A4000
trusted library allocation
page read and write
1DD574F3000
trusted library allocation
page read and write
1DD5F361000
trusted library allocation
page read and write
1DD57760000
trusted library allocation
page read and write
1DD5FE9B000
trusted library allocation
page read and write
1E8779E6000
heap
page read and write
1DD58059000
trusted library allocation
page read and write
1DD5D7C3000
trusted library allocation
page read and write
1DD58EB5000
trusted library allocation
page read and write
1DD591E4000
trusted library allocation
page read and write
1DD5D7EA000
trusted library allocation
page read and write
1DD5DB98000
trusted library allocation
page read and write
1DD5DEA0000
trusted library allocation
page read and write
CBB000
heap
page read and write
1DD57D95000
trusted library allocation
page read and write
1DD5587A000
trusted library allocation
page read and write
1DD5DBD6000
trusted library allocation
page read and write
9DEE7E000
unkown
page readonly
DA5000
heap
page read and write
1DD56ED2000
trusted library allocation
page read and write
1DD4C7CA000
heap
page read and write
1DD53090000
heap
page read and write
1DD5DE59000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD575F4000
trusted library allocation
page read and write
1DD52AF6000
trusted library allocation
page read and write
1DD561BE000
trusted library allocation
page read and write
1DBB3B45000
heap
page read and write
1DD57B2C000
trusted library allocation
page read and write
DBA000
heap
page read and write
1DBB3AA8000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD5F2BA000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD570A5000
trusted library allocation
page read and write
1DD58D10000
trusted library allocation
page read and write
1DD5820B000
trusted library allocation
page read and write
1DD541C7000
trusted library allocation
page read and write
1E877853000
heap
page read and write
1DD5DEBA000
trusted library allocation
page read and write
1DD57788000
trusted library allocation
page read and write
1DD530CA000
heap
page read and write
1DD574B9000
trusted library allocation
page read and write
1DBB2FBA000
trusted library allocation
page read and write
1DD58EF8000
trusted library allocation
page read and write
B92000
heap
page read and write
DE8000
heap
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD561F5000
trusted library allocation
page read and write
1DD5D9EC000
trusted library allocation
page read and write
1DD5DF05000
trusted library allocation
page read and write
1DD5F7CE000
trusted library allocation
page read and write
1DD57257000
trusted library allocation
page read and write
1DD5F700000
trusted library allocation
page read and write
1DD581EC000
trusted library allocation
page read and write
1DD58226000
trusted library allocation
page read and write
1DD5DF11000
trusted library allocation
page read and write
1DD5DFED000
trusted library allocation
page read and write
CEB000
heap
page read and write
1DD55B20000
trusted library allocation
page read and write
1DD577C0000
trusted library allocation
page read and write
1DD539DA000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD530AC000
heap
page read and write
1DD57EFB000
trusted library allocation
page read and write
E83B6B8000
stack
page read and write
1DD591AC000
trusted library allocation
page read and write
1DD56091000
trusted library allocation
page read and write
1DD58049000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD56E24000
trusted library allocation
page read and write
1DD58089000
trusted library allocation
page read and write
1DBB2CF0000
unkown
page execute read
1DD56E96000
trusted library allocation
page read and write
1DD581B6000
trusted library allocation
page read and write
1DD5D7E0000
trusted library allocation
page read and write
1DD58EA5000
trusted library allocation
page read and write
1DD559B8000
trusted library allocation
page read and write
1DD577F9000
trusted library allocation
page read and write
1DD5DB90000
trusted library allocation
page read and write
1DD57D8E000
trusted library allocation
page read and write
DB9000
heap
page read and write
1DD55674000
trusted library allocation
page read and write
1DD52A9A000
trusted library allocation
page read and write
1DD5F361000
trusted library allocation
page read and write
1DD56E60000
trusted library allocation
page read and write
1DD57079000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD57240000
trusted library allocation
page read and write
1DD5DB8B000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD4C770000
heap
page read and write
1DD5DE5F000
trusted library allocation
page read and write
1DD591CD000
trusted library allocation
page read and write
1DD55639000
trusted library allocation
page read and write
1DD5DB43000
trusted library allocation
page read and write
1DD57638000
trusted library allocation
page read and write
1DD52AF6000
trusted library allocation
page read and write
1DD56E47000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD58DD1000
trusted library allocation
page read and write
1DD5774D000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD530A1000
heap
page read and write
1DD5DE33000
trusted library allocation
page read and write
1DD5DBE1000
trusted library allocation
page read and write
1DD5808D000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD4C75F000
heap
page read and write
1DD580FD000
trusted library allocation
page read and write
1DD56E31000
trusted library allocation
page read and write
1DD5FFBE000
trusted library allocation
page read and write
1DD57795000
trusted library allocation
page read and write
1E877A00000
trusted library allocation
page read and write
1DD4C7BC000
heap
page read and write
1DD5DC73000
trusted library allocation
page read and write
1DD5F715000
trusted library allocation
page read and write
1DD563A1000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DD5567B000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
C6C000
heap
page read and write
1DD530B3000
heap
page read and write
1DD57D95000
trusted library allocation
page read and write
1DD54164000
trusted library allocation
page read and write
1DD57869000
trusted library allocation
page read and write
1DD53933000
trusted library allocation
page read and write
1DD58256000
trusted library allocation
page read and write
1DD5FE93000
trusted library allocation
page read and write
1DD5DB9A000
trusted library allocation
page read and write
1DD56FD6000
trusted library allocation
page read and write
1DD5DBCF000
trusted library allocation
page read and write
1DD574F0000
trusted library allocation
page read and write
1DD58CC9000
trusted library allocation
page read and write
1E877B5B000
trusted library allocation
page read and write
1DD60956000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD57D70000
trusted library allocation
page read and write
1DD5816D000
trusted library allocation
page read and write
1DD580D5000
trusted library allocation
page read and write
1DD593F3000
trusted library allocation
page read and write
1DD563C6000
trusted library allocation
page read and write
1DD5D828000
trusted library allocation
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD581EC000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD60FAA000
heap
page read and write
1DD61022000
heap
page read and write
1DD582F8000
trusted library allocation
page read and write
1DD5DE8F000
trusted library allocation
page read and write
1DD58E28000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD4C770000
heap
page read and write
4E973FB000
stack
page read and write
1DD4C75C000
heap
page read and write
1DD4C766000
heap
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD572D4000
trusted library allocation
page read and write
1DD518F2000
trusted library allocation
page read and write
1DD5936B000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD529D7000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD5DCAF000
trusted library allocation
page read and write
C77000
heap
page read and write
1DD4C74F000
heap
page read and write
1DD5FF55000
trusted library allocation
page read and write
1DD5D876000
trusted library allocation
page read and write
1DD57869000
trusted library allocation
page read and write
1DD53963000
trusted library allocation
page read and write
1DBB3AE0000
heap
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD4C769000
heap
page read and write
1DD5DB3D000
trusted library allocation
page read and write
1DD575DB000
trusted library allocation
page read and write
1DD559D2000
trusted library allocation
page read and write
1DD5D917000
trusted library allocation
page read and write
1DD57EDA000
trusted library allocation
page read and write
1DD563B3000
trusted library allocation
page read and write
1DD57D25000
trusted library allocation
page read and write
1E877C03000
trusted library allocation
page read and write
1DD5DB40000
trusted library allocation
page read and write
1DD5D779000
trusted library allocation
page read and write
1DD57D65000
trusted library allocation
page read and write
1DD591AE000
trusted library allocation
page read and write
1DD57D42000
trusted library allocation
page read and write
191E1A49000
trusted library allocation
page read and write
1DD52B22000
trusted library allocation
page read and write
1DBB2F17000
trusted library allocation
page read and write
1DD577D3000
trusted library allocation
page read and write
1DD4C772000
heap
page read and write
1DD575C7000
trusted library allocation
page read and write
1DD55953000
trusted library allocation
page read and write
1DD580B1000
trusted library allocation
page read and write
1DD5DB6C000
trusted library allocation
page read and write
1DD609E8000
trusted library allocation
page read and write
1DD56A92000
trusted library allocation
page read and write
1DD577FC000
trusted library allocation
page read and write
1DD59AD4000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD570AB000
trusted library allocation
page read and write
1E877C11000
trusted library allocation
page read and write
1DD56170000
trusted library allocation
page read and write
1DD4C756000
heap
page read and write
3B7000
heap
page read and write
1DD5DCAD000
trusted library allocation
page read and write
1DD5DCAF000
trusted library allocation
page read and write
1DD574FB000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD57553000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD5DBE4000
trusted library allocation
page read and write
191E1A24000
trusted library allocation
page read and write
1E877700000
unclassified section
page readonly
DBF000
heap
page read and write
1DD530B2000
heap
page read and write
1DD530A8000
heap
page read and write
1DD561D2000
trusted library allocation
page read and write
1DD559B4000
trusted library allocation
page read and write
1DD575A8000
trusted library allocation
page read and write
1DD559E4000
trusted library allocation
page read and write
1DD56A0D000
trusted library allocation
page read and write
191E1800000
heap
page read and write
1DD60768000
trusted library allocation
page read and write
1DD5785A000
trusted library allocation
page read and write
1DD52A56000
trusted library allocation
page read and write
1DD56E67000
trusted library allocation
page read and write
4E98BFF000
stack
page read and write
1DD518BB000
trusted library allocation
page read and write
1DD58E3F000
trusted library allocation
page read and write
BCF000
heap
page read and write
1DD608D6000
trusted library allocation
page read and write
1DD5417C000
trusted library allocation
page read and write
1DD5D747000
trusted library allocation
page read and write
1DD5DFEF000
trusted library allocation
page read and write
1DD5DFFA000
trusted library allocation
page read and write
1DD570A5000
trusted library allocation
page read and write
1DD56E47000
trusted library allocation
page read and write
1DD572C5000
trusted library allocation
page read and write
1DD5755E000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
6C759FC000
stack
page read and write
1DD4C76B000
heap
page read and write
1DD56EFA000
trusted library allocation
page read and write
1DD574BD000
trusted library allocation
page read and write
1DD556D9000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD5815E000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD60FAA000
heap
page read and write
1DD559DC000
trusted library allocation
page read and write
1DD472E7000
heap
page read and write
1DD52A8C000
trusted library allocation
page read and write
1DD60967000
trusted library allocation
page read and write
1DD5DE9E000
trusted library allocation
page read and write
1AE8D570000
heap
page read and write
1DD57558000
trusted library allocation
page read and write
1DD56161000
trusted library allocation
page read and write
1DD5275C000
trusted library allocation
page read and write
1DD56EC3000
trusted library allocation
page read and write
1DD58181000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD55BE2000
trusted library allocation
page read and write
1DD580FD000
trusted library allocation
page read and write
1DD5DCF8000
trusted library allocation
page read and write
1DD5DF0F000
trusted library allocation
page read and write
1DD51776000
trusted library allocation
page read and write
1DD593B1000
trusted library allocation
page read and write
1DD57D8E000
trusted library allocation
page read and write
1DD578B2000
trusted library allocation
page read and write
1DD5FED8000
trusted library allocation
page read and write
1DD4C771000
heap
page read and write
1DBB3A5F000
heap
page read and write
1DD57599000
trusted library allocation
page read and write
BE5000
heap
page read and write
33A0000
heap
page read and write
1DD59331000
trusted library allocation
page read and write
1DD5915E000
trusted library allocation
page read and write
1DD4C768000
heap
page read and write
1DBB2EE0000
heap
page read and write
5A61DD000
stack
page read and write
D9D000
heap
page read and write
1DBB3A60000
heap
page read and write
1DD56106000
trusted library allocation
page read and write
1DD530A2000
heap
page read and write
1DD5735C000
trusted library allocation
page read and write
DF1000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD5568D000
trusted library allocation
page read and write
1DD5DC8B000
trusted library allocation
page read and write
1DD57EB7000
trusted library allocation
page read and write
DB5000
heap
page read and write
1DD472E7000
heap
page read and write
1DBB2F6F000
trusted library allocation
page read and write
191E1683000
heap
page read and write
1DD5775E000
trusted library allocation
page read and write
1DD5DECC000
trusted library allocation
page read and write
1DD59B18000
trusted library allocation
page read and write
1DD57836000
trusted library allocation
page read and write
1DD57762000
trusted library allocation
page read and write
1DD5F3B1000
trusted library allocation
page read and write
1DD5DCCB000
trusted library allocation
page read and write
1DD54143000
trusted library allocation
page read and write
C8D000
heap
page read and write
1DD55B05000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1E877BC9000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
DC9000
heap
page read and write
1DBB3B59000
heap
page read and write
1DD5702B000
trusted library allocation
page read and write
191E15E0000
unclassified section
page readonly
1DD51866000
trusted library allocation
page read and write
1DD58256000
trusted library allocation
page read and write
5A619E000
unkown
page readonly
1DD563B0000
trusted library allocation
page read and write
1DD5F361000
trusted library allocation
page read and write
1DD5815E000
trusted library allocation
page read and write
1DD57235000
trusted library allocation
page read and write
1DD5726B000
trusted library allocation
page read and write
1DD56E2A000
trusted library allocation
page read and write
1DD5DC81000
trusted library allocation
page read and write
1DD52AFE000
trusted library allocation
page read and write
1DD582EB000
trusted library allocation
page read and write
1DD5779C000
trusted library allocation
page read and write
1DD5DF09000
trusted library allocation
page read and write
1DD56EF8000
trusted library allocation
page read and write
1DD57F00000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
DB5000
heap
page read and write
1DD559E0000
trusted library allocation
page read and write
1DD5FED8000
trusted library allocation
page read and write
1DBB3AFC000
heap
page read and write
1DD563BF000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD578B2000
trusted library allocation
page read and write
1DD570F2000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD559F2000
trusted library allocation
page read and write
1DD572C4000
trusted library allocation
page read and write
1DD5DC8B000
trusted library allocation
page read and write
DFC000
heap
page read and write
1DD5DFEF000
trusted library allocation
page read and write
1DD57B9B000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD5DC6A000
trusted library allocation
page read and write
1DD5779A000
trusted library allocation
page read and write
1DD577B0000
trusted library allocation
page read and write
1DD56A16000
trusted library allocation
page read and write
1DD559B9000
trusted library allocation
page read and write
1DD6098A000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD60CF0000
trusted library allocation
page read and write
1DD57785000
trusted library allocation
page read and write
1DD541CB000
trusted library allocation
page read and write
1DD56E6C000
trusted library allocation
page read and write
1DD574FB000
trusted library allocation
page read and write
1E877BA1000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD578D7000
trusted library allocation
page read and write
C06000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD582E0000
trusted library allocation
page read and write
1DD60F50000
heap
page read and write
1DD5DEB0000
trusted library allocation
page read and write
CE1000
heap
page read and write
DBF000
heap
page read and write
1DD5D8FB000
trusted library allocation
page read and write
1DD60980000
trusted library allocation
page read and write
1DD561BE000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
9FE000
stack
page read and write
1DD4C773000
heap
page read and write
1DD57271000
trusted library allocation
page read and write
1DD60CF8000
trusted library allocation
page read and write
1DD5F35C000
trusted library allocation
page read and write
1DD58089000
trusted library allocation
page read and write
1DD5727B000
trusted library allocation
page read and write
1DD57343000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD5778B000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
DAB000
heap
page read and write
1DD56E71000
trusted library allocation
page read and write
1DD5DC89000
trusted library allocation
page read and write
1DD60CF8000
trusted library allocation
page read and write
1DD5FFD8000
trusted library allocation
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD58EB5000
trusted library allocation
page read and write
C10000
heap
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD5783E000
trusted library allocation
page read and write
1DD5F7BC000
trusted library allocation
page read and write
1DD57068000
trusted library allocation
page read and write
1DD51813000
trusted library allocation
page read and write
1DD5617E000
trusted library allocation
page read and write
191E15A0000
heap
page readonly
1E877BB7000
trusted library allocation
page read and write
1DD60967000
trusted library allocation
page read and write
1DBB2A00000
unclassified section
page readonly
1DD581F0000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD56E63000
trusted library allocation
page read and write
1DD57022000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD57634000
trusted library allocation
page read and write
1DD5D8B0000
trusted library allocation
page read and write
1DD60E95000
heap
page read and write
1DD56109000
trusted library allocation
page read and write
1DD5DB92000
trusted library allocation
page read and write
1DD5DCCB000
trusted library allocation
page read and write
1DD5759E000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD577B2000
trusted library allocation
page read and write
1DBB2ED0000
trusted library allocation
page read and write
1DD55B57000
trusted library allocation
page read and write
1DD5807B000
trusted library allocation
page read and write
1DD57836000
trusted library allocation
page read and write
1DD56A92000
trusted library allocation
page read and write
1DD582A5000
trusted library allocation
page read and write
DDD000
heap
page read and write
1DD57875000
trusted library allocation
page read and write
1DD4C772000
heap
page read and write
1DD4C7B8000
heap
page read and write
1DD5DB42000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DBB2F76000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD5814E000
trusted library allocation
page read and write
1DD56151000
trusted library allocation
page read and write
1DD559E6000
trusted library allocation
page read and write
1DD575A2000
trusted library allocation
page read and write
1DD5DE68000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD57D3F000
trusted library allocation
page read and write
DFC000
heap
page read and write
1DD4C7B8000
heap
page read and write
1DD5414B000
trusted library allocation
page read and write
1DD572C4000
trusted library allocation
page read and write
E83C7FE000
stack
page read and write
1DD472FE000
heap
page read and write
1DD563C3000
trusted library allocation
page read and write
1DD5733F000
trusted library allocation
page read and write
1DD607A8000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD4C76B000
heap
page read and write
C97000
heap
page read and write
1DD5F770000
trusted library allocation
page read and write
1DD541A0000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD4C788000
heap
page read and write
1DD5DBB5000
trusted library allocation
page read and write
1DD5D833000
trusted library allocation
page read and write
5A84BE000
unkown
page readonly
1DD56066000
trusted library allocation
page read and write
1DD55883000
trusted library allocation
page read and write
E83D83E000
unkown
page readonly
1DD5DE62000
trusted library allocation
page read and write
1DD591E4000
trusted library allocation
page read and write
1DD56106000
trusted library allocation
page read and write
1DD53922000
trusted library allocation
page read and write
DA9000
heap
page read and write
1DD58D28000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5DC7F000
trusted library allocation
page read and write
1AE8D6A0000
heap
page read and write
1DD5744B000
trusted library allocation
page read and write
1DD581AE000
trusted library allocation
page read and write
1DD56A1D000
trusted library allocation
page read and write
1DD5569D000
trusted library allocation
page read and write
1DD5FFDE000
trusted library allocation
page read and write
1DD57785000
trusted library allocation
page read and write
1DD55659000
trusted library allocation
page read and write
1DD5DB27000
trusted library allocation
page read and write
1DD57695000
trusted library allocation
page read and write
1DD60E91000
heap
page read and write
1DD5DCB3000
trusted library allocation
page read and write
1DD58191000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
E83E03E000
stack
page read and write
1DD559AE000
trusted library allocation
page read and write
1DD608D9000
trusted library allocation
page read and write
E8393ED000
stack
page read and write
1DD56E51000
trusted library allocation
page read and write
1DD570A0000
trusted library allocation
page read and write
1DD57553000
trusted library allocation
page read and write
1DD57384000
trusted library allocation
page read and write
1DD57558000
trusted library allocation
page read and write
1DD54139000
trusted library allocation
page read and write
1DD57235000
trusted library allocation
page read and write
1DD56A05000
trusted library allocation
page read and write
1DD572C4000
trusted library allocation
page read and write
1DD5308F000
heap
page read and write
1DD530CB000
heap
page read and write
1DD56115000
trusted library allocation
page read and write
B74000
heap
page read and write
1DD5DB92000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD5DC8B000
trusted library allocation
page read and write
1DD5597B000
trusted library allocation
page read and write
1DD574A8000
trusted library allocation
page read and write
1DD5DBE6000
trusted library allocation
page read and write
1DD5824A000
trusted library allocation
page read and write
1DD57271000
trusted library allocation
page read and write
DD7000
heap
page read and write
1DD58E41000
trusted library allocation
page read and write
1DD591A0000
trusted library allocation
page read and write
1DD55BFA000
trusted library allocation
page read and write
1DD575DB000
trusted library allocation
page read and write
1DD57DFC000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD529D2000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DBB2AA0000
heap
page read and write
1DD5DBD6000
trusted library allocation
page read and write
1DD58E4F000
trusted library allocation
page read and write
1DD5DB48000
trusted library allocation
page read and write
1DD4C756000
heap
page read and write
1DD53909000
trusted library allocation
page read and write
1DD57257000
trusted library allocation
page read and write
1DD591B9000
trusted library allocation
page read and write
DC3000
heap
page read and write
1DD529E5000
trusted library allocation
page read and write
1DD5DEA0000
trusted library allocation
page read and write
1DD607EB000
trusted library allocation
page read and write
1DD5789A000
trusted library allocation
page read and write
1DD5FE8C000
trusted library allocation
page read and write
DA7000
heap
page read and write
1DD55632000
trusted library allocation
page read and write
1DD59351000
trusted library allocation
page read and write
1DD5DFE6000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD58071000
trusted library allocation
page read and write
1DBB3AE0000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD578B5000
trusted library allocation
page read and write
1DD5D97A000
trusted library allocation
page read and write
1DD4C78C000
heap
page read and write
1DD575A8000
trusted library allocation
page read and write
1DD518F2000
trusted library allocation
page read and write
1DD56E83000
trusted library allocation
page read and write
CF3000
heap
page read and write
1DD57095000
trusted library allocation
page read and write
1DD5F7CE000
trusted library allocation
page read and write
DB9000
heap
page read and write
C24000
heap
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD580B5000
trusted library allocation
page read and write
1DD574B9000
trusted library allocation
page read and write
1DD574B3000
trusted library allocation
page read and write
29C000
unkown
page readonly
1DD58CCC000
trusted library allocation
page read and write
1DD560B0000
trusted library allocation
page read and write
1DD4C78B000
heap
page read and write
1DD57F84000
trusted library allocation
page read and write
236B2F07000
trusted library allocation
page read and write
1DD56E6E000
trusted library allocation
page read and write
1DBB2F5F000
trusted library allocation
page read and write
1DD53920000
trusted library allocation
page read and write
1DD5726B000
trusted library allocation
page read and write
1DD57318000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD570A7000
trusted library allocation
page read and write
1DD5F2BA000
trusted library allocation
page read and write
1DD59367000
trusted library allocation
page read and write
1DD581A6000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD4C76B000
heap
page read and write
1DD5743C000
trusted library allocation
page read and write
1DD60C67000
trusted library allocation
page read and write
1DD559FB000
trusted library allocation
page read and write
1DD5DBBB000
trusted library allocation
page read and write
D00000
heap
page read and write
1DBB3B45000
heap
page read and write
1DD5D956000
trusted library allocation
page read and write
1DD58265000
trusted library allocation
page read and write
1DD60FA9000
heap
page read and write
1DD4C7CA000
heap
page read and write
1E87777D000
remote allocation
page execute read
1DD5934D000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD575A8000
trusted library allocation
page read and write
1DD472EB000
heap
page read and write
1DD5FFB2000
trusted library allocation
page read and write
1DD563C3000
trusted library allocation
page read and write
1DD5818D000
trusted library allocation
page read and write
1DD4C7C4000
heap
page read and write
1DD60992000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5727F000
trusted library allocation
page read and write
1DD60EE0000
heap
page read and write
1DD56A12000
trusted library allocation
page read and write
1DBB2CFE000
unkown
page execute read
1DD58EFD000
trusted library allocation
page read and write
191E1A82000
trusted library allocation
page read and write
1DD5761B000
trusted library allocation
page read and write
1DD56A78000
trusted library allocation
page read and write
DAF000
heap
page read and write
DB5000
heap
page read and write
1DD4C74F000
heap
page read and write
1DD57980000
trusted library allocation
page read and write
1DD56E2D000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD5754C000
trusted library allocation
page read and write
DAF000
heap
page read and write
BD3000
heap
page read and write
CA0000
heap
page read and write
1DD4C788000
heap
page read and write
1DD57460000
trusted library allocation
page read and write
1DD56E6E000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD5704B000
trusted library allocation
page read and write
C4C000
heap
page read and write
1DD57D62000
trusted library allocation
page read and write
1E877B98000
trusted library allocation
page read and write
1DD5777B000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD56172000
trusted library allocation
page read and write
1DBB3AE6000
heap
page read and write
1DD5911E000
trusted library allocation
page read and write
1DD559B8000
trusted library allocation
page read and write
1DD5DBD6000
trusted library allocation
page read and write
1DD580BC000
trusted library allocation
page read and write
1DD53920000
trusted library allocation
page read and write
1DD5F3CA000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD574E4000
trusted library allocation
page read and write
1DD56F84000
trusted library allocation
page read and write
1DD57793000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
1DD530AF000
heap
page read and write
1DD591A8000
trusted library allocation
page read and write
1DD53092000
heap
page read and write
1DD57459000
trusted library allocation
page read and write
1DD57D1B000
trusted library allocation
page read and write
1DD5805B000
trusted library allocation
page read and write
1DD4C7BC000
heap
page read and write
1DD5DE46000
trusted library allocation
page read and write
D89000
heap
page read and write
1DD5DB39000
trusted library allocation
page read and write
1DD57D25000
trusted library allocation
page read and write
1DD574E4000
trusted library allocation
page read and write
1DD576FD000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD55B37000
trusted library allocation
page read and write
DDF000
heap
page read and write
1DD5D7DD000
trusted library allocation
page read and write
1DD577E4000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD5D8B8000
trusted library allocation
page read and write
16083521E000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD5723B000
trusted library allocation
page read and write
1DD57459000
trusted library allocation
page read and write
1DD560A1000
trusted library allocation
page read and write
1DD4C75E000
heap
page read and write
CAE000
heap
page read and write
1DD574BD000
trusted library allocation
page read and write
1DD5DCA2000
trusted library allocation
page read and write
1E877B47000
trusted library allocation
page read and write
1DD57596000
trusted library allocation
page read and write
1DBB3B45000
heap
page read and write
1DD5D76D000
trusted library allocation
page read and write
1DD60992000
trusted library allocation
page read and write
DEC000
heap
page read and write
1DD4C788000
heap
page read and write
1DD5411D000
trusted library allocation
page read and write
1DD57E7A000
trusted library allocation
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD529A5000
trusted library allocation
page read and write
1DD57DC3000
trusted library allocation
page read and write
1DD4C75E000
heap
page read and write
1DD582E7000
trusted library allocation
page read and write
1DD5F744000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD52A47000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD539D4000
trusted library allocation
page read and write
BAA000
heap
page read and write
1DD51882000
trusted library allocation
page read and write
1DD5778A000
trusted library allocation
page read and write
1DD4C767000
heap
page read and write
1DD57658000
trusted library allocation
page read and write
1DD5908B000
trusted library allocation
page read and write
1DBB3B18000
heap
page read and write
DDF000
heap
page read and write
1DD5744D000
trusted library allocation
page read and write
1DD580B5000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DBB2BB0000
heap
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD574F1000
trusted library allocation
page read and write
1DD559C0000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD54184000
trusted library allocation
page read and write
1DD56EAE000
trusted library allocation
page read and write
1DD574FE000
trusted library allocation
page read and write
1DD591B9000
trusted library allocation
page read and write
1DD609E8000
trusted library allocation
page read and write
1DD559C0000
trusted library allocation
page read and write
1DD5DE55000
trusted library allocation
page read and write
236B2C4C000
heap
page read and write
1DD5778A000
trusted library allocation
page read and write
1DD57D3F000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD559D0000
trusted library allocation
page read and write
1DD5D9F2000
trusted library allocation
page read and write
1DD57B33000
trusted library allocation
page read and write
1DD53926000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD5F7D9000
trusted library allocation
page read and write
1DD57781000
trusted library allocation
page read and write
C18000
heap
page read and write
1DD4C770000
heap
page read and write
1DD52A95000
trusted library allocation
page read and write
1DD5F7ED000
trusted library allocation
page read and write
1DBB3AFC000
heap
page read and write
1DBB3900000
trusted library allocation
page read and write
BDC000
heap
page read and write
1DD57785000
trusted library allocation
page read and write
1DD58DED000
trusted library allocation
page read and write
1DD559E6000
trusted library allocation
page read and write
1DD53091000
heap
page read and write
1DD55687000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD4C75C000
heap
page read and write
191E15B0000
unclassified section
page read and write
1DD575CB000
trusted library allocation
page read and write
1DD56A73000
trusted library allocation
page read and write
1DD58069000
trusted library allocation
page read and write
1DD55B94000
trusted library allocation
page read and write
1DD5DCBD000
trusted library allocation
page read and write
1DD5DCA2000
trusted library allocation
page read and write
1DD58D36000
trusted library allocation
page read and write
1DD580D5000
trusted library allocation
page read and write
1DD607DC000
trusted library allocation
page read and write
1DD5DECC000
trusted library allocation
page read and write
1DD5DBF6000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5722C000
trusted library allocation
page read and write
1DD5634A000
trusted library allocation
page read and write
1DD5773B000
trusted library allocation
page read and write
1DD5815E000
trusted library allocation
page read and write
1DD559E4000
trusted library allocation
page read and write
191E19D0000
heap
page read and write
1DD4C7C1000
heap
page read and write
1DD582F8000
trusted library allocation
page read and write
1DD539C5000
trusted library allocation
page read and write
1DD4C78F000
heap
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DD5DAFA000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD4C765000
heap
page read and write
1DD4C782000
heap
page read and write
1DD56374000
trusted library allocation
page read and write
1DD5724B000
trusted library allocation
page read and write
1DD61021000
heap
page read and write
1DD570A7000
trusted library allocation
page read and write
1DD56362000
trusted library allocation
page read and write
1DD6098A000
trusted library allocation
page read and write
1DBB2A75000
remote allocation
page execute read
1DD4C75C000
heap
page read and write
1DD58152000
trusted library allocation
page read and write
1E877B00000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD57076000
trusted library allocation
page read and write
1DD517FB000
trusted library allocation
page read and write
1DD472F4000
heap
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD52978000
trusted library allocation
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD59AFC000
trusted library allocation
page read and write
1DD52ADE000
trusted library allocation
page read and write
1DD55BAE000
trusted library allocation
page read and write
1DD5F7CE000
trusted library allocation
page read and write
1DD5DFD0000
trusted library allocation
page read and write
DE6000
heap
page read and write
DD2000
heap
page read and write
1DD57566000
trusted library allocation
page read and write
1DD5DBBE000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD61022000
heap
page read and write
1DD5597B000
trusted library allocation
page read and write
1DD5F7A9000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD60C87000
trusted library allocation
page read and write
1DD511DF000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD561C2000
trusted library allocation
page read and write
1DD559B0000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DBB3AF1000
heap
page read and write
1DD5566D000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD57897000
trusted library allocation
page read and write
1DBB2EF5000
unkown
page execute read
1DBB3AA1000
heap
page read and write
1DD5597C000
trusted library allocation
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD577DD000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD57D62000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD4C77E000
heap
page read and write
134E000
stack
page read and write
191E1A30000
trusted library allocation
page read and write
1DD58EB0000
trusted library allocation
page read and write
1DD5DB8E000
trusted library allocation
page read and write
1DD58E9D000
trusted library allocation
page read and write
1DD61583000
trusted library allocation
page read and write
1DD57271000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD570AA000
trusted library allocation
page read and write
1DD58EB5000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD527E7000
trusted library allocation
page read and write
DA4000
heap
page read and write
1DD55BBF000
trusted library allocation
page read and write
1DD575A6000
trusted library allocation
page read and write
1DD56083000
trusted library allocation
page read and write
191E1B03000
trusted library allocation
page read and write
B73000
heap
page read and write
1DD56F9F000
trusted library allocation
page read and write
1DD5D7AE000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD57387000
trusted library allocation
page read and write
1DD5DC89000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD5706B000
trusted library allocation
page read and write
1DD57CB3000
trusted library allocation
page read and write
1DD5273A000
trusted library allocation
page read and write
1DD570E8000
trusted library allocation
page read and write
1DD559B8000
trusted library allocation
page read and write
1DD5DF2E000
trusted library allocation
page read and write
1DD574F8000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
DAF000
heap
page read and write
1DD56E2A000
trusted library allocation
page read and write
DDF000
heap
page read and write
1DD4C76B000
heap
page read and write
1DD472DD000
heap
page read and write
1DD580D3000
trusted library allocation
page read and write
CA0000
heap
page read and write
1DD559F2000
trusted library allocation
page read and write
1DD55670000
trusted library allocation
page read and write
B83000
heap
page read and write
1DD59B89000
trusted library allocation
page read and write
1DD574E7000
trusted library allocation
page read and write
1E877BA8000
trusted library allocation
page read and write
DAB000
heap
page read and write
1DD577D0000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD4C75B000
heap
page read and write
1DD539DD000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DBB3B3C000
heap
page read and write
1DD574F0000
trusted library allocation
page read and write
1DD57853000
trusted library allocation
page read and write
1DD57F84000
trusted library allocation
page read and write
1DD5DE7C000
trusted library allocation
page read and write
1DD560A1000
trusted library allocation
page read and write
1DD539C2000
trusted library allocation
page read and write
1DD5DB5E000
trusted library allocation
page read and write
1DD577B2000
trusted library allocation
page read and write
1DD577A0000
trusted library allocation
page read and write
1DD541FB000
trusted library allocation
page read and write
1DD59199000
trusted library allocation
page read and write
1DD5DC8F000
trusted library allocation
page read and write
1DD577E1000
trusted library allocation
page read and write
1DD55B8A000
trusted library allocation
page read and write
DE5000
heap
page read and write
1DBB3A09000
heap
page read and write
1DD607FE000
trusted library allocation
page read and write
1DD4C7B6000
heap
page read and write
1DD4C7B0000
heap
page read and write
1DD55670000
trusted library allocation
page read and write
1DD607B2000
trusted library allocation
page read and write
1DD53961000
trusted library allocation
page read and write
1F0000
heap
page read and write
1DD5D9F7000
trusted library allocation
page read and write
1DD5736D000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
DAF000
heap
page read and write
1DD58171000
trusted library allocation
page read and write
1DD56151000
trusted library allocation
page read and write
1DD591D2000
trusted library allocation
page read and write
1DD5FED9000
trusted library allocation
page read and write
1DD559DC000
trusted library allocation
page read and write
1DD608D9000
trusted library allocation
page read and write
1DD5DB53000
trusted library allocation
page read and write
1DBB390C000
trusted library allocation
page read and write
1DD57244000
trusted library allocation
page read and write
1DD54160000
trusted library allocation
page read and write
1DD57EA6000
trusted library allocation
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
1DD591AA000
trusted library allocation
page read and write
1DD582D1000
trusted library allocation
page read and write
1DD56A9E000
trusted library allocation
page read and write
1DD577FC000
trusted library allocation
page read and write
1DD5D8AD000
trusted library allocation
page read and write
1DD529C3000
trusted library allocation
page read and write
191E1A5D000
trusted library allocation
page read and write
1DD56E6C000
trusted library allocation
page read and write
1DD561F5000
trusted library allocation
page read and write
DE1000
heap
page read and write
1DD55BE9000
trusted library allocation
page read and write
1DD5744B000
trusted library allocation
page read and write
1DD57788000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD57459000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
E0B000
heap
page read and write
1DD5601E000
trusted library allocation
page read and write
1DD5607C000
trusted library allocation
page read and write
1DD54139000
trusted library allocation
page read and write
1DD5D749000
trusted library allocation
page read and write
1DD608D6000
trusted library allocation
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD56AE6000
trusted library allocation
page read and write
1DBB3AE8000
heap
page read and write
1DD52AAA000
trusted library allocation
page read and write
C6C000
heap
page read and write
1DD573C3000
trusted library allocation
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD52AC7000
trusted library allocation
page read and write
1DBB3AE6000
heap
page read and write
1DD5778E000
trusted library allocation
page read and write
1DD572BD000
trusted library allocation
page read and write
1DD60802000
trusted library allocation
page read and write
1DD5720A000
trusted library allocation
page read and write
1DD5614D000
trusted library allocation
page read and write
DBF000
heap
page read and write
1DD5FEEE000
trusted library allocation
page read and write
1DD4C7B8000
heap
page read and write
1DD560AB000
trusted library allocation
page read and write
1DD5FEBC000
trusted library allocation
page read and write
1DD53956000
trusted library allocation
page read and write
1DD56DE4000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD5778D000
trusted library allocation
page read and write
236B2BE0000
heap
page read and write
1DD54125000
trusted library allocation
page read and write
191E1A66000
trusted library allocation
page read and write
1DD5DBDC000
trusted library allocation
page read and write
1DD578A9000
trusted library allocation
page read and write
1DD5779F000
trusted library allocation
page read and write
1DD58C69000
trusted library allocation
page read and write
1DD578F4000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD56A8B000
trusted library allocation
page read and write
1DBB3A00000
heap
page read and write
1DD59AB1000
trusted library allocation
page read and write
1DD5F424000
trusted library allocation
page read and write
1DD559C0000
trusted library allocation
page read and write
DBF000
heap
page read and write
DEF000
heap
page read and write
1DD4C7B3000
heap
page read and write
1DD5DC73000
trusted library allocation
page read and write
1DD5FEF4000
trusted library allocation
page read and write
1DD577E9000
trusted library allocation
page read and write
1DD577DA000
trusted library allocation
page read and write
1DD573E2000
trusted library allocation
page read and write
1DD58E70000
trusted library allocation
page read and write
1DD539FE000
trusted library allocation
page read and write
1DD4C753000
heap
page read and write
1DD5D832000
trusted library allocation
page read and write
DC3000
heap
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD59AD9000
trusted library allocation
page read and write
1DD581D1000
trusted library allocation
page read and write
D6C000
heap
page read and write
1DD57065000
trusted library allocation
page read and write
1DD570E2000
trusted library allocation
page read and write
DB5000
heap
page read and write
1DD559E4000
trusted library allocation
page read and write
1DD57D8E000
trusted library allocation
page read and write
191E13E0000
unclassified section
page readonly
1DD4C772000
heap
page read and write
1DD57257000
trusted library allocation
page read and write
1DD5D9DC000
trusted library allocation
page read and write
1DD60C5D000
trusted library allocation
page read and write
1DD575E2000
trusted library allocation
page read and write
1DD5D71B000
trusted library allocation
page read and write
1DBB3A64000
heap
page read and write
1DD5418E000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD59B61000
trusted library allocation
page read and write
1DD4C777000
heap
page read and write
1DD57375000
trusted library allocation
page read and write
1DD5D83C000
trusted library allocation
page read and write
1DD57596000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD57B1C000
trusted library allocation
page read and write
1DD5D9FE000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DD60FAA000
heap
page read and write
BC5000
heap
page read and write
1DD5DCA2000
trusted library allocation
page read and write
1DD57E94000
trusted library allocation
page read and write
1DD591A5000
trusted library allocation
page read and write
1DD54183000
trusted library allocation
page read and write
1DD55BDA000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD54113000
trusted library allocation
page read and write
1DD5DBD9000
trusted library allocation
page read and write
1DD5FE77000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
191E1C00000
trusted library allocation
page read and write
1DD57202000
trusted library allocation
page read and write
1DD57900000
trusted library allocation
page read and write
1885000
heap
page read and write
1DD572D2000
trusted library allocation
page read and write
DD7000
heap
page read and write
D0F000
heap
page read and write
1DD5DBED000
trusted library allocation
page read and write
1DD57044000
trusted library allocation
page read and write
1DD5597B000
trusted library allocation
page read and write
D05000
heap
page read and write
1DD5D8E6000
trusted library allocation
page read and write
1DD591AC000
trusted library allocation
page read and write
1DD55609000
trusted library allocation
page read and write
1DD57F2F000
trusted library allocation
page read and write
1DD5DB4F000
trusted library allocation
page read and write
1DD5DB9A000
trusted library allocation
page read and write
1DBB2F86000
trusted library allocation
page read and write
1DD59BB1000
trusted library allocation
page read and write
1DD59AB6000
trusted library allocation
page read and write
1DD58E4F000
trusted library allocation
page read and write
1DD582D1000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD57D1B000
trusted library allocation
page read and write
1DD527FB000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD575A3000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD4C755000
heap
page read and write
1DD5634E000
trusted library allocation
page read and write
1DD591B0000
trusted library allocation
page read and write
DC9000
heap
page read and write
1DD5567F000
trusted library allocation
page read and write
1DD5724B000
trusted library allocation
page read and write
1DD60959000
trusted library allocation
page read and write
1DD572BF000
trusted library allocation
page read and write
1DD56E51000
trusted library allocation
page read and write
9CF000
stack
page read and write
1DD4C76B000
heap
page read and write
1DD5569D000
trusted library allocation
page read and write
1DD5DF1D000
trusted library allocation
page read and write
1DD5805B000
trusted library allocation
page read and write
1DD4C759000
heap
page read and write
1DD5D8E7000
trusted library allocation
page read and write
1DD57564000
trusted library allocation
page read and write
1DD5F385000
trusted library allocation
page read and write
1DD5E000000
trusted library allocation
page read and write
1DD56F99000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD5612B000
trusted library allocation
page read and write
1DD56A20000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
33A1000
heap
page read and write
1DD5DCA0000
trusted library allocation
page read and write
1DBB2F69000
trusted library allocation
page read and write
1DD4C75C000
heap
page read and write
1DD5726B000
trusted library allocation
page read and write
DD7000
heap
page read and write
1DBB3B00000
heap
page read and write
1DD5DC79000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD61022000
heap
page read and write
1DD4C755000
heap
page read and write
1DD574F0000
trusted library allocation
page read and write
1DBB3B2E000
heap
page read and write
BE9000
heap
page read and write
1DD55687000
trusted library allocation
page read and write
1DD56112000
trusted library allocation
page read and write
1DD57033000
trusted library allocation
page read and write
1DBB2F14000
trusted library allocation
page read and write
1DD518A7000
trusted library allocation
page read and write
1DD5829C000
trusted library allocation
page read and write
1DBB3A69000
heap
page read and write
1DD56FFA000
trusted library allocation
page read and write
1DD57205000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD57257000
trusted library allocation
page read and write
1DD5DE8F000
trusted library allocation
page read and write
1DD5FFAB000
trusted library allocation
page read and write
D60000
heap
page read and write
1DD559E6000
trusted library allocation
page read and write
1DD58EF8000
trusted library allocation
page read and write
1DD60958000
trusted library allocation
page read and write
1DD4C75C000
heap
page read and write
1DD517F6000
trusted library allocation
page read and write
1DD56E75000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD4C74F000
heap
page read and write
1DD530A8000
heap
page read and write
1DD56EAA000
trusted library allocation
page read and write
1DD56E6E000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DBB3AB9000
heap
page read and write
1DD4C78F000
heap
page read and write
1DD5DE76000
trusted library allocation
page read and write
1DD60E95000
heap
page read and write
1DD530AC000
heap
page read and write
1DD52ABE000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5915B000
trusted library allocation
page read and write
1DD60959000
trusted library allocation
page read and write
1DD5DE8B000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD55B05000
trusted library allocation
page read and write
1DD52AC1000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
D2A000
heap
page read and write
1DD56E1C000
trusted library allocation
page read and write
1DD58E63000
trusted library allocation
page read and write
1DD5D727000
trusted library allocation
page read and write
1DD56A70000
trusted library allocation
page read and write
1DD59C04000
trusted library allocation
page read and write
1DD5DC81000
trusted library allocation
page read and write
1DD60EF4000
heap
page read and write
191E1550000
heap
page read and write
1DD4C76B000
heap
page read and write
1DD57B78000
trusted library allocation
page read and write
1DD5D9DC000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD527AB000
trusted library allocation
page read and write
1DD5D8B8000
trusted library allocation
page read and write
1DD591EB000
trusted library allocation
page read and write
1DD5DBAB000
trusted library allocation
page read and write
1DD57658000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD55BBA000
trusted library allocation
page read and write
1DD572D4000
trusted library allocation
page read and write
1DD5D988000
trusted library allocation
page read and write
1DD574DA000
trusted library allocation
page read and write
1DD573B2000
trusted library allocation
page read and write
1DD5DB98000
trusted library allocation
page read and write
191E14E0000
heap
page read and write
1DD58175000
trusted library allocation
page read and write
1DD5743C000
trusted library allocation
page read and write
1DD572BD000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD56E5B000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD4C77A000
heap
page read and write
C77000
heap
page read and write
1DD57558000
trusted library allocation
page read and write
1DD529DC000
trusted library allocation
page read and write
1DD574B0000
trusted library allocation
page read and write
9E067E000
stack
page read and write
1DD53928000
trusted library allocation
page read and write
1DD577C1000
trusted library allocation
page read and write
1DD57EFD000
trusted library allocation
page read and write
1DD56E6C000
trusted library allocation
page read and write
1DD5FED6000
trusted library allocation
page read and write
1DD530B3000
heap
page read and write
1DD4C7C6000
heap
page read and write
1DD5F3F9000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DBB3A8A000
heap
page read and write
1DD559F5000
trusted library allocation
page read and write
1E877C32000
trusted library allocation
page read and write
1DBB3B2B000
heap
page read and write
1DD4C789000
heap
page read and write
1DD5FEBC000
trusted library allocation
page read and write
DF3000
heap
page read and write
1DD59143000
trusted library allocation
page read and write
1DD530CA000
heap
page read and write
BC0000
heap
page read and write
1DD56F9D000
trusted library allocation
page read and write
1DD5DB84000
trusted library allocation
page read and write
1DD529B0000
trusted library allocation
page read and write
1DD56F94000
trusted library allocation
page read and write
DD4000
heap
page read and write
1DD518CD000
trusted library allocation
page read and write
191E1A16000
trusted library allocation
page read and write
1DD5F7B8000
trusted library allocation
page read and write
191E15C0000
heap
page read and write
1DD57240000
trusted library allocation
page read and write
1DD5762F000
trusted library allocation
page read and write
1DD5181B000
trusted library allocation
page read and write
1DD591A5000
trusted library allocation
page read and write
1DD5DEE4000
trusted library allocation
page read and write
1DD575DB000
trusted library allocation
page read and write
1DD58DB3000
trusted library allocation
page read and write
1DD5DBD6000
trusted library allocation
page read and write
C56000
heap
page read and write
1DD559DC000
trusted library allocation
page read and write
1DBB2F5C000
trusted library allocation
page read and write
E83E83E000
unkown
page readonly
1DD57E96000
trusted library allocation
page read and write
1DD55B7F000
trusted library allocation
page read and write
1DD58215000
trusted library allocation
page read and write
1DD575DB000
trusted library allocation
page read and write
1DD5DE72000
trusted library allocation
page read and write
1DD577D3000
trusted library allocation
page read and write
1DD5F7E9000
trusted library allocation
page read and write
1DD56E3C000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD4C774000
heap
page read and write
1DD5824A000
trusted library allocation
page read and write
1DD5F7AD000
trusted library allocation
page read and write
1DD56E83000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD561F5000
trusted library allocation
page read and write
1DD559DB000
trusted library allocation
page read and write
1DD5392B000
trusted library allocation
page read and write
1DD55993000
trusted library allocation
page read and write
1DD55BA9000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD60C00000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD4C782000
heap
page read and write
DB5000
heap
page read and write
1DD4C781000
heap
page read and write
1DD4C74E000
heap
page read and write
1DD4C770000
heap
page read and write
1DD56AFD000
trusted library allocation
page read and write
1DD577D4000
trusted library allocation
page read and write
D46000
heap
page read and write
1DD4C76B000
heap
page read and write
1DD58158000
trusted library allocation
page read and write
1DD572D4000
trusted library allocation
page read and write
1DD574E4000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD59143000
trusted library allocation
page read and write
1DD574F5000
trusted library allocation
page read and write
1DD56084000
trusted library allocation
page read and write
BC5000
heap
page read and write
3370000
heap
page read and write
1DD4C770000
heap
page read and write
1DD56EC3000
trusted library allocation
page read and write
1DBB3B59000
heap
page read and write
1DD5DE55000
trusted library allocation
page read and write
1DD56385000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD518BB000
trusted library allocation
page read and write
1DD593AD000
trusted library allocation
page read and write
1DD5D7C4000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD57484000
trusted library allocation
page read and write
1DD56A08000
trusted library allocation
page read and write
1DD582E0000
trusted library allocation
page read and write
1DD56E99000
trusted library allocation
page read and write
1DD57566000
trusted library allocation
page read and write
1DD560FC000
trusted library allocation
page read and write
236B2E00000
trusted library allocation
page read and write
1DD4C777000
heap
page read and write
1DD59373000
trusted library allocation
page read and write
1DD4C761000
heap
page read and write
1DD5FEE6000
trusted library allocation
page read and write
DB4000
heap
page read and write
1DD57076000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DBB3B6A000
heap
page read and write
1DD4C781000
heap
page read and write
CEF000
heap
page read and write
DF3000
heap
page read and write
1DD60F74000
heap
page read and write
1DD4C75E000
heap
page read and write
1DD4C7B8000
heap
page read and write
DAD000
heap
page read and write
1AE8D580000
heap
page read and write
C30000
heap
page read and write
1DD55B8E000
trusted library allocation
page read and write
1DD5822E000
trusted library allocation
page read and write
1DD5D993000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD5DEA0000
trusted library allocation
page read and write
1DD5DCF8000
trusted library allocation
page read and write
BE0000
heap
page read and write
1DD56DCD000
trusted library allocation
page read and write
5A843E000
unkown
page readonly
1DD4C789000
heap
page read and write
1DD55600000
trusted library allocation
page read and write
1DBB3A69000
heap
page read and write
1DD5726B000
trusted library allocation
page read and write
1DD5D780000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD57F73000
trusted library allocation
page read and write
1DD5D7BE000
trusted library allocation
page read and write
C82000
heap
page read and write
1DD57447000
trusted library allocation
page read and write
1DD5DE8D000
trusted library allocation
page read and write
1DD57095000
trusted library allocation
page read and write
1DD51723000
trusted library allocation
page read and write
1DD530AB000
heap
page read and write
1DD4C782000
heap
page read and write
1DD574FB000
trusted library allocation
page read and write
1DD60F04000
heap
page read and write
1DD58071000
trusted library allocation
page read and write
1DBB2FC2000
trusted library allocation
page read and write
1DD5DCF8000
trusted library allocation
page read and write
1E877780000
heap
page read and write
1DD574FB000
trusted library allocation
page read and write
1DD57355000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD560F5000
trusted library allocation
page read and write
1DD472F4000
heap
page read and write
1DD5828F000
trusted library allocation
page read and write
1DD5DE65000
trusted library allocation
page read and write
1DD61021000
heap
page read and write
1DD5F3B4000
trusted library allocation
page read and write
1DBB3931000
trusted library allocation
page read and write
1DD5D80D000
trusted library allocation
page read and write
1DD608CC000
trusted library allocation
page read and write
1DD5309E000
heap
page read and write
236B2C2D000
heap
page read and write
1DD56FF7000
trusted library allocation
page read and write
1DD4C779000
heap
page read and write
1DD581C1000
trusted library allocation
page read and write
191E15BF000
unclassified section
page read and write
1DD56136000
trusted library allocation
page read and write
1DD570AD000
trusted library allocation
page read and write
1DD4C75F000
heap
page read and write
1DD56E79000
trusted library allocation
page read and write
D46000
heap
page read and write
1DD4C7B2000
heap
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD57B63000
trusted library allocation
page read and write
1DD5F7AD000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD580BC000
trusted library allocation
page read and write
1DD56AF4000
trusted library allocation
page read and write
1DD58D0A000
trusted library allocation
page read and write
1DD56E28000
trusted library allocation
page read and write
1DD580D3000
trusted library allocation
page read and write
1DD56E89000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD609E6000
trusted library allocation
page read and write
1DD563D4000
trusted library allocation
page read and write
1DBB3AE8000
heap
page read and write
1DBB3AE9000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD61022000
heap
page read and write
1DD55665000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD58DCD000
trusted library allocation
page read and write
1DD55BE4000
trusted library allocation
page read and write
1DD55BAA000
trusted library allocation
page read and write
1DD570EA000
trusted library allocation
page read and write
1DD5F2E1000
trusted library allocation
page read and write
1DD5309E000
heap
page read and write
1DBB3A60000
heap
page read and write
CA0000
heap
page read and write
1DD5820D000
trusted library allocation
page read and write
1DD57F50000
trusted library allocation
page read and write
1DD616AD000
trusted library allocation
page read and write
1DD581D8000
trusted library allocation
page read and write
1DD5DEF9000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD53919000
trusted library allocation
page read and write
1DD4C772000
heap
page read and write
1DD579C3000
trusted library allocation
page read and write
1DBB3A4D000
heap
page read and write
1DD591F6000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD574E4000
trusted library allocation
page read and write
1DD582EB000
trusted library allocation
page read and write
1DD5F385000
trusted library allocation
page read and write
1DD58EA8000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD539D4000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
DCB000
heap
page read and write
1DD59373000
trusted library allocation
page read and write
1DD561C3000
trusted library allocation
page read and write
1DD5DC8F000
trusted library allocation
page read and write
191E1700000
trusted library allocation
page read and write
1DD5817B000
trusted library allocation
page read and write
1DD5723B000
trusted library allocation
page read and write
DAB000
heap
page read and write
1854000
heap
page read and write
1DD591CD000
trusted library allocation
page read and write
1E877B0B000
trusted library allocation
page read and write
1DD5DE8B000
trusted library allocation
page read and write
1DD60C5D000
trusted library allocation
page read and write
1DD60E99000
heap
page read and write
1DD572D4000
trusted library allocation
page read and write
9DE5FE000
stack
page read and write
1DD4C77A000
heap
page read and write
1DD539EC000
trusted library allocation
page read and write
1DD5827E000
trusted library allocation
page read and write
E0B000
heap
page read and write
1DD5DBAB000
trusted library allocation
page read and write
1DBB3B2B000
heap
page read and write
1DD563B5000
trusted library allocation
page read and write
1DD57983000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD580A7000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD57447000
trusted library allocation
page read and write
1DD58EA5000
trusted library allocation
page read and write
1DD53971000
trusted library allocation
page read and write
1DD5DE4F000
trusted library allocation
page read and write
1DD5825B000
trusted library allocation
page read and write
191E15B2000
unclassified section
page read and write
1DD4C74F000
heap
page read and write
1DD54140000
trusted library allocation
page read and write
1DD5279C000
trusted library allocation
page read and write
1DD5638C000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD54118000
trusted library allocation
page read and write
1DD609FE000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD530D1000
heap
page read and write
1DD575E9000
trusted library allocation
page read and write
1DD5DB63000
trusted library allocation
page read and write
1DD5412E000
trusted library allocation
page read and write
1DD4C7C7000
heap
page read and write
BD1000
heap
page read and write
1DD5DE8F000
trusted library allocation
page read and write
1DD5DCB3000
trusted library allocation
page read and write
1DD591AA000
trusted library allocation
page read and write
1DD57BA6000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD4C77B000
heap
page read and write
1DD5F7AF000
trusted library allocation
page read and write
DDF000
heap
page read and write
1DD52AC7000
trusted library allocation
page read and write
1E877B72000
trusted library allocation
page read and write
1DD539DD000
trusted library allocation
page read and write
DD4000
heap
page read and write
1DD4C770000
heap
page read and write
191E1A70000
trusted library allocation
page read and write
236B4868000
heap
page read and write
1DD5FEE1000
trusted library allocation
page read and write
CC3000
heap
page read and write
1DD60959000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DD5D9EC000
trusted library allocation
page read and write
1DD55886000
trusted library allocation
page read and write
1DD559E8000
trusted library allocation
page read and write
191E1350000
unclassified section
page readonly
1DD56E60000
trusted library allocation
page read and write
1DD5DE65000
trusted library allocation
page read and write
1DD577B2000
trusted library allocation
page read and write
1DD57207000
trusted library allocation
page read and write
1DD5705E000
trusted library allocation
page read and write
1DD5DE41000
trusted library allocation
page read and write
1DD5757E000
trusted library allocation
page read and write
1DD607A3000
trusted library allocation
page read and write
1DD56A1D000
trusted library allocation
page read and write
1DD5DC7B000
trusted library allocation
page read and write
1DD5DCA6000
trusted library allocation
page read and write
191E1AF6000
trusted library allocation
page read and write
1DD56A88000
trusted library allocation
page read and write
1DD578DD000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD57D36000
trusted library allocation
page read and write
1DBB3B59000
heap
page read and write
E0C000
heap
page read and write
DB5000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD57E7F000
trusted library allocation
page read and write
1E8776F0000
unclassified section
page readonly
1DD4C768000
heap
page read and write
DF9000
heap
page read and write
1DD57800000
trusted library allocation
page read and write
1DD574E4000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD4C778000
heap
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD5DCA0000
trusted library allocation
page read and write
1DD4C7C6000
heap
page read and write
1DD4C770000
heap
page read and write
1DD5D775000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
DA7000
heap
page read and write
1DD575F3000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD5754C000
trusted library allocation
page read and write
1DD560E5000
trusted library allocation
page read and write
1DD570A7000
trusted library allocation
page read and write
1DD573C9000
trusted library allocation
page read and write
1DD52A7F000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD561D2000
trusted library allocation
page read and write
1DD53919000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD577F9000
trusted library allocation
page read and write
1DD55858000
trusted library allocation
page read and write
1DBB3A5C000
heap
page read and write
1DD530AF000
heap
page read and write
1DD5DB90000
trusted library allocation
page read and write
1DD57D4D000
trusted library allocation
page read and write
1DD56E4B000
trusted library allocation
page read and write
1DD529AC000
trusted library allocation
page read and write
1DD57769000
trusted library allocation
page read and write
1DD54155000
trusted library allocation
page read and write
1DD5D9D6000
trusted library allocation
page read and write
1DD608CC000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD56E24000
trusted library allocation
page read and write
1DD59361000
trusted library allocation
page read and write
1DD58E5C000
trusted library allocation
page read and write
1DD58EED000
trusted library allocation
page read and write
DBA000
heap
page read and write
1DD5DCAF000
trusted library allocation
page read and write
1DD5DE57000
trusted library allocation
page read and write
1DD57EB4000
trusted library allocation
page read and write
1DD5597B000
trusted library allocation
page read and write
1DD573C6000
trusted library allocation
page read and write
1DD5DC81000
trusted library allocation
page read and write
200000
unkown
page readonly
1DD4C75F000
heap
page read and write
BD9000
heap
page read and write
1DD539FD000
trusted library allocation
page read and write
1DD593F3000
trusted library allocation
page read and write
1DD57DFC000
trusted library allocation
page read and write
CA4000
heap
page read and write
1DD6156A000
trusted library allocation
page read and write
C3B000
heap
page read and write
1DD530AA000
heap
page read and write
1DD5F7AB000
trusted library allocation
page read and write
1DD574F0000
trusted library allocation
page read and write
1DD5DE6E000
trusted library allocation
page read and write
1840000
heap
page read and write
1DD4C783000
heap
page read and write
1DD607B4000
trusted library allocation
page read and write
1DD54149000
trusted library allocation
page read and write
1DD4C75E000
heap
page read and write
1DD60ED2000
heap
page read and write
1DD56E6C000
trusted library allocation
page read and write
D20000
heap
page read and write
E0C000
heap
page read and write
1DBB2B90000
heap
page read and write
1DD57065000
trusted library allocation
page read and write
1DD5DB34000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD57081000
trusted library allocation
page read and write
1DD5397A000
trusted library allocation
page read and write
1DD5F7A6000
trusted library allocation
page read and write
1DD608D6000
trusted library allocation
page read and write
B50000
heap
page read and write
1DD609E6000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD52AF6000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
D60000
heap
page read and write
1DD5D771000
trusted library allocation
page read and write
1DD57F9B000
trusted library allocation
page read and write
1DD575E2000
trusted library allocation
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD58181000
trusted library allocation
page read and write
1E877850000
heap
page read and write
1DD5594C000
trusted library allocation
page read and write
1DD5308F000
heap
page read and write
1DD5FE6F000
trusted library allocation
page read and write
1DD55BDA000
trusted library allocation
page read and write
B8B000
heap
page read and write
1DD5F3FC000
trusted library allocation
page read and write
1DD58EF5000
trusted library allocation
page read and write
1DBB3A7D000
heap
page read and write
1DD58D8A000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD61561000
trusted library allocation
page read and write
1DD5DE6E000
trusted library allocation
page read and write
1DD60E97000
heap
page read and write
1DD5DBE1000
trusted library allocation
page read and write
1DD5765C000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD5DF36000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD5DCB1000
trusted library allocation
page read and write
1DD60ED8000
heap
page read and write
1DD56148000
trusted library allocation
page read and write
1DBB2EE4000
heap
page read and write
1DD5815B000
trusted library allocation
page read and write
1DD511EF000
trusted library allocation
page read and write
1DD559B8000
trusted library allocation
page read and write
1DD530AC000
heap
page read and write
1DD5D9FA000
trusted library allocation
page read and write
1DD56399000
trusted library allocation
page read and write
1DD59363000
trusted library allocation
page read and write
1DD5DB9A000
trusted library allocation
page read and write
1DD5786E000
trusted library allocation
page read and write
1DD5F3B4000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD5D9FC000
trusted library allocation
page read and write
1DD5613C000
trusted library allocation
page read and write
1DBB2F81000
trusted library allocation
page read and write
1DD563CF000
trusted library allocation
page read and write
1DD539EC000
trusted library allocation
page read and write
1DD55674000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
1DD572D2000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD5DCFA000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD5826A000
trusted library allocation
page read and write
1DD51875000
trusted library allocation
page read and write
1DD609C9000
trusted library allocation
page read and write
1DD607B0000
trusted library allocation
page read and write
1DD5DB94000
trusted library allocation
page read and write
1DD581E5000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD5F7BB000
trusted library allocation
page read and write
1DD541FB000
trusted library allocation
page read and write
1DBB2FC5000
trusted library allocation
page read and write
1DD57E8E000
trusted library allocation
page read and write
1DD53091000
heap
page read and write
1DD4C7B2000
heap
page read and write
1DD5FED6000
trusted library allocation
page read and write
1DD53961000
trusted library allocation
page read and write
CAE000
heap
page read and write
1DD5FEC4000
trusted library allocation
page read and write
3B7000
heap
page read and write
DD7000
heap
page read and write
1DD56040000
trusted library allocation
page read and write
1DD559E6000
trusted library allocation
page read and write
1DD59367000
trusted library allocation
page read and write
1DD5753B000
trusted library allocation
page read and write
1DD5607B000
trusted library allocation
page read and write
1DD573B5000
trusted library allocation
page read and write
1DD5727B000
trusted library allocation
page read and write
1DBB3A60000
heap
page read and write
1DD56A9E000
trusted library allocation
page read and write
1DD609FE000
trusted library allocation
page read and write
9DFE7E000
unkown
page readonly
1DD5744D000
trusted library allocation
page read and write
DC3000
heap
page read and write
1DD530B2000
heap
page read and write
1DD60C9E000
trusted library allocation
page read and write
1DD57E7C000
trusted library allocation
page read and write
1DD511BF000
trusted library allocation
page read and write
236B2D40000
heap
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD5D816000
trusted library allocation
page read and write
1DD560AB000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD5DED5000
trusted library allocation
page read and write
1DD59BCA000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5DED5000
trusted library allocation
page read and write
1DD58EAD000
trusted library allocation
page read and write
1DD56131000
trusted library allocation
page read and write
1DD57793000
trusted library allocation
page read and write
DD0000
heap
page read and write
DE5000
heap
page read and write
1DD574CE000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DD4C7B9000
heap
page read and write
1DD5743C000
trusted library allocation
page read and write
1DD56399000
trusted library allocation
page read and write
1DD5595B000
trusted library allocation
page read and write
1DD52909000
trusted library allocation
page read and write
1DD60FAA000
heap
page read and write
1DD56A92000
trusted library allocation
page read and write
1DD529CE000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD5F708000
trusted library allocation
page read and write
1DD593B2000
trusted library allocation
page read and write
1DD560E5000
trusted library allocation
page read and write
E0B000
heap
page read and write
1DD57F8B000
trusted library allocation
page read and write
1DD591B9000
trusted library allocation
page read and write
1DD591AE000
trusted library allocation
page read and write
1DD57D8E000
trusted library allocation
page read and write
1DD580D3000
trusted library allocation
page read and write
1DD590D5000
trusted library allocation
page read and write
1DD58DFE000
trusted library allocation
page read and write
1DD5603D000
trusted library allocation
page read and write
1DD55B85000
trusted library allocation
page read and write
1DD5765C000
trusted library allocation
page read and write
DA4000
heap
page read and write
1DD5F327000
trusted library allocation
page read and write
1DD5723B000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5D87A000
trusted library allocation
page read and write
1DD4C7C1000
heap
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD57FFB000
trusted library allocation
page read and write
1DD57492000
trusted library allocation
page read and write
1DD57F9A000
trusted library allocation
page read and write
1DD5DCB1000
trusted library allocation
page read and write
1DD52A9D000
trusted library allocation
page read and write
2D4000
unkown
page readonly
BC5000
heap
page read and write
1DD530A8000
heap
page read and write
1DD60980000
trusted library allocation
page read and write
1DD5DBC6000
trusted library allocation
page read and write
1DD58240000
trusted library allocation
page read and write
1DD5F7A6000
trusted library allocation
page read and write
1DD56AE2000
trusted library allocation
page read and write
1DD582EB000
trusted library allocation
page read and write
1DD529B5000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD5DCFA000
trusted library allocation
page read and write
191E1400000
heap
page read and write
1DD57866000
trusted library allocation
page read and write
1DD56E67000
trusted library allocation
page read and write
1DD608A8000
trusted library allocation
page read and write
1DD541AC000
trusted library allocation
page read and write
1DD4C780000
heap
page read and write
1DBB3B3C000
heap
page read and write
1DD5119E000
trusted library allocation
page read and write
1DD581D1000
trusted library allocation
page read and write
1DD578D5000
trusted library allocation
page read and write
6C759FF000
stack
page read and write
1DD56DF5000
trusted library allocation
page read and write
1DD572BD000
trusted library allocation
page read and write
1DD5786C000
trusted library allocation
page read and write
1DD5D7E8000
trusted library allocation
page read and write
380000
heap
page read and write
1DD60C8B000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD539F8000
trusted library allocation
page read and write
1DD57E8E000
trusted library allocation
page read and write
1DD5FF5F000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD52A7F000
trusted library allocation
page read and write
9EF000
stack
page read and write
1DD5D949000
trusted library allocation
page read and write
1DD57079000
trusted library allocation
page read and write
1DD609E6000
trusted library allocation
page read and write
D52000
heap
page read and write
1DD472E7000
heap
page read and write
1DD527AE000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD58240000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD55BA6000
trusted library allocation
page read and write
1DD582A5000
trusted library allocation
page read and write
1DD58D86000
trusted library allocation
page read and write
1DD58EB0000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD57839000
trusted library allocation
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
DF4000
heap
page read and write
1DD5DCA6000
trusted library allocation
page read and write
1DD5DFF1000
trusted library allocation
page read and write
1DD5DE65000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DBB3B6A000
heap
page read and write
1DD57785000
trusted library allocation
page read and write
6C769FE000
stack
page read and write
1DD61021000
heap
page read and write
1DD59C01000
trusted library allocation
page read and write
1DD57065000
trusted library allocation
page read and write
1DD57D65000
trusted library allocation
page read and write
1DD57484000
trusted library allocation
page read and write
1DD58E39000
trusted library allocation
page read and write
1DD4C759000
heap
page read and write
1DD574E4000
trusted library allocation
page read and write
1DD52A50000
trusted library allocation
page read and write
1AE8D90A000
trusted library allocation
page read and write
1DD5F7AD000
trusted library allocation
page read and write
1DD559F2000
trusted library allocation
page read and write
DD7000
heap
page read and write
1DD4C7C7000
heap
page read and write
1DD60967000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD5DE63000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1DBB2FF3000
trusted library allocation
page read and write
1DD541A0000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD56E60000
trusted library allocation
page read and write
1DD591FA000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD58049000
trusted library allocation
page read and write
1DD559FB000
trusted library allocation
page read and write
1DD57554000
trusted library allocation
page read and write
1DD51900000
trusted library allocation
page read and write
1DD5F7B9000
trusted library allocation
page read and write
1DD561CC000
trusted library allocation
page read and write
1DD56A89000
trusted library allocation
page read and write
1DD527DC000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD58D22000
trusted library allocation
page read and write
1DD60980000
trusted library allocation
page read and write
1DD56A70000
trusted library allocation
page read and write
1DD57271000
trusted library allocation
page read and write
1DD5F296000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD593E9000
trusted library allocation
page read and write
1DD5764E000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
1DD5309E000
heap
page read and write
1DD5DECC000
trusted library allocation
page read and write
1DD591A8000
trusted library allocation
page read and write
1DD56A9E000
trusted library allocation
page read and write
1DD57793000
trusted library allocation
page read and write
C77000
heap
page read and write
1DD57441000
trusted library allocation
page read and write
1DD5D9F2000
trusted library allocation
page read and write
1DBB3B59000
heap
page read and write
1DD55B3C000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD4C7C6000
heap
page read and write
1DD5567F000
trusted library allocation
page read and write
1DD60992000
trusted library allocation
page read and write
1DD5617E000
trusted library allocation
page read and write
1DD58E44000
trusted library allocation
page read and write
1DD5D94E000
trusted library allocation
page read and write
1DD5DE4F000
trusted library allocation
page read and write
1DD5DB88000
trusted library allocation
page read and write
1DD5F318000
trusted library allocation
page read and write
1DD5D733000
trusted library allocation
page read and write
1DD5F359000
trusted library allocation
page read and write
BCB000
heap
page read and write
1E877C1A000
trusted library allocation
page read and write
1DD59393000
trusted library allocation
page read and write
1DD4C78D000
heap
page read and write
1850000
heap
page read and write
1DD5D77D000
trusted library allocation
page read and write
1DD4C776000
heap
page read and write
1DD5593E000
trusted library allocation
page read and write
1DD57271000
trusted library allocation
page read and write
1DD5635B000
trusted library allocation
page read and write
1DBB3AAA000
heap
page read and write
1DD530B2000
heap
page read and write
1DD511EF000
trusted library allocation
page read and write
1DD5D924000
trusted library allocation
page read and write
1DD57728000
trusted library allocation
page read and write
33A1000
heap
page read and write
1DD56E83000
trusted library allocation
page read and write
1DD581EC000
trusted library allocation
page read and write
1DD57548000
trusted library allocation
page read and write
1DD573C9000
trusted library allocation
page read and write
1E877C3D000
trusted library allocation
page read and write
191E1A03000
trusted library allocation
page read and write
1DD572BD000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD575E2000
trusted library allocation
page read and write
1DBB2F12000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
191E1A74000
trusted library allocation
page read and write
1DD591D2000
trusted library allocation
page read and write
1DD581FD000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
1DBB3AF2000
heap
page read and write
1DD56E61000
trusted library allocation
page read and write
1DD56036000
trusted library allocation
page read and write
1DD56A8B000
trusted library allocation
page read and write
1DD5D8B8000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD582E7000
trusted library allocation
page read and write
1DD57257000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
1DD578CF000
trusted library allocation
page read and write
3B5000
heap
page read and write
1DD4C764000
heap
page read and write
BC5000
heap
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD5704C000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD58E24000
trusted library allocation
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD53928000
trusted library allocation
page read and write
1DD573C9000
trusted library allocation
page read and write
1DBB3B6A000
heap
page read and write
1DD52AF4000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD5DBEC000
trusted library allocation
page read and write
1DD5309E000
heap
page read and write
1DD58212000
trusted library allocation
page read and write
DA9000
heap
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD4C76A000
heap
page read and write
CCD000
heap
page read and write
1DD5DC7B000
trusted library allocation
page read and write
1DD57441000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD5786E000
trusted library allocation
page read and write
1DD575B2000
trusted library allocation
page read and write
1DD59363000
trusted library allocation
page read and write
1DD57BC9000
trusted library allocation
page read and write
1DD55985000
trusted library allocation
page read and write
1DD582A0000
trusted library allocation
page read and write
1DD4C7B2000
heap
page read and write
1DD5DCA0000
trusted library allocation
page read and write
1DD5744D000
trusted library allocation
page read and write
1DD5F401000
trusted library allocation
page read and write
1DD5D8AE000
trusted library allocation
page read and write
236B2C10000
heap
page read and write
BF3000
heap
page read and write
1DD57F9B000
trusted library allocation
page read and write
1DD58D10000
trusted library allocation
page read and write
1DD57076000
trusted library allocation
page read and write
1DD574F0000
trusted library allocation
page read and write
1DBB2D00000
trusted library allocation
page read and write
1870000
heap
page read and write
1DD6097E000
trusted library allocation
page read and write
1DD5FE93000
trusted library allocation
page read and write
1DD58E70000
trusted library allocation
page read and write
189000
stack
page read and write
1DD5D89D000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD60956000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD4C77B000
heap
page read and write
1DD51198000
trusted library allocation
page read and write
1DD530B3000
heap
page read and write
1DD4C77E000
heap
page read and write
C83000
heap
page read and write
1DD60992000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD5392B000
trusted library allocation
page read and write
1DD5DFED000
trusted library allocation
page read and write
1DD58CC5000
trusted library allocation
page read and write
1DD561C3000
trusted library allocation
page read and write
1DD581E5000
trusted library allocation
page read and write
1DD53963000
trusted library allocation
page read and write
1DD56044000
trusted library allocation
page read and write
1DD55BFA000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD4C774000
heap
page read and write
1DD4C75D000
heap
page read and write
9DCBAD000
stack
page read and write
1DD5DEE0000
trusted library allocation
page read and write
1DD5779A000
trusted library allocation
page read and write
1E877970000
heap
page read and write
DAF000
heap
page read and write
1DD4C789000
heap
page read and write
1DD578CF000
trusted library allocation
page read and write
1DD57460000
trusted library allocation
page read and write
1DD57566000
trusted library allocation
page read and write
1DD574E9000
trusted library allocation
page read and write
BFF000
heap
page read and write
1DD56055000
trusted library allocation
page read and write
1DD56A5A000
trusted library allocation
page read and write
1DD529B5000
trusted library allocation
page read and write
1DD57033000
trusted library allocation
page read and write
1DD581EC000
trusted library allocation
page read and write
1DD616E1000
trusted library allocation
page read and write
1DD560E5000
trusted library allocation
page read and write
1DD4C7B0000
heap
page read and write
1DD539DD000
trusted library allocation
page read and write
1DD575F9000
trusted library allocation
page read and write
1DBB3AFC000
heap
page read and write
1DD57685000
trusted library allocation
page read and write
1DD4C780000
heap
page read and write
1DD6076F000
trusted library allocation
page read and write
1DD52733000
trusted library allocation
page read and write
1DD559A7000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD577B2000
trusted library allocation
page read and write
1E8777E0000
heap
page read and write
1DD57FAE000
trusted library allocation
page read and write
1AE8D907000
trusted library allocation
page read and write
1DD5D874000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DD559A2000
trusted library allocation
page read and write
1DD56E99000
trusted library allocation
page read and write
1DD60FB2000
heap
page read and write
1DD57E94000
trusted library allocation
page read and write
1DD5814E000
trusted library allocation
page read and write
1DD4C7B0000
heap
page read and write
1DD581D1000
trusted library allocation
page read and write
1DD57751000
trusted library allocation
page read and write
CA0000
heap
page read and write
DD9000
heap
page read and write
1DD5DFB8000
trusted library allocation
page read and write
1DD578F7000
trusted library allocation
page read and write
1DD55870000
trusted library allocation
page read and write
1DD577B2000
trusted library allocation
page read and write
1DD5DCAD000
trusted library allocation
page read and write
1DD575F9000
trusted library allocation
page read and write
1DBB2C2F000
unclassified section
page read and write
1DBB3B78000
heap
page read and write
224ECE81000
trusted library allocation
page execute read
1DD5187D000
trusted library allocation
page read and write
1DBB3A60000
heap
page read and write
1DBB3B78000
heap
page read and write
1DD5724B000
trusted library allocation
page read and write
1DD574AB000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD5599D000
trusted library allocation
page read and write
1DD5309E000
heap
page read and write
1DD609B9000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DBB2EE6000
heap
page read and write
1DD5753A000
trusted library allocation
page read and write
1DD58EA8000
trusted library allocation
page read and write
1DD5F7AB000
trusted library allocation
page read and write
1DD5F33B000
trusted library allocation
page read and write
1DD591D2000
trusted library allocation
page read and write
1DD51819000
trusted library allocation
page read and write
1DBB2CA0000
trusted library section
page readonly
1DD57534000
trusted library allocation
page read and write
1DD5F35C000
trusted library allocation
page read and write
1DD55B25000
trusted library allocation
page read and write
191E19D4000
heap
page read and write
1DD556B6000
trusted library allocation
page read and write
1DD5D99B000
trusted library allocation
page read and write
1DD559DC000
trusted library allocation
page read and write
1DD5F359000
trusted library allocation
page read and write
1DD5D82B000
trusted library allocation
page read and write
1DD5DE59000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD5279C000
trusted library allocation
page read and write
1DD5DB27000
trusted library allocation
page read and write
1DD472DF000
heap
page read and write
DE8000
heap
page read and write
1DD530BA000
heap
page read and write
1DD55B29000
trusted library allocation
page read and write
1DD54143000
trusted library allocation
page read and write
1DBB3A9C000
heap
page read and write
1DD5DC89000
trusted library allocation
page read and write
DA7000
heap
page read and write
DC7000
heap
page read and write
1DD575C6000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD5D9FC000
trusted library allocation
page read and write
1DD6097E000
trusted library allocation
page read and write
1DD53090000
heap
page read and write
191E1680000
heap
page read and write
1DD5DCAF000
trusted library allocation
page read and write
1DD5F7A9000
trusted library allocation
page read and write
1DD5747D000
trusted library allocation
page read and write
1DD5779A000
trusted library allocation
page read and write
1DD56AB0000
trusted library allocation
page read and write
1DD5F752000
trusted library allocation
page read and write
1DD5634E000
trusted library allocation
page read and write
1E877C17000
trusted library allocation
page read and write
1DD5918A000
trusted library allocation
page read and write
1DD4C7B7000
heap
page read and write
1DD5709C000
trusted library allocation
page read and write
1DD572BF000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5567B000
trusted library allocation
page read and write
1DD5DB37000
trusted library allocation
page read and write
1E877B10000
trusted library allocation
page read and write
1DD5DEB0000
trusted library allocation
page read and write
1DD52AC7000
trusted library allocation
page read and write
1DD55940000
trusted library allocation
page read and write
1DD573C0000
trusted library allocation
page read and write
1DD559E0000
trusted library allocation
page read and write
E09000
heap
page read and write
1DD4C774000
heap
page read and write
1DD4C765000
heap
page read and write
1DD56031000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DD582C5000
trusted library allocation
page read and write
1DD57752000
trusted library allocation
page read and write
1DD59365000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
E06000
heap
page read and write
191E1B00000
trusted library allocation
page read and write
4E973FF000
stack
page read and write
1DD56EFC000
trusted library allocation
page read and write
D39000
heap
page read and write
C1B000
heap
page read and write
1DD57018000
trusted library allocation
page read and write
1DD4C786000
heap
page read and write
1DD539F8000
trusted library allocation
page read and write
1DD527E7000
trusted library allocation
page read and write
1DBB2C22000
unclassified section
page read and write
1DD5802D000
trusted library allocation
page read and write
1DD57441000
trusted library allocation
page read and write
1DD57DE0000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD4C755000
heap
page read and write
1DD5F36A000
trusted library allocation
page read and write
1DD581C1000
trusted library allocation
page read and write
1DD5754C000
trusted library allocation
page read and write
1DD56FFC000
trusted library allocation
page read and write
1DD5D87A000
trusted library allocation
page read and write
1DD581D3000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD559E8000
trusted library allocation
page read and write
1DD5DED5000
trusted library allocation
page read and write
1DD5DE60000
trusted library allocation
page read and write
1DD581D3000
trusted library allocation
page read and write
DD0000
heap
page read and write
1DBB3B6A000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD607A6000
trusted library allocation
page read and write
1DD5DE9E000
trusted library allocation
page read and write
1DD5761B000
trusted library allocation
page read and write
1DD58E9D000
trusted library allocation
page read and write
1DD518A7000
trusted library allocation
page read and write
1DD609B1000
trusted library allocation
page read and write
1DD58049000
trusted library allocation
page read and write
1DD5FFAF000
trusted library allocation
page read and write
1DD4C7C4000
heap
page read and write
BE4000
heap
page read and write
1DD5DC67000
trusted library allocation
page read and write
1DD57387000
trusted library allocation
page read and write
1DD5759F000
trusted library allocation
page read and write
1DD58D48000
trusted library allocation
page read and write
4E97BFD000
stack
page read and write
1DD4C755000
heap
page read and write
1DD5DCCB000
trusted library allocation
page read and write
1DD5F780000
trusted library allocation
page read and write
191E1A0E000
trusted library allocation
page read and write
1DD56348000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD559B0000
trusted library allocation
page read and write
1DD578AC000
trusted library allocation
page read and write
1DD59348000
trusted library allocation
page read and write
1DD5726B000
trusted library allocation
page read and write
1DD57795000
trusted library allocation
page read and write
1DD572C4000
trusted library allocation
page read and write
1DD5DFDE000
trusted library allocation
page read and write
1DBB3A5C000
heap
page read and write
1DD577C8000
trusted library allocation
page read and write
1DD60FB3000
heap
page read and write
1DD5DE6E000
trusted library allocation
page read and write
1DD5D8E7000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
1DD58188000
trusted library allocation
page read and write
1DD581F0000
trusted library allocation
page read and write
1DD530A8000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD60E95000
heap
page read and write
1DD4C78F000
heap
page read and write
1DD60C60000
trusted library allocation
page read and write
1DD56E6C000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DBB3A6C000
heap
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD57244000
trusted library allocation
page read and write
1DD60989000
trusted library allocation
page read and write
1E877B03000
trusted library allocation
page read and write
1DD57399000
trusted library allocation
page read and write
1DD4C766000
heap
page read and write
1DD591CD000
trusted library allocation
page read and write
1DD60C67000
trusted library allocation
page read and write
1DD58EFD000
trusted library allocation
page read and write
DFA000
heap
page read and write
1DD5759E000
trusted library allocation
page read and write
1DD5DB30000
trusted library allocation
page read and write
1DD5743D000
trusted library allocation
page read and write
1DD575B2000
trusted library allocation
page read and write
1DD5758E000
trusted library allocation
page read and write
1DD6095F000
trusted library allocation
page read and write
1DD56360000
trusted library allocation
page read and write
1DD60FAA000
heap
page read and write
BAB000
heap
page read and write
191E1A5F000
trusted library allocation
page read and write
1DD5568D000
trusted library allocation
page read and write
1DD53092000
heap
page read and write
1DD5F7A4000
trusted library allocation
page read and write
1DD52756000
trusted library allocation
page read and write
1DD56A92000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
C31000
heap
page read and write
1DD4C76E000
heap
page read and write
1DD572C8000
trusted library allocation
page read and write
1DD5D787000
trusted library allocation
page read and write
1DD5D8E9000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD61022000
heap
page read and write
1DD56A9E000
trusted library allocation
page read and write
1DD5DF17000
trusted library allocation
page read and write
1DD56E4B000
trusted library allocation
page read and write
1DD5DFE2000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD591EB000
trusted library allocation
page read and write
1DD5AA02000
trusted library allocation
page read and write
1DD5F77E000
trusted library allocation
page read and write
1DD593BA000
trusted library allocation
page read and write
1DD4C78B000
heap
page read and write
BD3000
heap
page read and write
1DD4C78D000
heap
page read and write
1DD511CA000
trusted library allocation
page read and write
1DD5DCBA000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD4C7B0000
heap
page read and write
C97000
heap
page read and write
1DD530A8000
heap
page read and write
1E877B12000
trusted library allocation
page read and write
1DD53963000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD4C783000
heap
page read and write
1DD591FE000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD591AA000
trusted library allocation
page read and write
1DD5D88B000
trusted library allocation
page read and write
1DD5DC67000
trusted library allocation
page read and write
1DD58265000
trusted library allocation
page read and write
1DD59BB4000
trusted library allocation
page read and write
1DD57645000
trusted library allocation
page read and write
1DD529B8000
trusted library allocation
page read and write
1DD56A9E000
trusted library allocation
page read and write
1DD51181000
trusted library allocation
page read and write
1DD57CBB000
trusted library allocation
page read and write
1DD53090000
heap
page read and write
1DD5F7E9000
trusted library allocation
page read and write
D42000
heap
page read and write
1DD5FEC3000
trusted library allocation
page read and write
1DD53975000
trusted library allocation
page read and write
1DD608D6000
trusted library allocation
page read and write
1DBB2A10000
unclassified section
page readonly
1DD5754E000
trusted library allocation
page read and write
1DD57D7C000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD541A0000
trusted library allocation
page read and write
1DD578F4000
trusted library allocation
page read and write
1DD58D22000
trusted library allocation
page read and write
1DD608D9000
trusted library allocation
page read and write
1DD58D5A000
trusted library allocation
page read and write
DFE000
heap
page read and write
1DD5747B000
trusted library allocation
page read and write
1DD56E90000
trusted library allocation
page read and write
1DD529B3000
trusted library allocation
page read and write
DDA000
heap
page read and write
1DD574DA000
trusted library allocation
page read and write
1DD4C76E000
heap
page read and write
1DD556C2000
trusted library allocation
page read and write
1DD5727B000
trusted library allocation
page read and write
1DD529D7000
trusted library allocation
page read and write
DBF000
heap
page read and write
E83ADFE000
stack
page read and write
1DD559E0000
trusted library allocation
page read and write
1DD57849000
trusted library allocation
page read and write
1E877B23000
trusted library allocation
page read and write
1DD5DB9F000
trusted library allocation
page read and write
1DD581E5000
trusted library allocation
page read and write
1DD5808D000
trusted library allocation
page read and write
DD5000
heap
page read and write
BC5000
heap
page read and write
1DBB3B78000
heap
page read and write
9DB000
stack
page read and write
1DD58DC5000
trusted library allocation
page read and write
5A6BD8000
stack
page read and write
1DD52A57000
trusted library allocation
page read and write
1DBB34D1000
heap
page read and write
C1A000
heap
page read and write
1E877990000
unclassified section
page readonly
1DD5DBE1000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
191E1A1C000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD5D91B000
trusted library allocation
page read and write
CC3000
heap
page read and write
1DD60E95000
heap
page read and write
1DD563BF000
trusted library allocation
page read and write
1DD5F389000
trusted library allocation
page read and write
1DD5727C000
trusted library allocation
page read and write
DC9000
heap
page read and write
1DD56A8D000
trusted library allocation
page read and write
1DD5F7B3000
trusted library allocation
page read and write
1DD609CE000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5776E000
trusted library allocation
page read and write
1DD563CF000
trusted library allocation
page read and write
1DD578DB000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
B83000
heap
page read and write
1DD577DD000
trusted library allocation
page read and write
1DD5635A000
trusted library allocation
page read and write
1DD57553000
trusted library allocation
page read and write
1DD570AA000
trusted library allocation
page read and write
5AA53E000
unkown
page readonly
1DD5F7C3000
trusted library allocation
page read and write
1DBB3AE8000
heap
page read and write
1DD4C783000
heap
page read and write
C3B000
heap
page read and write
1DD55BFD000
trusted library allocation
page read and write
1E8777C0000
unclassified section
page readonly
1DD5724B000
trusted library allocation
page read and write
1DD58E22000
trusted library allocation
page read and write
1DD559A6000
trusted library allocation
page read and write
1DD58EA5000
trusted library allocation
page read and write
1DD572D2000
trusted library allocation
page read and write
DC3000
heap
page read and write
DE6000
heap
page read and write
1DD55890000
trusted library allocation
page read and write
1DD572BF000
trusted library allocation
page read and write
1DD57460000
trusted library allocation
page read and write
1DD5758C000
trusted library allocation
page read and write
DEA000
heap
page read and write
1DD561C2000
trusted library allocation
page read and write
5A615B000
stack
page read and write
1DD4C7B0000
heap
page read and write
1DD57355000
trusted library allocation
page read and write
1DD593AD000
trusted library allocation
page read and write
1DD4C757000
heap
page read and write
1DBB2F03000
trusted library allocation
page read and write
1DD5DAE5000
trusted library allocation
page read and write
1DD56ED8000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD57FE3000
trusted library allocation
page read and write
DA4000
heap
page read and write
1DBB3AE9000
heap
page read and write
1DD57070000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DBB3B78000
heap
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD56E9C000
trusted library allocation
page read and write
1DD5DCA6000
trusted library allocation
page read and write
BC5000
heap
page read and write
D4B000
heap
page read and write
1DD57F00000
trusted library allocation
page read and write
1DD5D822000
trusted library allocation
page read and write
1DD574B3000
trusted library allocation
page read and write
191E1A77000
trusted library allocation
page read and write
1DD57397000
trusted library allocation
page read and write
1DD57FFB000
trusted library allocation
page read and write
1DD56E20000
trusted library allocation
page read and write
1DD4C760000
heap
page read and write
1DBB3B59000
heap
page read and write
191E19D6000
heap
page read and write
1DD60C6C000
trusted library allocation
page read and write
B93000
heap
page read and write
1DD61022000
heap
page read and write
1DD5DE57000
trusted library allocation
page read and write
1DD572BF000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD577D8000
trusted library allocation
page read and write
1DD5D99E000
trusted library allocation
page read and write
1DD4C773000
heap
page read and write
1DD51826000
trusted library allocation
page read and write
1DD4C7B8000
heap
page read and write
1DD57F19000
trusted library allocation
page read and write
1DD54122000
trusted library allocation
page read and write
DC9000
heap
page read and write
1DD4C75E000
heap
page read and write
1DD5DC79000
trusted library allocation
page read and write
1DD56170000
trusted library allocation
page read and write
191E14EA000
heap
page read and write
1DD5DCFA000
trusted library allocation
page read and write
1DD5569F000
trusted library allocation
page read and write
224ECDC1000
trusted library allocation
page execute read
1DD53095000
heap
page read and write
1DBB2FC7000
trusted library allocation
page read and write
1DD575F3000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD591F6000
trusted library allocation
page read and write
1DBB3B45000
heap
page read and write
1DD574F1000
trusted library allocation
page read and write
BCF000
heap
page read and write
1DBB3B5A000
heap
page read and write
1DD4C753000
heap
page read and write
2D0000
unkown
page write copy
1DD58EAD000
trusted library allocation
page read and write
1DD51817000
trusted library allocation
page read and write
1DD593BA000
trusted library allocation
page read and write
1DD539F8000
trusted library allocation
page read and write
1DD5738C000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1E8779E0000
heap
page read and write
1DD4C755000
heap
page read and write
1DD5D9E4000
trusted library allocation
page read and write
BDD000
heap
page read and write
1DD558A8000
trusted library allocation
page read and write
1DD5DC95000
trusted library allocation
page read and write
1DD4C7B2000
heap
page read and write
1DD574B3000
trusted library allocation
page read and write
1DD582E7000
trusted library allocation
page read and write
1DD4C779000
heap
page read and write
1DD5722D000
trusted library allocation
page read and write
1DD541FB000
trusted library allocation
page read and write
1DD5722D000
trusted library allocation
page read and write
1DD577EA000
trusted library allocation
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD5807B000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD54181000
trusted library allocation
page read and write
1DD541AC000
trusted library allocation
page read and write
1DD56E79000
trusted library allocation
page read and write
1DD59343000
trusted library allocation
page read and write
1DD5D943000
trusted library allocation
page read and write
1DD560AB000
trusted library allocation
page read and write
1DD591FE000
trusted library allocation
page read and write
1DD56A49000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD6098A000
trusted library allocation
page read and write
1DD575DB000
trusted library allocation
page read and write
1DD55BDA000
trusted library allocation
page read and write
DA4000
heap
page read and write
1DD5936B000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD5DB2E000
trusted library allocation
page read and write
1DBB3B23000
heap
page read and write
1DD4C75F000
heap
page read and write
1DD609BC000
trusted library allocation
page read and write
1DD57D4C000
trusted library allocation
page read and write
1DD5638C000
trusted library allocation
page read and write
1DD539EC000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD5DE6A000
trusted library allocation
page read and write
1DD5DBCD000
trusted library allocation
page read and write
1DD54181000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
DAB000
heap
page read and write
1DD58124000
trusted library allocation
page read and write
1DD5DFE2000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
CED000
heap
page read and write
1DD58C23000
trusted library allocation
page read and write
1DD5723B000
trusted library allocation
page read and write
1DD4C76E000
heap
page read and write
1DD5DB8E000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DBB3A6C000
heap
page read and write
1DD60C5A000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD59115000
trusted library allocation
page read and write
1DD5608D000
trusted library allocation
page read and write
1DD4C773000
heap
page read and write
1DD4C765000
heap
page read and write
1E877B81000
trusted library allocation
page read and write
1DD57095000
trusted library allocation
page read and write
1DD582F0000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DBB3A63000
heap
page read and write
1DD55822000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
E07000
heap
page read and write
1DBB3AE0000
heap
page read and write
1DD58C65000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
DE1000
heap
page read and write
C2D000
heap
page read and write
1DD5DBE1000
trusted library allocation
page read and write
236B30A0000
heap
page read and write
1DD57EFD000
trusted library allocation
page read and write
E0C000
heap
page read and write
1DD590E0000
trusted library allocation
page read and write
1DD575DF000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD55667000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DBB2FE9000
trusted library allocation
page read and write
1DD591A0000
trusted library allocation
page read and write
1DD57586000
trusted library allocation
page read and write
1DD5754E000
trusted library allocation
page read and write
236B2F0A000
trusted library allocation
page read and write
1DBB2F61000
trusted library allocation
page read and write
1DD5FEC4000
trusted library allocation
page read and write
DB5000
heap
page read and write
1DD56AFA000
trusted library allocation
page read and write
1DD58DF8000
trusted library allocation
page read and write
1DD57070000
trusted library allocation
page read and write
1DD54189000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD539F8000
trusted library allocation
page read and write
CA0000
heap
page read and write
1DD58EED000
trusted library allocation
page read and write
191E13C0000
remote allocation
page read and write
1DD530A0000
heap
page read and write
1DD57244000
trusted library allocation
page read and write
1DD5826F000
trusted library allocation
page read and write
1DD5F71B000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
BCE000
heap
page read and write
1DD4C7CB000
heap
page read and write
1DD56E83000
trusted library allocation
page read and write
DBA000
heap
page read and write
1DD578CF000
trusted library allocation
page read and write
1DD5777B000
trusted library allocation
page read and write
1DD4C772000
heap
page read and write
1DD57235000
trusted library allocation
page read and write
D65000
heap
page read and write
1DD574D5000
trusted library allocation
page read and write
1DD559E2000
trusted library allocation
page read and write
1DD55B51000
trusted library allocation
page read and write
1DD56A2F000
trusted library allocation
page read and write
1DD530A2000
heap
page read and write
1DD4C760000
heap
page read and write
9DCB2E000
stack
page read and write
1DD5705E000
trusted library allocation
page read and write
1DD5912D000
trusted library allocation
page read and write
1DD5DB2E000
trusted library allocation
page read and write
1DD55B5E000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
DCF000
heap
page read and write
1DD57695000
trusted library allocation
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD56ED4000
trusted library allocation
page read and write
1DD530CA000
heap
page read and write
1DD5F2FC000
trusted library allocation
page read and write
1DD5594A000
trusted library allocation
page read and write
1DD561C0000
trusted library allocation
page read and write
1DD5F776000
trusted library allocation
page read and write
1DD5308F000
heap
page read and write
1DBB3B2B000
heap
page read and write
1DD4C7C1000
heap
page read and write
1DD55B8A000
trusted library allocation
page read and write
1DD574E0000
trusted library allocation
page read and write
1DD580A7000
trusted library allocation
page read and write
1DD539C2000
trusted library allocation
page read and write
1DD578F7000
trusted library allocation
page read and write
DF6000
heap
page read and write
1DD57769000
trusted library allocation
page read and write
1DD4C7C6000
heap
page read and write
DE0000
heap
page read and write
1DD4C78F000
heap
page read and write
1DD5F366000
trusted library allocation
page read and write
1DD5DEE4000
trusted library allocation
page read and write
1DD57D79000
trusted library allocation
page read and write
2CC000
unkown
page read and write
1DD57434000
trusted library allocation
page read and write
1DD53961000
trusted library allocation
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD5F3F9000
trusted library allocation
page read and write
1DD60E95000
heap
page read and write
1DD5F318000
trusted library allocation
page read and write
1DD5DB8E000
trusted library allocation
page read and write
1DD57233000
trusted library allocation
page read and write
1DD570E5000
trusted library allocation
page read and write
1DD577FE000
trusted library allocation
page read and write
1DBB3A5C000
heap
page read and write
1DD591EB000
trusted library allocation
page read and write
1DD57F3A000
trusted library allocation
page read and write
1DD60E00000
trusted library allocation
page read and write
1DD58DB5000
trusted library allocation
page read and write
1DD58EF5000
trusted library allocation
page read and write
1DD5DFC6000
trusted library allocation
page read and write
1E877962000
unclassified section
page read and write
1DD57554000
trusted library allocation
page read and write
2C2000
unkown
page readonly
1DD57E9E000
trusted library allocation
page read and write
1DD56FA5000
trusted library allocation
page read and write
1DD5DBC6000
trusted library allocation
page read and write
1DD60FAA000
heap
page read and write
1DD575B8000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD57441000
trusted library allocation
page read and write
1DD56EAA000
trusted library allocation
page read and write
1DD577B4000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DBB2F2F000
trusted library allocation
page read and write
1DD57D60000
trusted library allocation
page read and write
1DD572D2000
trusted library allocation
page read and write
1DD570E8000
trusted library allocation
page read and write
1DD5DC87000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
1DD52AA5000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD5DF0C000
trusted library allocation
page read and write
1DD582B1000
trusted library allocation
page read and write
1DD58EF5000
trusted library allocation
page read and write
DD8000
heap
page read and write
1DD5DCFB000
trusted library allocation
page read and write
1DD560E5000
trusted library allocation
page read and write
1DD60E95000
heap
page read and write
D42000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD574DA000
trusted library allocation
page read and write
1DD57CBB000
trusted library allocation
page read and write
1DD55B55000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD577E4000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
C54000
heap
page read and write
1E877BE6000
trusted library allocation
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD4C74E000
heap
page read and write
1DD57054000
trusted library allocation
page read and write
236B4850000
heap
page read and write
1DD4C75D000
heap
page read and write
1AE8D900000
trusted library allocation
page read and write
1DD5FEBB000
trusted library allocation
page read and write
1DD60956000
trusted library allocation
page read and write
1DD5759E000
trusted library allocation
page read and write
1DD4C7B0000
heap
page read and write
1DD5F404000
trusted library allocation
page read and write
1DD57866000
trusted library allocation
page read and write
1DD5DFC1000
trusted library allocation
page read and write
DAB000
heap
page read and write
1DD560C3000
trusted library allocation
page read and write
1DD529AF000
trusted library allocation
page read and write
1DD591A8000
trusted library allocation
page read and write
1DD527B4000
trusted library allocation
page read and write
1DD60FAA000
heap
page read and write
1DD5566D000
trusted library allocation
page read and write
1DD5309F000
heap
page read and write
1DD5D94E000
trusted library allocation
page read and write
1DD57DFC000
trusted library allocation
page read and write
1DD57460000
trusted library allocation
page read and write
1DD541A0000
trusted library allocation
page read and write
1DD59393000
trusted library allocation
page read and write
1DD56043000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD4C774000
heap
page read and write
1DD55986000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
1DD563CF000
trusted library allocation
page read and write
1DD5FFC1000
trusted library allocation
page read and write
1DD5F3FC000
trusted library allocation
page read and write
1DBB33F0000
heap
page read and write
1DD5D9D6000
trusted library allocation
page read and write
1DD59B66000
trusted library allocation
page read and write
1DD5F75F000
trusted library allocation
page read and write
DB5000
heap
page read and write
E83B63E000
unkown
page readonly
1DD55B70000
trusted library allocation
page read and write
1DD60F05000
heap
page read and write
1DD53963000
trusted library allocation
page read and write
1DD527B4000
trusted library allocation
page read and write
1DD581D1000
trusted library allocation
page read and write
1DD5DF15000
trusted library allocation
page read and write
1DD56EEE000
trusted library allocation
page read and write
1DD52A7F000
trusted library allocation
page read and write
1DD530A8000
heap
page read and write
DD7000
heap
page read and write
1DD4C766000
heap
page read and write
1DD4C7B0000
heap
page read and write
1DD60E99000
heap
page read and write
1DD59370000
trusted library allocation
page read and write
1DD570C5000
trusted library allocation
page read and write
1DD56E4E000
trusted library allocation
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD5F2AD000
trusted library allocation
page read and write
1E877B6E000
trusted library allocation
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD59B85000
trusted library allocation
page read and write
1DD5764E000
trusted library allocation
page read and write
1DD5634B000
trusted library allocation
page read and write
1DD5822E000
trusted library allocation
page read and write
1DD56345000
trusted library allocation
page read and write
1DD5DBD9000
trusted library allocation
page read and write
1DD56E6E000
trusted library allocation
page read and write
1DD58195000
trusted library allocation
page read and write
1DD4C753000
heap
page read and write
1DD5DCBD000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD574E0000
trusted library allocation
page read and write
BDB000
heap
page read and write
BEA000
heap
page read and write
1DD5DB30000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD55663000
trusted library allocation
page read and write
1DD5FF5F000
trusted library allocation
page read and write
1DD5726B000
trusted library allocation
page read and write
37E000
stack
page read and write
1DD4C75D000
heap
page read and write
1DD56A5A000
trusted library allocation
page read and write
1DD5DC8F000
trusted library allocation
page read and write
1DD5744B000
trusted library allocation
page read and write
1DD539F8000
trusted library allocation
page read and write
1DD5D7AE000
trusted library allocation
page read and write
1DD577CC000
trusted library allocation
page read and write
1DD54139000
trusted library allocation
page read and write
1E877B7B000
trusted library allocation
page read and write
1DD4C75F000
heap
page read and write
1DD58DC7000
trusted library allocation
page read and write
1DD5DB90000
trusted library allocation
page read and write
1DD4C772000
heap
page read and write
1DD5DC7F000
trusted library allocation
page read and write
1DD59B5C000
trusted library allocation
page read and write
E0B000
heap
page read and write
1DD530A8000
heap
page read and write
1DD4C783000
heap
page read and write
1DBB2A80000
unclassified section
page readonly
D60000
heap
page read and write
1DD53975000
trusted library allocation
page read and write
1DD57BE4000
trusted library allocation
page read and write
1DBB3B6A000
heap
page read and write
1DD57FFE000
trusted library allocation
page read and write
1DD5FEE1000
trusted library allocation
page read and write
1DD4C753000
heap
page read and write
1DD4C788000
heap
page read and write
1E877960000
unclassified section
page read and write
1AE8D880000
heap
page read and write
1DD4C788000
heap
page read and write
1DD577FE000
trusted library allocation
page read and write
1DD58D19000
trusted library allocation
page read and write
1DD58DC1000
trusted library allocation
page read and write
1DD58092000
trusted library allocation
page read and write
1DD53975000
trusted library allocation
page read and write
DA0000
heap
page read and write
1DD4C770000
heap
page read and write
1DD53922000
trusted library allocation
page read and write
1DD5DE5F000
trusted library allocation
page read and write
1DD56075000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD57271000
trusted library allocation
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
1DD52A99000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1E877950000
heap
page readonly
1DD56E38000
trusted library allocation
page read and write
1DD5DCB1000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD4C7C6000
heap
page read and write
1DD4C765000
heap
page read and write
1DD530B3000
heap
page read and write
1DD55681000
trusted library allocation
page read and write
1DD56E5D000
trusted library allocation
page read and write
1DBB3AFC000
heap
page read and write
1DD5DE8D000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD556C2000
trusted library allocation
page read and write
1DD56FB6000
trusted library allocation
page read and write
1DD4C768000
heap
page read and write
1DD56059000
trusted library allocation
page read and write
1DD56A9E000
trusted library allocation
page read and write
BAC000
heap
page read and write
1DBB2C20000
unclassified section
page read and write
1DD4C75D000
heap
page read and write
1DD5D8C0000
trusted library allocation
page read and write
1DD570C8000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD55BFA000
trusted library allocation
page read and write
1E877B60000
trusted library allocation
page read and write
DDC000
heap
page read and write
DE1000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD53922000
trusted library allocation
page read and write
1DD51826000
trusted library allocation
page read and write
1DD6076D000
trusted library allocation
page read and write
1DD4C769000
heap
page read and write
1DD4C755000
heap
page read and write
1DD5DB95000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD56059000
trusted library allocation
page read and write
1DD52978000
trusted library allocation
page read and write
1DD56071000
trusted library allocation
page read and write
1DD5DECC000
trusted library allocation
page read and write
1DD577DD000
trusted library allocation
page read and write
1DD511C7000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD577BE000
trusted library allocation
page read and write
1DD5DCA2000
trusted library allocation
page read and write
1DD57047000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD4C771000
heap
page read and write
E83C77E000
stack
page read and write
1DD58069000
trusted library allocation
page read and write
D57000
heap
page read and write
1DD529F4000
trusted library allocation
page read and write
1DBB34B0000
heap
page read and write
1DD574E0000
trusted library allocation
page read and write
1DD56E59000
trusted library allocation
page read and write
1DD5F7A6000
trusted library allocation
page read and write
1DD57ED7000
trusted library allocation
page read and write
1DD5DE61000
trusted library allocation
page read and write
160835224000
trusted library allocation
page read and write
1DD581D3000
trusted library allocation
page read and write
1DD53095000
heap
page read and write
1DD56AE6000
trusted library allocation
page read and write
1DD5DCBD000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD4C7B9000
heap
page read and write
1DD58212000
trusted library allocation
page read and write
1DBB2C30000
trusted library allocation
page read and write
1DD5DCF8000
trusted library allocation
page read and write
1DD5F258000
trusted library allocation
page read and write
1DBB3B78000
heap
page read and write
1DD56E43000
trusted library allocation
page read and write
1DD58275000
trusted library allocation
page read and write
1DBB3B78000
heap
page read and write
1DD609FE000
trusted library allocation
page read and write
1DD59900000
trusted library allocation
page read and write
1DD58175000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
E83C73E000
unkown
page readonly
1DD5DE91000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DBB3AF1000
heap
page read and write
D9D000
heap
page read and write
1DD5D89A000
trusted library allocation
page read and write
1DD5419A000
trusted library allocation
page read and write
1DD56A60000
trusted library allocation
page read and write
1DD52A50000
trusted library allocation
page read and write
1DD57D70000
trusted library allocation
page read and write
1DD57DC3000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DBB3A8D000
heap
page read and write
1DD53977000
trusted library allocation
page read and write
1DD577D3000
trusted library allocation
page read and write
1DBB2F0C000
trusted library allocation
page read and write
1DD511EF000
trusted library allocation
page read and write
1DD57795000
trusted library allocation
page read and write
1DD559E0000
trusted library allocation
page read and write
236B4858000
heap
page read and write
1DD5804F000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD57598000
trusted library allocation
page read and write
1E877B5D000
trusted library allocation
page read and write
1DD563D1000
trusted library allocation
page read and write
CEB000
heap
page read and write
1DD5FEBD000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD580FD000
trusted library allocation
page read and write
1DD60C67000
trusted library allocation
page read and write
1DD590D1000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
4E983FE000
stack
page read and write
1DD5706E000
trusted library allocation
page read and write
1DD60FF7000
heap
page read and write
1DD578F4000
trusted library allocation
page read and write
1DD558A1000
trusted library allocation
page read and write
1DD5DBE2000
trusted library allocation
page read and write
1DD54159000
trusted library allocation
page read and write
1DD56391000
trusted library allocation
page read and write
1DD5D8F5000
trusted library allocation
page read and write
1DD55883000
trusted library allocation
page read and write
1DD5D937000
trusted library allocation
page read and write
CB6000
heap
page read and write
1DD563D4000
trusted library allocation
page read and write
1DD56365000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD561FE000
trusted library allocation
page read and write
DF3000
heap
page read and write
1DD593A7000
trusted library allocation
page read and write
1DD5DB63000
trusted library allocation
page read and write
1DD56E2A000
trusted library allocation
page read and write
B84000
heap
page read and write
1DD57ED1000
trusted library allocation
page read and write
DD8000
heap
page read and write
1DD5DEE0000
trusted library allocation
page read and write
1DD5D9B5000
trusted library allocation
page read and write
1DD5828F000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD581C1000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD52ABE000
trusted library allocation
page read and write
1DD5D9BA000
trusted library allocation
page read and write
1DD5DBE4000
trusted library allocation
page read and write
1DD472EB000
heap
page read and write
1DD518CD000
trusted library allocation
page read and write
1DD57543000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD4C779000
heap
page read and write
1DD4C765000
heap
page read and write
1DD54133000
trusted library allocation
page read and write
1DD56AAC000
trusted library allocation
page read and write
1DD582B1000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5D8AA000
trusted library allocation
page read and write
1DD559E8000
trusted library allocation
page read and write
1DD5762F000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD541A0000
trusted library allocation
page read and write
1DBB3AF1000
heap
page read and write
1DD4C77A000
heap
page read and write
1DD608D9000
trusted library allocation
page read and write
1DD4C76C000
heap
page read and write
191E1530000
heap
page read and write
1DD52A50000
trusted library allocation
page read and write
1DD57554000
trusted library allocation
page read and write
1DD577E4000
trusted library allocation
page read and write
1DD56E5D000
trusted library allocation
page read and write
1DD608CC000
trusted library allocation
page read and write
1DD5DBDC000
trusted library allocation
page read and write
EAD14403000
trusted library allocation
page read and write
1DBB2F23000
trusted library allocation
page read and write
1DD511EF000
trusted library allocation
page read and write
1DD57E9C000
trusted library allocation
page read and write
1DBB2F10000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD570A5000
trusted library allocation
page read and write
1DD5827E000
trusted library allocation
page read and write
1DD5F3B1000
trusted library allocation
page read and write
1DD5DCA0000
trusted library allocation
page read and write
1DD54184000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD57088000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD539C8000
trusted library allocation
page read and write
1DD57244000
trusted library allocation
page read and write
1DD578F7000
trusted library allocation
page read and write
1DD53099000
heap
page read and write
E83B5FE000
unkown
page readonly
1DD530B2000
heap
page read and write
1DD57447000
trusted library allocation
page read and write
1DD56E28000
trusted library allocation
page read and write
1DD56A16000
trusted library allocation
page read and write
1DD54160000
trusted library allocation
page read and write
1DD593E9000
trusted library allocation
page read and write
C63000
heap
page read and write
1DD530AF000
heap
page read and write
1DD4C7B0000
heap
page read and write
1DD5826A000
trusted library allocation
page read and write
9DD5D8000
stack
page read and write
5A7BFE000
stack
page read and write
1DD5DC79000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DD4C765000
heap
page read and write
1DD55B92000
trusted library allocation
page read and write
1DD57225000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD5807B000
trusted library allocation
page read and write
191E1AA6000
trusted library allocation
page read and write
1DD530B2000
heap
page read and write
1DD4C770000
heap
page read and write
1DD5F733000
trusted library allocation
page read and write
1DD55674000
trusted library allocation
page read and write
191E1A11000
trusted library allocation
page read and write
1DD57482000
trusted library allocation
page read and write
1DD577E4000
trusted library allocation
page read and write
1DD57459000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5816D000
trusted library allocation
page read and write
1DD57373000
trusted library allocation
page read and write
1DD5736B000
trusted library allocation
page read and write
1DD5612B000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD57533000
trusted library allocation
page read and write
1DD559B4000
trusted library allocation
page read and write
1DD52990000
trusted library allocation
page read and write
1DD5DB6C000
trusted library allocation
page read and write
1DD5DCA6000
trusted library allocation
page read and write
1DD57F5C000
trusted library allocation
page read and write
DBF000
heap
page read and write
1DD60E95000
heap
page read and write
1DD56E60000
trusted library allocation
page read and write
1DD4C7BC000
heap
page read and write
1DD4C789000
heap
page read and write
1DD5D813000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
DE8000
heap
page read and write
1DD5DBEC000
trusted library allocation
page read and write
1DD559D0000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD57D4C000
trusted library allocation
page read and write
191E1360000
unclassified section
page readonly
1DD56E6E000
trusted library allocation
page read and write
1DD5D898000
trusted library allocation
page read and write
1DD5D9FE000
trusted library allocation
page read and write
1DD57586000
trusted library allocation
page read and write
1DD55980000
trusted library allocation
page read and write
1DD4C7C1000
heap
page read and write
1DD5745C000
trusted library allocation
page read and write
E83B6BB000
stack
page read and write
1DD57ECB000
trusted library allocation
page read and write
1DD57CB3000
trusted library allocation
page read and write
1DD574FB000
trusted library allocation
page read and write
1DD57492000
trusted library allocation
page read and write
DC8000
heap
page read and write
1DD4C74E000
heap
page read and write
1DD5724B000
trusted library allocation
page read and write
1DD577D0000
trusted library allocation
page read and write
1DD60EE6000
heap
page read and write
1DD57551000
trusted library allocation
page read and write
1DD4C75C000
heap
page read and write
1DD4C755000
heap
page read and write
1DD563C3000
trusted library allocation
page read and write
1DD581AE000
trusted library allocation
page read and write
1DD5DE59000
trusted library allocation
page read and write
1DD574AE000
trusted library allocation
page read and write
1DD575E2000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD5DFEA000
trusted library allocation
page read and write
1DD57460000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DBB3AE8000
heap
page read and write
1DD5F7F1000
trusted library allocation
page read and write
1DD5778B000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD55998000
trusted library allocation
page read and write
1DD56059000
trusted library allocation
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD591AE000
trusted library allocation
page read and write
1DD561EE000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD56A8F000
trusted library allocation
page read and write
1DD560F7000
trusted library allocation
page read and write
1DD56066000
trusted library allocation
page read and write
1DD54149000
trusted library allocation
page read and write
1DD55B9A000
trusted library allocation
page read and write
1DD52ABC000
trusted library allocation
page read and write
1DD570A0000
trusted library allocation
page read and write
1DD56D9D000
trusted library allocation
page read and write
1DD572E3000
trusted library allocation
page read and write
1DD57016000
trusted library allocation
page read and write
1DD58E33000
trusted library allocation
page read and write
1DBB2F7A000
trusted library allocation
page read and write
1DD5DEF9000
trusted library allocation
page read and write
1DD58138000
trusted library allocation
page read and write
1DD5DBB8000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD5786E000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
DBF000
heap
page read and write
1DD577B0000
trusted library allocation
page read and write
1DD4C774000
heap
page read and write
1DD54160000
trusted library allocation
page read and write
1DD577DB000
trusted library allocation
page read and write
1DD54127000
trusted library allocation
page read and write
1DD574A9000
trusted library allocation
page read and write
1DD5D8EF000
trusted library allocation
page read and write
1DD5DE65000
trusted library allocation
page read and write
191E1A69000
trusted library allocation
page read and write
1DD560C3000
trusted library allocation
page read and write
D9D000
heap
page read and write
1DD5732B000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD582D1000
trusted library allocation
page read and write
1DD518EA000
trusted library allocation
page read and write
1E877B96000
trusted library allocation
page read and write
1DD574E0000
trusted library allocation
page read and write
DF4000
heap
page read and write
1DD58166000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD5727B000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5DE57000
trusted library allocation
page read and write
1DD527B4000
trusted library allocation
page read and write
1DD5784A000
trusted library allocation
page read and write
1DD5DA75000
trusted library allocation
page read and write
1DD56087000
trusted library allocation
page read and write
DBF000
heap
page read and write
1DD57594000
trusted library allocation
page read and write
1DD575B4000
trusted library allocation
page read and write
1DD60967000
trusted library allocation
page read and write
1DBB3AE3000
heap
page read and write
1DD5D7BF000
trusted library allocation
page read and write
1DD5759E000
trusted library allocation
page read and write
1DD58EA8000
trusted library allocation
page read and write
1DD55BA9000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DBB3B3C000
heap
page read and write
1DD6077A000
trusted library allocation
page read and write
1DD5744B000
trusted library allocation
page read and write
1DBB3A69000
heap
page read and write
1DD570E5000
trusted library allocation
page read and write
1DD57D25000
trusted library allocation
page read and write
1E877B16000
trusted library allocation
page read and write
1DD57240000
trusted library allocation
page read and write
1DD572A5000
trusted library allocation
page read and write
201000
unkown
page execute read
1DD60FDF000
heap
page read and write
1AE8D58A000
heap
page read and write
1DD4C7B9000
heap
page read and write
1DBB3AE3000
heap
page read and write
1DD5D782000
trusted library allocation
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD58EFD000
trusted library allocation
page read and write
1DD5DBAB000
trusted library allocation
page read and write
DB9000
heap
page read and write
1DBB3AF1000
heap
page read and write
E83BF3E000
stack
page read and write
1DBB2C6A000
heap
page read and write
1DD58092000
trusted library allocation
page read and write
1DD5936B000
trusted library allocation
page read and write
1DD578D7000
trusted library allocation
page read and write
1DD4C778000
heap
page read and write
1DD57213000
trusted library allocation
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD5DBD0000
trusted library allocation
page read and write
DD2000
heap
page read and write
1E877C00000
trusted library allocation
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD574B5000
trusted library allocation
page read and write
1DD53977000
trusted library allocation
page read and write
200000
unkown
page readonly
236B4859000
heap
page read and write
1DD55697000
trusted library allocation
page read and write
9DCBEE000
unkown
page readonly
1DD5754C000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DD5820D000
trusted library allocation
page read and write
1DD60E95000
heap
page read and write
1DBB3B18000
heap
page read and write
1DD5DE86000
trusted library allocation
page read and write
DA4000
heap
page read and write
BF5000
heap
page read and write
1DD55667000
trusted library allocation
page read and write
1DD59BF9000
trusted library allocation
page read and write
1DD5FFDE000
trusted library allocation
page read and write
1DBB3AE1000
heap
page read and write
DC9000
heap
page read and write
1DD572BF000
trusted library allocation
page read and write
DC7000
heap
page read and write
1E877760000
remote allocation
page read and write
1DD57D36000
trusted library allocation
page read and write
DA4000
heap
page read and write
1E877B2E000
trusted library allocation
page read and write
1DD51190000
trusted library allocation
page read and write
1DD580B1000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
236B2F00000
trusted library allocation
page read and write
1DD539D8000
trusted library allocation
page read and write
1DD57083000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD5D8B8000
trusted library allocation
page read and write
1DD529B0000
trusted library allocation
page read and write
1DD58E6D000
trusted library allocation
page read and write
1DD5744E000
trusted library allocation
page read and write
1DD58DDB000
trusted library allocation
page read and write
1DD5DFCB000
trusted library allocation
page read and write
1DD5638C000
trusted library allocation
page read and write
1DD527AB000
trusted library allocation
page read and write
1DD57780000
trusted library allocation
page read and write
1DD5DE8F000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD4C783000
heap
page read and write
1DD530AF000
heap
page read and write
CEB000
heap
page read and write
B7B000
heap
page read and write
1DD5DE4F000
trusted library allocation
page read and write
1DD55691000
trusted library allocation
page read and write
1DD60600000
trusted library allocation
page read and write
1DD54143000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD577DA000
trusted library allocation
page read and write
DD3000
heap
page read and write
1DD58D48000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD56E6C000
trusted library allocation
page read and write
1DD5DEB0000
trusted library allocation
page read and write
1DD5639C000
trusted library allocation
page read and write
1DD57240000
trusted library allocation
page read and write
1DD5DEBA000
trusted library allocation
page read and write
1DD577E1000
trusted library allocation
page read and write
1DD58175000
trusted library allocation
page read and write
1E877800000
heap
page read and write
DE6000
heap
page read and write
E83C7BE000
unkown
page readonly
DA4000
heap
page read and write
1DD559B6000
trusted library allocation
page read and write
1DD578DD000
trusted library allocation
page read and write
1DD57375000
trusted library allocation
page read and write
1DD61696000
trusted library allocation
page read and write
1DD53928000
trusted library allocation
page read and write
1DD55665000
trusted library allocation
page read and write
E839DD8000
stack
page read and write
1AE8D6C0000
heap
page read and write
1DD57B36000
trusted library allocation
page read and write
1DD570C5000
trusted library allocation
page read and write
1DD5D967000
trusted library allocation
page read and write
1DD5DE49000
trusted library allocation
page read and write
1DD56020000
trusted library allocation
page read and write
1DD57588000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
DDF000
heap
page read and write
1DD581AE000
trusted library allocation
page read and write
1DD56A65000
trusted library allocation
page read and write
1DD60E9F000
heap
page read and write
1DD578A9000
trusted library allocation
page read and write
DBF000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD5DEE0000
trusted library allocation
page read and write
1DD57327000
trusted library allocation
page read and write
1DD55693000
trusted library allocation
page read and write
1DD577F9000
trusted library allocation
page read and write
1DD55692000
trusted library allocation
page read and write
1DD5DBD6000
trusted library allocation
page read and write
1DD582B1000
trusted library allocation
page read and write
CA0000
heap
page read and write
DD2000
heap
page read and write
1DD52756000
trusted library allocation
page read and write
5A83FE000
unkown
page readonly
1DD60C6F000
trusted library allocation
page read and write
1DD52B27000
trusted library allocation
page read and write
1DBB3A69000
heap
page read and write
1DD57088000
trusted library allocation
page read and write
1DD51189000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
191E1A0C000
trusted library allocation
page read and write
1DD56E60000
trusted library allocation
page read and write
1DD530A8000
heap
page read and write
1DD5DE72000
trusted library allocation
page read and write
CA0000
heap
page read and write
1DD530AF000
heap
page read and write
1DD4C75C000
heap
page read and write
1DD5DCCB000
trusted library allocation
page read and write
1DD572D2000
trusted library allocation
page read and write
1DD609C9000
trusted library allocation
page read and write
1DD5703C000
trusted library allocation
page read and write
1DD5DFFA000
trusted library allocation
page read and write
1DD57D8A000
trusted library allocation
page read and write
1DD590F4000
trusted library allocation
page read and write
1DD58D77000
trusted library allocation
page read and write
1DD607D8000
trusted library allocation
page read and write
1DD57070000
trusted library allocation
page read and write
1DD55B25000
trusted library allocation
page read and write
BCF000
heap
page read and write
1DD559F2000
trusted library allocation
page read and write
1DD5818E000
trusted library allocation
page read and write
1DD5615A000
trusted library allocation
page read and write
1DD5D99E000
trusted library allocation
page read and write
1DD577C8000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD53972000
trusted library allocation
page read and write
1DD593AF000
trusted library allocation
page read and write
1DD57866000
trusted library allocation
page read and write
1DD577F8000
trusted library allocation
page read and write
1DD5F401000
trusted library allocation
page read and write
1DD56A0F000
trusted library allocation
page read and write
1DD53961000
trusted library allocation
page read and write
1DD57032000
trusted library allocation
page read and write
191E1A45000
trusted library allocation
page read and write
1DD56E43000
trusted library allocation
page read and write
1DD5D89B000
trusted library allocation
page read and write
1DD5D956000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1E877C1F000
trusted library allocation
page read and write
1DD580B6000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD52AA1000
trusted library allocation
page read and write
236B2C43000
heap
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD5789A000
trusted library allocation
page read and write
1DD4C7C6000
heap
page read and write
1DD57346000
trusted library allocation
page read and write
1DD60C55000
trusted library allocation
page read and write
1DD5DEE4000
trusted library allocation
page read and write
1DD58124000
trusted library allocation
page read and write
BD0000
heap
page read and write
4E99BFF000
stack
page read and write
1DD5DCB1000
trusted library allocation
page read and write
1DD577FC000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DBB3AF1000
heap
page read and write
1DD57E96000
trusted library allocation
page read and write
1DD57551000
trusted library allocation
page read and write
1DBB2F78000
trusted library allocation
page read and write
1DD574F8000
trusted library allocation
page read and write
1DD56ADF000
trusted library allocation
page read and write
1DD5D9FA000
trusted library allocation
page read and write
1DD59B59000
trusted library allocation
page read and write
1DD4C778000
heap
page read and write
1DD56A88000
trusted library allocation
page read and write
1DD56E75000
trusted library allocation
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD5779A000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
191E1B08000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
BD3000
heap
page read and write
1DD6097E000
trusted library allocation
page read and write
1DD5F304000
trusted library allocation
page read and write
1DD5744B000
trusted library allocation
page read and write
1DD58260000
trusted library allocation
page read and write
1DD52A56000
trusted library allocation
page read and write
1DBB34A0000
heap
page read and write
1DD572F8000
trusted library allocation
page read and write
1DD5DB98000
trusted library allocation
page read and write
1DD574C6000
trusted library allocation
page read and write
1DD4C7C1000
heap
page read and write
1DD570AD000
trusted library allocation
page read and write
1DD570E8000
trusted library allocation
page read and write
1DD5DC95000
trusted library allocation
page read and write
1DD57D60000
trusted library allocation
page read and write
1DD4C7BB000
heap
page read and write
1DD5D967000
trusted library allocation
page read and write
B74000
heap
page read and write
DAB000
heap
page read and write
1DD5DED5000
trusted library allocation
page read and write
B58000
heap
page read and write
1DD561C2000
trusted library allocation
page read and write
1DD59BFC000
trusted library allocation
page read and write
1DD4C782000
heap
page read and write
BC4000
heap
page read and write
1DD5727B000
trusted library allocation
page read and write
1DD580FA000
trusted library allocation
page read and write
DF4000
heap
page read and write
1DD575E2000
trusted library allocation
page read and write
1E87778A000
heap
page read and write
1DD5DC7B000
trusted library allocation
page read and write
1DD5DCB3000
trusted library allocation
page read and write
236B2BB0000
heap
page read and write
1DD5F2C1000
trusted library allocation
page read and write
DBF000
heap
page read and write
1DD53928000
trusted library allocation
page read and write
1DBB2F00000
trusted library allocation
page read and write
1DD5804B000
trusted library allocation
page read and write
1DD56EAD000
trusted library allocation
page read and write
1DD572E0000
trusted library allocation
page read and write
1DD5595B000
trusted library allocation
page read and write
1DD609B7000
trusted library allocation
page read and write
1DD5DE6E000
trusted library allocation
page read and write
1DD58EAD000
trusted library allocation
page read and write
1DD582E0000
trusted library allocation
page read and write
1DD5DEBA000
trusted library allocation
page read and write
1DD561EE000
trusted library allocation
page read and write
1DD559E0000
trusted library allocation
page read and write
1DD5172F000
trusted library allocation
page read and write
DBC000
heap
page read and write
1DD57FFB000
trusted library allocation
page read and write
1DD5723B000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
5A8D3E000
stack
page read and write
1DD561FC000
trusted library allocation
page read and write
1DD5DBC6000
trusted library allocation
page read and write
1DD472E0000
heap
page read and write
1DD4C776000
heap
page read and write
CC5000
heap
page read and write
1DD530D6000
heap
page read and write
1DD5804F000
trusted library allocation
page read and write
1DD581E5000
trusted library allocation
page read and write
DFF000
heap
page read and write
1DD5DC95000
trusted library allocation
page read and write
1DD5F2FC000
trusted library allocation
page read and write
1DD5DFFA000
trusted library allocation
page read and write
1DD572D4000
trusted library allocation
page read and write
1DD55658000
trusted library allocation
page read and write
1DD57011000
trusted library allocation
page read and write
1DD559DB000
trusted library allocation
page read and write
236B2C17000
heap
page read and write
1DD59370000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD574B3000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD55B1C000
trusted library allocation
page read and write
1DD57685000
trusted library allocation
page read and write
1DD53911000
trusted library allocation
page read and write
1DD5DEF9000
trusted library allocation
page read and write
1DD5D8E9000
trusted library allocation
page read and write
1DD472F4000
heap
page read and write
1DD608FD000
trusted library allocation
page read and write
1DD5919D000
trusted library allocation
page read and write
1DD5724B000
trusted library allocation
page read and write
1DD5759E000
trusted library allocation
page read and write
1DD5DBF3000
trusted library allocation
page read and write
1DD5818E000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD578B5000
trusted library allocation
page read and write
1DD580CA000
trusted library allocation
page read and write
C43000
heap
page read and write
1DD61662000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD4C7B0000
heap
page read and write
1DD572BF000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1E8779E4000
heap
page read and write
1E877820000
heap
page read and write
1DD4C774000
heap
page read and write
1DD5DBD9000
trusted library allocation
page read and write
1DD5DBD0000
trusted library allocation
page read and write
1DD4C76A000
heap
page read and write
1DD5DF0B000
trusted library allocation
page read and write
1DD530A0000
heap
page read and write
1DD4C76B000
heap
page read and write
DF7000
heap
page read and write
1DD5729C000
trusted library allocation
page read and write
1DD5601E000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD577D1000
trusted library allocation
page read and write
1DBB3A7D000
heap
page read and write
1DD56143000
trusted library allocation
page read and write
1DD582C6000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
B92000
heap
page read and write
DAF000
heap
page read and write
1DD5DBD9000
trusted library allocation
page read and write
1DD575D1000
trusted library allocation
page read and write
1DD5D988000
trusted library allocation
page read and write
1DD577CB000
trusted library allocation
page read and write
1DBB2F9F000
trusted library allocation
page read and write
1DD5727B000
trusted library allocation
page read and write
1DD5757E000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD57795000
trusted library allocation
page read and write
1DD4C7B9000
heap
page read and write
1DD582A5000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD577A6000
trusted library allocation
page read and write
1DD581C1000
trusted library allocation
page read and write
1DD57235000
trusted library allocation
page read and write
1DD5826F000
trusted library allocation
page read and write
1DD5778B000
trusted library allocation
page read and write
1DD517FE000
trusted library allocation
page read and write
1DD4C76B000
heap
page read and write
1DD563A5000
trusted library allocation
page read and write
1DD57235000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD5DBD9000
trusted library allocation
page read and write
1DD5DE49000
trusted library allocation
page read and write
1DD575F3000
trusted library allocation
page read and write
1DD58221000
trusted library allocation
page read and write
1DD5752D000
trusted library allocation
page read and write
1DD57384000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
BCF000
heap
page read and write
1DD58169000
trusted library allocation
page read and write
1DD5F7AB000
trusted library allocation
page read and write
1DD6097E000
trusted library allocation
page read and write
DE8000
heap
page read and write
1DD591B0000
trusted library allocation
page read and write
1DD57274000
trusted library allocation
page read and write
1DD5FEE1000
trusted library allocation
page read and write
1DD55863000
trusted library allocation
page read and write
5A847E000
stack
page read and write
1DD5DE37000
trusted library allocation
page read and write
3B0000
heap
page read and write
1DD5418E000
trusted library allocation
page read and write
1DD5F404000
trusted library allocation
page read and write
1DD559B9000
trusted library allocation
page read and write
1DD559AE000
trusted library allocation
page read and write
1DD57382000
trusted library allocation
page read and write
1DD530A3000
heap
page read and write
1DD5DE5B000
trusted library allocation
page read and write
1DD5F389000
trusted library allocation
page read and write
2C2000
unkown
page readonly
1DD4C76B000
heap
page read and write
1DD4C789000
heap
page read and write
1DD530D6000
heap
page read and write
1DD56395000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD4C78D000
heap
page read and write
1DD4C764000
heap
page read and write
1DD56E65000
trusted library allocation
page read and write
1DD5829C000
trusted library allocation
page read and write
1DD559BA000
trusted library allocation
page read and write
1DD4C74F000
heap
page read and write
1DD4C770000
heap
page read and write
DFC000
heap
page read and write
1DD5FEE1000
trusted library allocation
page read and write
1DD582F0000
trusted library allocation
page read and write
1DD58EED000
trusted library allocation
page read and write
1DD559A6000
trusted library allocation
page read and write
1E87796F000
unclassified section
page read and write
1DD5D800000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD530B2000
heap
page read and write
1DD574FC000
trusted library allocation
page read and write
1E877B64000
trusted library allocation
page read and write
1DD5745E000
trusted library allocation
page read and write
1DD5DCAD000
trusted library allocation
page read and write
1DD5DFE2000
trusted library allocation
page read and write
B7D000
heap
page read and write
1DD5DEB0000
trusted library allocation
page read and write
1DD5D78C000
trusted library allocation
page read and write
1DD57098000
trusted library allocation
page read and write
1DD4C779000
heap
page read and write
1DD5778C000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD5DFF1000
trusted library allocation
page read and write
1DD5779A000
trusted library allocation
page read and write
1DD5FEE1000
trusted library allocation
page read and write
1DBB3B22000
heap
page read and write
1DD5DE9E000
trusted library allocation
page read and write
1DD55B9A000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD4C764000
heap
page read and write
1DD539D9000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DD57785000
trusted library allocation
page read and write
1DD56EBC000
trusted library allocation
page read and write
191E1ABA000
trusted library allocation
page read and write
1DD4C783000
heap
page read and write
1DD60E95000
heap
page read and write
1DD4C74E000
heap
page read and write
1DD59370000
trusted library allocation
page read and write
1DD52ADE000
trusted library allocation
page read and write
1DD57447000
trusted library allocation
page read and write
1DD5410F000
trusted library allocation
page read and write
1DD56E51000
trusted library allocation
page read and write
1DD5DEF9000
trusted library allocation
page read and write
1DD56078000
trusted library allocation
page read and write
1DD56E5D000
trusted library allocation
page read and write
1DD5DE7A000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD5DC87000
trusted library allocation
page read and write
1DD561EE000
trusted library allocation
page read and write
1DD559AA000
trusted library allocation
page read and write
1DD56A91000
trusted library allocation
page read and write
1DD4C7C1000
heap
page read and write
BC5000
heap
page read and write
1DD5DE9E000
trusted library allocation
page read and write
1DD58273000
trusted library allocation
page read and write
E83B73E000
unkown
page readonly
1DD57257000
trusted library allocation
page read and write
1DD5D7E8000
trusted library allocation
page read and write
191E1AAB000
trusted library allocation
page read and write
1DD577D3000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD58C60000
trusted library allocation
page read and write
1DD4C750000
heap
page read and write
1DD541D2000
trusted library allocation
page read and write
1DD5DB3A000
trusted library allocation
page read and write
1DD578DB000
trusted library allocation
page read and write
1DD539EC000
trusted library allocation
page read and write
9DF67E000
stack
page read and write
1DD4C774000
heap
page read and write
1DD52976000
trusted library allocation
page read and write
1DD57760000
trusted library allocation
page read and write
DC3000
heap
page read and write
1DD58E5C000
trusted library allocation
page read and write
1DD4C778000
heap
page read and write
1DD5DBF8000
trusted library allocation
page read and write
1DD57543000
trusted library allocation
page read and write
C2D000
heap
page read and write
1DD5DBED000
trusted library allocation
page read and write
1DD56A78000
trusted library allocation
page read and write
1DD57D95000
trusted library allocation
page read and write
1DD5DF0E000
trusted library allocation
page read and write
DC3000
heap
page read and write
1DD560E5000
trusted library allocation
page read and write
1DD5F79D000
trusted library allocation
page read and write
1DD527FB000
trusted library allocation
page read and write
E83D03E000
stack
page read and write
DBF000
heap
page read and write
1DD58CD9000
trusted library allocation
page read and write
1DD5D9A4000
trusted library allocation
page read and write
1DD581F0000
trusted library allocation
page read and write
1DD530AF000
heap
page read and write
1DD530B7000
heap
page read and write
1DD5726D000
trusted library allocation
page read and write
1DD60FDF000
heap
page read and write
1DD5588B000
trusted library allocation
page read and write
1DD530D5000
heap
page read and write
1DD5D7A6000
trusted library allocation
page read and write
1DD56FAF000
trusted library allocation
page read and write
2D4000
unkown
page readonly
1DD56D53000
trusted library allocation
page read and write
1DD4C7C6000
heap
page read and write
1DD541AC000
trusted library allocation
page read and write
1DD559E3000
trusted library allocation
page read and write
DCF000
heap
page read and write
1DD4C7C1000
heap
page read and write
1DD5D9B0000
trusted library allocation
page read and write
1DD55B1C000
trusted library allocation
page read and write
DE7000
heap
page read and write
1DD56E79000
trusted library allocation
page read and write
1DD5F3CA000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD559F2000
trusted library allocation
page read and write
1DD5DB8E000
trusted library allocation
page read and write
1DD55883000
trusted library allocation
page read and write
1DD58226000
trusted library allocation
page read and write
1DD5FE8E000
trusted library allocation
page read and write
1DD4C755000
heap
page read and write
1DD574CE000
trusted library allocation
page read and write
1DD57447000
trusted library allocation
page read and write
1DD56107000
trusted library allocation
page read and write
1DD5DBF8000
trusted library allocation
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD5639C000
trusted library allocation
page read and write
1DD5774F000
trusted library allocation
page read and write
1DD5DFB8000
trusted library allocation
page read and write
1DD56A23000
trusted library allocation
page read and write
1DD56E79000
trusted library allocation
page read and write
1DD5567B000
trusted library allocation
page read and write
1DD4C777000
heap
page read and write
1DD5F2D6000
trusted library allocation
page read and write
C6F000
heap
page read and write
1DD5DB5C000
trusted library allocation
page read and write
1DBB2F74000
trusted library allocation
page read and write
1DD55B55000
trusted library allocation
page read and write
1DD5566D000
trusted library allocation
page read and write
1DD559FB000
trusted library allocation
page read and write
191E13DA000
remote allocation
page execute read
1DD56F72000
trusted library allocation
page read and write
1DD5DFDA000
trusted library allocation
page read and write
1DBB3AFC000
heap
page read and write
1DD5FEE8000
trusted library allocation
page read and write
BAB000
heap
page read and write
1DBB3B78000
heap
page read and write
1DD5DE61000
trusted library allocation
page read and write
1DD57780000
trusted library allocation
page read and write
1DBB3A60000
heap
page read and write
1DD5DFC6000
trusted library allocation
page read and write
1DD530AC000
heap
page read and write
29C000
unkown
page readonly
DBE000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD570A0000
trusted library allocation
page read and write
1DBB3B22000
heap
page read and write
1DD4C77E000
heap
page read and write
1DBB3906000
trusted library allocation
page read and write
1DD58175000
trusted library allocation
page read and write
C6C000
heap
page read and write
B83000
heap
page read and write
1DD4C789000
heap
page read and write
1DD559E0000
trusted library allocation
page read and write
1DD570AA000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD561EE000
trusted library allocation
page read and write
1DD5DCBD000
trusted library allocation
page read and write
1DBB2CF9000
unkown
page execute read
1DD4C76B000
heap
page read and write
1DD61504000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DD5DBF8000
trusted library allocation
page read and write
DD2000
heap
page read and write
1DD574F0000
trusted library allocation
page read and write
1DD55638000
trusted library allocation
page read and write
1DD5598B000
trusted library allocation
page read and write
1DD55B40000
trusted library allocation
page read and write
CD7000
heap
page read and write
1E877B79000
trusted library allocation
page read and write
1DBB3B6A000
heap
page read and write
1DD5FF5B000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD5DEE0000
trusted library allocation
page read and write
1DD57E9C000
trusted library allocation
page read and write
1E877C0C000
trusted library allocation
page read and write
1DD572FA000
trusted library allocation
page read and write
1DD593AB000
trusted library allocation
page read and write
1DD5F7AF000
trusted library allocation
page read and write
1DBB3A60000
heap
page read and write
1DD5818D000
trusted library allocation
page read and write
1DD5F366000
trusted library allocation
page read and write
1DD530CB000
heap
page read and write
BD4000
heap
page read and write
1DD591B0000
trusted library allocation
page read and write
1DD51771000
trusted library allocation
page read and write
B7C000
heap
page read and write
D0E000
heap
page read and write
1DD530D6000
heap
page read and write
1DD4C755000
heap
page read and write
1DD5418B000
trusted library allocation
page read and write
1DD5DE74000
trusted library allocation
page read and write
1DBB3B59000
heap
page read and write
1DD57F9A000
trusted library allocation
page read and write
1DD5F712000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD57068000
trusted library allocation
page read and write
1DD5391F000
trusted library allocation
page read and write
1DD57558000
trusted library allocation
page read and write
236B486D000
heap
page read and write
1DD4C755000
heap
page read and write
1DD511B3000
trusted library allocation
page read and write
1DD4C75F000
heap
page read and write
CC6000
heap
page read and write
1DD559B6000
trusted library allocation
page read and write
1DD4C75C000
heap
page read and write
1880000
heap
page read and write
CA0000
heap
page read and write
1DD55842000
trusted library allocation
page read and write
1DD4C764000
heap
page read and write
1DD472EB000
heap
page read and write
DB9000
heap
page read and write
1DD55BFA000
trusted library allocation
page read and write
1AE8D700000
trusted library allocation
page read and write
1DD5566D000
trusted library allocation
page read and write
1DD58D36000
trusted library allocation
page read and write
1DD5765A000
trusted library allocation
page read and write
1DD58275000
trusted library allocation
page read and write
1DD5778B000
trusted library allocation
page read and write
1DD4C75D000
heap
page read and write
1DD5DBF6000
trusted library allocation
page read and write
1DD5DB37000
trusted library allocation
page read and write
1DD582A0000
trusted library allocation
page read and write
1DD608CD000
trusted library allocation
page read and write
1DD580CA000
trusted library allocation
page read and write
1DD57853000
trusted library allocation
page read and write
1DD575AB000
trusted library allocation
page read and write
BC5000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD511AA000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD58D0A000
trusted library allocation
page read and write
1DD5723B000
trusted library allocation
page read and write
1DD5607F000
trusted library allocation
page read and write
1DD575A6000
trusted library allocation
page read and write
1DD572D2000
trusted library allocation
page read and write
1DD58EF8000
trusted library allocation
page read and write
1DD4C75C000
heap
page read and write
E00000
heap
page read and write
1DD61022000
heap
page read and write
1DD529D7000
trusted library allocation
page read and write
1DD55BE1000
trusted library allocation
page read and write
1DD57460000
trusted library allocation
page read and write
1DD575DF000
trusted library allocation
page read and write
1DD55BBF000
trusted library allocation
page read and write
1DD4C788000
heap
page read and write
1DD5DCB3000
trusted library allocation
page read and write
9E0E7E000
unkown
page readonly
1DD5D9BF000
trusted library allocation
page read and write
1DD58260000
trusted library allocation
page read and write
1DD5DCAD000
trusted library allocation
page read and write
1DD60C91000
trusted library allocation
page read and write
1DD5754C000
trusted library allocation
page read and write
191E1A00000
trusted library allocation
page read and write
1DD608F5000
trusted library allocation
page read and write
1DD518F2000
trusted library allocation
page read and write
1DD5DFBA000
trusted library allocation
page read and write
1DD5DA50000
trusted library allocation
page read and write
1DD57240000
trusted library allocation
page read and write
1DD582F0000
trusted library allocation
page read and write
1DD5DFBA000
trusted library allocation
page read and write
1DD4C7CB000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD57EDA000
trusted library allocation
page read and write
1DD574C4000
trusted library allocation
page read and write
1DD60F77000
heap
page read and write
1DD4C76E000
heap
page read and write
1DD56E31000
trusted library allocation
page read and write
1DBB3A8A000
heap
page read and write
D88000
heap
page read and write
1DD4C77E000
heap
page read and write
1DD61678000
trusted library allocation
page read and write
1DD5598D000
trusted library allocation
page read and write
1DD575DF000
trusted library allocation
page read and write
1DD61022000
heap
page read and write
1DD56A2F000
trusted library allocation
page read and write
1DD6153B000
trusted library allocation
page read and write
E04000
heap
page read and write
1DD57B58000
trusted library allocation
page read and write
1DD58162000
trusted library allocation
page read and write
1DBB2C60000
heap
page read and write
E10000
heap
page read and write
1DD56E5D000
trusted library allocation
page read and write
1DD4C77E000
heap
page read and write
1DD56EA8000
trusted library allocation
page read and write
1DD58DC3000
trusted library allocation
page read and write
1DD57D7C000
trusted library allocation
page read and write
236B2C31000
heap
page read and write
1DD530B3000
heap
page read and write
1DD56A09000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
1DBB3B79000
heap
page read and write
1DD57781000
trusted library allocation
page read and write
1DD57B15000
trusted library allocation
page read and write
1DD5DE71000
trusted library allocation
page read and write
1DD582C5000
trusted library allocation
page read and write
1DD5DC73000
trusted library allocation
page read and write
1DD56ED2000
trusted library allocation
page read and write
1DD4C781000
heap
page read and write
1DD593AF000
trusted library allocation
page read and write
1DD57596000
trusted library allocation
page read and write
1DD53095000
heap
page read and write
1DD5639E000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
1DD4C7C2000
heap
page read and write
1DD4C781000
heap
page read and write
1DD5F71E000
trusted library allocation
page read and write
1DD4C7B2000
heap
page read and write
1DD4C765000
heap
page read and write
224ECE91000
trusted library allocation
page execute read
1DD57207000
trusted library allocation
page read and write
1DD56044000
trusted library allocation
page read and write
1DBB3A6C000
heap
page read and write
1DD4C75D000
heap
page read and write
1DD56EEE000
trusted library allocation
page read and write
1DD5F424000
trusted library allocation
page read and write
1DD575A6000
trusted library allocation
page read and write
1DD575CB000
trusted library allocation
page read and write
1DD4C770000
heap
page read and write
9DEDFE000
unkown
page readonly
1DD4C783000
heap
page read and write
1DD527AB000
trusted library allocation
page read and write
1DD4C77A000
heap
page read and write
E0B000
heap
page read and write
1DD56ED8000
trusted library allocation
page read and write
DF5000
heap
page read and write
1DD4C754000
heap
page read and write
1DD5804B000
trusted library allocation
page read and write
B7E000
heap
page read and write
1DD56395000
trusted library allocation
page read and write
1DD5744D000
trusted library allocation
page read and write
1DD5F768000
trusted library allocation
page read and write
1DD561CC000
trusted library allocation
page read and write
DAF000
heap
page read and write
1DD577D0000
trusted library allocation
page read and write
E17000
heap
page read and write
1DD4C7BE000
heap
page read and write
191E1AD8000
trusted library allocation
page read and write
1DD582C5000
trusted library allocation
page read and write
1DD55B60000
trusted library allocation
page read and write
1DD56E5D000
trusted library allocation
page read and write
1DD57553000
trusted library allocation
page read and write
BC6000
heap
page read and write
1DD59AAE000
trusted library allocation
page read and write
1DD4C77F000
heap
page read and write
1DBB3A7F000
heap
page read and write
1DD5D896000
trusted library allocation
page read and write
5A953E000
unkown
page readonly
1DD570CB000
trusted library allocation
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD527AB000
trusted library allocation
page read and write
1DD58071000
trusted library allocation
page read and write
1DD558D7000
trusted library allocation
page read and write
1DD581AE000
trusted library allocation
page read and write
1DD5F790000
trusted library allocation
page read and write
1DD530D6000
heap
page read and write
1DD5778D000
trusted library allocation
page read and write
1DD4C765000
heap
page read and write
1DD57EA6000
trusted library allocation
page read and write
1DD570D8000
trusted library allocation
page read and write
1DD563D4000
trusted library allocation
page read and write
1DD56A49000
trusted library allocation
page read and write
1DD5738C000
trusted library allocation
page read and write
1E877B7D000
trusted library allocation
page read and write
1DD59055000
trusted library allocation
page read and write
1DBB2F64000
trusted library allocation
page read and write
DF3000
heap
page read and write
1DD57061000
trusted library allocation
page read and write
1DD4C789000
heap
page read and write
1DD61527000
trusted library allocation
page read and write
1DD55890000
trusted library allocation
page read and write
1DD5DC62000
trusted library allocation
page read and write
1DD607AC000
trusted library allocation
page read and write
There are 4090 hidden memdumps, click here to show them.