IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d3450d45-af27-4057-91d8-01ac5afd9f15.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d3450d45-af27-4057-91d8-01ac5afd9f15.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\prefs-1.js
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\prefs.js (copy)
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\saved-telemetry-pings\07134cc5-5a30-4414-8d77-09b523f924b2 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\saved-telemetry-pings\07134cc5-5a30-4414-8d77-09b523f924b2.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25393 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2d1419-78d8-4674-a0a7-5faab0442aeb} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a70710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -parentBuildID 20230927232528 -prefsHandle 1388 -prefMapHandle 1256 -prefsLen 26242 -prefMapSize 238472 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3e6854-25f5-48be-aca9-16793ff11bca} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a42910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4976 -prefsLen 33559 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62736bf5-4a6a-402e-9ae1-8f0951dc0690} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c1ab7d110 utility

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://youtube.com/account?=htt
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://browser/menubar.ftl
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.48
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.46
reddit.map.fastly.net
151.101.1.140
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
241.42.69.40.in-addr.arpa
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.185.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
52.222.236.48
services.addons.mozilla.org
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
AA4223E000
unkown
page readonly
21C146BC000
trusted library allocation
page read and write
21C146D1000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C144CE000
trusted library allocation
page read and write
21C12A6A000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097BE000
heap
page read and write
21C0976B000
heap
page read and write
21C1469F000
trusted library allocation
page read and write
9C4E7E000
unkown
page readonly
21C1AEF4000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1C5A6000
trusted library allocation
page read and write
21C1DD3E000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
64B85D8000
stack
page read and write
21C1E8B6000
trusted library allocation
page read and write
21C1ACE7000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C144D7000
trusted library allocation
page read and write
21C097D4000
heap
page read and write
21C1E87D000
trusted library allocation
page read and write
171A9D003000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
21C15ED7000
trusted library allocation
page read and write
21C1D22C000
trusted library allocation
page read and write
21C1E885000
trusted library allocation
page read and write
21C11DA0000
trusted library allocation
page read and write
21C0F80C000
trusted library allocation
page read and write
21C1E09B000
trusted library allocation
page read and write
21C1213F000
heap
page read and write
21C130A1000
trusted library allocation
page read and write
1A235FBD000
unkown
page execute read
21C1DEB3000
trusted library allocation
page read and write
21C1AC6F000
trusted library allocation
page read and write
BF9000
stack
page read and write
AA3EE5D000
stack
page read and write
21C1E28D000
trusted library allocation
page read and write
21C12686000
trusted library allocation
page read and write
21C0F8ED000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
1A236840000
heap
page read and write
21C15006000
trusted library allocation
page read and write
21C1404F000
trusted library allocation
page read and write
21C14E83000
trusted library allocation
page read and write
21C14630000
trusted library allocation
page read and write
21C12A0F000
trusted library allocation
page read and write
21C16A19000
trusted library allocation
page read and write
21C12490000
trusted library allocation
page read and write
21C1AB6B000
trusted library allocation
page read and write
21C14078000
trusted library allocation
page read and write
21C1469B000
trusted library allocation
page read and write
21C13730000
trusted library allocation
page read and write
21C1DD8D000
trusted library allocation
page read and write
21C1E007000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1395E000
trusted library allocation
page read and write
B6FD1FF000
stack
page read and write
21C12547000
trusted library allocation
page read and write
21C1E338000
heap
page read and write
21C1ADB1000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C14782000
trusted library allocation
page read and write
21C1AEDB000
trusted library allocation
page read and write
21C150C9000
trusted library allocation
page read and write
21C11DCF000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C0977D000
heap
page read and write
21C1D1C5000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C1AEA7000
trusted library allocation
page read and write
21C0F8ED000
trusted library allocation
page read and write
21C097DE000
heap
page read and write
21C0F8B5000
trusted library allocation
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C1D1AC000
trusted library allocation
page read and write
21C1466B000
trusted library allocation
page read and write
64B9DFE000
unkown
page readonly
21C1DD72000
trusted library allocation
page read and write
21C144FA000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C1213F000
heap
page read and write
21C16A3F000
trusted library allocation
page read and write
21C0979E000
heap
page read and write
21C1DD94000
trusted library allocation
page read and write
3D01000
heap
page read and write
21C1AEBC000
trusted library allocation
page read and write
21C1DD32000
trusted library allocation
page read and write
21C1AD97000
trusted library allocation
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C1AED5000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
9C4DFE000
unkown
page readonly
21C0E826000
trusted library allocation
page read and write
280B29B0000
heap
page read and write
21C097BF000
heap
page read and write
21C0E8C9000
trusted library allocation
page read and write
21C1387A000
trusted library allocation
page read and write
21C14A43000
trusted library allocation
page read and write
21C13031000
trusted library allocation
page read and write
21C14678000
trusted library allocation
page read and write
21C150C3000
trusted library allocation
page read and write
21C138CD000
trusted library allocation
page read and write
21C146D4000
trusted library allocation
page read and write
21C1AEDB000
trusted library allocation
page read and write
21C1E28D000
trusted library allocation
page read and write
21C1E095000
trusted library allocation
page read and write
21C13760000
trusted library allocation
page read and write
21C152D3000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C1B4A8000
trusted library allocation
page read and write
21C1D16D000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C14629000
trusted library allocation
page read and write
21C1408A000
trusted library allocation
page read and write
21C0F9FE000
trusted library allocation
page read and write
21C14B3C000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C09785000
heap
page read and write
21C1268B000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1DDB0000
trusted library allocation
page read and write
21C1AEF7000
trusted library allocation
page read and write
64B7B3E000
stack
page read and write
21C16B7C000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
253E092E000
trusted library allocation
page read and write
21C138C5000
trusted library allocation
page read and write
21C1379D000
trusted library allocation
page read and write
21C11D18000
trusted library allocation
page read and write
21C1AE32000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C1AE4B000
trusted library allocation
page read and write
21C1E0D3000
trusted library allocation
page read and write
21C1265E000
trusted library allocation
page read and write
21C12AEB000
trusted library allocation
page read and write
21C097D4000
heap
page read and write
21C0F710000
trusted library allocation
page read and write
21C14643000
trusted library allocation
page read and write
21C12AFB000
trusted library allocation
page read and write
21C1D141000
trusted library allocation
page read and write
21C1378E000
trusted library allocation
page read and write
21C13879000
trusted library allocation
page read and write
21C14623000
trusted library allocation
page read and write
21C14672000
trusted library allocation
page read and write
7B1000
unkown
page execute read
21C14EC5000
trusted library allocation
page read and write
21C14FF6000
trusted library allocation
page read and write
21C144DE000
trusted library allocation
page read and write
21C1E060000
trusted library allocation
page read and write
1B56700C000
trusted library allocation
page read and write
21C146D1000
trusted library allocation
page read and write
21C09779000
heap
page read and write
253E06EA000
heap
page read and write
21C09781000
heap
page read and write
21C13979000
trusted library allocation
page read and write
21C1E034000
trusted library allocation
page read and write
21C1B15A000
trusted library allocation
page read and write
21C0F827000
trusted library allocation
page read and write
21C1E30A000
heap
page read and write
21C1ACE7000
trusted library allocation
page read and write
137E000
stack
page read and write
1B566A40000
heap
page read and write
21C12AE5000
trusted library allocation
page read and write
9C66FE000
stack
page read and write
21C1212E000
heap
page read and write
21C14ABB000
trusted library allocation
page read and write
21C14A5E000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1B2F4000
trusted library allocation
page read and write
21C13935000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C14653000
trusted library allocation
page read and write
21C1ACBF000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C09772000
heap
page read and write
21C13797000
trusted library allocation
page read and write
1A236898000
heap
page read and write
25DA71E03000
trusted library allocation
page read and write
21C164D1000
trusted library allocation
page read and write
21C1E0EF000
trusted library allocation
page read and write
21C0978E000
heap
page read and write
21C1AB86000
trusted library allocation
page read and write
21C1AC00000
trusted library allocation
page read and write
1A2367BF000
heap
page read and write
1A23686A000
heap
page read and write
1394000
heap
page read and write
21C126BE000
trusted library allocation
page read and write
21C0F8DD000
trusted library allocation
page read and write
21C12128000
heap
page read and write
280B2990000
heap
page read and write
21C1407C000
trusted library allocation
page read and write
21C13093000
trusted library allocation
page read and write
21C14A74000
trusted library allocation
page read and write
21C15D73000
trusted library allocation
page read and write
21C1408C000
trusted library allocation
page read and write
21C14AC1000
trusted library allocation
page read and write
21C1D0A3000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1ADA2000
trusted library allocation
page read and write
21C1E306000
heap
page read and write
21C14D5A000
trusted library allocation
page read and write
21C13866000
trusted library allocation
page read and write
21C1446F000
trusted library allocation
page read and write
21C14A83000
trusted library allocation
page read and write
1B566B00000
trusted library allocation
page read and write
1A2358E4000
heap
page read and write
21C097E1000
heap
page read and write
21C1E2BD000
trusted library allocation
page read and write
21C1461A000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C146E2000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C16ABB000
trusted library allocation
page read and write
21C1639C000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1E335000
heap
page read and write
21C163B6000
trusted library allocation
page read and write
21C15D93000
trusted library allocation
page read and write
21C14ACD000
trusted library allocation
page read and write
21C1B3F9000
trusted library allocation
page read and write
21C1411A000
trusted library allocation
page read and write
21C0F884000
trusted library allocation
page read and write
21C1460E000
trusted library allocation
page read and write
21C138CD000
trusted library allocation
page read and write
21C14A00000
trusted library allocation
page read and write
21C153E4000
trusted library allocation
page read and write
21C14152000
trusted library allocation
page read and write
1A2356F0000
heap
page read and write
21C1E30B000
heap
page read and write
21C13879000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C11E63000
trusted library allocation
page read and write
21C04330000
heap
page read and write
21C11DC4000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C164FA000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C1E37B000
heap
page read and write
21C09781000
heap
page read and write
21C1408A000
trusted library allocation
page read and write
21C1E870000
trusted library allocation
page read and write
1A236140000
heap
page read and write
21C14653000
trusted library allocation
page read and write
21C147D5000
trusted library allocation
page read and write
21C1E333000
heap
page read and write
21C1E2DB000
trusted library allocation
page read and write
21C0E826000
trusted library allocation
page read and write
21C14AD6000
trusted library allocation
page read and write
21C1E0E5000
trusted library allocation
page read and write
21C097CA000
heap
page read and write
21C1AC38000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C14D77000
trusted library allocation
page read and write
21C15361000
trusted library allocation
page read and write
21C0E817000
trusted library allocation
page read and write
21C0F8C5000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C1213E000
heap
page read and write
21C14494000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
21C09796000
heap
page read and write
21C1E296000
trusted library allocation
page read and write
21C1E2D8000
trusted library allocation
page read and write
21C14A8F000
trusted library allocation
page read and write
21C0F8DF000
trusted library allocation
page read and write
21C09783000
heap
page read and write
1B566960000
heap
page read and write
21C0E723000
trusted library allocation
page read and write
21C1D1A7000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C11D33000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C097B6000
heap
page read and write
21C1AED8000
trusted library allocation
page read and write
21C1518F000
trusted library allocation
page read and write
21C1DEAF000
trusted library allocation
page read and write
AA3EF1B000
stack
page read and write
21C1E09B000
trusted library allocation
page read and write
1A23687B000
heap
page read and write
21C1B15A000
trusted library allocation
page read and write
21C1ABD0000
trusted library allocation
page read and write
21C12AEB000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1E0B1000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1E8B6000
trusted library allocation
page read and write
21C15036000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
AA4227E000
stack
page read and write
21C146D8000
trusted library allocation
page read and write
21C09787000
heap
page read and write
21C141D6000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
21C16BE0000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1DD88000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C14B4A000
trusted library allocation
page read and write
21C1E0D3000
trusted library allocation
page read and write
21C097B9000
heap
page read and write
21C16BE9000
trusted library allocation
page read and write
21C1257C000
trusted library allocation
page read and write
21C1E0D3000
trusted library allocation
page read and write
21C1E309000
heap
page read and write
21C1446F000
trusted library allocation
page read and write
21C141DC000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C146D8000
trusted library allocation
page read and write
1A2368A7000
heap
page read and write
21C14623000
trusted library allocation
page read and write
21C09796000
heap
page read and write
1A23679C000
heap
page read and write
21C09780000
heap
page read and write
21C1248A000
trusted library allocation
page read and write
21C0F851000
trusted library allocation
page read and write
21C150CB000
trusted library allocation
page read and write
21C1D1E4000
trusted library allocation
page read and write
21C1E2AF000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
21C09780000
heap
page read and write
165D6500000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C164BB000
trusted library allocation
page read and write
21C1DBDF000
trusted library allocation
page read and write
21C12A1C000
trusted library allocation
page read and write
21C1394C000
trusted library allocation
page read and write
21C09783000
heap
page read and write
1394000
heap
page read and write
21C1E027000
trusted library allocation
page read and write
1B566F00000
trusted library allocation
page read and write
1A2367A3000
heap
page read and write
21C14EE1000
trusted library allocation
page read and write
108848E3000
trusted library allocation
page execute read
21C1462D000
trusted library allocation
page read and write
21C12564000
trusted library allocation
page read and write
21C14FAC000
trusted library allocation
page read and write
38C4000
heap
page read and write
21C14ADE000
trusted library allocation
page read and write
1A235A23000
trusted library allocation
page read and write
21C1DD9A000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C097BB000
heap
page read and write
21C0F8D2000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C1DDF0000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C1AD28000
trusted library allocation
page read and write
21C14965000
trusted library allocation
page read and write
253E0996000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C0F89C000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C164FA000
trusted library allocation
page read and write
9C4E3E000
stack
page read and write
21C14A88000
trusted library allocation
page read and write
21C0F96C000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C09778000
heap
page read and write
21C1DEE2000
trusted library allocation
page read and write
21C1E05C000
trusted library allocation
page read and write
21C1DDFE000
trusted library allocation
page read and write
21C1E8F9000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C11DBC000
trusted library allocation
page read and write
21C1AEF4000
trusted library allocation
page read and write
21C097CA000
heap
page read and write
21C09766000
heap
page read and write
21C1E2A6000
trusted library allocation
page read and write
21C1E0A0000
trusted library allocation
page read and write
21C1469C000
trusted library allocation
page read and write
21C097D9000
heap
page read and write
84C000
unkown
page readonly
21C0977B000
heap
page read and write
21C1247E000
trusted library allocation
page read and write
21C1246A000
trusted library allocation
page read and write
21C130D6000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C144AD000
trusted library allocation
page read and write
1390000
heap
page read and write
21C0E7F6000
trusted library allocation
page read and write
21C14029000
trusted library allocation
page read and write
21C1E2D5000
trusted library allocation
page read and write
21C0F9F6000
trusted library allocation
page read and write
21C1AEF4000
trusted library allocation
page read and write
21C16A93000
trusted library allocation
page read and write
21C14643000
trusted library allocation
page read and write
21C14060000
trusted library allocation
page read and write
21C140AD000
trusted library allocation
page read and write
21C1ACBF000
trusted library allocation
page read and write
21C13DB0000
trusted library allocation
page read and write
21C1213E000
heap
page read and write
21C12131000
heap
page read and write
21C14732000
trusted library allocation
page read and write
21C144DE000
trusted library allocation
page read and write
21C164CE000
trusted library allocation
page read and write
253E0B1C000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C097C9000
heap
page read and write
AA3EF18000
stack
page read and write
21C144FC000
trusted library allocation
page read and write
21C164FA000
trusted library allocation
page read and write
21C13D16000
trusted library allocation
page read and write
1B566C49000
trusted library allocation
page read and write
21C1647D000
trusted library allocation
page read and write
21C1408A000
trusted library allocation
page read and write
21C14ADE000
trusted library allocation
page read and write
1A236884000
heap
page read and write
21C16AC7000
trusted library allocation
page read and write
21C097DE000
heap
page read and write
21C097C5000
heap
page read and write
21C097A5000
heap
page read and write
21C1E345000
heap
page read and write
21C09781000
heap
page read and write
21C0E86A000
trusted library allocation
page read and write
21C138CD000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C1AB5E000
trusted library allocation
page read and write
1A236828000
heap
page read and write
21C126C4000
trusted library allocation
page read and write
21C1AB47000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
21C14078000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
1A235A68000
trusted library allocation
page read and write
21C1395B000
trusted library allocation
page read and write
21C1E29F000
trusted library allocation
page read and write
21C13759000
trusted library allocation
page read and write
21C16472000
trusted library allocation
page read and write
21C12554000
trusted library allocation
page read and write
21C16444000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C146A3000
trusted library allocation
page read and write
21C147D8000
trusted library allocation
page read and write
21C15D99000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C097C8000
heap
page read and write
21C0978B000
heap
page read and write
21C09780000
heap
page read and write
21C14639000
trusted library allocation
page read and write
21C14A6F000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097E3000
heap
page read and write
21C164C9000
trusted library allocation
page read and write
21C1E053000
trusted library allocation
page read and write
21C147C6000
trusted library allocation
page read and write
21C1B2E4000
trusted library allocation
page read and write
21C11E43000
trusted library allocation
page read and write
21C1E0DD000
trusted library allocation
page read and write
1B566D00000
heap
page read and write
27CBE4D03000
trusted library allocation
page read and write
21C12AE5000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C14474000
trusted library allocation
page read and write
21C144AD000
trusted library allocation
page read and write
21C1375E000
trusted library allocation
page read and write
21C1DDA0000
trusted library allocation
page read and write
21C1DD30000
trusted library allocation
page read and write
21C1308E000
trusted library allocation
page read and write
21C13865000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C1255D000
trusted library allocation
page read and write
21C1AB93000
trusted library allocation
page read and write
21C1E87D000
trusted library allocation
page read and write
21C151DF000
trusted library allocation
page read and write
21C16A2E000
trusted library allocation
page read and write
21C14A63000
trusted library allocation
page read and write
253E0563000
remote allocation
page execute read
280B2AC0000
heap
page read and write
21C1C5D7000
trusted library allocation
page read and write
21C1B2E0000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C097D3000
heap
page read and write
21C097E3000
heap
page read and write
21C0976B000
heap
page read and write
21C1DED7000
trusted library allocation
page read and write
1A235AC4000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C1DD51000
trusted library allocation
page read and write
21C164F5000
trusted library allocation
page read and write
21C16B99000
trusted library allocation
page read and write
21C138BA000
trusted library allocation
page read and write
21C0F8B5000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C16A6D000
trusted library allocation
page read and write
21C09783000
heap
page read and write
1B566D20000
heap
page read and write
21C164FA000
trusted library allocation
page read and write
21C150C5000
trusted library allocation
page read and write
21C11E8D000
trusted library allocation
page read and write
21C12AD0000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C140ED000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C151EC000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1AEC5000
trusted library allocation
page read and write
21C1409C000
trusted library allocation
page read and write
21C15EDD000
trusted library allocation
page read and write
21C140AD000
trusted library allocation
page read and write
21C14A44000
trusted library allocation
page read and write
21C1ADDE000
trusted library allocation
page read and write
21C1C5D7000
trusted library allocation
page read and write
21C146E2000
trusted library allocation
page read and write
21C09786000
heap
page read and write
21C097E3000
heap
page read and write
1A235A48000
trusted library allocation
page read and write
21C1E2E8000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
253E0C08000
heap
page read and write
21C09783000
heap
page read and write
21C14477000
trusted library allocation
page read and write
21C16A9A000
trusted library allocation
page read and write
7B1000
unkown
page execute read
21C16AD0000
trusted library allocation
page read and write
21C14959000
trusted library allocation
page read and write
21C11EFC000
trusted library allocation
page read and write
21C16AD2000
trusted library allocation
page read and write
1482000
heap
page read and write
1A235650000
unclassified section
page readonly
21C15186000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C1391D000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C097B6000
heap
page read and write
B6FE1FE000
stack
page read and write
21C097B6000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C097C5000
heap
page read and write
21C141FA000
trusted library allocation
page read and write
21C1C592000
trusted library allocation
page read and write
21C097B7000
heap
page read and write
21C153D9000
trusted library allocation
page read and write
21C15D1F000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C0F8D4000
trusted library allocation
page read and write
21C126D0000
trusted library allocation
page read and write
21C1212D000
heap
page read and write
253E097B000
trusted library allocation
page read and write
21C1407C000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C097BE000
heap
page read and write
21C14482000
trusted library allocation
page read and write
21C14A78000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C12AE8000
trusted library allocation
page read and write
21C15D4D000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C16378000
trusted library allocation
page read and write
21C1AE3D000
trusted library allocation
page read and write
21C1E2BD000
trusted library allocation
page read and write
21C1C5FC000
trusted library allocation
page read and write
21C1AE33000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C1AED5000
trusted library allocation
page read and write
253E0981000
trusted library allocation
page read and write
872000
unkown
page readonly
21C178C3000
trusted library allocation
page read and write
21C1ACB8000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C0976C000
heap
page read and write
1A23679C000
heap
page read and write
21C139C4000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C097B6000
heap
page read and write
21C097E1000
heap
page read and write
21C14A65000
trusted library allocation
page read and write
21C1AEB1000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1E335000
heap
page read and write
21C1E309000
heap
page read and write
21C14683000
trusted library allocation
page read and write
280B2D07000
trusted library allocation
page read and write
64B95FE000
stack
page read and write
21C164D1000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C09780000
heap
page read and write
253E0900000
trusted library allocation
page read and write
1B566CF0000
trusted library allocation
page read and write
21C1408C000
trusted library allocation
page read and write
165D63C0000
heap
page read and write
280B2D00000
trusted library allocation
page read and write
21C12ABC000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
165D67A0000
heap
page read and write
21C1E09C000
trusted library allocation
page read and write
21C130DB000
trusted library allocation
page read and write
21C14061000
trusted library allocation
page read and write
1A235A5F000
trusted library allocation
page read and write
21C16A4E000
trusted library allocation
page read and write
21C1466B000
trusted library allocation
page read and write
21C14443000
trusted library allocation
page read and write
21C16AA7000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
884000
unkown
page readonly
21C16BC0000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
1B566CF4000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
253E0961000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C0F83C000
trusted library allocation
page read and write
21C13858000
trusted library allocation
page read and write
21C1AEB6000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C0F8C3000
trusted library allocation
page read and write
21C16484000
trusted library allocation
page read and write
21C126BE000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C0979E000
heap
page read and write
21C097D3000
heap
page read and write
21C0E72F000
trusted library allocation
page read and write
21C0F96C000
trusted library allocation
page read and write
21C11E4D000
trusted library allocation
page read and write
21C1245E000
trusted library allocation
page read and write
21C124F3000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C1245B000
trusted library allocation
page read and write
21C14724000
trusted library allocation
page read and write
1A236899000
heap
page read and write
21C12586000
trusted library allocation
page read and write
21C1477F000
trusted library allocation
page read and write
21C1ACB4000
trusted library allocation
page read and write
21C13060000
trusted library allocation
page read and write
21C1212D000
heap
page read and write
21C16A2C000
trusted library allocation
page read and write
21C13793000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C146DF000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C11E49000
trusted library allocation
page read and write
21C16A3F000
trusted library allocation
page read and write
21C1E045000
trusted library allocation
page read and write
21C16A22000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1B1DA000
trusted library allocation
page read and write
21C16AC3000
trusted library allocation
page read and write
21C14070000
trusted library allocation
page read and write
21C1497D000
trusted library allocation
page read and write
21C1269D000
trusted library allocation
page read and write
21C1393A000
trusted library allocation
page read and write
21C163FE000
trusted library allocation
page read and write
21C146D4000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C1AEEE000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C137E9000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C0F97B000
trusted library allocation
page read and write
21C1AB86000
trusted library allocation
page read and write
21C164C9000
trusted library allocation
page read and write
21C139A5000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C146DF000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C0978A000
heap
page read and write
21C1AEE3000
trusted library allocation
page read and write
21C1B114000
trusted library allocation
page read and write
B6FD9FE000
stack
page read and write
21C1E080000
trusted library allocation
page read and write
21C1DEB3000
trusted library allocation
page read and write
21C14080000
trusted library allocation
page read and write
164DB961E000
trusted library allocation
page read and write
21C14082000
trusted library allocation
page read and write
21C1D143000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C0976C000
heap
page read and write
21C097BB000
heap
page read and write
21C09768000
heap
page read and write
21C144FA000
trusted library allocation
page read and write
21C141C8000
trusted library allocation
page read and write
21C1ACFB000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
9C2B4E000
unkown
page readonly
21C09790000
heap
page read and write
21C1404F000
trusted library allocation
page read and write
21C1C5F6000
trusted library allocation
page read and write
21C1402D000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C16B32000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C1539D000
trusted library allocation
page read and write
21C1AEEA000
trusted library allocation
page read and write
21C14959000
trusted library allocation
page read and write
21C164F5000
trusted library allocation
page read and write
21C14A44000
trusted library allocation
page read and write
21C1AE51000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1BE67000
trusted library allocation
page read and write
21C124B3000
trusted library allocation
page read and write
1B566C24000
trusted library allocation
page read and write
21C1466B000
trusted library allocation
page read and write
21C15DBF000
trusted library allocation
page read and write
40E44103000
trusted library allocation
page read and write
21C1257C000
trusted library allocation
page read and write
21C130FB000
trusted library allocation
page read and write
21C097B9000
heap
page read and write
21C14AF2000
trusted library allocation
page read and write
21C1505A000
trusted library allocation
page read and write
21C14122000
trusted library allocation
page read and write
21C15374000
trusted library allocation
page read and write
21C1460C000
trusted library allocation
page read and write
21C16A94000
trusted library allocation
page read and write
21C1DE19000
trusted library allocation
page read and write
21C1E095000
trusted library allocation
page read and write
21C1E0E5000
trusted library allocation
page read and write
21C11D39000
trusted library allocation
page read and write
1489000
heap
page read and write
21C09780000
heap
page read and write
1394000
heap
page read and write
21C15DAF000
trusted library allocation
page read and write
21C16A8F000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C12658000
trusted library allocation
page read and write
21C1AEC3000
trusted library allocation
page read and write
21C0F73A000
trusted library allocation
page read and write
21C13DAB000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C146D8000
trusted library allocation
page read and write
21C1C577000
trusted library allocation
page read and write
21C097DE000
heap
page read and write
21C1E299000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1DD2A000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C14784000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1DBD7000
trusted library allocation
page read and write
21C09788000
heap
page read and write
21C151B2000
trusted library allocation
page read and write
21C1AEE8000
trusted library allocation
page read and write
21C1B147000
trusted library allocation
page read and write
21C14875000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C09783000
heap
page read and write
21C1467C000
trusted library allocation
page read and write
21C1AB9F000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C1ACBF000
trusted library allocation
page read and write
21C13DAB000
trusted library allocation
page read and write
1A2358E0000
heap
page read and write
149A000
heap
page read and write
21C1462D000
trusted library allocation
page read and write
21C1E040000
trusted library allocation
page read and write
21C1E38B000
heap
page read and write
21C09773000
heap
page read and write
21C12478000
trusted library allocation
page read and write
21C0F80E000
trusted library allocation
page read and write
21C0F8B2000
trusted library allocation
page read and write
21C130E9000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C097C9000
heap
page read and write
64B7BBD000
stack
page read and write
21C1E345000
heap
page read and write
21C14672000
trusted library allocation
page read and write
21C16A34000
trusted library allocation
page read and write
21C153FB000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C139B0000
trusted library allocation
page read and write
21C126A0000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C09772000
heap
page read and write
21C0F7E7000
trusted library allocation
page read and write
21C12664000
trusted library allocation
page read and write
253E096E000
trusted library allocation
page read and write
21C1E82E000
trusted library allocation
page read and write
21C1DD2A000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
1460000
heap
page read and write
21C1AB1B000
trusted library allocation
page read and write
21C1404C000
trusted library allocation
page read and write
21C1DDB0000
trusted library allocation
page read and write
21C1BEAC000
trusted library allocation
page read and write
21C13966000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1648B000
trusted library allocation
page read and write
21C1B402000
trusted library allocation
page read and write
21C14AD9000
trusted library allocation
page read and write
1A23630B000
trusted library allocation
page read and write
21C1449C000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
1A236740000
heap
page read and write
21C16A0D000
trusted library allocation
page read and write
21C16A3C000
trusted library allocation
page read and write
253E09C9000
trusted library allocation
page read and write
21C097CD000
heap
page read and write
21C09788000
heap
page read and write
21C1375E000
trusted library allocation
page read and write
21C144F3000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C1462D000
trusted library allocation
page read and write
21C138BA000
trusted library allocation
page read and write
21C146DF000
trusted library allocation
page read and write
165D67B0000
heap
page read and write
21C1AEBA000
trusted library allocation
page read and write
1A236898000
heap
page read and write
1A23686D000
heap
page read and write
21C097BE000
heap
page read and write
1A236820000
heap
page read and write
21C097B9000
heap
page read and write
21C14AD6000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
1A236823000
heap
page read and write
21C1E0E2000
trusted library allocation
page read and write
9C56FE000
stack
page read and write
21C09780000
heap
page read and write
21C146D4000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C14AD9000
trusted library allocation
page read and write
1A236884000
heap
page read and write
21C1AEA9000
trusted library allocation
page read and write
21C1E0D7000
trusted library allocation
page read and write
21C0F793000
trusted library allocation
page read and write
21C14748000
trusted library allocation
page read and write
21C1DBD7000
trusted library allocation
page read and write
21C140E6000
trusted library allocation
page read and write
21C1C5A6000
trusted library allocation
page read and write
1B566C77000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C097B6000
heap
page read and write
21C0977A000
heap
page read and write
21C16A26000
trusted library allocation
page read and write
1A2368A9000
heap
page read and write
21C12AEB000
trusted library allocation
page read and write
21C16AD2000
trusted library allocation
page read and write
21C097DD000
heap
page read and write
21C144CE000
trusted library allocation
page read and write
21C1AEBD000
trusted library allocation
page read and write
1A23683D000
heap
page read and write
21C164D1000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
253E09BA000
trusted library allocation
page read and write
21C1B1DA000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1DD94000
trusted library allocation
page read and write
21C14073000
trusted library allocation
page read and write
21C147EC000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C15180000
trusted library allocation
page read and write
21C1387A000
trusted library allocation
page read and write
21C15DB7000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1DD24000
trusted library allocation
page read and write
21C150BF000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C0F8F6000
trusted library allocation
page read and write
21C1476E000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C13797000
trusted library allocation
page read and write
21C1AEAD000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C16A37000
trusted library allocation
page read and write
21C0E19E000
trusted library allocation
page read and write
21C1AB6B000
trusted library allocation
page read and write
7B0000
unkown
page readonly
1B566CC8000
trusted library allocation
page read and write
253E0760000
heap
page read and write
1A235FB2000
unkown
page execute read
21C1469F000
trusted library allocation
page read and write
1493000
heap
page read and write
21C14AF2000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C164DD000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C097C5000
heap
page read and write
21C1E278000
trusted library allocation
page read and write
21C1DE64000
trusted library allocation
page read and write
21C0977D000
heap
page read and write
21C09772000
heap
page read and write
21C1E335000
heap
page read and write
21C130DB000
trusted library allocation
page read and write
21C1DD7C000
trusted library allocation
page read and write
21C16AA7000
trusted library allocation
page read and write
21C1254B000
trusted library allocation
page read and write
21C1E0EF000
trusted library allocation
page read and write
21C1DB91000
trusted library allocation
page read and write
21C146A3000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
165D6431000
heap
page read and write
21C1307C000
trusted library allocation
page read and write
21C0975C000
heap
page read and write
21C1E2D8000
trusted library allocation
page read and write
21C1DD56000
trusted library allocation
page read and write
21C1E0A6000
trusted library allocation
page read and write
21C141E5000
trusted library allocation
page read and write
21C1E05C000
trusted library allocation
page read and write
21C15358000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C1DD43000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C15D37000
trusted library allocation
page read and write
253E0740000
heap
page readonly
21C1E413000
heap
page read and write
21C1E31A000
heap
page read and write
21C1AED8000
trusted library allocation
page read and write
84C000
unkown
page readonly
21C14A41000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C144D7000
trusted library allocation
page read and write
21C1AE35000
trusted library allocation
page read and write
21C151B7000
trusted library allocation
page read and write
21C1309E000
trusted library allocation
page read and write
21C146DF000
trusted library allocation
page read and write
21C13D22000
trusted library allocation
page read and write
21C141F1000
trusted library allocation
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C0F9F6000
trusted library allocation
page read and write
1A23679F000
heap
page read and write
21C0FA23000
trusted library allocation
page read and write
3E00000
trusted library allocation
page read and write
21C1469C000
trusted library allocation
page read and write
21C16AA3000
trusted library allocation
page read and write
21C1403B000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
1394000
heap
page read and write
21C11D60000
trusted library allocation
page read and write
1A236831000
heap
page read and write
AA409FE000
stack
page read and write
165D6452000
heap
page read and write
21C1649B000
trusted library allocation
page read and write
21C1379F000
trusted library allocation
page read and write
21C1DD6B000
trusted library allocation
page read and write
1A2367A9000
heap
page read and write
21C1DD7D000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C14663000
trusted library allocation
page read and write
21C1AB64000
trusted library allocation
page read and write
21C0E81B000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C146F2000
trusted library allocation
page read and write
21C1E050000
trusted library allocation
page read and write
21C0F8F6000
trusted library allocation
page read and write
21C1BD2F000
trusted library allocation
page read and write
21C1E30D000
heap
page read and write
21C14B2B000
trusted library allocation
page read and write
21C1C59A000
trusted library allocation
page read and write
21C1535C000
trusted library allocation
page read and write
21C16A3A000
trusted library allocation
page read and write
21C1E2A4000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C1E052000
trusted library allocation
page read and write
21C097DF000
heap
page read and write
21C146F2000
trusted library allocation
page read and write
1A235A2F000
trusted library allocation
page read and write
21C130A2000
trusted library allocation
page read and write
21C0F770000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1385A000
trusted library allocation
page read and write
21C12AAF000
trusted library allocation
page read and write
21C12ACC000
trusted library allocation
page read and write
21C11D60000
trusted library allocation
page read and write
21C144DE000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C14ACD000
trusted library allocation
page read and write
21C126FC000
trusted library allocation
page read and write
21C12447000
trusted library allocation
page read and write
21C097BD000
heap
page read and write
21C097E3000
heap
page read and write
21C16ABD000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C126C4000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C14A4A000
trusted library allocation
page read and write
21C140E7000
trusted library allocation
page read and write
1B5668E0000
unclassified section
page readonly
21C0F8B2000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1DD78000
trusted library allocation
page read and write
21C13AE6000
trusted library allocation
page read and write
21C13080000
trusted library allocation
page read and write
21C09781000
heap
page read and write
253E06C3000
heap
page read and write
21C138C3000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
21C16AC7000
trusted library allocation
page read and write
AA3EF9E000
unkown
page readonly
21C1ACF3000
trusted library allocation
page read and write
21C14474000
trusted library allocation
page read and write
21C1B3D2000
trusted library allocation
page read and write
AA422BE000
unkown
page readonly
1B566E20000
unclassified section
page readonly
21C1AE3D000
trusted library allocation
page read and write
21C0E1BF000
trusted library allocation
page read and write
21C0E1C5000
trusted library allocation
page read and write
1A2357E0000
heap
page read and write
21C146DF000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C11EF3000
trusted library allocation
page read and write
21C09760000
heap
page read and write
21C16B81000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
1A236749000
heap
page read and write
21C13880000
trusted library allocation
page read and write
21C097CF000
heap
page read and write
21C164C6000
trusted library allocation
page read and write
21C1461B000
trusted library allocation
page read and write
21C097DE000
heap
page read and write
1B566C86000
trusted library allocation
page read and write
21C1461A000
trusted library allocation
page read and write
21C1444D000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C1AE3F000
trusted library allocation
page read and write
21C12586000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C1AD4E000
trusted library allocation
page read and write
21C1AEA2000
trusted library allocation
page read and write
21C14626000
trusted library allocation
page read and write
21C1E0E5000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C1213E000
heap
page read and write
21C1D148000
trusted library allocation
page read and write
21C15ED9000
trusted library allocation
page read and write
21C14061000
trusted library allocation
page read and write
21C1E842000
trusted library allocation
page read and write
21C0E1C2000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C1E0E6000
trusted library allocation
page read and write
21C1C592000
trusted library allocation
page read and write
21C140B3000
trusted library allocation
page read and write
21C146D8000
trusted library allocation
page read and write
21C14FC5000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
21C1ACED000
trusted library allocation
page read and write
21C09778000
heap
page read and write
280B29B9000
heap
page read and write
21C15331000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1E2A4000
trusted library allocation
page read and write
21C16AC3000
trusted library allocation
page read and write
21C164C9000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C151A5000
trusted library allocation
page read and write
21C16A9A000
trusted library allocation
page read and write
21C1466B000
trusted library allocation
page read and write
1A235FC0000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C16B7C000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C14630000
trusted library allocation
page read and write
21C1AE93000
trusted library allocation
page read and write
21C1DDEE000
trusted library allocation
page read and write
253E0967000
trusted library allocation
page read and write
1A236832000
heap
page read and write
1B566AB0000
heap
page read and write
21C14623000
trusted library allocation
page read and write
21C1DD3E000
trusted library allocation
page read and write
21C09786000
heap
page read and write
21C1E09C000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
253E0A20000
heap
page read and write
21C0F8DB000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C16448000
trusted library allocation
page read and write
21C14A61000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C146D8000
trusted library allocation
page read and write
21C1E02E000
trusted library allocation
page read and write
21C1534A000
trusted library allocation
page read and write
1B566900000
heap
page read and write
21C164CE000
trusted library allocation
page read and write
21C141A8000
trusted library allocation
page read and write
21C146E2000
trusted library allocation
page read and write
AA419FE000
stack
page read and write
21C0F8F6000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C09779000
heap
page read and write
21C13DC1000
trusted library allocation
page read and write
21C1469B000
trusted library allocation
page read and write
21C1380A000
trusted library allocation
page read and write
21C1E0FC000
trusted library allocation
page read and write
21C1408A000
trusted library allocation
page read and write
21C1DDAA000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C13998000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C0F9DD000
trusted library allocation
page read and write
21C1DE63000
trusted library allocation
page read and write
21C164CE000
trusted library allocation
page read and write
21C1E8F9000
trusted library allocation
page read and write
21C138CD000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C0977B000
heap
page read and write
21C12124000
heap
page read and write
21C1B3FB000
trusted library allocation
page read and write
21C164CE000
trusted library allocation
page read and write
21C1AEE1000
trusted library allocation
page read and write
21C1496F000
trusted library allocation
page read and write
21C12431000
trusted library allocation
page read and write
21C1AC30000
trusted library allocation
page read and write
21C147AF000
trusted library allocation
page read and write
21C0977A000
heap
page read and write
21C14637000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C0F8F6000
trusted library allocation
page read and write
21C09783000
heap
page read and write
1A235A61000
trusted library allocation
page read and write
21C1AEF1000
trusted library allocation
page read and write
21C1380D000
trusted library allocation
page read and write
1B5668C0000
remote allocation
page read and write
21C15129000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
1A235A81000
trusted library allocation
page read and write
21C0F7D5000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1B637000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C1B61C000
trusted library allocation
page read and write
21C14AD6000
trusted library allocation
page read and write
21C1DEA9000
trusted library allocation
page read and write
21C1AE39000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C1397F000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1E2A6000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C126B1000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C11EFA000
trusted library allocation
page read and write
21C12689000
trusted library allocation
page read and write
21C147F1000
trusted library allocation
page read and write
21C14B68000
trusted library allocation
page read and write
21C1403B000
trusted library allocation
page read and write
21C14896000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C0976C000
heap
page read and write
21C130FB000
trusted library allocation
page read and write
21C1B2AE000
trusted library allocation
page read and write
165D7F6E000
heap
page read and write
21C1DD3A000
trusted library allocation
page read and write
21C09771000
heap
page read and write
21C1DD3A000
trusted library allocation
page read and write
1B566C68000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C164C6000
trusted library allocation
page read and write
21C11DDD000
trusted library allocation
page read and write
21C137BE000
trusted library allocation
page read and write
21C13046000
trusted library allocation
page read and write
21C164B8000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C097C9000
heap
page read and write
21C12AB8000
trusted library allocation
page read and write
21C1407C000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C149D0000
trusted library allocation
page read and write
21C14666000
trusted library allocation
page read and write
21C126C8000
trusted library allocation
page read and write
21C14729000
trusted library allocation
page read and write
21C15D0D000
trusted library allocation
page read and write
21C1E2BA000
trusted library allocation
page read and write
21C1AEB6000
trusted library allocation
page read and write
21C1E04A000
trusted library allocation
page read and write
1A235ABB000
trusted library allocation
page read and write
21C14B7F000
trusted library allocation
page read and write
21C141E1000
trusted library allocation
page read and write
21C11D2F000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1AE4B000
trusted library allocation
page read and write
21C1B3E8000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C14030000
trusted library allocation
page read and write
21C1AC3C000
trusted library allocation
page read and write
21C15D49000
trusted library allocation
page read and write
21C12AF3000
trusted library allocation
page read and write
21C12128000
heap
page read and write
21C097CE000
heap
page read and write
21C14611000
trusted library allocation
page read and write
253E06E0000
heap
page read and write
21C1E2D5000
trusted library allocation
page read and write
21C1DE5F000
trusted library allocation
page read and write
21C149E2000
trusted library allocation
page read and write
21C1E36A000
heap
page read and write
253E06A0000
heap
page read and write
21C1265E000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C15EE4000
trusted library allocation
page read and write
21C0F732000
trusted library allocation
page read and write
21C0F8B9000
trusted library allocation
page read and write
21C1DBD7000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C0F8AE000
trusted library allocation
page read and write
21C1DEB1000
trusted library allocation
page read and write
21C1ADE2000
trusted library allocation
page read and write
21C0F827000
trusted library allocation
page read and write
21C141C3000
trusted library allocation
page read and write
21C1E8F9000
trusted library allocation
page read and write
21C14632000
trusted library allocation
page read and write
21C141D3000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C164D5000
trusted library allocation
page read and write
21C09796000
heap
page read and write
1B566920000
heap
page read and write
21C0E8C9000
trusted library allocation
page read and write
21C1ADFE000
trusted library allocation
page read and write
21C1AEF2000
trusted library allocation
page read and write
1A235A77000
trusted library allocation
page read and write
21C1D257000
trusted library allocation
page read and write
21C1DEAD000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1E0AA000
trusted library allocation
page read and write
148D000
heap
page read and write
21C13267000
trusted library allocation
page read and write
21C1DD5C000
trusted library allocation
page read and write
21C1DD61000
trusted library allocation
page read and write
1394000
heap
page read and write
21C13765000
trusted library allocation
page read and write
21C0976C000
heap
page read and write
21C1D22E000
trusted library allocation
page read and write
21C16B7E000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C147F4000
trusted library allocation
page read and write
21C14D3F000
trusted library allocation
page read and write
21C1E296000
trusted library allocation
page read and write
64BB6FE000
stack
page read and write
21C1309E000
trusted library allocation
page read and write
21C12652000
trusted library allocation
page read and write
21C16ABD000
trusted library allocation
page read and write
21C1C590000
trusted library allocation
page read and write
21C14663000
trusted library allocation
page read and write
21C1AC8B000
trusted library allocation
page read and write
21C14ADA000
trusted library allocation
page read and write
21C0F7DD000
trusted library allocation
page read and write
1A235A0C000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C14E60000
trusted library allocation
page read and write
21C1E017000
trusted library allocation
page read and write
21C164C9000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
1B566F07000
trusted library allocation
page read and write
21C13991000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C14A78000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C1AEE1000
trusted library allocation
page read and write
21C137B0000
trusted library allocation
page read and write
21C1AEEA000
trusted library allocation
page read and write
21C12300000
trusted library allocation
page read and write
21C144D7000
trusted library allocation
page read and write
21C16A32000
trusted library allocation
page read and write
21C1AEF4000
trusted library allocation
page read and write
21C11DCD000
trusted library allocation
page read and write
21C1E034000
trusted library allocation
page read and write
21C1E0D1000
trusted library allocation
page read and write
21C151D0000
trusted library allocation
page read and write
21C16AC5000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C09780000
heap
page read and write
21C141D6000
trusted library allocation
page read and write
21C146AF000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C097C5000
heap
page read and write
21C09778000
heap
page read and write
21C1E82C000
trusted library allocation
page read and write
1A235AEC000
trusted library allocation
page read and write
21C12690000
trusted library allocation
page read and write
21C1DD43000
trusted library allocation
page read and write
21C1387F000
trusted library allocation
page read and write
21C14616000
trusted library allocation
page read and write
21C1E30D000
heap
page read and write
21C146D4000
trusted library allocation
page read and write
1A23683D000
heap
page read and write
21C164CE000
trusted library allocation
page read and write
21C1AD67000
trusted library allocation
page read and write
21C12561000
trusted library allocation
page read and write
21C1ACED000
trusted library allocation
page read and write
21C1ABA3000
trusted library allocation
page read and write
21C141EB000
trusted library allocation
page read and write
21C151F2000
trusted library allocation
page read and write
21C09780000
heap
page read and write
253E09B7000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C0E1EF000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C130F9000
trusted library allocation
page read and write
1394000
heap
page read and write
21C15EE7000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
253E0590000
heap
page read and write
21C097C0000
heap
page read and write
21C1D107000
trusted library allocation
page read and write
21C124CA000
trusted library allocation
page read and write
21C1AB5E000
trusted library allocation
page read and write
21C14090000
trusted library allocation
page read and write
21C16B78000
trusted library allocation
page read and write
1B566C45000
trusted library allocation
page read and write
21C14ACD000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C16A6E000
trusted library allocation
page read and write
21C1DD72000
trusted library allocation
page read and write
21C1E301000
heap
page read and write
21C1AEF2000
trusted library allocation
page read and write
21C16B7C000
trusted library allocation
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C1B3EA000
trusted library allocation
page read and write
165D63A0000
heap
page read and write
21C164D5000
trusted library allocation
page read and write
21C097C6000
heap
page read and write
21C1DD6E000
trusted library allocation
page read and write
253E0994000
trusted library allocation
page read and write
21C1DD49000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C1BD6D000
trusted library allocation
page read and write
21C0F9EB000
trusted library allocation
page read and write
21C16A71000
trusted library allocation
page read and write
21C1DD49000
trusted library allocation
page read and write
1A2367A9000
heap
page read and write
21C0978E000
heap
page read and write
21C1DD75000
trusted library allocation
page read and write
21C16390000
trusted library allocation
page read and write
21C1B125000
trusted library allocation
page read and write
1A2356CA000
remote allocation
page execute read
21C140FD000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C0978A000
heap
page read and write
21C1E09B000
trusted library allocation
page read and write
21C12128000
heap
page read and write
21C16AAD000
trusted library allocation
page read and write
21C0FA36000
trusted library allocation
page read and write
21C1387F000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C15385000
trusted library allocation
page read and write
21C1E2A4000
trusted library allocation
page read and write
21C1DD3E000
trusted library allocation
page read and write
1A2358C0000
trusted library allocation
page read and write
1B566940000
heap
page read and write
21C1AB3B000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C140BC000
trusted library allocation
page read and write
11DB000
stack
page read and write
21C097E1000
heap
page read and write
21C14A3F000
trusted library allocation
page read and write
21C11EC4000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C1AEF2000
trusted library allocation
page read and write
21C1DEB3000
trusted library allocation
page read and write
21C1E301000
heap
page read and write
21C140D5000
trusted library allocation
page read and write
21C1DBDF000
trusted library allocation
page read and write
21C1E0A0000
trusted library allocation
page read and write
21C1CDF7000
trusted library allocation
page read and write
21C097DF000
heap
page read and write
21C1E274000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C0978A000
heap
page read and write
21C1DEAF000
trusted library allocation
page read and write
21C1267F000
trusted library allocation
page read and write
21C15DBA000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C14078000
trusted library allocation
page read and write
21C11D9C000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
21C13086000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C14197000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C13AC2000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1B3D5000
trusted library allocation
page read and write
1A235A86000
trusted library allocation
page read and write
21C144FA000
trusted library allocation
page read and write
21C09790000
heap
page read and write
165D7F71000
heap
page read and write
21C097C5000
heap
page read and write
21C12494000
trusted library allocation
page read and write
21C14146000
trusted library allocation
page read and write
21C0977D000
heap
page read and write
21C097C5000
heap
page read and write
21C125A4000
trusted library allocation
page read and write
21C1647D000
trusted library allocation
page read and write
21C1467A000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C16A2C000
trusted library allocation
page read and write
1B566C5F000
trusted library allocation
page read and write
21C14799000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1AC9B000
trusted library allocation
page read and write
21C1DD30000
trusted library allocation
page read and write
21C1E04B000
trusted library allocation
page read and write
21C1213E000
heap
page read and write
21C14630000
trusted library allocation
page read and write
21C1DEA7000
trusted library allocation
page read and write
21C12143000
heap
page read and write
21C09778000
heap
page read and write
21C1514F000
trusted library allocation
page read and write
21C153C6000
trusted library allocation
page read and write
21C1E26F000
trusted library allocation
page read and write
21C1BE8A000
trusted library allocation
page read and write
21C1DD5C000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C097D3000
heap
page read and write
21C1AE93000
trusted library allocation
page read and write
21C164FA000
trusted library allocation
page read and write
21C1BDCE000
trusted library allocation
page read and write
21C1E86C000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C126DC000
trusted library allocation
page read and write
21C1264A000
trusted library allocation
page read and write
21C1ABEF000
trusted library allocation
page read and write
21C1B18C000
trusted library allocation
page read and write
21C14623000
trusted library allocation
page read and write
21C1258A000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C09777000
heap
page read and write
21C14630000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C14AD6000
trusted library allocation
page read and write
21C12131000
heap
page read and write
21C097E3000
heap
page read and write
21C09772000
heap
page read and write
21C1AB87000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C0E8CC000
trusted library allocation
page read and write
21C13D14000
trusted library allocation
page read and write
21C130BF000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C14030000
trusted library allocation
page read and write
21C14ACD000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C0978A000
heap
page read and write
21C097C5000
heap
page read and write
21C146A3000
trusted library allocation
page read and write
253E04E0000
unclassified section
page readonly
21C14637000
trusted library allocation
page read and write
21C0F913000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C09778000
heap
page read and write
21C12AE8000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C1462D000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C097B6000
heap
page read and write
21C13F0A000
trusted library allocation
page read and write
1B5668D0000
remote allocation
page execute read
21C153B2000
trusted library allocation
page read and write
21C1AC38000
trusted library allocation
page read and write
21C126C4000
trusted library allocation
page read and write
21C16A9F000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1213E000
heap
page read and write
21C1462D000
trusted library allocation
page read and write
21C124AC000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C1E33D000
heap
page read and write
1A2367A9000
heap
page read and write
21C138BA000
trusted library allocation
page read and write
21C097D3000
heap
page read and write
21C1248A000
trusted library allocation
page read and write
21C14082000
trusted library allocation
page read and write
21C137B1000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C097A0000
heap
page read and write
21C1449C000
trusted library allocation
page read and write
21C09783000
heap
page read and write
1A2356D0000
unclassified section
page readonly
21C1AB97000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C14082000
trusted library allocation
page read and write
21C1DDF0000
trusted library allocation
page read and write
21C14ACD000
trusted library allocation
page read and write
21C14ACD000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C097C9000
heap
page read and write
21C0F8EF000
trusted library allocation
page read and write
21C153A3000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C164C9000
trusted library allocation
page read and write
21C1AE3D000
trusted library allocation
page read and write
21C0F73A000
trusted library allocation
page read and write
21C12128000
heap
page read and write
21C130F9000
trusted library allocation
page read and write
21C14152000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C12105000
heap
page read and write
21C14477000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C164C9000
trusted library allocation
page read and write
21C1ACF0000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C1BE93000
trusted library allocation
page read and write
21C1E813000
trusted library allocation
page read and write
21C12577000
trusted library allocation
page read and write
9C0FFF000
stack
page read and write
21C0F7DD000
trusted library allocation
page read and write
21C1E87D000
trusted library allocation
page read and write
1A235A10000
trusted library allocation
page read and write
9BF7FE000
stack
page read and write
21C1DD61000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
165D643C000
heap
page read and write
1A23678D000
heap
page read and write
21C09784000
heap
page read and write
21C09778000
heap
page read and write
21C1B2BF000
trusted library allocation
page read and write
21C149AA000
trusted library allocation
page read and write
21C0F8D4000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C1E33D000
heap
page read and write
21C1E385000
heap
page read and write
21C097C9000
heap
page read and write
253E0979000
trusted library allocation
page read and write
21C0F97C000
trusted library allocation
page read and write
21C14A9B000
trusted library allocation
page read and write
21C13F07000
trusted library allocation
page read and write
21C12690000
trusted library allocation
page read and write
21C1465E000
trusted library allocation
page read and write
21C1D14D000
trusted library allocation
page read and write
21C1DEA9000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
1B567000000
trusted library allocation
page read and write
21C11DA0000
trusted library allocation
page read and write
21C1396B000
trusted library allocation
page read and write
21C1E0CF000
trusted library allocation
page read and write
21C144FA000
trusted library allocation
page read and write
21C0F8D2000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C1DD72000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
21C1395E000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C14E81000
trusted library allocation
page read and write
21C16A16000
trusted library allocation
page read and write
21C1ABDE000
trusted library allocation
page read and write
21C097BD000
heap
page read and write
21C1DDFE000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C12694000
trusted library allocation
page read and write
21C12563000
trusted library allocation
page read and write
1B566C00000
trusted library allocation
page read and write
21C1AEA7000
trusted library allocation
page read and write
21C130D6000
trusted library allocation
page read and write
21C097C3000
heap
page read and write
21C097A5000
heap
page read and write
21C12164000
heap
page read and write
21C097B6000
heap
page read and write
21C13882000
trusted library allocation
page read and write
38C0000
heap
page read and write
21C097C5000
heap
page read and write
21C1399E000
trusted library allocation
page read and write
21C1533B000
trusted library allocation
page read and write
21C1213F000
heap
page read and write
21C1408A000
trusted library allocation
page read and write
21C1DEAF000
trusted library allocation
page read and write
21C164FA000
trusted library allocation
page read and write
21C141DC000
trusted library allocation
page read and write
1A236829000
heap
page read and write
21C09779000
heap
page read and write
21C1DD3A000
trusted library allocation
page read and write
21C1B3E0000
trusted library allocation
page read and write
21C1DE76000
trusted library allocation
page read and write
21C1E2A6000
trusted library allocation
page read and write
21C12105000
heap
page read and write
21C097C5000
heap
page read and write
1B566A90000
unclassified section
page read and write
21C0977B000
heap
page read and write
21C097E3000
heap
page read and write
21C149B5000
trusted library allocation
page read and write
21C14732000
trusted library allocation
page read and write
21C146BC000
trusted library allocation
page read and write
21C11D60000
trusted library allocation
page read and write
21C097C6000
heap
page read and write
21C14078000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C16489000
trusted library allocation
page read and write
21C1E30D000
heap
page read and write
21C0976B000
heap
page read and write
21C16489000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C097D4000
heap
page read and write
21C1242C000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1444D000
trusted library allocation
page read and write
253E0923000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C146AC000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C0E1F8000
trusted library allocation
page read and write
21C1AD1C000
trusted library allocation
page read and write
1A2367AC000
heap
page read and write
21C1AC4A000
trusted library allocation
page read and write
21C0F8E2000
trusted library allocation
page read and write
1B566A80000
heap
page readonly
21C0F7B1000
trusted library allocation
page read and write
21C1E280000
trusted library allocation
page read and write
21C0E8CC000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
21C1418B000
trusted library allocation
page read and write
21C1ABAF000
trusted library allocation
page read and write
21C15EC7000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C0F9AA000
trusted library allocation
page read and write
21C14A56000
trusted library allocation
page read and write
21C0977D000
heap
page read and write
21C11D34000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C1E025000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C1E3A2000
heap
page read and write
21C14780000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C15E82000
trusted library allocation
page read and write
21C097D7000
heap
page read and write
21C1DD72000
trusted library allocation
page read and write
21C1255D000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
21C14A63000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C09778000
heap
page read and write
21C09772000
heap
page read and write
21C1212D000
heap
page read and write
21C1C5D7000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
1A235A6F000
trusted library allocation
page read and write
1A236861000
heap
page read and write
21C1E33D000
heap
page read and write
AA3F9D8000
stack
page read and write
21C1AEF1000
trusted library allocation
page read and write
AA432BE000
unkown
page readonly
1B566F03000
trusted library allocation
page read and write
21C16A9E000
trusted library allocation
page read and write
21C1AED8000
trusted library allocation
page read and write
1A23686A000
heap
page read and write
21C1AEBD000
trusted library allocation
page read and write
21C1AC32000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1AEEA000
trusted library allocation
page read and write
21C124B3000
trusted library allocation
page read and write
21C153BE000
trusted library allocation
page read and write
21C1399B000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C11DB9000
trusted library allocation
page read and write
21C14B00000
trusted library allocation
page read and write
21C09788000
heap
page read and write
21C1DEA5000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C09772000
heap
page read and write
21C164C6000
trusted library allocation
page read and write
21C1DB94000
trusted library allocation
page read and write
21C1E38D000
heap
page read and write
21C15E89000
trusted library allocation
page read and write
21C097DC000
heap
page read and write
21C146AC000
trusted library allocation
page read and write
1A2358E6000
heap
page read and write
21C097E3000
heap
page read and write
21C1DD82000
trusted library allocation
page read and write
21C0F7AA000
trusted library allocation
page read and write
9C2B0B000
stack
page read and write
21C0E900000
trusted library allocation
page read and write
21C14AD6000
trusted library allocation
page read and write
165D7F78000
heap
page read and write
253E0752000
unclassified section
page read and write
21C1AE47000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C11D26000
trusted library allocation
page read and write
21C11E90000
trusted library allocation
page read and write
21C13F02000
trusted library allocation
page read and write
253E0972000
trusted library allocation
page read and write
21C0976C000
heap
page read and write
21C12AD0000
trusted library allocation
page read and write
21C139B5000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
1B566C82000
trusted library allocation
page read and write
21C12564000
trusted library allocation
page read and write
1B566ABA000
heap
page read and write
21C09772000
heap
page read and write
1A2368A7000
heap
page read and write
21C126BE000
trusted library allocation
page read and write
21C097CB000
heap
page read and write
21C097C5000
heap
page read and write
21C1AF80000
trusted library allocation
page read and write
21C14673000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
21C1372A000
trusted library allocation
page read and write
AA411FE000
unkown
page readonly
21C097B6000
heap
page read and write
21C1E335000
heap
page read and write
21C1478A000
trusted library allocation
page read and write
10884931000
trusted library allocation
page execute read
21C1E86C000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C097BF000
heap
page read and write
21C0F8B4000
trusted library allocation
page read and write
21C140F7000
trusted library allocation
page read and write
21C09791000
heap
page read and write
21C1E33D000
heap
page read and write
21C1647D000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C09796000
heap
page read and write
21C140F2000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C0E7FE000
trusted library allocation
page read and write
21C16A2C000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1DD54000
trusted library allocation
page read and write
21C1E095000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C097CE000
heap
page read and write
21C12652000
trusted library allocation
page read and write
21C15392000
trusted library allocation
page read and write
21C15298000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1AC98000
trusted library allocation
page read and write
21C1302A000
trusted library allocation
page read and write
21C144C9000
trusted library allocation
page read and write
21C1D0C8000
trusted library allocation
page read and write
1B566C70000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C097C8000
heap
page read and write
21C09773000
heap
page read and write
21C1E898000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C14AC2000
trusted library allocation
page read and write
21C1ABAF000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C16472000
trusted library allocation
page read and write
21C1257F000
trusted library allocation
page read and write
21C1AE95000
trusted library allocation
page read and write
21C144DA000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1E89F000
trusted library allocation
page read and write
1A2367A4000
heap
page read and write
21C1308E000
trusted library allocation
page read and write
21C15353000
trusted library allocation
page read and write
21C149E2000
trusted library allocation
page read and write
21C1639E000
trusted library allocation
page read and write
21C09788000
heap
page read and write
9C35D8000
stack
page read and write
21C1ABFE000
trusted library allocation
page read and write
21C1DE15000
trusted library allocation
page read and write
21C1ABD3000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C1DD8D000
trusted library allocation
page read and write
21C13974000
trusted library allocation
page read and write
1A236828000
heap
page read and write
21C11D21000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C16AA7000
trusted library allocation
page read and write
21C14AF4000
trusted library allocation
page read and write
1A235FBF000
unkown
page execute read
9BEFFF000
stack
page read and write
21C1E335000
heap
page read and write
21C09791000
heap
page read and write
21C164DD000
trusted library allocation
page read and write
21C1AC32000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C15D90000
trusted library allocation
page read and write
21C1E016000
trusted library allocation
page read and write
21C1B3BE000
trusted library allocation
page read and write
21C0F8B2000
trusted library allocation
page read and write
21C14A3B000
trusted library allocation
page read and write
21C16445000
trusted library allocation
page read and write
21C1DD75000
trusted library allocation
page read and write
21C1D087000
trusted library allocation
page read and write
165D642A000
heap
page read and write
1A235FA0000
trusted library allocation
page read and write
21C1E30B000
heap
page read and write
21C1DEE2000
trusted library allocation
page read and write
21C1DED7000
trusted library allocation
page read and write
21C14076000
trusted library allocation
page read and write
21C164D1000
trusted library allocation
page read and write
21C14060000
trusted library allocation
page read and write
21C0E81E000
trusted library allocation
page read and write
21C151C0000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C1AECC000
trusted library allocation
page read and write
21C0F9F0000
trusted library allocation
page read and write
21C1BD9E000
trusted library allocation
page read and write
21C16489000
trusted library allocation
page read and write
21C1B693000
trusted library allocation
page read and write
21C14678000
trusted library allocation
page read and write
21C144B1000
trusted library allocation
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C140C6000
trusted library allocation
page read and write
21C1AB9F000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C097C8000
heap
page read and write
21C148DC000
trusted library allocation
page read and write
21C11D18000
trusted library allocation
page read and write
21C1251B000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C13781000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C12572000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1478D000
trusted library allocation
page read and write
21C1E0F4000
trusted library allocation
page read and write
21C14A5D000
trusted library allocation
page read and write
21C0EC61000
trusted library allocation
page read and write
21C1DE76000
trusted library allocation
page read and write
21C14070000
trusted library allocation
page read and write
21C14168000
trusted library allocation
page read and write
21C130DB000
trusted library allocation
page read and write
21C153F4000
trusted library allocation
page read and write
21C0977E000
heap
page read and write
21C1213E000
heap
page read and write
1A235AC7000
trusted library allocation
page read and write
21C1265E000
trusted library allocation
page read and write
21C130D6000
trusted library allocation
page read and write
165D6600000
trusted library allocation
page read and write
21C1DBFA000
trusted library allocation
page read and write
1B566C13000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C139C3000
trusted library allocation
page read and write
21C141C0000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C0978B000
heap
page read and write
165D6420000
heap
page read and write
21C0F710000
trusted library allocation
page read and write
1A236898000
heap
page read and write
21C12478000
trusted library allocation
page read and write
21C11ECF000
trusted library allocation
page read and write
64B9EBD000
stack
page read and write
21C09771000
heap
page read and write
253E0992000
trusted library allocation
page read and write
21C12AFB000
trusted library allocation
page read and write
21C1E045000
trusted library allocation
page read and write
1483000
heap
page read and write
1A236831000
heap
page read and write
21C126FC000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C13AF2000
trusted library allocation
page read and write
21C1326A000
trusted library allocation
page read and write
21C146D4000
trusted library allocation
page read and write
21C164A5000
trusted library allocation
page read and write
21C16B65000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1BE05000
trusted library allocation
page read and write
21C17902000
trusted library allocation
page read and write
21C14500000
trusted library allocation
page read and write
21C16A9F000
trusted library allocation
page read and write
21C141DA000
trusted library allocation
page read and write
21C153CB000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C1E29F000
trusted library allocation
page read and write
21C16B5B000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C16A8D000
trusted library allocation
page read and write
21C164B4000
trusted library allocation
page read and write
21C1DD5F000
trusted library allocation
page read and write
21C1E829000
trusted library allocation
page read and write
21C09766000
heap
page read and write
21C13879000
trusted library allocation
page read and write
21C097D3000
heap
page read and write
21C1419E000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C1AE46000
trusted library allocation
page read and write
21C0E813000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C0F75A000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C16BDB000
trusted library allocation
page read and write
21C16A92000
trusted library allocation
page read and write
21C14A4A000
trusted library allocation
page read and write
1A236050000
heap
page read and write
21C12660000
trusted library allocation
page read and write
B6FD1FC000
stack
page read and write
1A23687B000
heap
page read and write
21C097BE000
heap
page read and write
21C0F8EA000
trusted library allocation
page read and write
21C13726000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C11DC8000
trusted library allocation
page read and write
21C144A1000
trusted library allocation
page read and write
21C147C3000
trusted library allocation
page read and write
21C14683000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C14ED8000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
1A2367BD000
heap
page read and write
21C097D0000
heap
page read and write
21C097C5000
heap
page read and write
21C0F8E2000
trusted library allocation
page read and write
21C146A3000
trusted library allocation
page read and write
21C12AF5000
trusted library allocation
page read and write
21C12120000
heap
page read and write
21C0978B000
heap
page read and write
21C140E6000
trusted library allocation
page read and write
21C1B605000
trusted library allocation
page read and write
1394000
heap
page read and write
21C097E1000
heap
page read and write
21C14AF4000
trusted library allocation
page read and write
21C13086000
trusted library allocation
page read and write
21C1E845000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C14663000
trusted library allocation
page read and write
21C12AFB000
trusted library allocation
page read and write
21C126B9000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C164C9000
trusted library allocation
page read and write
21C1AEBF000
trusted library allocation
page read and write
21C1BE50000
trusted library allocation
page read and write
21C16A3F000
trusted library allocation
page read and write
21C1DDF5000
trusted library allocation
page read and write
21C09777000
heap
page read and write
253E04F0000
unclassified section
page readonly
1A235AC2000
trusted library allocation
page read and write
21C13ACE000
trusted library allocation
page read and write
21C097D4000
heap
page read and write
21C1B147000
trusted library allocation
page read and write
21C12131000
heap
page read and write
21C15D4F000
trusted library allocation
page read and write
10884841000
trusted library allocation
page execute read
21C1E0F6000
trusted library allocation
page read and write
21C1E09C000
trusted library allocation
page read and write
21C0F9F6000
trusted library allocation
page read and write
1A236898000
heap
page read and write
21C1E870000
trusted library allocation
page read and write
21C16489000
trusted library allocation
page read and write
21C164F9000
trusted library allocation
page read and write
21C14B1B000
trusted library allocation
page read and write
253E0550000
remote allocation
page read and write
21C13808000
trusted library allocation
page read and write
1B566C5D000
trusted library allocation
page read and write
21C1DEA9000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C0977D000
heap
page read and write
21C15DA1000
trusted library allocation
page read and write
21C16BA8000
trusted library allocation
page read and write
21C1DEAD000
trusted library allocation
page read and write
1A236309000
trusted library allocation
page read and write
21C1AC98000
trusted library allocation
page read and write
1A235840000
heap
page read and write
21C14165000
trusted library allocation
page read and write
21C164C9000
trusted library allocation
page read and write
21C164F5000
trusted library allocation
page read and write
21C164D1000
trusted library allocation
page read and write
21C1408C000
trusted library allocation
page read and write
21C164F5000
trusted library allocation
page read and write
21C13955000
trusted library allocation
page read and write
21C1E3CF000
heap
page read and write
21C16AC3000
trusted library allocation
page read and write
21C137AE000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1E0E5000
trusted library allocation
page read and write
21C16A9E000
trusted library allocation
page read and write
21C14A50000
trusted library allocation
page read and write
21C1DDFE000
trusted library allocation
page read and write
21C1E371000
heap
page read and write
21C1E335000
heap
page read and write
21C1AECC000
trusted library allocation
page read and write
21C146D4000
trusted library allocation
page read and write
21C1B18C000
trusted library allocation
page read and write
21C1467B000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097C5000
heap
page read and write
21C0F793000
trusted library allocation
page read and write
21C1DD30000
trusted library allocation
page read and write
21C1469B000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C150C7000
trusted library allocation
page read and write
21C0F8D2000
trusted library allocation
page read and write
21C164CE000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C13C24000
trusted library allocation
page read and write
21C0F72D000
trusted library allocation
page read and write
21C0E87D000
trusted library allocation
page read and write
21C1327D000
trusted library allocation
page read and write
21C097C0000
heap
page read and write
21C1C5F6000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C14443000
trusted library allocation
page read and write
21C1387D000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C16AC0000
trusted library allocation
page read and write
21C09781000
heap
page read and write
253E095B000
trusted library allocation
page read and write
21C14459000
trusted library allocation
page read and write
21C0F884000
trusted library allocation
page read and write
21C14A9E000
trusted library allocation
page read and write
21C1AC2C000
trusted library allocation
page read and write
21C14A74000
trusted library allocation
page read and write
21C141EB000
trusted library allocation
page read and write
3D00000
heap
page read and write
21C1E8E6000
trusted library allocation
page read and write
11EF000
stack
page read and write
253E0B0C000
trusted library allocation
page read and write
253E0C03000
heap
page read and write
21C14B5D000
trusted library allocation
page read and write
21C1E32C000
heap
page read and write
21C1263B000
trusted library allocation
page read and write
21C16A71000
trusted library allocation
page read and write
21C0E776000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C12128000
heap
page read and write
21C13723000
trusted library allocation
page read and write
21C0F8BF000
trusted library allocation
page read and write
21C1E052000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C0F871000
trusted library allocation
page read and write
21C12471000
trusted library allocation
page read and write
1B566CB5000
trusted library allocation
page read and write
1A236828000
heap
page read and write
21C139A7000
trusted library allocation
page read and write
21C1538A000
trusted library allocation
page read and write
1440000
heap
page read and write
21C13096000
trusted library allocation
page read and write
21C13ADA000
trusted library allocation
page read and write
21C1AEA2000
trusted library allocation
page read and write
21C1AE28000
trusted library allocation
page read and write
21C14D4D000
trusted library allocation
page read and write
21C1AEF2000
trusted library allocation
page read and write
21C15DC7000
trusted library allocation
page read and write
21C16426000
trusted library allocation
page read and write
21C1E033000
trusted library allocation
page read and write
1A2367A9000
heap
page read and write
21C1243F000
trusted library allocation
page read and write
21C146BC000
trusted library allocation
page read and write
21C14AF2000
trusted library allocation
page read and write
64B7BFE000
unkown
page readonly
21C097D8000
heap
page read and write
21C1AE46000
trusted library allocation
page read and write
21C1B292000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C1E346000
heap
page read and write
21C164CE000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C13853000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
21C14ADA000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C1647D000
trusted library allocation
page read and write
21C1BE37000
trusted library allocation
page read and write
1A2367CA000
heap
page read and write
21C0F8B9000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C097BF000
heap
page read and write
21C164BB000
trusted library allocation
page read and write
21C1469F000
trusted library allocation
page read and write
21C12126000
heap
page read and write
21C0F781000
trusted library allocation
page read and write
21C14A9B000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1DD0C000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C1267F000
trusted library allocation
page read and write
21C14ADA000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1E3E1000
heap
page read and write
21C0978A000
heap
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C1E034000
trusted library allocation
page read and write
21C1B2E4000
trusted library allocation
page read and write
21C1ADDC000
trusted library allocation
page read and write
21C0F821000
trusted library allocation
page read and write
21C1AE4D000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
21C1E278000
trusted library allocation
page read and write
21C137F2000
trusted library allocation
page read and write
1A236861000
heap
page read and write
1A2367A0000
heap
page read and write
21C1ADD6000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C15EE0000
trusted library allocation
page read and write
21C130D6000
trusted library allocation
page read and write
21C1648B000
trusted library allocation
page read and write
21C1ADD4000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097B6000
heap
page read and write
21C1E02E000
trusted library allocation
page read and write
21C1DED7000
trusted library allocation
page read and write
21C137A9000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C097E3000
heap
page read and write
21C09776000
heap
page read and write
21C15D8C000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C0F8AE000
trusted library allocation
page read and write
21C0F733000
trusted library allocation
page read and write
21C164D1000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C12131000
heap
page read and write
21C1AEF0000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
21C14AF4000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1DE76000
trusted library allocation
page read and write
21C130E9000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1E870000
trusted library allocation
page read and write
21C13853000
trusted library allocation
page read and write
21C14663000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C097CD000
heap
page read and write
253E0B16000
trusted library allocation
page read and write
21C097D0000
heap
page read and write
21C09785000
heap
page read and write
21C097BE000
heap
page read and write
21C164D1000
trusted library allocation
page read and write
21C150CD000
trusted library allocation
page read and write
21C097D8000
heap
page read and write
21C14615000
trusted library allocation
page read and write
21C150C1000
trusted library allocation
page read and write
21C1E3DF000
heap
page read and write
21C097C8000
heap
page read and write
21C09778000
heap
page read and write
21C097C5000
heap
page read and write
253E0A26000
heap
page read and write
21C09772000
heap
page read and write
21C141A3000
trusted library allocation
page read and write
1A2367AC000
heap
page read and write
21C0977B000
heap
page read and write
1B566A92000
unclassified section
page read and write
21C097C5000
heap
page read and write
21C09778000
heap
page read and write
21C1E05C000
trusted library allocation
page read and write
21C1DD5F000
trusted library allocation
page read and write
21C141C6000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C09786000
heap
page read and write
21C097DF000
heap
page read and write
21C146FB000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C1E2D2000
trusted library allocation
page read and write
21C139A5000
trusted library allocation
page read and write
21C14757000
trusted library allocation
page read and write
21C147E6000
trusted library allocation
page read and write
21C12586000
trusted library allocation
page read and write
21C13893000
trusted library allocation
page read and write
21C1E892000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C1DD94000
trusted library allocation
page read and write
165D6441000
heap
page read and write
21C13D24000
trusted library allocation
page read and write
10884921000
trusted library allocation
page execute read
21C164CE000
trusted library allocation
page read and write
21C16AD0000
trusted library allocation
page read and write
AA3EE9E000
unkown
page readonly
21C0F8A0000
trusted library allocation
page read and write
21C16A31000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C09780000
heap
page read and write
21C09781000
heap
page read and write
21C16489000
trusted library allocation
page read and write
21C12664000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
11FE000
stack
page read and write
1A2367AC000
heap
page read and write
21C1DDF5000
trusted library allocation
page read and write
21C1465B000
trusted library allocation
page read and write
1A235A03000
trusted library allocation
page read and write
1A235FB0000
unkown
page execute read
21C15EDF000
trusted library allocation
page read and write
21C097CD000
heap
page read and write
21C146E2000
trusted library allocation
page read and write
21C1E095000
trusted library allocation
page read and write
21C0977E000
heap
page read and write
21C1E3C4000
heap
page read and write
21C097B9000
heap
page read and write
21C1B151000
trusted library allocation
page read and write
21C146DF000
trusted library allocation
page read and write
21C13733000
trusted library allocation
page read and write
21C11E5F000
trusted library allocation
page read and write
21C1E0D3000
trusted library allocation
page read and write
21C16A27000
trusted library allocation
page read and write
21C146A3000
trusted library allocation
page read and write
1A236884000
heap
page read and write
21C1E29F000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C164C9000
trusted library allocation
page read and write
253E0B32000
trusted library allocation
page read and write
884000
unkown
page readonly
21C14082000
trusted library allocation
page read and write
21C097DE000
heap
page read and write
21C11DDE000
trusted library allocation
page read and write
21C1E0A0000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C11D39000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C0F8B9000
trusted library allocation
page read and write
21C1E0A4000
trusted library allocation
page read and write
21C1E2B7000
trusted library allocation
page read and write
21C1256A000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C0976A000
heap
page read and write
21C1E309000
heap
page read and write
21C1462D000
trusted library allocation
page read and write
11BF000
stack
page read and write
21C097B6000
heap
page read and write
21C164F5000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
253E0A24000
heap
page read and write
21C1263D000
trusted library allocation
page read and write
21C12A89000
trusted library allocation
page read and write
21C14AE2000
trusted library allocation
page read and write
21C1AB81000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1AEA9000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C097CD000
heap
page read and write
1A23686A000
heap
page read and write
21C1409C000
trusted library allocation
page read and write
21C1309A000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097E3000
heap
page read and write
21C0F775000
trusted library allocation
page read and write
21C14B64000
trusted library allocation
page read and write
64B7B7E000
unkown
page readonly
21C140AA000
trusted library allocation
page read and write
21C152A5000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C14672000
trusted library allocation
page read and write
1A2358BF000
unclassified section
page read and write
21C0978A000
heap
page read and write
21C097DF000
heap
page read and write
1394000
heap
page read and write
21C1AC2A000
trusted library allocation
page read and write
21C1B292000
trusted library allocation
page read and write
21C1387D000
trusted library allocation
page read and write
147F000
heap
page read and write
21C146D1000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C097C6000
heap
page read and write
1B566C65000
trusted library allocation
page read and write
21C13971000
trusted library allocation
page read and write
21C1D10C000
trusted library allocation
page read and write
21C11EFC000
trusted library allocation
page read and write
253E0570000
unclassified section
page readonly
21C164C6000
trusted library allocation
page read and write
21C097DF000
heap
page read and write
21C1212D000
heap
page read and write
21C151C8000
trusted library allocation
page read and write
21C14474000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C1B2FA000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C146A3000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C12AEC000
trusted library allocation
page read and write
21C1469F000
trusted library allocation
page read and write
21C1E2AF000
trusted library allocation
page read and write
21C144DE000
trusted library allocation
page read and write
21C1DB94000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C146E2000
trusted library allocation
page read and write
21C1E82C000
trusted library allocation
page read and write
21C149BD000
trusted library allocation
page read and write
1A235A00000
trusted library allocation
page read and write
1A236826000
heap
page read and write
21C164BB000
trusted library allocation
page read and write
21C16445000
trusted library allocation
page read and write
21C097CD000
heap
page read and write
21C1B68A000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C1DD7C000
trusted library allocation
page read and write
21C14423000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C144BD000
trusted library allocation
page read and write
21C16394000
trusted library allocation
page read and write
21C0F96C000
trusted library allocation
page read and write
21C15D46000
trusted library allocation
page read and write
21C097DB000
heap
page read and write
21C12131000
heap
page read and write
21C097C5000
heap
page read and write
21C144EA000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
21C0F9F8000
trusted library allocation
page read and write
21C1E2D8000
trusted library allocation
page read and write
21C14FEE000
trusted library allocation
page read and write
1A236826000
heap
page read and write
1A2367F9000
heap
page read and write
21C1AD90000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C144C9000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C09773000
heap
page read and write
21C125A4000
trusted library allocation
page read and write
21C1DD56000
trusted library allocation
page read and write
21C1AE34000
trusted library allocation
page read and write
9C07FF000
stack
page read and write
21C164F5000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C16A34000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
280B2970000
heap
page read and write
21C09778000
heap
page read and write
21C15DC2000
trusted library allocation
page read and write
21C16A94000
trusted library allocation
page read and write
21C144BD000
trusted library allocation
page read and write
253E090B000
trusted library allocation
page read and write
253E0C00000
heap
page read and write
21C1AEFB000
trusted library allocation
page read and write
21C1E3FE000
heap
page read and write
21C149D0000
trusted library allocation
page read and write
21C0976E000
heap
page read and write
21C0F9EB000
trusted library allocation
page read and write
21C09786000
heap
page read and write
1A235A12000
trusted library allocation
page read and write
21C1E853000
trusted library allocation
page read and write
21C14AD6000
trusted library allocation
page read and write
21C1E885000
trusted library allocation
page read and write
21C1E299000
trusted library allocation
page read and write
21C153CF000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C140AA000
trusted library allocation
page read and write
21C0F8BF000
trusted library allocation
page read and write
21C14663000
trusted library allocation
page read and write
21C12534000
trusted library allocation
page read and write
21C097D8000
heap
page read and write
21C1E2D5000
trusted library allocation
page read and write
21C1246A000
trusted library allocation
page read and write
21C0F813000
trusted library allocation
page read and write
21C15ECB000
trusted library allocation
page read and write
21C130A6000
trusted library allocation
page read and write
253E075F000
unclassified section
page read and write
21C1308E000
trusted library allocation
page read and write
21C1648B000
trusted library allocation
page read and write
21C09785000
heap
page read and write
AA42ABE000
stack
page read and write
21C164C9000
trusted library allocation
page read and write
21C15390000
trusted library allocation
page read and write
21C12131000
heap
page read and write
21C097A5000
heap
page read and write
21C125A4000
trusted library allocation
page read and write
21C14639000
trusted library allocation
page read and write
21C12A7B000
trusted library allocation
page read and write
21C125A4000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
21C1E09B000
trusted library allocation
page read and write
253E095D000
trusted library allocation
page read and write
1A2367E8000
heap
page read and write
21C1E09B000
trusted library allocation
page read and write
21C12588000
trusted library allocation
page read and write
21C1AB3B000
trusted library allocation
page read and write
21C1212D000
heap
page read and write
21C097B6000
heap
page read and write
21C1DEA7000
trusted library allocation
page read and write
1A235ABE000
trusted library allocation
page read and write
21C14082000
trusted library allocation
page read and write
21C1213F000
heap
page read and write
21C097D2000
heap
page read and write
21C1E080000
trusted library allocation
page read and write
21C12AE5000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C130E9000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C140B3000
trusted library allocation
page read and write
21C097D0000
heap
page read and write
21C14747000
trusted library allocation
page read and write
1A235FD7000
unkown
page execute read
21C1AEB1000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C12586000
trusted library allocation
page read and write
21C1ACE7000
trusted library allocation
page read and write
7B0000
unkown
page readonly
1A235AE9000
trusted library allocation
page read and write
21C1466C000
trusted library allocation
page read and write
21C1E26C000
trusted library allocation
page read and write
21C146BC000
trusted library allocation
page read and write
21C0F72D000
trusted library allocation
page read and write
21C0F8C3000
trusted library allocation
page read and write
21C15DFC000
trusted library allocation
page read and write
21C14EDC000
trusted library allocation
page read and write
21C1E007000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C164CE000
trusted library allocation
page read and write
21C140AA000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C13930000
trusted library allocation
page read and write
21C140D5000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C09783000
heap
page read and write
21C1DDFE000
trusted library allocation
page read and write
21C0E190000
trusted library allocation
page read and write
21C14A56000
trusted library allocation
page read and write
21C14983000
trusted library allocation
page read and write
21C148F2000
trusted library allocation
page read and write
21C15D19000
trusted library allocation
page read and write
21C1E0FC000
trusted library allocation
page read and write
253E090D000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C097B6000
heap
page read and write
21C097C5000
heap
page read and write
21C0F97B000
trusted library allocation
page read and write
21C0F84E000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C097E3000
heap
page read and write
21C137B5000
trusted library allocation
page read and write
21C16398000
trusted library allocation
page read and write
21C12463000
trusted library allocation
page read and write
21C1E0E2000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C1ABD0000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C097E3000
heap
page read and write
21C0F7DD000
trusted library allocation
page read and write
21C1467A000
trusted library allocation
page read and write
21C1465D000
trusted library allocation
page read and write
21C144CE000
trusted library allocation
page read and write
21C1E413000
heap
page read and write
21C1E345000
heap
page read and write
21C14D6D000
trusted library allocation
page read and write
21C1470F000
trusted library allocation
page read and write
21C1398E000
trusted library allocation
page read and write
21C0976C000
heap
page read and write
21C16472000
trusted library allocation
page read and write
21C1518A000
trusted library allocation
page read and write
21C12A60000
trusted library allocation
page read and write
21C1B10B000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C140D0000
trusted library allocation
page read and write
21C15E97000
trusted library allocation
page read and write
21C1AECE000
trusted library allocation
page read and write
21C141D4000
trusted library allocation
page read and write
21C15340000
trusted library allocation
page read and write
21C1469B000
trusted library allocation
page read and write
21C16AB7000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C15E8F000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C16A36000
trusted library allocation
page read and write
21C164FA000
trusted library allocation
page read and write
21C1E82A000
trusted library allocation
page read and write
21C0F8E6000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C146BC000
trusted library allocation
page read and write
21C1AD52000
trusted library allocation
page read and write
21C146AC000
trusted library allocation
page read and write
21C14786000
trusted library allocation
page read and write
21C16B8F000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C09781000
heap
page read and write
21C1AEBF000
trusted library allocation
page read and write
21C1E296000
trusted library allocation
page read and write
21C11DD6000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C13759000
trusted library allocation
page read and write
21C0F8B4000
trusted library allocation
page read and write
21C1E309000
heap
page read and write
21C164D1000
trusted library allocation
page read and write
21C14683000
trusted library allocation
page read and write
21C12698000
trusted library allocation
page read and write
253E0965000
trusted library allocation
page read and write
21C1473A000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C1E33D000
heap
page read and write
21C1C590000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C13866000
trusted library allocation
page read and write
21C0976D000
heap
page read and write
21C09781000
heap
page read and write
21C146D1000
trusted library allocation
page read and write
21C14073000
trusted library allocation
page read and write
21C16B9F000
trusted library allocation
page read and write
87C000
unkown
page write copy
21C13760000
trusted library allocation
page read and write
21C1B650000
trusted library allocation
page read and write
1A2368A7000
heap
page read and write
21C09781000
heap
page read and write
21C14663000
trusted library allocation
page read and write
21C13D06000
trusted library allocation
page read and write
21C0F8F3000
trusted library allocation
page read and write
21C14061000
trusted library allocation
page read and write
21C12AE5000
trusted library allocation
page read and write
21C09777000
heap
page read and write
21C09777000
heap
page read and write
1A2367EA000
heap
page read and write
21C1E0F4000
trusted library allocation
page read and write
21C1AEF2000
trusted library allocation
page read and write
21C16A9A000
trusted library allocation
page read and write
21C1DD5A000
trusted library allocation
page read and write
21C09796000
heap
page read and write
21C0E866000
trusted library allocation
page read and write
21C15194000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
1490000
heap
page read and write
21C14DF6000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C140F7000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21F0000
heap
page read and write
21C0977B000
heap
page read and write
21C1E301000
heap
page read and write
21C0F8F6000
trusted library allocation
page read and write
253E06C0000
heap
page read and write
1A236831000
heap
page read and write
21C13966000
trusted library allocation
page read and write
21C140AB000
trusted library allocation
page read and write
21C1AC6C000
trusted library allocation
page read and write
21C1309A000
trusted library allocation
page read and write
21C16A19000
trusted library allocation
page read and write
21C1CDF9000
trusted library allocation
page read and write
21C1B100000
trusted library allocation
page read and write
21C1B3A3000
trusted library allocation
page read and write
1A23683D000
heap
page read and write
21C15D23000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C1ADD8000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1AB27000
trusted library allocation
page read and write
21C097B9000
heap
page read and write
21C09781000
heap
page read and write
21C139C4000
trusted library allocation
page read and write
21C097BE000
heap
page read and write
21C15399000
trusted library allocation
page read and write
21C1DD49000
trusted library allocation
page read and write
21C1E0E5000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
253E097E000
trusted library allocation
page read and write
21C141F1000
trusted library allocation
page read and write
21C1AE42000
trusted library allocation
page read and write
21C1E0D5000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C0F8DD000
trusted library allocation
page read and write
21C1461A000
trusted library allocation
page read and write
21C1E339000
heap
page read and write
1E056B303000
trusted library allocation
page read and write
21C1BE1C000
trusted library allocation
page read and write
21C14AF2000
trusted library allocation
page read and write
21C1408C000
trusted library allocation
page read and write
1A236823000
heap
page read and write
21C11DDB000
trusted library allocation
page read and write
21C149AE000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
253E0B03000
trusted library allocation
page read and write
21C09786000
heap
page read and write
21C16A6B000
trusted library allocation
page read and write
21C097CB000
heap
page read and write
21C1DEB1000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C097C5000
heap
page read and write
21C1E345000
heap
page read and write
21C1E0D5000
trusted library allocation
page read and write
21C138CD000
trusted library allocation
page read and write
21C1E053000
trusted library allocation
page read and write
165D6607000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C097BB000
heap
page read and write
253E09E7000
trusted library allocation
page read and write
21C144F3000
trusted library allocation
page read and write
21C09785000
heap
page read and write
21C14049000
trusted library allocation
page read and write
253E0680000
heap
page read and write
21C0977B000
heap
page read and write
21C097BF000
heap
page read and write
21C1C586000
trusted library allocation
page read and write
1468000
heap
page read and write
1B566C30000
trusted library allocation
page read and write
21C14070000
trusted library allocation
page read and write
21C12561000
trusted library allocation
page read and write
1A235A5C000
trusted library allocation
page read and write
165D62B0000
heap
page read and write
21C1AEC5000
trusted library allocation
page read and write
21C0E1B3000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C09790000
heap
page read and write
1A2368A7000
heap
page read and write
21C1478E000
trusted library allocation
page read and write
21C14099000
trusted library allocation
page read and write
21C0E1DF000
trusted library allocation
page read and write
21C09775000
heap
page read and write
21C09796000
heap
page read and write
21C0F8F3000
trusted library allocation
page read and write
21C0F8EB000
trusted library allocation
page read and write
21C130FB000
trusted library allocation
page read and write
21C14A72000
trusted library allocation
page read and write
21C13733000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C1E28D000
trusted library allocation
page read and write
21C1259A000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C164F5000
trusted library allocation
page read and write
21C14AD2000
trusted library allocation
page read and write
21C1ACF7000
trusted library allocation
page read and write
21C1DD56000
trusted library allocation
page read and write
21C1E0CF000
trusted library allocation
page read and write
21C09778000
heap
page read and write
880000
unkown
page write copy
21C164F5000
trusted library allocation
page read and write
21C0F8AE000
trusted library allocation
page read and write
21C13080000
trusted library allocation
page read and write
21C13DB0000
trusted library allocation
page read and write
21C0976A000
heap
page read and write
21C14643000
trusted library allocation
page read and write
21C16A5C000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C09778000
heap
page read and write
21C13887000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1AEF5000
trusted library allocation
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C1477D000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C097CE000
heap
page read and write
21C139B2000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C11DF8000
trusted library allocation
page read and write
165D67B5000
heap
page read and write
21C0F793000
trusted library allocation
page read and write
872000
unkown
page readonly
21C09772000
heap
page read and write
21C1E05C000
trusted library allocation
page read and write
21C12664000
trusted library allocation
page read and write
21C14666000
trusted library allocation
page read and write
21C0F8B2000
trusted library allocation
page read and write
21C16BDB000
trusted library allocation
page read and write
21C1E845000
trusted library allocation
page read and write
21C1DEAB000
trusted library allocation
page read and write
21C1AE1A000
trusted library allocation
page read and write
21C164B8000
trusted library allocation
page read and write
21C13765000
trusted library allocation
page read and write
21C1AEE1000
trusted library allocation
page read and write
21C146D1000
trusted library allocation
page read and write
21C139AE000
trusted library allocation
page read and write
1B566CD7000
trusted library allocation
page read and write
21C097DC000
heap
page read and write
21C1E0E2000
trusted library allocation
page read and write
21C16A37000
trusted library allocation
page read and write
21C164DD000
trusted library allocation
page read and write
21C0F8B0000
trusted library allocation
page read and write
21C16472000
trusted library allocation
page read and write
21C12ACC000
trusted library allocation
page read and write
21C12471000
trusted library allocation
page read and write
21C146BC000
trusted library allocation
page read and write
21C1E317000
heap
page read and write
149A000
heap
page read and write
21C16490000
trusted library allocation
page read and write
21C126CC000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C1E338000
heap
page read and write
21C097C5000
heap
page read and write
21C1AB86000
trusted library allocation
page read and write
21C14A48000
trusted library allocation
page read and write
21C16445000
trusted library allocation
page read and write
21C1407C000
trusted library allocation
page read and write
21C1AC2A000
trusted library allocation
page read and write
21C1DDF0000
trusted library allocation
page read and write
21C130E3000
trusted library allocation
page read and write
21C1AD7B000
trusted library allocation
page read and write
21C1E2BA000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C097B6000
heap
page read and write
21C1E2B7000
trusted library allocation
page read and write
21C16A31000
trusted library allocation
page read and write
21C13882000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C11D60000
trusted library allocation
page read and write
21C1E86C000
trusted library allocation
page read and write
21C097D2000
heap
page read and write
21C0F8D2000
trusted library allocation
page read and write
21C1DEA5000
trusted library allocation
page read and write
21C1AEC5000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C16A9E000
trusted library allocation
page read and write
21C0976A000
heap
page read and write
21C0F8EB000
trusted library allocation
page read and write
165D7F7A000
heap
page read and write
21C16A3C000
trusted library allocation
page read and write
21C15D44000
trusted library allocation
page read and write
21C0F8F6000
trusted library allocation
page read and write
21C1DEAB000
trusted library allocation
page read and write
21C130F9000
trusted library allocation
page read and write
280B2B00000
trusted library allocation
page read and write
21C1DEA7000
trusted library allocation
page read and write
21C1385A000
trusted library allocation
page read and write
1B566CBB000
trusted library allocation
page read and write
21C1AC3B000
trusted library allocation
page read and write
21C097DB000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C1AED5000
trusted library allocation
page read and write
21C1DE25000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C09780000
heap
page read and write
21C1396B000
trusted library allocation
page read and write
165D7F60000
heap
page read and write
21C097CE000
heap
page read and write
21C16A2C000
trusted library allocation
page read and write
21C146BB000
trusted library allocation
page read and write
21C1BD84000
trusted library allocation
page read and write
21C1AE4C000
trusted library allocation
page read and write
21C1412A000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C1E0F4000
trusted library allocation
page read and write
1A236862000
heap
page read and write
253E0903000
trusted library allocation
page read and write
1A235ACE000
trusted library allocation
page read and write
21C09781000
heap
page read and write
21C1E2F2000
trusted library allocation
page read and write
21C0E771000
trusted library allocation
page read and write
21C164BB000
trusted library allocation
page read and write
21C1E299000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C1E05C000
trusted library allocation
page read and write
21C1461B000
trusted library allocation
page read and write
1A235AEF000
trusted library allocation
page read and write
21C1ABA3000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
280B2D0A000
trusted library allocation
page read and write
21C1DEA5000
trusted library allocation
page read and write
21C1379F000
trusted library allocation
page read and write
21C14459000
trusted library allocation
page read and write
21C1E0B1000
trusted library allocation
page read and write
21C13DC3000
trusted library allocation
page read and write
21C0F8E2000
trusted library allocation
page read and write
21C14ADE000
trusted library allocation
page read and write
21C0E87F000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
9BEFFB000
stack
page read and write
21C097B6000
heap
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C16BB9000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C11D61000
trusted library allocation
page read and write
21C1412A000
trusted library allocation
page read and write
21C1D0E5000
trusted library allocation
page read and write
21C12AFB000
trusted library allocation
page read and write
205F000
stack
page read and write
21C14AE2000
trusted library allocation
page read and write
21C14A61000
trusted library allocation
page read and write
21C0E181000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1E009000
trusted library allocation
page read and write
21C1DDA4000
trusted library allocation
page read and write
21C1DD88000
trusted library allocation
page read and write
21C09773000
heap
page read and write
1A2367CA000
heap
page read and write
21C12AFB000
trusted library allocation
page read and write
21C1E892000
trusted library allocation
page read and write
21C0F8F4000
trusted library allocation
page read and write
21C1B6AC000
trusted library allocation
page read and write
21C1E2D2000
trusted library allocation
page read and write
21C1ADDA000
trusted library allocation
page read and write
21C09788000
heap
page read and write
21C16B86000
trusted library allocation
page read and write
21C16A3F000
trusted library allocation
page read and write
21C1213E000
heap
page read and write
21C1DD50000
trusted library allocation
page read and write
21C1C500000
trusted library allocation
page read and write
21C1E317000
heap
page read and write
64B9EFE000
unkown
page readonly
1A236130000
heap
page read and write
21C1B2FE000
trusted library allocation
page read and write
21C0E1EF000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
1A23683D000
heap
page read and write
21C1469C000
trusted library allocation
page read and write
21C09788000
heap
page read and write
21C0FA2D000
trusted library allocation
page read and write
21C1E87D000
trusted library allocation
page read and write
21C14FE7000
trusted library allocation
page read and write
64B9E3E000
stack
page read and write
1A23584A000
heap
page read and write
21C14DDB000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C097A5000
heap
page read and write
21C1DD90000
trusted library allocation
page read and write
21C16A71000
trusted library allocation
page read and write
21C11EF3000
trusted library allocation
page read and write
21C16B78000
trusted library allocation
page read and write
9C45FE000
stack
page read and write
21C1B2E0000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C1AB93000
trusted library allocation
page read and write
21C14765000
trusted library allocation
page read and write
21C14D33000
trusted library allocation
page read and write
21C1E0A6000
trusted library allocation
page read and write
21C1E095000
trusted library allocation
page read and write
21C1DD2A000
trusted library allocation
page read and write
21C0F747000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C0977A000
heap
page read and write
21C16A68000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C1E050000
trusted library allocation
page read and write
21C14AF4000
trusted library allocation
page read and write
21C16BAC000
trusted library allocation
page read and write
253E0912000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C14770000
trusted library allocation
page read and write
21C1E2AF000
trusted library allocation
page read and write
21C1DDA0000
trusted library allocation
page read and write
21C1DD7E000
trusted library allocation
page read and write
1A236831000
heap
page read and write
21C11E63000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C097CD000
heap
page read and write
21C0F75A000
trusted library allocation
page read and write
21C097DC000
heap
page read and write
21C1AEC9000
trusted library allocation
page read and write
21C1499B000
trusted library allocation
page read and write
11CE000
stack
page read and write
21C09783000
heap
page read and write
21C09778000
heap
page read and write
21C1E335000
heap
page read and write
21C137BE000
trusted library allocation
page read and write
21C0F8B5000
trusted library allocation
page read and write
21C146F9000
trusted library allocation
page read and write
21C1AE51000
trusted library allocation
page read and write
21C0E198000
trusted library allocation
page read and write
21C1E842000
trusted library allocation
page read and write
21C147D3000
trusted library allocation
page read and write
21C13763000
trusted library allocation
page read and write
1380000
heap
page read and write
21C14623000
trusted library allocation
page read and write
21C1C5F6000
trusted library allocation
page read and write
21C14666000
trusted library allocation
page read and write
21C1B2AE000
trusted library allocation
page read and write
21C09762000
heap
page read and write
21C1AEFD000
trusted library allocation
page read and write
21C1E885000
trusted library allocation
page read and write
21C09786000
heap
page read and write
21C097CD000
heap
page read and write
21C1E845000
trusted library allocation
page read and write
21C097BB000
heap
page read and write
21C1DD80000
trusted library allocation
page read and write
21C14A53000
trusted library allocation
page read and write
21C1416A000
trusted library allocation
page read and write
21C14A6F000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C1254D000
trusted library allocation
page read and write
21C1E8B6000
trusted library allocation
page read and write
21C130A9000
trusted library allocation
page read and write
21C097CA000
heap
page read and write
21C1E0D7000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C1B667000
trusted library allocation
page read and write
21C1E2F2000
trusted library allocation
page read and write
21C14A4D000
trusted library allocation
page read and write
21C1303E000
trusted library allocation
page read and write
21C1B3B5000
trusted library allocation
page read and write
21C14630000
trusted library allocation
page read and write
21C130A9000
trusted library allocation
page read and write
21C139B5000
trusted library allocation
page read and write
21C1462D000
trusted library allocation
page read and write
21C1D186000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1E2F2000
trusted library allocation
page read and write
21C13958000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C13F05000
trusted library allocation
page read and write
21C140F2000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C1E029000
trusted library allocation
page read and write
21C130C3000
trusted library allocation
page read and write
21C1469B000
trusted library allocation
page read and write
21C164D1000
trusted library allocation
page read and write
21C164D5000
trusted library allocation
page read and write
21C13083000
trusted library allocation
page read and write
21C1ABFE000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C13096000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C1ACAD000
trusted library allocation
page read and write
21C1DBDF000
trusted library allocation
page read and write
1A236828000
heap
page read and write
21C097C5000
heap
page read and write
21C0978B000
heap
page read and write
21C0976D000
heap
page read and write
21C097DB000
heap
page read and write
1260000
heap
page read and write
21C1DDFB000
trusted library allocation
page read and write
21C0F8B4000
trusted library allocation
page read and write
1B566944000
heap
page read and write
21C12128000
heap
page read and write
21C097BE000
heap
page read and write
21C1DDC4000
trusted library allocation
page read and write
21C1ADE0000
trusted library allocation
page read and write
21C1AF00000
trusted library allocation
page read and write
21C15D96000
trusted library allocation
page read and write
21C0F7A6000
trusted library allocation
page read and write
1C5E000
stack
page read and write
21C097BE000
heap
page read and write
21C0F8CA000
trusted library allocation
page read and write
21C0975A000
heap
page read and write
1A236820000
heap
page read and write
21C09772000
heap
page read and write
21C1E0A4000
trusted library allocation
page read and write
21C14A7D000
trusted library allocation
page read and write
21C164CE000
trusted library allocation
page read and write
21C150F2000
trusted library allocation
page read and write
21C1AEC3000
trusted library allocation
page read and write
1A236898000
heap
page read and write
21C1AC90000
trusted library allocation
page read and write
21C139AE000
trusted library allocation
page read and write
253E0B13000
trusted library allocation
page read and write
21C14A9B000
trusted library allocation
page read and write
21C0F7DD000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1AE93000
trusted library allocation
page read and write
21C1DD33000
trusted library allocation
page read and write
21C1529F000
trusted library allocation
page read and write
21C139A7000
trusted library allocation
page read and write
21C1E2E8000
trusted library allocation
page read and write
21C0F8CF000
trusted library allocation
page read and write
21C141C8000
trusted library allocation
page read and write
21C1AB47000
trusted library allocation
page read and write
21C1E36A000
heap
page read and write
21C1DDAA000
trusted library allocation
page read and write
21C1DEE2000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C1531F000
trusted library allocation
page read and write
21C146F2000
trusted library allocation
page read and write
21C1E090000
trusted library allocation
page read and write
21C130F9000
trusted library allocation
page read and write
21C126AE000
trusted library allocation
page read and write
21C14663000
trusted library allocation
page read and write
21C0977A000
heap
page read and write
21C14672000
trusted library allocation
page read and write
21C097CD000
heap
page read and write
21C097B6000
heap
page read and write
21C141F1000
trusted library allocation
page read and write
21C0F9EB000
trusted library allocation
page read and write
21C1502D000
trusted library allocation
page read and write
21C1B2F4000
trusted library allocation
page read and write
21C16482000
trusted library allocation
page read and write
21C14A8A000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1380D000
trusted library allocation
page read and write
1A2358B0000
unclassified section
page read and write
21C1E280000
trusted library allocation
page read and write
21C16AC3000
trusted library allocation
page read and write
21C1DBFA000
trusted library allocation
page read and write
21C138BA000
trusted library allocation
page read and write
1A2367F2000
heap
page read and write
21C09783000
heap
page read and write
21C15EBE000
trusted library allocation
page read and write
21C09784000
heap
page read and write
1A236300000
trusted library allocation
page read and write
21C146DF000
trusted library allocation
page read and write
21C144DA000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C11E45000
trusted library allocation
page read and write
21C1377D000
trusted library allocation
page read and write
21C1AECE000
trusted library allocation
page read and write
21C14494000
trusted library allocation
page read and write
21C1413D000
trusted library allocation
page read and write
21C1AC16000
trusted library allocation
page read and write
21C130FB000
trusted library allocation
page read and write
21C14683000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C16B6E000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C126FC000
trusted library allocation
page read and write
21C1E0AA000
trusted library allocation
page read and write
21C1AB86000
trusted library allocation
page read and write
21C097DB000
heap
page read and write
64B9E7E000
unkown
page readonly
AA43ABE000
stack
page read and write
21C097B6000
heap
page read and write
21C1AB9B000
trusted library allocation
page read and write
21C0977D000
heap
page read and write
21C1E30D000
heap
page read and write
149A000
heap
page read and write
21C11D24000
trusted library allocation
page read and write
21C15EE4000
trusted library allocation
page read and write
21C1399B000
trusted library allocation
page read and write
21C1B1DA000
trusted library allocation
page read and write
253E0800000
trusted library allocation
page read and write
165D660A000
trusted library allocation
page read and write
21C14630000
trusted library allocation
page read and write
9C2BCE000
unkown
page readonly
21C097B6000
heap
page read and write
21C1DBFA000
trusted library allocation
page read and write
21C09777000
heap
page read and write
21C1AD56000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C13924000
trusted library allocation
page read and write
1A2367F9000
heap
page read and write
1A235F60000
trusted library section
page readonly
148A000
heap
page read and write
21C097BF000
heap
page read and write
21C126BB000
trusted library allocation
page read and write
1B566C03000
trusted library allocation
page read and write
21C16A16000
trusted library allocation
page read and write
21C12653000
trusted library allocation
page read and write
21C0F781000
trusted library allocation
page read and write
21C14143000
trusted library allocation
page read and write
1B566A9F000
unclassified section
page read and write
21C1E05C000
trusted library allocation
page read and write
1A236898000
heap
page read and write
1A2358B2000
unclassified section
page read and write
21C14477000
trusted library allocation
page read and write
21C1639A000
trusted library allocation
page read and write
21C13D20000
trusted library allocation
page read and write
1A236884000
heap
page read and write
1A23679C000
heap
page read and write
21C144E2000
trusted library allocation
page read and write
21C140C2000
trusted library allocation
page read and write
21C1AEE3000
trusted library allocation
page read and write
21C1AEFD000
trusted library allocation
page read and write
21C1AE53000
trusted library allocation
page read and write
21C1ABAB000
trusted library allocation
page read and write
21C14629000
trusted library allocation
page read and write
21C16AD2000
trusted library allocation
page read and write
21C15E94000
trusted library allocation
page read and write
1A236160000
heap
page read and write
1A236829000
heap
page read and write
21C1DD76000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
253E0B00000
trusted library allocation
page read and write
21C1C586000
trusted library allocation
page read and write
21C0F842000
trusted library allocation
page read and write
21C09772000
heap
page read and write
21C144F5000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C164FC000
trusted library allocation
page read and write
21C09782000
heap
page read and write
21C126CD000
trusted library allocation
page read and write
21C126BB000
trusted library allocation
page read and write
21C1E427000
heap
page read and write
21C0FD22000
trusted library allocation
page read and write
21C141EB000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C12491000
trusted library allocation
page read and write
21C14672000
trusted library allocation
page read and write
1A236831000
heap
page read and write
21C1444F000
trusted library allocation
page read and write
21C1DD63000
trusted library allocation
page read and write
21C1ABAB000
trusted library allocation
page read and write
9BFFFF000
stack
page read and write
21C1D1A3000
trusted library allocation
page read and write
21C140FD000
trusted library allocation
page read and write
1B566860000
unclassified section
page readonly
21C1DD61000
trusted library allocation
page read and write
21C1DB97000
trusted library allocation
page read and write
21C1AB8B000
trusted library allocation
page read and write
21C12110000
heap
page read and write
21C16A31000
trusted library allocation
page read and write
21C146E2000
trusted library allocation
page read and write
21C130E9000
trusted library allocation
page read and write
21C1DD5F000
trusted library allocation
page read and write
21C12ACD000
trusted library allocation
page read and write
21C146E2000
trusted library allocation
page read and write
1A2367A0000
heap
page read and write
21C144FA000
trusted library allocation
page read and write
21C126B5000
trusted library allocation
page read and write
21C15D2F000
trusted library allocation
page read and write
21C1E2D2000
trusted library allocation
page read and write
21C14A43000
trusted library allocation
page read and write
21C14190000
trusted library allocation
page read and write
21C12AF5000
trusted library allocation
page read and write
21C1D105000
trusted library allocation
page read and write
21C1407C000
trusted library allocation
page read and write
21C12567000
trusted library allocation
page read and write
21C13781000
trusted library allocation
page read and write
253E0780000
unclassified section
page readonly
21C13887000
trusted library allocation
page read and write
21C1DDF7000
trusted library allocation
page read and write
21C141B8000
trusted library allocation
page read and write
21C097C1000
heap
page read and write
21C16BC0000
trusted library allocation
page read and write
21C13805000
trusted library allocation
page read and write
165D6450000
heap
page read and write
21C138C6000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C0F8C5000
trusted library allocation
page read and write
21C097E1000
heap
page read and write
21C12484000
trusted library allocation
page read and write
3D01000
heap
page read and write
21C146F3000
trusted library allocation
page read and write
21C14AF2000
trusted library allocation
page read and write
1A235AAE000
trusted library allocation
page read and write
21C1408C000
trusted library allocation
page read and write
21C0F747000
trusted library allocation
page read and write
1A236741000
heap
page read and write
21C0976B000
heap
page read and write
21C1259A000
trusted library allocation
page read and write
21C12589000
trusted library allocation
page read and write
21C13078000
trusted library allocation
page read and write
21C12463000
trusted library allocation
page read and write
87C000
unkown
page read and write
21C0F8C3000
trusted library allocation
page read and write
21C0F7F4000
trusted library allocation
page read and write
21C14637000
trusted library allocation
page read and write
21C130A1000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C141E9000
trusted library allocation
page read and write
21C1B13C000
trusted library allocation
page read and write
21C0F7DB000
trusted library allocation
page read and write
21C14873000
trusted library allocation
page read and write
21C1449C000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C1471F000
trusted library allocation
page read and write
64BA6FE000
stack
page read and write
1B566C0C000
trusted library allocation
page read and write
21C1E0EF000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C1C5A6000
trusted library allocation
page read and write
21C16443000
trusted library allocation
page read and write
21C1D201000
trusted library allocation
page read and write
1A2368A7000
heap
page read and write
21C16AA3000
trusted library allocation
page read and write
21C1213E000
heap
page read and write
21C097C5000
heap
page read and write
21C1DB00000
trusted library allocation
page read and write
21C14683000
trusted library allocation
page read and write
21C097DB000
heap
page read and write
21C125A4000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C0977A000
heap
page read and write
21C138CD000
trusted library allocation
page read and write
21C163B6000
trusted library allocation
page read and write
21C097D7000
heap
page read and write
21C146D8000
trusted library allocation
page read and write
21C16AA3000
trusted library allocation
page read and write
21C1E0B1000
trusted library allocation
page read and write
21C1DD75000
trusted library allocation
page read and write
21C14A78000
trusted library allocation
page read and write
21C1E0D3000
trusted library allocation
page read and write
21C1B2F1000
trusted library allocation
page read and write
21C146D1000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C13960000
trusted library allocation
page read and write
21C14453000
trusted library allocation
page read and write
21C12484000
trusted library allocation
page read and write
21C130FB000
trusted library allocation
page read and write
21C1DEAB000
trusted library allocation
page read and write
21C1E0F4000
trusted library allocation
page read and write
21C1AE30000
trusted library allocation
page read and write
21C1AC2E000
trusted library allocation
page read and write
21C1466B000
trusted library allocation
page read and write
21C09783000
heap
page read and write
21C1384B000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C11DA9000
trusted library allocation
page read and write
21C14623000
trusted library allocation
page read and write
21C13929000
trusted library allocation
page read and write
21C12560000
trusted library allocation
page read and write
21C1AC93000
trusted library allocation
page read and write
21C13086000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C09790000
heap
page read and write
21C12688000
trusted library allocation
page read and write
1B566C11000
trusted library allocation
page read and write
21C12575000
trusted library allocation
page read and write
1A236821000
heap
page read and write
21C141D6000
trusted library allocation
page read and write
21C130EB000
trusted library allocation
page read and write
21C1B18D000
trusted library allocation
page read and write
21C1E393000
heap
page read and write
21C139A0000
trusted library allocation
page read and write
21C1E0B1000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C0978F000
heap
page read and write
21C097BF000
heap
page read and write
9C17FF000
stack
page read and write
21C1E413000
heap
page read and write
1A2368A7000
heap
page read and write
21C1639C000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C0F871000
trusted library allocation
page read and write
21C1479B000
trusted library allocation
page read and write
21C1AB97000
trusted library allocation
page read and write
21C13021000
trusted library allocation
page read and write
21C0978A000
heap
page read and write
21C1474D000
trusted library allocation
page read and write
21C14998000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C09777000
heap
page read and write
1A23687B000
heap
page read and write
21C0976B000
heap
page read and write
21C1AD24000
trusted library allocation
page read and write
21C1AEB8000
trusted library allocation
page read and write
1A2367E1000
heap
page read and write
21C1ABDE000
trusted library allocation
page read and write
21C12AD9000
trusted library allocation
page read and write
21C1514C000
trusted library allocation
page read and write
21C09784000
heap
page read and write
21C1DDA7000
trusted library allocation
page read and write
21C1DD54000
trusted library allocation
page read and write
21C16A6E000
trusted library allocation
page read and write
21C1B2BF000
trusted library allocation
page read and write
21C097B7000
heap
page read and write
253E09A7000
trusted library allocation
page read and write
21C164A2000
trusted library allocation
page read and write
21C097A5000
heap
page read and write
21C09785000
heap
page read and write
21C0E882000
trusted library allocation
page read and write
253E0750000
unclassified section
page read and write
21C140F5000
trusted library allocation
page read and write
21C1DEB1000
trusted library allocation
page read and write
21C1406E000
trusted library allocation
page read and write
21C16A3F000
trusted library allocation
page read and write
21C14672000
trusted library allocation
page read and write
21C12583000
trusted library allocation
page read and write
21C12586000
trusted library allocation
page read and write
21C12647000
trusted library allocation
page read and write
21C1E274000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
21C1DD51000
trusted library allocation
page read and write
21C14A75000
trusted library allocation
page read and write
253E0B20000
trusted library allocation
page read and write
21C1379D000
trusted library allocation
page read and write
21C0E875000
trusted library allocation
page read and write
21C1409C000
trusted library allocation
page read and write
21C13872000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
21C0F82A000
trusted library allocation
page read and write
21C097C6000
heap
page read and write
21C1E8E6000
trusted library allocation
page read and write
1A235660000
unclassified section
page readonly
21C1269D000
trusted library allocation
page read and write
21C0979E000
heap
page read and write
21C1E345000
heap
page read and write
21C16A2C000
trusted library allocation
page read and write
21C11D7C000
trusted library allocation
page read and write
21C1ABEF000
trusted library allocation
page read and write
21C14EC0000
trusted library allocation
page read and write
21C16B6E000
trusted library allocation
page read and write
21C1BDF1000
trusted library allocation
page read and write
21C16A27000
trusted library allocation
page read and write
121D7503000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
AA3EFDE000
stack
page read and write
21C0977E000
heap
page read and write
1A236820000
heap
page read and write
21C0F81E000
trusted library allocation
page read and write
21C1E3D3000
heap
page read and write
21C11D09000
trusted library allocation
page read and write
21C097A0000
heap
page read and write
21C0E7FB000
trusted library allocation
page read and write
21C16472000
trusted library allocation
page read and write
21C0977B000
heap
page read and write
21C16B8A000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C1E264000
trusted library allocation
page read and write
21C097D4000
heap
page read and write
21C14A5B000
trusted library allocation
page read and write
1394000
heap
page read and write
21C16AA3000
trusted library allocation
page read and write
21C097C5000
heap
page read and write
21C14683000
trusted library allocation
page read and write
1A235900000
trusted library allocation
page read and write
21C164FA000
trusted library allocation
page read and write
21C1AB9B000
trusted library allocation
page read and write
21C1E336000
heap
page read and write
21C1AEDD000
trusted library allocation
page read and write
280B2CD0000
heap
page read and write
21C097DC000
heap
page read and write
21C1AD2A000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C09780000
heap
page read and write
21C147C0000
trusted library allocation
page read and write
21C11DDA000
trusted library allocation
page read and write
21C12681000
trusted library allocation
page read and write
21C1E33D000
heap
page read and write
1A2367BD000
heap
page read and write
21C16370000
trusted library allocation
page read and write
21C14AF4000
trusted library allocation
page read and write
21C14634000
trusted library allocation
page read and write
21C09773000
heap
page read and write
21C14630000
trusted library allocation
page read and write
21C1E885000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
1B566946000
heap
page read and write
21C11D74000
trusted library allocation
page read and write
21C126A9000
trusted library allocation
page read and write
21C09787000
heap
page read and write
1B566963000
heap
page read and write
21C14AD2000
trusted library allocation
page read and write
21C12128000
heap
page read and write
21C12586000
trusted library allocation
page read and write
21C1DD43000
trusted library allocation
page read and write
21C1E034000
trusted library allocation
page read and write
21C1AC3E000
trusted library allocation
page read and write
21C14471000
trusted library allocation
page read and write
21C1213E000
heap
page read and write
21C16A31000
trusted library allocation
page read and write
253E0910000
trusted library allocation
page read and write
21C1D233000
trusted library allocation
page read and write
21C09778000
heap
page read and write
21C16A9B000
trusted library allocation
page read and write
1B566850000
unclassified section
page readonly
21C1396F000
trusted library allocation
page read and write
21C14FD0000
trusted library allocation
page read and write
21C146E2000
trusted library allocation
page read and write
21C14A7B000
trusted library allocation
page read and write
21C1D206000
trusted library allocation
page read and write
21C13075000
trusted library allocation
page read and write
21C097BF000
heap
page read and write
21C097C5000
heap
page read and write
21C16A4F000
trusted library allocation
page read and write
21C14613000
trusted library allocation
page read and write
21C1DE00000
trusted library allocation
page read and write
21C0F8F3000
trusted library allocation
page read and write
21C149B0000
trusted library allocation
page read and write
21C130DB000
trusted library allocation
page read and write
21C0978E000
heap
page read and write
21C146F2000
trusted library allocation
page read and write
21C1DD90000
trusted library allocation
page read and write
21C0F73A000
trusted library allocation
page read and write
21C0E1C7000
trusted library allocation
page read and write
21C12131000
heap
page read and write
21C141C3000
trusted library allocation
page read and write
21C097CE000
heap
page read and write
21C150F4000
trusted library allocation
page read and write
21C1AE39000
trusted library allocation
page read and write
21C11DB4000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C16A19000
trusted library allocation
page read and write
21C09779000
heap
page read and write
21C0979E000
heap
page read and write
21C1AE47000
trusted library allocation
page read and write
21C1E3B7000
heap
page read and write
1A235800000
heap
page read and write
21C1E0FC000
trusted library allocation
page read and write
21C16A16000
trusted library allocation
page read and write
21C1DDA4000
trusted library allocation
page read and write
21C14078000
trusted library allocation
page read and write
21C1397F000
trusted library allocation
page read and write
21C1E335000
heap
page read and write
21C097C5000
heap
page read and write
21C1AEF4000
trusted library allocation
page read and write
21C09780000
heap
page read and write
21C1DDA7000
trusted library allocation
page read and write
21C14043000
trusted library allocation
page read and write
21C1AECE000
trusted library allocation
page read and write
21C14A81000
trusted library allocation
page read and write
21C126FC000
trusted library allocation
page read and write
21C13093000
trusted library allocation
page read and write
21C1E301000
heap
page read and write
21C1244A000
trusted library allocation
page read and write
21C1B3C1000
trusted library allocation
page read and write
21C097C9000
heap
page read and write
21C0976B000
heap
page read and write
21C1406A000
trusted library allocation
page read and write
21C1E26F000
trusted library allocation
page read and write
21C13808000
trusted library allocation
page read and write
21C16A69000
trusted library allocation
page read and write
21C139A2000
trusted library allocation
page read and write
21C1B3B7000
trusted library allocation
page read and write
21C13096000
trusted library allocation
page read and write
21C144FC000
trusted library allocation
page read and write
253E0947000
trusted library allocation
page read and write
9C2B8D000
stack
page read and write
21C1E0FE000
trusted library allocation
page read and write
21C1461A000
trusted library allocation
page read and write
21C126BB000
trusted library allocation
page read and write
21C13DA4000
trusted library allocation
page read and write
21C097C8000
heap
page read and write
21C1E2E8000
trusted library allocation
page read and write
1B566C63000
trusted library allocation
page read and write
21C16AD0000
trusted library allocation
page read and write
21C09790000
heap
page read and write
1A235A74000
trusted library allocation
page read and write
21C1DEAD000
trusted library allocation
page read and write
21C16AA9000
trusted library allocation
page read and write
13DE000
stack
page read and write
21C09780000
heap
page read and write
21C14971000
trusted library allocation
page read and write
21C1B151000
trusted library allocation
page read and write
21C1E346000
heap
page read and write
21C14A9F000
trusted library allocation
page read and write
21C0F732000
trusted library allocation
page read and write
21C0976B000
heap
page read and write
21C09778000
heap
page read and write
21C14A78000
trusted library allocation
page read and write
21C1508E000
trusted library allocation
page read and write
21C0978B000
heap
page read and write
21C1AE4F000
trusted library allocation
page read and write
1A236831000
heap
page read and write
21C13DA4000
trusted library allocation
page read and write
21C1E345000
heap
page read and write
21C09783000
heap
page read and write
21C09772000
heap
page read and write
21C153B8000
trusted library allocation
page read and write
21C1E281000
trusted library allocation
page read and write
21C1213F000
heap
page read and write
21C1E0A4000
trusted library allocation
page read and write
21C140F5000
trusted library allocation
page read and write
21C1E8E6000
trusted library allocation
page read and write
21C0E771000
trusted library allocation
page read and write
21C146DF000
trusted library allocation
page read and write
21C137CD000
trusted library allocation
page read and write
21C13759000
trusted library allocation
page read and write
21C164C6000
trusted library allocation
page read and write
21C14DA2000
trusted library allocation
page read and write
21C1ACF0000
trusted library allocation
page read and write
21C0977E000
heap
page read and write
21C0F872000
trusted library allocation
page read and write
21C097E3000
heap
page read and write
21C09778000
heap
page read and write
21C1AECC000
trusted library allocation
page read and write
21C1E2B9000
trusted library allocation
page read and write
21C16A22000
trusted library allocation
page read and write
21C14623000
trusted library allocation
page read and write
21C1ACAB000
trusted library allocation
page read and write
21C14663000
trusted library allocation
page read and write
1A235890000
heap
page readonly
21C0F851000
trusted library allocation
page read and write
21C164F5000
trusted library allocation
page read and write
21C1647D000
trusted library allocation
page read and write
21C097B6000
heap
page read and write
There are 3393 hidden memdumps, click here to show them.