IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2d627b83-4d9d-43df-9aff-37184a419509.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2d627b83-4d9d-43df-9aff-37184a419509.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2320 -parentBuildID 20230927232528 -prefsHandle 2232 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0eaedab3-4b51-4b12-9051-af95aa17859e} 3220 "\\.\pipe\gecko-crash-server-pipe.3220" 1df53c6f310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -parentBuildID 20230927232528 -prefsHandle 3964 -prefMapHandle 3960 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4719529b-836d-4975-a581-e10641ea7f9d} 3220 "\\.\pipe\gecko-crash-server-pipe.3220" 1df65da5310 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5328 -prefMapHandle 2640 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ac80dba-0188-4f1b-b01b-50611a6dda15} 3220 "\\.\pipe\gecko-crash-server-pipe.3220" 1df6ea1e110 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://twitter.com/pD5
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.120
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.46
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.120
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1DF5A984000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF60B0D000
trusted library allocation
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF65ED1000
trusted library allocation
page read and write
1DF6D5D3000
trusted library allocation
page read and write
1DF6F5A0000
trusted library allocation
page read and write
1DF6D4F7000
trusted library allocation
page read and write
1DF64BE8000
trusted library allocation
page read and write
1DF6EC43000
trusted library allocation
page read and write
1DF6387F000
trusted library allocation
page read and write
1DF67088000
trusted library allocation
page read and write
1DF63866000
trusted library allocation
page read and write
9B0000
unkown
page readonly
1DF63873000
trusted library allocation
page read and write
1DF6CED1000
trusted library allocation
page read and write
1DF634A0000
heap
page read and write
1DF6D4FB000
trusted library allocation
page read and write
1DF6ED54000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5AA03000
heap
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF67048000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5FAB6000
trusted library allocation
page read and write
1DF664CD000
trusted library allocation
page read and write
1DF6EDE1000
trusted library allocation
page read and write
1DF67131000
trusted library allocation
page read and write
1DF6CE20000
trusted library allocation
page read and write
1DF6D5A3000
trusted library allocation
page read and write
1DF6759B000
trusted library allocation
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF63CBB000
trusted library allocation
page read and write
1DF6D3D2000
trusted library allocation
page read and write
1DF6CDBB000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF5A9AF000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6D4CF000
trusted library allocation
page read and write
1DF65FC1000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1B13A58D000
heap
page read and write
1DF6C094000
trusted library allocation
page read and write
1B13A55C000
heap
page read and write
1DF634C7000
heap
page read and write
1DF6D4CF000
trusted library allocation
page read and write
1DF63C38000
trusted library allocation
page read and write
1DF6522D000
trusted library allocation
page read and write
1DF63A97000
trusted library allocation
page read and write
1DF63CC1000
trusted library allocation
page read and write
1DF65F43000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
20571050000
heap
page read and write
1DF65226000
trusted library allocation
page read and write
1DF64D9A000
trusted library allocation
page read and write
11CDDF88000
trusted library allocation
page execute read
1DF5A9F3000
heap
page read and write
1DF5A99F000
heap
page read and write
1DF5A994000
heap
page read and write
AA0000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6D387000
trusted library allocation
page read and write
1DF651F7000
trusted library allocation
page read and write
1DF6CE21000
trusted library allocation
page read and write
1DF6713E000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF664D1000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF6C254000
trusted library allocation
page read and write
1DF6B974000
trusted library allocation
page read and write
1B13A560000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF64BDF000
trusted library allocation
page read and write
1DF61105000
trusted library allocation
page read and write
1DF6CE1C000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF664D1000
trusted library allocation
page read and write
1DF65133000
trusted library allocation
page read and write
1DF6C3F8000
trusted library allocation
page read and write
1DF6DBEB000
trusted library allocation
page read and write
1DF639D0000
trusted library allocation
page read and write
19F7F700000
heap
page read and write
1DF63855000
trusted library allocation
page read and write
1DF6CD3F000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6EEE7000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF665ED000
trusted library allocation
page read and write
1DF6C04B000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1B13A58A000
heap
page read and write
1DF6EE5A000
trusted library allocation
page read and write
1DF65DE7000
trusted library allocation
page read and write
1DF6C1B3000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
1DF5A9EA000
heap
page read and write
1DF63A8A000
trusted library allocation
page read and write
1DF5A999000
heap
page read and write
1DF5A992000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF6EC2E000
trusted library allocation
page read and write
1DF5A9A3000
heap
page read and write
1DF63491000
heap
page read and write
B14000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A995000
heap
page read and write
1DF60B2E000
trusted library allocation
page read and write
1DF6EB0B000
trusted library allocation
page read and write
1DF6429B000
trusted library allocation
page read and write
1DF65FDF000
trusted library allocation
page read and write
1DF6345A000
heap
page read and write
1DF6E753000
heap
page read and write
1DF6601D000
trusted library allocation
page read and write
19F7FC1E000
trusted library allocation
page read and write
1DF6C3E8000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF63A78000
trusted library allocation
page read and write
19F7FA00000
trusted library allocation
page read and write
1DF642A7000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6F5F7000
trusted library allocation
page read and write
1DF6D380000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF60C39000
trusted library allocation
page read and write
1DF60BF1000
trusted library allocation
page read and write
1DF6E2A8000
trusted library allocation
page read and write
1DF6C2B5000
trusted library allocation
page read and write
1DF670DC000
trusted library allocation
page read and write
1DF6C1FE000
trusted library allocation
page read and write
20570FFA000
heap
page read and write
1DF634A1000
heap
page read and write
1DF66570000
trusted library allocation
page read and write
1AEFAE0A000
trusted library allocation
page read and write
1DF63C8D000
trusted library allocation
page read and write
1DF6EE51000
trusted library allocation
page read and write
1DF6EB0B000
trusted library allocation
page read and write
1B13A560000
heap
page read and write
1DF6D4C5000
trusted library allocation
page read and write
1DF65EB1000
trusted library allocation
page read and write
1DF6D379000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1B13A63B000
heap
page read and write
1DF6D4FD000
trusted library allocation
page read and write
1DF651C4000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6EC38000
trusted library allocation
page read and write
1DF6E66B000
heap
page read and write
1B13A560000
heap
page read and write
1AEFAB5F000
heap
page read and write
1DF652F2000
trusted library allocation
page read and write
1DF6D0E0000
trusted library allocation
page read and write
1DF652B2000
trusted library allocation
page read and write
1DF6CE49000
trusted library allocation
page read and write
1DF6CEF7000
trusted library allocation
page read and write
1DF6EE10000
trusted library allocation
page read and write
16FD59AD000
heap
page read and write
26B09F51E000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6EDA4000
trusted library allocation
page read and write
1DF651FD000
trusted library allocation
page read and write
1DF6BFB6000
trusted library allocation
page read and write
1DF6BF53000
trusted library allocation
page read and write
1DF650C6000
trusted library allocation
page read and write
1DF5A9C1000
heap
page read and write
1DF6EB31000
trusted library allocation
page read and write
A7C000
unkown
page write copy
1DF64D6F000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C2000
heap
page read and write
1B13963F000
unclassified section
page read and write
1DF6C07A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF67078000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9C3000
heap
page read and write
1DF6D49F000
trusted library allocation
page read and write
1DF64A5D000
trusted library allocation
page read and write
1DF65091000
trusted library allocation
page read and write
1DF6CD93000
trusted library allocation
page read and write
1DF64B3B000
trusted library allocation
page read and write
1DF6EBB0000
trusted library allocation
page read and write
1DF6C2AD000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6344C000
heap
page read and write
1DF64AFE000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
20571470000
trusted library allocation
page read and write
1DF6646A000
trusted library allocation
page read and write
1DF6EC47000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF6CEE2000
trusted library allocation
page read and write
1DF650C6000
trusted library allocation
page read and write
1DF6529D000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6524B000
trusted library allocation
page read and write
1DF64F81000
trusted library allocation
page read and write
1DF65FC1000
trusted library allocation
page read and write
1DF664B4000
trusted library allocation
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF642D2000
trusted library allocation
page read and write
1DF6F43E000
trusted library allocation
page read and write
1DF6091D000
trusted library allocation
page read and write
1DF64A92000
trusted library allocation
page read and write
1DF6648B000
trusted library allocation
page read and write
1B139900000
trusted library allocation
page read and write
1DF6D39E000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF61172000
trusted library allocation
page read and write
19F7FBC9000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF63A90000
trusted library allocation
page read and write
1DF6EC7D000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1B13995C000
trusted library allocation
page read and write
1DF6EC47000
trusted library allocation
page read and write
1B13A66E000
heap
page read and write
1DF63A94000
trusted library allocation
page read and write
1DF5F39E000
trusted library allocation
page read and write
1DF675FD000
trusted library allocation
page read and write
1B13A677000
heap
page read and write
1DF64A1F000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1B139AF4000
heap
page read and write
1DF5A9F3000
heap
page read and write
1DF664A4000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9F4000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A98D000
heap
page read and write
1DF6CE79000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF5A967000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF651EC000
trusted library allocation
page read and write
1DF6CE2A000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6EB98000
trusted library allocation
page read and write
1DF65091000
trusted library allocation
page read and write
1DF6EDCD000
trusted library allocation
page read and write
1DF67044000
trusted library allocation
page read and write
1DF64FE3000
trusted library allocation
page read and write
1DF6CD0E000
trusted library allocation
page read and write
1DF64ECA000
trusted library allocation
page read and write
1DF5A9C6000
heap
page read and write
1DF611AF000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1AEFACA0000
heap
page read and write
1DF650B4000
trusted library allocation
page read and write
142A000
heap
page read and write
1DF6349C000
heap
page read and write
1DF5A97D000
heap
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF664B0000
trusted library allocation
page read and write
1DF6EC2E000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF656CB000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF665F2000
trusted library allocation
page read and write
1DF6D4EF000
trusted library allocation
page read and write
11FE000
stack
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF67039000
trusted library allocation
page read and write
1DF63C3D000
trusted library allocation
page read and write
1DF664B0000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF64EA3000
trusted library allocation
page read and write
19F7F550000
unclassified section
page readonly
1DF63CD5000
trusted library allocation
page read and write
1DF6517A000
trusted library allocation
page read and write
1B13A560000
heap
page read and write
1DF64B28000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF652DB000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6F5F9000
trusted library allocation
page read and write
1DF6CE21000
trusted library allocation
page read and write
1DF6CD2A000
trusted library allocation
page read and write
1DF6D364000
trusted library allocation
page read and write
1DF6C05F000
trusted library allocation
page read and write
1DF5A9C6000
heap
page read and write
1DF675D1000
trusted library allocation
page read and write
1DF6CD37000
trusted library allocation
page read and write
1DF6CE08000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF67046000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A985000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF64BC8000
trusted library allocation
page read and write
1DF65EEF000
trusted library allocation
page read and write
1DF65DD5000
trusted library allocation
page read and write
1DF6711A000
trusted library allocation
page read and write
1DF6CD58000
trusted library allocation
page read and write
20571170000
heap
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF642A5000
trusted library allocation
page read and write
1DF65DD1000
trusted library allocation
page read and write
1DF6EB51000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF5A991000
heap
page read and write
1DF64DBC000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF642A7000
trusted library allocation
page read and write
1DF64EED000
trusted library allocation
page read and write
1DF64FD7000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
1DF63C14000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1415000
heap
page read and write
1DF5A9A2000
heap
page read and write
19F7FB2E000
trusted library allocation
page read and write
1DF6D5E9000
trusted library allocation
page read and write
1DF6CDC0000
trusted library allocation
page read and write
1DF64A1C000
trusted library allocation
page read and write
1DF664F7000
trusted library allocation
page read and write
1DF64AFE000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF651C6000
trusted library allocation
page read and write
1DF6D389000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF642AB000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF650A8000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF634C7000
heap
page read and write
1DF675C3000
trusted library allocation
page read and write
1DF6EB57000
trusted library allocation
page read and write
1DF6DB93000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF650FD000
trusted library allocation
page read and write
1B13A569000
heap
page read and write
1DF5A984000
heap
page read and write
1DF651C8000
trusted library allocation
page read and write
1DF6EECC000
trusted library allocation
page read and write
1DF651D0000
trusted library allocation
page read and write
1DF64B22000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF6EB09000
trusted library allocation
page read and write
1DF664F1000
trusted library allocation
page read and write
1DF64D2D000
trusted library allocation
page read and write
1DF6C038000
trusted library allocation
page read and write
1DF6CD64000
trusted library allocation
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1B13A66E000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6CD72000
trusted library allocation
page read and write
1DF6EC83000
trusted library allocation
page read and write
1DF6EB57000
trusted library allocation
page read and write
1DF6D3F0000
trusted library allocation
page read and write
1DF6CDF0000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF6EB50000
trusted library allocation
page read and write
1DF64A16000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF65041000
trusted library allocation
page read and write
1DF6EB7C000
trusted library allocation
page read and write
1DF63A9C000
trusted library allocation
page read and write
1DF6702F000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64DD4000
trusted library allocation
page read and write
1DF66071000
trusted library allocation
page read and write
1DF65FD5000
trusted library allocation
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF6C31F000
trusted library allocation
page read and write
1DF639FD000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF63882000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF64EF8000
trusted library allocation
page read and write
1DF6D900000
trusted library allocation
page read and write
1DF64D2D000
trusted library allocation
page read and write
19F7F7D0000
unclassified section
page readonly
1DF6525A000
trusted library allocation
page read and write
1DF6EB83000
trusted library allocation
page read and write
1DF60931000
trusted library allocation
page read and write
1DF64B04000
trusted library allocation
page read and write
1DF63CC2000
trusted library allocation
page read and write
1DF6BA00000
trusted library allocation
page read and write
1DF660C6000
trusted library allocation
page read and write
1DF64A92000
trusted library allocation
page read and write
1DF64B3B000
trusted library allocation
page read and write
1DF6D49D000
trusted library allocation
page read and write
404A9FE000
stack
page read and write
1DF5A97D000
heap
page read and write
1DF63991000
trusted library allocation
page read and write
1DF5A9C0000
heap
page read and write
1DF638A5000
trusted library allocation
page read and write
1B13A56C000
heap
page read and write
1DF65046000
trusted library allocation
page read and write
1DF6F473000
trusted library allocation
page read and write
1DF6349C000
heap
page read and write
1DF6F5FB000
trusted library allocation
page read and write
1DF65CB3000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
205713C4000
heap
page read and write
1DF6F22F000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF64A41000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF67062000
trusted library allocation
page read and write
1B1399F3000
trusted library allocation
page read and write
AEE000
stack
page read and write
A4C000
unkown
page readonly
1DF5A9E9000
heap
page read and write
1DF6C246000
trusted library allocation
page read and write
63D29B8000
stack
page read and write
1DF6E621000
heap
page read and write
DD52F7E000
unkown
page readonly
1DF5A9AF000
heap
page read and write
1DF65F5B000
trusted library allocation
page read and write
1DF639EB000
trusted library allocation
page read and write
19F7F940000
heap
page read and write
1DF6C276000
trusted library allocation
page read and write
1DF67070000
trusted library allocation
page read and write
1AEFAE07000
trusted library allocation
page read and write
1DF6D345000
trusted library allocation
page read and write
1DF64BE7000
trusted library allocation
page read and write
1DF64BEF000
trusted library allocation
page read and write
1DF6705E000
trusted library allocation
page read and write
1DF65EEF000
trusted library allocation
page read and write
1DF6D4BF000
trusted library allocation
page read and write
1DF6E648000
trusted library allocation
page read and write
1DF63858000
trusted library allocation
page read and write
1DF6CDB3000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF6BF4D000
trusted library allocation
page read and write
1DF652F5000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6ECD3000
trusted library allocation
page read and write
1DF64D5B000
trusted library allocation
page read and write
1DF61175000
trusted library allocation
page read and write
1DF5F971000
trusted library allocation
page read and write
1DF6EB61000
trusted library allocation
page read and write
1B139AF0000
heap
page read and write
1DF6D30B000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF675F8000
trusted library allocation
page read and write
1DF5A9A9000
heap
page read and write
1DF6EBCA000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF639A6000
trusted library allocation
page read and write
1DF6CDB6000
trusted library allocation
page read and write
1DF6ED5C000
trusted library allocation
page read and write
1DF6D5AC000
trusted library allocation
page read and write
1DF5FACD000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9A3000
heap
page read and write
1B139EAE000
heap
page read and write
1DF609F3000
trusted library allocation
page read and write
1DF650AE000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1B13A5E0000
heap
page read and write
1DF6CDED000
trusted library allocation
page read and write
1DF6ECF9000
trusted library allocation
page read and write
1DF63CE8000
trusted library allocation
page read and write
1DF651F6000
trusted library allocation
page read and write
1DF670FB000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF61130000
trusted library allocation
page read and write
20571477000
trusted library allocation
page read and write
1DF65227000
trusted library allocation
page read and write
1DF651D6000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF6D39E000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF5A99B000
heap
page read and write
1DF5A98B000
heap
page read and write
1DF6CE82000
trusted library allocation
page read and write
1DF5A98A000
heap
page read and write
1DF611AB000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6E02D000
trusted library allocation
page read and write
1DF612F4000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF611C2000
trusted library allocation
page read and write
1DF639F4000
trusted library allocation
page read and write
1DF6387F000
trusted library allocation
page read and write
1DF6C2FC000
trusted library allocation
page read and write
1B13A658000
heap
page read and write
1DF65CB3000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF6D343000
trusted library allocation
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF66567000
trusted library allocation
page read and write
1DF6D38B000
trusted library allocation
page read and write
1DF6F5F7000
trusted library allocation
page read and write
1DF63497000
heap
page read and write
1DF5A99B000
heap
page read and write
1DF6C05F000
trusted library allocation
page read and write
1DF65C90000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF66473000
trusted library allocation
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF63600000
trusted library allocation
page read and write
205711C0000
heap
page readonly
1DF5A9EF000
heap
page read and write
1DF64DF4000
trusted library allocation
page read and write
1DF6CE0E000
trusted library allocation
page read and write
1DF6347A000
heap
page read and write
1DF5A9B9000
heap
page read and write
1DF6D5A9000
trusted library allocation
page read and write
B14000
heap
page read and write
1DF6C344000
trusted library allocation
page read and write
1DF6E202000
trusted library allocation
page read and write
1DF65253000
trusted library allocation
page read and write
11CDDF99000
trusted library allocation
page execute read
1DF5A9E9000
heap
page read and write
A4C000
unkown
page readonly
1DF65068000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF64BD4000
trusted library allocation
page read and write
1DF660B4000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF5A994000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF6EA00000
trusted library allocation
page read and write
1DF6655C000
trusted library allocation
page read and write
1DF6F5B6000
trusted library allocation
page read and write
1DF6713E000
trusted library allocation
page read and write
1B13A677000
heap
page read and write
1DF63999000
trusted library allocation
page read and write
1DF67014000
trusted library allocation
page read and write
1DF64FFD000
trusted library allocation
page read and write
1DF650C4000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF67568000
trusted library allocation
page read and write
1DF6D3C9000
trusted library allocation
page read and write
1DF6CDE3000
trusted library allocation
page read and write
1DF6345A000
heap
page read and write
1DF650BC000
trusted library allocation
page read and write
1DF650B4000
trusted library allocation
page read and write
1DF63A84000
trusted library allocation
page read and write
1DF6CEF6000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6C37A000
trusted library allocation
page read and write
1DF6C25D000
trusted library allocation
page read and write
1DF642B8000
trusted library allocation
page read and write
1DF650C4000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9D5000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6D5D3000
trusted library allocation
page read and write
1DF6DB82000
trusted library allocation
page read and write
1DF64BEC000
trusted library allocation
page read and write
1DF60CF6000
trusted library allocation
page read and write
1DF6CEDB000
trusted library allocation
page read and write
1DF6EED3000
trusted library allocation
page read and write
1DF5A9FF000
heap
page read and write
1DF670FB000
trusted library allocation
page read and write
1DF6606D000
trusted library allocation
page read and write
19F7FC03000
trusted library allocation
page read and write
1DF64A74000
trusted library allocation
page read and write
1DF5F3CB000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6C070000
trusted library allocation
page read and write
1DF6D5D3000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF65091000
trusted library allocation
page read and write
1DF6756E000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1B1399C7000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF6E69F000
heap
page read and write
1DF6D3B8000
trusted library allocation
page read and write
1DF5A975000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6D3CB000
trusted library allocation
page read and write
1DF63A38000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6D5AC000
trusted library allocation
page read and write
1DF6E626000
heap
page read and write
1DF6EB07000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
19F7F850000
heap
page read and write
1DF6CE76000
trusted library allocation
page read and write
1DF61209000
trusted library allocation
page read and write
1DF6CDE1000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6F4A1000
trusted library allocation
page read and write
1DF6CD89000
trusted library allocation
page read and write
1DF60D37000
trusted library allocation
page read and write
1DF639EE000
trusted library allocation
page read and write
1DF6CE15000
trusted library allocation
page read and write
16FD400A000
trusted library allocation
page read and write
1DF5A9C9000
heap
page read and write
1DF6EC45000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF660A8000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF5FAA3000
trusted library allocation
page read and write
1DF67594000
trusted library allocation
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6D5FA000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF6D4F7000
trusted library allocation
page read and write
1DF64AC4000
trusted library allocation
page read and write
1DF65F60000
trusted library allocation
page read and write
1DF671E4000
trusted library allocation
page read and write
1AEFAE00000
trusted library allocation
page read and write
1DF651E1000
trusted library allocation
page read and write
1B139981000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6CD6A000
trusted library allocation
page read and write
1DF6E66D000
trusted library allocation
page read and write
1DF6C276000
trusted library allocation
page read and write
1DF64F9A000
trusted library allocation
page read and write
1DF664DF000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6EAFC000
trusted library allocation
page read and write
1DF664EA000
trusted library allocation
page read and write
19F7FD00000
heap
page read and write
1B13A560000
heap
page read and write
1DF650DC000
trusted library allocation
page read and write
1DF6D4DB000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
63D5CBE000
unkown
page readonly
1DF5A9D0000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF675A4000
trusted library allocation
page read and write
20571403000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF675AC000
trusted library allocation
page read and write
1DF65123000
trusted library allocation
page read and write
1DF6EC31000
trusted library allocation
page read and write
20571482000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1B13A622000
heap
page read and write
1DF6EC40000
trusted library allocation
page read and write
1DF64ED3000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF67525000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A99C000
heap
page read and write
11CDE041000
trusted library allocation
page execute read
1DF64F96000
trusted library allocation
page read and write
1DF63A18000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9A0000
heap
page read and write
1DF5A9A0000
heap
page read and write
1DF6ECC7000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF6F284000
trusted library allocation
page read and write
1B13A677000
heap
page read and write
1DF5A9AE000
heap
page read and write
5D633FE000
stack
page read and write
1DF5A992000
heap
page read and write
1DF6F5C2000
trusted library allocation
page read and write
1DF6EECC000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF650C6000
trusted library allocation
page read and write
1DF6EC29000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF6CD58000
trusted library allocation
page read and write
1DF5A9B7000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF63C0F000
trusted library allocation
page read and write
16FD3E03000
heap
page read and write
1DF6E757000
trusted library allocation
page read and write
1DF675AC000
trusted library allocation
page read and write
1DF6EB7C000
trusted library allocation
page read and write
3BE1000
heap
page read and write
1AEFAD00000
trusted library allocation
page read and write
1DF650CF000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF664A6000
trusted library allocation
page read and write
1DF6CD5E000
trusted library allocation
page read and write
1DF670DC000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF6CDED000
trusted library allocation
page read and write
1DF6345A000
heap
page read and write
1DF6D389000
trusted library allocation
page read and write
1DF65131000
trusted library allocation
page read and write
1DF64FB2000
trusted library allocation
page read and write
1DF6CD50000
trusted library allocation
page read and write
1DF6CD28000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF64A41000
trusted library allocation
page read and write
1DF6EEE7000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF6D5A9000
trusted library allocation
page read and write
1DF6655C000
trusted library allocation
page read and write
1DF64A46000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
2057148F000
trusted library allocation
page read and write
1DF6D440000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF6C374000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6D09F000
trusted library allocation
page read and write
DD56A7E000
stack
page read and write
1DF6D4FB000
trusted library allocation
page read and write
1B139630000
unclassified section
page read and write
1DF5A97E000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF5A9A1000
heap
page read and write
1DF5A9E9000
heap
page read and write
11EF000
stack
page read and write
1DF6510B000
trusted library allocation
page read and write
19F7FB81000
trusted library allocation
page read and write
1DF6D5FA000
trusted library allocation
page read and write
1B13A5A8000
heap
page read and write
1DF6EDE9000
trusted library allocation
page read and write
1DF65170000
trusted library allocation
page read and write
1DF6EB61000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF5A9B8000
heap
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF6ECD8000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF65C94000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1B13A59C000
heap
page read and write
63D653E000
stack
page read and write
1DF6399C000
trusted library allocation
page read and write
1DF5A9AF000
heap
page read and write
1DF6CD30000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
19F7FC16000
trusted library allocation
page read and write
1DF612CD000
trusted library allocation
page read and write
16FD4000000
trusted library allocation
page read and write
1DF6CD7D000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF64A8F000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF66F63000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6CDBB000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
B14000
heap
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF65184000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A99F000
heap
page read and write
1DF6F4BD000
trusted library allocation
page read and write
1B1397E0000
trusted library allocation
page read and write
1DF6ECDB000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF65ECA000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF65C83000
trusted library allocation
page read and write
1DF671FE000
trusted library allocation
page read and write
1DF63CEB000
trusted library allocation
page read and write
1DF6529D000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9A2000
heap
page read and write
1B13A5B9000
heap
page read and write
1DF5AA02000
heap
page read and write
1DF63C8D000
trusted library allocation
page read and write
1DF652B2000
trusted library allocation
page read and write
1DF6C3D8000
trusted library allocation
page read and write
1DF651F6000
trusted library allocation
page read and write
1DF642B3000
trusted library allocation
page read and write
1DF642AF000
trusted library allocation
page read and write
1DF65227000
trusted library allocation
page read and write
1DF67571000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF67623000
trusted library allocation
page read and write
1DF6396F000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF64DC7000
trusted library allocation
page read and write
1DF6EB86000
trusted library allocation
page read and write
1DF671A0000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF6EAF1000
trusted library allocation
page read and write
1B13A5FD000
heap
page read and write
1DF67062000
trusted library allocation
page read and write
1DF6C3B5000
trusted library allocation
page read and write
1DF63AB3000
trusted library allocation
page read and write
1DF66434000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1B139978000
trusted library allocation
page read and write
1DF65238000
trusted library allocation
page read and write
1DF6D3E1000
trusted library allocation
page read and write
1DF65029000
trusted library allocation
page read and write
1DF64D7F000
trusted library allocation
page read and write
1DF6517A000
trusted library allocation
page read and write
1DF6B97F000
trusted library allocation
page read and write
1DF6755C000
trusted library allocation
page read and write
1DF6CEE2000
trusted library allocation
page read and write
1DF6C1AA000
trusted library allocation
page read and write
1DF65094000
trusted library allocation
page read and write
1DF6EC83000
trusted library allocation
page read and write
1DF6EC40000
trusted library allocation
page read and write
1DF6E64D000
heap
page read and write
1DF65068000
trusted library allocation
page read and write
1DF64A84000
trusted library allocation
page read and write
1B13A658000
heap
page read and write
1DF6DBBE000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF5FAE4000
trusted library allocation
page read and write
1DF650FD000
trusted library allocation
page read and write
1DF64AF0000
trusted library allocation
page read and write
1DF6D347000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF651F6000
trusted library allocation
page read and write
2057140C000
trusted library allocation
page read and write
1DF6CD7F000
trusted library allocation
page read and write
1DF651FE000
trusted library allocation
page read and write
1DF650A9000
trusted library allocation
page read and write
1DF6CD25000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF651B8000
trusted library allocation
page read and write
1DF6F482000
trusted library allocation
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF6BFE5000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64A2F000
trusted library allocation
page read and write
16FD3D80000
heap
page read and write
1DF64AF9000
trusted library allocation
page read and write
1DF6D5B3000
trusted library allocation
page read and write
1DF6EEFC000
trusted library allocation
page read and write
1DF67131000
trusted library allocation
page read and write
20571400000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF67033000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF6ED7C000
trusted library allocation
page read and write
1B13A5E8000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6C0EA000
trusted library allocation
page read and write
A7C000
unkown
page read and write
1DF66560000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
1DF6CD93000
trusted library allocation
page read and write
1DF63864000
trusted library allocation
page read and write
1DF665FD000
trusted library allocation
page read and write
1DF660E2000
trusted library allocation
page read and write
1DF6C09D000
trusted library allocation
page read and write
1DF612FE000
trusted library allocation
page read and write
1DF652D5000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF65DD1000
trusted library allocation
page read and write
16FD3DA0000
heap
page read and write
1DF63458000
heap
page read and write
1DF665E5000
trusted library allocation
page read and write
1DF665A0000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF63974000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64A11000
trusted library allocation
page read and write
1DF6D700000
trusted library allocation
page read and write
1DF6EDDD000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF611F7000
trusted library allocation
page read and write
1DF6713E000
trusted library allocation
page read and write
1DF6EC54000
trusted library allocation
page read and write
1DF6126B000
trusted library allocation
page read and write
1DF670B5000
trusted library allocation
page read and write
20571474000
trusted library allocation
page read and write
1DF65048000
trusted library allocation
page read and write
1DF63868000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF6389E000
trusted library allocation
page read and write
1DF5F3EF000
trusted library allocation
page read and write
1DF6F4DB000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF639A3000
trusted library allocation
page read and write
1B13A62A000
heap
page read and write
1DF65C90000
trusted library allocation
page read and write
1DF6346C000
heap
page read and write
1AEFAB90000
heap
page read and write
1DF5A9EF000
heap
page read and write
19F7FC1C000
trusted library allocation
page read and write
1DF64A69000
trusted library allocation
page read and write
1DF6D4B9000
trusted library allocation
page read and write
1DF6DB7E000
trusted library allocation
page read and write
1DF675F8000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6EDEB000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9B3000
heap
page read and write
1DF6C094000
trusted library allocation
page read and write
1B13A62A000
heap
page read and write
1DF6EC2C000
trusted library allocation
page read and write
1B13A679000
heap
page read and write
1DF5A992000
heap
page read and write
1DF670DC000
trusted library allocation
page read and write
1DF5A995000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF65087000
trusted library allocation
page read and write
1DF63CE7000
trusted library allocation
page read and write
1410000
heap
page read and write
1B139EB0000
heap
page read and write
1DF650B0000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF63A94000
trusted library allocation
page read and write
1DF64D44000
trusted library allocation
page read and write
1DF660A8000
trusted library allocation
page read and write
20571424000
trusted library allocation
page read and write
1B13A658000
heap
page read and write
1DF63481000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF6EC5F000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A968000
heap
page read and write
1DF63A8A000
trusted library allocation
page read and write
1DF6C3E8000
trusted library allocation
page read and write
1DF5A9CC000
heap
page read and write
1DF5A9F4000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9EF000
heap
page read and write
50519FF000
stack
page read and write
1DF5A992000
heap
page read and write
1DF65091000
trusted library allocation
page read and write
B14000
heap
page read and write
1DF6CD96000
trusted library allocation
page read and write
1DF6D34C000
trusted library allocation
page read and write
1DF64EE3000
trusted library allocation
page read and write
1DF651FD000
trusted library allocation
page read and write
1DF63C32000
trusted library allocation
page read and write
1420000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6C35E000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6C2BB000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF675C9000
trusted library allocation
page read and write
1DF675F8000
trusted library allocation
page read and write
1DF664EA000
trusted library allocation
page read and write
1DF670E2000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF5A9B5000
heap
page read and write
1DF6DBB6000
trusted library allocation
page read and write
1DF61175000
trusted library allocation
page read and write
1B13964A000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF6EC43000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6503B000
trusted library allocation
page read and write
1DF66484000
trusted library allocation
page read and write
1DF6E733000
trusted library allocation
page read and write
1DF6659B000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1DF6093B000
trusted library allocation
page read and write
1DF651D0000
trusted library allocation
page read and write
1DF6EC39000
trusted library allocation
page read and write
1DF6F29E000
trusted library allocation
page read and write
1DF65245000
trusted library allocation
page read and write
1DF6385A000
trusted library allocation
page read and write
1DF61160000
trusted library allocation
page read and write
1DF652B2000
trusted library allocation
page read and write
1DF6C15D000
trusted library allocation
page read and write
1DF6EC59000
trusted library allocation
page read and write
1DF6F48B000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF63A97000
trusted library allocation
page read and write
1DF6CD6A000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6E636000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF6C1F5000
trusted library allocation
page read and write
1DF611C6000
trusted library allocation
page read and write
1DF64D7F000
trusted library allocation
page read and write
1409000
heap
page read and write
1DF5A992000
heap
page read and write
1DF63C5E000
trusted library allocation
page read and write
1DF6CDE1000
trusted library allocation
page read and write
1DF6503B000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF6D4CD000
trusted library allocation
page read and write
1DF650CF000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF634A0000
heap
page read and write
1DF652A4000
trusted library allocation
page read and write
1DF5AA17000
heap
page read and write
1DF5A9B5000
heap
page read and write
1B1399AD000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF674DC000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9EA000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF63983000
trusted library allocation
page read and write
1DF6EEA2000
trusted library allocation
page read and write
1DF660FD000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF64A11000
trusted library allocation
page read and write
1DF63C54000
trusted library allocation
page read and write
1DF64A1F000
trusted library allocation
page read and write
1DF664CD000
trusted library allocation
page read and write
1DF6EDEB000
trusted library allocation
page read and write
1B13A509000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6D3E6000
trusted library allocation
page read and write
1DF65046000
trusted library allocation
page read and write
B14000
heap
page read and write
1DF6C168000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6EDE1000
trusted library allocation
page read and write
1DF6F43E000
trusted library allocation
page read and write
1DF5A99F000
heap
page read and write
1DF6CD83000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64F96000
trusted library allocation
page read and write
1B13A5E6000
heap
page read and write
1DF64D02000
trusted library allocation
page read and write
1DF6CD3F000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF675D1000
trusted library allocation
page read and write
1DF642B8000
trusted library allocation
page read and write
1DF650C0000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5FAD2000
trusted library allocation
page read and write
1DF642BC000
trusted library allocation
page read and write
1DF6ED34000
trusted library allocation
page read and write
1DF5AA07000
heap
page read and write
1DF65018000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6EC60000
trusted library allocation
page read and write
1DF6CE7C000
trusted library allocation
page read and write
1DF65029000
trusted library allocation
page read and write
1DF64DD4000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF642AB000
trusted library allocation
page read and write
1DF639FA000
trusted library allocation
page read and write
1DF660B4000
trusted library allocation
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF6F5F9000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF63C87000
trusted library allocation
page read and write
1DF6CD64000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6CD13000
trusted library allocation
page read and write
1DF66F59000
trusted library allocation
page read and write
1DF6C390000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF6125B000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF6D0BC000
trusted library allocation
page read and write
1DF6DBAC000
trusted library allocation
page read and write
1DF6EE1F000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF642B5000
trusted library allocation
page read and write
1DF64BE8000
trusted library allocation
page read and write
1DF63A53000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF665A0000
trusted library allocation
page read and write
1DF6F4BB000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF5A984000
heap
page read and write
1DF5A9BC000
heap
page read and write
1DF64A92000
trusted library allocation
page read and write
1DF5A9F7000
heap
page read and write
19F7F720000
heap
page read and write
1DF6D3DE000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF6EC88000
trusted library allocation
page read and write
1DF6F5A2000
trusted library allocation
page read and write
1DF64A1F000
trusted library allocation
page read and write
1DF6CE15000
trusted library allocation
page read and write
1DF664A6000
trusted library allocation
page read and write
1DF63AB3000
trusted library allocation
page read and write
1DF6D429000
trusted library allocation
page read and write
1DF63C7B000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF6CD3F000
trusted library allocation
page read and write
1DF6C1F5000
trusted library allocation
page read and write
1DF65154000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF64A08000
trusted library allocation
page read and write
1DF63AC9000
trusted library allocation
page read and write
1DF6D499000
trusted library allocation
page read and write
1DF6C2B9000
trusted library allocation
page read and write
1DF63A9A000
trusted library allocation
page read and write
1DF67564000
trusted library allocation
page read and write
1B139969000
trusted library allocation
page read and write
1DF6CD44000
trusted library allocation
page read and write
1DF64DF7000
trusted library allocation
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF6DB7E000
trusted library allocation
page read and write
1DF60B6A000
trusted library allocation
page read and write
1DF6BFEF000
trusted library allocation
page read and write
19F7FB12000
trusted library allocation
page read and write
1B13992F000
trusted library allocation
page read and write
1DF67050000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9BC000
heap
page read and write
1DF665C4000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9F6000
heap
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF66018000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF6388E000
trusted library allocation
page read and write
1DF67078000
trusted library allocation
page read and write
63D28FD000
stack
page read and write
20571030000
unclassified section
page readonly
1DF6D49F000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF65CEC000
trusted library allocation
page read and write
1DF642FE000
trusted library allocation
page read and write
1DF6C1BA000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6EAF1000
trusted library allocation
page read and write
1DF65DE7000
trusted library allocation
page read and write
1DF6EC43000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF64BEF000
trusted library allocation
page read and write
1DF6EDE7000
trusted library allocation
page read and write
1DF6ED50000
trusted library allocation
page read and write
1DF65DD5000
trusted library allocation
page read and write
1B139790000
trusted library allocation
page read and write
1DF6EDE3000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6D5E9000
trusted library allocation
page read and write
1DF5A9F4000
heap
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF675F8000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6D3F0000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF6EC59000
trusted library allocation
page read and write
1DF5A9F0000
heap
page read and write
1DF6091C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6CE2C000
trusted library allocation
page read and write
1DF650BA000
trusted library allocation
page read and write
1DF5A9B2000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF5FA13000
trusted library allocation
page read and write
1DF6758D000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF660CC000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
39E38B303000
trusted library allocation
page read and write
1DF6D4FD000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF650A8000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF65194000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
404B1FE000
stack
page read and write
1DF5A980000
heap
page read and write
1DF6E72C000
trusted library allocation
page read and write
1DF6D351000
trusted library allocation
page read and write
1DF660BC000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
205714B5000
trusted library allocation
page read and write
1DF66079000
trusted library allocation
page read and write
1DF6D3B2000
trusted library allocation
page read and write
19F7FC32000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
19F7FC12000
trusted library allocation
page read and write
1DF634A4000
heap
page read and write
1DF65023000
trusted library allocation
page read and write
1DF63A59000
trusted library allocation
page read and write
1DF61139000
trusted library allocation
page read and write
1DF611AB000
trusted library allocation
page read and write
1DF6EDCD000
trusted library allocation
page read and write
1DF63CCB000
trusted library allocation
page read and write
1DF65C2C000
trusted library allocation
page read and write
1DF5A9ED000
heap
page read and write
1DF6F46A000
trusted library allocation
page read and write
1DF60993000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
404A1FE000
stack
page read and write
1DF642B1000
trusted library allocation
page read and write
19F7F854000
heap
page read and write
1DF6522D000
trusted library allocation
page read and write
1FDE000
stack
page read and write
1DF6CD28000
trusted library allocation
page read and write
1DF6345A000
heap
page read and write
1DF6D3FC000
trusted library allocation
page read and write
1DF670D9000
trusted library allocation
page read and write
1DF6388A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6C1B5000
trusted library allocation
page read and write
1DF60B4F000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6C094000
trusted library allocation
page read and write
1DF664F7000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A99C000
heap
page read and write
19F7FBE7000
trusted library allocation
page read and write
1DF6703E000
trusted library allocation
page read and write
1DF650C9000
trusted library allocation
page read and write
1DF6C191000
trusted library allocation
page read and write
1DF6C1B6000
trusted library allocation
page read and write
1DF60B58000
trusted library allocation
page read and write
1DF67046000
trusted library allocation
page read and write
1B13A55C000
heap
page read and write
9B1000
unkown
page execute read
1DF5A9EF000
heap
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF6D3DD000
trusted library allocation
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF64A1F000
trusted library allocation
page read and write
1DF5FA18000
trusted library allocation
page read and write
1DF6C080000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
20571603000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF65068000
trusted library allocation
page read and write
1DF6F5A2000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6ECD8000
trusted library allocation
page read and write
1DF6EB93000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF64A86000
trusted library allocation
page read and write
1DF6CD4F000
trusted library allocation
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF67561000
trusted library allocation
page read and write
1DF6529D000
trusted library allocation
page read and write
1DF6EDDD000
trusted library allocation
page read and write
1DF65EEF000
trusted library allocation
page read and write
1DF6389E000
trusted library allocation
page read and write
1408000
heap
page read and write
1DF652D5000
trusted library allocation
page read and write
1DF665DE000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF675D1000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
2057170C000
trusted library allocation
page read and write
1DF6C1CD000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6EEE7000
trusted library allocation
page read and write
A72000
unkown
page readonly
1DF60CEB000
trusted library allocation
page read and write
1DF65136000
trusted library allocation
page read and write
1DF5A98D000
heap
page read and write
1DF6EC29000
trusted library allocation
page read and write
1DF665EB000
trusted library allocation
page read and write
1DF67044000
trusted library allocation
page read and write
A80000
unkown
page write copy
1DF6709C000
trusted library allocation
page read and write
1DF5F3B3000
trusted library allocation
page read and write
1DF6ED53000
trusted library allocation
page read and write
1B13A644000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5F3C3000
trusted library allocation
page read and write
205711DF000
unclassified section
page read and write
1DF6C3F0000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF609A6000
trusted library allocation
page read and write
1DF5A996000
heap
page read and write
1DF660F6000
trusted library allocation
page read and write
1DF6F5C2000
trusted library allocation
page read and write
1DF6CE21000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF65026000
trusted library allocation
page read and write
1DF650D4000
trusted library allocation
page read and write
11CDDFB1000
trusted library allocation
page execute read
1DF63C7D000
trusted library allocation
page read and write
1DF611DB000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF64A69000
trusted library allocation
page read and write
140C000
heap
page read and write
1DF6345A000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF66075000
trusted library allocation
page read and write
1DF6C28F000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1DF6C376000
trusted library allocation
page read and write
1DF6F594000
trusted library allocation
page read and write
1DF6EB45000
trusted library allocation
page read and write
94A000
stack
page read and write
1DF5A9A7000
heap
page read and write
1DF6CD78000
trusted library allocation
page read and write
1DF6F043000
trusted library allocation
page read and write
1DF6D46D000
trusted library allocation
page read and write
1DF671A0000
trusted library allocation
page read and write
1DF6091F000
trusted library allocation
page read and write
1DF6EE74000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6D0AC000
trusted library allocation
page read and write
1DF650C4000
trusted library allocation
page read and write
1DF664C7000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
1DF5A992000
heap
page read and write
20571160000
heap
page read and write
19F7F72A000
heap
page read and write
1DF61161000
trusted library allocation
page read and write
1DF64FC5000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6C34D000
trusted library allocation
page read and write
1DF674E5000
trusted library allocation
page read and write
1DF64A73000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF65154000
trusted library allocation
page read and write
1DF6C23D000
trusted library allocation
page read and write
1AEFAB59000
heap
page read and write
1DF64EDD000
trusted library allocation
page read and write
1DF6F482000
trusted library allocation
page read and write
1DF6D780000
trusted library allocation
page read and write
1DF60C2C000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF6CD37000
trusted library allocation
page read and write
1DF6DBB0000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A97D000
heap
page read and write
1DF6EC45000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF60C44000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF6D4BB000
trusted library allocation
page read and write
1DF6609A000
trusted library allocation
page read and write
1DF6B98B000
trusted library allocation
page read and write
1DF65075000
trusted library allocation
page read and write
1DF65295000
trusted library allocation
page read and write
1DF61160000
trusted library allocation
page read and write
1DF664FD000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
16FD59A1000
heap
page read and write
1DF65CA0000
trusted library allocation
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6EB83000
trusted library allocation
page read and write
1DF67527000
trusted library allocation
page read and write
1DF6117A000
trusted library allocation
page read and write
1DF5FAD2000
trusted library allocation
page read and write
1DF6DBBA000
trusted library allocation
page read and write
1DF6C2C9000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6F5B6000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6508D000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF63C14000
trusted library allocation
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF6C183000
trusted library allocation
page read and write
1DF65026000
trusted library allocation
page read and write
1DF650C9000
trusted library allocation
page read and write
1DF65154000
trusted library allocation
page read and write
1DF656F2000
trusted library allocation
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF6CD6C000
trusted library allocation
page read and write
1DF6C3E5000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF6C1BA000
trusted library allocation
page read and write
1DF63A84000
trusted library allocation
page read and write
1DF6C35E000
trusted library allocation
page read and write
1DF6389E000
trusted library allocation
page read and write
63D4C7E000
unkown
page readonly
5D619EB000
stack
page read and write
1DF642BC000
trusted library allocation
page read and write
1DF6C0EA000
trusted library allocation
page read and write
1DF6E753000
heap
page read and write
1DF5A9EF000
heap
page read and write
3890000
heap
page read and write
1DF6EC82000
trusted library allocation
page read and write
1DF634CB000
heap
page read and write
1DF6349C000
heap
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1DF65075000
trusted library allocation
page read and write
1DF64B36000
trusted library allocation
page read and write
1DF6D5A3000
trusted library allocation
page read and write
1DF6EC38000
trusted library allocation
page read and write
1DF64BE7000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF64FC9000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
1DF6C331000
trusted library allocation
page read and write
1DF6C106000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1B1397D4000
unkown
page execute read
205714F4000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6C0EA000
trusted library allocation
page read and write
1DF5A964000
heap
page read and write
1DF5A99F000
heap
page read and write
1DF650DC000
trusted library allocation
page read and write
1DF6D33E000
trusted library allocation
page read and write
1DF660C0000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1DF6EED6000
trusted library allocation
page read and write
1DF6349C000
heap
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF5A9D5000
heap
page read and write
1DF6EBA1000
trusted library allocation
page read and write
1B1395C0000
heap
page read and write
1DF660BE000
trusted library allocation
page read and write
1DF6EAFC000
trusted library allocation
page read and write
1DF651FC000
trusted library allocation
page read and write
1DF60B4C000
trusted library allocation
page read and write
1DF652C3000
trusted library allocation
page read and write
1DF6C237000
trusted library allocation
page read and write
1DF6CDBF000
trusted library allocation
page read and write
1DF64F8C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64DF4000
trusted library allocation
page read and write
1DF64A16000
trusted library allocation
page read and write
1DF64B1A000
trusted library allocation
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF63490000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF6EB38000
trusted library allocation
page read and write
1DF63AB3000
trusted library allocation
page read and write
1DF6C2BB000
trusted library allocation
page read and write
1B13955A000
remote allocation
page execute read
1DF5A9F3000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF67541000
trusted library allocation
page read and write
1DF64FC9000
trusted library allocation
page read and write
1DF611FE000
trusted library allocation
page read and write
205714C4000
trusted library allocation
page read and write
1DF665DE000
trusted library allocation
page read and write
11BF000
stack
page read and write
1DF6F5FB000
trusted library allocation
page read and write
1B13A563000
heap
page read and write
1DF65186000
trusted library allocation
page read and write
20571163000
heap
page read and write
1DF665F2000
trusted library allocation
page read and write
1DF6ECD3000
trusted library allocation
page read and write
1DF6CD37000
trusted library allocation
page read and write
1DF65170000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64B09000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1DF6D3E1000
trusted library allocation
page read and write
1DF6C2BB000
trusted library allocation
page read and write
1DF6EC82000
trusted library allocation
page read and write
1DF6D5DB000
trusted library allocation
page read and write
1DF6C396000
trusted library allocation
page read and write
1DF6CD0F000
trusted library allocation
page read and write
1DF6ECF9000
trusted library allocation
page read and write
1DF60B3C000
trusted library allocation
page read and write
1DF6F4DB000
trusted library allocation
page read and write
1DF642AF000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF65116000
trusted library allocation
page read and write
1DF6C3AC000
trusted library allocation
page read and write
1DF64A2F000
trusted library allocation
page read and write
5D63BFE000
unkown
page readonly
1DF6EED6000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF6F482000
trusted library allocation
page read and write
1DF6606F000
trusted library allocation
page read and write
1DF5AA07000
heap
page read and write
1DF6CE67000
trusted library allocation
page read and write
1DF60BD9000
trusted library allocation
page read and write
1DF60C99000
trusted library allocation
page read and write
1DF64AF4000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF66492000
trusted library allocation
page read and write
1DF65C9C000
trusted library allocation
page read and write
1DF651BB000
trusted library allocation
page read and write
1DF64AFB000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF63A8A000
trusted library allocation
page read and write
1DF6C0F5000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF64D32000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF5A994000
heap
page read and write
1DF5A9A2000
heap
page read and write
5D63CBE000
unkown
page readonly
1DF5A9C1000
heap
page read and write
1DF609F7000
trusted library allocation
page read and write
1DF6C120000
trusted library allocation
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF65161000
trusted library allocation
page read and write
1DF65068000
trusted library allocation
page read and write
1DF63CD7000
trusted library allocation
page read and write
1DF609BF000
trusted library allocation
page read and write
1DF6EC5B000
trusted library allocation
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF5A964000
heap
page read and write
1DF65041000
trusted library allocation
page read and write
1B139964000
trusted library allocation
page read and write
1DF65C2C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF652C5000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF6C0A2000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9AE000
heap
page read and write
1B13A677000
heap
page read and write
63D29FE000
stack
page read and write
1DF63497000
heap
page read and write
1DF5FAEE000
trusted library allocation
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6CD86000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6BA16000
trusted library allocation
page read and write
1DF6E5E5000
trusted library allocation
page read and write
1DF6125F000
trusted library allocation
page read and write
1DF671D9000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF5A9F3000
heap
page read and write
1DF639BD000
trusted library allocation
page read and write
1DF5A9A9000
heap
page read and write
1DF6CED9000
trusted library allocation
page read and write
3BE1000
heap
page read and write
1DF6ED38000
trusted library allocation
page read and write
1DF6EC2E000
trusted library allocation
page read and write
1DF63CE7000
trusted library allocation
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF6C164000
trusted library allocation
page read and write
1DF5A9F7000
heap
page read and write
1DF5F3C9000
trusted library allocation
page read and write
1409000
heap
page read and write
1B13A5E3000
heap
page read and write
1DF6CE25000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
DD551FE000
unkown
page readonly
1DF6D3BC000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF651A2000
trusted library allocation
page read and write
1DF6EA48000
trusted library allocation
page read and write
1DF6701B000
trusted library allocation
page read and write
63D29BB000
stack
page read and write
1DF5A9A0000
heap
page read and write
1B139610000
heap
page readonly
1DF6346F000
heap
page read and write
1DF6CD71000
trusted library allocation
page read and write
1DF6CE25000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF6D3CE000
trusted library allocation
page read and write
1DF6D4F1000
trusted library allocation
page read and write
1DF66570000
trusted library allocation
page read and write
5D645BE000
stack
page read and write
1DF64A2F000
trusted library allocation
page read and write
1DF5A980000
heap
page read and write
1DF5A9BE000
heap
page read and write
1DF611D9000
trusted library allocation
page read and write
1DF6383D000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6CE3D000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF5A995000
heap
page read and write
1DF6C3F4000
trusted library allocation
page read and write
5D64DBE000
unkown
page readonly
1DF6C096000
trusted library allocation
page read and write
1DF650DC000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
63D293E000
unkown
page readonly
1DF5A9AC000
heap
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6EC49000
trusted library allocation
page read and write
19F7FC00000
trusted library allocation
page read and write
1DF65041000
trusted library allocation
page read and write
1DF64BEC000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF63C4E000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9B7000
heap
page read and write
1DF60949000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF5A9B7000
heap
page read and write
1DF660CA000
trusted library allocation
page read and write
1DF639EE000
trusted library allocation
page read and write
1DF64A84000
trusted library allocation
page read and write
1DF64A2F000
trusted library allocation
page read and write
1DF6CE1A000
trusted library allocation
page read and write
19F7FB6E000
trusted library allocation
page read and write
1DF650C6000
trusted library allocation
page read and write
1DF65046000
trusted library allocation
page read and write
1DF63886000
trusted library allocation
page read and write
1DF670D9000
trusted library allocation
page read and write
1DF67565000
trusted library allocation
page read and write
1DF64A10000
trusted library allocation
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF651E5000
trusted library allocation
page read and write
1DF6CDF9000
trusted library allocation
page read and write
1DF5A9AF000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6E62B000
heap
page read and write
19F7F7A0000
unclassified section
page read and write
1DF64A92000
trusted library allocation
page read and write
1DF64124000
trusted library allocation
page read and write
19F7FBB7000
trusted library allocation
page read and write
1DF6D377000
trusted library allocation
page read and write
16FD3DED000
heap
page read and write
1DF5A9AF000
heap
page read and write
1DF6C2AD000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6DBB0000
trusted library allocation
page read and write
1DF6EC38000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF67118000
trusted library allocation
page read and write
1DF6EC29000
trusted library allocation
page read and write
1DF6D3D6000
trusted library allocation
page read and write
1DF67048000
trusted library allocation
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF6EDDF000
trusted library allocation
page read and write
1DF639E5000
trusted library allocation
page read and write
1DF5AA27000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6C1D7000
trusted library allocation
page read and write
1DF5A9C0000
heap
page read and write
19F7F5F0000
heap
page read and write
1DF65220000
trusted library allocation
page read and write
1DF6ECEA000
trusted library allocation
page read and write
1DF65E6C000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF67599000
trusted library allocation
page read and write
19F7FB0D000
trusted library allocation
page read and write
1DF675D1000
trusted library allocation
page read and write
1DF6B9A8000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF675FD000
trusted library allocation
page read and write
1DF639CB000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF64DA7000
trusted library allocation
page read and write
1DF63993000
trusted library allocation
page read and write
1DF5A9B7000
heap
page read and write
1DF60BEF000
trusted library allocation
page read and write
1DF64A74000
trusted library allocation
page read and write
1DF65048000
trusted library allocation
page read and write
1DF64EAC000
trusted library allocation
page read and write
1DF6CD0C000
trusted library allocation
page read and write
1DF6CE20000
trusted library allocation
page read and write
1DF665ED000
trusted library allocation
page read and write
1DF6C1D7000
trusted library allocation
page read and write
1DF6507A000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A994000
heap
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF651BE000
trusted library allocation
page read and write
1DF6B997000
trusted library allocation
page read and write
1DF5A996000
heap
page read and write
1DF65220000
trusted library allocation
page read and write
1DF639EE000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6BA3C000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF6759B000
trusted library allocation
page read and write
1DF60C38000
trusted library allocation
page read and write
1B139961000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF611FE000
trusted library allocation
page read and write
1DF6D3D2000
trusted library allocation
page read and write
1DF6D3B5000
trusted library allocation
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF5A9A5000
heap
page read and write
1DF64D1C000
trusted library allocation
page read and write
1DF674FD000
trusted library allocation
page read and write
19F7FB66000
trusted library allocation
page read and write
1DF5A9C6000
heap
page read and write
1DF6E69F000
heap
page read and write
1DF6D3D4000
trusted library allocation
page read and write
205713C6000
heap
page read and write
1DF651D5000
trusted library allocation
page read and write
1DF6D3F0000
trusted library allocation
page read and write
1DF6C1F5000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF64A73000
trusted library allocation
page read and write
1DF6E751000
heap
page read and write
1DF5A9C2000
heap
page read and write
1DF65190000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF5A981000
heap
page read and write
1420000
heap
page read and write
1B13A63B000
heap
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF60C7C000
trusted library allocation
page read and write
1DF6701F000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9C2000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9C2000
heap
page read and write
1DF64D41000
trusted library allocation
page read and write
1DF664B4000
trusted library allocation
page read and write
1DF65094000
trusted library allocation
page read and write
1DF6503B000
trusted library allocation
page read and write
1B13A644000
heap
page read and write
1DF64FB7000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6EB05000
trusted library allocation
page read and write
1DF639D7000
trusted library allocation
page read and write
19F7FB5B000
trusted library allocation
page read and write
1DF6706B000
trusted library allocation
page read and write
1DF6C3DC000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF6CDE1000
trusted library allocation
page read and write
1DF670E2000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6EB61000
trusted library allocation
page read and write
1DF6709C000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF64DA4000
trusted library allocation
page read and write
19F7FC1A000
trusted library allocation
page read and write
1DF66560000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6345A000
heap
page read and write
1DF6345A000
heap
page read and write
1DF6CE65000
trusted library allocation
page read and write
1DF65295000
trusted library allocation
page read and write
1DF65C83000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF5F3F9000
trusted library allocation
page read and write
1DF642BC000
trusted library allocation
page read and write
1B13999F000
trusted library allocation
page read and write
1DF66567000
trusted library allocation
page read and write
1DF65046000
trusted library allocation
page read and write
1DF6CDEA000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
1DF6C2C9000
trusted library allocation
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF6CE74000
trusted library allocation
page read and write
1DF64DE4000
trusted library allocation
page read and write
1DF6F46A000
trusted library allocation
page read and write
1DF6C05C000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF6429B000
trusted library allocation
page read and write
1DF65269000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6D4AF000
trusted library allocation
page read and write
1DF64CF8000
trusted library allocation
page read and write
1DF650A9000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6ED74000
trusted library allocation
page read and write
1DF6C055000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF65C9C000
trusted library allocation
page read and write
1DF6CD3C000
trusted library allocation
page read and write
20571466000
trusted library allocation
page read and write
1DF65161000
trusted library allocation
page read and write
1DF5A99D000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF642B5000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF634A2000
heap
page read and write
1DF65F65000
trusted library allocation
page read and write
1B139919000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF66036000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
3BE0000
heap
page read and write
1DF5A994000
heap
page read and write
1DF65035000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF6ECD1000
trusted library allocation
page read and write
1DF639EB000
trusted library allocation
page read and write
1DF6CE1C000
trusted library allocation
page read and write
1DF6CDED000
trusted library allocation
page read and write
1DF5AA0B000
heap
page read and write
1DF65ED1000
trusted library allocation
page read and write
1DF6CDFA000
trusted library allocation
page read and write
1DF6EB83000
trusted library allocation
page read and write
1DF5F9F9000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF670DF000
trusted library allocation
page read and write
1B13A57D000
heap
page read and write
1DF638A5000
trusted library allocation
page read and write
20571449000
trusted library allocation
page read and write
1DF6F2CE000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF60CA2000
trusted library allocation
page read and write
1DF642B8000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6CDD8000
trusted library allocation
page read and write
1DF64A11000
trusted library allocation
page read and write
1DF6F2F1000
trusted library allocation
page read and write
1DF5A98E000
heap
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF65ED1000
trusted library allocation
page read and write
1DF63877000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6CD58000
trusted library allocation
page read and write
1DF5A98D000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6F473000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6C39C000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF64BD2000
trusted library allocation
page read and write
1DF6C076000
trusted library allocation
page read and write
1DF6C37B000
trusted library allocation
page read and write
1DF67554000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A992000
heap
page read and write
1DF639A5000
trusted library allocation
page read and write
1DF6388E000
trusted library allocation
page read and write
1DF65094000
trusted library allocation
page read and write
1DF6E69F000
heap
page read and write
1B13A658000
heap
page read and write
1DF66F3E000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF665F6000
trusted library allocation
page read and write
1DF6C318000
trusted library allocation
page read and write
1DF6D4BB000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF64B14000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6D3CB000
trusted library allocation
page read and write
1DF6EB7C000
trusted library allocation
page read and write
1DF6E60C000
trusted library allocation
page read and write
1DF611DC000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6E65B000
heap
page read and write
1DF5A9FF000
heap
page read and write
1DF5A994000
heap
page read and write
1DF64D41000
trusted library allocation
page read and write
1DF6D3D9000
trusted library allocation
page read and write
1DF6C096000
trusted library allocation
page read and write
1DF6D499000
trusted library allocation
page read and write
1DF6D426000
trusted library allocation
page read and write
1DF6117B000
trusted library allocation
page read and write
1DF675C9000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF650D2000
trusted library allocation
page read and write
1DF65F56000
trusted library allocation
page read and write
1DF63CF3000
trusted library allocation
page read and write
1DF6CD9D000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
B14000
heap
page read and write
1DF6EBD2000
trusted library allocation
page read and write
1DF6C326000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
19F7FBA9000
trusted library allocation
page read and write
1DF664B0000
trusted library allocation
page read and write
1DF60C2F000
trusted library allocation
page read and write
1DF63A9A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A97E000
heap
page read and write
19F7F6E0000
heap
page read and write
1DF6EDDF000
trusted library allocation
page read and write
1DF6C082000
trusted library allocation
page read and write
1DF6D5B3000
trusted library allocation
page read and write
1DF6757A000
trusted library allocation
page read and write
1DF6C34F000
trusted library allocation
page read and write
1DF6CEF7000
trusted library allocation
page read and write
13E0000
heap
page read and write
63D753E000
stack
page read and write
1DF6EE5E000
trusted library allocation
page read and write
20571300000
unclassified section
page readonly
1DF5A98D000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6508B000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6E6E1000
heap
page read and write
1DF6346F000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF611D5000
trusted library allocation
page read and write
1DF5A9CC000
heap
page read and write
1DF6345A000
heap
page read and write
16FD4007000
trusted library allocation
page read and write
1DF6EC59000
trusted library allocation
page read and write
1DF6C384000
trusted library allocation
page read and write
1DF5A99E000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6398A000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6CE23000
trusted library allocation
page read and write
1DF6D3CF000
trusted library allocation
page read and write
1DF6500C000
trusted library allocation
page read and write
1DF6398B000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6515B000
trusted library allocation
page read and write
1DF675C9000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF65E61000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1B139986000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6C328000
trusted library allocation
page read and write
1DF6701B000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
63D7D3E000
unkown
page readonly
1DF64DF4000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF64D75000
trusted library allocation
page read and write
1DF6BF5D000
trusted library allocation
page read and write
1DF639A5000
trusted library allocation
page read and write
1DF66FEB000
trusted library allocation
page read and write
1DF664C7000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF660FD000
trusted library allocation
page read and write
1DF67039000
trusted library allocation
page read and write
19F7F5D0000
unclassified section
page readonly
1DF64D07000
trusted library allocation
page read and write
1DF6D3CE000
trusted library allocation
page read and write
1DF6C32F000
trusted library allocation
page read and write
1DF6CDBF000
trusted library allocation
page read and write
1DF642B3000
trusted library allocation
page read and write
19F7F7B0000
heap
page read and write
1DF6EC09000
trusted library allocation
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF64A44000
trusted library allocation
page read and write
20570FEE000
remote allocation
page execute read
1DF64F0A000
trusted library allocation
page read and write
19F7FBA0000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF63C52000
trusted library allocation
page read and write
1DF6C1B6000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9EA000
heap
page read and write
1DF5A984000
heap
page read and write
1DF67565000
trusted library allocation
page read and write
19F7FB03000
trusted library allocation
page read and write
1DF61133000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A984000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF64B2A000
trusted library allocation
page read and write
1DF64A0D000
trusted library allocation
page read and write
1DF664DF000
trusted library allocation
page read and write
1B13A569000
heap
page read and write
1DF611AF000
trusted library allocation
page read and write
1DF66F5F000
trusted library allocation
page read and write
1DF6D432000
trusted library allocation
page read and write
1DF65238000
trusted library allocation
page read and write
1DF60C39000
trusted library allocation
page read and write
1DF63A6A000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF6EDE9000
trusted library allocation
page read and write
1DF64DAB000
trusted library allocation
page read and write
20571200000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6C080000
trusted library allocation
page read and write
1DF6D440000
trusted library allocation
page read and write
1DF6CD3C000
trusted library allocation
page read and write
1DF639EB000
trusted library allocation
page read and write
1DF6BFF7000
trusted library allocation
page read and write
1DF6ECF9000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6EEFC000
trusted library allocation
page read and write
1DF6C1A2000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1B13A57D000
heap
page read and write
1DF60C81000
trusted library allocation
page read and write
1DF6ED47000
trusted library allocation
page read and write
1DF6E671000
heap
page read and write
1DF6ECD1000
trusted library allocation
page read and write
1DF63A8A000
trusted library allocation
page read and write
1DF6D36F000
trusted library allocation
page read and write
1DF6D3D6000
trusted library allocation
page read and write
1DF6D3D4000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1AEFAC80000
heap
page read and write
1DF6C096000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A9B9000
heap
page read and write
1DF6757A000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF6EE51000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF63458000
heap
page read and write
1DF6C323000
trusted library allocation
page read and write
1DF6C076000
trusted library allocation
page read and write
1DF6CE3A000
trusted library allocation
page read and write
1DF642B1000
trusted library allocation
page read and write
1DF5FAEE000
trusted library allocation
page read and write
5D623D8000
stack
page read and write
1DF652DB000
trusted library allocation
page read and write
1DF6D3EF000
trusted library allocation
page read and write
1DF6500F000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF665C7000
trusted library allocation
page read and write
1DF64EFE000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF6CD2D000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF60CDD000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1B1394F0000
unclassified section
page readonly
1DF6389E000
trusted library allocation
page read and write
1DF6C07A000
trusted library allocation
page read and write
1DF66069000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6D543000
trusted library allocation
page read and write
1DF64EB5000
trusted library allocation
page read and write
1DF6CDB6000
trusted library allocation
page read and write
1DF64A84000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A992000
heap
page read and write
1DF6C2FC000
trusted library allocation
page read and write
1DF63A7E000
trusted library allocation
page read and write
1DF6EE16000
trusted library allocation
page read and write
1DF5A986000
heap
page read and write
B14000
heap
page read and write
1DF6EE5E000
trusted library allocation
page read and write
1DF67561000
trusted library allocation
page read and write
1DF6D0E0000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF63C3A000
trusted library allocation
page read and write
1DF60BB8000
trusted library allocation
page read and write
1DF64AFE000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF6D3CB000
trusted library allocation
page read and write
1DF6ECDB000
trusted library allocation
page read and write
1DF6F4BD000
trusted library allocation
page read and write
1DF6EE5A000
trusted library allocation
page read and write
63D5CFE000
stack
page read and write
19F7FB44000
trusted library allocation
page read and write
1DF6EC29000
trusted library allocation
page read and write
1DF6F5C7000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF5FA66000
trusted library allocation
page read and write
1DF63A4D000
trusted library allocation
page read and write
1DF61172000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
20571430000
trusted library allocation
page read and write
1DF63987000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9D5000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF634A4000
heap
page read and write
1DF65189000
trusted library allocation
page read and write
1DF6346E000
heap
page read and write
1DF651C6000
trusted library allocation
page read and write
1DF6E587000
trusted library allocation
page read and write
1DF64A41000
trusted library allocation
page read and write
1DF670AC000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9EF000
heap
page read and write
1B13A55F000
heap
page read and write
1DF6D3CB000
trusted library allocation
page read and write
1DF65245000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1B13A62D000
heap
page read and write
1DF6E014000
trusted library allocation
page read and write
1DF675C9000
trusted library allocation
page read and write
1DF6C1AD000
trusted library allocation
page read and write
1DF6E64D000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF5A9F5000
heap
page read and write
1DF5A994000
heap
page read and write
1DF6DBB6000
trusted library allocation
page read and write
1DF6D3FC000
trusted library allocation
page read and write
1DF6CE1C000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1B13A66E000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF63C76000
trusted library allocation
page read and write
1DF6D3B2000
trusted library allocation
page read and write
1DF6F4A1000
trusted library allocation
page read and write
1DF5A9D8000
heap
page read and write
1DF5A9C0000
heap
page read and write
1DF6CDE3000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6C0F3000
trusted library allocation
page read and write
1409000
heap
page read and write
1DF64D0D000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6658F000
trusted library allocation
page read and write
1DF6EC8C000
trusted library allocation
page read and write
1DF65087000
trusted library allocation
page read and write
1B13A54D000
heap
page read and write
1DF5A994000
heap
page read and write
1DF63A7E000
trusted library allocation
page read and write
1DF65EC3000
trusted library allocation
page read and write
1DF6700E000
trusted library allocation
page read and write
1DF6CD13000
trusted library allocation
page read and write
1DF6ECF9000
trusted library allocation
page read and write
1B13A658000
heap
page read and write
1B139580000
heap
page read and write
1DF6759B000
trusted library allocation
page read and write
1DF6CDC4000
trusted library allocation
page read and write
1DF6F5A5000
trusted library allocation
page read and write
1280000
heap
page read and write
1DF6EDE5000
trusted library allocation
page read and write
1DF6EB38000
trusted library allocation
page read and write
1DF65C94000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF6B9DC000
trusted library allocation
page read and write
1DF5FAEE000
trusted library allocation
page read and write
1DF6DB9E000
trusted library allocation
page read and write
1DF660E6000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6EC2C000
trusted library allocation
page read and write
1DF65E34000
trusted library allocation
page read and write
1DF639E7000
trusted library allocation
page read and write
1DF5AA02000
heap
page read and write
1DF665FD000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF6CE72000
trusted library allocation
page read and write
1DF64BC3000
trusted library allocation
page read and write
1DF674DD000
trusted library allocation
page read and write
1DF63A70000
trusted library allocation
page read and write
1DF65269000
trusted library allocation
page read and write
1DF6C3A8000
trusted library allocation
page read and write
1DF6CE25000
trusted library allocation
page read and write
1DF67571000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF65CEC000
trusted library allocation
page read and write
1DF63AAC000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9AD000
heap
page read and write
16FD41E5000
heap
page read and write
1DF6D3C5000
trusted library allocation
page read and write
1DF63873000
trusted library allocation
page read and write
1DF64FBE000
trusted library allocation
page read and write
19F7F943000
heap
page read and write
1DF664EA000
trusted library allocation
page read and write
1DF6700E000
trusted library allocation
page read and write
1DF64B2A000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF5AA02000
heap
page read and write
1DF6EB61000
trusted library allocation
page read and write
1DF6E036000
trusted library allocation
page read and write
1DF65046000
trusted library allocation
page read and write
1DF65F4E000
trusted library allocation
page read and write
1DF665EB000
trusted library allocation
page read and write
1DF6E056000
trusted library allocation
page read and write
1DF66576000
trusted library allocation
page read and write
1DF64DF7000
trusted library allocation
page read and write
1DF634AA000
heap
page read and write
1DF652F5000
trusted library allocation
page read and write
1DF5FA1A000
trusted library allocation
page read and write
1DF6EB31000
trusted library allocation
page read and write
1DF6D5AF000
trusted library allocation
page read and write
1DF65EB1000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF66434000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6ECC5000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF6D4A2000
trusted library allocation
page read and write
1DF60CF6000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF63A94000
trusted library allocation
page read and write
1DF64286000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
B14000
heap
page read and write
1DF64A73000
trusted library allocation
page read and write
1DF65DE7000
trusted library allocation
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF6EC8C000
trusted library allocation
page read and write
1DF65FDA000
trusted library allocation
page read and write
1DF6B9D0000
trusted library allocation
page read and write
1B13A66E000
heap
page read and write
1DF65041000
trusted library allocation
page read and write
1B13A5A1000
heap
page read and write
DD5627E000
unkown
page readonly
1DF5A9A7000
heap
page read and write
1DF5A9B7000
heap
page read and write
5D63C3E000
unkown
page readonly
1DF5A9F3000
heap
page read and write
1DF6B97F000
trusted library allocation
page read and write
1DF67182000
trusted library allocation
page read and write
1DF6CD78000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5FA7E000
trusted library allocation
page read and write
1DF6703E000
trusted library allocation
page read and write
1DF6757A000
trusted library allocation
page read and write
1DF6125B000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
11CDE051000
trusted library allocation
page execute read
1DF6CEE2000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF6C0F3000
trusted library allocation
page read and write
1DF6CE5A000
trusted library allocation
page read and write
1DF650AE000
trusted library allocation
page read and write
19F7FB96000
trusted library allocation
page read and write
1DF64A91000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF61209000
trusted library allocation
page read and write
3BE1000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9C0000
heap
page read and write
1DF5F923000
trusted library allocation
page read and write
1DF64D32000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF652FB000
trusted library allocation
page read and write
1DF6E686000
trusted library allocation
page read and write
1DF6C1B3000
trusted library allocation
page read and write
1DF6DBBA000
trusted library allocation
page read and write
1DF5A9F9000
heap
page read and write
1DF5FAE4000
trusted library allocation
page read and write
1DF6D341000
trusted library allocation
page read and write
1DF639F4000
trusted library allocation
page read and write
1DF6D33A000
trusted library allocation
page read and write
1DF6EC5B000
trusted library allocation
page read and write
1DF650BE000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
DD549FE000
stack
page read and write
20571500000
heap
page read and write
1DF65266000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF6D3F0000
trusted library allocation
page read and write
1DF6D499000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF652B2000
trusted library allocation
page read and write
404B9FE000
stack
page read and write
1B1399E9000
trusted library allocation
page read and write
1DF6393D000
trusted library allocation
page read and write
1DF652A0000
trusted library allocation
page read and write
1DF5A971000
heap
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF60B0D000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF5A9AA000
heap
page read and write
16FD59A8000
heap
page read and write
1DF5A9B9000
heap
page read and write
1DF6C0EA000
trusted library allocation
page read and write
1AEFAFB0000
heap
page read and write
1DF5A9F0000
heap
page read and write
1B13A658000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6D432000
trusted library allocation
page read and write
1DF5F9FB000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF66488000
trusted library allocation
page read and write
1DF6EED6000
trusted library allocation
page read and write
1DF6D4F1000
trusted library allocation
page read and write
1DF6D3D4000
trusted library allocation
page read and write
1DF6E63E000
heap
page read and write
1DF6EE34000
trusted library allocation
page read and write
1DF6D3D9000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF6E6E4000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6D4EF000
trusted library allocation
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF6F5C7000
trusted library allocation
page read and write
1DF6F5F7000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF639C4000
trusted library allocation
page read and write
1DF5A975000
heap
page read and write
1DF64D96000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF650A9000
trusted library allocation
page read and write
1DF6C1B3000
trusted library allocation
page read and write
1DF63A70000
trusted library allocation
page read and write
19F7FB62000
trusted library allocation
page read and write
1DF5FAE1000
trusted library allocation
page read and write
1DF5FAEE000
trusted library allocation
page read and write
1DF6EB73000
trusted library allocation
page read and write
1DF6D4CD000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1B139632000
unclassified section
page read and write
1DF5A9E9000
heap
page read and write
1DF651C4000
trusted library allocation
page read and write
1DF5F9FE000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A9B9000
heap
page read and write
1DF6EA29000
trusted library allocation
page read and write
1DF5A9B9000
heap
page read and write
1DF6396E000
trusted library allocation
page read and write
1DF5A9F9000
heap
page read and write
1DF60D26000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF61290000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF5A994000
heap
page read and write
1DF66F16000
trusted library allocation
page read and write
1DF6EC48000
trusted library allocation
page read and write
1DF6F26D000
trusted library allocation
page read and write
1DF61283000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1B13A5E6000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6346E000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A994000
heap
page read and write
1DF6EC43000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6C15F000
trusted library allocation
page read and write
1DF6ECD1000
trusted library allocation
page read and write
1DF64D1C000
trusted library allocation
page read and write
1DF650D9000
trusted library allocation
page read and write
1DF64DA6000
trusted library allocation
page read and write
1DF67521000
trusted library allocation
page read and write
1DF639DD000
trusted library allocation
page read and write
1DF670F8000
trusted library allocation
page read and write
1DF6BF31000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF6398E000
trusted library allocation
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF64A8C000
trusted library allocation
page read and write
1DF6EC48000
trusted library allocation
page read and write
1DF65023000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1B1397F7000
unkown
page execute read
1DF6C391000
trusted library allocation
page read and write
1B139948000
trusted library allocation
page read and write
1DF652F5000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6C35C000
trusted library allocation
page read and write
1DF6CE1C000
trusted library allocation
page read and write
1DF5A997000
heap
page read and write
1DF612CF000
trusted library allocation
page read and write
1DF660E9000
trusted library allocation
page read and write
1DF6523E000
trusted library allocation
page read and write
1DF671A0000
trusted library allocation
page read and write
1DF5A9C0000
heap
page read and write
1DF65CDA000
trusted library allocation
page read and write
1DF675FD000
trusted library allocation
page read and write
1DF63C38000
trusted library allocation
page read and write
20570FD0000
remote allocation
page read and write
1DF5A99B000
heap
page read and write
1DF63AF3000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6ECEA000
trusted library allocation
page read and write
1DF6346C000
heap
page read and write
1DF6EEBE000
trusted library allocation
page read and write
1DF65048000
trusted library allocation
page read and write
1DF650B2000
trusted library allocation
page read and write
1DF650BB000
trusted library allocation
page read and write
1DF6EB09000
trusted library allocation
page read and write
1DF63A70000
trusted library allocation
page read and write
1B13A569000
heap
page read and write
1DF6CDEA000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF6F5FB000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF5A9AE000
heap
page read and write
1DF64BD0000
trusted library allocation
page read and write
1DF67578000
trusted library allocation
page read and write
1DF651C8000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6EDA4000
trusted library allocation
page read and write
1DF64A79000
trusted library allocation
page read and write
1DF660E6000
trusted library allocation
page read and write
1DF6705E000
trusted library allocation
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1B13A58A000
heap
page read and write
1DF55539000
heap
page read and write
1DF6501B000
trusted library allocation
page read and write
1DF6E7C2000
heap
page read and write
1DF64FE3000
trusted library allocation
page read and write
1DF675D1000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6D563000
trusted library allocation
page read and write
1DF64A91000
trusted library allocation
page read and write
1DF5A9B8000
heap
page read and write
1B13A500000
heap
page read and write
1DF66F86000
trusted library allocation
page read and write
1B13A56C000
heap
page read and write
1DF6D379000
trusted library allocation
page read and write
1B13A560000
heap
page read and write
1DF6CF00000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF650C6000
trusted library allocation
page read and write
1DF6529B000
trusted library allocation
page read and write
40499FA000
stack
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6C179000
trusted library allocation
page read and write
1DF6E000000
trusted library allocation
page read and write
1DF6D4F3000
trusted library allocation
page read and write
20571479000
trusted library allocation
page read and write
1DF6C285000
trusted library allocation
page read and write
1DF65C29000
trusted library allocation
page read and write
1DF65184000
trusted library allocation
page read and write
20570FF0000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6CD75000
trusted library allocation
page read and write
1DF642A7000
trusted library allocation
page read and write
1DF5A9C1000
heap
page read and write
1DF5A9E8000
heap
page read and write
63D547E000
stack
page read and write
1DF6CD91000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF60949000
trusted library allocation
page read and write
1DF6CDCF000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5AA07000
heap
page read and write
1DF5A984000
heap
page read and write
1DF5A9F4000
heap
page read and write
1DF6CDD5000
trusted library allocation
page read and write
19F7F5B0000
remote allocation
page read and write
1B13A5FD000
heap
page read and write
1DF5A9F3000
heap
page read and write
1DF665C7000
trusted library allocation
page read and write
1B13A41A000
trusted library allocation
page read and write
1DF642A5000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1350000
trusted library allocation
page read and write
1DF6CDA1000
trusted library allocation
page read and write
B14000
heap
page read and write
1DF63491000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF634A0000
heap
page read and write
1DF60D35000
trusted library allocation
page read and write
1B13A564000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF67182000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9C7000
heap
page read and write
3894000
heap
page read and write
1DF64D04000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF5A9F3000
heap
page read and write
1DF6C153000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A992000
heap
page read and write
1DF63A84000
trusted library allocation
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF5A9F9000
heap
page read and write
1DF6D49D000
trusted library allocation
page read and write
1DF65EFB000
trusted library allocation
page read and write
205713C0000
heap
page read and write
1DF5A9C6000
heap
page read and write
1DF652E2000
trusted library allocation
page read and write
1DF67070000
trusted library allocation
page read and write
1DF5A9B8000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF6CD72000
trusted library allocation
page read and write
1DF6ED21000
trusted library allocation
page read and write
1DF6702F000
trusted library allocation
page read and write
1DF6CD1B000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6EC8F000
trusted library allocation
page read and write
1DF5A9C1000
heap
page read and write
1DF66488000
trusted library allocation
page read and write
1DF6CD93000
trusted library allocation
page read and write
1DF6EA29000
trusted library allocation
page read and write
1DF6C362000
trusted library allocation
page read and write
1DF6EDE5000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1420000
heap
page read and write
1DF6D4A2000
trusted library allocation
page read and write
1DF650BB000
trusted library allocation
page read and write
1DF6093B000
trusted library allocation
page read and write
1DF6C1A2000
trusted library allocation
page read and write
19F7FB7A000
trusted library allocation
page read and write
1DF6648B000
trusted library allocation
page read and write
205711E0000
heap
page read and write
1DF5A9B9000
heap
page read and write
DD52F3E000
stack
page read and write
1DF611F9000
trusted library allocation
page read and write
1DF64AFD000
trusted library allocation
page read and write
1B13A5FD000
heap
page read and write
1DF5A98E000
heap
page read and write
1DF64F0D000
trusted library allocation
page read and write
1DF650FD000
trusted library allocation
page read and write
1DF6C0F3000
trusted library allocation
page read and write
11CF000
stack
page read and write
1DF67595000
trusted library allocation
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF650BF000
trusted library allocation
page read and write
1DF60BEE000
trusted library allocation
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF6D49D000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6EC59000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1B1399C0000
trusted library allocation
page read and write
1DF6E7C2000
heap
page read and write
1DF6DBA6000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF65CA0000
trusted library allocation
page read and write
1DF64D30000
trusted library allocation
page read and write
19F7FBBA000
trusted library allocation
page read and write
1DF64A19000
trusted library allocation
page read and write
1DF6ED7C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF65154000
trusted library allocation
page read and write
1DF639FE000
trusted library allocation
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF6CE05000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF6E671000
heap
page read and write
20571413000
trusted library allocation
page read and write
1DF66F97000
trusted library allocation
page read and write
1DF611C4000
trusted library allocation
page read and write
1DF6522A000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6EE34000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6D440000
trusted library allocation
page read and write
1DF5AA28000
heap
page read and write
1DF6D387000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
5D63C7C000
stack
page read and write
1DF6DB82000
trusted library allocation
page read and write
1DF674E5000
trusted library allocation
page read and write
1DF6E701000
trusted library allocation
page read and write
1B13A400000
trusted library allocation
page read and write
1DF5A9EA000
heap
page read and write
1DF6CEF7000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1B13A659000
heap
page read and write
1DF6345A000
heap
page read and write
1DF6CD8F000
trusted library allocation
page read and write
1DF642B8000
trusted library allocation
page read and write
1DF6EB86000
trusted library allocation
page read and write
1DF6EC2E000
trusted library allocation
page read and write
1DF6CE08000
trusted library allocation
page read and write
1B13A644000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6D4A2000
trusted library allocation
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF6C0A6000
trusted library allocation
page read and write
1DF6F594000
trusted library allocation
page read and write
1DF6E672000
heap
page read and write
1DF6754C000
trusted library allocation
page read and write
16FD3E01000
heap
page read and write
1DF6C3FD000
trusted library allocation
page read and write
1DF670AC000
trusted library allocation
page read and write
1DF6C1FA000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF65E81000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9B8000
heap
page read and write
5D655BE000
stack
page read and write
1DF6B974000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF63C4E000
trusted library allocation
page read and write
1DF65048000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
50511FF000
stack
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF660CC000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF6C28F000
trusted library allocation
page read and write
1DF66100000
trusted library allocation
page read and write
19F7FB10000
trusted library allocation
page read and write
1DF670D9000
trusted library allocation
page read and write
1DF5A9BA000
heap
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF64B36000
trusted library allocation
page read and write
1DF6EA3E000
trusted library allocation
page read and write
1DF6389E000
trusted library allocation
page read and write
1DF63CC5000
trusted library allocation
page read and write
1DF6C094000
trusted library allocation
page read and write
1DF5A9B7000
heap
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF61205000
trusted library allocation
page read and write
1DF60969000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
11CDE051000
trusted library allocation
page execute read
1DF64AF7000
trusted library allocation
page read and write
1DF6F5FD000
trusted library allocation
page read and write
1DF63C57000
trusted library allocation
page read and write
1DF6CDF0000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF64BDD000
trusted library allocation
page read and write
1DF6C088000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5F3DF000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6DBEB000
trusted library allocation
page read and write
16FD3DE0000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF63C2E000
trusted library allocation
page read and write
1DF6F5F7000
trusted library allocation
page read and write
1DF651BE000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6ECC7000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF65087000
trusted library allocation
page read and write
1DF6CD5E000
trusted library allocation
page read and write
1DF64A1C000
trusted library allocation
page read and write
1DF64A16000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF65E61000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF5A97D000
heap
page read and write
1DF66067000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF63A6D000
trusted library allocation
page read and write
A84000
unkown
page readonly
1DF5A9A7000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF6E6A7000
trusted library allocation
page read and write
1DF6CD6C000
trusted library allocation
page read and write
1DF5A9B6000
heap
page read and write
1DF60C94000
trusted library allocation
page read and write
1DF66FFE000
trusted library allocation
page read and write
1DF6D381000
trusted library allocation
page read and write
16FD41E0000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF6C03E000
trusted library allocation
page read and write
1DF65242000
trusted library allocation
page read and write
1DF6F5A0000
trusted library allocation
page read and write
A84000
unkown
page readonly
1DF5A9E7000
heap
page read and write
1DF64EEA000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF6D3E1000
trusted library allocation
page read and write
1DF60B63000
trusted library allocation
page read and write
DD52FFE000
unkown
page readonly
1DF65141000
trusted library allocation
page read and write
1DF6C042000
trusted library allocation
page read and write
1DF6EB98000
trusted library allocation
page read and write
19F7F790000
heap
page readonly
50521FF000
stack
page read and write
1DF63458000
heap
page read and write
1DF5A992000
heap
page read and write
1DF64BDD000
trusted library allocation
page read and write
1DF634A6000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF639EE000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6BA32000
trusted library allocation
page read and write
1DF64B3F000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF665AD000
trusted library allocation
page read and write
1DF6B9E6000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
140D000
heap
page read and write
1DF64D97000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF64FA8000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1DF63A78000
trusted library allocation
page read and write
16FD3DDA000
heap
page read and write
1DF5A99B000
heap
page read and write
205711D2000
unclassified section
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9CC000
heap
page read and write
1DF6F4DB000
trusted library allocation
page read and write
1DF634C7000
heap
page read and write
1DF6EB57000
trusted library allocation
page read and write
1DF60918000
trusted library allocation
page read and write
1DF65184000
trusted library allocation
page read and write
1DF63A7C000
trusted library allocation
page read and write
1DF5A9B9000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6346E000
heap
page read and write
1DF5A9BE000
heap
page read and write
1DF6C34F000
trusted library allocation
page read and write
1DF6DBBE000
trusted library allocation
page read and write
404C1FF000
stack
page read and write
1DF5A9D0000
heap
page read and write
1DF6E72E000
trusted library allocation
page read and write
1DF6F4A1000
trusted library allocation
page read and write
B14000
heap
page read and write
1DF6E643000
trusted library allocation
page read and write
1DF67131000
trusted library allocation
page read and write
1DF639F4000
trusted library allocation
page read and write
1DF6ECCE000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6D33E000
trusted library allocation
page read and write
1B13A5E8000
heap
page read and write
1DF5A9C2000
heap
page read and write
1DF6C0F3000
trusted library allocation
page read and write
1DF660F6000
trusted library allocation
page read and write
1DF64A15000
trusted library allocation
page read and write
1DF6CD7E000
trusted library allocation
page read and write
DD55A7E000
stack
page read and write
1DF63A1E000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF63CD5000
trusted library allocation
page read and write
1DF65EFB000
trusted library allocation
page read and write
1DF64D44000
trusted library allocation
page read and write
1DF6CE5E000
trusted library allocation
page read and write
1DF6E6A3000
trusted library allocation
page read and write
1DF6D5BB000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF60CDD000
trusted library allocation
page read and write
1DF611B6000
trusted library allocation
page read and write
1DF6D3B8000
trusted library allocation
page read and write
1DF642B3000
trusted library allocation
page read and write
1DF61288000
trusted library allocation
page read and write
1DF6EC63000
trusted library allocation
page read and write
1DF67014000
trusted library allocation
page read and write
1DF6529B000
trusted library allocation
page read and write
1DF66598000
trusted library allocation
page read and write
1DF656C3000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6DBC5000
trusted library allocation
page read and write
20570F70000
unclassified section
page readonly
1DF6EC2E000
trusted library allocation
page read and write
1DF60C82000
trusted library allocation
page read and write
1DF63A7E000
trusted library allocation
page read and write
1DF6706B000
trusted library allocation
page read and write
19F7F540000
unclassified section
page readonly
1DF5A9C5000
heap
page read and write
1DF5A9BA000
heap
page read and write
AF0000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF6CDD5000
trusted library allocation
page read and write
1DF6C376000
trusted library allocation
page read and write
1DF6ECE3000
trusted library allocation
page read and write
1B13A600000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A984000
heap
page read and write
1DF6EC2C000
trusted library allocation
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1B139750000
trusted library section
page readonly
1DF6CDBF000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6D3C9000
trusted library allocation
page read and write
20571607000
trusted library allocation
page read and write
1DF6C10E000
trusted library allocation
page read and write
1DF5A988000
heap
page read and write
1DF6CDF9000
trusted library allocation
page read and write
1DF6C2B5000
trusted library allocation
page read and write
1DF6BF5F000
trusted library allocation
page read and write
1DF63497000
heap
page read and write
1DF664D1000
trusted library allocation
page read and write
1DF6C35C000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1BDE000
stack
page read and write
1DF6503B000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9BA000
heap
page read and write
1DF64F42000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6D385000
trusted library allocation
page read and write
1DF6C143000
trusted library allocation
page read and write
1B13A501000
heap
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF6F5FD000
trusted library allocation
page read and write
1B13A5E1000
heap
page read and write
1DF6E5C8000
trusted library allocation
page read and write
1DF65023000
trusted library allocation
page read and write
1DF5A9A3000
heap
page read and write
1DF6F434000
trusted library allocation
page read and write
1B13A5E9000
heap
page read and write
1DF64D0A000
trusted library allocation
page read and write
1DF64AE2000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6D33A000
trusted library allocation
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF656F0000
trusted library allocation
page read and write
1DF650DC000
trusted library allocation
page read and write
1DF6EECC000
trusted library allocation
page read and write
1DF6D4DB000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF5A994000
heap
page read and write
1DF64FD4000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF65023000
trusted library allocation
page read and write
205714D3000
trusted library allocation
page read and write
DD5523E000
stack
page read and write
1DF6C0EA000
trusted library allocation
page read and write
1DF5A9B9000
heap
page read and write
1DF6C28F000
trusted library allocation
page read and write
1DF652D5000
trusted library allocation
page read and write
26B09F524000
trusted library allocation
page read and write
63D5C7E000
unkown
page readonly
1DF65FED000
trusted library allocation
page read and write
11CDE031000
trusted library allocation
page execute read
1DF5A99D000
heap
page read and write
1DF63A6A000
trusted library allocation
page read and write
1DF64F2E000
trusted library allocation
page read and write
1DF6701F000
trusted library allocation
page read and write
1DF5AA05000
heap
page read and write
1DF60C2F000
trusted library allocation
page read and write
1DF6ECC7000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A99B000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF5A97D000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF6D5C6000
trusted library allocation
page read and write
1DF6F48B000
trusted library allocation
page read and write
1DF65C29000
trusted library allocation
page read and write
1DF6EE94000
trusted library allocation
page read and write
16FD3F00000
trusted library allocation
page read and write
1B13A644000
heap
page read and write
1DF6ED40000
trusted library allocation
page read and write
1B13A5E8000
heap
page read and write
1DF6D5C9000
trusted library allocation
page read and write
1DF6389E000
trusted library allocation
page read and write
1DF6524D000
trusted library allocation
page read and write
1DF6EED3000
trusted library allocation
page read and write
1DF64AC3000
trusted library allocation
page read and write
1DF65C1C000
trusted library allocation
page read and write
1DF64A4B000
trusted library allocation
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF6346F000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF64295000
trusted library allocation
page read and write
1DF6758E000
trusted library allocation
page read and write
19F7F7AF000
unclassified section
page read and write
1DF6CD91000
trusted library allocation
page read and write
1DF642AB000
trusted library allocation
page read and write
1DF6EB7C000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1B13A560000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5F92F000
trusted library allocation
page read and write
1DF6502D000
trusted library allocation
page read and write
1DF64D11000
trusted library allocation
page read and write
1DF65237000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF650CF000
trusted library allocation
page read and write
1DF64A1C000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF5A992000
heap
page read and write
1DF6C2C9000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF63986000
trusted library allocation
page read and write
1B13A621000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF6EB98000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF64B14000
trusted library allocation
page read and write
1B13A55C000
heap
page read and write
1DF6F582000
trusted library allocation
page read and write
2057145D000
trusted library allocation
page read and write
1DF63C72000
trusted library allocation
page read and write
1DF5A9C0000
heap
page read and write
1DF64D97000
trusted library allocation
page read and write
1DF6D3CF000
trusted library allocation
page read and write
1DF6ECC5000
trusted library allocation
page read and write
1DF6D3D6000
trusted library allocation
page read and write
1DF664A4000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A99A000
heap
page read and write
1DF6E601000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF66547000
trusted library allocation
page read and write
1DF6CDF9000
trusted library allocation
page read and write
1DF670F8000
trusted library allocation
page read and write
1DF6D3EB000
trusted library allocation
page read and write
1DF6E040000
trusted library allocation
page read and write
1DF670E2000
trusted library allocation
page read and write
1DF64FA8000
trusted library allocation
page read and write
1DF6CE7E000
trusted library allocation
page read and write
1DF63873000
trusted library allocation
page read and write
1B13A5F1000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF60BAC000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF5A9A0000
heap
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6EBCA000
trusted library allocation
page read and write
1DF6CDE2000
trusted library allocation
page read and write
1DF64283000
trusted library allocation
page read and write
1DF68702000
trusted library allocation
page read and write
1DF65E81000
trusted library allocation
page read and write
1DF6CDED000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6C39C000
trusted library allocation
page read and write
1DF639EB000
trusted library allocation
page read and write
63D4BFE000
unkown
page readonly
1DF5A9A7000
heap
page read and write
1DF6E753000
heap
page read and write
1DF6C390000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1B13A060000
heap
page read and write
1DF6C3FD000
trusted library allocation
page read and write
1B1399C4000
trusted library allocation
page read and write
1DF63A70000
trusted library allocation
page read and write
1410000
heap
page read and write
1B13A5E0000
heap
page read and write
1DF6EB07000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A99D000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6C285000
trusted library allocation
page read and write
1DF6CD4F000
trusted library allocation
page read and write
1DF6EC40000
trusted library allocation
page read and write
1DF66484000
trusted library allocation
page read and write
1DF6DB9E000
trusted library allocation
page read and write
1DF6759B000
trusted library allocation
page read and write
1DF64B18000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF6CD10000
trusted library allocation
page read and write
1DF6EE5A000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6D429000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
B14000
heap
page read and write
1DF6CDD8000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
63D43FE000
stack
page read and write
1DF61183000
trusted library allocation
page read and write
1DF5A9B7000
heap
page read and write
1DF6ECC5000
trusted library allocation
page read and write
1DF6EC8C000
trusted library allocation
page read and write
1DF634A0000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF64D75000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF634A0000
heap
page read and write
1DF64D8A000
trusted library allocation
page read and write
1DF6CEE2000
trusted library allocation
page read and write
1DF675C9000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF6F4C9000
trusted library allocation
page read and write
1DF64AE6000
trusted library allocation
page read and write
1DF6CD72000
trusted library allocation
page read and write
1B1394E0000
unclassified section
page readonly
1DF5A97E000
heap
page read and write
1DF63A9B000
trusted library allocation
page read and write
63D6D3E000
unkown
page readonly
1DF5A9AC000
heap
page read and write
1DF5A9C7000
heap
page read and write
19F7FB72000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF63CD5000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
63D33D8000
stack
page read and write
1DF6F4D6000
trusted library allocation
page read and write
1DF66073000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF5A980000
heap
page read and write
1DF675FD000
trusted library allocation
page read and write
1DF664F7000
trusted library allocation
page read and write
1DF64FD4000
trusted library allocation
page read and write
1DF6EC37000
trusted library allocation
page read and write
20571140000
heap
page read and write
1DF6759B000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF5A992000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF652F2000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF638CE000
trusted library allocation
page read and write
1B1397D0000
unkown
page execute read
1DF6344D000
heap
page read and write
1DF65E59000
trusted library allocation
page read and write
1DF60B71000
trusted library allocation
page read and write
1DF66F5F000
trusted library allocation
page read and write
1DF63947000
trusted library allocation
page read and write
1DF652D5000
trusted library allocation
page read and write
1DF670DF000
trusted library allocation
page read and write
1DF6381F000
trusted library allocation
page read and write
16FD3E01000
heap
page read and write
1DF5FA1E000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF660BA000
trusted library allocation
page read and write
1DF63497000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF5A9C6000
heap
page read and write
1DF60B55000
trusted library allocation
page read and write
1DF6EAFC000
trusted library allocation
page read and write
1DF5F9F6000
trusted library allocation
page read and write
1DF652C5000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF5A975000
heap
page read and write
1DF5A992000
heap
page read and write
1DF6C1B1000
trusted library allocation
page read and write
1DF652A0000
trusted library allocation
page read and write
1DF5A9C0000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6503B000
trusted library allocation
page read and write
1DF60D22000
trusted library allocation
page read and write
1B139640000
heap
page read and write
1DF5A9C2000
heap
page read and write
1AEFAB50000
heap
page read and write
1DF6CD3C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6EC30000
trusted library allocation
page read and write
1DF6509C000
trusted library allocation
page read and write
1DF65DD1000
trusted library allocation
page read and write
1DF60B58000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF63C76000
trusted library allocation
page read and write
1DF6D3E1000
trusted library allocation
page read and write
1DF6CEF7000
trusted library allocation
page read and write
1DF6EABC000
trusted library allocation
page read and write
1DF64AE8000
trusted library allocation
page read and write
1DF650C9000
trusted library allocation
page read and write
1DF6CE08000
trusted library allocation
page read and write
1DF6EED6000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF63A1A000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6C092000
trusted library allocation
page read and write
1DF6CEE2000
trusted library allocation
page read and write
1DF6388E000
trusted library allocation
page read and write
1DF6EC8C000
trusted library allocation
page read and write
1DF6C3DC000
trusted library allocation
page read and write
1DF642B3000
trusted library allocation
page read and write
1DF6CD3F000
trusted library allocation
page read and write
1DF65094000
trusted library allocation
page read and write
1DF6EC5B000
trusted library allocation
page read and write
1DF652C8000
trusted library allocation
page read and write
123E000
stack
page read and write
1DF6EEB4000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6CE23000
trusted library allocation
page read and write
1DF64A11000
trusted library allocation
page read and write
1DF642AB000
trusted library allocation
page read and write
1DF5A9AB000
heap
page read and write
1DF6396A000
trusted library allocation
page read and write
1DF67594000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF63CD7000
trusted library allocation
page read and write
1DF6756E000
trusted library allocation
page read and write
1DF6E699000
heap
page read and write
1DF67521000
trusted library allocation
page read and write
16FD599E000
heap
page read and write
1DF65F7B000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF63AF3000
trusted library allocation
page read and write
1DF65091000
trusted library allocation
page read and write
1DF63C52000
trusted library allocation
page read and write
1DF6DBA6000
trusted library allocation
page read and write
1DF5FA6A000
trusted library allocation
page read and write
13E8000
heap
page read and write
1DF65094000
trusted library allocation
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF6EE51000
trusted library allocation
page read and write
1DF64A84000
trusted library allocation
page read and write
1B13A5E8000
heap
page read and write
1DF5A994000
heap
page read and write
1DF6D3D4000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF63490000
heap
page read and write
63D5D3E000
unkown
page readonly
1DF6507A000
trusted library allocation
page read and write
1DF6EDE7000
trusted library allocation
page read and write
1DF642B5000
trusted library allocation
page read and write
1DF664F1000
trusted library allocation
page read and write
1DF6529B000
trusted library allocation
page read and write
1DF6CD35000
trusted library allocation
page read and write
1DF6E601000
heap
page read and write
1DF65048000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9C1000
heap
page read and write
19F7FB47000
trusted library allocation
page read and write
1DF6CE76000
trusted library allocation
page read and write
1B1397C0000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF64DF4000
trusted library allocation
page read and write
1DF64DC7000
trusted library allocation
page read and write
1DF664CD000
trusted library allocation
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF670DF000
trusted library allocation
page read and write
1DF6D3E6000
trusted library allocation
page read and write
1DF6BF6F000
trusted library allocation
page read and write
1DF5A9C2000
heap
page read and write
5D65DBE000
unkown
page readonly
1DF6BF56000
trusted library allocation
page read and write
1DF675FD000
trusted library allocation
page read and write
1DF67173000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6CD37000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF639F4000
trusted library allocation
page read and write
1DF671B9000
trusted library allocation
page read and write
1DF675F8000
trusted library allocation
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF64B09000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF65087000
trusted library allocation
page read and write
1DF6F48B000
trusted library allocation
page read and write
1DF651E1000
trusted library allocation
page read and write
2057146A000
trusted library allocation
page read and write
40499FF000
stack
page read and write
1B13A406000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF67182000
trusted library allocation
page read and write
1DF6ED40000
trusted library allocation
page read and write
1DF6606B000
trusted library allocation
page read and write
1DF6CE2B000
trusted library allocation
page read and write
1DF6C1BD000
trusted library allocation
page read and write
1DF64A41000
trusted library allocation
page read and write
1DF64DF4000
trusted library allocation
page read and write
1DF6C3A6000
trusted library allocation
page read and write
1DF660C0000
trusted library allocation
page read and write
1DF6EB73000
trusted library allocation
page read and write
1B13A569000
heap
page read and write
1DF6D465000
trusted library allocation
page read and write
1DF64BC6000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF660C8000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF651E1000
trusted library allocation
page read and write
1DF6F5A7000
trusted library allocation
page read and write
1DF6E7C2000
heap
page read and write
1DF6D0FE000
trusted library allocation
page read and write
1DF611FE000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1DF5A9B0000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF6EC15000
trusted library allocation
page read and write
1DF6CD9D000
trusted library allocation
page read and write
1DF6CE74000
trusted library allocation
page read and write
1DF664A6000
trusted library allocation
page read and write
1DF6F5C2000
trusted library allocation
page read and write
1DF6C096000
trusted library allocation
page read and write
1DF5A997000
heap
page read and write
1DF65033000
trusted library allocation
page read and write
1DF6CDED000
trusted library allocation
page read and write
205714B1000
trusted library allocation
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6D432000
trusted library allocation
page read and write
1DF6EB2F000
trusted library allocation
page read and write
1DF6B9D5000
trusted library allocation
page read and write
1DF6EAED000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF665E5000
trusted library allocation
page read and write
1DF6CEE0000
trusted library allocation
page read and write
1B13A57F000
heap
page read and write
205711D0000
unclassified section
page read and write
1DF5A9F3000
heap
page read and write
1DF5A996000
heap
page read and write
1DF664C7000
trusted library allocation
page read and write
1DF670B5000
trusted library allocation
page read and write
1DF6EC60000
trusted library allocation
page read and write
1DF6ECDA000
trusted library allocation
page read and write
1DF6CE20000
trusted library allocation
page read and write
1DF65F47000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6D33C000
trusted library allocation
page read and write
1DF6346F000
heap
page read and write
1DF651FD000
trusted library allocation
page read and write
1DF6F5FD000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF5FA26000
trusted library allocation
page read and write
1B13995F000
trusted library allocation
page read and write
1DF6C070000
trusted library allocation
page read and write
1DF6522A000
trusted library allocation
page read and write
5D63CFE000
stack
page read and write
1DF6EB2F000
trusted library allocation
page read and write
1DF5FB00000
trusted library allocation
page read and write
1DF6C06C000
trusted library allocation
page read and write
1DF5A99E000
heap
page read and write
1DF6EB93000
trusted library allocation
page read and write
1DF642A7000
trusted library allocation
page read and write
1DF642BA000
trusted library allocation
page read and write
1B139E90000
heap
page read and write
1B139912000
trusted library allocation
page read and write
1DF6ED74000
trusted library allocation
page read and write
1DF60CEB000
trusted library allocation
page read and write
1B1395A0000
heap
page read and write
1DF642B5000
trusted library allocation
page read and write
1DF6648B000
trusted library allocation
page read and write
1DF6EC29000
trusted library allocation
page read and write
1DF6D3E6000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5AA02000
heap
page read and write
1DF6D4C5000
trusted library allocation
page read and write
DD5527E000
unkown
page readonly
1B139975000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF67590000
trusted library allocation
page read and write
1DF6ECD3000
trusted library allocation
page read and write
1DF639D0000
trusted library allocation
page read and write
1DF6EA3E000
trusted library allocation
page read and write
1DF651A2000
trusted library allocation
page read and write
1DF6EB31000
trusted library allocation
page read and write
1DF64A91000
trusted library allocation
page read and write
1DF670B5000
trusted library allocation
page read and write
1DF5A9B0000
heap
page read and write
1DF675AC000
trusted library allocation
page read and write
1DF63997000
trusted library allocation
page read and write
1DF6CD2A000
trusted library allocation
page read and write
1DF6F5B6000
trusted library allocation
page read and write
1DF5A9E8000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF64DBB000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF664FD000
trusted library allocation
page read and write
1DF6D5DB000
trusted library allocation
page read and write
1DF65087000
trusted library allocation
page read and write
1DF6CD9D000
trusted library allocation
page read and write
1DF64EC0000
trusted library allocation
page read and write
1DF6C34D000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF5A991000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF5A992000
heap
page read and write
1DF6429A000
trusted library allocation
page read and write
1412000
heap
page read and write
1DF66FD2000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF60D39000
trusted library allocation
page read and write
1DF6CD35000
trusted library allocation
page read and write
1DF642BA000
trusted library allocation
page read and write
1DF6091B000
trusted library allocation
page read and write
1DF5A9AF000
heap
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6C0F3000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF6EB38000
trusted library allocation
page read and write
1B13A621000
heap
page read and write
19F7FB23000
trusted library allocation
page read and write
1DF651BB000
trusted library allocation
page read and write
1DF6D385000
trusted library allocation
page read and write
1DF5F976000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF6D100000
trusted library allocation
page read and write
1DF64D16000
trusted library allocation
page read and write
1DF6D499000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5AA05000
heap
page read and write
1DF5A9F7000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF61269000
trusted library allocation
page read and write
1DF5A9F1000
heap
page read and write
1DF652E8000
trusted library allocation
page read and write
1DF6C047000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF6D3EA000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF5A9BB000
heap
page read and write
1DF6C344000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF650C0000
trusted library allocation
page read and write
1DF66576000
trusted library allocation
page read and write
5D63D3E000
unkown
page readonly
1DF5A9A7000
heap
page read and write
1DF63C82000
trusted library allocation
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF6CE30000
trusted library allocation
page read and write
1DF63458000
heap
page read and write
1DF64D05000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
1DF6EB31000
trusted library allocation
page read and write
1DF67568000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF5FAB0000
trusted library allocation
page read and write
1DF650B4000
trusted library allocation
page read and write
DD539D8000
stack
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF6EECC000
trusted library allocation
page read and write
1DF651D8000
trusted library allocation
page read and write
1DF652C3000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF6C1CD000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF64A1C000
trusted library allocation
page read and write
1DF5A9F9000
heap
page read and write
1DF6EBD2000
trusted library allocation
page read and write
1DF650C9000
trusted library allocation
page read and write
1DF6CD83000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6D4AF000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6CEF6000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
205714D7000
trusted library allocation
page read and write
1DF6EB51000
trusted library allocation
page read and write
205714A9000
trusted library allocation
page read and write
1DF60C96000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1B139903000
trusted library allocation
page read and write
1DF65CE5000
trusted library allocation
page read and write
1DF639F4000
trusted library allocation
page read and write
1DF63C3D000
trusted library allocation
page read and write
1DF6C374000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF5A99C000
heap
page read and write
19F7FC3B000
trusted library allocation
page read and write
1DF64A60000
trusted library allocation
page read and write
1DF5A9F5000
heap
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6CDC8000
trusted library allocation
page read and write
1DF611FE000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF6758D000
trusted library allocation
page read and write
1DF6C3B1000
trusted library allocation
page read and write
1DF5A9BF000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF5A9BB000
heap
page read and write
1DF5A9B4000
heap
page read and write
16FD59AE000
heap
page read and write
1DF65ECA000
trusted library allocation
page read and write
1DF6E605000
trusted library allocation
page read and write
1DF6E636000
heap
page read and write
1DF63490000
heap
page read and write
1DF5FA26000
trusted library allocation
page read and write
1DF65C1C000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF5A984000
heap
page read and write
1DF6F4BD000
trusted library allocation
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF664FD000
trusted library allocation
page read and write
1DF67590000
trusted library allocation
page read and write
1DF6F5F9000
trusted library allocation
page read and write
1DF60B3A000
trusted library allocation
page read and write
1DF64DBB000
trusted library allocation
page read and write
1DF6707A000
trusted library allocation
page read and write
1DF6BF7E000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF6CE5E000
trusted library allocation
page read and write
1DF5AA07000
heap
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF652DB000
trusted library allocation
page read and write
1DF63A1E000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF67599000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF65EB1000
trusted library allocation
page read and write
1DF6E7C2000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF665F6000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1404000
heap
page read and write
1DF6E5A3000
trusted library allocation
page read and write
1B139560000
unclassified section
page readonly
1DF64BE8000
trusted library allocation
page read and write
1DF5A9A4000
heap
page read and write
1DF65300000
trusted library allocation
page read and write
1DF650C4000
trusted library allocation
page read and write
1DF63A78000
trusted library allocation
page read and write
1DF6D3EA000
trusted library allocation
page read and write
1DF6525A000
trusted library allocation
page read and write
1DF6F5F9000
trusted library allocation
page read and write
1DF639E9000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF642BA000
trusted library allocation
page read and write
1DF6E66B000
heap
page read and write
1DF65EFB000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF660E2000
trusted library allocation
page read and write
1DF6F5A5000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF612F4000
trusted library allocation
page read and write
1DF6345A000
heap
page read and write
1B139AF6000
heap
page read and write
1DF656EC000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF6F434000
trusted library allocation
page read and write
1DF6DBA2000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF65032000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF60923000
trusted library allocation
page read and write
20571600000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6C2FC000
trusted library allocation
page read and write
1DF6D33C000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A9BD000
heap
page read and write
1DF639A3000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF638CE000
trusted library allocation
page read and write
1DF5A995000
heap
page read and write
1DF651C4000
trusted library allocation
page read and write
1DF665E0000
trusted library allocation
page read and write
1DF675BE000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF6EB9A000
trusted library allocation
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF5A9B9000
heap
page read and write
1DF5A9EA000
heap
page read and write
16FD59AB000
heap
page read and write
1DF6EEFC000
trusted library allocation
page read and write
1DF63984000
trusted library allocation
page read and write
20571700000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
16FD3E02000
heap
page read and write
1DF5A9A7000
heap
page read and write
B14000
heap
page read and write
1DF5A9B4000
heap
page read and write
1DF5A9E8000
heap
page read and write
1DF5FA80000
trusted library allocation
page read and write
50511FC000
stack
page read and write
1DF6CDF2000
trusted library allocation
page read and write
1DF660FA000
trusted library allocation
page read and write
1DF6B98B000
trusted library allocation
page read and write
1DF60C40000
trusted library allocation
page read and write
11CDE041000
trusted library allocation
page execute read
1DF60C3D000
trusted library allocation
page read and write
1DF5A99C000
heap
page read and write
1DF63C52000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6ED5C000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1B13990A000
trusted library allocation
page read and write
1DF6C376000
trusted library allocation
page read and write
1DF5A9B7000
heap
page read and write
1DF65295000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6389E000
trusted library allocation
page read and write
1B13A56C000
heap
page read and write
1DF6CD20000
trusted library allocation
page read and write
1DF6EC45000
trusted library allocation
page read and write
1DF650B2000
trusted library allocation
page read and write
1DF6CEC9000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF5A98E000
heap
page read and write
1DF64A15000
trusted library allocation
page read and write
B10000
heap
page read and write
1DF664A4000
trusted library allocation
page read and write
1DF63491000
heap
page read and write
1DF609C8000
trusted library allocation
page read and write
1DF5A997000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF65269000
trusted library allocation
page read and write
1DF5A9BE000
heap
page read and write
1DF6EC5B000
trusted library allocation
page read and write
1DF5F398000
trusted library allocation
page read and write
1DF6CE79000
trusted library allocation
page read and write
1B139910000
trusted library allocation
page read and write
1DF6D3BC000
trusted library allocation
page read and write
1DF6C2B9000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6D3AE000
trusted library allocation
page read and write
1DF65094000
trusted library allocation
page read and write
1DF670F8000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6346F000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF6EEAC000
trusted library allocation
page read and write
1DF6EE00000
trusted library allocation
page read and write
1DF65CDA000
trusted library allocation
page read and write
1DF6E7AF000
heap
page read and write
1DF6C0EA000
trusted library allocation
page read and write
16FD3C90000
heap
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6EB51000
trusted library allocation
page read and write
1DF6389E000
trusted library allocation
page read and write
1DF6C313000
trusted library allocation
page read and write
1DF674FD000
trusted library allocation
page read and write
1DF65058000
trusted library allocation
page read and write
1DF6396F000
trusted library allocation
page read and write
1DF6E6AC000
trusted library allocation
page read and write
1DF64A41000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF65029000
trusted library allocation
page read and write
1DF652B2000
trusted library allocation
page read and write
1DF6ECDE000
trusted library allocation
page read and write
11CDE028000
trusted library allocation
page execute read
1DF6CD3C000
trusted library allocation
page read and write
1DF6C2B9000
trusted library allocation
page read and write
1DF5A980000
heap
page read and write
1DF652A0000
trusted library allocation
page read and write
1DF6E706000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6345A000
heap
page read and write
1DF6501B000
trusted library allocation
page read and write
A72000
unkown
page readonly
1DF5A994000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF5A984000
heap
page read and write
1DF5A992000
heap
page read and write
B14000
heap
page read and write
1DF639EE000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6F582000
trusted library allocation
page read and write
1DF651E1000
trusted library allocation
page read and write
1DF652A0000
trusted library allocation
page read and write
1DF6C1CE000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
404C9FE000
stack
page read and write
1DF6CD9D000
trusted library allocation
page read and write
1DF6CDFA000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF6EB93000
trusted library allocation
page read and write
1DF5AA17000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF5A994000
heap
page read and write
1B13A677000
heap
page read and write
1420000
heap
page read and write
1DF63991000
trusted library allocation
page read and write
1DF665AD000
trusted library allocation
page read and write
1B13A5E3000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6CE9D000
trusted library allocation
page read and write
1DF652D5000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF612C8000
trusted library allocation
page read and write
1DF5F3EF000
trusted library allocation
page read and write
1DF6EB57000
trusted library allocation
page read and write
19F7FB7E000
trusted library allocation
page read and write
1DF6CD13000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF6ECDE000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6C05A000
trusted library allocation
page read and write
1DF651D5000
trusted library allocation
page read and write
1DF5A975000
heap
page read and write
1DF65295000
trusted library allocation
page read and write
1DF6D424000
trusted library allocation
page read and write
1DF6F434000
trusted library allocation
page read and write
1DF6CEE2000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A994000
heap
page read and write
16FD3DD0000
heap
page read and write
1DF6CED5000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6D4AF000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
19F7FB5D000
trusted library allocation
page read and write
1DF6C2AD000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9E7000
heap
page read and write
1DF6CE21000
trusted library allocation
page read and write
1DF5A9B3000
heap
page read and write
1DF6515B000
trusted library allocation
page read and write
1DF6D3D6000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6CD44000
trusted library allocation
page read and write
16FD3DF2000
heap
page read and write
1DF6CD6C000
trusted library allocation
page read and write
1DF5FAE4000
trusted library allocation
page read and write
1DF65065000
trusted library allocation
page read and write
2057145F000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9E9000
heap
page read and write
1DF6D5AF000
trusted library allocation
page read and write
1DF5A9E9000
heap
page read and write
1DF6428B000
trusted library allocation
page read and write
1DF671D2000
trusted library allocation
page read and write
1DF65CE5000
trusted library allocation
page read and write
1DF6D0FE000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF6D3EB000
trusted library allocation
page read and write
1DF65E6C000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1B13A62A000
heap
page read and write
1DF67050000
trusted library allocation
page read and write
1DF6C1D7000
trusted library allocation
page read and write
1DF67088000
trusted library allocation
page read and write
1DF67577000
trusted library allocation
page read and write
9B0000
unkown
page readonly
1DF5A9C2000
heap
page read and write
1DF6C3DC000
trusted library allocation
page read and write
1DF639B5000
trusted library allocation
page read and write
1DF5A9B8000
heap
page read and write
1DF638A5000
trusted library allocation
page read and write
DD52FBD000
stack
page read and write
1DF60CA2000
trusted library allocation
page read and write
1DF6BF5B000
trusted library allocation
page read and write
1DF6CD3F000
trusted library allocation
page read and write
19F7F5C8000
remote allocation
page execute read
1B13A5E0000
heap
page read and write
1DF5A9A2000
heap
page read and write
1DF6E601000
heap
page read and write
1DF6C16A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF63A63000
trusted library allocation
page read and write
1DF639BF000
trusted library allocation
page read and write
1DF639CB000
trusted library allocation
page read and write
1DF6EB73000
trusted library allocation
page read and write
1DF6F5C7000
trusted library allocation
page read and write
1DF611DC000
trusted library allocation
page read and write
1DF5F971000
trusted library allocation
page read and write
1DF5A9BD000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF664B4000
trusted library allocation
page read and write
1DF6C18A000
trusted library allocation
page read and write
1DF5A9C5000
heap
page read and write
1DF6CDD8000
trusted library allocation
page read and write
1DF642B1000
trusted library allocation
page read and write
1DF642D2000
trusted library allocation
page read and write
1DF65ECA000
trusted library allocation
page read and write
1DF6CE7E000
trusted library allocation
page read and write
1DF6CDE6000
trusted library allocation
page read and write
1DF6DBC5000
trusted library allocation
page read and write
1DF65091000
trusted library allocation
page read and write
1DF6D4F3000
trusted library allocation
page read and write
1DF67033000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF651B8000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF61263000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF64A19000
trusted library allocation
page read and write
1DF6EB73000
trusted library allocation
page read and write
1DF6346F000
heap
page read and write
1DF64295000
trusted library allocation
page read and write
1DF634AE000
heap
page read and write
1DF6389E000
trusted library allocation
page read and write
1420000
heap
page read and write
1DF64D8A000
trusted library allocation
page read and write
16FD5B70000
heap
page read and write
1DF5A9C1000
heap
page read and write
1DF6CD2A000
trusted library allocation
page read and write
1DF64A10000
trusted library allocation
page read and write
1DF6C2B5000
trusted library allocation
page read and write
1DF6129D000
trusted library allocation
page read and write
1DF651F6000
trusted library allocation
page read and write
1DF5A9C7000
heap
page read and write
1DF650C9000
trusted library allocation
page read and write
1DF65FB0000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A996000
heap
page read and write
1DF6EE5E000
trusted library allocation
page read and write
1DF6344C000
heap
page read and write
1DF6EEC8000
trusted library allocation
page read and write
1DF642BA000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9AD000
heap
page read and write
1DF6C1BA000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF675AC000
trusted library allocation
page read and write
1DF6E6C5000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6EC38000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1DF6C141000
trusted library allocation
page read and write
1DF64FFD000
trusted library allocation
page read and write
1DF64D5B000
trusted library allocation
page read and write
19F7FB00000
trusted library allocation
page read and write
1DF6ECD8000
trusted library allocation
page read and write
1B13A677000
heap
page read and write
1DF6349C000
heap
page read and write
1DF63490000
heap
page read and write
1DF6CDE1000
trusted library allocation
page read and write
1DF5A9C1000
heap
page read and write
19F7FC0C000
trusted library allocation
page read and write
1DF6C3E2000
trusted library allocation
page read and write
20570F60000
unclassified section
page readonly
1DF5A99D000
heap
page read and write
1DF5AA07000
heap
page read and write
1DF5A9BF000
heap
page read and write
1DF64AC5000
trusted library allocation
page read and write
1DF63A84000
trusted library allocation
page read and write
1DF63979000
trusted library allocation
page read and write
19F7F856000
heap
page read and write
1DF6EC38000
trusted library allocation
page read and write
1DF675DF000
trusted library allocation
page read and write
1DF651FD000
trusted library allocation
page read and write
1DF5A9BB000
heap
page read and write
1DF6DBAC000
trusted library allocation
page read and write
1B13A5AA000
heap
page read and write
1DF6529D000
trusted library allocation
page read and write
1B139923000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF609EB000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF5A992000
heap
page read and write
1DF5A984000
heap
page read and write
1DF5A9B8000
heap
page read and write
1DF6F473000
trusted library allocation
page read and write
1DF67599000
trusted library allocation
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF5A9D0000
heap
page read and write
1DF6344C000
heap
page read and write
1DF6659B000
trusted library allocation
page read and write
1DF5A994000
heap
page read and write
1DF5A9AF000
heap
page read and write
1DF6383C000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF65186000
trusted library allocation
page read and write
1DF6EC2C000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF6CDD3000
trusted library allocation
page read and write
1DF6513C000
trusted library allocation
page read and write
12C0000
heap
page read and write
1DF63A78000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A9D0000
heap
page read and write
1DF64F9A000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF5A99C000
heap
page read and write
1DF6EA58000
trusted library allocation
page read and write
1DF6C3E8000
trusted library allocation
page read and write
1DF5A9B6000
heap
page read and write
1DF650F7000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF611FE000
trusted library allocation
page read and write
1DF5A9A0000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF6D3E6000
trusted library allocation
page read and write
1DF652E6000
trusted library allocation
page read and write
1B13990C000
trusted library allocation
page read and write
1DF65F53000
trusted library allocation
page read and write
1DF6D49F000
trusted library allocation
page read and write
1DF6D3AC000
trusted library allocation
page read and write
1DF5A9AD000
heap
page read and write
1DF650AE000
trusted library allocation
page read and write
1DF650BA000
trusted library allocation
page read and write
11DB000
stack
page read and write
1DF5A9C1000
heap
page read and write
1DF652DB000
trusted library allocation
page read and write
1DF6EC8C000
trusted library allocation
page read and write
1B13996F000
trusted library allocation
page read and write
1DF63490000
heap
page read and write
1DF5A9D0000
heap
page read and write
1B139FC0000
heap
page read and write
1DF5A992000
heap
page read and write
1DF5F390000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF650BF000
trusted library allocation
page read and write
1DF67594000
trusted library allocation
page read and write
1B13A677000
heap
page read and write
1DF64D07000
trusted library allocation
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6C3AA000
trusted library allocation
page read and write
1DF6C38B000
trusted library allocation
page read and write
1DF5FA75000
trusted library allocation
page read and write
1DF5A9FC000
heap
page read and write
1DF5A9C5000
heap
page read and write
1DF6CD25000
trusted library allocation
page read and write
1DF5A9F9000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6D343000
trusted library allocation
page read and write
1DF63A6D000
trusted library allocation
page read and write
1DF642B1000
trusted library allocation
page read and write
1DF6F43E000
trusted library allocation
page read and write
1DF6CE7C000
trusted library allocation
page read and write
1DF6CDC0000
trusted library allocation
page read and write
1B13A66E000
heap
page read and write
1DF651F6000
trusted library allocation
page read and write
1401000
heap
page read and write
1DF6F46A000
trusted library allocation
page read and write
1DF5F381000
trusted library allocation
page read and write
1DF6D38B000
trusted library allocation
page read and write
1DF6428E000
trusted library allocation
page read and write
1DF6658F000
trusted library allocation
page read and write
1B13A66E000
heap
page read and write
1DF6EE34000
trusted library allocation
page read and write
1DF6CDE1000
trusted library allocation
page read and write
1DF6B997000
trusted library allocation
page read and write
1DF6CD83000
trusted library allocation
page read and write
1DF6D35E000
trusted library allocation
page read and write
1DF6E607000
trusted library allocation
page read and write
1DF65206000
trusted library allocation
page read and write
1DF5A964000
heap
page read and write
1B139800000
trusted library allocation
page read and write
1DF5A995000
heap
page read and write
1DF5A9BC000
heap
page read and write
1DF5A97E000
heap
page read and write
1DF5A9C7000
heap
page read and write
1DF639EB000
trusted library allocation
page read and write
1DF60BD8000
trusted library allocation
page read and write
1DF5A99B000
heap
page read and write
1DF6D358000
trusted library allocation
page read and write
1DF5A984000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF652DB000
trusted library allocation
page read and write
1DF5A992000
heap
page read and write
1DF5A9B7000
heap
page read and write
1DF6F5A7000
trusted library allocation
page read and write
1DF64A1C000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF6F5F5000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF609DE000
trusted library allocation
page read and write
1DF6CD6C000
trusted library allocation
page read and write
1DF6CE2C000
trusted library allocation
page read and write
1DF6F5FB000
trusted library allocation
page read and write
1DF64A86000
trusted library allocation
page read and write
1DF63CF1000
trusted library allocation
page read and write
1DF6D5BB000
trusted library allocation
page read and write
1DF665E0000
trusted library allocation
page read and write
1DF64F1A000
trusted library allocation
page read and write
1DF5A9F3000
heap
page read and write
1DF6EC2C000
trusted library allocation
page read and write
1DF5FA82000
trusted library allocation
page read and write
1DF64A84000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF67115000
trusted library allocation
page read and write
1DF6393B000
trusted library allocation
page read and write
1DF6E641000
trusted library allocation
page read and write
1DF64AF7000
trusted library allocation
page read and write
1DF6509A000
trusted library allocation
page read and write
1DF5A9B3000
heap
page read and write
1DF6C0F3000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF65DD5000
trusted library allocation
page read and write
1DF64AEE000
trusted library allocation
page read and write
1DF5A9A2000
heap
page read and write
1DF675AA000
trusted library allocation
page read and write
1DF5A97E000
heap
page read and write
1DF64D9A000
trusted library allocation
page read and write
DD5727E000
unkown
page readonly
1DF611AB000
trusted library allocation
page read and write
1DF6BF69000
trusted library allocation
page read and write
1DF5A9EF000
heap
page read and write
1B13A5E9000
heap
page read and write
1DF6CEC7000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
1DF6C11C000
trusted library allocation
page read and write
1DF5A97D000
heap
page read and write
1DF638A5000
trusted library allocation
page read and write
1DF652FA000
trusted library allocation
page read and write
1DF6EB05000
trusted library allocation
page read and write
1DF6CDF3000
trusted library allocation
page read and write
1DF6CDF6000
trusted library allocation
page read and write
1DF642BC000
trusted library allocation
page read and write
1DF63978000
trusted library allocation
page read and write
1DF5A975000
heap
page read and write
1DF63C0F000
trusted library allocation
page read and write
1DF64A2F000
trusted library allocation
page read and write
1DF66547000
trusted library allocation
page read and write
1DF67599000
trusted library allocation
page read and write
1DF671B9000
trusted library allocation
page read and write
1404000
heap
page read and write
1B13A5F2000
heap
page read and write
1DF664F1000
trusted library allocation
page read and write
1DF5A9A7000
heap
page read and write
20571411000
trusted library allocation
page read and write
9B1000
unkown
page execute read
1DF6EDE3000
trusted library allocation
page read and write
1DF63491000
heap
page read and write
1DF5A9EF000
heap
page read and write
1DF5A9A7000
heap
page read and write
1DF6645B000
trusted library allocation
page read and write
1DF60C96000
trusted library allocation
page read and write
1B13A63B000
heap
page read and write
1DF664DF000
trusted library allocation
page read and write
1DF65253000
trusted library allocation
page read and write
1DF5A9B4000
heap
page read and write
1DF6D3D9000
trusted library allocation
page read and write
1DF5F3AB000
trusted library allocation
page read and write
1DF6DBA2000
trusted library allocation
page read and write
1DF5A9BC000
heap
page read and write
1DF6524B000
trusted library allocation
page read and write
1DF5A9E7000
heap
page read and write
16FD5990000
heap
page read and write
1DF61139000
trusted library allocation
page read and write
1DF5A9AE000
heap
page read and write
1DF6C0E6000
trusted library allocation
page read and write
1DF675AC000
trusted library allocation
page read and write
1DF6F5FD000
trusted library allocation
page read and write
19F7F7A2000
unclassified section
page read and write
1DF5A9F4000
heap
page read and write
1DF5A9F1000
heap
page read and write
1DF651F6000
trusted library allocation
page read and write
1DF5A9AC000
heap
page read and write
1DF650FD000
trusted library allocation
page read and write
There are 3898 hidden memdumps, click here to show them.