IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c102ed79-35db-40b8-bc3e-aaa4cb2526e9.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c102ed79-35db-40b8-bc3e-aaa4cb2526e9.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P5PB9CS24ROT1FFC5JTL.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PI7RI4UID3QHC4Q4Y4J0.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\0a7b22cd-545d-43fe-8156-41d25a6e6da5 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\0a7b22cd-545d-43fe-8156-41d25a6e6da5.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c14e869-f22e-404d-808f-35b8a7c9dc63} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc77d6db10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4160 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7433fba-7232-4ec4-b493-79a0f3f4b22b} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a533910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d976b1-7973-4dff-9762-38c41794fbe0} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a2af710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://exslt.org/dates-and-timesp
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://youtube.com/account?=htt==
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://contile.services.mozilla.com/0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
142.250.81.238
unknown
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1547000
heap
page read and write
malicious
153F000
heap
page read and write
malicious
33DC48E000
unkown
page readonly
1CC7EB29000
heap
page read and write
1CC0FED4000
trusted library allocation
page read and write
1CC7F31B000
trusted library allocation
page read and write
1CC0B8CF000
trusted library allocation
page read and write
1CC08497000
trusted library allocation
page read and write
1CC09FEA000
trusted library allocation
page read and write
DEA000
stack
page read and write
1CC051A6000
heap
page read and write
1CC09698000
trusted library allocation
page read and write
1CC100D9000
trusted library allocation
page read and write
1CC14711000
trusted library allocation
page read and write
1CC0FDCE000
trusted library allocation
page read and write
1CC0A64F000
trusted library allocation
page read and write
1CC0838D000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC07E63000
trusted library allocation
page read and write
1CC0B8FC000
trusted library allocation
page read and write
1CC09857000
trusted library allocation
page read and write
1CC145F4000
trusted library allocation
page read and write
1CC7EB73000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC09524000
trusted library allocation
page read and write
1CC07BE6000
trusted library allocation
page read and write
1CC102DD000
trusted library allocation
page read and write
1502E200000
trusted library allocation
page read and write
1CC0B839000
trusted library allocation
page read and write
1CC093B3000
trusted library allocation
page read and write
1CC097E0000
trusted library allocation
page read and write
1528000
heap
page read and write
1CC0FF87000
trusted library allocation
page read and write
1CC13468000
trusted library allocation
page read and write
1CC08CBC000
trusted library allocation
page read and write
1CC14666000
trusted library allocation
page read and write
1CC08DE3000
trusted library allocation
page read and write
1CC7EB2E000
heap
page read and write
1CC08DD2000
trusted library allocation
page read and write
1CC098E9000
trusted library allocation
page read and write
1CC0A866000
trusted library allocation
page read and write
1CC7FB8A000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC08455000
trusted library allocation
page read and write
1CC7ED86000
trusted library allocation
page read and write
1CC09378000
trusted library allocation
page read and write
1CC13E3B000
trusted library allocation
page read and write
1CC0FD3F000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC098AC000
trusted library allocation
page read and write
1CC142A4000
trusted library allocation
page read and write
1CC0518F000
heap
page read and write
1CC7EB71000
heap
page read and write
1CC7EB32000
heap
page read and write
1CC0FD43000
trusted library allocation
page read and write
1CC103A3000
trusted library allocation
page read and write
1CC0A776000
trusted library allocation
page read and write
1CC0FCF6000
trusted library allocation
page read and write
2BC97F07000
trusted library allocation
page read and write
1CC09EC8000
trusted library allocation
page read and write
1CC098DD000
trusted library allocation
page read and write
1CC0828A000
trusted library allocation
page read and write
1CC101A6000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC7EAF6000
heap
page read and write
14AE000
stack
page read and write
1CC103A9000
trusted library allocation
page read and write
1CC10116000
trusted library allocation
page read and write
1CC7EB99000
heap
page read and write
1CC09C9C000
trusted library allocation
page read and write
1CC13EB7000
trusted library allocation
page read and write
1CC0FD70000
trusted library allocation
page read and write
1CC09999000
trusted library allocation
page read and write
1CC07BF0000
trusted library allocation
page read and write
1CC09CA2000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC0B8EB000
trusted library allocation
page read and write
1CC09EFD000
trusted library allocation
page read and write
1CC0A8F6000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
3F31000
heap
page read and write
1CC085FD000
trusted library allocation
page read and write
1CC09CC3000
trusted library allocation
page read and write
1CC098E6000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC09395000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC104EE000
trusted library allocation
page read and write
1CC08DBC000
trusted library allocation
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC14875000
heap
page read and write
1CC0A837000
trusted library allocation
page read and write
1CC0A75F000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC08DD2000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC139C5000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC09314000
trusted library allocation
page read and write
1CC12ACE000
trusted library allocation
page read and write
410EFFF000
stack
page read and write
1CC098CB000
trusted library allocation
page read and write
1CC09A4E000
trusted library allocation
page read and write
1CC12A7B000
trusted library allocation
page read and write
1CC143F3000
trusted library allocation
page read and write
1CC09DE1000
trusted library allocation
page read and write
1CC098EF000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC7EB71000
heap
page read and write
1CC14256000
trusted library allocation
page read and write
1CC0966E000
trusted library allocation
page read and write
1CC0A9B4000
trusted library allocation
page read and write
1CC098AA000
trusted library allocation
page read and write
1F813677000
trusted library allocation
page read and write
1CC09CD0000
trusted library allocation
page read and write
1CC0B8B5000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC7EB3B000
heap
page read and write
1CC0FE79000
trusted library allocation
page read and write
1502E010000
heap
page read and write
1CC092BD000
trusted library allocation
page read and write
1CC7EB36000
heap
page read and write
1CC08FBC000
trusted library allocation
page read and write
1CC07BCD000
trusted library allocation
page read and write
218EA240000
heap
page read and write
1CC093A7000
trusted library allocation
page read and write
1CC7ED26000
trusted library allocation
page read and write
218E9370000
unclassified section
page readonly
1CC082CB000
trusted library allocation
page read and write
1CC13F37000
trusted library allocation
page read and write
1CC099BF000
trusted library allocation
page read and write
1CC08515000
trusted library allocation
page read and write
1CC143EF000
trusted library allocation
page read and write
1CC13EC8000
trusted library allocation
page read and write
1CC0B8EB000
trusted library allocation
page read and write
1CC10467000
trusted library allocation
page read and write
1CC14801000
heap
page read and write
2BC97BC0000
heap
page read and write
1CC14865000
heap
page read and write
1CC7EC52000
trusted library allocation
page read and write
1CC0A6C0000
trusted library allocation
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC131F3000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC10174000
trusted library allocation
page read and write
1CC0A971000
trusted library allocation
page read and write
1CC09CC3000
trusted library allocation
page read and write
1CC0B62A000
trusted library allocation
page read and write
1CC09997000
trusted library allocation
page read and write
1CC7EB01000
heap
page read and write
1CC08FCF000
trusted library allocation
page read and write
1CC1436D000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC07E8D000
trusted library allocation
page read and write
1CC09991000
trusted library allocation
page read and write
1CC10183000
trusted library allocation
page read and write
1CC7EB40000
heap
page read and write
218E9590000
heap
page read and write
1CC0A792000
trusted library allocation
page read and write
1CC0A7CE000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC0518F000
heap
page read and write
1CC7EB6A000
heap
page read and write
1F813A0C000
trusted library allocation
page read and write
1CC09896000
trusted library allocation
page read and write
1CC7EB97000
heap
page read and write
1CC148FC000
heap
page read and write
1502E212000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC0828B000
trusted library allocation
page read and write
1CC08DE7000
trusted library allocation
page read and write
1CC0966E000
trusted library allocation
page read and write
1CC0B683000
trusted library allocation
page read and write
1CC0A99C000
trusted library allocation
page read and write
21EE000
stack
page read and write
1CC14650000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
155F000
heap
page read and write
1CC100F7000
trusted library allocation
page read and write
1CC7EC62000
trusted library allocation
page read and write
1CC1037E000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC0B6B5000
trusted library allocation
page read and write
1CC0BC2C000
trusted library allocation
page read and write
1CC0857A000
trusted library allocation
page read and write
1CC09DC6000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0A97B000
trusted library allocation
page read and write
1CC1433A000
trusted library allocation
page read and write
1CC12ACB000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
218EA326000
heap
page read and write
1CC09A25000
trusted library allocation
page read and write
1CC099A5000
trusted library allocation
page read and write
218E9779000
trusted library allocation
page read and write
1CC7EB99000
heap
page read and write
1CC7EB38000
heap
page read and write
1CC10270000
trusted library allocation
page read and write
1CC102C6000
trusted library allocation
page read and write
218EA326000
heap
page read and write
1CC102FE000
trusted library allocation
page read and write
1CC100B2000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC0A97B000
trusted library allocation
page read and write
1CC09D43000
trusted library allocation
page read and write
218E975C000
trusted library allocation
page read and write
1F813611000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC08DFC000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC1461C000
trusted library allocation
page read and write
1CC0517A000
heap
page read and write
1CC08DE5000
trusted library allocation
page read and write
1CC0ACDC000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB28000
heap
page read and write
1CC09BCE000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC08DE3000
trusted library allocation
page read and write
1CC0FDB3000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC0A98B000
trusted library allocation
page read and write
1CC09686000
trusted library allocation
page read and write
1CC096F0000
trusted library allocation
page read and write
D7A299E000
stack
page read and write
1CC100EA000
trusted library allocation
page read and write
1CC07E45000
trusted library allocation
page read and write
1CC13925000
trusted library allocation
page read and write
1CC08465000
trusted library allocation
page read and write
1CC0FD62000
trusted library allocation
page read and write
1CC07DE1000
trusted library allocation
page read and write
1CC10227000
trusted library allocation
page read and write
1CC099CF000
trusted library allocation
page read and write
1CC08D39000
trusted library allocation
page read and write
218EA32C000
heap
page read and write
1CC07898000
trusted library allocation
page read and write
1CC09EAC000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC051B1000
heap
page read and write
1CC1436B000
trusted library allocation
page read and write
1CC09D3E000
trusted library allocation
page read and write
1CC093B3000
trusted library allocation
page read and write
1CC0926F000
trusted library allocation
page read and write
1CC0A762000
trusted library allocation
page read and write
1502DE90000
heap
page read and write
1CC08C51000
trusted library allocation
page read and write
1CC08280000
trusted library allocation
page read and write
1CC0A770000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC14875000
heap
page read and write
1CC7EAF6000
heap
page read and write
1CC0A76C000
trusted library allocation
page read and write
1CC0A906000
trusted library allocation
page read and write
1CC078A7000
trusted library allocation
page read and write
1CC07BE6000
trusted library allocation
page read and write
1CC098C8000
trusted library allocation
page read and write
1CC07DFC000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
218EA37B000
heap
page read and write
1CC0C123000
trusted library allocation
page read and write
1CC051B1000
heap
page read and write
1CC7EB25000
heap
page read and write
1CC051B1000
heap
page read and write
1CC08D52000
trusted library allocation
page read and write
1CC1344E000
trusted library allocation
page read and write
218EA332000
heap
page read and write
1CC145DF000
trusted library allocation
page read and write
218E9410000
heap
page read and write
1CC09FE0000
trusted library allocation
page read and write
1CC100EB000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC0B8B8000
trusted library allocation
page read and write
1CC051A6000
heap
page read and write
218EA2A9000
heap
page read and write
1CC7EB6A000
heap
page read and write
1CC051B1000
heap
page read and write
1CC0AC2B000
trusted library allocation
page read and write
1CC09FD0000
trusted library allocation
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC123FB000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC139CD000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC0A8DC000
trusted library allocation
page read and write
1CC09AAB000
trusted library allocation
page read and write
1CC0A9C2000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC0B8E3000
trusted library allocation
page read and write
1CC09DE1000
trusted library allocation
page read and write
1CC7EB99000
heap
page read and write
1CC10297000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC7EBA9000
heap
page read and write
1502E279000
trusted library allocation
page read and write
1CC09D36000
trusted library allocation
page read and write
1CC7EB87000
heap
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC0A205000
trusted library allocation
page read and write
1CC07D73000
trusted library allocation
page read and write
1CC09DE1000
trusted library allocation
page read and write
1CC0FFAE000
trusted library allocation
page read and write
1CC0A740000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC09989000
trusted library allocation
page read and write
1502E244000
trusted library allocation
page read and write
1CC14593000
trusted library allocation
page read and write
1CC092C2000
trusted library allocation
page read and write
1CC09847000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC09A40000
trusted library allocation
page read and write
1CC0A8CF000
trusted library allocation
page read and write
1CC0848D000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC101AC000
trusted library allocation
page read and write
1CC09D3B000
trusted library allocation
page read and write
218EA2E1000
heap
page read and write
1CC7EAF6000
heap
page read and write
1CC07BB8000
trusted library allocation
page read and write
1CC123CF000
trusted library allocation
page read and write
3D9D8081000
trusted library allocation
page execute read
1CC14865000
heap
page read and write
1CC051E9000
heap
page read and write
1F81368F000
trusted library allocation
page read and write
1CC099E4000
trusted library allocation
page read and write
1CC09625000
trusted library allocation
page read and write
1CC0A4B0000
trusted library allocation
page read and write
14F0000
heap
page read and write
1CC07E8D000
trusted library allocation
page read and write
1CC098EF000
trusted library allocation
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC09D49000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC0AC68000
trusted library allocation
page read and write
1CC104C0000
trusted library allocation
page read and write
1CC1396C000
trusted library allocation
page read and write
1CC103A0000
trusted library allocation
page read and write
1CC0966C000
trusted library allocation
page read and write
1CC0A509000
trusted library allocation
page read and write
1CC09661000
trusted library allocation
page read and write
1CC09DB7000
trusted library allocation
page read and write
1CC083A8000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC07DCB000
trusted library allocation
page read and write
1CC078F2000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC7ED61000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
218EA331000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC139E9000
trusted library allocation
page read and write
1CC143F5000
trusted library allocation
page read and write
1CC10121000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC0B6BE000
trusted library allocation
page read and write
1CC143EF000
trusted library allocation
page read and write
1CC7EB7F000
heap
page read and write
1CC7EAF6000
heap
page read and write
B2C000
unkown
page readonly
1CC098CB000
trusted library allocation
page read and write
1CC08CBF000
trusted library allocation
page read and write
1F8133B0000
heap
page readonly
1CC09676000
trusted library allocation
page read and write
1CC0FEF5000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0FD3D000
trusted library allocation
page read and write
1CC0BAC8000
trusted library allocation
page read and write
1CC13ED8000
trusted library allocation
page read and write
1CC09D23000
trusted library allocation
page read and write
1CC0B8C6000
trusted library allocation
page read and write
1CC7EAEF000
heap
page read and write
1CC7F388000
trusted library allocation
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC10272000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1502E26E000
trusted library allocation
page read and write
1CC7F2FB000
trusted library allocation
page read and write
1CC09FC9000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC09A84000
trusted library allocation
page read and write
1CC0B87B000
trusted library allocation
page read and write
1CC1319C000
trusted library allocation
page read and write
1CC09D43000
trusted library allocation
page read and write
1CC05180000
heap
page read and write
1CC10232000
trusted library allocation
page read and write
1CC7EB6E000
heap
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC7EB2A000
heap
page read and write
1CC12A7E000
trusted library allocation
page read and write
1CC10170000
trusted library allocation
page read and write
1CC0B6E0000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC1272C000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC09686000
trusted library allocation
page read and write
1521E70A000
trusted library allocation
page read and write
1CC10180000
trusted library allocation
page read and write
33DC5CE000
stack
page read and write
1CC051A4000
heap
page read and write
1CC103B5000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC7EB34000
heap
page read and write
1CC0FFC3000
trusted library allocation
page read and write
1CC1038C000
trusted library allocation
page read and write
1CC14559000
trusted library allocation
page read and write
1CC090B3000
trusted library allocation
page read and write
218EA3B9000
heap
page read and write
1CC142CF000
trusted library allocation
page read and write
1CC0A7C2000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC0B6F4000
trusted library allocation
page read and write
1CC13ECB000
trusted library allocation
page read and write
1F8133FA000
heap
page read and write
1CC0FD70000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC1010E000
trusted library allocation
page read and write
1CC05191000
heap
page read and write
1CC0FD55000
trusted library allocation
page read and write
1CC10270000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
218E972F000
trusted library allocation
page read and write
1CC7EB7F000
heap
page read and write
1CC07D73000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC096BF000
trusted library allocation
page read and write
1CC0A64F000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC7ED8A000
trusted library allocation
page read and write
1CC09378000
trusted library allocation
page read and write
1CC14375000
trusted library allocation
page read and write
1CC0788F000
trusted library allocation
page read and write
1CC139F6000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC7EB25000
heap
page read and write
1CC051B0000
heap
page read and write
218EA29C000
heap
page read and write
1CC0AC68000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC0A70A000
trusted library allocation
page read and write
1502DDF0000
unclassified section
page readonly
1CC7EB3C000
heap
page read and write
1CC0A8B0000
trusted library allocation
page read and write
218EA3A9000
heap
page read and write
1CC7ECA1000
trusted library allocation
page read and write
1CC0A983000
trusted library allocation
page read and write
1CC0BB05000
trusted library allocation
page read and write
1CC092DB000
trusted library allocation
page read and write
1CC07EB4000
trusted library allocation
page read and write
1CC09A4C000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC0517F000
heap
page read and write
1502E25B000
trusted library allocation
page read and write
1CC148E5000
heap
page read and write
1CC7EB82000
heap
page read and write
1CC08DE9000
trusted library allocation
page read and write
1CC0B880000
trusted library allocation
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC0A9FD000
trusted library allocation
page read and write
1CC0B8D2000
trusted library allocation
page read and write
1CC0AC2B000
trusted library allocation
page read and write
2BC997B9000
heap
page read and write
1CC098E6000
trusted library allocation
page read and write
1CC09DB7000
trusted library allocation
page read and write
1CC7F660000
trusted library allocation
page read and write
1CC143E9000
trusted library allocation
page read and write
1CC07DB3000
trusted library allocation
page read and write
1CC0B841000
trusted library allocation
page read and write
1CC14246000
trusted library allocation
page read and write
1502E403000
trusted library allocation
page read and write
1CC7F6EC000
trusted library allocation
page read and write
1CC07E8D000
trusted library allocation
page read and write
1CC100CF000
trusted library allocation
page read and write
1CC0FFAE000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC7EAFC000
heap
page read and write
1CC0A63D000
trusted library allocation
page read and write
1CC0A94A000
trusted library allocation
page read and write
1CC7EB0F000
heap
page read and write
1CC07E28000
trusted library allocation
page read and write
1CC7FB80000
trusted library allocation
page read and write
1F813630000
trusted library allocation
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC09EC5000
trusted library allocation
page read and write
1CC13134000
trusted library allocation
page read and write
1CC09C4A000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC7EC86000
trusted library allocation
page read and write
1CC08463000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1502E419000
trusted library allocation
page read and write
1CC7ED0E000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC0988A000
trusted library allocation
page read and write
1CC085FD000
trusted library allocation
page read and write
1F813900000
trusted library allocation
page read and write
1CC09276000
trusted library allocation
page read and write
155F000
heap
page read and write
1CC1486D000
heap
page read and write
1CC0FED0000
trusted library allocation
page read and write
218E9800000
unkown
page execute read
1CC0FC5E000
trusted library allocation
page read and write
1502E330000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC0A983000
trusted library allocation
page read and write
1CC1429A000
trusted library allocation
page read and write
1CC09365000
trusted library allocation
page read and write
1CC0B833000
trusted library allocation
page read and write
1CC7F326000
trusted library allocation
page read and write
218EA398000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC085DA000
trusted library allocation
page read and write
3AF0000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC0B8FC000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC139F3000
trusted library allocation
page read and write
1CC08DD7000
trusted library allocation
page read and write
1CC0FC73000
trusted library allocation
page read and write
1CC77DFE000
trusted library allocation
page read and write
33E00BE000
stack
page read and write
1CC09968000
trusted library allocation
page read and write
1CC7EBA3000
heap
page read and write
1CC1474A000
trusted library allocation
page read and write
1CC0FDB5000
trusted library allocation
page read and write
1CC07DBE000
trusted library allocation
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1F81365F000
trusted library allocation
page read and write
1CC0A9CC000
trusted library allocation
page read and write
1CC123D8000
trusted library allocation
page read and write
1CC08CAC000
trusted library allocation
page read and write
1CC7EB28000
heap
page read and write
1CC07DF4000
trusted library allocation
page read and write
1CC12348000
trusted library allocation
page read and write
1CC1025A000
trusted library allocation
page read and write
1CC139E8000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
218E9789000
trusted library allocation
page read and write
218EA2A9000
heap
page read and write
1CC1461F000
trusted library allocation
page read and write
1CC09FFB000
trusted library allocation
page read and write
1CC07EA7000
trusted library allocation
page read and write
1CC08C11000
trusted library allocation
page read and write
1CC09A27000
trusted library allocation
page read and write
1CC07E8F000
trusted library allocation
page read and write
1CC0A8E1000
trusted library allocation
page read and write
1CC08D3E000
trusted library allocation
page read and write
1CC0AC68000
trusted library allocation
page read and write
5247C7E000
stack
page read and write
1CC07BAE000
trusted library allocation
page read and write
218EA331000
heap
page read and write
1CC08FCF000
trusted library allocation
page read and write
1CC08C78000
trusted library allocation
page read and write
1CC0519C000
heap
page read and write
1F8136B2000
trusted library allocation
page read and write
1CC08374000
trusted library allocation
page read and write
1CC08DAA000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
2BC97C40000
heap
page read and write
1CC09EC0000
trusted library allocation
page read and write
1CC0A722000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC102C6000
trusted library allocation
page read and write
1CC0A4C4000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC0ACD5000
trusted library allocation
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC145BF000
trusted library allocation
page read and write
1CC09D21000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
218EA2A3000
heap
page read and write
1CC7F393000
trusted library allocation
page read and write
1CC13138000
trusted library allocation
page read and write
1CC0FE82000
trusted library allocation
page read and write
1CC7EB38000
heap
page read and write
1CC085F0000
trusted library allocation
page read and write
1CC10455000
trusted library allocation
page read and write
1CC099CC000
trusted library allocation
page read and write
1CC0B6E5000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC09A7A000
trusted library allocation
page read and write
1CC7ED99000
trusted library allocation
page read and write
1CC13415000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC1039C000
trusted library allocation
page read and write
1CC0A722000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC092BB000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC09909000
trusted library allocation
page read and write
1CC7EC56000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
2BC97B90000
heap
page read and write
1CC082CB000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB32000
heap
page read and write
1CC10234000
trusted library allocation
page read and write
1CC7FBC0000
trusted library allocation
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC0B63F000
trusted library allocation
page read and write
1F813190000
unclassified section
page readonly
1CC0A8D4000
trusted library allocation
page read and write
1CC13E71000
trusted library allocation
page read and write
218EA33D000
heap
page read and write
1CC098EC000
trusted library allocation
page read and write
1F8136F4000
trusted library allocation
page read and write
1CC0A63D000
trusted library allocation
page read and write
1CC0519D000
heap
page read and write
1CC7F313000
trusted library allocation
page read and write
1CC099F4000
trusted library allocation
page read and write
1CC134D2000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
218E9766000
trusted library allocation
page read and write
1CC09ED3000
trusted library allocation
page read and write
1CC7F3BB000
trusted library allocation
page read and write
1CC0988A000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC7EB71000
heap
page read and write
1CC0B6A9000
trusted library allocation
page read and write
1CC07BC7000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC07BAE000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC085F8000
trusted library allocation
page read and write
1CC10465000
trusted library allocation
page read and write
1CC7EB33000
heap
page read and write
218E9781000
trusted library allocation
page read and write
218E955F000
unclassified section
page read and write
1CC09FC7000
trusted library allocation
page read and write
1CC102A1000
trusted library allocation
page read and write
1CC0923B000
trusted library allocation
page read and write
218E9846000
heap
page read and write
1CC0B851000
trusted library allocation
page read and write
1CC0FEF5000
trusted library allocation
page read and write
1CC0B7D9000
trusted library allocation
page read and write
1CC07E8F000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
5248CBE000
unkown
page readonly
1CC09EFD000
trusted library allocation
page read and write
1F8136A2000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC0FFFB000
trusted library allocation
page read and write
1CC7EB65000
heap
page read and write
1CC098C8000
trusted library allocation
page read and write
1CC07E99000
trusted library allocation
page read and write
1CC0FD70000
trusted library allocation
page read and write
2BC97EB5000
heap
page read and write
1CC09448000
trusted library allocation
page read and write
1CC07DBE000
trusted library allocation
page read and write
1CC0AC13000
trusted library allocation
page read and write
1CC7EB84000
heap
page read and write
1CC1398A000
trusted library allocation
page read and write
1CC10375000
trusted library allocation
page read and write
1CC083A4000
trusted library allocation
page read and write
1CC07C23000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
3CFF68C1E000
trusted library allocation
page read and write
1CC08583000
trusted library allocation
page read and write
1CC14650000
trusted library allocation
page read and write
1CC7EB99000
heap
page read and write
218E9DF0000
heap
page read and write
218EA2AC000
heap
page read and write
1CC0A8AE000
trusted library allocation
page read and write
13EF000
stack
page read and write
1CC0853D000
trusted library allocation
page read and write
1CC103BE000
trusted library allocation
page read and write
1CC09A39000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC10166000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
218EA362000
heap
page read and write
52459BE000
unkown
page readonly
1502E413000
trusted library allocation
page read and write
1CC098FB000
trusted library allocation
page read and write
1CC0A585000
trusted library allocation
page read and write
1CC10277000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC10223000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC09788000
trusted library allocation
page read and write
1CC0FDC5000
trusted library allocation
page read and write
1CC08386000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC7EB75000
heap
page read and write
1F8133C0000
unclassified section
page read and write
1CC051B1000
heap
page read and write
1CC0FD43000
trusted library allocation
page read and write
1502DDE0000
unclassified section
page readonly
1CC102FE000
trusted library allocation
page read and write
218E9700000
trusted library allocation
page read and write
1CC0BB6D000
trusted library allocation
page read and write
1CC09248000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC7EB82000
heap
page read and write
1CC09FE7000
trusted library allocation
page read and write
1CC09CC3000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC096B2000
trusted library allocation
page read and write
1CC0A954000
trusted library allocation
page read and write
1CC099B3000
trusted library allocation
page read and write
1CC0A8C8000
trusted library allocation
page read and write
1CC7F6AC000
trusted library allocation
page read and write
1CC0B6D3000
trusted library allocation
page read and write
1CC0BB07000
trusted library allocation
page read and write
1CC094A9000
trusted library allocation
page read and write
1CC0517F000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC08C0B000
trusted library allocation
page read and write
1CC09463000
trusted library allocation
page read and write
1CC10116000
trusted library allocation
page read and write
1CC083FB000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1F81321B000
remote allocation
page execute read
1CC09491000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC09CC3000
trusted library allocation
page read and write
1CC139E5000
trusted library allocation
page read and write
1CC089FC000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC13979000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC7EB83000
heap
page read and write
1CC14874000
heap
page read and write
1CC08593000
trusted library allocation
page read and write
1CC089F2000
trusted library allocation
page read and write
1502E2A3000
trusted library allocation
page read and write
1CC09366000
trusted library allocation
page read and write
218E976F000
trusted library allocation
page read and write
1CC08396000
trusted library allocation
page read and write
1CC134F1000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
1CC7EB83000
heap
page read and write
1CC09F95000
trusted library allocation
page read and write
1CC09641000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
1CC0FEE5000
trusted library allocation
page read and write
1CC7EB3B000
heap
page read and write
1CC0A8E4000
trusted library allocation
page read and write
218E9710000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC09802000
trusted library allocation
page read and write
1CC09CFC000
trusted library allocation
page read and write
1CC09791000
trusted library allocation
page read and write
1CC10174000
trusted library allocation
page read and write
B52000
unkown
page readonly
1CC09999000
trusted library allocation
page read and write
1502E223000
trusted library allocation
page read and write
1CC131BA000
trusted library allocation
page read and write
1CC0AC28000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
13CE000
stack
page read and write
1502E292000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC0518F000
heap
page read and write
1CC123F4000
trusted library allocation
page read and write
1CC08493000
trusted library allocation
page read and write
1CC09274000
trusted library allocation
page read and write
1CC08C53000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC09EA3000
trusted library allocation
page read and write
1CC08FBC000
trusted library allocation
page read and write
1CC08495000
trusted library allocation
page read and write
1CC0B6F0000
trusted library allocation
page read and write
33DE83E000
unkown
page readonly
1CC09DDE000
trusted library allocation
page read and write
1CC0FF4B000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC14868000
heap
page read and write
1CC7EB7A000
heap
page read and write
1CC0967A000
trusted library allocation
page read and write
1CC09663000
trusted library allocation
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC7F2FE000
trusted library allocation
page read and write
1CC097E6000
trusted library allocation
page read and write
1CC7F3A8000
trusted library allocation
page read and write
1CC0A9E6000
trusted library allocation
page read and write
1CC05178000
heap
page read and write
1CC0B6C2000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC09AB8000
trusted library allocation
page read and write
218E93D0000
heap
page read and write
1CC13ECD000
trusted library allocation
page read and write
1CC7F3BB000
trusted library allocation
page read and write
1CC7EAFA000
heap
page read and write
1CC08523000
trusted library allocation
page read and write
1CC134E5000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC0A792000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
524597E000
stack
page read and write
1CC7EB8A000
heap
page read and write
1CC0B6BA000
trusted library allocation
page read and write
1CC0A949000
trusted library allocation
page read and write
1CC7EB97000
heap
page read and write
1CC7ED5F000
trusted library allocation
page read and write
1CC0A75B000
trusted library allocation
page read and write
1CC0AC8A000
trusted library allocation
page read and write
218EA2EA000
heap
page read and write
1CC0FFB3000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC12701000
trusted library allocation
page read and write
1CC0FD66000
trusted library allocation
page read and write
1CC7F3E3000
trusted library allocation
page read and write
1CC09EDE000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC0A9C2000
trusted library allocation
page read and write
1CC0A7DA000
trusted library allocation
page read and write
1CC104CA000
trusted library allocation
page read and write
1CC7EB18000
heap
page read and write
1502E247000
trusted library allocation
page read and write
1CC13976000
trusted library allocation
page read and write
1CC08562000
trusted library allocation
page read and write
2BC997BF000
heap
page read and write
1CC085C5000
trusted library allocation
page read and write
1CC1432E000
trusted library allocation
page read and write
1CC08559000
trusted library allocation
page read and write
1CC0ACC6000
trusted library allocation
page read and write
1CC08569000
trusted library allocation
page read and write
1CC093D4000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC10223000
trusted library allocation
page read and write
1CC139D6000
trusted library allocation
page read and write
1CC1464E000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
218EA328000
heap
page read and write
1CC139A5000
trusted library allocation
page read and write
1CC7EB35000
heap
page read and write
1CC09DE1000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC09365000
trusted library allocation
page read and write
1CC10450000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC07E9F000
trusted library allocation
page read and write
1CC0A8B0000
trusted library allocation
page read and write
1CC0AC4A000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC07EC3000
trusted library allocation
page read and write
1CC07B23000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
14ED000
stack
page read and write
1CC0A8EB000
trusted library allocation
page read and write
1CC0BC01000
trusted library allocation
page read and write
1CC09FEA000
trusted library allocation
page read and write
1CC0A983000
trusted library allocation
page read and write
1CC0A98B000
trusted library allocation
page read and write
1CC0FFE2000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1502E334000
heap
page read and write
1CC094C4000
trusted library allocation
page read and write
218E9703000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC7EB6B000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC07BA7000
trusted library allocation
page read and write
1CC7EDCC000
trusted library allocation
page read and write
1CC098E6000
trusted library allocation
page read and write
1CC0A5CE000
trusted library allocation
page read and write
1CC13E47000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
33DC50B000
stack
page read and write
1CC083D6000
trusted library allocation
page read and write
1CC10279000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC0FC67000
trusted library allocation
page read and write
1CC1039C000
trusted library allocation
page read and write
1CC08DB5000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
33DF8BE000
unkown
page readonly
1CC7EB82000
heap
page read and write
1CC7EB39000
heap
page read and write
1CC7EB23000
heap
page read and write
1CC09FC6000
trusted library allocation
page read and write
1CC099B9000
trusted library allocation
page read and write
1CC0A2CB000
trusted library allocation
page read and write
1502E05A000
heap
page read and write
1CC10125000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7F400000
trusted library allocation
page read and write
1CC082CB000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
1CC08C73000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC0FF4B000
trusted library allocation
page read and write
33DE7FE000
unkown
page readonly
1CC07B69000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC08266000
trusted library allocation
page read and write
1CC099C7000
trusted library allocation
page read and write
1CC08CC1000
trusted library allocation
page read and write
1CC14526000
trusted library allocation
page read and write
1CC098E9000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC0FD70000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC083A2000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC0519E000
heap
page read and write
1CC10448000
trusted library allocation
page read and write
1CC0B626000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC09990000
trusted library allocation
page read and write
1CC0AC94000
trusted library allocation
page read and write
1CC0FD6E000
trusted library allocation
page read and write
218E975F000
trusted library allocation
page read and write
1CC14864000
heap
page read and write
1F8136DB000
trusted library allocation
page read and write
1CC09AF3000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC7EAEF000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC0A8B0000
trusted library allocation
page read and write
CD5B1FF000
stack
page read and write
218E9550000
unclassified section
page read and write
1CC0996A000
trusted library allocation
page read and write
1CC09E63000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC10043000
trusted library allocation
page read and write
1CC1049D000
trusted library allocation
page read and write
1CC101AC000
trusted library allocation
page read and write
1CC092BA000
trusted library allocation
page read and write
1CC09FEA000
trusted library allocation
page read and write
1CC07D9E000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC10234000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC0B8CF000
trusted library allocation
page read and write
1CC085C9000
trusted library allocation
page read and write
1CC14779000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC0966C000
trusted library allocation
page read and write
1CC07B6F000
trusted library allocation
page read and write
1CC102C6000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC098AC000
trusted library allocation
page read and write
1CC0C181000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC07B80000
trusted library allocation
page read and write
1CC09623000
trusted library allocation
page read and write
1CC0ACBD000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC099DA000
trusted library allocation
page read and write
1CC08465000
trusted library allocation
page read and write
1CC09A2F000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC13E67000
trusted library allocation
page read and write
1CC0FF40000
trusted library allocation
page read and write
1CC0B777000
trusted library allocation
page read and write
D7A28DE000
unkown
page readonly
1CC7EB3A000
heap
page read and write
1CC0FD16000
trusted library allocation
page read and write
1CC10128000
trusted library allocation
page read and write
1502E2E6000
trusted library allocation
page read and write
1CC09997000
trusted library allocation
page read and write
1CC0A9C2000
trusted library allocation
page read and write
1CC0519B000
heap
page read and write
1CC09DC8000
trusted library allocation
page read and write
1CC14224000
trusted library allocation
page read and write
1CC099CF000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0ACC9000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC7EAF8000
heap
page read and write
1CC096AC000
trusted library allocation
page read and write
1CC092DB000
trusted library allocation
page read and write
1CC148E5000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC099C5000
trusted library allocation
page read and write
1CC09D23000
trusted library allocation
page read and write
1502E2C7000
trusted library allocation
page read and write
1CC103EE000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC7F6AC000
trusted library allocation
page read and write
218EA398000
heap
page read and write
1CC145BF000
trusted library allocation
page read and write
1F8133F0000
heap
page read and write
1CC099B3000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC099FC000
trusted library allocation
page read and write
1F8133D0000
heap
page read and write
1CC0BAA2000
trusted library allocation
page read and write
1CC09DC8000
trusted library allocation
page read and write
1CC0FD37000
trusted library allocation
page read and write
1CC139F6000
trusted library allocation
page read and write
1F813649000
trusted library allocation
page read and write
1CC0B779000
trusted library allocation
page read and write
1CC100DB000
trusted library allocation
page read and write
1CC100C8000
trusted library allocation
page read and write
1CC0A66A000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC1234E000
trusted library allocation
page read and write
1CC0827E000
trusted library allocation
page read and write
1CC0BB48000
trusted library allocation
page read and write
1CC0998D000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC07BC2000
trusted library allocation
page read and write
1CC0A6FC000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC12A76000
trusted library allocation
page read and write
1CC0ACAD000
trusted library allocation
page read and write
1CC13964000
trusted library allocation
page read and write
1CC104DA000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC13E4C000
trusted library allocation
page read and write
1CC7F6EC000
trusted library allocation
page read and write
1CC7ED4B000
trusted library allocation
page read and write
1CC083BB000
trusted library allocation
page read and write
1CC7EAEF000
heap
page read and write
218EA323000
heap
page read and write
1CC0AA00000
trusted library allocation
page read and write
1CC09ECF000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC102DD000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC145D2000
trusted library allocation
page read and write
218EA33D000
heap
page read and write
1CC099FC000
trusted library allocation
page read and write
1CC09CBE000
trusted library allocation
page read and write
33E08BE000
unkown
page readonly
1CC09D3E000
trusted library allocation
page read and write
1502E263000
trusted library allocation
page read and write
1CC14875000
heap
page read and write
1CC0827E000
trusted library allocation
page read and write
1CC131D3000
trusted library allocation
page read and write
1CC09A27000
trusted library allocation
page read and write
1CC09ECF000
trusted library allocation
page read and write
1CC09EAC000
trusted library allocation
page read and write
1CC098DB000
trusted library allocation
page read and write
1CC14875000
heap
page read and write
1CC0924E000
trusted library allocation
page read and write
1CC1452F000
trusted library allocation
page read and write
1CC09D2C000
trusted library allocation
page read and write
218E9777000
trusted library allocation
page read and write
D7A33D8000
stack
page read and write
1CC098F1000
trusted library allocation
page read and write
1CC1462E000
trusted library allocation
page read and write
2BC97C47000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC0AC78000
trusted library allocation
page read and write
1CC09FEA000
trusted library allocation
page read and write
1CC085F2000
trusted library allocation
page read and write
1CC7EB17000
heap
page read and write
1CC134D2000
trusted library allocation
page read and write
5247CBE000
unkown
page readonly
1CC7EB71000
heap
page read and write
1CC7EB6B000
heap
page read and write
1CC7EB23000
heap
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC07E54000
trusted library allocation
page read and write
1CC08D8B000
trusted library allocation
page read and write
1CC7EB87000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC12ACB000
trusted library allocation
page read and write
1CC0FDB3000
trusted library allocation
page read and write
1CC0B721000
trusted library allocation
page read and write
1CC7EC7D000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC100DB000
trusted library allocation
page read and write
1CC1317B000
trusted library allocation
page read and write
1CC0A990000
trusted library allocation
page read and write
1CC7EAFA000
heap
page read and write
1CC09864000
trusted library allocation
page read and write
1CC1016A000
trusted library allocation
page read and write
1CC0FF56000
trusted library allocation
page read and write
1CC09D43000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC0ACC9000
trusted library allocation
page read and write
1CC0FDC5000
trusted library allocation
page read and write
1CC7EAFA000
heap
page read and write
1CC099C5000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC0ACC6000
trusted library allocation
page read and write
1520000
heap
page read and write
1CC1025A000
trusted library allocation
page read and write
1CC14642000
trusted library allocation
page read and write
1CC09661000
trusted library allocation
page read and write
155F000
heap
page read and write
1CC0838E000
trusted library allocation
page read and write
1CC0FCEE000
trusted library allocation
page read and write
1CC1342D000
trusted library allocation
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
1CC0A794000
trusted library allocation
page read and write
1CC0B8F3000
trusted library allocation
page read and write
1CC7EB07000
heap
page read and write
1CC14865000
heap
page read and write
1CC0A8CF000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC0A781000
trusted library allocation
page read and write
218EA361000
heap
page read and write
1CC103A0000
trusted library allocation
page read and write
1CC1319E000
trusted library allocation
page read and write
218EA37B000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC7EB75000
heap
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC14371000
trusted library allocation
page read and write
1CC092E7000
trusted library allocation
page read and write
1CC0B8FC000
trusted library allocation
page read and write
1CC7F36A000
trusted library allocation
page read and write
1502E20D000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1521E600000
trusted library allocation
page read and write
1CC0A73C000
trusted library allocation
page read and write
1CC07D97000
trusted library allocation
page read and write
1CC085FC000
trusted library allocation
page read and write
1CC07EB8000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC0B825000
trusted library allocation
page read and write
1CC099B3000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC07B69000
trusted library allocation
page read and write
B64000
unkown
page readonly
1CC7EB97000
heap
page read and write
1CC083D6000
trusted library allocation
page read and write
1CC09DE6000
trusted library allocation
page read and write
1CC123A7000
trusted library allocation
page read and write
1CC1315D000
trusted library allocation
page read and write
1CC123FD000
trusted library allocation
page read and write
1CC0FD37000
trusted library allocation
page read and write
410F7FD000
stack
page read and write
1CC09FC9000
trusted library allocation
page read and write
1CC1045C000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC7EB6B000
heap
page read and write
1CC1422E000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC102C6000
trusted library allocation
page read and write
1CC0B787000
trusted library allocation
page read and write
1F8133CF000
unclassified section
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC078BA000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
1CC7EB71000
heap
page read and write
1CC0FDCC000
trusted library allocation
page read and write
1CC0AC95000
trusted library allocation
page read and write
1CC07D97000
trusted library allocation
page read and write
1CC14291000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC0838F000
trusted library allocation
page read and write
1CC08C20000
trusted library allocation
page read and write
1CC09672000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
33DF03E000
stack
page read and write
1CC100DB000
trusted library allocation
page read and write
1CC142B7000
trusted library allocation
page read and write
1CC1036F000
trusted library allocation
page read and write
3CFF68C24000
trusted library allocation
page read and write
218EA361000
heap
page read and write
1F8133C2000
unclassified section
page read and write
B60000
unkown
page write copy
1CC7F382000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC103AD000
trusted library allocation
page read and write
1CC0BA86000
trusted library allocation
page read and write
1CC1462A000
trusted library allocation
page read and write
1CC13957000
trusted library allocation
page read and write
1CC07B7B000
trusted library allocation
page read and write
1CC0AC22000
trusted library allocation
page read and write
1CC0B89B000
trusted library allocation
page read and write
1CC07EAD000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC0519E000
heap
page read and write
1CC09DC6000
trusted library allocation
page read and write
1CC0C186000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC09A6D000
trusted library allocation
page read and write
218EA331000
heap
page read and write
1CC14875000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC13137000
trusted library allocation
page read and write
1CC09927000
trusted library allocation
page read and write
1CC1021D000
trusted library allocation
page read and write
1CC0A5D4000
trusted library allocation
page read and write
1CC0B8ED000
trusted library allocation
page read and write
1CC08374000
trusted library allocation
page read and write
1CC7F686000
trusted library allocation
page read and write
1CC7EEF7000
trusted library allocation
page read and write
1CC098E5000
trusted library allocation
page read and write
1CC0519C000
heap
page read and write
1CC10223000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1502E432000
trusted library allocation
page read and write
1CC098EF000
trusted library allocation
page read and write
1CC09A99000
trusted library allocation
page read and write
1CC096A6000
trusted library allocation
page read and write
1CC09923000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC097C1000
trusted library allocation
page read and write
1CC09CB4000
trusted library allocation
page read and write
1CC098D0000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0519E000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC0B69C000
trusted library allocation
page read and write
1CC7ED4E000
trusted library allocation
page read and write
1CC09CC1000
trusted library allocation
page read and write
1CC1036F000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC1029B000
trusted library allocation
page read and write
1CC07E42000
trusted library allocation
page read and write
1CC0FFBE000
trusted library allocation
page read and write
1CC0C1D7000
trusted library allocation
page read and write
218EA321000
heap
page read and write
1CC07BBE000
trusted library allocation
page read and write
1CC094FB000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC0A86A000
trusted library allocation
page read and write
1CC14875000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC0789A000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC7F271000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC09997000
trusted library allocation
page read and write
1CC08566000
trusted library allocation
page read and write
1CC09CCF000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC13ED8000
trusted library allocation
page read and write
1CC102A2000
trusted library allocation
page read and write
A91000
unkown
page execute read
1CC0B799000
trusted library allocation
page read and write
1CC123BF000
trusted library allocation
page read and write
1CC102AA000
trusted library allocation
page read and write
1CC08D66000
trusted library allocation
page read and write
1CC13ECD000
trusted library allocation
page read and write
1CC14801000
heap
page read and write
1CC13149000
trusted library allocation
page read and write
1CC07B33000
trusted library allocation
page read and write
1CC7F37F000
trusted library allocation
page read and write
1CC14654000
trusted library allocation
page read and write
1CC083CB000
trusted library allocation
page read and write
1CC08C50000
trusted library allocation
page read and write
1CC13E30000
trusted library allocation
page read and write
1CC09EAE000
trusted library allocation
page read and write
1543000
heap
page read and write
1CC7EB32000
heap
page read and write
1CC082CB000
trusted library allocation
page read and write
1CC0518F000
heap
page read and write
1CC0A864000
trusted library allocation
page read and write
1CC0A6C9000
trusted library allocation
page read and write
1CC0BC33000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC0A8E4000
trusted library allocation
page read and write
1CC085F1000
trusted library allocation
page read and write
1CC09DFD000
trusted library allocation
page read and write
1CC09A0D000
trusted library allocation
page read and write
1CC09CD8000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC0964A000
trusted library allocation
page read and write
1CC10198000
trusted library allocation
page read and write
1CC145EA000
trusted library allocation
page read and write
1CC09EC0000
trusted library allocation
page read and write
1CC08253000
trusted library allocation
page read and write
1CC089E8000
trusted library allocation
page read and write
1CC77DEF000
trusted library allocation
page read and write
1CC0B6BA000
trusted library allocation
page read and write
1CC0FF56000
trusted library allocation
page read and write
1CC1001F000
trusted library allocation
page read and write
1CC082CB000
trusted library allocation
page read and write
1CC0FDC9000
trusted library allocation
page read and write
218E9E18000
trusted library allocation
page read and write
1CC092D0000
trusted library allocation
page read and write
1CC07D29000
trusted library allocation
page read and write
1CC10272000
trusted library allocation
page read and write
1CC07B1F000
trusted library allocation
page read and write
1CC7EB18000
heap
page read and write
1CC0A8D2000
trusted library allocation
page read and write
1CC13998000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC07B76000
trusted library allocation
page read and write
2BC97C73000
heap
page read and write
1CC099C7000
trusted library allocation
page read and write
1CC10297000
trusted library allocation
page read and write
1CC13921000
trusted library allocation
page read and write
1CC7ED07000
trusted library allocation
page read and write
1CC7EB38000
heap
page read and write
218E970A000
trusted library allocation
page read and write
1CC099FC000
trusted library allocation
page read and write
1CC104DC000
trusted library allocation
page read and write
1CC7FBD9000
trusted library allocation
page read and write
1CC051B1000
heap
page read and write
52473FE000
stack
page read and write
1CC12A74000
trusted library allocation
page read and write
1CC10213000
trusted library allocation
page read and write
1CC09D38000
trusted library allocation
page read and write
1CC126AC000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC123ED000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC0A971000
trusted library allocation
page read and write
1CC12ABA000
trusted library allocation
page read and write
1CC14369000
trusted library allocation
page read and write
1CC14219000
trusted library allocation
page read and write
1CF0003F000
trusted library allocation
page read and write
1CC0B814000
trusted library allocation
page read and write
1CC1349D000
trusted library allocation
page read and write
1CC0898C000
trusted library allocation
page read and write
1CC09ABD000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC08C1B000
trusted library allocation
page read and write
1CC103AC000
trusted library allocation
page read and write
1F8136B6000
trusted library allocation
page read and write
1CC1020D000
trusted library allocation
page read and write
1CC13955000
trusted library allocation
page read and write
1CC100DB000
trusted library allocation
page read and write
1CC104EE000
trusted library allocation
page read and write
1CC09663000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1F813903000
trusted library allocation
page read and write
1CC10299000
trusted library allocation
page read and write
1CC12AD2000
trusted library allocation
page read and write
1CC099FD000
trusted library allocation
page read and write
1CC7EDE8000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC1035B000
trusted library allocation
page read and write
1CC100B2000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC134C9000
trusted library allocation
page read and write
1CC09C31000
trusted library allocation
page read and write
1CC09366000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC09608000
trusted library allocation
page read and write
1CC7EB43000
heap
page read and write
1CC139CD000
trusted library allocation
page read and write
1CC7FB9C000
trusted library allocation
page read and write
1CC123EB000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC7EB79000
heap
page read and write
1CC77DEB000
trusted library allocation
page read and write
218E9552000
unclassified section
page read and write
1CC7EB6B000
heap
page read and write
218EA384000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC0AC8A000
trusted library allocation
page read and write
33DCFD8000
stack
page read and write
1CC1464E000
trusted library allocation
page read and write
1CC09CC1000
trusted library allocation
page read and write
1CC0B6DE000
trusted library allocation
page read and write
1CC09667000
trusted library allocation
page read and write
1CC09621000
trusted library allocation
page read and write
1CC0B86F000
trusted library allocation
page read and write
1CC085DC000
trusted library allocation
page read and write
1CC08356000
trusted library allocation
page read and write
218E97EB000
trusted library allocation
page read and write
1CC145D2000
trusted library allocation
page read and write
1CC12733000
trusted library allocation
page read and write
1CC100EB000
trusted library allocation
page read and write
1CC0B6D8000
trusted library allocation
page read and write
1521E5C0000
heap
page read and write
155F000
heap
page read and write
1CC7EB2D000
heap
page read and write
1CC0FC98000
trusted library allocation
page read and write
1CC08D9A000
trusted library allocation
page read and write
1CC07BCD000
trusted library allocation
page read and write
1CC7EB25000
heap
page read and write
1CC14874000
heap
page read and write
3F30000
heap
page read and write
1CC7ECCC000
trusted library allocation
page read and write
1CC0B845000
trusted library allocation
page read and write
1CC0B656000
trusted library allocation
page read and write
218EA2BD000
heap
page read and write
1CC07E81000
trusted library allocation
page read and write
1CC098E6000
trusted library allocation
page read and write
1CC10274000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC05191000
heap
page read and write
1CC09950000
trusted library allocation
page read and write
1CC09DBC000
trusted library allocation
page read and write
1CC1456A000
trusted library allocation
page read and write
218E9E06000
trusted library allocation
page read and write
1CC051A2000
heap
page read and write
1CC09CB1000
trusted library allocation
page read and write
218E9712000
trusted library allocation
page read and write
1CC09D3B000
trusted library allocation
page read and write
1CC134D8000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC085F1000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC7EB75000
heap
page read and write
1CC085DC000
trusted library allocation
page read and write
1CC13E82000
trusted library allocation
page read and write
1CC100E4000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC1039C000
trusted library allocation
page read and write
1CC0A755000
trusted library allocation
page read and write
1521E8B0000
heap
page read and write
1CC7EB65000
heap
page read and write
33DC508000
stack
page read and write
1CC051A4000
heap
page read and write
1CC1034C000
trusted library allocation
page read and write
1CC0FFF8000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC0A990000
trusted library allocation
page read and write
1CC13EC5000
trusted library allocation
page read and write
1CC143CF000
trusted library allocation
page read and write
1CC08FD9000
trusted library allocation
page read and write
1CC11802000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC09D1C000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC1486D000
heap
page read and write
1CC0FFCD000
trusted library allocation
page read and write
1CC09663000
trusted library allocation
page read and write
1CC143F5000
trusted library allocation
page read and write
1CC148FC000
heap
page read and write
1CC7EAF0000
heap
page read and write
1CC7F22F000
trusted library allocation
page read and write
1CC097CF000
trusted library allocation
page read and write
1CC07D54000
trusted library allocation
page read and write
1CC08CCF000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC7F6F3000
trusted library allocation
page read and write
1CC08D4B000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC08CAC000
trusted library allocation
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC09635000
trusted library allocation
page read and write
218EA28D000
heap
page read and write
1CC051A0000
heap
page read and write
1CC10225000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC09665000
trusted library allocation
page read and write
1CC0A868000
trusted library allocation
page read and write
1CC7EB05000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC101A0000
trusted library allocation
page read and write
1CC7EB30000
heap
page read and write
1CC1486D000
heap
page read and write
1CC08DE7000
trusted library allocation
page read and write
1CC0519C000
heap
page read and write
1CC09DFD000
trusted library allocation
page read and write
1CC0BB4D000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
1CC0B89B000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC09C9C000
trusted library allocation
page read and write
1CC08C0A000
trusted library allocation
page read and write
1CC10111000
trusted library allocation
page read and write
1CC07E54000
trusted library allocation
page read and write
1CC14633000
trusted library allocation
page read and write
1CC0C1B3000
trusted library allocation
page read and write
1CC125C8000
trusted library allocation
page read and write
1CC102D0000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
33DF87E000
stack
page read and write
1521E470000
heap
page read and write
1CC14654000
trusted library allocation
page read and write
1CC08555000
trusted library allocation
page read and write
1CC12648000
trusted library allocation
page read and write
1521E707000
trusted library allocation
page read and write
1CC0AC93000
trusted library allocation
page read and write
1CC09CBE000
trusted library allocation
page read and write
D7A53FE000
stack
page read and write
1CC7EB24000
heap
page read and write
1CC08C16000
trusted library allocation
page read and write
1CC13EAE000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB1D000
heap
page read and write
1CC1037D000
trusted library allocation
page read and write
1CC7EB87000
heap
page read and write
1CC09AA6000
trusted library allocation
page read and write
1CC0A5C4000
trusted library allocation
page read and write
1CC123BC000
trusted library allocation
page read and write
1CC0ACA1000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC09D2E000
trusted library allocation
page read and write
1CC10018000
trusted library allocation
page read and write
1CC0FFC3000
trusted library allocation
page read and write
1CC0BB6D000
trusted library allocation
page read and write
1CC0FEED000
trusted library allocation
page read and write
1CC126A7000
trusted library allocation
page read and write
1CC0B8EB000
trusted library allocation
page read and write
1CC0FD6B000
trusted library allocation
page read and write
1CC7EB9F000
heap
page read and write
1CC099F6000
trusted library allocation
page read and write
1CC7EB00000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC09DC6000
trusted library allocation
page read and write
1CC07BE2000
trusted library allocation
page read and write
1CC096BA000
trusted library allocation
page read and write
1CC083C1000
trusted library allocation
page read and write
1CC07E63000
trusted library allocation
page read and write
1CC0B866000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC7EB28000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC13976000
trusted library allocation
page read and write
1CC0517F000
heap
page read and write
1CC7F6B1000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
1CC07E63000
trusted library allocation
page read and write
1CC098EC000
trusted library allocation
page read and write
1502E269000
trusted library allocation
page read and write
1CC07EB1000
trusted library allocation
page read and write
1CC10467000
trusted library allocation
page read and write
1CC103AD000
trusted library allocation
page read and write
1CC0A871000
trusted library allocation
page read and write
1CC0ACD0000
trusted library allocation
page read and write
1CC0FD66000
trusted library allocation
page read and write
1CC7EB6C000
heap
page read and write
1CC0FEDB000
trusted library allocation
page read and write
1CC1432C000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC0A998000
trusted library allocation
page read and write
1CC7EB2E000
heap
page read and write
1CC7F63D000
trusted library allocation
page read and write
1CC103BD000
trusted library allocation
page read and write
1CC09805000
trusted library allocation
page read and write
1CC09EDE000
trusted library allocation
page read and write
1CC09C9F000
trusted library allocation
page read and write
1CC07EAD000
trusted library allocation
page read and write
1CC7EB75000
heap
page read and write
1464000
heap
page read and write
1CC051B0000
heap
page read and write
1CC10179000
trusted library allocation
page read and write
1CC07EAB000
trusted library allocation
page read and write
1CC099FC000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
33DC44E000
stack
page read and write
1CC099E2000
trusted library allocation
page read and write
1502E41C000
trusted library allocation
page read and write
1CC134B0000
trusted library allocation
page read and write
1CC1462E000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC14633000
trusted library allocation
page read and write
1CC09FA8000
trusted library allocation
page read and write
1CC099B9000
trusted library allocation
page read and write
1CC0A6FC000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC0A971000
trusted library allocation
page read and write
1CC083D6000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC7EB75000
heap
page read and write
1CC1021B000
trusted library allocation
page read and write
1CC7F6A0000
trusted library allocation
page read and write
1CC103A6000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC14286000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC7F318000
trusted library allocation
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC0A998000
trusted library allocation
page read and write
1CC0FEA0000
trusted library allocation
page read and write
1CC09923000
trusted library allocation
page read and write
1CC0A961000
trusted library allocation
page read and write
1CC0859E000
trusted library allocation
page read and write
1CC7ED69000
trusted library allocation
page read and write
1CC09669000
trusted library allocation
page read and write
1CC07DE7000
trusted library allocation
page read and write
1CC093A7000
trusted library allocation
page read and write
1CC0FEFB000
trusted library allocation
page read and write
218EA399000
heap
page read and write
1CC7ED6D000
trusted library allocation
page read and write
1CC103FC000
trusted library allocation
page read and write
1CC7ED43000
trusted library allocation
page read and write
218EA384000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC1038E000
trusted library allocation
page read and write
1CC09FBF000
trusted library allocation
page read and write
1CC7FBB2000
trusted library allocation
page read and write
1CC0A231000
trusted library allocation
page read and write
1CC0939D000
trusted library allocation
page read and write
1CC07B29000
trusted library allocation
page read and write
1CC7EB89000
heap
page read and write
1CC0BB2F000
trusted library allocation
page read and write
1CC0FF17000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC09AC7000
trusted library allocation
page read and write
218EA2BD000
heap
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC051B0000
heap
page read and write
1CC0A772000
trusted library allocation
page read and write
218EA2A9000
heap
page read and write
1CC7F223000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0851C000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1502E400000
trusted library allocation
page read and write
1CC09BD6000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1F81361A000
trusted library allocation
page read and write
1CC7EB28000
heap
page read and write
1CC0B6C0000
trusted library allocation
page read and write
1CC0FEF5000
trusted library allocation
page read and write
1CC0B885000
trusted library allocation
page read and write
1CC7EDE5000
trusted library allocation
page read and write
1CC08CF4000
trusted library allocation
page read and write
1CC139EF000
trusted library allocation
page read and write
1CC078ED000
trusted library allocation
page read and write
1CC0BBF1000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC7F6F3000
trusted library allocation
page read and write
1CC0FD45000
trusted library allocation
page read and write
1CC08487000
trusted library allocation
page read and write
1CC0FD89000
trusted library allocation
page read and write
1CC09676000
trusted library allocation
page read and write
1CC09DB7000
trusted library allocation
page read and write
1CC0AC72000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC0FD30000
trusted library allocation
page read and write
1CC0ACCD000
trusted library allocation
page read and write
1CC0FCBC000
trusted library allocation
page read and write
1CC098A4000
trusted library allocation
page read and write
1CC143EB000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC13E82000
trusted library allocation
page read and write
1CC0FFEA000
trusted library allocation
page read and write
1CC7EB2A000
heap
page read and write
1CC08372000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC09FBB000
trusted library allocation
page read and write
1CC09CC5000
trusted library allocation
page read and write
1CC1462A000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC10399000
trusted library allocation
page read and write
1CC7EB97000
heap
page read and write
1464000
heap
page read and write
1CC0AC38000
trusted library allocation
page read and write
1CC139B9000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC14542000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
218EA320000
heap
page read and write
1CC0A74B000
trusted library allocation
page read and write
2BC97D00000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC11600000
trusted library allocation
page read and write
1CC07D25000
trusted library allocation
page read and write
1CC0857E000
trusted library allocation
page read and write
1CC13280000
trusted library allocation
page read and write
1CC13143000
trusted library allocation
page read and write
1CC7F3E1000
trusted library allocation
page read and write
2BC97C5D000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC092CB000
trusted library allocation
page read and write
1CC7EB16000
heap
page read and write
1CC0AC8C000
trusted library allocation
page read and write
1CC145E4000
trusted library allocation
page read and write
218EA328000
heap
page read and write
1CC10395000
trusted library allocation
page read and write
1CC0A7F0000
trusted library allocation
page read and write
1CC07DE7000
trusted library allocation
page read and write
1CC7F6D7000
trusted library allocation
page read and write
1CC0A565000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC098E5000
trusted library allocation
page read and write
1CC7EDE0000
trusted library allocation
page read and write
1CC099CC000
trusted library allocation
page read and write
1CC0FFAE000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC0B65F000
trusted library allocation
page read and write
1CC09DC8000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC09686000
trusted library allocation
page read and write
1CC14650000
trusted library allocation
page read and write
1CC7F3FE000
trusted library allocation
page read and write
1CC7EB11000
heap
page read and write
1CC08CFC000
trusted library allocation
page read and write
218E95A0000
trusted library section
page readonly
1CC7EB6A000
heap
page read and write
1CC09656000
trusted library allocation
page read and write
1CC0838F000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC07896000
trusted library allocation
page read and write
1CC09989000
trusted library allocation
page read and write
1CC0FFE2000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC0B8B5000
trusted library allocation
page read and write
1CC0FED6000
trusted library allocation
page read and write
1502E090000
unclassified section
page readonly
1CC7EB38000
heap
page read and write
1CC09F00000
trusted library allocation
page read and write
1CC083FA000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC0A897000
trusted library allocation
page read and write
1CC7F31E000
trusted library allocation
page read and write
1CC098C8000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1F813603000
trusted library allocation
page read and write
1CC09CFC000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC14868000
heap
page read and write
1CC07D70000
trusted library allocation
page read and write
1CC14258000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1F813600000
trusted library allocation
page read and write
1CC098C8000
trusted library allocation
page read and write
1F8137E0000
heap
page read and write
218EA32C000
heap
page read and write
1CC7ECBF000
trusted library allocation
page read and write
1CC0BBCE000
trusted library allocation
page read and write
1CC10105000
trusted library allocation
page read and write
1CC09CDB000
trusted library allocation
page read and write
D7A29DE000
unkown
page readonly
1CC0ACD5000
trusted library allocation
page read and write
1CC0B880000
trusted library allocation
page read and write
1CC09D2A000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC7EB3A000
heap
page read and write
3F31000
heap
page read and write
1CC100C9000
trusted library allocation
page read and write
1CC14753000
trusted library allocation
page read and write
2BC97C79000
heap
page read and write
1CC09896000
trusted library allocation
page read and write
1CC0983E000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC1457A000
trusted library allocation
page read and write
1CC09DF9000
trusted library allocation
page read and write
1CC099F6000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC7EB71000
heap
page read and write
1CC0966C000
trusted library allocation
page read and write
1CC0C12C000
trusted library allocation
page read and write
1CC10361000
trusted library allocation
page read and write
218E95FD000
unkown
page execute read
1CC0A9C7000
trusted library allocation
page read and write
1CC1039B000
trusted library allocation
page read and write
218E9844000
heap
page read and write
5247C3E000
unkown
page readonly
1CC7F6B1000
trusted library allocation
page read and write
1CC09689000
trusted library allocation
page read and write
1CC0B7C4000
trusted library allocation
page read and write
1CC0519C000
heap
page read and write
1CC09D36000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC0A9EF000
trusted library allocation
page read and write
1CC0937E000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC10121000
trusted library allocation
page read and write
1CC7EB76000
heap
page read and write
1CC07BCB000
trusted library allocation
page read and write
1CC7EB07000
heap
page read and write
1CC7EB37000
heap
page read and write
1CC0A69D000
trusted library allocation
page read and write
1CC098F8000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC099D1000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC0964A000
trusted library allocation
page read and write
1CC08D31000
trusted library allocation
page read and write
1CC0ACE7000
trusted library allocation
page read and write
1CC0FD66000
trusted library allocation
page read and write
1502E281000
trusted library allocation
page read and write
1CC7F3B2000
trusted library allocation
page read and write
1CC7EC98000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC143B4000
trusted library allocation
page read and write
1CC7F366000
trusted library allocation
page read and write
1CC13E4C000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
1CC1013F000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
1CC10458000
trusted library allocation
page read and write
2BC997A0000
heap
page read and write
1CC08367000
trusted library allocation
page read and write
218E9E09000
trusted library allocation
page read and write
218EA32C000
heap
page read and write
1CC7ED3B000
trusted library allocation
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC09CB1000
trusted library allocation
page read and write
1CC09EC8000
trusted library allocation
page read and write
1CC0C145000
trusted library allocation
page read and write
1CC0A2B8000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC7ED8A000
trusted library allocation
page read and write
1CC14654000
trusted library allocation
page read and write
1CC07BDE000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC09DE6000
trusted library allocation
page read and write
1CC7EB83000
heap
page read and write
1CC0A5E1000
trusted library allocation
page read and write
1CC09997000
trusted library allocation
page read and write
1CC7EEBE000
trusted library allocation
page read and write
1CC08C16000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC1025B000
trusted library allocation
page read and write
1CC07E19000
trusted library allocation
page read and write
1CC0969B000
trusted library allocation
page read and write
1CC0BBA3000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC7EB2F000
heap
page read and write
1CC0FDC1000
trusted library allocation
page read and write
1CC051A1000
heap
page read and write
1CC7EAF6000
heap
page read and write
1CC10283000
trusted library allocation
page read and write
1CC0BC57000
trusted library allocation
page read and write
1CC09661000
trusted library allocation
page read and write
1CC07EAB000
trusted library allocation
page read and write
1CC139F8000
trusted library allocation
page read and write
1CC12587000
trusted library allocation
page read and write
1CC0B8C6000
trusted library allocation
page read and write
1CC10015000
trusted library allocation
page read and write
1CC08DF2000
trusted library allocation
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC07EF3000
trusted library allocation
page read and write
1CC101A2000
trusted library allocation
page read and write
1CC08C64000
trusted library allocation
page read and write
1CC7F3B6000
trusted library allocation
page read and write
1CC7F3A0000
trusted library allocation
page read and write
1CC09A4C000
trusted library allocation
page read and write
1CC148B3000
heap
page read and write
1CC145C2000
trusted library allocation
page read and write
1CC0AC65000
trusted library allocation
page read and write
1CC0A8AC000
trusted library allocation
page read and write
1CC0FEA3000
trusted library allocation
page read and write
1CC13464000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC0ACD9000
trusted library allocation
page read and write
1CC0FD58000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC0FFAE000
trusted library allocation
page read and write
1CC09C9C000
trusted library allocation
page read and write
1CC0853B000
trusted library allocation
page read and write
1CC1017D000
trusted library allocation
page read and write
1CC0FC6A000
trusted library allocation
page read and write
1CC09248000
trusted library allocation
page read and write
1CC7EDB5000
trusted library allocation
page read and write
1CC0FF87000
trusted library allocation
page read and write
1502E100000
trusted library allocation
page read and write
1CC10166000
trusted library allocation
page read and write
1CC09923000
trusted library allocation
page read and write
1CC7EDD5000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC0A950000
trusted library allocation
page read and write
1CC0FF56000
trusted library allocation
page read and write
1CC7EB1F000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC051A0000
heap
page read and write
1CC7EB89000
heap
page read and write
1CC08DFC000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
1CC08C56000
trusted library allocation
page read and write
1CC07BA7000
trusted library allocation
page read and write
1CC09DB7000
trusted library allocation
page read and write
1CC09785000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC14728000
trusted library allocation
page read and write
1CC0A9A9000
trusted library allocation
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC7EB3B000
heap
page read and write
1CC0519E000
heap
page read and write
1CC0B8F3000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC051E9000
heap
page read and write
1CC098C5000
trusted library allocation
page read and write
1F813645000
trusted library allocation
page read and write
1CC09317000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC14874000
heap
page read and write
1CC0990F000
trusted library allocation
page read and write
1CC143ED000
trusted library allocation
page read and write
3AF4000
heap
page read and write
1CC7EB7F000
heap
page read and write
1CC7EB41000
heap
page read and write
218EA2A0000
heap
page read and write
1F813670000
trusted library allocation
page read and write
1CC0AC5A000
trusted library allocation
page read and write
1CC099F6000
trusted library allocation
page read and write
1CC08544000
trusted library allocation
page read and write
1CC0A5D4000
trusted library allocation
page read and write
1CC143F7000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB7E000
heap
page read and write
1F813200000
remote allocation
page read and write
1CC104BB000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC0FF4B000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1521E550000
heap
page read and write
1CC10377000
trusted library allocation
page read and write
1CC096B6000
trusted library allocation
page read and write
1CC13E49000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC0826E000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
218E97F5000
trusted library allocation
page read and write
1CC13457000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0840A000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC7EB29000
heap
page read and write
1F813360000
heap
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC0FEF7000
trusted library allocation
page read and write
1CC09EDE000
trusted library allocation
page read and write
1CC10161000
trusted library allocation
page read and write
1CC08CDF000
trusted library allocation
page read and write
1CC0A6B0000
trusted library allocation
page read and write
1CC07BC7000
trusted library allocation
page read and write
1CC05191000
heap
page read and write
1CC11C00000
trusted library allocation
page read and write
1CC0A990000
trusted library allocation
page read and write
1CC07BE6000
trusted library allocation
page read and write
1CC139F3000
trusted library allocation
page read and write
1CC7EDE8000
trusted library allocation
page read and write
1CC0A7BC000
trusted library allocation
page read and write
1F813340000
heap
page read and write
1CC7EB2C000
heap
page read and write
B5C000
unkown
page read and write
13DB000
stack
page read and write
1CC09317000
trusted library allocation
page read and write
1CC1015E000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC051A6000
heap
page read and write
1CC7EB77000
heap
page read and write
1CC08DCF000
trusted library allocation
page read and write
1CC125A3000
trusted library allocation
page read and write
1CC09DE1000
trusted library allocation
page read and write
1CC0B810000
trusted library allocation
page read and write
1CC07D97000
trusted library allocation
page read and write
1CC09656000
trusted library allocation
page read and write
1CC7F377000
trusted library allocation
page read and write
1CC09FED000
trusted library allocation
page read and write
1CC123F8000
trusted library allocation
page read and write
1CC1398A000
trusted library allocation
page read and write
1CC07BA7000
trusted library allocation
page read and write
1CC0FEDB000
trusted library allocation
page read and write
1F813A00000
trusted library allocation
page read and write
1CC0A97F000
trusted library allocation
page read and write
1CC7EB36000
heap
page read and write
1CC7EB7A000
heap
page read and write
1CC098D3000
trusted library allocation
page read and write
1CC078B1000
trusted library allocation
page read and write
1CC0B89B000
trusted library allocation
page read and write
1CC084D2000
trusted library allocation
page read and write
1CC08DE5000
trusted library allocation
page read and write
1CC09CB4000
trusted library allocation
page read and write
1CC7EB83000
heap
page read and write
1CC0B742000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC0B8B8000
trusted library allocation
page read and write
1CC051A2000
heap
page read and write
1CC08C26000
trusted library allocation
page read and write
1CC09EE8000
trusted library allocation
page read and write
1CC14537000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0A786000
trusted library allocation
page read and write
1CC098CB000
trusted library allocation
page read and write
1CC0A9B4000
trusted library allocation
page read and write
1502E22E000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC7EAFC000
heap
page read and write
1CC7EAF6000
heap
page read and write
1CC099B7000
trusted library allocation
page read and write
1CC0B8ED000
trusted library allocation
page read and write
1CC14779000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
1CC0FF54000
trusted library allocation
page read and write
33DF83E000
unkown
page readonly
1502DE70000
unclassified section
page readonly
1CC09CA2000
trusted library allocation
page read and write
1CC0ACC9000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC145C2000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC7EAEF000
heap
page read and write
1CC14666000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC0B679000
trusted library allocation
page read and write
1CC09D3B000
trusted library allocation
page read and write
1CC7EB65000
heap
page read and write
1CC09999000
trusted library allocation
page read and write
218EA323000
heap
page read and write
1CC0946B000
trusted library allocation
page read and write
1CC10375000
trusted library allocation
page read and write
1CC7EAFC000
heap
page read and write
1CC7EB6B000
heap
page read and write
1CC0FFEA000
trusted library allocation
page read and write
1CC0A63D000
trusted library allocation
page read and write
1CC07EB1000
trusted library allocation
page read and write
1CC7EB33000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC0519E000
heap
page read and write
1CC085F2000
trusted library allocation
page read and write
1CC0FEA8000
trusted library allocation
page read and write
1CC0FD5B000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC10029000
trusted library allocation
page read and write
1502E210000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC142C2000
trusted library allocation
page read and write
1CC139E8000
trusted library allocation
page read and write
1CC08266000
trusted library allocation
page read and write
1CC05191000
heap
page read and write
1CC05199000
heap
page read and write
1CC09627000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC139B1000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC0BB41000
trusted library allocation
page read and write
1CC145B4000
trusted library allocation
page read and write
1CC085DC000
trusted library allocation
page read and write
1CC098E9000
trusted library allocation
page read and write
1CC77DEF000
trusted library allocation
page read and write
1CC14656000
trusted library allocation
page read and write
1CC08463000
trusted library allocation
page read and write
1CC0996A000
trusted library allocation
page read and write
1CC0937B000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC13972000
trusted library allocation
page read and write
1CC10388000
trusted library allocation
page read and write
1CC0A4F4000
trusted library allocation
page read and write
1CC7EB2E000
heap
page read and write
1CC09838000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC0A93F000
trusted library allocation
page read and write
1CC09EAE000
trusted library allocation
page read and write
1CC0A8AE000
trusted library allocation
page read and write
1CC7EB89000
heap
page read and write
1CC7FBDB000
trusted library allocation
page read and write
1CC10223000
trusted library allocation
page read and write
1CC7EB97000
heap
page read and write
1CC1021D000
trusted library allocation
page read and write
1CC09991000
trusted library allocation
page read and write
1CC08DB3000
trusted library allocation
page read and write
1CC09D0B000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC08339000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC08CC3000
trusted library allocation
page read and write
1CC14631000
trusted library allocation
page read and write
1CC7EB24000
heap
page read and write
1CC099B4000
trusted library allocation
page read and write
1CC083E8000
trusted library allocation
page read and write
1CC07EC2000
trusted library allocation
page read and write
1CC078F9000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1502E000000
unclassified section
page read and write
1CC09999000
trusted library allocation
page read and write
1CC0ACE7000
trusted library allocation
page read and write
1CC0BB0C000
trusted library allocation
page read and write
1CC07C36000
trusted library allocation
page read and write
1CC085E2000
trusted library allocation
page read and write
1CC0A9BA000
trusted library allocation
page read and write
1CC14286000
trusted library allocation
page read and write
1521E580000
heap
page read and write
1CC7EB2F000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC101A2000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1F8136C4000
trusted library allocation
page read and write
1CC08D88000
trusted library allocation
page read and write
1CC0B8ED000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1F8136F6000
trusted library allocation
page read and write
1CC7F6B9000
trusted library allocation
page read and write
1CC0A659000
trusted library allocation
page read and write
1CC148B8000
heap
page read and write
1CC7EB23000
heap
page read and write
1CC098A4000
trusted library allocation
page read and write
1CC7EBA9000
heap
page read and write
1CC7F276000
trusted library allocation
page read and write
1CC098E9000
trusted library allocation
page read and write
1CC7F6D7000
trusted library allocation
page read and write
1CC09AA6000
trusted library allocation
page read and write
1CC7FB6B000
trusted library allocation
page read and write
1CC7EB18000
heap
page read and write
1CC07E28000
trusted library allocation
page read and write
1CC10199000
trusted library allocation
page read and write
1CC1035A000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC0FDC9000
trusted library allocation
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC08DCF000
trusted library allocation
page read and write
1CC09990000
trusted library allocation
page read and write
218EA2F9000
heap
page read and write
1CC14875000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC0849B000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC0A862000
trusted library allocation
page read and write
1CC05191000
heap
page read and write
1CC0B8D5000
trusted library allocation
page read and write
1CC09B2D000
trusted library allocation
page read and write
1CC07D7F000
trusted library allocation
page read and write
1CC1424B000
trusted library allocation
page read and write
1CC145EC000
trusted library allocation
page read and write
1CC0FEFB000
trusted library allocation
page read and write
1CC08361000
trusted library allocation
page read and write
1CC08C2D000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC099DA000
trusted library allocation
page read and write
218E9530000
heap
page readonly
1CC07DB3000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC7EC68000
trusted library allocation
page read and write
1CC7FBAC000
trusted library allocation
page read and write
1CC13EBA000
trusted library allocation
page read and write
1CC09957000
trusted library allocation
page read and write
1CC14956000
heap
page read and write
1CC7F684000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC7EAEF000
heap
page read and write
1CC0B62E000
trusted library allocation
page read and write
1CC09676000
trusted library allocation
page read and write
1CC13E9C000
trusted library allocation
page read and write
1CC0846D000
trusted library allocation
page read and write
218EA3A9000
heap
page read and write
1CC0FCB5000
trusted library allocation
page read and write
1CC0519C000
heap
page read and write
1CC12A93000
trusted library allocation
page read and write
1CC09FE7000
trusted library allocation
page read and write
1CC1427C000
trusted library allocation
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1502E27B000
trusted library allocation
page read and write
1CC10176000
trusted library allocation
page read and write
1CC1020D000
trusted library allocation
page read and write
1CC13F93000
trusted library allocation
page read and write
1CC09D49000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC10443000
trusted library allocation
page read and write
1CC1020D000
trusted library allocation
page read and write
1CC1456E000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC103AB000
trusted library allocation
page read and write
1CC09AAB000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC7F6FB000
trusted library allocation
page read and write
1CC7ED1F000
trusted library allocation
page read and write
218E9748000
trusted library allocation
page read and write
1CC12706000
trusted library allocation
page read and write
1CC09CA2000
trusted library allocation
page read and write
1CC07D9E000
trusted library allocation
page read and write
1CC7EB2A000
heap
page read and write
1CC7EB33000
heap
page read and write
1502E41F000
trusted library allocation
page read and write
1CC09410000
trusted library allocation
page read and write
1CC10270000
trusted library allocation
page read and write
1CC0FEE5000
trusted library allocation
page read and write
1CC7F6D5000
trusted library allocation
page read and write
1CC09CE6000
trusted library allocation
page read and write
1CC14321000
trusted library allocation
page read and write
1CC099C3000
trusted library allocation
page read and write
1CC07DB3000
trusted library allocation
page read and write
1CC13199000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC0FD20000
trusted library allocation
page read and write
1CC1036F000
trusted library allocation
page read and write
1CC0A4F8000
trusted library allocation
page read and write
1CC0FFCB000
trusted library allocation
page read and write
1CC0A8FE000
trusted library allocation
page read and write
1CC09DC6000
trusted library allocation
page read and write
1CC099D8000
trusted library allocation
page read and write
CD5A9FF000
stack
page read and write
1CC7EB29000
heap
page read and write
1CC09669000
trusted library allocation
page read and write
1CC09EAE000
trusted library allocation
page read and write
1CC09990000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC0FFA1000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC09272000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
1CC09999000
trusted library allocation
page read and write
1CC08D9A000
trusted library allocation
page read and write
1CC7EB97000
heap
page read and write
1CC104B1000
trusted library allocation
page read and write
1CC100E4000
trusted library allocation
page read and write
1CC7EB06000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB7F000
heap
page read and write
1CC078C2000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC07EA7000
trusted library allocation
page read and write
1502E40C000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC0FE87000
trusted library allocation
page read and write
1CC13F05000
trusted library allocation
page read and write
1CC12ADC000
trusted library allocation
page read and write
1CC0A77E000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB41000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC0ACCD000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC0935F000
trusted library allocation
page read and write
1CC07BBE000
trusted library allocation
page read and write
1CC098C8000
trusted library allocation
page read and write
2BC97EB0000
heap
page read and write
1CC14801000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC7EB64000
heap
page read and write
218EA2CA000
heap
page read and write
1CC0A505000
trusted library allocation
page read and write
1CC0ACCD000
trusted library allocation
page read and write
1CC103A1000
trusted library allocation
page read and write
2BC997A7000
heap
page read and write
218EA241000
heap
page read and write
1CC07C2A000
trusted library allocation
page read and write
1CC103BC000
trusted library allocation
page read and write
1CC100BE000
trusted library allocation
page read and write
1CC08CAA000
trusted library allocation
page read and write
1CC0996A000
trusted library allocation
page read and write
1CC10368000
trusted library allocation
page read and write
1CC093AB000
trusted library allocation
page read and write
1CC0FEE9000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC14875000
heap
page read and write
1CC0FDB7000
trusted library allocation
page read and write
1CC11A00000
trusted library allocation
page read and write
1CC7EB38000
heap
page read and write
1CC0A5AD000
trusted library allocation
page read and write
1F813907000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB37000
heap
page read and write
1CC09CC1000
trusted library allocation
page read and write
1CC07BA0000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC0518F000
heap
page read and write
1CC099D5000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC10399000
trusted library allocation
page read and write
1CC14861000
heap
page read and write
1CC14865000
heap
page read and write
1CC14213000
trusted library allocation
page read and write
1CC0969B000
trusted library allocation
page read and write
1CC09EEB000
trusted library allocation
page read and write
1CC0A9FD000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC0A94C000
trusted library allocation
page read and write
1CC1013D000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
B5C000
unkown
page write copy
1CC09CD8000
trusted library allocation
page read and write
1CC14656000
trusted library allocation
page read and write
1CC09EE8000
trusted library allocation
page read and write
1CC10287000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC0A8F6000
trusted library allocation
page read and write
1553000
heap
page read and write
1F8137D6000
heap
page read and write
1CC7EB24000
heap
page read and write
1CC13E3C000
trusted library allocation
page read and write
1CC13E35000
trusted library allocation
page read and write
1CC0A86E000
trusted library allocation
page read and write
1CC09D2A000
trusted library allocation
page read and write
1CC104B1000
trusted library allocation
page read and write
1CC099A4000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
1CC094CA000
trusted library allocation
page read and write
1CC145C0000
trusted library allocation
page read and write
154A000
heap
page read and write
1CC10277000
trusted library allocation
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC13E49000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
13BE000
stack
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC0FFC3000
trusted library allocation
page read and write
1CC0FDB7000
trusted library allocation
page read and write
1CC7EB75000
heap
page read and write
1CC08C6A000
trusted library allocation
page read and write
1CC13F1C000
trusted library allocation
page read and write
1CC7FBC7000
trusted library allocation
page read and write
1CC0A9BA000
trusted library allocation
page read and write
1CC0ACC9000
trusted library allocation
page read and write
410EFFC000
stack
page read and write
1CC7ED11000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC0FFDF000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC0FF9D000
trusted library allocation
page read and write
1CC085F3000
trusted library allocation
page read and write
1502E050000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC083A9000
trusted library allocation
page read and write
218EA2BF000
heap
page read and write
1CC09243000
trusted library allocation
page read and write
1CC13E71000
trusted library allocation
page read and write
1CC7EB18000
heap
page read and write
2230000
heap
page read and write
1CC0A76A000
trusted library allocation
page read and write
1CC0FD41000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC08C64000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
D7A291D000
stack
page read and write
1464000
heap
page read and write
1CC05196000
heap
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC7EB6E000
heap
page read and write
1CC08532000
trusted library allocation
page read and write
1CC143E9000
trusted library allocation
page read and write
1CC0AC9D000
trusted library allocation
page read and write
1CC089E3000
trusted library allocation
page read and write
1CC08372000
trusted library allocation
page read and write
1CC0A770000
trusted library allocation
page read and write
1CC089A1000
trusted library allocation
page read and write
1CC078BA000
trusted library allocation
page read and write
1CC0517F000
heap
page read and write
218EA2AC000
heap
page read and write
1CC0967A000
trusted library allocation
page read and write
1CC082CB000
trusted library allocation
page read and write
3D9D805E000
trusted library allocation
page execute read
1CC125E5000
trusted library allocation
page read and write
1CC7EB1D000
heap
page read and write
1CC0AC4A000
trusted library allocation
page read and write
1CC0AC65000
trusted library allocation
page read and write
1CC7EB80000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC0FECB000
trusted library allocation
page read and write
1CC13487000
trusted library allocation
page read and write
1CC09FCF000
trusted library allocation
page read and write
1CC1034E000
trusted library allocation
page read and write
1CC0A4EA000
trusted library allocation
page read and write
1CC08D52000
trusted library allocation
page read and write
1CC0A64F000
trusted library allocation
page read and write
1CC07BF1000
trusted library allocation
page read and write
1CC097E8000
trusted library allocation
page read and write
1CC7EB6E000
heap
page read and write
1CC1013D000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC07EB8000
trusted library allocation
page read and write
1CC103A0000
trusted library allocation
page read and write
1CC092E7000
trusted library allocation
page read and write
1CC0ACCD000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC14666000
trusted library allocation
page read and write
1CC7EB3B000
heap
page read and write
1CC104EE000
trusted library allocation
page read and write
1CC7EB65000
heap
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC104CA000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1450000
heap
page read and write
1CC0AC68000
trusted library allocation
page read and write
1CC139FE000
trusted library allocation
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC0965E000
trusted library allocation
page read and write
1CC7EB30000
heap
page read and write
1CC0966E000
trusted library allocation
page read and write
1CC103C3000
trusted library allocation
page read and write
1551000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC092CA000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC10134000
trusted library allocation
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC07BC9000
trusted library allocation
page read and write
1CC103C1000
trusted library allocation
page read and write
1CC7F3AF000
trusted library allocation
page read and write
1CC078A9000
trusted library allocation
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
1CC143A9000
trusted library allocation
page read and write
1CC0AC20000
trusted library allocation
page read and write
1CC0FE9A000
trusted library allocation
page read and write
1CC0969B000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC7ECDF000
trusted library allocation
page read and write
1CC139DA000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC096A6000
trusted library allocation
page read and write
1CC08CC3000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC1479C000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC14874000
heap
page read and write
1CC0FD55000
trusted library allocation
page read and write
D7A289B000
stack
page read and write
218E9CD2000
heap
page read and write
1CC08FD6000
trusted library allocation
page read and write
1CC10286000
trusted library allocation
page read and write
1CC0A78B000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC7EB25000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC09ACC000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
218EA384000
heap
page read and write
1CC09ED3000
trusted library allocation
page read and write
1CC098CB000
trusted library allocation
page read and write
1CC0ACA5000
trusted library allocation
page read and write
1CC7EB18000
heap
page read and write
1CC0FD62000
trusted library allocation
page read and write
1CC10163000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC7EB37000
heap
page read and write
218EA331000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC14631000
trusted library allocation
page read and write
1CC09807000
trusted library allocation
page read and write
1CC07BA5000
trusted library allocation
page read and write
1CC093C3000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC099A4000
trusted library allocation
page read and write
1CC12641000
trusted library allocation
page read and write
1CC08CA0000
trusted library allocation
page read and write
1CC07E6E000
trusted library allocation
page read and write
1F81360E000
trusted library allocation
page read and write
1CC0A78B000
trusted library allocation
page read and write
1CC7F3B6000
trusted library allocation
page read and write
1502E25D000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC08D9D000
trusted library allocation
page read and write
1CC14642000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC07B62000
trusted library allocation
page read and write
1CC08CFC000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC098E9000
trusted library allocation
page read and write
1CC09438000
trusted library allocation
page read and write
1CC096B8000
trusted library allocation
page read and write
1CC7EC7A000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC1021B000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC099C7000
trusted library allocation
page read and write
1CC051A1000
heap
page read and write
1CC103C1000
trusted library allocation
page read and write
1CC083FE000
trusted library allocation
page read and write
1CC0A000000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC09274000
trusted library allocation
page read and write
1CC7EAEF000
heap
page read and write
1CC07D7F000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0FFC9000
trusted library allocation
page read and write
1CC10227000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC07B20000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC145D2000
trusted library allocation
page read and write
1CC14556000
trusted library allocation
page read and write
1CC13432000
trusted library allocation
page read and write
1CC092B4000
trusted library allocation
page read and write
1CC0FEF7000
trusted library allocation
page read and write
1CC7EB76000
heap
page read and write
1CC0FD47000
trusted library allocation
page read and write
1CC7F69E000
trusted library allocation
page read and write
1CC13E43000
trusted library allocation
page read and write
1CC0FD6C000
trusted library allocation
page read and write
1CC09968000
trusted library allocation
page read and write
1CC0A95A000
trusted library allocation
page read and write
1CC0FCFC000
trusted library allocation
page read and write
1CC0A531000
trusted library allocation
page read and write
1CC0AC1E000
trusted library allocation
page read and write
1CC0A9D5000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC098FA000
trusted library allocation
page read and write
1CC12AD1000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC13156000
trusted library allocation
page read and write
1CC099F4000
trusted library allocation
page read and write
1CC09EFA000
trusted library allocation
page read and write
1CC0ACED000
trusted library allocation
page read and write
1CC13EAE000
trusted library allocation
page read and write
1CC7EB38000
heap
page read and write
1CC7EB8A000
heap
page read and write
2BC97C72000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC07BC9000
trusted library allocation
page read and write
1CC0B8BB000
trusted library allocation
page read and write
1CC084D5000
trusted library allocation
page read and write
1CC0AC97000
trusted library allocation
page read and write
1CC08CD9000
trusted library allocation
page read and write
1CC07BF1000
trusted library allocation
page read and write
1CC094CA000
trusted library allocation
page read and write
1CC1317F000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0938F000
trusted library allocation
page read and write
1502E336000
heap
page read and write
1CC051A0000
heap
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC09279000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
33DC58E000
unkown
page readonly
1CC08CCF000
trusted library allocation
page read and write
1CC123BE000
trusted library allocation
page read and write
1CC0996A000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC085EA000
trusted library allocation
page read and write
1CC7EB43000
heap
page read and write
1CC099E4000
trusted library allocation
page read and write
1CC1462E000
trusted library allocation
page read and write
1CC08DCD000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC7EB28000
heap
page read and write
1CC7EB34000
heap
page read and write
1CC7EC98000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC08563000
trusted library allocation
page read and write
1CC0A64F000
trusted library allocation
page read and write
1CC094D4000
trusted library allocation
page read and write
1CC07DB6000
trusted library allocation
page read and write
1CC098C5000
trusted library allocation
page read and write
1CC7ED59000
trusted library allocation
page read and write
1CC7ECCA000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC09CEF000
trusted library allocation
page read and write
218EA320000
heap
page read and write
1CC08CFC000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC7EB35000
heap
page read and write
154C000
heap
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC09EEB000
trusted library allocation
page read and write
1CC07B20000
trusted library allocation
page read and write
1CC083CB000
trusted library allocation
page read and write
1CC13FAC000
trusted library allocation
page read and write
1CC7F6D5000
trusted library allocation
page read and write
1CC7FBD0000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC148C0000
heap
page read and write
1CC0519E000
heap
page read and write
1CC10176000
trusted library allocation
page read and write
1F81365D000
trusted library allocation
page read and write
1CC7EB65000
heap
page read and write
1CC09273000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC09CA2000
trusted library allocation
page read and write
1521E587000
heap
page read and write
1CC7EB74000
heap
page read and write
1CC092E0000
trusted library allocation
page read and write
24BBC3D03000
trusted library allocation
page read and write
1CC09650000
trusted library allocation
page read and write
1CC100E4000
trusted library allocation
page read and write
1CC09898000
trusted library allocation
page read and write
1CC0A7F0000
trusted library allocation
page read and write
1CC099C5000
trusted library allocation
page read and write
1CC051E8000
heap
page read and write
1CC051B7000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC089E0000
trusted library allocation
page read and write
1CC09421000
trusted library allocation
page read and write
1CC139EE000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC0FD5F000
trusted library allocation
page read and write
1CC09873000
trusted library allocation
page read and write
1CC098CE000
trusted library allocation
page read and write
1CC089EA000
trusted library allocation
page read and write
2BC97AB0000
heap
page read and write
1CC09678000
trusted library allocation
page read and write
1CC145E8000
trusted library allocation
page read and write
1CC7EB41000
heap
page read and write
1CC08DB3000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC0FFC3000
trusted library allocation
page read and write
1CC09C8E000
trusted library allocation
page read and write
1CC13979000
trusted library allocation
page read and write
1CC07E81000
trusted library allocation
page read and write
1CC142C2000
trusted library allocation
page read and write
1CC103B0000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
1CC085EA000
trusted library allocation
page read and write
1CC7FB56000
trusted library allocation
page read and write
1CC09689000
trusted library allocation
page read and write
D7A5BFE000
unkown
page readonly
1CC7EB64000
heap
page read and write
1CC7EB37000
heap
page read and write
1CC14826000
heap
page read and write
1CC7ED6D000
trusted library allocation
page read and write
1CC0FF87000
trusted library allocation
page read and write
1CC0B8F3000
trusted library allocation
page read and write
1CC10274000
trusted library allocation
page read and write
1CC0C127000
trusted library allocation
page read and write
1CC0A6D2000
trusted library allocation
page read and write
1CC084C7000
trusted library allocation
page read and write
1CC0FEC2000
trusted library allocation
page read and write
1CC098AC000
trusted library allocation
page read and write
1CC099D1000
trusted library allocation
page read and write
218EA320000
heap
page read and write
1CC0FD41000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC0998D000
trusted library allocation
page read and write
1CC09675000
trusted library allocation
page read and write
1CC07DB3000
trusted library allocation
page read and write
1CC09D36000
trusted library allocation
page read and write
1CC09B86000
trusted library allocation
page read and write
1CC1476C000
trusted library allocation
page read and write
1CC103BC000
trusted library allocation
page read and write
1CC7EB80000
heap
page read and write
1CC09A50000
trusted library allocation
page read and write
1CC090BA000
trusted library allocation
page read and write
1CC0AC68000
trusted library allocation
page read and write
1CC143EB000
trusted library allocation
page read and write
1CC0A71A000
trusted library allocation
page read and write
1CC13ED8000
trusted library allocation
page read and write
1CC143F1000
trusted library allocation
page read and write
1CC0B67E000
trusted library allocation
page read and write
1CC13EC8000
trusted library allocation
page read and write
155F000
heap
page read and write
1CC10298000
trusted library allocation
page read and write
1CC08238000
trusted library allocation
page read and write
1CC09989000
trusted library allocation
page read and write
1CC0FD3C000
trusted library allocation
page read and write
1502E203000
trusted library allocation
page read and write
218EA32C000
heap
page read and write
1CC7EB4F000
heap
page read and write
1CC126C5000
trusted library allocation
page read and write
1CC7FBD9000
trusted library allocation
page read and write
1CC07B70000
trusted library allocation
page read and write
1CC0898E000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC14383000
trusted library allocation
page read and write
1CC0FD41000
trusted library allocation
page read and write
1502E00F000
unclassified section
page read and write
1CC078F2000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC09A99000
trusted library allocation
page read and write
1CC08FD9000
trusted library allocation
page read and write
1CC77DEA000
trusted library allocation
page read and write
1CC7EB6C000
heap
page read and write
218E9300000
unclassified section
page readonly
1CC083CD000
trusted library allocation
page read and write
218E9390000
heap
page read and write
1CC100F7000
trusted library allocation
page read and write
1CC0FD6E000
trusted library allocation
page read and write
1CC7EB73000
heap
page read and write
1CC13EC8000
trusted library allocation
page read and write
1CC0927B000
trusted library allocation
page read and write
1CC143ED000
trusted library allocation
page read and write
1CC139FA000
trusted library allocation
page read and write
1CC10361000
trusted library allocation
page read and write
1CC139B1000
trusted library allocation
page read and write
1CC092E0000
trusted library allocation
page read and write
1CC08C7B000
trusted library allocation
page read and write
1CC0ACC9000
trusted library allocation
page read and write
1CC0B694000
trusted library allocation
page read and write
1CC13F8A000
trusted library allocation
page read and write
1CC099D4000
trusted library allocation
page read and write
1CC0FFB3000
trusted library allocation
page read and write
1CC090F8000
trusted library allocation
page read and write
1553000
heap
page read and write
1CC103B5000
trusted library allocation
page read and write
1CC1463C000
trusted library allocation
page read and write
1CC0518F000
heap
page read and write
1CC1037B000
trusted library allocation
page read and write
1CC09A17000
trusted library allocation
page read and write
1CC0838D000
trusted library allocation
page read and write
1CC07DE7000
trusted library allocation
page read and write
1CC0FF47000
trusted library allocation
page read and write
1CC09D43000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC07E6E000
trusted library allocation
page read and write
1CC126A3000
trusted library allocation
page read and write
1CC0BB9E000
trusted library allocation
page read and write
1CC7EB9F000
heap
page read and write
1CC1486D000
heap
page read and write
1CC0519E000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC0FFF8000
trusted library allocation
page read and write
1CC14763000
trusted library allocation
page read and write
1CC7EB43000
heap
page read and write
1CC103B2000
trusted library allocation
page read and write
1CC0A9CE000
trusted library allocation
page read and write
1CC103AC000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC090E5000
trusted library allocation
page read and write
1CC093AC000
trusted library allocation
page read and write
1CC0A97B000
trusted library allocation
page read and write
1CC7EB2E000
heap
page read and write
52459FE000
stack
page read and write
1CC09909000
trusted library allocation
page read and write
1CC07B64000
trusted library allocation
page read and write
1CC099D5000
trusted library allocation
page read and write
218E9723000
trusted library allocation
page read and write
1CC099F6000
trusted library allocation
page read and write
1CC07DCE000
trusted library allocation
page read and write
1CC7EB3B000
heap
page read and write
1CC09DE6000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC07E93000
trusted library allocation
page read and write
1CC09AB8000
trusted library allocation
page read and write
1CC104C0000
trusted library allocation
page read and write
1CC7F3E3000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
1CC07E51000
trusted library allocation
page read and write
1CC0AC65000
trusted library allocation
page read and write
1CC7EB28000
heap
page read and write
1CC08D9D000
trusted library allocation
page read and write
218E95E0000
trusted library allocation
page read and write
1CC0B7C4000
trusted library allocation
page read and write
1CC13E67000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
1CC051A2000
heap
page read and write
1CC0992B000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC102A2000
trusted library allocation
page read and write
1CC10227000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC0B8BB000
trusted library allocation
page read and write
1CC08C49000
trusted library allocation
page read and write
1CC085F3000
trusted library allocation
page read and write
1DEE000
stack
page read and write
1CC14801000
heap
page read and write
1CC0A9E6000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC0A9C9000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC08487000
trusted library allocation
page read and write
1CC09A12000
trusted library allocation
page read and write
1CC0A57C000
trusted library allocation
page read and write
1CC7ED61000
trusted library allocation
page read and write
1CC1426F000
trusted library allocation
page read and write
1CC0B8E3000
trusted library allocation
page read and write
1CC098DA000
trusted library allocation
page read and write
218EA328000
heap
page read and write
1CC0FEFB000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0BBE4000
trusted library allocation
page read and write
1CC0967A000
trusted library allocation
page read and write
1CC0FCF2000
trusted library allocation
page read and write
1CC098EF000
trusted library allocation
page read and write
1CC0FD39000
trusted library allocation
page read and write
1CC09234000
trusted library allocation
page read and write
1CC07E57000
trusted library allocation
page read and write
1CC7EAFA000
heap
page read and write
1CC7EC98000
trusted library allocation
page read and write
1CC7FBE2000
trusted library allocation
page read and write
218EA3A9000
heap
page read and write
1CC0FD3F000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC08C78000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC0A9A9000
trusted library allocation
page read and write
1CC099FD000
trusted library allocation
page read and write
1CC7EB82000
heap
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1460000
heap
page read and write
1CC083D6000
trusted library allocation
page read and write
1CC08D8B000
trusted library allocation
page read and write
1CC10290000
trusted library allocation
page read and write
1CC0B7DF000
trusted library allocation
page read and write
1CC09879000
trusted library allocation
page read and write
1CC08C72000
trusted library allocation
page read and write
1CC7ECB3000
trusted library allocation
page read and write
1CC7EB1D000
heap
page read and write
1CC0FD2A000
trusted library allocation
page read and write
1CC1456A000
trusted library allocation
page read and write
1CC104CA000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC102AA000
trusted library allocation
page read and write
1CC09ECF000
trusted library allocation
page read and write
1CC09EC5000
trusted library allocation
page read and write
1CC08361000
trusted library allocation
page read and write
1CC078C2000
trusted library allocation
page read and write
218EA331000
heap
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC09CB4000
trusted library allocation
page read and write
1CC14956000
heap
page read and write
1CC07BAE000
trusted library allocation
page read and write
1CC09F83000
trusted library allocation
page read and write
1CC102DD000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC100EB000
trusted library allocation
page read and write
1CC12AD1000
trusted library allocation
page read and write
1CC0ACE9000
trusted library allocation
page read and write
1CC09386000
trusted library allocation
page read and write
218E97BA000
trusted library allocation
page read and write
1CC118A8000
trusted library allocation
page read and write
1CC7EB0F000
heap
page read and write
1CC099E2000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC1016C000
trusted library allocation
page read and write
1CC0B88A000
trusted library allocation
page read and write
1CC0A697000
trusted library allocation
page read and write
1CC0FDA7000
trusted library allocation
page read and write
1CC12643000
trusted library allocation
page read and write
1CC7F3FE000
trusted library allocation
page read and write
1CC7EB30000
heap
page read and write
1CC0A6A5000
trusted library allocation
page read and write
1CC14670000
trusted library allocation
page read and write
1CC0AC68000
trusted library allocation
page read and write
1CC7EB2F000
heap
page read and write
1CC7EB62000
heap
page read and write
1502E030000
heap
page read and write
1CC099FC000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC1461F000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC7EB0F000
heap
page read and write
1CC05199000
heap
page read and write
1CC051A0000
heap
page read and write
1F813253000
heap
page read and write
1CC07ECA000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
218EA36A000
heap
page read and write
1CC10163000
trusted library allocation
page read and write
1CC08CEA000
trusted library allocation
page read and write
1CC7F326000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
CD589FB000
stack
page read and write
1CC094D4000
trusted library allocation
page read and write
1CC12AEE000
trusted library allocation
page read and write
1CC0B7E1000
trusted library allocation
page read and write
1CC07EA8000
trusted library allocation
page read and write
1CC09D4C000
trusted library allocation
page read and write
1CC7EB35000
heap
page read and write
1CC13998000
trusted library allocation
page read and write
1502E43B000
trusted library allocation
page read and write
1CC07DE1000
trusted library allocation
page read and write
1CC14633000
trusted library allocation
page read and write
1CC0845B000
trusted library allocation
page read and write
1CC051E9000
heap
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC092F7000
trusted library allocation
page read and write
1CC7EB36000
heap
page read and write
1CC1486D000
heap
page read and write
1CC7EB37000
heap
page read and write
218E92F0000
unclassified section
page readonly
1CC101B9000
trusted library allocation
page read and write
1CC7EBA0000
heap
page read and write
218E9840000
heap
page read and write
1CC103A0000
trusted library allocation
page read and write
1CC07E4F000
trusted library allocation
page read and write
1CC10285000
trusted library allocation
page read and write
218E976A000
trusted library allocation
page read and write
1CC13116000
trusted library allocation
page read and write
1CC0946B000
trusted library allocation
page read and write
1CC07BAE000
trusted library allocation
page read and write
1CC09857000
trusted library allocation
page read and write
1CC0AC20000
trusted library allocation
page read and write
1CC7EB82000
heap
page read and write
1CC0ACB6000
trusted library allocation
page read and write
1CC0CA02000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC7EB3B000
heap
page read and write
1CC051A0000
heap
page read and write
1CC07B6F000
trusted library allocation
page read and write
1CC07BA0000
trusted library allocation
page read and write
1CC08377000
trusted library allocation
page read and write
1CC7F686000
trusted library allocation
page read and write
1CC07DE1000
trusted library allocation
page read and write
1CC0963E000
trusted library allocation
page read and write
1CC10374000
trusted library allocation
page read and write
1CC05180000
heap
page read and write
1F81367A000
trusted library allocation
page read and write
1CC1011E000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC0FE79000
trusted library allocation
page read and write
1CC0FCC8000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC0AC1D000
trusted library allocation
page read and write
1CC0949B000
trusted library allocation
page read and write
1CC098DA000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
410FFFE000
stack
page read and write
1CC7EB7E000
heap
page read and write
1CC14875000
heap
page read and write
1CC0B6D3000
trusted library allocation
page read and write
218EA36D000
heap
page read and write
1CC104DC000
trusted library allocation
page read and write
1CC0B6B3000
trusted library allocation
page read and write
1CC0A9FD000
trusted library allocation
page read and write
D7A4BFE000
unkown
page readonly
1CC7EB29000
heap
page read and write
1CC10279000
trusted library allocation
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC145A1000
trusted library allocation
page read and write
1CC09C9D000
trusted library allocation
page read and write
2BC997A8000
heap
page read and write
1CC7EB3B000
heap
page read and write
1CC0FD5F000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC090E7000
trusted library allocation
page read and write
1CC09ED3000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC0BB84000
trusted library allocation
page read and write
1CC1049D000
trusted library allocation
page read and write
1CC1426F000
trusted library allocation
page read and write
1CC10027000
trusted library allocation
page read and write
1CC05199000
heap
page read and write
218EA36A000
heap
page read and write
1CC099F4000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC098EF000
trusted library allocation
page read and write
1F813624000
trusted library allocation
page read and write
1CC094CD000
trusted library allocation
page read and write
1CC0A4FE000
trusted library allocation
page read and write
1CC13EDC000
trusted library allocation
page read and write
2BC97F00000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
218EA2CD000
heap
page read and write
1CC0B6FB000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC08C7F000
trusted library allocation
page read and write
1CC7ED43000
trusted library allocation
page read and write
1CC08D35000
trusted library allocation
page read and write
1CC0A679000
trusted library allocation
page read and write
1CC7EC55000
trusted library allocation
page read and write
1CC7EB2E000
heap
page read and write
1CC099C5000
trusted library allocation
page read and write
1CC7EB89000
heap
page read and write
1CC7ED50000
trusted library allocation
page read and write
1CC0FDB7000
trusted library allocation
page read and write
1CC7EB6E000
heap
page read and write
1CC09395000
trusted library allocation
page read and write
1CC0FC7F000
trusted library allocation
page read and write
1CC0BBC5000
trusted library allocation
page read and write
1CC09FEA000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC08481000
trusted library allocation
page read and write
1CC099C7000
trusted library allocation
page read and write
1CC14385000
trusted library allocation
page read and write
1CC7EB2F000
heap
page read and write
1CC08367000
trusted library allocation
page read and write
1CC7EDAD000
trusted library allocation
page read and write
1CC092D0000
trusted library allocation
page read and write
1F813682000
trusted library allocation
page read and write
1CC103BE000
trusted library allocation
page read and write
1CC10225000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC7EB2B000
heap
page read and write
1CC085A3000
trusted library allocation
page read and write
1CC7ED35000
trusted library allocation
page read and write
1CC100F7000
trusted library allocation
page read and write
1CC7EB38000
heap
page read and write
218EA33D000
heap
page read and write
1CC143F3000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC0A8CF000
trusted library allocation
page read and write
1CC0849D000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB25000
heap
page read and write
1CC7EB33000
heap
page read and write
1CC08DF9000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
1CC08C5D000
trusted library allocation
page read and write
1CC0983A000
trusted library allocation
page read and write
218E9CB0000
heap
page read and write
1CC092F1000
trusted library allocation
page read and write
A91000
unkown
page execute read
1CC083DD000
trusted library allocation
page read and write
1CC099C1000
trusted library allocation
page read and write
1CC1039F000
trusted library allocation
page read and write
1CC7EAFB000
heap
page read and write
1CC09455000
trusted library allocation
page read and write
1CC1471C000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB6C000
heap
page read and write
1CC145EA000
trusted library allocation
page read and write
218EA2A9000
heap
page read and write
1CC0AA00000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC0FD74000
trusted library allocation
page read and write
1CC7EB82000
heap
page read and write
2BC997AC000
heap
page read and write
1CC09968000
trusted library allocation
page read and write
1CC08C4D000
trusted library allocation
page read and write
1CC13E9C000
trusted library allocation
page read and write
1CC09A46000
trusted library allocation
page read and write
1CC0938F000
trusted library allocation
page read and write
1CC7EB09000
heap
page read and write
1CC7ED83000
trusted library allocation
page read and write
1CC0B8E3000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC12605000
trusted library allocation
page read and write
1CC103EE000
trusted library allocation
page read and write
1CC07E19000
trusted library allocation
page read and write
1CC7EAEF000
heap
page read and write
218E9600000
trusted library allocation
page read and write
1CC0BB43000
trusted library allocation
page read and write
1CC078DF000
trusted library allocation
page read and write
1F813500000
trusted library allocation
page read and write
1CC078E7000
trusted library allocation
page read and write
218EA36A000
heap
page read and write
1CC09D70000
trusted library allocation
page read and write
1CC0ACCF000
trusted library allocation
page read and write
1CC09D70000
trusted library allocation
page read and write
1CC0FD32000
trusted library allocation
page read and write
1502DE50000
remote allocation
page read and write
218EA331000
heap
page read and write
1CC08DBC000
trusted library allocation
page read and write
1CC08CDD000
trusted library allocation
page read and write
1CC0FD74000
trusted library allocation
page read and write
1CC101A4000
trusted library allocation
page read and write
1CC13E73000
trusted library allocation
page read and write
1CC09ACF000
trusted library allocation
page read and write
1CC09EFD000
trusted library allocation
page read and write
1CC103F1000
trusted library allocation
page read and write
1CC092B4000
trusted library allocation
page read and write
1CC0826E000
trusted library allocation
page read and write
1CC1028F000
trusted library allocation
page read and write
1CC09898000
trusted library allocation
page read and write
1CC08384000
trusted library allocation
page read and write
1CC12686000
trusted library allocation
page read and write
1CC07DA7000
trusted library allocation
page read and write
1CC100CF000
trusted library allocation
page read and write
1CC0B62E000
trusted library allocation
page read and write
1CC103F2000
trusted library allocation
page read and write
1CC7EB6E000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC14801000
heap
page read and write
1CC10161000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC10258000
trusted library allocation
page read and write
1CC08DAA000
trusted library allocation
page read and write
1CC0849B000
trusted library allocation
page read and write
1CC083E8000
trusted library allocation
page read and write
52484BE000
stack
page read and write
1CC7EB32000
heap
page read and write
1CC7ED69000
trusted library allocation
page read and write
1CC77DFE000
trusted library allocation
page read and write
1CC7EB75000
heap
page read and write
1CC0519C000
heap
page read and write
1F813667000
trusted library allocation
page read and write
1CC09997000
trusted library allocation
page read and write
1CC1437F000
trusted library allocation
page read and write
218E93B0000
heap
page read and write
1CC0A523000
trusted library allocation
page read and write
1CC14666000
trusted library allocation
page read and write
1CC14627000
trusted library allocation
page read and write
1CC7EDD7000
trusted library allocation
page read and write
1CC098F8000
trusted library allocation
page read and write
1CC083E8000
trusted library allocation
page read and write
1CC134F1000
trusted library allocation
page read and write
1CC7EB10000
heap
page read and write
1CC09997000
trusted library allocation
page read and write
1CC0FD6B000
trusted library allocation
page read and write
1CC7EB2D000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC0936C000
trusted library allocation
page read and write
1CC09279000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC104DA000
trusted library allocation
page read and write
2BC97F0A000
trusted library allocation
page read and write
1CC085F8000
trusted library allocation
page read and write
1CC13EDA000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC14865000
heap
page read and write
1CC0942E000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC0B64C000
trusted library allocation
page read and write
218EA249000
heap
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC092C1000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC14251000
trusted library allocation
page read and write
218EA2AC000
heap
page read and write
1CC1266D000
trusted library allocation
page read and write
1CC7EB4F000
heap
page read and write
1CC09999000
trusted library allocation
page read and write
1CC0FD43000
trusted library allocation
page read and write
1CC07D7F000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
1CC0FDED000
trusted library allocation
page read and write
1CC1036D000
trusted library allocation
page read and write
1CC09EC8000
trusted library allocation
page read and write
1CC078E4000
trusted library allocation
page read and write
1CC0FD74000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC7EDE0000
trusted library allocation
page read and write
1CC14875000
heap
page read and write
1CC098EC000
trusted library allocation
page read and write
218E95F0000
unkown
page execute read
1CC7ED26000
trusted library allocation
page read and write
1CC0B8BB000
trusted library allocation
page read and write
1CC14254000
trusted library allocation
page read and write
1CC0988C000
trusted library allocation
page read and write
1CC09651000
trusted library allocation
page read and write
1CC08CD9000
trusted library allocation
page read and write
1CC051B0000
heap
page read and write
1CC0517A000
heap
page read and write
CD589FF000
stack
page read and write
2BC997B5000
heap
page read and write
1CC0939D000
trusted library allocation
page read and write
1CC09EEB000
trusted library allocation
page read and write
1CC07E8F000
trusted library allocation
page read and write
1CC0FC8B000
trusted library allocation
page read and write
1CC0FDAB000
trusted library allocation
page read and write
1CC14656000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC08384000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1F813430000
unclassified section
page readonly
1CC0B8E3000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC0FDDA000
trusted library allocation
page read and write
1CC0C164000
trusted library allocation
page read and write
1CC0FD55000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC07BB8000
trusted library allocation
page read and write
1F813220000
unclassified section
page readonly
1CC7EB6A000
heap
page read and write
1CC10143000
trusted library allocation
page read and write
1CC098EF000
trusted library allocation
page read and write
1CC0A7DA000
trusted library allocation
page read and write
1CC14863000
heap
page read and write
1CC7EB0F000
heap
page read and write
1CC083CB000
trusted library allocation
page read and write
1CC1312F000
trusted library allocation
page read and write
1CC09DE6000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC0B88A000
trusted library allocation
page read and write
1CC0B8ED000
trusted library allocation
page read and write
1CC09EC0000
trusted library allocation
page read and write
1CC0A8D2000
trusted library allocation
page read and write
1CC7ECEF000
trusted library allocation
page read and write
1CC7EB3B000
heap
page read and write
1CC09CB4000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC08000000
trusted library allocation
page read and write
1CC7EB74000
heap
page read and write
1CC0FE93000
trusted library allocation
page read and write
1F8131A0000
unclassified section
page readonly
1CC100CF000
trusted library allocation
page read and write
1CC7EB4F000
heap
page read and write
1CC09CBE000
trusted library allocation
page read and write
1CC08535000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC7FB7C000
trusted library allocation
page read and write
1CC08544000
trusted library allocation
page read and write
1CC092CA000
trusted library allocation
page read and write
1CC0A2B8000
trusted library allocation
page read and write
1CC093C3000
trusted library allocation
page read and write
1CC7EC88000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC7EC90000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC0941D000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC102FE000
trusted library allocation
page read and write
1CC7EDCC000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
218EA398000
heap
page read and write
1CC0C106000
trusted library allocation
page read and write
1CC099D7000
trusted library allocation
page read and write
1CC097E2000
trusted library allocation
page read and write
1502E415000
trusted library allocation
page read and write
1CC0A6C4000
trusted library allocation
page read and write
1CC126E4000
trusted library allocation
page read and write
1CC139A3000
trusted library allocation
page read and write
1CC0924E000
trusted library allocation
page read and write
1CC0A8D6000
trusted library allocation
page read and write
1CC09FFB000
trusted library allocation
page read and write
1CC14806000
heap
page read and write
1F813673000
trusted library allocation
page read and write
1CC0FD66000
trusted library allocation
page read and write
1CC09933000
trusted library allocation
page read and write
1CC09EA3000
trusted library allocation
page read and write
1CC12757000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC083EE000
trusted library allocation
page read and write
1CC7EB75000
heap
page read and write
1CC0BBA7000
trusted library allocation
page read and write
218EA2E8000
heap
page read and write
1CC10227000
trusted library allocation
page read and write
1CC1457A000
trusted library allocation
page read and write
1CC0ACB2000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC0A8D2000
trusted library allocation
page read and write
1CC7ED87000
trusted library allocation
page read and write
1CC0B7DC000
trusted library allocation
page read and write
1CC139D1000
trusted library allocation
page read and write
1CC0FFC9000
trusted library allocation
page read and write
1CC7FBA8000
trusted library allocation
page read and write
1CC0838D000
trusted library allocation
page read and write
2BC97C79000
heap
page read and write
1521E700000
trusted library allocation
page read and write
1502E294000
trusted library allocation
page read and write
1CC08CEF000
trusted library allocation
page read and write
1CC7F3B6000
trusted library allocation
page read and write
1CC10225000
trusted library allocation
page read and write
1CC09469000
trusted library allocation
page read and write
1CC07BC7000
trusted library allocation
page read and write
1CC09C9C000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC09657000
trusted library allocation
page read and write
1CC0B819000
trusted library allocation
page read and write
1CC07BE6000
trusted library allocation
page read and write
1CC078F9000
trusted library allocation
page read and write
218EA29C000
heap
page read and write
1CC09FE5000
trusted library allocation
page read and write
1CC14224000
trusted library allocation
page read and write
1CC0FEC6000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC0787C000
trusted library allocation
page read and write
1CC0A9BA000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC10225000
trusted library allocation
page read and write
1CC07EAD000
trusted library allocation
page read and write
1CC0A89E000
trusted library allocation
page read and write
1CC145D5000
trusted library allocation
page read and write
1CC08CF8000
trusted library allocation
page read and write
1CC07E45000
trusted library allocation
page read and write
1CC10234000
trusted library allocation
page read and write
218EA2DC000
heap
page read and write
1CC09DE6000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC09EC5000
trusted library allocation
page read and write
1502E002000
unclassified section
page read and write
1CC7EB19000
heap
page read and write
1CC09DEA000
trusted library allocation
page read and write
1CC0FEA8000
trusted library allocation
page read and write
1CC0AC22000
trusted library allocation
page read and write
1CC0A745000
trusted library allocation
page read and write
1CC0FFB3000
trusted library allocation
page read and write
1CC099D1000
trusted library allocation
page read and write
1CC7EB79000
heap
page read and write
1CC09CE4000
trusted library allocation
page read and write
1CC13F50000
trusted library allocation
page read and write
1CC08540000
trusted library allocation
page read and write
1CC0966E000
trusted library allocation
page read and write
1CC0ACF0000
trusted library allocation
page read and write
1CC139C3000
trusted library allocation
page read and write
1CC142C9000
trusted library allocation
page read and write
1CC051A6000
heap
page read and write
1CC098E6000
trusted library allocation
page read and write
1CC10399000
trusted library allocation
page read and write
1CC7EB0F000
heap
page read and write
1CC08DF9000
trusted library allocation
page read and write
1CC08345000
trusted library allocation
page read and write
1CC7EB9F000
heap
page read and write
1CC08C80000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC08494000
trusted library allocation
page read and write
1CC083E8000
trusted library allocation
page read and write
1CC0852E000
trusted library allocation
page read and write
1CC07BBE000
trusted library allocation
page read and write
1CC12351000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC0FFDF000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC102DD000
trusted library allocation
page read and write
1CC08CB4000
trusted library allocation
page read and write
1CC08DCD000
trusted library allocation
page read and write
1CC0ACCE000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC09644000
trusted library allocation
page read and write
1CC0FDC1000
trusted library allocation
page read and write
1CC0B6C8000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC0A2E7000
trusted library allocation
page read and write
1CC09DBC000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC1011E000
trusted library allocation
page read and write
1CC1464E000
trusted library allocation
page read and write
1CC0FD4F000
trusted library allocation
page read and write
33DDFFE000
stack
page read and write
1CC7EB43000
heap
page read and write
1CC0B8B8000
trusted library allocation
page read and write
1CC09276000
trusted library allocation
page read and write
1CC10277000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC134E8000
trusted library allocation
page read and write
1CC10375000
trusted library allocation
page read and write
1CC0A7C2000
trusted library allocation
page read and write
1CC7ED07000
trusted library allocation
page read and write
1CC0FD39000
trusted library allocation
page read and write
1CC051A0000
heap
page read and write
1CC14656000
trusted library allocation
page read and write
1F8137D4000
heap
page read and write
D7A43FE000
stack
page read and write
1CC13493000
trusted library allocation
page read and write
1CC0A97F000
trusted library allocation
page read and write
1CC07BDE000
trusted library allocation
page read and write
1CC096DE000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC10270000
trusted library allocation
page read and write
3F31000
heap
page read and write
1CC7ED40000
trusted library allocation
page read and write
1CC142A4000
trusted library allocation
page read and write
1CC1464E000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1F813250000
heap
page read and write
1CC7EB9F000
heap
page read and write
1CC09C9C000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC14230000
trusted library allocation
page read and write
1CC0FF54000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
218EA384000
heap
page read and write
1CC09A35000
trusted library allocation
page read and write
1CC143F7000
trusted library allocation
page read and write
1CC08C5C000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC0980A000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC08FE7000
trusted library allocation
page read and write
1CC1029D000
trusted library allocation
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC082A2000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC08C6A000
trusted library allocation
page read and write
2260000
heap
page read and write
1CC139B9000
trusted library allocation
page read and write
1CC09DC8000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC096C7000
trusted library allocation
page read and write
1CC09A84000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC7EAFE000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC0A597000
trusted library allocation
page read and write
1CC09A8D000
trusted library allocation
page read and write
1CC7EB80000
heap
page read and write
1CC139FE000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC104DC000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC090BC000
trusted library allocation
page read and write
1CC093C3000
trusted library allocation
page read and write
1CC7EAF6000
heap
page read and write
218EA398000
heap
page read and write
1CC078B6000
trusted library allocation
page read and write
1CC7ED9A000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC0ACCB000
trusted library allocation
page read and write
1CC0A8D9000
trusted library allocation
page read and write
1CC0BA83000
trusted library allocation
page read and write
1CC10391000
trusted library allocation
page read and write
1CC103E1000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC0B86A000
trusted library allocation
page read and write
218EA329000
heap
page read and write
1CC0C1AE000
trusted library allocation
page read and write
1CC7FBDB000
trusted library allocation
page read and write
1CC10143000
trusted library allocation
page read and write
1CC09CB4000
trusted library allocation
page read and write
1CC07BAE000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
218EA3A9000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC0964B000
trusted library allocation
page read and write
1502DFF0000
heap
page readonly
1CC084B2000
trusted library allocation
page read and write
1CC10500000
trusted library allocation
page read and write
1CC1012A000
trusted library allocation
page read and write
1CC0AC65000
trusted library allocation
page read and write
1CC085DA000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC134D2000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC7FBA8000
trusted library allocation
page read and write
1CC14801000
heap
page read and write
1CC104C0000
trusted library allocation
page read and write
1CC1429A000
trusted library allocation
page read and write
218E95F4000
unkown
page execute read
5247BFE000
unkown
page readonly
1CC0A8C8000
trusted library allocation
page read and write
1CC10361000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC08DB5000
trusted library allocation
page read and write
1CC099B3000
trusted library allocation
page read and write
1CC7EB72000
heap
page read and write
1CC07E93000
trusted library allocation
page read and write
1CC09C95000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB3C000
heap
page read and write
1CC102C6000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC078C7000
trusted library allocation
page read and write
1CC7EAEF000
heap
page read and write
1CC09ABB000
trusted library allocation
page read and write
1CC08280000
trusted library allocation
page read and write
1CC1272E000
trusted library allocation
page read and write
1CC12607000
trusted library allocation
page read and write
1CC7EB31000
heap
page read and write
1CC08D88000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC1264D000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC7EB37000
heap
page read and write
1CC0FFFB000
trusted library allocation
page read and write
1CC08374000
trusted library allocation
page read and write
1CC7F2F6000
trusted library allocation
page read and write
1CC7EBA3000
heap
page read and write
1CC100E4000
trusted library allocation
page read and write
1CC0B8C6000
trusted library allocation
page read and write
1CC09B32000
trusted library allocation
page read and write
1CC08CD9000
trusted library allocation
page read and write
1CC083A2000
trusted library allocation
page read and write
1CC099B7000
trusted library allocation
page read and write
1CC078C7000
trusted library allocation
page read and write
1CC09CA4000
trusted library allocation
page read and write
1CC0FDED000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB2C000
heap
page read and write
1CC099C7000
trusted library allocation
page read and write
1CC103AC000
trusted library allocation
page read and write
1CC1436F000
trusted library allocation
page read and write
1CC0FD74000
trusted library allocation
page read and write
1CC09D4C000
trusted library allocation
page read and write
1CC100AB000
trusted library allocation
page read and write
1CC0B85D000
trusted library allocation
page read and write
1CC082CB000
trusted library allocation
page read and write
1CC0FD4F000
trusted library allocation
page read and write
1CC098F1000
trusted library allocation
page read and write
13FE000
stack
page read and write
1CC098CE000
trusted library allocation
page read and write
1CC145FA000
trusted library allocation
page read and write
1CC07BDE000
trusted library allocation
page read and write
1CC09CA2000
trusted library allocation
page read and write
1CC1039C000
trusted library allocation
page read and write
1F813613000
trusted library allocation
page read and write
1CC08269000
trusted library allocation
page read and write
1CC083AB000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC7F677000
trusted library allocation
page read and write
218EA3B7000
heap
page read and write
1CC1424B000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC0FFC9000
trusted library allocation
page read and write
1CC0FD43000
trusted library allocation
page read and write
1CC08490000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC7F6A0000
trusted library allocation
page read and write
1CC097EF000
trusted library allocation
page read and write
1CC14874000
heap
page read and write
1CC0ACFA000
trusted library allocation
page read and write
1CC1463C000
trusted library allocation
page read and write
1CC7EAFB000
heap
page read and write
1CC0B8FC000
trusted library allocation
page read and write
1CC7ED5F000
trusted library allocation
page read and write
1CC09663000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1502DF80000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC14868000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC09C8C000
trusted library allocation
page read and write
1CC0BC06000
trusted library allocation
page read and write
1CC7F6B9000
trusted library allocation
page read and write
1502DE64000
remote allocation
page execute read
1CC7EAF6000
heap
page read and write
1CC08490000
trusted library allocation
page read and write
1CC092E7000
trusted library allocation
page read and write
1CC100CF000
trusted library allocation
page read and write
1CC08C0A000
trusted library allocation
page read and write
3D9D7FF1000
trusted library allocation
page execute read
1CC139FA000
trusted library allocation
page read and write
1CC07E37000
trusted library allocation
page read and write
1CC099A4000
trusted library allocation
page read and write
1CC0A9B4000
trusted library allocation
page read and write
1CC0517A000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC7EB6E000
heap
page read and write
218EA398000
heap
page read and write
1CC7EB32000
heap
page read and write
1CC099E2000
trusted library allocation
page read and write
1CC0825F000
trusted library allocation
page read and write
1CC10392000
trusted library allocation
page read and write
1CC09CF8000
trusted library allocation
page read and write
1CC0FFEA000
trusted library allocation
page read and write
1CC098D5000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC08C3B000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC0519E000
heap
page read and write
1CC08C30000
trusted library allocation
page read and write
1CC08FEE000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC0A5E1000
trusted library allocation
page read and write
1CC09DF2000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
52463D8000
stack
page read and write
1CC07BA7000
trusted library allocation
page read and write
1CC7EB1F000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC0939C000
trusted library allocation
page read and write
1CC085FA000
trusted library allocation
page read and write
1CC0846D000
trusted library allocation
page read and write
1CC08FF9000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
155F000
heap
page read and write
1F813240000
heap
page read and write
1CC0A2E7000
trusted library allocation
page read and write
1CC1044A000
trusted library allocation
page read and write
1CC07BE2000
trusted library allocation
page read and write
1CC0B6B5000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC0A6C0000
trusted library allocation
page read and write
1CC1260C000
trusted library allocation
page read and write
1CC10277000
trusted library allocation
page read and write
1CC103A3000
trusted library allocation
page read and write
1502E272000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC085FD000
trusted library allocation
page read and write
1CC051A1000
heap
page read and write
1CC7EB62000
heap
page read and write
1CC14650000
trusted library allocation
page read and write
1CC7EAF0000
heap
page read and write
1CC09957000
trusted library allocation
page read and write
1CC0A261000
trusted library allocation
page read and write
1CC10276000
trusted library allocation
page read and write
1CC7F6FB000
trusted library allocation
page read and write
1CC7EC81000
trusted library allocation
page read and write
1CC0A748000
trusted library allocation
page read and write
2BC97C62000
heap
page read and write
1CC09997000
trusted library allocation
page read and write
1CC1316D000
trusted library allocation
page read and write
1CC08481000
trusted library allocation
page read and write
1CC09DBC000
trusted library allocation
page read and write
218E9560000
trusted library allocation
page read and write
1CC14291000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC7ED37000
trusted library allocation
page read and write
1CC7FB79000
trusted library allocation
page read and write
1CC09FFB000
trusted library allocation
page read and write
1CC7EB3A000
heap
page read and write
1CC0994D000
trusted library allocation
page read and write
1CC0FEF0000
trusted library allocation
page read and write
1CC08C1A000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC07C3A000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1567000
heap
page read and write
1CC7EB8A000
heap
page read and write
1CC14868000
heap
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC1475F000
trusted library allocation
page read and write
1CC7EBA3000
heap
page read and write
1CC09FEA000
trusted library allocation
page read and write
1CC10368000
trusted library allocation
page read and write
1CC7EB2F000
heap
page read and write
1CC13EB7000
trusted library allocation
page read and write
1CC0B6C8000
trusted library allocation
page read and write
1CC07E8D000
trusted library allocation
page read and write
2BC997B6000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC104BB000
trusted library allocation
page read and write
1CC09CA2000
trusted library allocation
page read and write
2BC997B9000
heap
page read and write
1CC7EB4D000
heap
page read and write
1CC090FC000
trusted library allocation
page read and write
A90000
unkown
page readonly
1CC10445000
trusted library allocation
page read and write
1CC7EB28000
heap
page read and write
1CC09DBC000
trusted library allocation
page read and write
1CC07BA5000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC09863000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC08270000
trusted library allocation
page read and write
1CC1432A000
trusted library allocation
page read and write
1CC099CF000
trusted library allocation
page read and write
1CC1454F000
trusted library allocation
page read and write
1CC7EB34000
heap
page read and write
1CC094D2000
trusted library allocation
page read and write
A90000
unkown
page readonly
1CC134F1000
trusted library allocation
page read and write
1CC09653000
trusted library allocation
page read and write
1CC103C3000
trusted library allocation
page read and write
1CC0A98B000
trusted library allocation
page read and write
1CC145C2000
trusted library allocation
page read and write
1CC09881000
trusted library allocation
page read and write
1CC09AA2000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC07DF6000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC7EB6B000
heap
page read and write
1CC103AC000
trusted library allocation
page read and write
1CC09667000
trusted library allocation
page read and write
218E979F000
trusted library allocation
page read and write
1CC09CE6000
trusted library allocation
page read and write
1CC09EFA000
trusted library allocation
page read and write
1CC08C73000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC07EAB000
trusted library allocation
page read and write
1CC14711000
trusted library allocation
page read and write
1CC7FB50000
trusted library allocation
page read and write
1CC0A9A9000
trusted library allocation
page read and write
1CC07D54000
trusted library allocation
page read and write
1CC09EFA000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC12ADA000
trusted library allocation
page read and write
1464000
heap
page read and write
1CC09246000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC096B1000
trusted library allocation
page read and write
CD5A1FF000
stack
page read and write
1CC7EB71000
heap
page read and write
1CC7ED11000
trusted library allocation
page read and write
1CC143F1000
trusted library allocation
page read and write
1CC14246000
trusted library allocation
page read and write
CD591FE000
stack
page read and write
1CC0FEE7000
trusted library allocation
page read and write
1CC14801000
heap
page read and write
1CC0A5CD000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
1CC09FC7000
trusted library allocation
page read and write
1CC7EAFB000
heap
page read and write
1CC0833B000
trusted library allocation
page read and write
1CC0AC8E000
trusted library allocation
page read and write
1CC07BA5000
trusted library allocation
page read and write
218E97C7000
trusted library allocation
page read and write
1CC07BF0000
trusted library allocation
page read and write
1CC7ECC0000
trusted library allocation
page read and write
1CC7EB1D000
heap
page read and write
1CC09968000
trusted library allocation
page read and write
1CC1002B000
trusted library allocation
page read and write
1CC08DD7000
trusted library allocation
page read and write
1CC7F69E000
trusted library allocation
page read and write
1502E2B2000
trusted library allocation
page read and write
1CC0936F000
trusted library allocation
page read and write
1CC08998000
trusted library allocation
page read and write
1CC07EF9000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC09EE8000
trusted library allocation
page read and write
1CC14654000
trusted library allocation
page read and write
1CC09248000
trusted library allocation
page read and write
1CC104DA000
trusted library allocation
page read and write
1CC0519E000
heap
page read and write
1CC103EE000
trusted library allocation
page read and write
218E9810000
trusted library allocation
page read and write
1CC1035B000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC07EDF000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC0FDB3000
trusted library allocation
page read and write
1CC09C74000
trusted library allocation
page read and write
2BC997BD000
heap
page read and write
1CC7EB64000
heap
page read and write
218EA2CA000
heap
page read and write
1CC0FDEB000
trusted library allocation
page read and write
1CC139D1000
trusted library allocation
page read and write
1CC09DC8000
trusted library allocation
page read and write
1CC7F6E5000
trusted library allocation
page read and write
1CC0987E000
trusted library allocation
page read and write
1CC0FD3F000
trusted library allocation
page read and write
218E9E00000
trusted library allocation
page read and write
1CC104A9000
trusted library allocation
page read and write
1CC1474A000
trusted library allocation
page read and write
1CC0826F000
trusted library allocation
page read and write
1CC07DC9000
trusted library allocation
page read and write
1CC08DE9000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB3B000
heap
page read and write
1CC07BB6000
trusted library allocation
page read and write
1CC07E6E000
trusted library allocation
page read and write
1CC145A1000
trusted library allocation
page read and write
1CC14381000
trusted library allocation
page read and write
1CC07867000
trusted library allocation
page read and write
1CC14865000
heap
page read and write
1CC0967A000
trusted library allocation
page read and write
1CC078DA000
trusted library allocation
page read and write
1CC0FFF8000
trusted library allocation
page read and write
1CC13E73000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0A5A5000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC098B4000
trusted library allocation
page read and write
1CC05191000
heap
page read and write
1CC0FD55000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB3B000
heap
page read and write
1CC1427C000
trusted library allocation
page read and write
1CC0B8B5000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC09FBB000
trusted library allocation
page read and write
218E941A000
heap
page read and write
1CC09469000
trusted library allocation
page read and write
218EA2A4000
heap
page read and write
1CC7EB4D000
heap
page read and write
2BC99960000
heap
page read and write
1CC08262000
trusted library allocation
page read and write
1CC7FB9A000
trusted library allocation
page read and write
1CC148FC000
heap
page read and write
1CC0938A000
trusted library allocation
page read and write
1CC1463C000
trusted library allocation
page read and write
1CC0A9E8000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC09A7A000
trusted library allocation
page read and write
1CC0FD51000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC09A4E000
trusted library allocation
page read and write
1CC14868000
heap
page read and write
1CC0FD39000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB29000
heap
page read and write
1CC0ACC9000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC7EB2E000
heap
page read and write
1CC09D3E000
trusted library allocation
page read and write
1CC08C80000
trusted library allocation
page read and write
1CC7EB78000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC051A4000
heap
page read and write
1CC0FCEA000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC08DF2000
trusted library allocation
page read and write
1549000
heap
page read and write
1CC0AC1B000
trusted library allocation
page read and write
1CC082CB000
trusted library allocation
page read and write
B52000
unkown
page readonly
1CC10380000
trusted library allocation
page read and write
1CC104BB000
trusted library allocation
page read and write
1CC0BC2E000
trusted library allocation
page read and write
1CC0B8EB000
trusted library allocation
page read and write
1CC0AC38000
trusted library allocation
page read and write
218EA32C000
heap
page read and write
1CC0FFDF000
trusted library allocation
page read and write
218EA328000
heap
page read and write
1CC0984C000
trusted library allocation
page read and write
1CC08FD6000
trusted library allocation
page read and write
1CC0B8F3000
trusted library allocation
page read and write
1CC07BA5000
trusted library allocation
page read and write
218EA340000
heap
page read and write
1CC123CF000
trusted library allocation
page read and write
1CC7EBA9000
heap
page read and write
2BC97C79000
heap
page read and write
218E9772000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB2B000
heap
page read and write
1CC14258000
trusted library allocation
page read and write
1CC08D2D000
trusted library allocation
page read and write
1CC08565000
trusted library allocation
page read and write
1CC08407000
trusted library allocation
page read and write
1CC0835F000
trusted library allocation
page read and write
1CC07884000
trusted library allocation
page read and write
1CC07D73000
trusted library allocation
page read and write
1CC09DC6000
trusted library allocation
page read and write
1CC099A4000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
1CC0A4F8000
trusted library allocation
page read and write
1CC10126000
trusted library allocation
page read and write
1CC7EB82000
heap
page read and write
1CC13EC5000
trusted library allocation
page read and write
2BC997AC000
heap
page read and write
1CC0AC28000
trusted library allocation
page read and write
1CC07BB8000
trusted library allocation
page read and write
1CC08457000
trusted library allocation
page read and write
218EA398000
heap
page read and write
1CC100C3000
trusted library allocation
page read and write
1502E267000
trusted library allocation
page read and write
1CC7EB6A000
heap
page read and write
1CC13ECB000
trusted library allocation
page read and write
2BC997B8000
heap
page read and write
1CC094D2000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0A5F8000
trusted library allocation
page read and write
1502E500000
heap
page read and write
1CC10391000
trusted library allocation
page read and write
1CC0FD2B000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC0826C000
trusted library allocation
page read and write
1CC09CAA000
trusted library allocation
page read and write
1CC0B6E9000
trusted library allocation
page read and write
1CC09686000
trusted library allocation
page read and write
1CC7EB37000
heap
page read and write
1CC7EB21000
heap
page read and write
1CC13421000
trusted library allocation
page read and write
1CC07EB5000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC0A50F000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC7EB3A000
heap
page read and write
1CC09CE8000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC7EB2D000
heap
page read and write
1CC09991000
trusted library allocation
page read and write
1CC0FD5B000
trusted library allocation
page read and write
1CC09639000
trusted library allocation
page read and write
1CC0C1AC000
trusted library allocation
page read and write
1CC14666000
trusted library allocation
page read and write
1CC097A2000
trusted library allocation
page read and write
1CC0B646000
trusted library allocation
page read and write
1502DFA0000
heap
page read and write
1CC09999000
trusted library allocation
page read and write
1CC09384000
trusted library allocation
page read and write
1CC078EE000
trusted library allocation
page read and write
1CC14557000
trusted library allocation
page read and write
1CC08FE7000
trusted library allocation
page read and write
218EA3A9000
heap
page read and write
1CC7EB23000
heap
page read and write
1CC0ACB8000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC14642000
trusted library allocation
page read and write
1CC7EB2C000
heap
page read and write
1CC7EAF0000
heap
page read and write
1CC0BB86000
trusted library allocation
page read and write
1CC0A95F000
trusted library allocation
page read and write
1CC09D2E000
trusted library allocation
page read and write
1CC08571000
trusted library allocation
page read and write
1CC098AC000
trusted library allocation
page read and write
1CC7FBF2000
trusted library allocation
page read and write
1CC7F3BB000
trusted library allocation
page read and write
1CC7EB21000
heap
page read and write
1CC1047E000
trusted library allocation
page read and write
1CC0FDB7000
trusted library allocation
page read and write
1CC07DBF000
trusted library allocation
page read and write
1CC1029D000
trusted library allocation
page read and write
1CC13ECD000
trusted library allocation
page read and write
1CC0FD6E000
trusted library allocation
page read and write
1CC0ACE7000
trusted library allocation
page read and write
1F81360C000
trusted library allocation
page read and write
1CC0FDB9000
trusted library allocation
page read and write
1CC09A0A000
trusted library allocation
page read and write
1CC0BAE5000
trusted library allocation
page read and write
1CC09D21000
trusted library allocation
page read and write
1CC08537000
trusted library allocation
page read and write
218E97F3000
trusted library allocation
page read and write
1502E033000
heap
page read and write
1CC7EB31000
heap
page read and write
1CC7ED3A000
trusted library allocation
page read and write
1CC100C3000
trusted library allocation
page read and write
1CC131D0000
trusted library allocation
page read and write
1CC085EA000
trusted library allocation
page read and write
1CC09A9B000
trusted library allocation
page read and write
1CC09CE6000
trusted library allocation
page read and write
218E9786000
trusted library allocation
page read and write
1CC0A4FE000
trusted library allocation
page read and write
1CC7EB1F000
heap
page read and write
1CC0B88A000
trusted library allocation
page read and write
1CC7EB6C000
heap
page read and write
1CC7ECA1000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB62000
heap
page read and write
1502E2B7000
trusted library allocation
page read and write
1CC103B0000
trusted library allocation
page read and write
1CC098AE000
trusted library allocation
page read and write
1CC0B64E000
trusted library allocation
page read and write
1CC0829C000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC07B3B000
trusted library allocation
page read and write
1CC0BBAC000
trusted library allocation
page read and write
1CC0FF9B000
trusted library allocation
page read and write
1CC09A45000
trusted library allocation
page read and write
1CC1456F000
trusted library allocation
page read and write
1CC08D66000
trusted library allocation
page read and write
1CC1034D000
trusted library allocation
page read and write
1CC08286000
trusted library allocation
page read and write
1CC103A3000
trusted library allocation
page read and write
1CC0966C000
trusted library allocation
page read and write
1CC7F665000
trusted library allocation
page read and write
218E936E000
remote allocation
page execute read
1CC07EC3000
trusted library allocation
page read and write
1CC08C04000
trusted library allocation
page read and write
1CC0A8C8000
trusted library allocation
page read and write
1CC7EB32000
heap
page read and write
1CC7EAF0000
heap
page read and write
1CC09853000
trusted library allocation
page read and write
1CC7EB77000
heap
page read and write
1CC0984E000
trusted library allocation
page read and write
1CC0984F000
trusted library allocation
page read and write
1CC0FD55000
trusted library allocation
page read and write
1CC0A9D7000
trusted library allocation
page read and write
1CC0821D000
trusted library allocation
page read and write
1CC7F6E5000
trusted library allocation
page read and write
218EA3A9000
heap
page read and write
1CC131F1000
trusted library allocation
page read and write
1CC0840E000
trusted library allocation
page read and write
1CC0A71D000
trusted library allocation
page read and write
1CC098EC000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC0991B000
trusted library allocation
page read and write
1CC0FEFC000
trusted library allocation
page read and write
1CC09DBC000
trusted library allocation
page read and write
1CC09DB9000
trusted library allocation
page read and write
1CC0FD00000
trusted library allocation
page read and write
1CC0998D000
trusted library allocation
page read and write
1CC7EB29000
heap
page read and write
1CC0FDD1000
trusted library allocation
page read and write
1CC0FCE0000
trusted library allocation
page read and write
1CC0ACEC000
trusted library allocation
page read and write
1CC07E8D000
trusted library allocation
page read and write
1CC09661000
trusted library allocation
page read and write
D7A295E000
unkown
page readonly
CD599FE000
stack
page read and write
1F813664000
trusted library allocation
page read and write
1CC07B1C000
trusted library allocation
page read and write
1CC09D1C000
trusted library allocation
page read and write
1CC0FFE2000
trusted library allocation
page read and write
1F8137D0000
heap
page read and write
1CC08CFC000
trusted library allocation
page read and write
1CC08CE8000
trusted library allocation
page read and write
218E97C5000
trusted library allocation
page read and write
1CC09CB4000
trusted library allocation
page read and write
218EA37B000
heap
page read and write
1CC100AB000
trusted library allocation
page read and write
218EA329000
heap
page read and write
1CC7EC9E000
trusted library allocation
page read and write
1CC7EB30000
heap
page read and write
1CC098E5000
trusted library allocation
page read and write
1CC7EB72000
heap
page read and write
1CC0A6D1000
trusted library allocation
page read and write
1CC083D8000
trusted library allocation
page read and write
1CC084D2000
trusted library allocation
page read and write
1CC7EB6B000
heap
page read and write
1CC09EAC000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC101A0000
trusted library allocation
page read and write
1CC7EB62000
heap
page read and write
1CC09291000
trusted library allocation
page read and write
1CC098F3000
trusted library allocation
page read and write
1CC0ACCD000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC13F67000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC7EB64000
heap
page read and write
1CC0A97F000
trusted library allocation
page read and write
1CC7EB1D000
heap
page read and write
1CC7EB76000
heap
page read and write
1464000
heap
page read and write
1CC07B75000
trusted library allocation
page read and write
1CC7EB71000
heap
page read and write
1CC14874000
heap
page read and write
1CC13460000
trusted library allocation
page read and write
1CC1044C000
trusted library allocation
page read and write
1CC103BE000
trusted library allocation
page read and write
1CC098DA000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC084FA000
trusted library allocation
page read and write
1CC7F684000
trusted library allocation
page read and write
1CC051A6000
heap
page read and write
1CC0519B000
heap
page read and write
1CC078C7000
trusted library allocation
page read and write
1CC0B8CF000
trusted library allocation
page read and write
1CC0A86C000
trusted library allocation
page read and write
1CC0A9E8000
trusted library allocation
page read and write
1CC7EB64000
heap
page read and write
218EA32C000
heap
page read and write
1CC09DEC000
trusted library allocation
page read and write
1CC0936F000
trusted library allocation
page read and write
1CC08CCF000
trusted library allocation
page read and write
1CC1486D000
heap
page read and write
1CC07D65000
trusted library allocation
page read and write
1CC103E1000
trusted library allocation
page read and write
218EA2A0000
heap
page read and write
1CC0AC97000
trusted library allocation
page read and write
1CC08FEE000
trusted library allocation
page read and write
1CC0A998000
trusted library allocation
page read and write
218EA29C000
heap
page read and write
1CC7EB7A000
heap
page read and write
1CC102DD000
trusted library allocation
page read and write
1CC09FE8000
trusted library allocation
page read and write
1CC098E5000
trusted library allocation
page read and write
1CC1454E000
trusted library allocation
page read and write
1CC0B634000
trusted library allocation
page read and write
1CC139A8000
trusted library allocation
page read and write
1CC09CD5000
trusted library allocation
page read and write
1CC7EB2B000
heap
page read and write
1CC145FA000
trusted library allocation
page read and write
1CC0840F000
trusted library allocation
page read and write
1CC1474F000
trusted library allocation
page read and write
1CC0FCB7000
trusted library allocation
page read and write
1CC7EB8A000
heap
page read and write
1CC7EB1F000
heap
page read and write
1CC0519E000
heap
page read and write
218EA33D000
heap
page read and write
1CC09A73000
trusted library allocation
page read and write
1CC7EB7A000
heap
page read and write
1CC094FB000
trusted library allocation
page read and write
1CC083EA000
trusted library allocation
page read and write
1CC0984E000
trusted library allocation
page read and write
1CC09A62000
trusted library allocation
page read and write
1CC7EB7E000
heap
page read and write
1CC099DE000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC7EB71000
heap
page read and write
218E95F9000
unkown
page execute read
1CC09DB0000
trusted library allocation
page read and write
1CC0FE89000
trusted library allocation
page read and write
1CC0FDD6000
trusted library allocation
page read and write
1CC123D8000
trusted library allocation
page read and write
1CC09999000
trusted library allocation
page read and write
1CC09274000
trusted library allocation
page read and write
1CC09D43000
trusted library allocation
page read and write
1CC0A5F8000
trusted library allocation
page read and write
1CC7EC68000
trusted library allocation
page read and write
B2C000
unkown
page readonly
1CC7EB8A000
heap
page read and write
1CC139C3000
trusted library allocation
page read and write
1CC101B9000
trusted library allocation
page read and write
218EA33D000
heap
page read and write
1CC100D5000
trusted library allocation
page read and write
1CC09CC3000
trusted library allocation
page read and write
1CC07E93000
trusted library allocation
page read and write
1CC7EB4D000
heap
page read and write
1CC0A9EC000
trusted library allocation
page read and write
B64000
unkown
page readonly
1CC14801000
heap
page read and write
1CC7EB33000
heap
page read and write
1CC7EB34000
heap
page read and write
1CC0FEF8000
trusted library allocation
page read and write
1CC08C78000
trusted library allocation
page read and write
1CC08E67000
trusted library allocation
page read and write
1CC09D21000
trusted library allocation
page read and write
1CC7EB3C000
heap
page read and write
1CC099BD000
trusted library allocation
page read and write
1CC7EB23000
heap
page read and write
There are 4020 hidden memdumps, click here to show them.