IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f8de9437-4d1e-4f17-aa03-f198cdf45683.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f8de9437-4d1e-4f17-aa03-f198cdf45683.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2232 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a418fc79-5b10-472b-b3cd-23cdedc49dfe} 7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1ade8070b10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20230927232528 -prefsHandle 4392 -prefMapHandle 4388 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {047d8eaa-463a-4f5e-ba84-be975c9a4469} 7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1adf7ed0610 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4844 -prefMapHandle 5364 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c385fcad-3934-4ff5-b833-6d8b82e95124} 7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1adfa339310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.google.com/complete/searchdf070348-e771-4bd5-964e-d19d82c1384ee98c663d-408d-4901-9666-66
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://www.olx.pl/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.80
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
206.23.85.13.in-addr.arpa
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
52.222.236.80
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.142
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1AE0366D000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF4FDC000
trusted library allocation
page read and write
26DBB260000
heap
page read and write
1ADF5094000
trusted library allocation
page read and write
1ADF3E17000
trusted library allocation
page read and write
1ADFB20C000
trusted library allocation
page read and write
1ADF77BE000
heap
page read and write
1ADFFEB9000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADFFD2D000
trusted library allocation
page read and write
1ADF9453000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADF94ED000
trusted library allocation
page read and write
1ADFFE38000
trusted library allocation
page read and write
17ECD600000
unclassified section
page readonly
1ADFA347000
trusted library allocation
page read and write
237E2C20000
heap
page read and write
1ADF7B8D000
trusted library allocation
page read and write
1ADF96E5000
trusted library allocation
page read and write
1ADF7CD8000
trusted library allocation
page read and write
1AE0232F000
trusted library allocation
page read and write
1ADF8B9C000
trusted library allocation
page read and write
1ADF82E8000
trusted library allocation
page read and write
1ADF9588000
trusted library allocation
page read and write
1ADFB4A5000
trusted library allocation
page read and write
1ADF9577000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF50DC000
trusted library allocation
page read and write
1ADFBCDE000
trusted library allocation
page read and write
1ADF9489000
trusted library allocation
page read and write
1ADF8E68000
trusted library allocation
page read and write
1ADFB2D1000
trusted library allocation
page read and write
1ADE9D5D000
heap
page read and write
1AE00046000
trusted library allocation
page read and write
1ADF8FEE000
trusted library allocation
page read and write
1ADFB5BA000
trusted library allocation
page read and write
1ADFFDA6000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF9533000
trusted library allocation
page read and write
1AE0029E000
trusted library allocation
page read and write
1ADF9289000
trusted library allocation
page read and write
1AE000CA000
trusted library allocation
page read and write
1ADF3D71000
trusted library allocation
page read and write
1ADF7A7E000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADFBCCA000
trusted library allocation
page read and write
1ADF94F7000
trusted library allocation
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1AE02477000
trusted library allocation
page read and write
17ECD4F4000
trusted library allocation
page read and write
1ADF8EB2000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF8BE3000
trusted library allocation
page read and write
1ADF8F64000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADEEE52000
heap
page read and write
1ADF50EB000
trusted library allocation
page read and write
1ADEEE60000
heap
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1AE01A50000
trusted library allocation
page read and write
1ADFB279000
trusted library allocation
page read and write
FEF000
stack
page read and write
1ADF8252000
trusted library allocation
page read and write
1ADFB5AE000
trusted library allocation
page read and write
1ADF7CC6000
trusted library allocation
page read and write
26DBB2B2000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF7B74000
trusted library allocation
page read and write
26DBB27D000
heap
page read and write
1ADF8E1B000
trusted library allocation
page read and write
1ADFB2E2000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
1AE002D1000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
8D2000
unkown
page readonly
1ADF829B000
trusted library allocation
page read and write
1ADF73AE000
trusted library allocation
page read and write
1ADF7794000
heap
page read and write
1ADF90E7000
trusted library allocation
page read and write
1ADEEE05000
heap
page read and write
1ADF7CBC000
trusted library allocation
page read and write
1AE02B6B000
heap
page read and write
1AE024EC000
trusted library allocation
page read and write
1ADF97E6000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF8DCC000
trusted library allocation
page read and write
1ADF75F4000
trusted library allocation
page read and write
26DBB358000
heap
page read and write
1ADF73BD000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADEEE53000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADEEE0D000
heap
page read and write
1ADF828A000
trusted library allocation
page read and write
1ADEEDF8000
heap
page read and write
1ADF750F000
trusted library allocation
page read and write
1ADF90F8000
trusted library allocation
page read and write
13A0000
heap
page read and write
1ADF7C37000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADF3DFE000
trusted library allocation
page read and write
1ADF3781000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE3C000
heap
page read and write
1AE0135B000
trusted library allocation
page read and write
1ADF934A000
trusted library allocation
page read and write
1AE014EB000
trusted library allocation
page read and write
1ADF87EF000
trusted library allocation
page read and write
1ADFFD61000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADEEE0A000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADF90E0000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADF9584000
trusted library allocation
page read and write
1AE01841000
trusted library allocation
page read and write
1AE002BA000
trusted library allocation
page read and write
1AE0249E000
trusted library allocation
page read and write
1AE002D0000
trusted library allocation
page read and write
1ADEEE39000
heap
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1ADFFDA4000
trusted library allocation
page read and write
1ADF73AE000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF94CF000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFB5C9000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
1ADF82AD000
trusted library allocation
page read and write
1AE00227000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
292371AF000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1AE001B3000
trusted library allocation
page read and write
24E859CA000
heap
page read and write
1AE01A67000
trusted library allocation
page read and write
1AE000CC000
trusted library allocation
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1ADF3D23000
trusted library allocation
page read and write
1ADF9059000
trusted library allocation
page read and write
24E873B0000
heap
page read and write
1ADF87DD000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1AE002E0000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF90FC000
trusted library allocation
page read and write
1ADF825C000
trusted library allocation
page read and write
1ADF37C8000
trusted library allocation
page read and write
1AE018C5000
trusted library allocation
page read and write
17ECD250000
heap
page read and write
1ADF8B8F000
trusted library allocation
page read and write
1AE00094000
trusted library allocation
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADFB5AA000
trusted library allocation
page read and write
1AE008DA000
trusted library allocation
page read and write
1AE0149A000
trusted library allocation
page read and write
1ADF8E74000
trusted library allocation
page read and write
237E2BE0000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF8E39000
trusted library allocation
page read and write
17ECD4C4000
trusted library allocation
page read and write
1ADF8E46000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF4D48000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF7C7A000
trusted library allocation
page read and write
1ADF3DF6000
trusted library allocation
page read and write
1AE0085D000
trusted library allocation
page read and write
1ADFFDB9000
trusted library allocation
page read and write
1ADF8EB2000
trusted library allocation
page read and write
17ECD430000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1AE0029E000
trusted library allocation
page read and write
1AE0003D000
trusted library allocation
page read and write
1ADF7CBE000
trusted library allocation
page read and write
26DBA669000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADFFED4000
trusted library allocation
page read and write
1ADFBCC6000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
26DBB32A000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADFA231000
trusted library allocation
page read and write
26DBB2E9000
heap
page read and write
1AE002D0000
trusted library allocation
page read and write
1ADEEE63000
heap
page read and write
1ADFA29E000
trusted library allocation
page read and write
1ADEEE33000
heap
page read and write
1ADFB213000
trusted library allocation
page read and write
1ADFA388000
trusted library allocation
page read and write
1AE01680000
trusted library allocation
page read and write
1AE013C2000
trusted library allocation
page read and write
1ADF8BF1000
trusted library allocation
page read and write
1ADF82E4000
trusted library allocation
page read and write
1ADF8F86000
trusted library allocation
page read and write
1ADF739D000
trusted library allocation
page read and write
1ADF82A2000
trusted library allocation
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADFA2B9000
trusted library allocation
page read and write
17ECD46B000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1284000
heap
page read and write
1ADF8E71000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF87E2000
trusted library allocation
page read and write
1AE0002E000
trusted library allocation
page read and write
13A0000
heap
page read and write
1ADF7B8E000
trusted library allocation
page read and write
1ADF8F7B000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1AE01360000
trusted library allocation
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADF930C000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF823F000
trusted library allocation
page read and write
1ADFFDBD000
trusted library allocation
page read and write
1ADF934A000
trusted library allocation
page read and write
1ADFB156000
trusted library allocation
page read and write
1AE016F8000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF8D4A000
trusted library allocation
page read and write
1ADF90C3000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF750F000
trusted library allocation
page read and write
1ADF8EA2000
trusted library allocation
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADFB5EB000
trusted library allocation
page read and write
29236D60000
remote allocation
page read and write
1ADEEE43000
heap
page read and write
1ADEEE46000
heap
page read and write
17ECD405000
trusted library allocation
page read and write
292371C8000
trusted library allocation
page read and write
1ADF8298000
trusted library allocation
page read and write
1ADF93AC000
trusted library allocation
page read and write
1ADFA3F6000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF7B61000
trusted library allocation
page read and write
1ADFA3BD000
trusted library allocation
page read and write
1ADF934D000
trusted library allocation
page read and write
1AE039C8000
trusted library allocation
page read and write
29237181000
trusted library allocation
page read and write
1ADFB2A6000
trusted library allocation
page read and write
1ADF8EB4000
trusted library allocation
page read and write
1ADF8FE0000
trusted library allocation
page read and write
1ADFB5C1000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
1ADEEE39000
heap
page read and write
1ADF94BD000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF8B29000
trusted library allocation
page read and write
1ADFB5AE000
trusted library allocation
page read and write
26DBB358000
heap
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF778E000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADFB7F9000
trusted library allocation
page read and write
F44B9ED000
stack
page read and write
1ADF9564000
trusted library allocation
page read and write
1ADF8E5B000
trusted library allocation
page read and write
1AE0008F000
trusted library allocation
page read and write
1ADF94B5000
trusted library allocation
page read and write
1ADFBCDE000
trusted library allocation
page read and write
1ADF82AB000
trusted library allocation
page read and write
1ADEEE87000
heap
page read and write
74D230E000
unkown
page readonly
1ADEEE60000
heap
page read and write
1ADF82EE000
trusted library allocation
page read and write
1AE0041E000
trusted library allocation
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF94C3000
trusted library allocation
page read and write
1ADF7AD4000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADF82DF000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADFB5F2000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF77CC000
heap
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE41000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADF8EBB000
trusted library allocation
page read and write
26DBB27F000
heap
page read and write
1ADFA3C0000
trusted library allocation
page read and write
1ADEEE52000
heap
page read and write
12B0000
trusted library allocation
page read and write
1ADEEE60000
heap
page read and write
1ADEEE3C000
heap
page read and write
1AE000F2000
trusted library allocation
page read and write
1ADF7CAE000
trusted library allocation
page read and write
1ADFBC89000
trusted library allocation
page read and write
1ADF8E59000
trusted library allocation
page read and write
F44EE3E000
unkown
page readonly
1ADFBFC8000
trusted library allocation
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
26DBB2E0000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADFB59B000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADFB4E6000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADFB2CB000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADFFEF4000
trusted library allocation
page read and write
1ADFB4D8000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE10000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF8EB4000
trusted library allocation
page read and write
1ADFB296000
trusted library allocation
page read and write
1ADF8EBA000
trusted library allocation
page read and write
1ADFA1C9000
trusted library allocation
page read and write
1ADF7CC8000
trusted library allocation
page read and write
1ADF8E9C000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADEEE0E000
heap
page read and write
26DBA590000
trusted library section
page readonly
1ADFFE8E000
trusted library allocation
page read and write
1ADEEE2A000
heap
page read and write
26DBB33B000
heap
page read and write
1ADF8AAD000
trusted library allocation
page read and write
1ADF8291000
trusted library allocation
page read and write
237E2C10000
heap
page read and write
1ADF96F9000
trusted library allocation
page read and write
1ADF8E47000
trusted library allocation
page read and write
1AE002E0000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF8EBB000
trusted library allocation
page read and write
17ECD2CF000
unclassified section
page read and write
1ADEEE58000
heap
page read and write
1ADF8B29000
trusted library allocation
page read and write
1ADFFEB2000
trusted library allocation
page read and write
1ADF7799000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADEEE2B000
heap
page read and write
1ADEEE10000
heap
page read and write
1ADFA3E5000
trusted library allocation
page read and write
8E0000
unkown
page write copy
1ADFB5BF000
trusted library allocation
page read and write
1ADF7B6A000
trusted library allocation
page read and write
1ADFFE40000
trusted library allocation
page read and write
1ADF9363000
trusted library allocation
page read and write
1ADF8E86000
trusted library allocation
page read and write
1ADF9BE6000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1ADFC048000
trusted library allocation
page read and write
1ADF85F1000
trusted library allocation
page read and write
1ADF96F0000
trusted library allocation
page read and write
1ADF8EAC000
trusted library allocation
page read and write
1ADF5090000
trusted library allocation
page read and write
26DBA62F000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF8BCF000
trusted library allocation
page read and write
1ADF9544000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
237E2C1A000
heap
page read and write
1ADF8FF2000
trusted library allocation
page read and write
1AE024E1000
trusted library allocation
page read and write
1AE00019000
trusted library allocation
page read and write
1ADFFEB8000
trusted library allocation
page read and write
1ADEEE45000
heap
page read and write
1ADF977A000
trusted library allocation
page read and write
1ADF87D3000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1AE013D9000
trusted library allocation
page read and write
1ADF8EAC000
trusted library allocation
page read and write
1ADF96B7000
trusted library allocation
page read and write
1ADF3E26000
trusted library allocation
page read and write
1ADEEE80000
heap
page read and write
1ADFFD94000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1AE03984000
trusted library allocation
page read and write
1ADF8AAE000
trusted library allocation
page read and write
26DBB2EC000
heap
page read and write
26DBA580000
unclassified section
page read and write
1ADF8ED4000
trusted library allocation
page read and write
1ADF4F7A000
trusted library allocation
page read and write
24E873A4000
heap
page read and write
1ADFFDAA000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADEEE53000
heap
page read and write
1ADF50FE000
trusted library allocation
page read and write
26DBB32D000
heap
page read and write
1ADF8B37000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
1ADEEE0A000
heap
page read and write
26DBA3E0000
heap
page read and write
1ADF7900000
trusted library allocation
page read and write
237E2D00000
trusted library allocation
page read and write
1ADF9349000
trusted library allocation
page read and write
1ADFB1F6000
trusted library allocation
page read and write
1ADF4F9C000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF8E72000
trusted library allocation
page read and write
1AE000CE000
trusted library allocation
page read and write
1ADF90F4000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADFFDB9000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
26DBB344000
heap
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADF7590000
trusted library allocation
page read and write
1AE0245F000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF96D6000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1AE00049000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADFA369000
trusted library allocation
page read and write
26DBAC77000
unkown
page execute read
1ADF87C5000
trusted library allocation
page read and write
1ADF90B5000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF7C3B000
trusted library allocation
page read and write
1ADEEE5F000
heap
page read and write
1ADF508E000
trusted library allocation
page read and write
1ADF93C4000
trusted library allocation
page read and write
1AE01A8A000
trusted library allocation
page read and write
1ADF4FAE000
trusted library allocation
page read and write
1ADEEE7C000
heap
page read and write
1ADF955D000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF9314000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF9462000
trusted library allocation
page read and write
1ADF8F97000
trusted library allocation
page read and write
2923731F000
trusted library allocation
page read and write
1ADF94C0000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1ADFFEF4000
trusted library allocation
page read and write
1ADF9514000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
F45063E000
stack
page read and write
1ADF949C000
trusted library allocation
page read and write
1ADF823E000
trusted library allocation
page read and write
1380000
heap
page read and write
1ADF9E74000
trusted library allocation
page read and write
1ADFB0F3000
trusted library allocation
page read and write
1ADFB0CC000
trusted library allocation
page read and write
1AE000E6000
trusted library allocation
page read and write
26DBB344000
heap
page read and write
1ADF8FDF000
trusted library allocation
page read and write
1ADF7B61000
trusted library allocation
page read and write
1ADF4FB4000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF7CD8000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF8D6C000
trusted library allocation
page read and write
1ADF94C6000
trusted library allocation
page read and write
1ADFFFBD000
trusted library allocation
page read and write
26DBB2F1000
heap
page read and write
1AE01886000
trusted library allocation
page read and write
1AE00077000
trusted library allocation
page read and write
1ADF93EC000
trusted library allocation
page read and write
26DBB2EC000
heap
page read and write
1AE00026000
trusted library allocation
page read and write
1ADEEE68000
heap
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADFFDF0000
trusted library allocation
page read and write
1AE0041C000
trusted library allocation
page read and write
1ADF9766000
trusted library allocation
page read and write
1ADFB0E6000
trusted library allocation
page read and write
1AE03AAC000
trusted library allocation
page read and write
1ADF9342000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1ADFB4DA000
trusted library allocation
page read and write
1AE01848000
trusted library allocation
page read and write
1ADF7334000
trusted library allocation
page read and write
1ADFB576000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
26DBB2B9000
heap
page read and write
1AE03AA3000
trusted library allocation
page read and write
1AE000CA000
trusted library allocation
page read and write
1ADEEE42000
heap
page read and write
1ADF9E9B000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
24E85990000
heap
page read and write
1ADF9FC0000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF90E0000
trusted library allocation
page read and write
1AE02B6C000
heap
page read and write
1AE013CC000
trusted library allocation
page read and write
17ECD707000
trusted library allocation
page read and write
1ADF829B000
trusted library allocation
page read and write
1AE02486000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1AE00244000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
1ADF7A57000
trusted library allocation
page read and write
1ADF93E8000
trusted library allocation
page read and write
1ADF7AE7000
trusted library allocation
page read and write
29236DD3000
heap
page read and write
1ADFA3DC000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF8F66000
trusted library allocation
page read and write
1ADF8EA3000
trusted library allocation
page read and write
1ADF73D3000
trusted library allocation
page read and write
29236F6F000
unclassified section
page read and write
17ECD424000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1AE018E4000
trusted library allocation
page read and write
1ADFB296000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF73A7000
trusted library allocation
page read and write
1ADFFE4A000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADF779F000
heap
page read and write
1ADF4F99000
trusted library allocation
page read and write
1ADF737C000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
17ECD47B000
trusted library allocation
page read and write
1ADF7B6D000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF7CAD000
trusted library allocation
page read and write
1ADF50F6000
trusted library allocation
page read and write
1AE0010C000
trusted library allocation
page read and write
1ADEEE7C000
heap
page read and write
1ADF8B1D000
trusted library allocation
page read and write
1ADFB0FE000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADFFFF4000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADEEE3C000
heap
page read and write
1ADF85FB000
trusted library allocation
page read and write
1ADF8E49000
trusted library allocation
page read and write
1ADFFEC4000
trusted library allocation
page read and write
1ADF907F000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF955D000
trusted library allocation
page read and write
1ADF9BE6000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF8DC5000
trusted library allocation
page read and write
1AE001FB000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF93EC000
trusted library allocation
page read and write
3B30000
heap
page read and write
1ADFFD9D000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF4FA7000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
17ECD0B0000
remote allocation
page read and write
1ADFB227000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADF942B000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF8F92000
trusted library allocation
page read and write
292371EB000
trusted library allocation
page read and write
1ADF7C68000
trusted library allocation
page read and write
1ADF87C7000
trusted library allocation
page read and write
1ADFB054000
trusted library allocation
page read and write
1ADF8BE6000
trusted library allocation
page read and write
1ADF823F000
trusted library allocation
page read and write
1ADF7C7E000
trusted library allocation
page read and write
1AE001B7000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADFB5EB000
trusted library allocation
page read and write
1AE016EB000
trusted library allocation
page read and write
1ADF8F0B000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADEEE3C000
heap
page read and write
1ADF7CBC000
trusted library allocation
page read and write
1ADF8E72000
trusted library allocation
page read and write
1ADFB0D4000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADFB2C8000
trusted library allocation
page read and write
1ADF8F92000
trusted library allocation
page read and write
1ADF8E60000
trusted library allocation
page read and write
1ADFB4D5000
trusted library allocation
page read and write
1ADFBF7B000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
26DBB300000
heap
page read and write
1ADF73A7000
trusted library allocation
page read and write
1ADF94C8000
trusted library allocation
page read and write
1AE018A7000
trusted library allocation
page read and write
1ADF9FDC000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1AE013F1000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF75C8000
trusted library allocation
page read and write
1ADF8E51000
trusted library allocation
page read and write
1ADFB48D000
trusted library allocation
page read and write
1ADFB266000
trusted library allocation
page read and write
1ADF93E1000
trusted library allocation
page read and write
1AE01395000
trusted library allocation
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF50A6000
trusted library allocation
page read and write
1ADF7C7C000
trusted library allocation
page read and write
1ADF951A000
trusted library allocation
page read and write
1AE03B2E000
trusted library allocation
page read and write
1ADF87ED000
trusted library allocation
page read and write
2923716E000
trusted library allocation
page read and write
1ADEEE16000
heap
page read and write
1ADFFD94000
trusted library allocation
page read and write
1ADFA2B9000
trusted library allocation
page read and write
1ADEEE12000
heap
page read and write
1ADFB2E5000
trusted library allocation
page read and write
1ADF9325000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF8E63000
trusted library allocation
page read and write
1AE002CC000
trusted library allocation
page read and write
26DBB260000
heap
page read and write
1AE00096000
trusted library allocation
page read and write
237E2E00000
trusted library allocation
page read and write
1ADF82E4000
trusted library allocation
page read and write
1ADF93B8000
trusted library allocation
page read and write
1ADF8FA2000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1AE002BA000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE45000
heap
page read and write
1ADEEE75000
heap
page read and write
1ADF8F35000
trusted library allocation
page read and write
1ADFB5A7000
trusted library allocation
page read and write
1AE00096000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF8E6A000
trusted library allocation
page read and write
1ADF926C000
trusted library allocation
page read and write
1AE02B55000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF7C97000
trusted library allocation
page read and write
1ADF8E74000
trusted library allocation
page read and write
1ADEEE31000
heap
page read and write
17ECD48F000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF951C000
trusted library allocation
page read and write
1ADEEE96000
heap
page read and write
1ADF8F97000
trusted library allocation
page read and write
29237312000
trusted library allocation
page read and write
1AE0007B000
trusted library allocation
page read and write
1ADF930C000
trusted library allocation
page read and write
1ADF73A4000
trusted library allocation
page read and write
1ADFFFD6000
trusted library allocation
page read and write
1DC3A7D000
stack
page read and write
1ADFFDB4000
trusted library allocation
page read and write
1AE004ED000
trusted library allocation
page read and write
1ADFB5E2000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADFFD76000
trusted library allocation
page read and write
1ADF93A4000
trusted library allocation
page read and write
1ADFA2BA000
trusted library allocation
page read and write
1ADFB5B7000
trusted library allocation
page read and write
1ADEEE84000
heap
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF8F4D000
trusted library allocation
page read and write
1AE024A8000
trusted library allocation
page read and write
1ADF73CD000
trusted library allocation
page read and write
1ADF8E46000
trusted library allocation
page read and write
1ADF3E1E000
trusted library allocation
page read and write
1ADFA32F000
trusted library allocation
page read and write
26DBB2E8000
heap
page read and write
1ADEEE6A000
heap
page read and write
1ADF7A5A000
trusted library allocation
page read and write
26DBB201000
heap
page read and write
1ADF8FBD000
trusted library allocation
page read and write
1AE01A37000
trusted library allocation
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADF8F7D000
trusted library allocation
page read and write
1ADEEE57000
heap
page read and write
1ADFB1CC000
trusted library allocation
page read and write
1ADF779F000
heap
page read and write
1ADF9523000
trusted library allocation
page read and write
1ADF5049000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF50FE000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADEEE25000
heap
page read and write
1AE000CE000
trusted library allocation
page read and write
74D234E000
stack
page read and write
1ADF90B8000
trusted library allocation
page read and write
1AE03B01000
trusted library allocation
page read and write
1ADF8EB9000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1393000
heap
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1ADF8ED9000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADF823B000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF7B87000
trusted library allocation
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1ADF73B3000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF8F97000
trusted library allocation
page read and write
1651C6A24000
trusted library allocation
page read and write
17ECD449000
trusted library allocation
page read and write
1ADF8EAC000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1AE00251000
trusted library allocation
page read and write
1ADF7CB7000
trusted library allocation
page read and write
26DBAB82000
heap
page read and write
1ADF87C9000
trusted library allocation
page read and write
1ADF9BF9000
trusted library allocation
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADFB254000
trusted library allocation
page read and write
1ADFA24A000
trusted library allocation
page read and write
1ADFBCB6000
trusted library allocation
page read and write
1ADF4DD3000
trusted library allocation
page read and write
1AE036CE000
trusted library allocation
page read and write
76D5FFE000
stack
page read and write
F450E3E000
unkown
page readonly
1ADF8EDA000
trusted library allocation
page read and write
1ADF9080000
trusted library allocation
page read and write
1ADF8E5E000
trusted library allocation
page read and write
1ADF75C8000
trusted library allocation
page read and write
1ADFFD00000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADEEE32000
heap
page read and write
1ADF4F93000
trusted library allocation
page read and write
1387000
heap
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF7571000
trusted library allocation
page read and write
1ADF8F5C000
trusted library allocation
page read and write
76D57FE000
stack
page read and write
1ADF73AE000
trusted library allocation
page read and write
1ADF7CB7000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADF951C000
trusted library allocation
page read and write
1ADEEE75000
heap
page read and write
1ADFB59B000
trusted library allocation
page read and write
1ADFC0C5000
trusted library allocation
page read and write
26DBA678000
trusted library allocation
page read and write
1ADF87D1000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADFFEBF000
trusted library allocation
page read and write
1ADFB0A5000
trusted library allocation
page read and write
26DBB26C000
heap
page read and write
26DBA6E9000
trusted library allocation
page read and write
1ADF9BE7000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF3E9E000
trusted library allocation
page read and write
1ADF7C8E000
trusted library allocation
page read and write
1ADFB0B9000
trusted library allocation
page read and write
1AE02B01000
heap
page read and write
1ADF779C000
heap
page read and write
1ADF8BEE000
trusted library allocation
page read and write
1ADF930C000
trusted library allocation
page read and write
1ADFFD59000
trusted library allocation
page read and write
1ADF9BF9000
trusted library allocation
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF8E69000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1ADF77BF000
heap
page read and write
1ADF94CF000
trusted library allocation
page read and write
1ADF77BF000
heap
page read and write
1ADFFFB9000
trusted library allocation
page read and write
1ADF9698000
trusted library allocation
page read and write
1ADF778E000
heap
page read and write
1ADEEDF4000
heap
page read and write
1ADF8F7B000
trusted library allocation
page read and write
1ADEEE48000
heap
page read and write
1ADEEE24000
heap
page read and write
1ADFB7F2000
trusted library allocation
page read and write
1ADEEE7C000
heap
page read and write
1AE0003B000
trusted library allocation
page read and write
2FE8721000
trusted library allocation
page execute read
1ADEEE0D000
heap
page read and write
1ADF87D4000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADEEE64000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE4C000
heap
page read and write
1AE024DB000
trusted library allocation
page read and write
1ADF93A8000
trusted library allocation
page read and write
1ADF7519000
trusted library allocation
page read and write
1ADF3EB5000
trusted library allocation
page read and write
1ADFB54F000
trusted library allocation
page read and write
1ADF958A000
trusted library allocation
page read and write
1ADFA246000
trusted library allocation
page read and write
1ADFBC94000
trusted library allocation
page read and write
1AE016DA000
trusted library allocation
page read and write
1ADF9326000
trusted library allocation
page read and write
1ADEEE73000
heap
page read and write
1ADF8B67000
trusted library allocation
page read and write
1ADF4F21000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1AE002A9000
trusted library allocation
page read and write
1DC4B3E000
unkown
page readonly
1ADF9400000
trusted library allocation
page read and write
1ADF90B8000
trusted library allocation
page read and write
1ADF8B37000
trusted library allocation
page read and write
1ADF7C3D000
trusted library allocation
page read and write
1ADFFD3C000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF9BE6000
trusted library allocation
page read and write
1ADFFD8A000
trusted library allocation
page read and write
1ADF93FE000
trusted library allocation
page read and write
1ADFBCBC000
trusted library allocation
page read and write
1ADEEE39000
heap
page read and write
1AE0003F000
trusted library allocation
page read and write
26DBA603000
trusted library allocation
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADF3EF0000
trusted library allocation
page read and write
1ADF7A55000
trusted library allocation
page read and write
1ADF8E8D000
trusted library allocation
page read and write
1AE032C3000
trusted library allocation
page read and write
1ADF37C6000
trusted library allocation
page read and write
1ADEEE7D000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF930C000
trusted library allocation
page read and write
1AE02B01000
heap
page read and write
1AE02BC8000
heap
page read and write
1ADFB2CE000
trusted library allocation
page read and write
1ADFA1D7000
trusted library allocation
page read and write
1ADF8EB4000
trusted library allocation
page read and write
1ADF8BE3000
trusted library allocation
page read and write
26DBA6BA000
trusted library allocation
page read and write
1ADF7AC2000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF4F99000
trusted library allocation
page read and write
1ADF8E3D000
trusted library allocation
page read and write
1ADF8F88000
trusted library allocation
page read and write
1ADF95FC000
trusted library allocation
page read and write
1ADF77AF000
heap
page read and write
1ADF4DD3000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
17ECD411000
trusted library allocation
page read and write
1ADF9577000
trusted library allocation
page read and write
1ADFB07C000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADF7374000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF90E3000
trusted library allocation
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADFB5E7000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF8E9C000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF93A5000
trusted library allocation
page read and write
1ADF8B8F000
trusted library allocation
page read and write
1ADF8F97000
trusted library allocation
page read and write
1ADF958A000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
237E2AF0000
heap
page read and write
1ADF7799000
heap
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF9326000
trusted library allocation
page read and write
17ECD700000
trusted library allocation
page read and write
1AE00043000
trusted library allocation
page read and write
1ADF77AD000
heap
page read and write
1ADF8D33000
trusted library allocation
page read and write
1ADFB250000
trusted library allocation
page read and write
1ADF5073000
trusted library allocation
page read and write
1ADF93F3000
trusted library allocation
page read and write
1ADF8DE5000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1AE00254000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
26DBB2AA000
heap
page read and write
1ADFB53C000
trusted library allocation
page read and write
1ADF9511000
trusted library allocation
page read and write
1AE001E9000
trusted library allocation
page read and write
26DBB25F000
heap
page read and write
26DBA65C000
trusted library allocation
page read and write
1AE01C00000
trusted library allocation
page read and write
1ADF7C79000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADF8FBC000
trusted library allocation
page read and write
17ECD2C2000
unclassified section
page read and write
1ADFB0B0000
trusted library allocation
page read and write
1ADF93E1000
trusted library allocation
page read and write
1ADFBCAD000
trusted library allocation
page read and write
29236DE0000
heap
page read and write
1AE0009E000
trusted library allocation
page read and write
1ADF90A4000
trusted library allocation
page read and write
1ADF73AE000
trusted library allocation
page read and write
1AE002C2000
trusted library allocation
page read and write
1ADF8EBA000
trusted library allocation
page read and write
1ADF8F3A000
trusted library allocation
page read and write
3B31000
heap
page read and write
1ADF8F79000
trusted library allocation
page read and write
1ADEEE73000
heap
page read and write
1ADF909D000
trusted library allocation
page read and write
1ADEEE7B000
heap
page read and write
1ADF90E7000
trusted library allocation
page read and write
1ADF7A83000
trusted library allocation
page read and write
1ADF7B5F000
trusted library allocation
page read and write
1ADF93F0000
trusted library allocation
page read and write
29236F62000
unclassified section
page read and write
1ADEEE6A000
heap
page read and write
1ADF8EAC000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1AE03A48000
trusted library allocation
page read and write
1ADFA2B9000
trusted library allocation
page read and write
1ADF934D000
trusted library allocation
page read and write
1651C6A1E000
trusted library allocation
page read and write
1ADF8284000
trusted library allocation
page read and write
1ADF509D000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
29236DA0000
heap
page read and write
1ADEEE37000
heap
page read and write
17ECD4D7000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADEEE3A000
heap
page read and write
26DBB2E6000
heap
page read and write
1ADEEE3A000
heap
page read and write
13A0000
heap
page read and write
1ADF8FE0000
trusted library allocation
page read and write
1ADFC0AC000
trusted library allocation
page read and write
1AE02B6D000
heap
page read and write
1ADF93BC000
trusted library allocation
page read and write
26DBB369000
heap
page read and write
1ADEEE15000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1360000
heap
page read and write
FCE000
stack
page read and write
1ADFA231000
trusted library allocation
page read and write
1ADF8E6C000
trusted library allocation
page read and write
1ADF4F1C000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADEEE42000
heap
page read and write
1AE00028000
trusted library allocation
page read and write
1ADF7B81000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADF8F06000
trusted library allocation
page read and write
1AE000DD000
trusted library allocation
page read and write
1ADFA3FE000
trusted library allocation
page read and write
1AE0040A000
trusted library allocation
page read and write
26DBB28A000
heap
page read and write
1ADF8F53000
trusted library allocation
page read and write
1ADF97B4000
trusted library allocation
page read and write
26DBB2EC000
heap
page read and write
1AE00866000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADFFE2A000
trusted library allocation
page read and write
1ADF9347000
trusted library allocation
page read and write
1ADEEE05000
heap
page read and write
1ADFC0A3000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF9033000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
1ADF7799000
heap
page read and write
24E85945000
heap
page read and write
1ADFBCDA000
trusted library allocation
page read and write
1ADF9588000
trusted library allocation
page read and write
1ADF93E9000
trusted library allocation
page read and write
1ADF5031000
trusted library allocation
page read and write
1ADF73B3000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE40000
heap
page read and write
1AE00038000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF7C3B000
trusted library allocation
page read and write
1ADF96F6000
trusted library allocation
page read and write
1ADF93A4000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF927F000
trusted library allocation
page read and write
1ADFC06D000
trusted library allocation
page read and write
1ADF50EB000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF7C7D000
trusted library allocation
page read and write
1387000
heap
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1392000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADFFFD6000
trusted library allocation
page read and write
1ADF8BA4000
trusted library allocation
page read and write
1AE01367000
trusted library allocation
page read and write
1ADF90B8000
trusted library allocation
page read and write
1ADF8F92000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8BF0000
trusted library allocation
page read and write
1ADF90C7000
trusted library allocation
page read and write
1ADEEE7D000
heap
page read and write
1ADFA29F000
trusted library allocation
page read and write
1ADF94A1000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF93FA000
trusted library allocation
page read and write
1ADF82EB000
trusted library allocation
page read and write
1ADFB5B5000
trusted library allocation
page read and write
17ECD284000
heap
page read and write
1ADEEE18000
heap
page read and write
1ADFFD41000
trusted library allocation
page read and write
1ADF739D000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1ADFFE9A000
trusted library allocation
page read and write
1ADF92B7000
trusted library allocation
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADF937B000
trusted library allocation
page read and write
1ADEEE83000
heap
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
74D2DD8000
stack
page read and write
1ADF7362000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
17ECD45D000
trusted library allocation
page read and write
26DBB24D000
heap
page read and write
1AE03B06000
trusted library allocation
page read and write
1ADF3F00000
trusted library allocation
page read and write
1ADF8FA9000
trusted library allocation
page read and write
1ADF905A000
trusted library allocation
page read and write
1ADEEE72000
heap
page read and write
1ADFA25D000
trusted library allocation
page read and write
24E859CA000
heap
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADF829F000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8ED9000
trusted library allocation
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADFFFCE000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1AE0000B000
trusted library allocation
page read and write
1ADF82C1000
trusted library allocation
page read and write
1ADF7AF9000
trusted library allocation
page read and write
17ECD470000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1AE002BC000
trusted library allocation
page read and write
1ADEEE80000
heap
page read and write
1ADF9347000
trusted library allocation
page read and write
1ADF7338000
trusted library allocation
page read and write
1AE000D8000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
1ADF939B000
trusted library allocation
page read and write
1AE013B1000
trusted library allocation
page read and write
29236F50000
heap
page readonly
1ADFFD6C000
trusted library allocation
page read and write
1ADF8E07000
trusted library allocation
page read and write
1ADF9355000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF825A000
trusted library allocation
page read and write
2923730C000
trusted library allocation
page read and write
1ADF9506000
trusted library allocation
page read and write
1AE000DB000
trusted library allocation
page read and write
26DBB2E3000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF7B5F000
trusted library allocation
page read and write
1ADF9471000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1ADEEE54000
heap
page read and write
26DBA673000
trusted library allocation
page read and write
F44FE3E000
unkown
page readonly
26DBB2F2000
heap
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADFFD37000
trusted library allocation
page read and write
1ADEEE75000
heap
page read and write
1ADF82BF000
trusted library allocation
page read and write
2923731B000
trusted library allocation
page read and write
1AE002FB000
trusted library allocation
page read and write
1ADF9533000
trusted library allocation
page read and write
1ADF9570000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1ADFB5F8000
trusted library allocation
page read and write
1ADEEE5E000
heap
page read and write
1AE00278000
trusted library allocation
page read and write
1ADF8F64000
trusted library allocation
page read and write
1ADEEE48000
heap
page read and write
1ADF82E9000
trusted library allocation
page read and write
1ADF77BE000
heap
page read and write
1ADEEE3D000
heap
page read and write
1ADEEE3A000
heap
page read and write
1AE01460000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF7AB4000
trusted library allocation
page read and write
1ADF93C4000
trusted library allocation
page read and write
1AE0242F000
trusted library allocation
page read and write
1ADFFDBD000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADFB260000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADF75A9000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADFFD26000
trusted library allocation
page read and write
1ADF8BCF000
trusted library allocation
page read and write
74D3DFE000
stack
page read and write
1ADFBF84000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
26DBA3A0000
heap
page read and write
1ADF87C4000
trusted library allocation
page read and write
1ADF50BE000
trusted library allocation
page read and write
1ADFBC9D000
trusted library allocation
page read and write
1ADF9277000
trusted library allocation
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1ADF5122000
trusted library allocation
page read and write
1ADF8E55000
trusted library allocation
page read and write
1280000
heap
page read and write
1ADF93AC000
trusted library allocation
page read and write
1AE031E9000
trusted library allocation
page read and write
1ADF9544000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
1AE02486000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1AE000DD000
trusted library allocation
page read and write
1ADFA246000
trusted library allocation
page read and write
138F000
heap
page read and write
24E873B9000
heap
page read and write
1ADFB5EB000
trusted library allocation
page read and write
1ADF8E5E000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF9343000
trusted library allocation
page read and write
1ADEEE6D000
heap
page read and write
1AE00881000
trusted library allocation
page read and write
1AE00227000
trusted library allocation
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADEEE21000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF8E6C000
trusted library allocation
page read and write
810000
unkown
page readonly
1ADF8930000
trusted library allocation
page read and write
1AE008FB000
trusted library allocation
page read and write
1AE03A43000
trusted library allocation
page read and write
1ADF3E7F000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1AE00146000
trusted library allocation
page read and write
1ADF9366000
trusted library allocation
page read and write
1AE00221000
trusted library allocation
page read and write
1AE02BF1000
heap
page read and write
17ECD703000
trusted library allocation
page read and write
24E8599A000
heap
page read and write
1ADEEE82000
heap
page read and write
8E4000
unkown
page readonly
13A0000
heap
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADFA29E000
trusted library allocation
page read and write
1AE0242B000
trusted library allocation
page read and write
1AE014FB000
trusted library allocation
page read and write
1ADFA24B000
trusted library allocation
page read and write
1ADF9759000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF9584000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADF50C7000
trusted library allocation
page read and write
1ADF9478000
trusted library allocation
page read and write
1ADF73F2000
trusted library allocation
page read and write
1ADF50DC000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
2923715B000
trusted library allocation
page read and write
26DBA6F3000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE78000
heap
page read and write
1ADFB5F4000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADF9341000
trusted library allocation
page read and write
1ADF9E91000
trusted library allocation
page read and write
1ADF8EB2000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADEEE6B000
heap
page read and write
29237332000
trusted library allocation
page read and write
1ADFB40F000
trusted library allocation
page read and write
1ADFB06A000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF96B7000
trusted library allocation
page read and write
1ADF50DD000
trusted library allocation
page read and write
1ADFFEF4000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADFB5C2000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADF823F000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF82AA000
trusted library allocation
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1ADF8AC6000
trusted library allocation
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF90C9000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
17ECD415000
trusted library allocation
page read and write
1ADF94B9000
trusted library allocation
page read and write
1ADF8FA9000
trusted library allocation
page read and write
1AE0007F000
trusted library allocation
page read and write
1ADF9355000
trusted library allocation
page read and write
1ADFA24A000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADFA260000
trusted library allocation
page read and write
1ADF8261000
trusted library allocation
page read and write
1AE01462000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF9342000
trusted library allocation
page read and write
1ADF8D1D000
trusted library allocation
page read and write
811000
unkown
page execute read
1AE002C2000
trusted library allocation
page read and write
1ADF9514000
trusted library allocation
page read and write
1ADFB5A5000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF90B5000
trusted library allocation
page read and write
1ADFC12E000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
26DBA6BD000
trusted library allocation
page read and write
1ADF9393000
trusted library allocation
page read and write
1ADF739D000
trusted library allocation
page read and write
1ADF9525000
trusted library allocation
page read and write
1ADFB166000
trusted library allocation
page read and write
1ADF90E0000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF4DFD000
trusted library allocation
page read and write
1ADF96A3000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF77AB000
heap
page read and write
1ADFB575000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADF8DE1000
trusted library allocation
page read and write
1ADF9355000
trusted library allocation
page read and write
1ADEEE8D000
heap
page read and write
1ADF8B8D000
trusted library allocation
page read and write
1ADEEE43000
heap
page read and write
1ADF8E51000
trusted library allocation
page read and write
1ADF7799000
heap
page read and write
26DBA582000
unclassified section
page read and write
1ADFA1BF000
trusted library allocation
page read and write
26DBB27D000
heap
page read and write
1ADF509A000
trusted library allocation
page read and write
29237246000
heap
page read and write
1AE00866000
trusted library allocation
page read and write
1AE001B5000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1AE000CA000
trusted library allocation
page read and write
1ADEEE80000
heap
page read and write
1ADF959E000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
29236D80000
unclassified section
page readonly
1ADF934A000
trusted library allocation
page read and write
1ADF8E74000
trusted library allocation
page read and write
1ADFA262000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
26DBA3AA000
heap
page read and write
1ADF8E0A000
trusted library allocation
page read and write
1ADF96FA000
trusted library allocation
page read and write
1ADFFEB9000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADF950E000
trusted library allocation
page read and write
26DBB2F1000
heap
page read and write
1ADF8294000
trusted library allocation
page read and write
1ADF9076000
trusted library allocation
page read and write
1ADF7A99000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
237E2CB0000
heap
page read and write
26DBACA0000
heap
page read and write
1ADEEE58000
heap
page read and write
26DBB33B000
heap
page read and write
1ADEEE15000
heap
page read and write
17ECD120000
heap
page read and write
1AE02B11000
heap
page read and write
1194000
heap
page read and write
26DBB344000
heap
page read and write
17ECD413000
trusted library allocation
page read and write
1ADF957D000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADEEE25000
heap
page read and write
1ADFBCAD000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF93C4000
trusted library allocation
page read and write
1ADF50DF000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF8F3A000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
26DBB269000
heap
page read and write
1ADF8F88000
trusted library allocation
page read and write
1ADF957F000
trusted library allocation
page read and write
1ADEEE1B000
heap
page read and write
76D37FA000
stack
page read and write
1ADEEE61000
heap
page read and write
1ADEEE40000
heap
page read and write
26DBA500000
heap
page read and write
13A0000
heap
page read and write
1ADEEE0D000
heap
page read and write
1ADF93E8000
trusted library allocation
page read and write
1AE02B99000
heap
page read and write
1ADF77BE000
heap
page read and write
1ADF94BB000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADEEE0A000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
FBE000
stack
page read and write
1ADF4F9C000
trusted library allocation
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
1ADFC0A7000
trusted library allocation
page read and write
1ADF82C1000
trusted library allocation
page read and write
1AE00899000
trusted library allocation
page read and write
1ADF9042000
trusted library allocation
page read and write
1ADF50FE000
trusted library allocation
page read and write
17ECD418000
trusted library allocation
page read and write
1ADEEE32000
heap
page read and write
1AE024F1000
trusted library allocation
page read and write
74D663E000
unkown
page readonly
1ADF9469000
trusted library allocation
page read and write
1ADF4F2B000
trusted library allocation
page read and write
1ADF939B000
trusted library allocation
page read and write
1ADF9326000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
29237163000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF937B000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADEEE37000
heap
page read and write
1ADF82D3000
trusted library allocation
page read and write
1ADF4F8B000
trusted library allocation
page read and write
1ADEEE7B000
heap
page read and write
1ADF9753000
trusted library allocation
page read and write
1ADF8EFB000
trusted library allocation
page read and write
1ADF8FD7000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADFB075000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADFB5F8000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF93D5000
trusted library allocation
page read and write
1ADEEE1E000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADF9FF3000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1AE002DF000
trusted library allocation
page read and write
1ADF90F8000
trusted library allocation
page read and write
1ADF93F3000
trusted library allocation
page read and write
1ADFFFDA000
trusted library allocation
page read and write
1ADFA0D5000
trusted library allocation
page read and write
1ADF7A43000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF8F64000
trusted library allocation
page read and write
1ADF93FE000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADEEE5D000
heap
page read and write
1ADFB7F2000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1AE000FB000
trusted library allocation
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1AE008F6000
trusted library allocation
page read and write
1AE000BF000
trusted library allocation
page read and write
74D563E000
unkown
page readonly
1ADFA246000
trusted library allocation
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF77BF000
heap
page read and write
1ADEEE78000
heap
page read and write
1ADF7B8D000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFB793000
trusted library allocation
page read and write
1AE02B36000
heap
page read and write
1ADF9342000
trusted library allocation
page read and write
1ADF7C79000
trusted library allocation
page read and write
1ADF9BE0000
trusted library allocation
page read and write
1ADF9635000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF8FA9000
trusted library allocation
page read and write
1ADF90B5000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1AE01807000
trusted library allocation
page read and write
1ADFFFC9000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF8AF7000
trusted library allocation
page read and write
1ADFA248000
trusted library allocation
page read and write
1ADFB1EE000
trusted library allocation
page read and write
1ADF37EF000
trusted library allocation
page read and write
26DBB100000
trusted library allocation
page read and write
1ADFB0C5000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF7334000
trusted library allocation
page read and write
1ADFFD6C000
trusted library allocation
page read and write
26DBAB60000
heap
page read and write
1ADF8B24000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADEEE8D000
heap
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF7AD4000
trusted library allocation
page read and write
1ADF93E3000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
26DBB344000
heap
page read and write
1ADFA1F3000
trusted library allocation
page read and write
F44ED3E000
unkown
page readonly
1ADEEE40000
heap
page read and write
1ADF90B6000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF8D7C000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE29000
heap
page read and write
1ADF8EBA000
trusted library allocation
page read and write
1ADF955D000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADEEE65000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADF9393000
trusted library allocation
page read and write
1ADEEE87000
heap
page read and write
1ADEEE4E000
heap
page read and write
1ADF9312000
trusted library allocation
page read and write
1ADEEE53000
heap
page read and write
1AE00244000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADEEE40000
heap
page read and write
1AE0397B000
trusted library allocation
page read and write
1ADFA3C9000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF7B66000
trusted library allocation
page read and write
1ADFC157000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1AE00881000
trusted library allocation
page read and write
1ADEEE5D000
heap
page read and write
1ADEEE31000
heap
page read and write
17ECD4B7000
trusted library allocation
page read and write
1AE0015A000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADEEE64000
heap
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADF82EE000
trusted library allocation
page read and write
1ADF7555000
trusted library allocation
page read and write
1ADF90F4000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADFA1EA000
trusted library allocation
page read and write
1ADEEE48000
heap
page read and write
26DBA681000
trusted library allocation
page read and write
1ADEEE24000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADF8B37000
trusted library allocation
page read and write
1AE039A2000
trusted library allocation
page read and write
1ADF3E26000
trusted library allocation
page read and write
1ADF85C3000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF96D6000
trusted library allocation
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1AE000D3000
trusted library allocation
page read and write
17ECD80C000
trusted library allocation
page read and write
26DBB269000
heap
page read and write
1ADF9F5D000
trusted library allocation
page read and write
1ADFFFDF000
trusted library allocation
page read and write
1ADFA06A000
trusted library allocation
page read and write
1ADEEE73000
heap
page read and write
1ADEEE10000
heap
page read and write
1ADF9734000
trusted library allocation
page read and write
1ADEEE1E000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE002F5000
trusted library allocation
page read and write
1ADF90E3000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADF8256000
trusted library allocation
page read and write
1ADEEE09000
heap
page read and write
1ADF93D5000
trusted library allocation
page read and write
1ADF8B4E000
trusted library allocation
page read and write
1ADF9E7D000
trusted library allocation
page read and write
1AE024E1000
trusted library allocation
page read and write
1ADFFE96000
trusted library allocation
page read and write
1ADEEE73000
heap
page read and write
1ADF8B24000
trusted library allocation
page read and write
1ADFB485000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1AE000E4000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE65000
heap
page read and write
1194000
heap
page read and write
1ADEEE6A000
heap
page read and write
1AE01786000
trusted library allocation
page read and write
1ADFB4BE000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF4DFD000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADF73AE000
trusted library allocation
page read and write
1ADF82C1000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF90F8000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF9599000
trusted library allocation
page read and write
1AE03300000
trusted library allocation
page read and write
1ADFBCDA000
trusted library allocation
page read and write
1190000
heap
page read and write
1ADFA252000
trusted library allocation
page read and write
1ADF4DE5000
trusted library allocation
page read and write
1ADFA263000
trusted library allocation
page read and write
1ADF82DD000
trusted library allocation
page read and write
1ADFA249000
trusted library allocation
page read and write
1AE0002E000
trusted library allocation
page read and write
1ADF4FB3000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF93E1000
trusted library allocation
page read and write
1ADFFDF6000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF8E46000
trusted library allocation
page read and write
29236D73000
remote allocation
page execute read
1ADFFEF4000
trusted library allocation
page read and write
1ADF8EB4000
trusted library allocation
page read and write
1ADF93CC000
trusted library allocation
page read and write
1ADF73DA000
trusted library allocation
page read and write
1AE002AD000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF8B51000
trusted library allocation
page read and write
1AE01933000
trusted library allocation
page read and write
1ADFB5A3000
trusted library allocation
page read and write
1ADF9759000
trusted library allocation
page read and write
1ADF7B7C000
trusted library allocation
page read and write
24E873A6000
heap
page read and write
1ADF93CC000
trusted library allocation
page read and write
17ECD286000
heap
page read and write
1194000
heap
page read and write
1ADF7B79000
trusted library allocation
page read and write
1ADF939A000
trusted library allocation
page read and write
26DBB358000
heap
page read and write
1ADF7B80000
trusted library allocation
page read and write
1ADF93F5000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADEEE53000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADEEE6B000
heap
page read and write
1ADF8246000
trusted library allocation
page read and write
1ADFA1FC000
trusted library allocation
page read and write
1ADEEE56000
heap
page read and write
1ADEEE53000
heap
page read and write
1ADF90F8000
trusted library allocation
page read and write
1ADFFFAF000
trusted library allocation
page read and write
1ADF73BF000
trusted library allocation
page read and write
1ADF75CF000
trusted library allocation
page read and write
26DBB2F1000
heap
page read and write
1ADEEE15000
heap
page read and write
17ECD400000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADFB5E7000
trusted library allocation
page read and write
1ADF8F7D000
trusted library allocation
page read and write
1AE004FD000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
29237112000
trusted library allocation
page read and write
1ADF8EC5000
trusted library allocation
page read and write
1ADEEE72000
heap
page read and write
1ADEEE18000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADF8F88000
trusted library allocation
page read and write
FDB000
stack
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1ADF7B61000
trusted library allocation
page read and write
1AE03A4D000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
8AC000
unkown
page readonly
1ADFB45D000
trusted library allocation
page read and write
1ADF7C47000
trusted library allocation
page read and write
110E000
stack
page read and write
1ADEEE53000
heap
page read and write
17ECD2A3000
heap
page read and write
26DBB2F1000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF94D6000
trusted library allocation
page read and write
1ADF4FDE000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFA1E2000
trusted library allocation
page read and write
1ADFBCDA000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
24E85B07000
trusted library allocation
page read and write
1ADFFE9D000
trusted library allocation
page read and write
17ECD12A000
heap
page read and write
1ADEEE43000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADEEE11000
heap
page read and write
1AE024C1000
trusted library allocation
page read and write
1ADEEE31000
heap
page read and write
1AE00022000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF959C000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1AE002DF000
trusted library allocation
page read and write
1ADF8FEC000
trusted library allocation
page read and write
1ADFC007000
trusted library allocation
page read and write
1ADFB7C0000
trusted library allocation
page read and write
1ADF8DDC000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADFB21B000
trusted library allocation
page read and write
24E873B8000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADF7AA8000
trusted library allocation
page read and write
1ADFB0AC000
trusted library allocation
page read and write
1ADF4F90000
trusted library allocation
page read and write
1ADF9363000
trusted library allocation
page read and write
1ADF7563000
trusted library allocation
page read and write
1ADF8E47000
trusted library allocation
page read and write
1ADF8F08000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF90CC000
trusted library allocation
page read and write
1ADF828E000
trusted library allocation
page read and write
1ADF9696000
trusted library allocation
page read and write
1ADF4DF2000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF9ED1000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF4F97000
trusted library allocation
page read and write
1ADF73DC000
trusted library allocation
page read and write
1ADEEE84000
heap
page read and write
1194000
heap
page read and write
1ADEEE10000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADF9FDA000
trusted library allocation
page read and write
1AE0084D000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF8F66000
trusted library allocation
page read and write
1AE03AE4000
trusted library allocation
page read and write
1AE01379000
trusted library allocation
page read and write
1ADF9481000
trusted library allocation
page read and write
1ADFFE08000
trusted library allocation
page read and write
1ADF8E93000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADEEE39000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF7785000
heap
page read and write
1AE024A8000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF50F6000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1AE004E0000
trusted library allocation
page read and write
1AE0146E000
trusted library allocation
page read and write
1ADF90E3000
trusted library allocation
page read and write
1ADF95BC000
trusted library allocation
page read and write
1ADF9694000
trusted library allocation
page read and write
1ADFB292000
trusted library allocation
page read and write
1ADFC106000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF3D76000
trusted library allocation
page read and write
1ADF90B5000
trusted library allocation
page read and write
1ADF93E6000
trusted library allocation
page read and write
26DBB322000
heap
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1ADF95A3000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF94BF000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
D608FFE000
stack
page read and write
26DBA66F000
trusted library allocation
page read and write
1ADF8F5C000
trusted library allocation
page read and write
1AE03283000
trusted library allocation
page read and write
1AE01369000
trusted library allocation
page read and write
1ADF90C9000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADFA3A1000
trusted library allocation
page read and write
1ADF7B6D000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1ADF93DB000
trusted library allocation
page read and write
1ADF93E3000
trusted library allocation
page read and write
1ADFC005000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF8F88000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF8B49000
trusted library allocation
page read and write
1ADF93BC000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
9F0000
heap
page read and write
1ADFFD76000
trusted library allocation
page read and write
1ADF958D000
trusted library allocation
page read and write
1AE02D00000
trusted library allocation
page read and write
26DBB32A000
heap
page read and write
1ADF779F000
heap
page read and write
1ADEEE42000
heap
page read and write
1ADF9396000
trusted library allocation
page read and write
1AE00051000
trusted library allocation
page read and write
1ADF87E7000
trusted library allocation
page read and write
1ADF87C3000
trusted library allocation
page read and write
1ADF8BF0000
trusted library allocation
page read and write
1ADF8EFE000
trusted library allocation
page read and write
1ADF90C8000
trusted library allocation
page read and write
1ADEEE52000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE000D1000
trusted library allocation
page read and write
1ADF8BF1000
trusted library allocation
page read and write
1ADEEE5D000
heap
page read and write
1AE001B9000
trusted library allocation
page read and write
1ADFB15A000
trusted library allocation
page read and write
1ADFA0DD000
trusted library allocation
page read and write
1ADF7C6F000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
24E85B00000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF779A000
heap
page read and write
26DBB25C000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF5074000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF93E8000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFFE9A000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1AE00231000
trusted library allocation
page read and write
F44DCBB000
stack
page read and write
1AE024D5000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF77AD000
heap
page read and write
1ADEEE0D000
heap
page read and write
1ADF4DDA000
trusted library allocation
page read and write
1ADFB15F000
trusted library allocation
page read and write
1ADFB5D1000
trusted library allocation
page read and write
1ADF5052000
trusted library allocation
page read and write
1ADFB4E3000
trusted library allocation
page read and write
1ADF8EDA000
trusted library allocation
page read and write
1AE000E2000
trusted library allocation
page read and write
1ADEEE4F000
heap
page read and write
1ADF9511000
trusted library allocation
page read and write
1ADF7CC6000
trusted library allocation
page read and write
1ADFFE8E000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF5090000
trusted library allocation
page read and write
1ADF8F7B000
trusted library allocation
page read and write
1AE00131000
trusted library allocation
page read and write
1ADF3E66000
trusted library allocation
page read and write
1ADF82D3000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
8E4000
unkown
page readonly
1ADEEE82000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF37B3000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF85FB000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1ADFC0E4000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADEEE6E000
heap
page read and write
1ADFB5F8000
trusted library allocation
page read and write
1ADEEE1E000
heap
page read and write
1AE02B71000
heap
page read and write
1ADFB0BF000
trusted library allocation
page read and write
1ADF8BE4000
trusted library allocation
page read and write
1ADF4DD3000
trusted library allocation
page read and write
1150000
heap
page read and write
1ADF8FD6000
trusted library allocation
page read and write
1ADF7339000
trusted library allocation
page read and write
1ADF8EA5000
trusted library allocation
page read and write
1ADEEE43000
heap
page read and write
1ADFBCAB000
trusted library allocation
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF7B62000
trusted library allocation
page read and write
1ADF931B000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADEEE0A000
heap
page read and write
1AE0024F000
trusted library allocation
page read and write
1AE018AC000
trusted library allocation
page read and write
1AE0130A000
trusted library allocation
page read and write
8AC000
unkown
page readonly
1ADF93CC000
trusted library allocation
page read and write
1ADF779C000
heap
page read and write
26DBB260000
heap
page read and write
1ADF7563000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF90C3000
trusted library allocation
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF934A000
trusted library allocation
page read and write
1ADF828D000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1ADFB5E0000
trusted library allocation
page read and write
1ADF7A63000
trusted library allocation
page read and write
1ADF90A3000
trusted library allocation
page read and write
1ADF75FD000
trusted library allocation
page read and write
1ADFFDD9000
trusted library allocation
page read and write
1ADFB05D000
trusted library allocation
page read and write
1ADF73B1000
trusted library allocation
page read and write
24E859CA000
heap
page read and write
1ADF942E000
trusted library allocation
page read and write
1388000
heap
page read and write
1ADF8D44000
trusted library allocation
page read and write
1ADEEDF7000
heap
page read and write
1ADF8ECD000
trusted library allocation
page read and write
26DBB263000
heap
page read and write
1ADEEE6A000
heap
page read and write
1ADFB5E2000
trusted library allocation
page read and write
26DBA6C7000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADEEE40000
heap
page read and write
17ECD0C0000
remote allocation
page execute read
26DBA600000
trusted library allocation
page read and write
1ADFB1B3000
trusted library allocation
page read and write
26DBAC7F000
unkown
page execute read
1ADF9747000
trusted library allocation
page read and write
1ADF93F0000
trusted library allocation
page read and write
F44ED7E000
stack
page read and write
1ADFB075000
trusted library allocation
page read and write
1ADF945F000
trusted library allocation
page read and write
26DBB2EC000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF8DD5000
trusted library allocation
page read and write
1ADEEE76000
heap
page read and write
1ADEEE57000
heap
page read and write
1ADFFD7B000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
1ADF8BF1000
trusted library allocation
page read and write
1ADF8D1F000
trusted library allocation
page read and write
1ADF946F000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADF92FA000
trusted library allocation
page read and write
1ADEEE45000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADF7B83000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
1ADEEE0D000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF7B5A000
trusted library allocation
page read and write
1ADF8291000
trusted library allocation
page read and write
1ADF3D23000
trusted library allocation
page read and write
1ADF8E73000
trusted library allocation
page read and write
1ADFFD21000
trusted library allocation
page read and write
1ADFB5A7000
trusted library allocation
page read and write
1ADEEE78000
heap
page read and write
1ADEEE58000
heap
page read and write
1AE001BD000
trusted library allocation
page read and write
1AE0248C000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADFFE30000
trusted library allocation
page read and write
F44D3FE000
stack
page read and write
17ECD2C0000
unclassified section
page read and write
1ADF903C000
trusted library allocation
page read and write
1ADFB4A2000
trusted library allocation
page read and write
1ADF82F8000
trusted library allocation
page read and write
1ADFBCC6000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFB249000
trusted library allocation
page read and write
1ADEEE0C000
heap
page read and write
1AE032D3000
trusted library allocation
page read and write
1AE000DB000
trusted library allocation
page read and write
1ADF8D82000
trusted library allocation
page read and write
1AE0029E000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF9588000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF8AF0000
trusted library allocation
page read and write
1ADEEE82000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADEEE6A000
heap
page read and write
1AE02B01000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADEEE5F000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADFFD8A000
trusted library allocation
page read and write
1ADF8EB2000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF50DF000
trusted library allocation
page read and write
1ADF50BC000
trusted library allocation
page read and write
1ADF90FA000
trusted library allocation
page read and write
1AE0192C000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF3784000
trusted library allocation
page read and write
1ADEEE2C000
heap
page read and write
F44F63E000
stack
page read and write
1ADFC04D000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADFB156000
trusted library allocation
page read and write
1ADF9521000
trusted library allocation
page read and write
17ECD4AF000
trusted library allocation
page read and write
1ADF8F98000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFFECE000
trusted library allocation
page read and write
1ADFFF6F000
trusted library allocation
page read and write
1AE0146A000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1AE00422000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF93B4000
trusted library allocation
page read and write
1ADF92FC000
trusted library allocation
page read and write
1ADEEE8D000
heap
page read and write
1ADF9FF3000
trusted library allocation
page read and write
1ADFBFE5000
trusted library allocation
page read and write
1ADF9462000
trusted library allocation
page read and write
1ADF9573000
trusted library allocation
page read and write
24E873A0000
heap
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1AE008F2000
trusted library allocation
page read and write
1ADFB2AC000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE0A000
heap
page read and write
1ADF93F3000
trusted library allocation
page read and write
26DBB260000
heap
page read and write
1AE00034000
trusted library allocation
page read and write
1AE00248000
trusted library allocation
page read and write
1ADF96F0000
trusted library allocation
page read and write
1ADF9543000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADF50A8000
trusted library allocation
page read and write
1ADF50DD000
trusted library allocation
page read and write
1ADFA1FE000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADEEE4C000
heap
page read and write
29237300000
trusted library allocation
page read and write
1ADF93C4000
trusted library allocation
page read and write
1AE002F7000
trusted library allocation
page read and write
26DBA210000
unclassified section
page readonly
1ADEEE14000
heap
page read and write
1ADF7B5F000
trusted library allocation
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADF8F4D000
trusted library allocation
page read and write
26DBA676000
trusted library allocation
page read and write
1AE001F6000
trusted library allocation
page read and write
1ADFA0B0000
trusted library allocation
page read and write
1ADFA31F000
trusted library allocation
page read and write
1ADFFFFD000
trusted library allocation
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF9349000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADFA318000
trusted library allocation
page read and write
1ADF9525000
trusted library allocation
page read and write
1ADFFE92000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
1AE024E8000
trusted library allocation
page read and write
1ADEEE44000
heap
page read and write
1ADF828E000
trusted library allocation
page read and write
1ADFA248000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF8BFE000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1DC3AFE000
stack
page read and write
8D2000
unkown
page readonly
1ADF9BDD000
trusted library allocation
page read and write
2FE8751000
trusted library allocation
page execute read
24E85940000
heap
page read and write
1AE0024F000
trusted library allocation
page read and write
1ADFB470000
trusted library allocation
page read and write
1AE03A0C000
trusted library allocation
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADEEE17000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADFC086000
trusted library allocation
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADFA0AD000
trusted library allocation
page read and write
1ADFB23A000
trusted library allocation
page read and write
1388000
heap
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADFA26C000
trusted library allocation
page read and write
1ADF82AA000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF9530000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
1AE03A07000
trusted library allocation
page read and write
1ADF8F08000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE61000
heap
page read and write
1ADF7AAB000
trusted library allocation
page read and write
1AE00038000
trusted library allocation
page read and write
1ADF90C7000
trusted library allocation
page read and write
1ADFFD2D000
trusted library allocation
page read and write
1ADF9323000
trusted library allocation
page read and write
1ADFA298000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF7B8D000
trusted library allocation
page read and write
1ADF9047000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF778F000
heap
page read and write
1AE01497000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADEEE3D000
heap
page read and write
1ADFFD76000
trusted library allocation
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADFB5F2000
trusted library allocation
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1ADF8E36000
trusted library allocation
page read and write
1ADEEE76000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADFB046000
trusted library allocation
page read and write
1ADFFE1D000
trusted library allocation
page read and write
1ADFB5A1000
trusted library allocation
page read and write
1ADF3D2F000
trusted library allocation
page read and write
1ADF9366000
trusted library allocation
page read and write
1390000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADFA281000
trusted library allocation
page read and write
1ADF87F5000
trusted library allocation
page read and write
1ADF8EA5000
trusted library allocation
page read and write
1ADF509D000
trusted library allocation
page read and write
1ADEEE82000
heap
page read and write
1ADF9766000
trusted library allocation
page read and write
1ADFFDAA000
trusted library allocation
page read and write
1ADFB2A2000
trusted library allocation
page read and write
1ADEEE78000
heap
page read and write
1ADF7B3F000
trusted library allocation
page read and write
1ADF957D000
trusted library allocation
page read and write
1ADF9326000
trusted library allocation
page read and write
1ADF5098000
trusted library allocation
page read and write
1ADF8F47000
trusted library allocation
page read and write
1ADF8E3D000
trusted library allocation
page read and write
1ADFA31A000
trusted library allocation
page read and write
1ADF425B000
trusted library allocation
page read and write
1ADF8BF9000
trusted library allocation
page read and write
1ADF7B81000
trusted library allocation
page read and write
1AE000F7000
trusted library allocation
page read and write
1AE024A5000
trusted library allocation
page read and write
1AE03AC5000
trusted library allocation
page read and write
1ADF50BE000
trusted library allocation
page read and write
1ADF951C000
trusted library allocation
page read and write
1AE014FB000
trusted library allocation
page read and write
1ADF97F4000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
74D22CC000
stack
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF7A62000
trusted library allocation
page read and write
1ADFA22D000
trusted library allocation
page read and write
1ADF8B8F000
trusted library allocation
page read and write
1ADF730B000
trusted library allocation
page read and write
1ADF8BCF000
trusted library allocation
page read and write
1AE0239F000
trusted library allocation
page read and write
1ADF8910000
trusted library allocation
page read and write
1AE01A1C000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF82B8000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADFFE8E000
trusted library allocation
page read and write
76D3FFE000
stack
page read and write
1ADF9599000
trusted library allocation
page read and write
1AE017C8000
trusted library allocation
page read and write
1ADF8A75000
trusted library allocation
page read and write
1ADEEE31000
heap
page read and write
1ADF82C1000
trusted library allocation
page read and write
1AE024E2000
trusted library allocation
page read and write
1ADFFEC4000
trusted library allocation
page read and write
1ADEEE68000
heap
page read and write
1ADF9FA5000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1AE0083A000
trusted library allocation
page read and write
1AE0369E000
trusted library allocation
page read and write
1ADFA090000
trusted library allocation
page read and write
1ADF87C5000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF9523000
trusted library allocation
page read and write
8DC000
unkown
page write copy
1ADF50DC000
trusted library allocation
page read and write
1ADF9512000
trusted library allocation
page read and write
1ADF7AE7000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF5049000
trusted library allocation
page read and write
1ADFFD4F000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF82E0000
trusted library allocation
page read and write
24E859AD000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADEEE11000
heap
page read and write
F44E53E000
stack
page read and write
1ADEEE46000
heap
page read and write
1ADFB5E2000
trusted library allocation
page read and write
1AE004F8000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
17ECD2B0000
heap
page readonly
1ADEEE4E000
heap
page read and write
1ADF93D5000
trusted library allocation
page read and write
1AE002AD000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
29237314000
trusted library allocation
page read and write
1ADF7CAD000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF3D2F000
trusted library allocation
page read and write
1AE02FA8000
trusted library allocation
page read and write
1ADFA3C0000
trusted library allocation
page read and write
1ADF8F06000
trusted library allocation
page read and write
1ADF93B8000
trusted library allocation
page read and write
1ADF906E000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFFDAB000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADEEE15000
heap
page read and write
1AE00035000
trusted library allocation
page read and write
1ADF9BF9000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF77BE000
heap
page read and write
1AE03B57000
trusted library allocation
page read and write
1ADF7C79000
trusted library allocation
page read and write
26DBB358000
heap
page read and write
1ADF9352000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE72000
heap
page read and write
1AE01901000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1368000
heap
page read and write
1ADFFEBF000
trusted library allocation
page read and write
1ADF9352000
trusted library allocation
page read and write
26DBB26C000
heap
page read and write
24E859C2000
heap
page read and write
26DBB264000
heap
page read and write
1AE023FA000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF50C1000
trusted library allocation
page read and write
1ADF96A3000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
29236F90000
unclassified section
page readonly
1ADFA0C7000
trusted library allocation
page read and write
1B5E000
stack
page read and write
17ECD40C000
trusted library allocation
page read and write
1AE0008C000
trusted library allocation
page read and write
1ADF4FA7000
trusted library allocation
page read and write
26DBA5D0000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF9EC7000
trusted library allocation
page read and write
1AE0006B000
trusted library allocation
page read and write
1ADF82D7000
trusted library allocation
page read and write
1AE000A4000
trusted library allocation
page read and write
1ADF9523000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADF903E000
trusted library allocation
page read and write
1ADEEE53000
heap
page read and write
1ADF8E73000
trusted library allocation
page read and write
1ADF8F82000
trusted library allocation
page read and write
1ADF7AA8000
trusted library allocation
page read and write
1ADF825D000
trusted library allocation
page read and write
F44EDFE000
stack
page read and write
1AE004E9000
trusted library allocation
page read and write
1ADF7CD8000
trusted library allocation
page read and write
1ADF50BC000
trusted library allocation
page read and write
1ADF3EFB000
trusted library allocation
page read and write
1ADF934A000
trusted library allocation
page read and write
1ADF8F78000
trusted library allocation
page read and write
1ADFFD37000
trusted library allocation
page read and write
1ADFB0FE000
trusted library allocation
page read and write
26DBB260000
heap
page read and write
1ADEEE2B000
heap
page read and write
1ADF9599000
trusted library allocation
page read and write
1ADEEE7D000
heap
page read and write
1ADF8EB6000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADEEE87000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADFFDF6000
trusted library allocation
page read and write
1ADF958D000
trusted library allocation
page read and write
1ADF94B0000
trusted library allocation
page read and write
1ADF73DC000
trusted library allocation
page read and write
1AE02B36000
heap
page read and write
1ADF7B6D000
trusted library allocation
page read and write
1ADF8EC5000
trusted library allocation
page read and write
1AE02B0B000
heap
page read and write
1ADFB073000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF97EC000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF7799000
heap
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADF8B9B000
trusted library allocation
page read and write
1ADF7B87000
trusted library allocation
page read and write
26DBB115000
trusted library allocation
page read and write
1AE004F7000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF958A000
trusted library allocation
page read and write
1AE002C2000
trusted library allocation
page read and write
1DC3A3E000
unkown
page readonly
1ADFFFF0000
trusted library allocation
page read and write
1ADF5074000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADF8B2B000
trusted library allocation
page read and write
1AE01464000
trusted library allocation
page read and write
1ADF77B2000
heap
page read and write
1ADF8E74000
trusted library allocation
page read and write
1ADFFD7F000
trusted library allocation
page read and write
1ADFB2D1000
trusted library allocation
page read and write
1ADF90B5000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADEEE82000
heap
page read and write
1AE02B8E000
heap
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF8FA9000
trusted library allocation
page read and write
1ADFA2C6000
trusted library allocation
page read and write
1ADFA262000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
2923710D000
trusted library allocation
page read and write
1AE000D8000
trusted library allocation
page read and write
1ADEEE7B000
heap
page read and write
26DBB200000
heap
page read and write
1ADEEE37000
heap
page read and write
1ADF8E95000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADFB45B000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADF502B000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF9FDE000
trusted library allocation
page read and write
26DBB359000
heap
page read and write
26DBB2A8000
heap
page read and write
26DBB2E0000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADFA297000
trusted library allocation
page read and write
1AE00084000
trusted library allocation
page read and write
1ADFFE2D000
trusted library allocation
page read and write
1ADEEE7D000
heap
page read and write
1ADF8E55000
trusted library allocation
page read and write
1ADF3DFB000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADEEE83000
heap
page read and write
1ADF77A4000
heap
page read and write
1ADF9BE2000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADF9573000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1AE013F5000
trusted library allocation
page read and write
1ADFB5A5000
trusted library allocation
page read and write
14B54EF03000
trusted library allocation
page read and write
1ADF93BC000
trusted library allocation
page read and write
1ADF3E7D000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADEEE39000
heap
page read and write
1ADEEE18000
heap
page read and write
1ADF94CB000
trusted library allocation
page read and write
29237123000
trusted library allocation
page read and write
1ADF9347000
trusted library allocation
page read and write
1DC3B3E000
unkown
page readonly
1ADF8ED3000
trusted library allocation
page read and write
1ADFA248000
trusted library allocation
page read and write
1ADFA29E000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF77A8000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF96AD000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8FE8000
trusted library allocation
page read and write
26DBB25C000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1AE013EF000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
26DBA69F000
trusted library allocation
page read and write
1ADF93DC000
trusted library allocation
page read and write
1ADF3EA7000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF9552000
trusted library allocation
page read and write
1ADF8BF0000
trusted library allocation
page read and write
1ADEEE4B000
heap
page read and write
1ADF7C6E000
trusted library allocation
page read and write
1ADEEE1D000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF9596000
trusted library allocation
page read and write
1AE0024D000
trusted library allocation
page read and write
1ADF8F98000
trusted library allocation
page read and write
1AE02B00000
trusted library allocation
page read and write
1ADF90B1000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF8F64000
trusted library allocation
page read and write
1ADF8E5C000
trusted library allocation
page read and write
1ADF7786000
heap
page read and write
1ADFB260000
trusted library allocation
page read and write
26DBB367000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADF7A99000
trusted library allocation
page read and write
1ADEEE05000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADFBCAD000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADFFF8F000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1AE004FD000
trusted library allocation
page read and write
26DBB32A000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF7363000
trusted library allocation
page read and write
1ADF93DB000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF934D000
trusted library allocation
page read and write
1AE00035000
trusted library allocation
page read and write
1ADF924A000
trusted library allocation
page read and write
1ADFB1CC000
trusted library allocation
page read and write
1ADF966C000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1AE0192E000
trusted library allocation
page read and write
1AE002A9000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF7C68000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF82E9000
trusted library allocation
page read and write
1ADFA3A5000
trusted library allocation
page read and write
1ADF8B67000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF8E60000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8FDF000
trusted library allocation
page read and write
12A0000
heap
page read and write
1ADF93E8000
trusted library allocation
page read and write
1AE036F1000
trusted library allocation
page read and write
1ADF77BF000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADFFD47000
trusted library allocation
page read and write
1ADF4D5F000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADEEE0D000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADF9BE7000
trusted library allocation
page read and write
1ADF933A000
trusted library allocation
page read and write
F44DBFE000
unkown
page readonly
1AE002D1000
trusted library allocation
page read and write
1ADFB55D000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1AE00899000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADFBCCA000
trusted library allocation
page read and write
29236F60000
unclassified section
page read and write
1ADFC041000
trusted library allocation
page read and write
1ADF77A5000
heap
page read and write
1ADF90FA000
trusted library allocation
page read and write
1ADFFD21000
trusted library allocation
page read and write
1DC31FE000
stack
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADFFE8D000
trusted library allocation
page read and write
98A000
stack
page read and write
1ADEEE6A000
heap
page read and write
1AE0397F000
trusted library allocation
page read and write
1ADEEE18000
heap
page read and write
1ADEEE60000
heap
page read and write
26DBB2E9000
heap
page read and write
1ADF7B8D000
trusted library allocation
page read and write
1ADF8EBA000
trusted library allocation
page read and write
1ADFB28C000
trusted library allocation
page read and write
1AE0002E000
trusted library allocation
page read and write
1ADF93CA000
trusted library allocation
page read and write
1ADEEE65000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1AE014E4000
trusted library allocation
page read and write
1ADF50FE000
trusted library allocation
page read and write
29236CF0000
unclassified section
page readonly
1ADF933C000
trusted library allocation
page read and write
1AE02B01000
heap
page read and write
1ADF8B2D000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADFA1BC000
trusted library allocation
page read and write
1ADFBCD4000
trusted library allocation
page read and write
1ADFFD9D000
trusted library allocation
page read and write
1ADFFD8A000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF96A0000
trusted library allocation
page read and write
1ADFA1C2000
trusted library allocation
page read and write
1ADEEE90000
heap
page read and write
1ADF4DFD000
trusted library allocation
page read and write
1AE00199000
trusted library allocation
page read and write
26DBB2EC000
heap
page read and write
1ADF8EEC000
trusted library allocation
page read and write
26DBA623000
trusted library allocation
page read and write
1AE03A86000
trusted library allocation
page read and write
1AE00210000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1AE000F5000
trusted library allocation
page read and write
17ECD230000
heap
page read and write
1ADEEE59000
heap
page read and write
26DBB367000
heap
page read and write
26DBB260000
heap
page read and write
1ADEEE5B000
heap
page read and write
1ADEEE4E000
heap
page read and write
1ADF90FA000
trusted library allocation
page read and write
1ADEEE33000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADF7CAE000
trusted library allocation
page read and write
1ADFFEEE000
trusted library allocation
page read and write
1ADF73F2000
trusted library allocation
page read and write
1ADF8B6E000
trusted library allocation
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF93FE000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE5C000
heap
page read and write
1ADF9772000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF9544000
trusted library allocation
page read and write
1AE024F1000
trusted library allocation
page read and write
1ADF9511000
trusted library allocation
page read and write
1ADFBCCA000
trusted library allocation
page read and write
1AE00189000
trusted library allocation
page read and write
74D228E000
unkown
page readonly
1ADF8EB2000
trusted library allocation
page read and write
1ADF9512000
trusted library allocation
page read and write
1ADF8B1C000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
74D5E3E000
stack
page read and write
1ADF87F5000
trusted library allocation
page read and write
2FE86C1000
trusted library allocation
page execute read
1AE0241A000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF8B49000
trusted library allocation
page read and write
1ADF9520000
trusted library allocation
page read and write
1ADEEE87000
heap
page read and write
1ADEEE6A000
heap
page read and write
1ADF90B1000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
26DBB2E1000
heap
page read and write
1ADF8FCD000
trusted library allocation
page read and write
24E859B2000
heap
page read and write
24E858E0000
heap
page read and write
1ADF7374000
trusted library allocation
page read and write
1ADF779B000
heap
page read and write
1ADEEE46000
heap
page read and write
FFE000
stack
page read and write
1ADFFD2D000
trusted library allocation
page read and write
1AE02B99000
heap
page read and write
1ADF77A9000
heap
page read and write
26DBB358000
heap
page read and write
1AE00051000
trusted library allocation
page read and write
1ADF87FA000
trusted library allocation
page read and write
1AE01316000
trusted library allocation
page read and write
26DBAC60000
trusted library allocation
page read and write
1ADF8E55000
trusted library allocation
page read and write
1ADF7B5A000
trusted library allocation
page read and write
1ADF87FD000
trusted library allocation
page read and write
1ADF8E93000
trusted library allocation
page read and write
1AE03A6D000
trusted library allocation
page read and write
26DBB367000
heap
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF5090000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF9BE7000
trusted library allocation
page read and write
1ADFB5E7000
trusted library allocation
page read and write
1ADF825C000
trusted library allocation
page read and write
1ADFA225000
trusted library allocation
page read and write
1ADF8295000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8247000
trusted library allocation
page read and write
1ADF8E6A000
trusted library allocation
page read and write
1ADF9033000
trusted library allocation
page read and write
26DBA648000
trusted library allocation
page read and write
1ADF50A1000
trusted library allocation
page read and write
1ADFB59B000
trusted library allocation
page read and write
1AE0362F000
trusted library allocation
page read and write
1ADFB166000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF90B8000
trusted library allocation
page read and write
26DBA220000
unclassified section
page readonly
1ADEEE11000
heap
page read and write
1ADFA34C000
trusted library allocation
page read and write
1ADF8E2C000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADEEE56000
heap
page read and write
1ADF9713000
trusted library allocation
page read and write
1ADF8F5E000
trusted library allocation
page read and write
1ADF8FA5000
trusted library allocation
page read and write
74D238E000
unkown
page readonly
17ECD2A0000
heap
page read and write
1ADF779F000
heap
page read and write
26DBA2B0000
heap
page read and write
1ADF973A000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
26DBB260000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF93EC000
trusted library allocation
page read and write
24E85900000
heap
page read and write
1ADF8ADD000
trusted library allocation
page read and write
1ADF7C79000
trusted library allocation
page read and write
1ADF73A3000
trusted library allocation
page read and write
1ADFB2F7000
trusted library allocation
page read and write
1ADF82FC000
trusted library allocation
page read and write
1ADF50C4000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADEEE48000
heap
page read and write
1AE000BF000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
29236D00000
unclassified section
page readonly
1ADEEE75000
heap
page read and write
1AE01468000
trusted library allocation
page read and write
1AE002F5000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADEEE3B000
heap
page read and write
26DBB367000
heap
page read and write
1ADFFFC5000
trusted library allocation
page read and write
1ADEEE56000
heap
page read and write
1ADF8F7D000
trusted library allocation
page read and write
1AE004F3000
trusted library allocation
page read and write
1ADF9BF9000
trusted library allocation
page read and write
1ADF4FB4000
trusted library allocation
page read and write
1ADEEE67000
heap
page read and write
1ADF8FE0000
trusted library allocation
page read and write
1ADFA372000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF7362000
trusted library allocation
page read and write
1ADFB0A7000
trusted library allocation
page read and write
138B000
heap
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADF7B8D000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1AE016C8000
trusted library allocation
page read and write
1ADFBC9F000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF90D3000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1AE00197000
trusted library allocation
page read and write
1ADF3EF0000
trusted library allocation
page read and write
1ADEEE78000
heap
page read and write
1ADF8268000
trusted library allocation
page read and write
17ECD466000
trusted library allocation
page read and write
1ADF93AC000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1DC17DE000
stack
page read and write
1ADFB2F5000
trusted library allocation
page read and write
1ADF93E9000
trusted library allocation
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADF97E9000
trusted library allocation
page read and write
1ADF8AC6000
trusted library allocation
page read and write
1ADF90E0000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF92F2000
trusted library allocation
page read and write
1ADF50DD000
trusted library allocation
page read and write
1ADF778F000
heap
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF8E60000
trusted library allocation
page read and write
1ADF8EB2000
trusted library allocation
page read and write
1ADFFDC4000
trusted library allocation
page read and write
1ADEEE5F000
heap
page read and write
1ADFFF89000
trusted library allocation
page read and write
1ADEEE3D000
heap
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADF96F7000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADF8FF5000
trusted library allocation
page read and write
26DBB358000
heap
page read and write
114E000
stack
page read and write
1ADF3EFB000
trusted library allocation
page read and write
1ADEEE53000
heap
page read and write
1ADF8291000
trusted library allocation
page read and write
1ADF8BEE000
trusted library allocation
page read and write
1ADFB5D1000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1ADFB223000
trusted library allocation
page read and write
26DBA560000
heap
page read and write
1ADFA1E6000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF8EB4000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1AE024E8000
trusted library allocation
page read and write
1AE000D3000
trusted library allocation
page read and write
1ADF7B77000
trusted library allocation
page read and write
26DBA564000
heap
page read and write
1AE0011B000
trusted library allocation
page read and write
1ADF8BE6000
trusted library allocation
page read and write
29236E00000
heap
page read and write
1ADF750A000
trusted library allocation
page read and write
1AE0085D000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFA3F6000
trusted library allocation
page read and write
1ADEEE82000
heap
page read and write
1ADF504E000
trusted library allocation
page read and write
1AE024A0000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF829C000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF512D000
trusted library allocation
page read and write
1ADEEE3B000
heap
page read and write
1ADF8E50000
trusted library allocation
page read and write
1AE024DF000
trusted library allocation
page read and write
1ADF75CF000
trusted library allocation
page read and write
1ADFB5AA000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF9333000
trusted library allocation
page read and write
1ADEEDF4000
heap
page read and write
1ADEEE83000
heap
page read and write
26DBB2EC000
heap
page read and write
1ADEEE54000
heap
page read and write
1ADF37EF000
trusted library allocation
page read and write
1ADEEE05000
heap
page read and write
1ADF82AA000
trusted library allocation
page read and write
1ADF94C8000
trusted library allocation
page read and write
74D4E3E000
stack
page read and write
1ADF93A7000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF96F6000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADFFE40000
trusted library allocation
page read and write
29237000000
trusted library allocation
page read and write
2923715D000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADFB5DA000
trusted library allocation
page read and write
1ADF87D4000
trusted library allocation
page read and write
1ADFFF41000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1AE001AF000
trusted library allocation
page read and write
1ADFB7D2000
trusted library allocation
page read and write
1ADF87C9000
trusted library allocation
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADFBCBC000
trusted library allocation
page read and write
26DBAC70000
unkown
page execute read
1ADF8FD7000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADF7C97000
trusted library allocation
page read and write
1AE024EC000
trusted library allocation
page read and write
1ADFA3C9000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1ADFB5E2000
trusted library allocation
page read and write
1ADF9469000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADEEE0C000
heap
page read and write
1ADEEE59000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADF946D000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
D6097FF000
stack
page read and write
1393000
heap
page read and write
1ADF957F000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1ADF8BFE000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF904B000
trusted library allocation
page read and write
29237198000
trusted library allocation
page read and write
1ADF97F4000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADFB081000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1AE0132D000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFA0E4000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1DC5B3E000
unkown
page readonly
1ADF954C000
trusted library allocation
page read and write
1AE013BC000
trusted library allocation
page read and write
1ADFA396000
trusted library allocation
page read and write
1ADEEE1D000
heap
page read and write
1ADEEE73000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADF7C74000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADFA29E000
trusted library allocation
page read and write
1ADF50C1000
trusted library allocation
page read and write
1ADF75C9000
trusted library allocation
page read and write
1ADFB2C8000
trusted library allocation
page read and write
1AE000AC000
trusted library allocation
page read and write
1ADFFE38000
trusted library allocation
page read and write
1AE00094000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADFB2ED000
trusted library allocation
page read and write
1ADF8B9A000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF7B3E000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFB5C2000
trusted library allocation
page read and write
1ADF8B24000
trusted library allocation
page read and write
1ADFA1E8000
trusted library allocation
page read and write
1ADF8E3D000
trusted library allocation
page read and write
1AE01805000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
1ADF7C6E000
trusted library allocation
page read and write
1ADF8E73000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
29237110000
trusted library allocation
page read and write
1ADF7C7C000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADF7CC5000
trusted library allocation
page read and write
1ADF7582000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADF82C1000
trusted library allocation
page read and write
24E87570000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF933F000
trusted library allocation
page read and write
1AE004F9000
trusted library allocation
page read and write
17ECD0D0000
unclassified section
page readonly
1ADFB073000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1AE00021000
trusted library allocation
page read and write
1AE00043000
trusted library allocation
page read and write
13A8000
heap
page read and write
1ADF9789000
trusted library allocation
page read and write
1ADEEE62000
heap
page read and write
1ADF7B61000
trusted library allocation
page read and write
1ADF823F000
trusted library allocation
page read and write
1ADFB098000
trusted library allocation
page read and write
1ADFA2C6000
trusted library allocation
page read and write
1ADF8FB1000
trusted library allocation
page read and write
26DBB2E6000
heap
page read and write
1ADF3790000
trusted library allocation
page read and write
1AE013A0000
trusted library allocation
page read and write
1ADF9533000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADF957F000
trusted library allocation
page read and write
1ADF8FE8000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADEEE40000
heap
page read and write
76D37FF000
stack
page read and write
1ADF7C97000
trusted library allocation
page read and write
1ADFA310000
trusted library allocation
page read and write
1ADF82C1000
trusted library allocation
page read and write
1ADF8B6C000
trusted library allocation
page read and write
1ADFFEE6000
trusted library allocation
page read and write
1ADF951A000
trusted library allocation
page read and write
26DBA610000
trusted library allocation
page read and write
1ADF7B8D000
trusted library allocation
page read and write
26DBB2B9000
heap
page read and write
1AE008E7000
trusted library allocation
page read and write
1ADEEE41000
heap
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF8248000
trusted library allocation
page read and write
1ADF8E63000
trusted library allocation
page read and write
1ADF8B3B000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADF8E55000
trusted library allocation
page read and write
1ADEEE2D000
heap
page read and write
1ADF3E82000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF9514000
trusted library allocation
page read and write
1ADFFD6C000
trusted library allocation
page read and write
26DBAC73000
unkown
page execute read
1AE023F7000
trusted library allocation
page read and write
1ADF50E6000
trusted library allocation
page read and write
1ADF4F7A000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1AE008B8000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
1ADF969A000
trusted library allocation
page read and write
1ADF9753000
trusted library allocation
page read and write
1ADFFD7B000
trusted library allocation
page read and write
1ADF97E9000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1AE01843000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8F79000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF93F1000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1ADF87DD000
trusted library allocation
page read and write
1ADFFEFA000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF7B3C000
trusted library allocation
page read and write
1ADF8F92000
trusted library allocation
page read and write
1ADF9383000
trusted library allocation
page read and write
1ADF8EE3000
trusted library allocation
page read and write
1ADF50A6000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF8F97000
trusted library allocation
page read and write
1AE013F9000
trusted library allocation
page read and write
1ADF3798000
trusted library allocation
page read and write
1AE000AB000
trusted library allocation
page read and write
1ADF77B2000
heap
page read and write
1ADF9366000
trusted library allocation
page read and write
1ADFBC9F000
trusted library allocation
page read and write
17ECD478000
trusted library allocation
page read and write
1ADF90E7000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
24E857F0000
heap
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADEEE85000
heap
page read and write
1ADEEE64000
heap
page read and write
1ADF8F92000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
74D224B000
stack
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF8BE3000
trusted library allocation
page read and write
1ADF9294000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF90F4000
trusted library allocation
page read and write
1ADF3E1B000
trusted library allocation
page read and write
1ADF8EDA000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADFB2F7000
trusted library allocation
page read and write
1ADF4F7A000
trusted library allocation
page read and write
26DBB321000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF8F97000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF7505000
trusted library allocation
page read and write
29237100000
trusted library allocation
page read and write
1ADF93AC000
trusted library allocation
page read and write
26DBA566000
heap
page read and write
1ADF939F000
trusted library allocation
page read and write
1ADF9343000
trusted library allocation
page read and write
1ADF502B000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF93A4000
trusted library allocation
page read and write
1ADEEE62000
heap
page read and write
1ADF8AFA000
trusted library allocation
page read and write
1ADF87F2000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADFC12C000
trusted library allocation
page read and write
1ADFBC96000
trusted library allocation
page read and write
1AE004F9000
trusted library allocation
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADF8A6E000
trusted library allocation
page read and write
26DBB367000
heap
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADF8F97000
trusted library allocation
page read and write
1ADF8E5C000
trusted library allocation
page read and write
1ADEEE64000
heap
page read and write
1AE03B2C000
trusted library allocation
page read and write
29237244000
heap
page read and write
1ADFFEE6000
trusted library allocation
page read and write
1AE013F7000
trusted library allocation
page read and write
F44DCB8000
stack
page read and write
1AE008DF000
trusted library allocation
page read and write
1ADFB5C9000
trusted library allocation
page read and write
1ADF8BF9000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE20000
heap
page read and write
26DBAC86000
unkown
page execute read
1ADF82B0000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF94F7000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADF9338000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE83000
heap
page read and write
13A5000
heap
page read and write
1AE02F02000
trusted library allocation
page read and write
1DC21D8000
stack
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFFD61000
trusted library allocation
page read and write
1ADF9573000
trusted library allocation
page read and write
1ADF8B95000
trusted library allocation
page read and write
1ADF9782000
trusted library allocation
page read and write
1ADF8FA5000
trusted library allocation
page read and write
26DBA612000
trusted library allocation
page read and write
1AE0146C000
trusted library allocation
page read and write
1ADEEE17000
heap
page read and write
1ADFFD9D000
trusted library allocation
page read and write
1ADEEE42000
heap
page read and write
1ADFFD2B000
trusted library allocation
page read and write
1ADF37DF000
trusted library allocation
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1ADEEE6D000
heap
page read and write
29236E2A000
heap
page read and write
1ADEEE37000
heap
page read and write
1AE00861000
trusted library allocation
page read and write
1ADF50C7000
trusted library allocation
page read and write
1ADF7B9E000
trusted library allocation
page read and write
1ADF8F4D000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE024B3000
trusted library allocation
page read and write
1ADF85DA000
trusted library allocation
page read and write
1ADEEE65000
heap
page read and write
29237147000
trusted library allocation
page read and write
29237172000
trusted library allocation
page read and write
1ADF9584000
trusted library allocation
page read and write
1ADF4D62000
trusted library allocation
page read and write
1ADEEE3B000
heap
page read and write
1ADF8FF0000
trusted library allocation
page read and write
29237103000
trusted library allocation
page read and write
1ADF953B000
trusted library allocation
page read and write
1ADF50E4000
trusted library allocation
page read and write
1ADF9081000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1AE03A41000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF77AB000
heap
page read and write
1ADF7BCE000
trusted library allocation
page read and write
26DBB2E0000
heap
page read and write
1ADFB245000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF9343000
trusted library allocation
page read and write
1ADFB2E2000
trusted library allocation
page read and write
26DBB2F1000
heap
page read and write
237E2E07000
trusted library allocation
page read and write
1AE024ED000
trusted library allocation
page read and write
1AE002AD000
trusted library allocation
page read and write
1ADF82BA000
trusted library allocation
page read and write
1ADEEE52000
heap
page read and write
1ADFA3E5000
trusted library allocation
page read and write
24E85B0A000
trusted library allocation
page read and write
1ADF909E000
trusted library allocation
page read and write
1ADF93E8000
trusted library allocation
page read and write
1ADF756B000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF75F5000
trusted library allocation
page read and write
1ADFB29D000
trusted library allocation
page read and write
1ADF9495000
trusted library allocation
page read and write
1ADF9518000
trusted library allocation
page read and write
1ADF9363000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
26DBB2FD000
heap
page read and write
3B31000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADFFE96000
trusted library allocation
page read and write
1ADF951C000
trusted library allocation
page read and write
1ADF73A5000
trusted library allocation
page read and write
1ADFFD7C000
trusted library allocation
page read and write
1ADF8E60000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
1ADF94F4000
trusted library allocation
page read and write
1ADF4FAF000
trusted library allocation
page read and write
1ADF8FD7000
trusted library allocation
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADFC101000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1AE0024D000
trusted library allocation
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADF9085000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF8BE6000
trusted library allocation
page read and write
1ADF77AD000
heap
page read and write
1ADFA3DC000
trusted library allocation
page read and write
1AE024F4000
trusted library allocation
page read and write
26DBB106000
trusted library allocation
page read and write
1AE002A9000
trusted library allocation
page read and write
1ADFA21F000
trusted library allocation
page read and write
1ADFB5E2000
trusted library allocation
page read and write
1AE02B01000
heap
page read and write
26DBB28A000
heap
page read and write
1AE001FD000
trusted library allocation
page read and write
1ADF9514000
trusted library allocation
page read and write
1ADF931B000
trusted library allocation
page read and write
1ADFB5C9000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1AE0022C000
trusted library allocation
page read and write
1ADF7A97000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1AE0001D000
trusted library allocation
page read and write
1ADE9D65000
heap
page read and write
1ADF85C9000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8B2D000
trusted library allocation
page read and write
1ADEEE5F000
heap
page read and write
1ADF7CD6000
trusted library allocation
page read and write
2FE8741000
trusted library allocation
page execute read
1ADEEE22000
heap
page read and write
1ADF92A5000
trusted library allocation
page read and write
1AE002C5000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADFB5EB000
trusted library allocation
page read and write
1ADF7CBC000
trusted library allocation
page read and write
1ADEEE24000
heap
page read and write
1ADF379B000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF8E51000
trusted library allocation
page read and write
1ADFFEE8000
trusted library allocation
page read and write
1ADF8F64000
trusted library allocation
page read and write
1ADF3E75000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
26DBB2E8000
heap
page read and write
1ADEEE6E000
heap
page read and write
1ADF7B66000
trusted library allocation
page read and write
1ADEEE5D000
heap
page read and write
1ADFA298000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8FEC000
trusted library allocation
page read and write
F44EDBE000
unkown
page readonly
1ADEEE3B000
heap
page read and write
1ADFB250000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE18000
heap
page read and write
1ADF778E000
heap
page read and write
26DBB119000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1AE01355000
trusted library allocation
page read and write
17ECD45F000
trusted library allocation
page read and write
1AE000EF000
trusted library allocation
page read and write
1ADF7333000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1ADF8E72000
trusted library allocation
page read and write
1ADFFEB2000
trusted library allocation
page read and write
1ADF9533000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8F92000
trusted library allocation
page read and write
1ADEEE1D000
heap
page read and write
1ADF8EDA000
trusted library allocation
page read and write
2923712E000
trusted library allocation
page read and write
1ADFB052000
trusted library allocation
page read and write
26DBB2E8000
heap
page read and write
1ADFA2C6000
trusted library allocation
page read and write
1AE00127000
trusted library allocation
page read and write
1ADF7CE1000
trusted library allocation
page read and write
1ADF85F1000
trusted library allocation
page read and write
1AE023E5000
trusted library allocation
page read and write
1AE01466000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADF8F90000
trusted library allocation
page read and write
1ADF50BE000
trusted library allocation
page read and write
1ADF8B3B000
trusted library allocation
page read and write
1ADF969E000
trusted library allocation
page read and write
1ADF93BC000
trusted library allocation
page read and write
1ADF90CC000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF8B3E000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF9689000
trusted library allocation
page read and write
1ADEEE1F000
heap
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF826D000
trusted library allocation
page read and write
1ADFA265000
trusted library allocation
page read and write
1AE01AAC000
trusted library allocation
page read and write
1ADEEE01000
heap
page read and write
1ADFB41A000
trusted library allocation
page read and write
17ECD0F0000
heap
page read and write
26DBAC7D000
unkown
page execute read
1AE001BB000
trusted library allocation
page read and write
1ADF9506000
trusted library allocation
page read and write
1ADF8BF9000
trusted library allocation
page read and write
1ADF93F9000
trusted library allocation
page read and write
1ADF90F4000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF8E86000
trusted library allocation
page read and write
1ADFB7F0000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
1ADF7513000
trusted library allocation
page read and write
1ADFB802000
trusted library allocation
page read and write
1ADF8AF9000
trusted library allocation
page read and write
1ADFB09A000
trusted library allocation
page read and write
1ADFBCC6000
trusted library allocation
page read and write
1ADF504E000
trusted library allocation
page read and write
1ADEEE64000
heap
page read and write
1ADEEE15000
heap
page read and write
1ADF77AD000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADFB55A000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF7585000
trusted library allocation
page read and write
1ADEEE1E000
heap
page read and write
1ADF9352000
trusted library allocation
page read and write
1ADF8F53000
trusted library allocation
page read and write
1ADF5090000
trusted library allocation
page read and write
1ADF8FC0000
trusted library allocation
page read and write
1ADF97EC000
trusted library allocation
page read and write
29237309000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADFFDC4000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF90E0000
trusted library allocation
page read and write
1ADFB0EE000
trusted library allocation
page read and write
2923717B000
trusted library allocation
page read and write
29236F70000
heap
page read and write
1ADFA21A000
trusted library allocation
page read and write
1AE00455000
trusted library allocation
page read and write
1ADEEE33000
heap
page read and write
1ADEEE68000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF9493000
trusted library allocation
page read and write
1ADF4DFD000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF50C7000
trusted library allocation
page read and write
1ADFB4FE000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
1ADF82C1000
trusted library allocation
page read and write
1ADF8D63000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF8B3E000
trusted library allocation
page read and write
1ADF8BA4000
trusted library allocation
page read and write
1DC433E000
stack
page read and write
1ADF87D8000
trusted library allocation
page read and write
1ADF7B7E000
trusted library allocation
page read and write
1AE0242B000
trusted library allocation
page read and write
26DBAC7B000
unkown
page execute read
1ADF82C1000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF8E69000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADF93E1000
trusted library allocation
page read and write
1ADFB28C000
trusted library allocation
page read and write
1ADFFD4F000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF50F6000
trusted library allocation
page read and write
24E873AC000
heap
page read and write
1ADFFE1A000
trusted library allocation
page read and write
1ADEEE78000
heap
page read and write
1ADF7A7E000
trusted library allocation
page read and write
1ADF7A47000
trusted library allocation
page read and write
1AE0007B000
trusted library allocation
page read and write
1ADF82F8000
trusted library allocation
page read and write
1AE024A5000
trusted library allocation
page read and write
1AE0003D000
trusted library allocation
page read and write
1AE00191000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF97FC000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADFB1AD000
trusted library allocation
page read and write
1ADFB0B5000
trusted library allocation
page read and write
1AE0003F000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADF8F57000
trusted library allocation
page read and write
1ADF7AC2000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1AE00254000
trusted library allocation
page read and write
26DBA550000
heap
page readonly
1ADFB2FD000
trusted library allocation
page read and write
1ADFA256000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF3EAB000
trusted library allocation
page read and write
1AE0184D000
trusted library allocation
page read and write
26DBAD50000
heap
page read and write
1ADF8E95000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF828B000
trusted library allocation
page read and write
26DBB367000
heap
page read and write
1ADEEE54000
heap
page read and write
1ADF936C000
trusted library allocation
page read and write
1ADF939A000
trusted library allocation
page read and write
1AE000B3000
trusted library allocation
page read and write
1ADEEE75000
heap
page read and write
1ADF9352000
trusted library allocation
page read and write
1AE004F0000
trusted library allocation
page read and write
1ADF94F1000
trusted library allocation
page read and write
1ADFB2F5000
trusted library allocation
page read and write
1ADF85DC000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
26DBB269000
heap
page read and write
1ADF50EB000
trusted library allocation
page read and write
1ADFFDA4000
trusted library allocation
page read and write
1ADFFECD000
trusted library allocation
page read and write
1ADEEE78000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF8BE6000
trusted library allocation
page read and write
1ADF9588000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADFA1E4000
trusted library allocation
page read and write
1ADF977A000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADFA222000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF7B7E000
trusted library allocation
page read and write
1ADF7B55000
trusted library allocation
page read and write
811000
unkown
page execute read
1ADF8D5E000
trusted library allocation
page read and write
29236E20000
heap
page read and write
1ADF8E73000
trusted library allocation
page read and write
1ADFFE2A000
trusted library allocation
page read and write
26DBA58F000
unclassified section
page read and write
1ADFFE96000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE54000
heap
page read and write
1ADEEE37000
heap
page read and write
1ADEEE11000
heap
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF4F7E000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1AE013F3000
trusted library allocation
page read and write
1ADF82E2000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADEEE25000
heap
page read and write
1ADF939A000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF96DE000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF93CC000
trusted library allocation
page read and write
1ADF93D5000
trusted library allocation
page read and write
1AE039E5000
trusted library allocation
page read and write
1ADF92F8000
trusted library allocation
page read and write
1AE000D3000
trusted library allocation
page read and write
1ADEEE11000
heap
page read and write
1AE017A2000
trusted library allocation
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF8FB3000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF9F8D000
trusted library allocation
page read and write
1ADF9363000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1ADF8E60000
trusted library allocation
page read and write
29237740000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADF77BE000
heap
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADFB298000
trusted library allocation
page read and write
1ADF37C2000
trusted library allocation
page read and write
26DBB209000
heap
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADF82B0000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADF9BE0000
trusted library allocation
page read and write
1ADFFD88000
trusted library allocation
page read and write
1AE02B4D000
heap
page read and write
1ADF9342000
trusted library allocation
page read and write
1AE008FB000
trusted library allocation
page read and write
1ADFA359000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF9079000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF948E000
trusted library allocation
page read and write
1ADEEE43000
heap
page read and write
1ADFB5EE000
trusted library allocation
page read and write
1AE01906000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF90C7000
trusted library allocation
page read and write
1AE002C6000
trusted library allocation
page read and write
1AE03B33000
trusted library allocation
page read and write
1AE013ED000
trusted library allocation
page read and write
1ADF8E41000
trusted library allocation
page read and write
1ADF8EAA000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADEEE4E000
heap
page read and write
1ADF7A81000
trusted library allocation
page read and write
1ADF9570000
trusted library allocation
page read and write
1ADF87D3000
trusted library allocation
page read and write
1ADFFE2F000
trusted library allocation
page read and write
1AE013FB000
trusted library allocation
page read and write
1ADF8E55000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
17ECD476000
trusted library allocation
page read and write
1F5E000
stack
page read and write
1ADEEE10000
heap
page read and write
26DBB25C000
heap
page read and write
1ADFBF7F000
trusted library allocation
page read and write
1ADF50D5000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADFBFA2000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1AE00221000
trusted library allocation
page read and write
1395000
heap
page read and write
1ADF7CD8000
trusted library allocation
page read and write
1ADF8F88000
trusted library allocation
page read and write
1AE024E8000
trusted library allocation
page read and write
1ADF779F000
heap
page read and write
1ADF4F2B000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADFB5C9000
trusted library allocation
page read and write
1AE00458000
trusted library allocation
page read and write
1AE02BE3000
heap
page read and write
1ADFB254000
trusted library allocation
page read and write
1ADF8E4C000
trusted library allocation
page read and write
1ADF4F99000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF936F000
trusted library allocation
page read and write
1ADF936C000
trusted library allocation
page read and write
1ADF8E3D000
trusted library allocation
page read and write
1ADF933F000
trusted library allocation
page read and write
1AE00194000
trusted library allocation
page read and write
1ADF933A000
trusted library allocation
page read and write
1ADFA35D000
trusted library allocation
page read and write
1ADF94AA000
trusted library allocation
page read and write
1ADF9040000
trusted library allocation
page read and write
237E2C50000
heap
page read and write
1ADEEE4C000
heap
page read and write
1ADF8B97000
trusted library allocation
page read and write
1ADFA0A9000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
17ECD482000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADEEE43000
heap
page read and write
1ADF90FA000
trusted library allocation
page read and write
1ADF93FA000
trusted library allocation
page read and write
1ADEEE33000
heap
page read and write
1AE001B1000
trusted library allocation
page read and write
1ADF959E000
trusted library allocation
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1ADEEE5B000
heap
page read and write
1ADF758D000
trusted library allocation
page read and write
1DC533E000
stack
page read and write
17ECD4B1000
trusted library allocation
page read and write
1ADF93F5000
trusted library allocation
page read and write
1ADFFD26000
trusted library allocation
page read and write
17ECD050000
unclassified section
page readonly
F44DD3E000
unkown
page readonly
1ADEEE46000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF934D000
trusted library allocation
page read and write
1ADF93E3000
trusted library allocation
page read and write
17ECD800000
trusted library allocation
page read and write
1ADF94E3000
trusted library allocation
page read and write
29237196000
trusted library allocation
page read and write
1ADF8912000
trusted library allocation
page read and write
1ADF82AA000
trusted library allocation
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF8E02000
trusted library allocation
page read and write
1ADF8B1C000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF82AA000
trusted library allocation
page read and write
1ADFFDB4000
trusted library allocation
page read and write
1ADF778B000
heap
page read and write
1ADFAD00000
trusted library allocation
page read and write
1ADF8A63000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
29236DD0000
heap
page read and write
1ADF9396000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADFA25A000
trusted library allocation
page read and write
1ADF93CC000
trusted library allocation
page read and write
26DBAC90000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADFFD59000
trusted library allocation
page read and write
1AE014E6000
trusted library allocation
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1AE0004F000
trusted library allocation
page read and write
1ADFBCD4000
trusted library allocation
page read and write
26DBA290000
unclassified section
page readonly
1ADF73B3000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF90B8000
trusted library allocation
page read and write
1AE02B52000
heap
page read and write
1ADEEE60000
heap
page read and write
1ADEEE6E000
heap
page read and write
1ADEEE60000
heap
page read and write
1ADF90DD000
trusted library allocation
page read and write
1ADF3D23000
trusted library allocation
page read and write
1ADF7589000
trusted library allocation
page read and write
17ECD500000
heap
page read and write
1ADF7547000
trusted library allocation
page read and write
1ADF82E9000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF82BF000
trusted library allocation
page read and write
1ADF93E8000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE65000
heap
page read and write
1ADF9BE2000
trusted library allocation
page read and write
1ADF7CC2000
trusted library allocation
page read and write
1DC39FE000
unkown
page readonly
1ADF93BC000
trusted library allocation
page read and write
17ECD280000
heap
page read and write
1ADFB245000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1AE00096000
trusted library allocation
page read and write
1ADEEE6E000
heap
page read and write
1AE024E8000
trusted library allocation
page read and write
24E859C3000
heap
page read and write
1ADF93D5000
trusted library allocation
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADF923E000
trusted library allocation
page read and write
1ADF778C000
heap
page read and write
1ADF9518000
trusted library allocation
page read and write
1ADF7786000
heap
page read and write
1ADFB7F2000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADFBCDE000
trusted library allocation
page read and write
1ADF3E13000
trusted library allocation
page read and write
1393000
heap
page read and write
1ADFB249000
trusted library allocation
page read and write
1ADF732F000
trusted library allocation
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
74D45FE000
unkown
page readonly
1ADF90F8000
trusted library allocation
page read and write
1ADFA29E000
trusted library allocation
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF93CC000
trusted library allocation
page read and write
1ADF7799000
heap
page read and write
1ADF8ED9000
trusted library allocation
page read and write
26DBA686000
trusted library allocation
page read and write
1ADF8FE0000
trusted library allocation
page read and write
1ADF77AD000
heap
page read and write
1ADF8FEC000
trusted library allocation
page read and write
1ADF8B3B000
trusted library allocation
page read and write
1AE0186D000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADF958C000
trusted library allocation
page read and write
1ADF7CBC000
trusted library allocation
page read and write
1AE024DB000
trusted library allocation
page read and write
1ADF93CC000
trusted library allocation
page read and write
1ADF779F000
heap
page read and write
1ADF7563000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
26DBA65F000
trusted library allocation
page read and write
1ADF93F1000
trusted library allocation
page read and write
1ADFFEEF000
trusted library allocation
page read and write
1AE000A2000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADEEE3D000
heap
page read and write
1ADF8FF0000
trusted library allocation
page read and write
17ECD462000
trusted library allocation
page read and write
1ADFFD37000
trusted library allocation
page read and write
1ADF951B000
trusted library allocation
page read and write
1ADF82E0000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8EFD000
trusted library allocation
page read and write
1ADF8EFB000
trusted library allocation
page read and write
1ADF8B2B000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADEEE83000
heap
page read and write
1ADF96D6000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF7B83000
trusted library allocation
page read and write
1ADF8B8F000
trusted library allocation
page read and write
1ADFFF63000
trusted library allocation
page read and write
1ADF9511000
trusted library allocation
page read and write
1ADF8F99000
trusted library allocation
page read and write
1ADF8E59000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADF829C000
trusted library allocation
page read and write
1AE03100000
trusted library allocation
page read and write
1ADFA248000
trusted library allocation
page read and write
1AE00851000
trusted library allocation
page read and write
26DBA618000
trusted library allocation
page read and write
1ADF7B8B000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1AE001E1000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADFB231000
trusted library allocation
page read and write
1ADFFEA9000
trusted library allocation
page read and write
1ADF82D1000
trusted library allocation
page read and write
1ADF82BF000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF82FE000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADEEE15000
heap
page read and write
1ADF82FC000
trusted library allocation
page read and write
76D4FFE000
stack
page read and write
1ADF5031000
trusted library allocation
page read and write
1AE008F6000
trusted library allocation
page read and write
1AE00093000
trusted library allocation
page read and write
17ECD2D0000
heap
page read and write
1AE002BC000
trusted library allocation
page read and write
1ADF4F7A000
trusted library allocation
page read and write
1ADF3D2F000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADFFE44000
trusted library allocation
page read and write
1ADF9395000
trusted library allocation
page read and write
1ADF82F0000
trusted library allocation
page read and write
1AE01351000
trusted library allocation
page read and write
1ADFFE4A000
trusted library allocation
page read and write
1ADF9727000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADF8B24000
trusted library allocation
page read and write
1ADF4D65000
trusted library allocation
page read and write
1ADFB2ED000
trusted library allocation
page read and write
1ADFFD16000
trusted library allocation
page read and write
1ADF8E84000
trusted library allocation
page read and write
1ADF8EB0000
trusted library allocation
page read and write
1ADF82A4000
trusted library allocation
page read and write
1DC3ABE000
unkown
page readonly
1ADF9747000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8F66000
trusted library allocation
page read and write
1ADF7B5A000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF93CC000
trusted library allocation
page read and write
1ADFB266000
trusted library allocation
page read and write
1AE002BC000
trusted library allocation
page read and write
1ADF9506000
trusted library allocation
page read and write
1ADF7B1F000
trusted library allocation
page read and write
1ADF9EEE000
trusted library allocation
page read and write
1ADF9363000
trusted library allocation
page read and write
1ADF8B67000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF925C000
trusted library allocation
page read and write
1AE01300000
trusted library allocation
page read and write
1ADFB539000
trusted library allocation
page read and write
1250000
heap
page read and write
1ADF939F000
trusted library allocation
page read and write
1AE00014000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF939F000
trusted library allocation
page read and write
1ADF8E05000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF9394000
trusted library allocation
page read and write
1ADF9394000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADEEE37000
heap
page read and write
1ADFFD41000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
17ECD403000
trusted library allocation
page read and write
1ADF75F1000
trusted library allocation
page read and write
1ADF93D5000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF7A97000
trusted library allocation
page read and write
1ADEEE3A000
heap
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE004D8000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1AE03A05000
trusted library allocation
page read and write
1AE002C2000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1AE008DA000
trusted library allocation
page read and write
1ADF8244000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
17ECD040000
unclassified section
page readonly
1ADF8BA6000
trusted library allocation
page read and write
1ADFFFE4000
trusted library allocation
page read and write
1ADF9326000
trusted library allocation
page read and write
1ADF94D6000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF77B2000
heap
page read and write
1ADEEE3A000
heap
page read and write
1ADF8FB6000
trusted library allocation
page read and write
1ADF4F99000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF77BE000
heap
page read and write
1ADEEE22000
heap
page read and write
1383000
heap
page read and write
1AE01A93000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADFB7F9000
trusted library allocation
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADEEE42000
heap
page read and write
1ADEEE41000
heap
page read and write
1ADFFF56000
trusted library allocation
page read and write
1ADF9326000
trusted library allocation
page read and write
26DBACB1000
unkown
page execute read
1ADF87D1000
trusted library allocation
page read and write
1ADEEE1D000
heap
page read and write
1ADF82FC000
trusted library allocation
page read and write
1ADF73D0000
trusted library allocation
page read and write
1ADF7B6D000
trusted library allocation
page read and write
1ADF8FF0000
trusted library allocation
page read and write
1ADF8B2B000
trusted library allocation
page read and write
1ADEEE60000
heap
page read and write
1ADF75A9000
trusted library allocation
page read and write
1ADEEE72000
heap
page read and write
1ADEEE3C000
heap
page read and write
1ADFFD47000
trusted library allocation
page read and write
1ADEEE3D000
heap
page read and write
1ADF8EEA000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF938F000
trusted library allocation
page read and write
1AE000CC000
trusted library allocation
page read and write
1ADF8F35000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADEEE1D000
heap
page read and write
1ADEEE40000
heap
page read and write
D6087FC000
stack
page read and write
1393000
heap
page read and write
26DBB2F1000
heap
page read and write
1AE02B81000
heap
page read and write
1ADF9350000
trusted library allocation
page read and write
1ADF8ED4000
trusted library allocation
page read and write
1ADFA2C6000
trusted library allocation
page read and write
1ADFB2FD000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF77A3000
heap
page read and write
1ADF9782000
trusted library allocation
page read and write
1ADF8ADD000
trusted library allocation
page read and write
1ADEEE83000
heap
page read and write
1ADEEE22000
heap
page read and write
1ADF9085000
trusted library allocation
page read and write
1AE02331000
trusted library allocation
page read and write
1ADEEE6A000
heap
page read and write
1ADF9FF7000
trusted library allocation
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADEEE58000
heap
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF8DAF000
trusted library allocation
page read and write
26DBB2E8000
heap
page read and write
1ADEEE2B000
heap
page read and write
1AE00861000
trusted library allocation
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADF93F3000
trusted library allocation
page read and write
1ADF8E4C000
trusted library allocation
page read and write
1ADF8EA5000
trusted library allocation
page read and write
1ADF8E41000
trusted library allocation
page read and write
1ADEEE8D000
heap
page read and write
1AE000CE000
trusted library allocation
page read and write
1ADF7589000
trusted library allocation
page read and write
1ADF93E3000
trusted library allocation
page read and write
1ADF93B8000
trusted library allocation
page read and write
26DBB2FD000
heap
page read and write
1ADEEE44000
heap
page read and write
1ADF9FD8000
trusted library allocation
page read and write
1ADFB495000
trusted library allocation
page read and write
1ADEEE52000
heap
page read and write
1ADF829E000
trusted library allocation
page read and write
1ADF8256000
trusted library allocation
page read and write
1ADF8F7D000
trusted library allocation
page read and write
1ADFB2CE000
trusted library allocation
page read and write
1ADFFE92000
trusted library allocation
page read and write
1AE03684000
trusted library allocation
page read and write
1ADF9E81000
trusted library allocation
page read and write
29237240000
heap
page read and write
1ADF8F88000
trusted library allocation
page read and write
1ADF82D0000
trusted library allocation
page read and write
1AE02B4F000
heap
page read and write
1ADF82EE000
trusted library allocation
page read and write
29237166000
trusted library allocation
page read and write
1ADEEE83000
heap
page read and write
1ADF4F7A000
trusted library allocation
page read and write
1ADEEE05000
heap
page read and write
1ADEEE2D000
heap
page read and write
26DBB2FD000
heap
page read and write
1ADF90C7000
trusted library allocation
page read and write
1ADF7CBC000
trusted library allocation
page read and write
1ADF93E5000
trusted library allocation
page read and write
1ADFFEE8000
trusted library allocation
page read and write
1ADF7B89000
trusted library allocation
page read and write
1ADF9584000
trusted library allocation
page read and write
1ADEEE10000
heap
page read and write
1ADF7C3D000
trusted library allocation
page read and write
1194000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADEEE58000
heap
page read and write
1ADEEE40000
heap
page read and write
1ADF5094000
trusted library allocation
page read and write
26DBB2FD000
heap
page read and write
1ADF779F000
heap
page read and write
1ADFA0B8000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF8E84000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADEEE6E000
heap
page read and write
1ADF93EC000
trusted library allocation
page read and write
1ADF8BB0000
trusted library allocation
page read and write
1ADF9395000
trusted library allocation
page read and write
1ADF9772000
trusted library allocation
page read and write
1ADF82C6000
trusted library allocation
page read and write
1ADEEE60000
heap
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADEEE22000
heap
page read and write
1AE01957000
trusted library allocation
page read and write
1ADEEE7C000
heap
page read and write
1ADEEE46000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADFB27E000
trusted library allocation
page read and write
1ADEEE75000
heap
page read and write
1ADFFD94000
trusted library allocation
page read and write
1ADF379E000
trusted library allocation
page read and write
1ADF8B29000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF8F88000
trusted library allocation
page read and write
1ADF8ED4000
trusted library allocation
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE0232C000
trusted library allocation
page read and write
1ADF93FD000
trusted library allocation
page read and write
1ADF8DAA000
trusted library allocation
page read and write
1ADF93BC000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADF7799000
heap
page read and write
1ADFBCBC000
trusted library allocation
page read and write
1ADF8B9C000
trusted library allocation
page read and write
29237337000
trusted library allocation
page read and write
26DBB2E3000
heap
page read and write
1ADF85FD000
trusted library allocation
page read and write
1ADEEE48000
heap
page read and write
1ADF50D5000
trusted library allocation
page read and write
1ADF9511000
trusted library allocation
page read and write
1ADF7519000
trusted library allocation
page read and write
1ADF959E000
trusted library allocation
page read and write
1ADF9319000
trusted library allocation
page read and write
1ADF7799000
heap
page read and write
26DBB269000
heap
page read and write
1ADF8ED3000
trusted library allocation
page read and write
1AE014CE000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
1ADFFD68000
trusted library allocation
page read and write
1AE0180C000
trusted library allocation
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADF9734000
trusted library allocation
page read and write
1ADF77CC000
heap
page read and write
1AE00119000
trusted library allocation
page read and write
1AE008B8000
trusted library allocation
page read and write
24E85A00000
trusted library allocation
page read and write
1ADFFEE8000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8F97000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADF4D33000
trusted library allocation
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1AE0044D000
trusted library allocation
page read and write
1ADF7362000
trusted library allocation
page read and write
1AE00840000
trusted library allocation
page read and write
1ADFB4B8000
trusted library allocation
page read and write
1ADF7BCE000
trusted library allocation
page read and write
1ADF5094000
trusted library allocation
page read and write
1ADF969C000
trusted library allocation
page read and write
1AE000A8000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF8F92000
trusted library allocation
page read and write
1AE03AA7000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
76D47FE000
stack
page read and write
1AE00420000
trusted library allocation
page read and write
1AE0131F000
trusted library allocation
page read and write
1ADF77BE000
heap
page read and write
1AE004D8000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
26DBB321000
heap
page read and write
1ADF8F92000
trusted library allocation
page read and write
1AE01364000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADF8BFE000
trusted library allocation
page read and write
1ADF82CC000
trusted library allocation
page read and write
1ADEEE1E000
heap
page read and write
1AE017E5000
trusted library allocation
page read and write
1ADFA361000
trusted library allocation
page read and write
1ADFB5E7000
trusted library allocation
page read and write
1ADF8EAD000
trusted library allocation
page read and write
1ADF8EEC000
trusted library allocation
page read and write
1ADF8EF7000
trusted library allocation
page read and write
1ADF8BF9000
trusted library allocation
page read and write
1ADF37A7000
trusted library allocation
page read and write
1ADF9BC3000
trusted library allocation
page read and write
1AE02B11000
heap
page read and write
1ADF94C6000
trusted library allocation
page read and write
13A6000
heap
page read and write
1ADFFED5000
trusted library allocation
page read and write
1ADEEE41000
heap
page read and write
1AE00170000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE7D000
heap
page read and write
1ADF8FD4000
trusted library allocation
page read and write
3B31000
heap
page read and write
1ADF7B3D000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE4A000
heap
page read and write
1ADF7BA5000
trusted library allocation
page read and write
1ADF8E7C000
trusted library allocation
page read and write
1ADF7513000
trusted library allocation
page read and write
1ADEEE3F000
heap
page read and write
1ADF9528000
trusted library allocation
page read and write
1ADF8EEF000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADFBC99000
trusted library allocation
page read and write
26DBA28C000
remote allocation
page execute read
1ADFFEE3000
trusted library allocation
page read and write
76D67FF000
stack
page read and write
1ADEEE64000
heap
page read and write
1ADEEE46000
heap
page read and write
26DBA666000
trusted library allocation
page read and write
2923730E000
trusted library allocation
page read and write
1ADEEE22000
heap
page read and write
1ADEEE0E000
heap
page read and write
1ADEEE5F000
heap
page read and write
1ADEEE25000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADF778E000
heap
page read and write
26DBB2A1000
heap
page read and write
1ADF7A6F000
trusted library allocation
page read and write
1ADEEE69000
heap
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADEEE3C000
heap
page read and write
1ADF8FA9000
trusted library allocation
page read and write
1ADF4FBD000
trusted library allocation
page read and write
1AE01A05000
trusted library allocation
page read and write
1ADF93B8000
trusted library allocation
page read and write
1ADF97FC000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADEEE6D000
heap
page read and write
1ADFA3FE000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADFFEDF000
trusted library allocation
page read and write
1ADFB7A0000
trusted library allocation
page read and write
1ADF8EF4000
trusted library allocation
page read and write
1ADF973A000
trusted library allocation
page read and write
1ADEEE53000
heap
page read and write
1ADFA376000
trusted library allocation
page read and write
F44C3D8000
stack
page read and write
1ADEEE40000
heap
page read and write
1ADF8FC4000
trusted library allocation
page read and write
1ADF7794000
heap
page read and write
1ADF82EA000
trusted library allocation
page read and write
1ADF92F6000
trusted library allocation
page read and write
1ADF9789000
trusted library allocation
page read and write
1ADF9864000
trusted library allocation
page read and write
1ADEEE59000
heap
page read and write
1ADEEE5D000
heap
page read and write
1ADEEE76000
heap
page read and write
1ADF82A4000
trusted library allocation
page read and write
1ADFC133000
trusted library allocation
page read and write
1ADF50DA000
trusted library allocation
page read and write
1ADE9D6A000
heap
page read and write
1388000
heap
page read and write
1ADEEE3C000
heap
page read and write
292371B7000
trusted library allocation
page read and write
1ADF93E3000
trusted library allocation
page read and write
1ADF9E86000
trusted library allocation
page read and write
1ADF8AC0000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF8D97000
trusted library allocation
page read and write
1ADF90CC000
trusted library allocation
page read and write
1ADFB2CB000
trusted library allocation
page read and write
1ADFB292000
trusted library allocation
page read and write
1ADF7B6C000
trusted library allocation
page read and write
1ADF93AC000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1AE002BA000
trusted library allocation
page read and write
1ADF93A4000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADF5073000
trusted library allocation
page read and write
810000
unkown
page readonly
1ADF9393000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADF8EE7000
trusted library allocation
page read and write
1ADEEE46000
heap
page read and write
1ADEEE69000
heap
page read and write
1ADEEE54000
heap
page read and write
26DBA400000
trusted library allocation
page read and write
1ADF7B6D000
trusted library allocation
page read and write
1ADFC043000
trusted library allocation
page read and write
1AE014F6000
trusted library allocation
page read and write
1AE031F3000
trusted library allocation
page read and write
1ADF77CB000
heap
page read and write
1ADF8E9C000
trusted library allocation
page read and write
1ADFA31E000
trusted library allocation
page read and write
1ADF9352000
trusted library allocation
page read and write
1ADF77BF000
heap
page read and write
1ADF93BC000
trusted library allocation
page read and write
1ADF9518000
trusted library allocation
page read and write
1ADF937F000
trusted library allocation
page read and write
1AE024FA000
trusted library allocation
page read and write
1ADFA36D000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8FCD000
trusted library allocation
page read and write
1ADF50C1000
trusted library allocation
page read and write
1ADF739D000
trusted library allocation
page read and write
D6087FF000
stack
page read and write
1ADFB27E000
trusted library allocation
page read and write
1ADFFD32000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF8E46000
trusted library allocation
page read and write
1ADFB04F000
trusted library allocation
page read and write
1ADEEE0D000
heap
page read and write
1ADFFDD9000
trusted library allocation
page read and write
1ADEEE2D000
heap
page read and write
1ADF8EBE000
trusted library allocation
page read and write
1ADF8B6C000
trusted library allocation
page read and write
1ADEEE4B000
heap
page read and write
1ADF9BE2000
trusted library allocation
page read and write
1ADF90E7000
trusted library allocation
page read and write
1ADF8E74000
trusted library allocation
page read and write
1ADF7B5F000
trusted library allocation
page read and write
1ADF87ED000
trusted library allocation
page read and write
1ADF4FDC000
trusted library allocation
page read and write
1ADF7A81000
trusted library allocation
page read and write
1ADF8EBB000
trusted library allocation
page read and write
1AE016D2000
trusted library allocation
page read and write
1ADF93A7000
trusted library allocation
page read and write
1ADF9352000
trusted library allocation
page read and write
1ADFFE96000
trusted library allocation
page read and write
1ADEEE0A000
heap
page read and write
8DC000
unkown
page read and write
1ADF8ECD000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF8EC0000
trusted library allocation
page read and write
1ADEEE40000
heap
page read and write
1ADF93F4000
trusted library allocation
page read and write
1ADF939F000
trusted library allocation
page read and write
F44DC3E000
unkown
page readonly
1ADF8DF2000
trusted library allocation
page read and write
1ADEEE37000
heap
page read and write
1ADEEE82000
heap
page read and write
1ADF82C6000
trusted library allocation
page read and write
26DBB26C000
heap
page read and write
1ADEEE0A000
heap
page read and write
1ADF8FF5000
trusted library allocation
page read and write
1ADEEE54000
heap
page read and write
1ADEEE0D000
heap
page read and write
1AE01353000
trusted library allocation
page read and write
1ADF8E5E000
trusted library allocation
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF93E0000
trusted library allocation
page read and write
1AE02B5E000
heap
page read and write
1ADF8FBA000
trusted library allocation
page read and write
1ADF9FF7000
trusted library allocation
page read and write
1ADF8236000
trusted library allocation
page read and write
1ADF9570000
trusted library allocation
page read and write
1ADF8F4D000
trusted library allocation
page read and write
1ADF8F79000
trusted library allocation
page read and write
1ADFFEEB000
trusted library allocation
page read and write
1ADEEE15000
heap
page read and write
1ADFFE92000
trusted library allocation
page read and write
1ADF50AA000
trusted library allocation
page read and write
1ADF90C7000
trusted library allocation
page read and write
1AE023F4000
trusted library allocation
page read and write
1ADF939A000
trusted library allocation
page read and write
1ADF3EBA000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
26DBB33B000
heap
page read and write
1ADF82B8000
trusted library allocation
page read and write
1ADF8AC4000
trusted library allocation
page read and write
1ADFFEE2000
trusted library allocation
page read and write
1ADF77A9000
heap
page read and write
1ADF93F7000
trusted library allocation
page read and write
1ADF9085000
trusted library allocation
page read and write
1ADFBCD4000
trusted library allocation
page read and write
1ADF82F8000
trusted library allocation
page read and write
1ADEEE14000
heap
page read and write
1ADF8E4C000
trusted library allocation
page read and write
1AE018A3000
trusted library allocation
page read and write
1ADF8FD2000
trusted library allocation
page read and write
1ADEEE0E000
heap
page read and write
1ADF77AB000
heap
page read and write
1ADF77AB000
heap
page read and write
1ADFC00C000
trusted library allocation
page read and write
1ADEEE61000
heap
page read and write
1ADF90E3000
trusted library allocation
page read and write
1ADF92BD000
trusted library allocation
page read and write
1ADF90CC000
trusted library allocation
page read and write
1ADEEE4C000
heap
page read and write
1ADEEE14000
heap
page read and write
1ADF8256000
trusted library allocation
page read and write
1ADEEDF4000
heap
page read and write
1ADF7C79000
trusted library allocation
page read and write
1ADEEE5C000
heap
page read and write
17ECD300000
trusted library allocation
page read and write
1AE00246000
trusted library allocation
page read and write
1ADF9FDE000
trusted library allocation
page read and write
1AE02421000
trusted library allocation
page read and write
1ADF8FE4000
trusted library allocation
page read and write
1ADF7571000
trusted library allocation
page read and write
1ADF7A63000
trusted library allocation
page read and write
1ADF8E41000
trusted library allocation
page read and write
1ADFB1EE000
trusted library allocation
page read and write
1ADF90A0000
trusted library allocation
page read and write
There are 4026 hidden memdumps, click here to show them.