IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_900abc6c-abba-435f-9234-3abee6a4a246.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_900abc6c-abba-435f-9234-3abee6a4a246.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\3895876c-8bdb-46a0-89f5-9ad1f1fd9a9a (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\3895876c-8bdb-46a0-89f5-9ad1f1fd9a9a.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c30828f1-d7f7-491e-a174-0d50cbb3c3e7} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 1c089570710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4064 -parentBuildID 20230927232528 -prefsHandle 4260 -prefMapHandle 4256 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45d4d356-c33f-478b-aed1-4b6cb6bb653d} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 1c09b9be810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4968 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4988 -prefMapHandle 4984 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f18a257c-3238-419d-ad26-872c475307f4} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 1c09a573f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
142.250.114.100
unknown
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.142
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1C0964A3000
trusted library allocation
page read and write
1C09ADBE000
trusted library allocation
page read and write
1C09CE2C000
trusted library allocation
page read and write
1C0A12CC000
trusted library allocation
page read and write
1C09ACD0000
trusted library allocation
page read and write
1C09BC74000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C099C47000
trusted library allocation
page read and write
1C0921E3000
heap
page read and write
1C09ABCF000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09958D000
trusted library allocation
page read and write
1C09A993000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C0921D4000
heap
page read and write
1C09A70E000
trusted library allocation
page read and write
1C09A9FD000
trusted library allocation
page read and write
1C0A2CC8000
trusted library allocation
page read and write
1C0A4670000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921F2000
heap
page read and write
1ABC120A000
trusted library allocation
page read and write
1C09C8BD000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A4CCA000
trusted library allocation
page read and write
1C0A124A000
trusted library allocation
page read and write
1C09AE32000
trusted library allocation
page read and write
1C099532000
trusted library allocation
page read and write
1C09A783000
trusted library allocation
page read and write
1C09A341000
trusted library allocation
page read and write
1C099D25000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C0921EB000
heap
page read and write
1C0921D8000
heap
page read and write
1C09A7A6000
trusted library allocation
page read and write
1C099599000
trusted library allocation
page read and write
1C09ADB4000
trusted library allocation
page read and write
1C09C871000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A13B8000
trusted library allocation
page read and write
1C099272000
trusted library allocation
page read and write
1C0A5C9F000
heap
page read and write
1C09BCF9000
trusted library allocation
page read and write
1C0A1698000
trusted library allocation
page read and write
1C0A4683000
trusted library allocation
page read and write
24F41069000
heap
page read and write
1C09A9E3000
trusted library allocation
page read and write
1C0A12F3000
trusted library allocation
page read and write
1C09A0D5000
trusted library allocation
page read and write
1C09A74E000
trusted library allocation
page read and write
1C09B5E3000
trusted library allocation
page read and write
1C0A4002000
trusted library allocation
page read and write
1C0A2C13000
trusted library allocation
page read and write
1C09537F000
trusted library allocation
page read and write
1C099D8F000
trusted library allocation
page read and write
1C09A95B000
trusted library allocation
page read and write
1C09A0E6000
trusted library allocation
page read and write
1C0A51BC000
trusted library allocation
page read and write
1C09C8BD000
trusted library allocation
page read and write
1C09A9C1000
trusted library allocation
page read and write
1C09BC72000
trusted library allocation
page read and write
1C099DB4000
trusted library allocation
page read and write
1C09A973000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C09222E000
heap
page read and write
1C0921FC000
heap
page read and write
18A87647000
trusted library allocation
page read and write
1C09AE7E000
trusted library allocation
page read and write
1C0992A9000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C0965EB000
trusted library allocation
page read and write
1C0A1900000
trusted library allocation
page read and write
1C09A537000
trusted library allocation
page read and write
1C09B851000
trusted library allocation
page read and write
1C0A54E4000
trusted library allocation
page read and write
1C09AE43000
trusted library allocation
page read and write
18A8743D000
trusted library allocation
page read and write
1C09A405000
trusted library allocation
page read and write
1C0992C5000
trusted library allocation
page read and write
1C09A87A000
trusted library allocation
page read and write
1C09AEC5000
trusted library allocation
page read and write
24B79513000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C0968F4000
trusted library allocation
page read and write
1C09AD73000
trusted library allocation
page read and write
18A87623000
trusted library allocation
page read and write
1C0A1533000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
24F40292000
unclassified section
page read and write
24F401D0000
heap
page read and write
1C099161000
trusted library allocation
page read and write
1C09A0E0000
trusted library allocation
page read and write
1C0A1533000
trusted library allocation
page read and write
1ABC0FD1000
heap
page read and write
1C0A1237000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
24B79220000
unclassified section
page read and write
1C0A5CAC000
heap
page read and write
1C096505000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0921E2000
heap
page read and write
1C09BEB1000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
24F40A20000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921C6000
heap
page read and write
1C09BEE0000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921F2000
heap
page read and write
1C09A73B000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0921FE000
heap
page read and write
1C0995B9000
trusted library allocation
page read and write
1C0962DF000
trusted library allocation
page read and write
1C09D023000
trusted library allocation
page read and write
1C09ABEA000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0992D6000
trusted library allocation
page read and write
1C0921EB000
heap
page read and write
1C0A624D000
trusted library allocation
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C09A8D9000
trusted library allocation
page read and write
24F400B0000
unclassified section
page readonly
1C09AEAC000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0921D6000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A4400000
trusted library allocation
page read and write
1C0A11D2000
trusted library allocation
page read and write
1C099590000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C0A467C000
trusted library allocation
page read and write
24F4105C000
heap
page read and write
1C0A1494000
trusted library allocation
page read and write
1C09A6E4000
trusted library allocation
page read and write
1C09AE4D000
trusted library allocation
page read and write
1C092234000
heap
page read and write
1C0921F2000
heap
page read and write
C603FFE000
unkown
page readonly
1C0A505C000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09CAE1000
trusted library allocation
page read and write
1C0921DF000
heap
page read and write
24F40423000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A6F0000
trusted library allocation
page read and write
1C09688A000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0921F0000
heap
page read and write
1C0921C6000
heap
page read and write
1C099CF5000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921CE000
heap
page read and write
1C09AE93000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C09956A000
trusted library allocation
page read and write
1C0A505F000
trusted library allocation
page read and write
1C09AAC5000
trusted library allocation
page read and write
1581000
heap
page read and write
1C0A5783000
trusted library allocation
page read and write
1C0A1645000
trusted library allocation
page read and write
1C0A4CE1000
trusted library allocation
page read and write
C67FD3E000
stack
page read and write
1C0921D1000
heap
page read and write
1C0921EB000
heap
page read and write
1C0921D4000
heap
page read and write
1C09D284000
trusted library allocation
page read and write
1C09B5D5000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0921E7000
heap
page read and write
1C09AE39000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C0921E2000
heap
page read and write
1C09AE48000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C0921E8000
heap
page read and write
1C099180000
trusted library allocation
page read and write
D84000
heap
page read and write
1C0A1288000
trusted library allocation
page read and write
24F404AD000
trusted library allocation
page read and write
1C09AA81000
trusted library allocation
page read and write
1C0A6207000
trusted library allocation
page read and write
24B79578000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09B9A7000
trusted library allocation
page read and write
1C09AA81000
trusted library allocation
page read and write
1C09A99F000
trusted library allocation
page read and write
1C095317000
trusted library allocation
page read and write
1C0A46B8000
trusted library allocation
page read and write
26AF5FE000
stack
page read and write
1C09A87E000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09A680000
trusted library allocation
page read and write
24F41069000
heap
page read and write
1C0A157D000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C099CF5000
trusted library allocation
page read and write
1C09AAF6000
trusted library allocation
page read and write
1C09A794000
trusted library allocation
page read and write
1C09A0FD000
trusted library allocation
page read and write
1C09A7F7000
trusted library allocation
page read and write
46827FE000
unkown
page readonly
1C0992BB000
trusted library allocation
page read and write
1C09BBB9000
trusted library allocation
page read and write
1C09AE63000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A5462000
trusted library allocation
page read and write
1C09A6D7000
trusted library allocation
page read and write
1C09D29E000
trusted library allocation
page read and write
1C09B8DB000
trusted library allocation
page read and write
24B79210000
heap
page readonly
1C09AE58000
trusted library allocation
page read and write
1C092200000
heap
page read and write
1C0A13DE000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C0A4672000
trusted library allocation
page read and write
1C09A1A6000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C099DBB000
trusted library allocation
page read and write
1C09AA79000
trusted library allocation
page read and write
1C09A953000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0921E2000
heap
page read and write
1C09B4FE000
trusted library allocation
page read and write
1C0921E4000
heap
page read and write
1C092227000
heap
page read and write
1C0921D8000
heap
page read and write
1C09B857000
trusted library allocation
page read and write
1C095271000
trusted library allocation
page read and write
1C0A16B3000
trusted library allocation
page read and write
1ABC0FC2000
heap
page read and write
24F40417000
trusted library allocation
page read and write
1C09A39C000
trusted library allocation
page read and write
1C0A13EF000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A46B8000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C09AAAE000
trusted library allocation
page read and write
1C0992C4000
trusted library allocation
page read and write
1C09A6B4000
trusted library allocation
page read and write
1C09A71E000
trusted library allocation
page read and write
1C0A5789000
trusted library allocation
page read and write
18A87603000
trusted library allocation
page read and write
1C09223E000
heap
page read and write
1C0A546A000
trusted library allocation
page read and write
1C09ADC6000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09CAA1000
trusted library allocation
page read and write
1C09AE95000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0921E2000
heap
page read and write
1C09A0C2000
trusted library allocation
page read and write
1C09CA09000
trusted library allocation
page read and write
1C09A5B0000
trusted library allocation
page read and write
1C0962E3000
trusted library allocation
page read and write
1C09A9AA000
trusted library allocation
page read and write
1C09ADC3000
trusted library allocation
page read and write
1C0A4FCD000
trusted library allocation
page read and write
1C0A3990000
trusted library allocation
page read and write
1C0964A1000
trusted library allocation
page read and write
24F40230000
heap
page read and write
1C0921E7000
heap
page read and write
1C09AE4F000
trusted library allocation
page read and write
1C0A62A7000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09919E000
trusted library allocation
page read and write
1C0A5085000
trusted library allocation
page read and write
1C09A0B1000
trusted library allocation
page read and write
1C0965EB000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0921D4000
heap
page read and write
1C09909C000
trusted library allocation
page read and write
1C0A4C8F000
trusted library allocation
page read and write
1C0953A9000
trusted library allocation
page read and write
1C09A7DA000
trusted library allocation
page read and write
1C09B83C000
trusted library allocation
page read and write
1C09AE54000
trusted library allocation
page read and write
1C0A2E01000
trusted library allocation
page read and write
1C0A39EB000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09AE50000
trusted library allocation
page read and write
1C09BCBC000
trusted library allocation
page read and write
1C09BC25000
trusted library allocation
page read and write
1C0A2CDB000
trusted library allocation
page read and write
1C0A1235000
trusted library allocation
page read and write
24B79524000
trusted library allocation
page read and write
24F4029F000
unclassified section
page read and write
1C09953A000
trusted library allocation
page read and write
24F40448000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A4677000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C0A5D1E000
heap
page read and write
1C09A73B000
trusted library allocation
page read and write
1C09A357000
trusted library allocation
page read and write
1C096890000
trusted library allocation
page read and write
1C09C830000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C0921E1000
heap
page read and write
1C096598000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
4682FFE000
stack
page read and write
1C0A46EB000
trusted library allocation
page read and write
1C0921DD000
heap
page read and write
1C0990F3000
trusted library allocation
page read and write
1C09BEEB000
trusted library allocation
page read and write
24F41144000
heap
page read and write
1C0A5C01000
heap
page read and write
1C092241000
heap
page read and write
1C0A3100000
trusted library allocation
page read and write
1C09AE48000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921E2000
heap
page read and write
24F4049F000
trusted library allocation
page read and write
1C0A2D07000
trusted library allocation
page read and write
1C09A836000
trusted library allocation
page read and write
1C0921D8000
heap
page read and write
1C0921CE000
heap
page read and write
24F40F0B000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C0A16C3000
trusted library allocation
page read and write
4681FFE000
stack
page read and write
18A87672000
trusted library allocation
page read and write
1C09915A000
trusted library allocation
page read and write
1C0A1386000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921D4000
heap
page read and write
1C0A463C000
trusted library allocation
page read and write
1C0A12D7000
trusted library allocation
page read and write
24F4099F000
unkown
page execute read
1C0921F2000
heap
page read and write
1C09646C000
trusted library allocation
page read and write
1C09C897000
trusted library allocation
page read and write
1C099518000
trusted library allocation
page read and write
1C09A94E000
trusted library allocation
page read and write
24F40290000
unclassified section
page read and write
1C096AD9000
heap
page read and write
1C0A51B0000
trusted library allocation
page read and write
1C0995ED000
trusted library allocation
page read and write
1C09954E000
trusted library allocation
page read and write
1C09AE78000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C0A54EC000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C09684F000
trusted library allocation
page read and write
1C09A9E3000
trusted library allocation
page read and write
1C0A4CC1000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C0A61A2000
trusted library allocation
page read and write
1C0A16FC000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0A2E28000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09919E000
trusted library allocation
page read and write
1C09A71B000
trusted library allocation
page read and write
76032424000
trusted library allocation
page read and write
1C09A45D000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C099275000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
46837FE000
unkown
page readonly
1C09A59F000
trusted library allocation
page read and write
1C09CBE2000
trusted library allocation
page read and write
1C09A3A8000
trusted library allocation
page read and write
1C096542000
trusted library allocation
page read and write
C67FCFE000
unkown
page readonly
1C0921D4000
heap
page read and write
1C09AAED000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09AAED000
trusted library allocation
page read and write
1C09A67E000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C092232000
heap
page read and write
1C09A37A000
trusted library allocation
page read and write
1C098D73000
trusted library allocation
page read and write
1C0921EB000
heap
page read and write
1C09A7F3000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
1C09D2F1000
trusted library allocation
page read and write
1C09B3FC000
trusted library allocation
page read and write
1C09AE07000
trusted library allocation
page read and write
1C0A163E000
trusted library allocation
page read and write
1C092258000
heap
page read and write
1C09C8D2000
trusted library allocation
page read and write
1C0A2DAC000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09222E000
heap
page read and write
1C09223A000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A13B8000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C0A12D7000
trusted library allocation
page read and write
1C09A70A000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921FE000
heap
page read and write
1C09A97A000
trusted library allocation
page read and write
1C09AEBA000
trusted library allocation
page read and write
18A87612000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921D0000
heap
page read and write
1C09CAE1000
trusted library allocation
page read and write
1C099D4A000
trusted library allocation
page read and write
1C09A95C000
trusted library allocation
page read and write
1C0921D3000
heap
page read and write
1C092281000
heap
page read and write
1C0921DB000
heap
page read and write
18A87681000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C09A6D2000
trusted library allocation
page read and write
38388CFD000
trusted library allocation
page execute read
1C09220A000
heap
page read and write
1C0A11D2000
trusted library allocation
page read and write
1C09AABE000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
24F4105C000
heap
page read and write
1C0A15F8000
trusted library allocation
page read and write
1C09CAB1000
trusted library allocation
page read and write
24F41121000
heap
page read and write
1C092264000
heap
page read and write
1C09658F000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C09AAF8000
trusted library allocation
page read and write
3A90000
heap
page read and write
1C092258000
heap
page read and write
1C09A712000
trusted library allocation
page read and write
1C09CE08000
heap
page read and write
1C0A1675000
trusted library allocation
page read and write
1C09C871000
trusted library allocation
page read and write
26ADDFA000
stack
page read and write
24F410E3000
heap
page read and write
1C0A5C01000
heap
page read and write
1C0A51BC000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
24F410EC000
heap
page read and write
1C09ACA6000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C09A9FA000
trusted library allocation
page read and write
1C098D7A000
trusted library allocation
page read and write
1C099CFC000
trusted library allocation
page read and write
1C0921DF000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A15FA000
trusted library allocation
page read and write
1C0A15DE000
trusted library allocation
page read and write
1C0A51B0000
trusted library allocation
page read and write
1C0A4C8F000
trusted library allocation
page read and write
1C0965EB000
trusted library allocation
page read and write
1C09AD6D000
trusted library allocation
page read and write
1C09A6F5000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0A51D8000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C0921E1000
heap
page read and write
1C09220A000
heap
page read and write
1C0A5160000
trusted library allocation
page read and write
1C0A121B000
trusted library allocation
page read and write
1C0992FC000
trusted library allocation
page read and write
1C09BC53000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A51AA000
trusted library allocation
page read and write
1C09A760000
trusted library allocation
page read and write
18A876B7000
trusted library allocation
page read and write
1C0A5905000
trusted library allocation
page read and write
1C099CFB000
trusted library allocation
page read and write
1C0A39E0000
trusted library allocation
page read and write
18A86F20000
unclassified section
page readonly
1C0A5CA8000
heap
page read and write
24F410FD000
heap
page read and write
1C098D26000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09ABB3000
trusted library allocation
page read and write
1C0921B8000
heap
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09CAE8000
trusted library allocation
page read and write
1C09BC2C000
trusted library allocation
page read and write
18A87420000
trusted library allocation
page read and write
1C09A113000
trusted library allocation
page read and write
1C09BB28000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0991A5000
trusted library allocation
page read and write
1C09AA1D000
trusted library allocation
page read and write
1C099C43000
trusted library allocation
page read and write
24B79549000
trusted library allocation
page read and write
1C09B573000
trusted library allocation
page read and write
1C09AE10000
trusted library allocation
page read and write
1C09A720000
trusted library allocation
page read and write
1ABC0FA7000
heap
page read and write
1C09BCB6000
trusted library allocation
page read and write
1C0A1316000
trusted library allocation
page read and write
1C09AE1A000
trusted library allocation
page read and write
1C096887000
trusted library allocation
page read and write
1C0921D8000
heap
page read and write
24B7951A000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C092204000
heap
page read and write
1C0A1276000
trusted library allocation
page read and write
1C09951F000
trusted library allocation
page read and write
1C0A57C3000
trusted library allocation
page read and write
1C09653C000
trusted library allocation
page read and write
1C0A2E0E000
trusted library allocation
page read and write
1C0A2C9C000
trusted library allocation
page read and write
1C09CB4C000
trusted library allocation
page read and write
1C099CF3000
trusted library allocation
page read and write
1C0A15DA000
trusted library allocation
page read and write
1C0953B5000
trusted library allocation
page read and write
1C09689D000
trusted library allocation
page read and write
1C0A11DB000
trusted library allocation
page read and write
1C09918E000
trusted library allocation
page read and write
24F410E0000
heap
page read and write
18A87182000
unclassified section
page read and write
1C0921EC000
heap
page read and write
1C0A4617000
trusted library allocation
page read and write
1C099552000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921D6000
heap
page read and write
1C0921E2000
heap
page read and write
1C0921E2000
heap
page read and write
1C0921E7000
heap
page read and write
1C0A5967000
trusted library allocation
page read and write
1C0A3855000
trusted library allocation
page read and write
1C0A4665000
trusted library allocation
page read and write
1C0A2C50000
trusted library allocation
page read and write
1C09B57C000
trusted library allocation
page read and write
1C09B3CF000
trusted library allocation
page read and write
1C096256000
trusted library allocation
page read and write
1C09ABB0000
trusted library allocation
page read and write
1C095400000
trusted library allocation
page read and write
1C09A357000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A4629000
trusted library allocation
page read and write
1C0A5171000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
18A86F90000
remote allocation
page read and write
18A876E8000
trusted library allocation
page read and write
1C0953C6000
trusted library allocation
page read and write
1C0A159D000
trusted library allocation
page read and write
1C09AAAD000
trusted library allocation
page read and write
1C0992D9000
trusted library allocation
page read and write
1C0921E6000
heap
page read and write
1C09A374000
trusted library allocation
page read and write
1C09A35F000
trusted library allocation
page read and write
1C0992C4000
trusted library allocation
page read and write
1C09A9FD000
trusted library allocation
page read and write
1C09A5FB000
trusted library allocation
page read and write
1C09A956000
trusted library allocation
page read and write
1C09A69B000
trusted library allocation
page read and write
1C0A15CD000
trusted library allocation
page read and write
1C0A11F6000
trusted library allocation
page read and write
1C0A12CC000
trusted library allocation
page read and write
1C0A11E1000
trusted library allocation
page read and write
1C0A54C7000
trusted library allocation
page read and write
1C09A667000
trusted library allocation
page read and write
1C0A157E000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C09A8B6000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C0A2CA0000
trusted library allocation
page read and write
1C0A4C50000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C099CF1000
trusted library allocation
page read and write
1C09A37A000
trusted library allocation
page read and write
1C09A0F3000
trusted library allocation
page read and write
1C0A632E000
trusted library allocation
page read and write
1C0A14D9000
trusted library allocation
page read and write
1C09A6F0000
trusted library allocation
page read and write
1C09927B000
trusted library allocation
page read and write
1C096637000
trusted library allocation
page read and write
1C099DC3000
trusted library allocation
page read and write
1C0A13FC000
trusted library allocation
page read and write
1C0A51B3000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921D4000
heap
page read and write
24F4116A000
heap
page read and write
24B791A0000
heap
page read and write
1C0A5193000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0A13DE000
trusted library allocation
page read and write
1C0A138F000
trusted library allocation
page read and write
1C09AC97000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
553EDFE000
unkown
page readonly
1C0965A1000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09222E000
heap
page read and write
1C098D72000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C09C8DA000
trusted library allocation
page read and write
1C0A11CE000
trusted library allocation
page read and write
1C0992D4000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921C6000
heap
page read and write
1C0921CF000
heap
page read and write
1C0921E2000
heap
page read and write
1C09A1AB000
trusted library allocation
page read and write
1C0A1325000
trusted library allocation
page read and write
1C0A1548000
trusted library allocation
page read and write
1C09ABB8000
trusted library allocation
page read and write
1C099170000
trusted library allocation
page read and write
1C0A549C000
trusted library allocation
page read and write
1C0921DC000
heap
page read and write
1C0A5D64000
heap
page read and write
1C09BE83000
trusted library allocation
page read and write
24F410B9000
heap
page read and write
1C09ABBA000
trusted library allocation
page read and write
1C09B842000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0921D4000
heap
page read and write
1C09A9E3000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C0921C6000
heap
page read and write
1C0921D4000
heap
page read and write
1C0964DA000
trusted library allocation
page read and write
1C0A1685000
trusted library allocation
page read and write
1C09953D000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0962DF000
trusted library allocation
page read and write
1C09AAED000
trusted library allocation
page read and write
1C09A86F000
trusted library allocation
page read and write
1C092241000
heap
page read and write
1C09B878000
trusted library allocation
page read and write
1C09A9AB000
trusted library allocation
page read and write
46FFDFE000
unkown
page readonly
1C0A5C9B000
heap
page read and write
1C09A9C7000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
1C09A865000
trusted library allocation
page read and write
1C0995D7000
trusted library allocation
page read and write
1C09B5E3000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
1FD85000000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C09C8D2000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09B4FE000
trusted library allocation
page read and write
1C09CD92000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921D4000
heap
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C099284000
trusted library allocation
page read and write
24F40475000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C09CAFD000
trusted library allocation
page read and write
1C09A11B000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0921D4000
heap
page read and write
1C099C62000
trusted library allocation
page read and write
1C0965C7000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C096AD9000
heap
page read and write
E60000
heap
page read and write
1C09BC88000
trusted library allocation
page read and write
1C0A4CC1000
trusted library allocation
page read and write
C6007D8000
stack
page read and write
1C0A51E4000
trusted library allocation
page read and write
24F410FD000
heap
page read and write
1C09223C000
heap
page read and write
1C09916D000
trusted library allocation
page read and write
1C0A1645000
trusted library allocation
page read and write
1C0A159B000
trusted library allocation
page read and write
1C0A1B76000
trusted library allocation
page read and write
18A87696000
trusted library allocation
page read and write
1C0A5783000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A95A000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C098DD9000
trusted library allocation
page read and write
1C0992A9000
trusted library allocation
page read and write
1C09B9DC000
trusted library allocation
page read and write
1C0A5CB5000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A4FCD000
trusted library allocation
page read and write
24F4106C000
heap
page read and write
1C0A11F0000
trusted library allocation
page read and write
1C09B3DF000
trusted library allocation
page read and write
1C0A163E000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C09A0FD000
trusted library allocation
page read and write
1C09BBBB000
trusted library allocation
page read and write
1C09B949000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09AE4A000
trusted library allocation
page read and write
46FFE7E000
unkown
page readonly
1C0921FE000
heap
page read and write
1C0921F3000
heap
page read and write
1C0921D1000
heap
page read and write
1C096552000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0A598A000
trusted library allocation
page read and write
1C0A5407000
trusted library allocation
page read and write
1C09A47F000
trusted library allocation
page read and write
18A87412000
trusted library allocation
page read and write
1C099D75000
trusted library allocation
page read and write
1C09ADB2000
trusted library allocation
page read and write
1C0A123E000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C092231000
heap
page read and write
1C09A0E0000
trusted library allocation
page read and write
1C092225000
heap
page read and write
24B79240000
heap
page read and write
24F400AB000
remote allocation
page execute read
1C0921CE000
heap
page read and write
1C0921D0000
heap
page read and write
1C09A9E7000
trusted library allocation
page read and write
1C092205000
heap
page read and write
1C09B9A7000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09C8DA000
trusted library allocation
page read and write
24F4106C000
heap
page read and write
1C0A15B8000
trusted library allocation
page read and write
1C0953E4000
trusted library allocation
page read and write
1C09A7EE000
trusted library allocation
page read and write
1C09A067000
trusted library allocation
page read and write
1C09AE19000
trusted library allocation
page read and write
1C0921DF000
heap
page read and write
1C09A4DF000
trusted library allocation
page read and write
1C0A549C000
trusted library allocation
page read and write
1C0A13B8000
trusted library allocation
page read and write
1C094CB3000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C0A1297000
trusted library allocation
page read and write
1C094CBF000
trusted library allocation
page read and write
1C09A99F000
trusted library allocation
page read and write
1C0A13FC000
trusted library allocation
page read and write
1C0A2C96000
trusted library allocation
page read and write
1C09C86B000
trusted library allocation
page read and write
1C09923D000
trusted library allocation
page read and write
18A87574000
heap
page read and write
24F4104D000
heap
page read and write
1C0A2E04000
trusted library allocation
page read and write
1C0A46B8000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C09BAAA000
trusted library allocation
page read and write
1C0A1389000
trusted library allocation
page read and write
24F4106C000
heap
page read and write
1C0921D4000
heap
page read and write
1C0921D9000
heap
page read and write
1C09918A000
trusted library allocation
page read and write
1C09A5E9000
trusted library allocation
page read and write
1C09522F000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C09AAAD000
trusted library allocation
page read and write
1C09CA5D000
trusted library allocation
page read and write
24B79180000
heap
page read and write
1FD84E00000
heap
page read and write
1C0A4FD8000
trusted library allocation
page read and write
1C09A665000
trusted library allocation
page read and write
1C09AAB0000
trusted library allocation
page read and write
1C09A9FD000
trusted library allocation
page read and write
1C09C892000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A795000
trusted library allocation
page read and write
24F410F1000
heap
page read and write
1C092237000
heap
page read and write
24F410F1000
heap
page read and write
24F410E1000
heap
page read and write
1C099DB2000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
18A8760D000
trusted library allocation
page read and write
1C09A846000
trusted library allocation
page read and write
1C09B869000
trusted library allocation
page read and write
1C099559000
trusted library allocation
page read and write
1C09AEB7000
trusted library allocation
page read and write
1C09BE72000
trusted library allocation
page read and write
24F40030000
unclassified section
page readonly
1C09A9C7000
trusted library allocation
page read and write
1C0962B7000
trusted library allocation
page read and write
1C099D36000
trusted library allocation
page read and write
1C0921CD000
heap
page read and write
1C092228000
heap
page read and write
13FB000
stack
page read and write
1C09AAFE000
trusted library allocation
page read and write
1C099182000
trusted library allocation
page read and write
1C09B851000
trusted library allocation
page read and write
24F4116A000
heap
page read and write
1C099DA6000
trusted library allocation
page read and write
1C0A54FE000
trusted library allocation
page read and write
1C0921EA000
heap
page read and write
1C09AAF8000
trusted library allocation
page read and write
18A87432000
trusted library allocation
page read and write
1C0A12AB000
trusted library allocation
page read and write
D84000
heap
page read and write
1FD84F90000
heap
page read and write
1C092205000
heap
page read and write
1C0A4683000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
18A86FA6000
remote allocation
page execute read
1C09A72C000
trusted library allocation
page read and write
1C09A332000
trusted library allocation
page read and write
1C09CB53000
trusted library allocation
page read and write
24F410F1000
heap
page read and write
1C0921FC000
heap
page read and write
1C0921C5000
heap
page read and write
1C09CBBB000
trusted library allocation
page read and write
1C0A46F9000
trusted library allocation
page read and write
1C0A591C000
trusted library allocation
page read and write
1C092246000
heap
page read and write
1C09A9C9000
trusted library allocation
page read and write
1C09A6B2000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C0A517A000
trusted library allocation
page read and write
1C0A515B000
trusted library allocation
page read and write
1C09AD7E000
trusted library allocation
page read and write
18A87414000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0A140F000
trusted library allocation
page read and write
1C096576000
trusted library allocation
page read and write
1C09CB7C000
trusted library allocation
page read and write
1C09A816000
trusted library allocation
page read and write
1C092216000
heap
page read and write
1C09A680000
trusted library allocation
page read and write
1C0921FD000
heap
page read and write
1C09A651000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C0921F2000
heap
page read and write
1C094CDF000
trusted library allocation
page read and write
1C0A14DF000
trusted library allocation
page read and write
1C0A5CAF000
heap
page read and write
1C0A467C000
trusted library allocation
page read and write
1C09A81E000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C092241000
heap
page read and write
1C0921D1000
heap
page read and write
1C0921D4000
heap
page read and write
1C0921EC000
heap
page read and write
1C09B562000
trusted library allocation
page read and write
1C09BC78000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C09918D000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A2CA4000
trusted library allocation
page read and write
1C0921E5000
heap
page read and write
1C0A5C9F000
heap
page read and write
1C09B8B9000
trusted library allocation
page read and write
1C09AE78000
trusted library allocation
page read and write
1C096887000
trusted library allocation
page read and write
1C0A4CEB000
trusted library allocation
page read and write
1C0A15B8000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C09A35F000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A6A1000
trusted library allocation
page read and write
1C0A4CD3000
trusted library allocation
page read and write
1C0921D3000
heap
page read and write
1C0A15BB000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C099D92000
trusted library allocation
page read and write
1C09BC0B000
trusted library allocation
page read and write
1C09CBF5000
trusted library allocation
page read and write
24F404E9000
trusted library allocation
page read and write
1C09C896000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09A786000
trusted library allocation
page read and write
1C09AE39000
trusted library allocation
page read and write
1C09926D000
trusted library allocation
page read and write
1C092241000
heap
page read and write
1C0995FD000
trusted library allocation
page read and write
1C0A516D000
trusted library allocation
page read and write
1C0A129B000
trusted library allocation
page read and write
1C096853000
trusted library allocation
page read and write
1C09A6B9000
trusted library allocation
page read and write
1C0A1195000
trusted library allocation
page read and write
1C092280000
heap
page read and write
1C0A51B3000
trusted library allocation
page read and write
1C099DB0000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A6F0000
trusted library allocation
page read and write
1C09ABCF000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
1C0A156C000
trusted library allocation
page read and write
1C099D92000
trusted library allocation
page read and write
1C09A49B000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A65C000
trusted library allocation
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
24F402A0000
trusted library section
page readonly
1C0921E2000
heap
page read and write
1C0992A9000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0A5785000
trusted library allocation
page read and write
1C09CDE4000
trusted library allocation
page read and write
158E000
heap
page read and write
24F410F1000
heap
page read and write
157A000
heap
page read and write
1C0921E2000
heap
page read and write
1C09A766000
trusted library allocation
page read and write
1C099CEF000
trusted library allocation
page read and write
1C09A7F3000
trusted library allocation
page read and write
1C09C8C1000
trusted library allocation
page read and write
3D48F0F03000
trusted library allocation
page read and write
1C0992C4000
trusted library allocation
page read and write
1C0A54D4000
trusted library allocation
page read and write
1C09D26D000
trusted library allocation
page read and write
1C0A16FA000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C0995A1000
trusted library allocation
page read and write
1C09A1B1000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A2C64000
trusted library allocation
page read and write
1C09CE64000
trusted library allocation
page read and write
1C099D2E000
trusted library allocation
page read and write
1C0962E3000
trusted library allocation
page read and write
1C0921F3000
heap
page read and write
1C09BDF5000
trusted library allocation
page read and write
1C09A8A3000
trusted library allocation
page read and write
1C0A54D4000
trusted library allocation
page read and write
C7A7FC000
stack
page read and write
1C0921E2000
heap
page read and write
1C0921F5000
heap
page read and write
1ABC0FD1000
heap
page read and write
1C099D25000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C0990AC000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A5EE000
trusted library allocation
page read and write
1C0A15D2000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A9F7000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0A4643000
trusted library allocation
page read and write
1C096581000
trusted library allocation
page read and write
1C0A2C9C000
trusted library allocation
page read and write
1C0921EB000
heap
page read and write
1C098D80000
trusted library allocation
page read and write
1C09AE0A000
trusted library allocation
page read and write
1C09BEC6000
trusted library allocation
page read and write
1C09A45B000
trusted library allocation
page read and write
1C09A776000
trusted library allocation
page read and write
1C09A3F4000
trusted library allocation
page read and write
1C096846000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C09BBFC000
trusted library allocation
page read and write
1C0A54D9000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0A51D8000
trusted library allocation
page read and write
1C09AAF5000
trusted library allocation
page read and write
1C0A5430000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
18A87403000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09AC97000
trusted library allocation
page read and write
1C09BE61000
trusted library allocation
page read and write
1C0A2CD6000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C09685B000
trusted library allocation
page read and write
1C098D19000
trusted library allocation
page read and write
C6037FE000
stack
page read and write
1C09A3F4000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C09CABE000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921E7000
heap
page read and write
1C09B590000
trusted library allocation
page read and write
1C09A64A000
trusted library allocation
page read and write
1C09BBC5000
trusted library allocation
page read and write
1C09A99F000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
24F41064000
heap
page read and write
1C09ABBA000
trusted library allocation
page read and write
1C09A7A6000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09CDD5000
trusted library allocation
page read and write
1C099CF6000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C099D51000
trusted library allocation
page read and write
1C09C873000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C099DDE000
trusted library allocation
page read and write
1C09A99F000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C0921FE000
heap
page read and write
1C0921D1000
heap
page read and write
1C0A50A0000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921F2000
heap
page read and write
FCC000
unkown
page readonly
1C092233000
heap
page read and write
1C09BC74000
trusted library allocation
page read and write
1C0A154F000
trusted library allocation
page read and write
18A870CA000
heap
page read and write
1C0A1172000
trusted library allocation
page read and write
1C09BC78000
trusted library allocation
page read and write
1C099DC1000
trusted library allocation
page read and write
1C0A1523000
trusted library allocation
page read and write
1C0A51B0000
trusted library allocation
page read and write
24F41000000
heap
page read and write
1C0A1274000
trusted library allocation
page read and write
1C0968CF000
trusted library allocation
page read and write
1C0A2C4A000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C09A99D000
trusted library allocation
page read and write
1C0968C8000
trusted library allocation
page read and write
1C0A1B28000
trusted library allocation
page read and write
1C0A123C000
trusted library allocation
page read and write
1C0A547D000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0921F2000
heap
page read and write
1ABC2B9A000
heap
page read and write
1C0A5171000
trusted library allocation
page read and write
1C09A7A6000
trusted library allocation
page read and write
157C000
heap
page read and write
1C09B851000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C096256000
trusted library allocation
page read and write
46FFCFB000
stack
page read and write
1C0A115A000
trusted library allocation
page read and write
1C09BE7A000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09AE8B000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
F30000
unkown
page readonly
553AA8E000
unkown
page readonly
18A871B0000
unclassified section
page readonly
1C092237000
heap
page read and write
1C0A5993000
trusted library allocation
page read and write
1C09A3DB000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C09B89F000
trusted library allocation
page read and write
1C0A5C35000
heap
page read and write
1C0921EA000
heap
page read and write
24F405E0000
trusted library allocation
page read and write
1C09A9EF000
trusted library allocation
page read and write
24F4113B000
heap
page read and write
1C09BCDB000
trusted library allocation
page read and write
1C0A14BB000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0921D9000
heap
page read and write
24B79390000
unclassified section
page readonly
1C09AF67000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09CA13000
trusted library allocation
page read and write
1C09A111000
trusted library allocation
page read and write
1597000
heap
page read and write
1C0A2CFC000
trusted library allocation
page read and write
1C09A687000
trusted library allocation
page read and write
1C0A1B48000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C099272000
trusted library allocation
page read and write
1C09B895000
trusted library allocation
page read and write
1C0A5781000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A5433000
trusted library allocation
page read and write
1C09C8BA000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09AE84000
trusted library allocation
page read and write
1C0A576A000
trusted library allocation
page read and write
1C0A15DA000
trusted library allocation
page read and write
1C099172000
trusted library allocation
page read and write
1C09BC80000
trusted library allocation
page read and write
1C0A547D000
trusted library allocation
page read and write
1C09A1AB000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
24F41069000
heap
page read and write
1C09531B000
trusted library allocation
page read and write
1C0A4672000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
1C09A8F5000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09CBE0000
trusted library allocation
page read and write
24B79503000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0A1306000
trusted library allocation
page read and write
1C0A11D2000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C099D22000
trusted library allocation
page read and write
1C09A841000
trusted library allocation
page read and write
1C0A4F97000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
157B000
heap
page read and write
1C0921E7000
heap
page read and write
1ABC2B9D000
heap
page read and write
1C0921E7000
heap
page read and write
1C0921FE000
heap
page read and write
1C09AE8F000
trusted library allocation
page read and write
1C09ABEA000
trusted library allocation
page read and write
1C0A38F6000
trusted library allocation
page read and write
1C09BCDB000
trusted library allocation
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A16C1000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0A15B1000
trusted library allocation
page read and write
1C0A156C000
trusted library allocation
page read and write
1C0953B5000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C099C43000
trusted library allocation
page read and write
1C09A7B5000
trusted library allocation
page read and write
1C09AA81000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C09ADDD000
trusted library allocation
page read and write
1C099C62000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
24B7950C000
trusted library allocation
page read and write
1C09A3D7000
trusted library allocation
page read and write
24B790E0000
unclassified section
page readonly
1C09AA7C000
trusted library allocation
page read and write
1C099DA3000
trusted library allocation
page read and write
1C0921CD000
heap
page read and write
140F000
stack
page read and write
1C0921FC000
heap
page read and write
1C09CD38000
trusted library allocation
page read and write
1C092233000
heap
page read and write
1C0A1597000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921CE000
heap
page read and write
1C0921E2000
heap
page read and write
1C0921E2000
heap
page read and write
1C099C2C000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09223C000
heap
page read and write
1C09BBC7000
trusted library allocation
page read and write
26AEDFE000
stack
page read and write
1C0A1390000
trusted library allocation
page read and write
1C099DBB000
trusted library allocation
page read and write
1C09224B000
heap
page read and write
1C0991A5000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C092238000
heap
page read and write
1C096A98000
heap
page read and write
1C0965BE000
trusted library allocation
page read and write
38388DAF000
trusted library allocation
page execute read
1C09A783000
trusted library allocation
page read and write
24F401DA000
heap
page read and write
1C0921F1000
heap
page read and write
1C0A4FA8000
trusted library allocation
page read and write
1C09AE78000
trusted library allocation
page read and write
1C09A857000
trusted library allocation
page read and write
1C0A13DB000
trusted library allocation
page read and write
1C0A54ED000
trusted library allocation
page read and write
1C09225C000
heap
page read and write
1C092240000
heap
page read and write
1C0921D7000
heap
page read and write
1C09AE4E000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C09908A000
trusted library allocation
page read and write
1C09AE8B000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C09A8CE000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0921FF000
heap
page read and write
1C092211000
heap
page read and write
1C0990CC000
trusted library allocation
page read and write
1C0A15F2000
trusted library allocation
page read and write
1C0992BE000
trusted library allocation
page read and write
1C09AE1F000
trusted library allocation
page read and write
1C0995DD000
trusted library allocation
page read and write
1C0A51BA000
trusted library allocation
page read and write
1C096227000
trusted library allocation
page read and write
1C0A15C3000
trusted library allocation
page read and write
1C0A4677000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0A13B0000
trusted library allocation
page read and write
1C0995D8000
trusted library allocation
page read and write
1C098D60000
trusted library allocation
page read and write
24F410EC000
heap
page read and write
1C09915B000
trusted library allocation
page read and write
1C094CC1000
trusted library allocation
page read and write
18A876A5000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A4FAE000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C096544000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A2C75000
trusted library allocation
page read and write
1C0A4CAF000
trusted library allocation
page read and write
1C092227000
heap
page read and write
1FD84EF0000
heap
page read and write
1C096596000
trusted library allocation
page read and write
1C0A2D4D000
trusted library allocation
page read and write
1C09BCEB000
trusted library allocation
page read and write
1C0995D5000
trusted library allocation
page read and write
1C0A13C0000
trusted library allocation
page read and write
1C0A6241000
trusted library allocation
page read and write
1C09658C000
trusted library allocation
page read and write
1C09A5BE000
trusted library allocation
page read and write
24F405F6000
heap
page read and write
1C09A346000
trusted library allocation
page read and write
1C0921D1000
heap
page read and write
1C0A515B000
trusted library allocation
page read and write
1C09A8BF000
trusted library allocation
page read and write
1C092260000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921EB000
heap
page read and write
1C0921F9000
heap
page read and write
1C0A4FB3000
trusted library allocation
page read and write
1C098D28000
trusted library allocation
page read and write
1C09CB69000
trusted library allocation
page read and write
1C09A434000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
18A876C8000
trusted library allocation
page read and write
1C0A46BE000
trusted library allocation
page read and write
1C0A11D7000
trusted library allocation
page read and write
1C095366000
trusted library allocation
page read and write
1C09A361000
trusted library allocation
page read and write
1C09A4A3000
trusted library allocation
page read and write
1C0A4200000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C0A1B95000
trusted library allocation
page read and write
1C0A125F000
trusted library allocation
page read and write
1C0A51BA000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C096A9A000
heap
page read and write
1C0A51AA000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09A3DB000
trusted library allocation
page read and write
1C09AE5B000
trusted library allocation
page read and write
1C09CEB3000
trusted library allocation
page read and write
1C09A6F5000
trusted library allocation
page read and write
1C09B4A1000
trusted library allocation
page read and write
1C09A3D7000
trusted library allocation
page read and write
26AFDFE000
stack
page read and write
1C099275000
trusted library allocation
page read and write
1C09A895000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C092246000
heap
page read and write
1C09A8B4000
trusted library allocation
page read and write
1C0995C2000
trusted library allocation
page read and write
1C0A4633000
trusted library allocation
page read and write
1C09B3B6000
trusted library allocation
page read and write
1C0990B3000
trusted library allocation
page read and write
1C09AAFB000
trusted library allocation
page read and write
1C0A5CAD000
heap
page read and write
1C09A679000
trusted library allocation
page read and write
1004000
unkown
page readonly
1C09919E000
trusted library allocation
page read and write
1C0A12AB000
trusted library allocation
page read and write
1C092234000
heap
page read and write
1C0921F2000
heap
page read and write
1C092205000
heap
page read and write
1C09A8C3000
trusted library allocation
page read and write
1C0A40A8000
trusted library allocation
page read and write
1C09A73B000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09B967000
trusted library allocation
page read and write
46FFCF7000
stack
page read and write
1C09AAED000
trusted library allocation
page read and write
1C099D09000
trusted library allocation
page read and write
1C09A319000
trusted library allocation
page read and write
1558000
heap
page read and write
18A87120000
heap
page read and write
1C09BB2C000
trusted library allocation
page read and write
1C09AE93000
trusted library allocation
page read and write
18A8741B000
trusted library allocation
page read and write
1C09A397000
trusted library allocation
page read and write
1C09BC9E000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C0921E0000
heap
page read and write
1C0921F2000
heap
page read and write
1C09659A000
trusted library allocation
page read and write
1C0A129E000
trusted library allocation
page read and write
1C09A0C4000
trusted library allocation
page read and write
1C09B888000
trusted library allocation
page read and write
1C0A5787000
trusted library allocation
page read and write
1C09A7B9000
trusted library allocation
page read and write
1C099DB0000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C09A9F7000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09AE1F000
trusted library allocation
page read and write
1C0A16C3000
trusted library allocation
page read and write
1C09B888000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921FC000
heap
page read and write
1C0A5C01000
heap
page read and write
1C09913B000
trusted library allocation
page read and write
1C09915B000
trusted library allocation
page read and write
1C09A78D000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09AC9C000
trusted library allocation
page read and write
1C09A613000
trusted library allocation
page read and write
24F4046F000
trusted library allocation
page read and write
1C09958D000
trusted library allocation
page read and write
1C09AE5E000
trusted library allocation
page read and write
1C09A6D0000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921FE000
heap
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09AE53000
trusted library allocation
page read and write
1C09531E000
trusted library allocation
page read and write
1C0921CD000
heap
page read and write
1C099C2C000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C0A4FC3000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921E2000
heap
page read and write
1C0A12C3000
trusted library allocation
page read and write
1C09BC8C000
trusted library allocation
page read and write
1C09A88A000
trusted library allocation
page read and write
1C0A3896000
trusted library allocation
page read and write
1C0A1677000
trusted library allocation
page read and write
1C09CB7E000
trusted library allocation
page read and write
1C09A683000
trusted library allocation
page read and write
1C09952E000
trusted library allocation
page read and write
1C0A13F8000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C0921FB000
heap
page read and write
1C09A6D9000
trusted library allocation
page read and write
1C092230000
heap
page read and write
1C0921DB000
heap
page read and write
1C09223C000
heap
page read and write
1C09A34C000
trusted library allocation
page read and write
1C0A1265000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09CB2D000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09923B000
trusted library allocation
page read and write
1C09A31C000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09A407000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09AE50000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921FE000
heap
page read and write
1C0921FE000
heap
page read and write
1C09A7A6000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0991CE000
trusted library allocation
page read and write
1C09AE10000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A3A0000
trusted library allocation
page read and write
1C092227000
heap
page read and write
1C09909A000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A2E2C000
trusted library allocation
page read and write
38388DD1000
trusted library allocation
page execute read
1C09B8F4000
trusted library allocation
page read and write
1C0A39DD000
trusted library allocation
page read and write
1C099D92000
trusted library allocation
page read and write
1C09BCBC000
trusted library allocation
page read and write
1C09B4E5000
trusted library allocation
page read and write
1C0A5458000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C0992D9000
trusted library allocation
page read and write
156F000
heap
page read and write
1C096256000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09629C000
trusted library allocation
page read and write
1C09CD3A000
trusted library allocation
page read and write
1C0A546A000
trusted library allocation
page read and write
1C09A9E5000
trusted library allocation
page read and write
1C099D17000
trusted library allocation
page read and write
1C0968CD000
trusted library allocation
page read and write
1C0A16F4000
trusted library allocation
page read and write
1C09923D000
trusted library allocation
page read and write
1C0A5C51000
heap
page read and write
1C096886000
trusted library allocation
page read and write
1C09ABBA000
trusted library allocation
page read and write
1C09A568000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0921D7000
heap
page read and write
1C0992AD000
trusted library allocation
page read and write
1C0A578D000
trusted library allocation
page read and write
1C0921E4000
heap
page read and write
1C09A6B0000
trusted library allocation
page read and write
24B7922F000
unclassified section
page read and write
1C0A4CD6000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
24B7933A000
heap
page read and write
1C0921ED000
heap
page read and write
1C09222E000
heap
page read and write
24F410E9000
heap
page read and write
1C099D8F000
trusted library allocation
page read and write
1C09A9C9000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C0A465A000
trusted library allocation
page read and write
1C099258000
trusted library allocation
page read and write
1C09AAE5000
trusted library allocation
page read and write
1C09CAA1000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09BCEF000
trusted library allocation
page read and write
1C09AA1D000
trusted library allocation
page read and write
1C09A753000
trusted library allocation
page read and write
24B7980C000
trusted library allocation
page read and write
1C09223A000
heap
page read and write
1C09A6FC000
trusted library allocation
page read and write
1C0A2D48000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C09A35F000
trusted library allocation
page read and write
1C099D27000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09A0B5000
trusted library allocation
page read and write
1C0A1238000
trusted library allocation
page read and write
1C092281000
heap
page read and write
1C092228000
heap
page read and write
1576000
heap
page read and write
1C098DDF000
trusted library allocation
page read and write
1C09B317000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09CBF5000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0991CE000
trusted library allocation
page read and write
1C09A5F6000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09222D000
heap
page read and write
1C0921D4000
heap
page read and write
1C099C55000
trusted library allocation
page read and write
1C099C55000
trusted library allocation
page read and write
1C0A1B77000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0921F2000
heap
page read and write
1C09DF02000
trusted library allocation
page read and write
1C096846000
trusted library allocation
page read and write
1C099C4B000
trusted library allocation
page read and write
1C0A467C000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A13FE000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09BBB9000
trusted library allocation
page read and write
1C099CAB000
trusted library allocation
page read and write
1C0A5D1E000
heap
page read and write
D84000
heap
page read and write
1C099DA8000
trusted library allocation
page read and write
24F410EC000
heap
page read and write
1C0962FE000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921E2000
heap
page read and write
1C0921FE000
heap
page read and write
1C0921FE000
heap
page read and write
26AE5FE000
stack
page read and write
1C09A99B000
trusted library allocation
page read and write
1C0953A2000
trusted library allocation
page read and write
1C0A1685000
trusted library allocation
page read and write
1C09BBBD000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
24F4112A000
heap
page read and write
1C09BBC5000
trusted library allocation
page read and write
1C09CD28000
trusted library allocation
page read and write
1C09C8AE000
trusted library allocation
page read and write
1C092231000
heap
page read and write
1C09CAEB000
trusted library allocation
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C0921F7000
heap
page read and write
1C0921C1000
heap
page read and write
1C095326000
trusted library allocation
page read and write
1C09ABB0000
trusted library allocation
page read and write
1C099D29000
trusted library allocation
page read and write
1C0992FC000
trusted library allocation
page read and write
1C0A1513000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0921F2000
heap
page read and write
1C09A8F9000
trusted library allocation
page read and write
1C09AA19000
trusted library allocation
page read and write
1C0A5CA5000
heap
page read and write
1C0A2CA4000
trusted library allocation
page read and write
1C09A35B000
trusted library allocation
page read and write
1C0A2CE1000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A2CA2000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C09AE32000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0995ED000
trusted library allocation
page read and write
1C09AE95000
trusted library allocation
page read and write
24B79565000
trusted library allocation
page read and write
1C09BE9A000
trusted library allocation
page read and write
24F4045C000
trusted library allocation
page read and write
1C0995FD000
trusted library allocation
page read and write
1C099279000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A2C07000
trusted library allocation
page read and write
1C09AAA6000
trusted library allocation
page read and write
1C09A899000
trusted library allocation
page read and write
1C09ABB8000
trusted library allocation
page read and write
1C09A968000
trusted library allocation
page read and write
1C0A1376000
trusted library allocation
page read and write
1C0A5073000
trusted library allocation
page read and write
1C0A4CCE000
trusted library allocation
page read and write
1C09AE68000
trusted library allocation
page read and write
1C09A6DA000
trusted library allocation
page read and write
1C09BDCD000
trusted library allocation
page read and write
1C09A5D3000
trusted library allocation
page read and write
1C0992A9000
trusted library allocation
page read and write
1C0A13D1000
trusted library allocation
page read and write
1C0921E5000
heap
page read and write
1C09A4C3000
trusted library allocation
page read and write
1C09ABB8000
trusted library allocation
page read and write
1C09AACC000
trusted library allocation
page read and write
1C09A387000
trusted library allocation
page read and write
1C09AEDB000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
24F4116A000
heap
page read and write
1C0921F2000
heap
page read and write
1C099188000
trusted library allocation
page read and write
24B79562000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A375000
trusted library allocation
page read and write
1C09C861000
trusted library allocation
page read and write
1C0A51B0000
trusted library allocation
page read and write
1C09AAF5000
trusted library allocation
page read and write
1C099CEF000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0921CF000
heap
page read and write
1C0921CE000
heap
page read and write
1C0921FE000
heap
page read and write
1C09A6E7000
trusted library allocation
page read and write
1C09662C000
trusted library allocation
page read and write
1C09CB90000
trusted library allocation
page read and write
1C099C30000
trusted library allocation
page read and write
1C0A14D9000
trusted library allocation
page read and write
24F41001000
heap
page read and write
1C0965C1000
trusted library allocation
page read and write
1C09AD63000
trusted library allocation
page read and write
1C09C8C1000
trusted library allocation
page read and write
1C0964B8000
trusted library allocation
page read and write
C67FD7E000
unkown
page readonly
1C0921DD000
heap
page read and write
1FD85100000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C09A466000
trusted library allocation
page read and write
1C0921E4000
heap
page read and write
1C09222E000
heap
page read and write
1C0921FE000
heap
page read and write
1C099272000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C09C8BA000
trusted library allocation
page read and write
1ABC0FD3000
heap
page read and write
1C096AD9000
heap
page read and write
1C09CB79000
trusted library allocation
page read and write
24F41069000
heap
page read and write
1C09AA00000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0995CB000
trusted library allocation
page read and write
1C0A124A000
trusted library allocation
page read and write
1C092240000
heap
page read and write
3DE0000
heap
page read and write
1C0A5188000
trusted library allocation
page read and write
1C0A13CD000
trusted library allocation
page read and write
1C09C87B000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C099237000
trusted library allocation
page read and write
1C099C43000
trusted library allocation
page read and write
24B795A3000
trusted library allocation
page read and write
1C09A70E000
trusted library allocation
page read and write
1C09A6CE000
trusted library allocation
page read and write
1C0A4643000
trusted library allocation
page read and write
1C09A7F7000
trusted library allocation
page read and write
1C09BAD3000
trusted library allocation
page read and write
1C09AA7F000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C0A121F000
trusted library allocation
page read and write
1C0A1590000
trusted library allocation
page read and write
1C099D92000
trusted library allocation
page read and write
1C09A38F000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A15EB000
trusted library allocation
page read and write
1ABC0F70000
heap
page read and write
1C09A79C000
trusted library allocation
page read and write
1C09A9C7000
trusted library allocation
page read and write
1C09A99B000
trusted library allocation
page read and write
1C096555000
trusted library allocation
page read and write
1C09648A000
trusted library allocation
page read and write
1C0921E5000
heap
page read and write
24F410A8000
heap
page read and write
1C09ACA8000
trusted library allocation
page read and write
18A87170000
heap
page readonly
1C0921E0000
heap
page read and write
1C0921FE000
heap
page read and write
1C09A40A000
trusted library allocation
page read and write
1C099C5A000
trusted library allocation
page read and write
1C0921D1000
heap
page read and write
1C0A14CE000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0992BB000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09AA73000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A116F000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C099CEF000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C092258000
heap
page read and write
1C0A1597000
trusted library allocation
page read and write
1C09A6A0000
trusted library allocation
page read and write
1C09ACD0000
trusted library allocation
page read and write
1C0A1388000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C099DF9000
trusted library allocation
page read and write
1C09AEB7000
trusted library allocation
page read and write
1C0A13CA000
trusted library allocation
page read and write
24F40210000
heap
page read and write
1C09AAA5000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
18A87666000
trusted library allocation
page read and write
1C09A6DA000
trusted library allocation
page read and write
1C0A1282000
trusted library allocation
page read and write
1C0A4640000
trusted library allocation
page read and write
1C09B8B9000
trusted library allocation
page read and write
24F4107D000
heap
page read and write
1C0921EC000
heap
page read and write
1C09AE2F000
trusted library allocation
page read and write
1C0A4CCE000
trusted library allocation
page read and write
1C0921D3000
heap
page read and write
1C09AE0A000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C0A464A000
trusted library allocation
page read and write
1C09AA83000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0A5937000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A4639000
trusted library allocation
page read and write
1C09A36B000
trusted library allocation
page read and write
1C0921E5000
heap
page read and write
1C0A5CAF000
heap
page read and write
1C09A6C4000
trusted library allocation
page read and write
1C0921DA000
heap
page read and write
1C09A7F3000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C0A13D6000
trusted library allocation
page read and write
1C0A1BA4000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0A51B7000
trusted library allocation
page read and write
1C099C47000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A125F000
trusted library allocation
page read and write
1C09A6D4000
trusted library allocation
page read and write
1C0A503B000
trusted library allocation
page read and write
1C099CE0000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F0000
heap
page read and write
1C09B4D3000
trusted library allocation
page read and write
1000000
unkown
page write copy
1C0921E0000
heap
page read and write
1C09A5FE000
trusted library allocation
page read and write
1C0A1276000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09905A000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A5C9B000
heap
page read and write
1C09A99B000
trusted library allocation
page read and write
24B795AC000
trusted library allocation
page read and write
1C09B4FE000
trusted library allocation
page read and write
1C0A464F000
trusted library allocation
page read and write
1C09C823000
trusted library allocation
page read and write
1C0952FE000
trusted library allocation
page read and write
18A8741D000
trusted library allocation
page read and write
1C0A2D6D000
trusted library allocation
page read and write
1C0A4CEB000
trusted library allocation
page read and write
1C0A127A000
trusted library allocation
page read and write
1C09A346000
trusted library allocation
page read and write
1C09B869000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C099D17000
trusted library allocation
page read and write
1C0A62C5000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C0992C4000
trusted library allocation
page read and write
1C09A656000
trusted library allocation
page read and write
1C0964FE000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921E2000
heap
page read and write
1C09BC2E000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0A465E000
trusted library allocation
page read and write
46FFDBE000
stack
page read and write
1C09CDC6000
trusted library allocation
page read and write
1C0953EE000
trusted library allocation
page read and write
1C09AE2B000
trusted library allocation
page read and write
1C09A73B000
trusted library allocation
page read and write
1C099CE6000
trusted library allocation
page read and write
1C0A1BC2000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
18A87100000
heap
page read and write
1C0921E7000
heap
page read and write
1C0921E2000
heap
page read and write
1C09A9E7000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0921F2000
heap
page read and write
1C09ACD0000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09CE08000
heap
page read and write
1C099D77000
trusted library allocation
page read and write
1C0A11D7000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09AA23000
trusted library allocation
page read and write
1C09A94C000
trusted library allocation
page read and write
1C09222F000
heap
page read and write
1C096889000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C09A973000
trusted library allocation
page read and write
1C09AE05000
trusted library allocation
page read and write
1C09CAE1000
trusted library allocation
page read and write
1C09A663000
trusted library allocation
page read and write
1C09CE45000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C0A620C000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C0A5CAF000
heap
page read and write
24F404C4000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C09A7EE000
trusted library allocation
page read and write
1C09B9C3000
trusted library allocation
page read and write
1C09A35B000
trusted library allocation
page read and write
1C0A516D000
trusted library allocation
page read and write
1C09AE22000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A4F6B000
trusted library allocation
page read and write
1C09A6F0000
trusted library allocation
page read and write
1C0A1B76000
trusted library allocation
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
1C0991A5000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A75B000
trusted library allocation
page read and write
1C099D27000
trusted library allocation
page read and write
1C0A127A000
trusted library allocation
page read and write
1C09A95A000
trusted library allocation
page read and write
1C09918A000
trusted library allocation
page read and write
1C0968A9000
trusted library allocation
page read and write
1C09BBBF000
trusted library allocation
page read and write
1C09C87E000
trusted library allocation
page read and write
1C09A83B000
trusted library allocation
page read and write
1C0921D3000
heap
page read and write
1C0921F2000
heap
page read and write
1C09B9DC000
trusted library allocation
page read and write
158E000
heap
page read and write
1C0A4639000
trusted library allocation
page read and write
1C099C55000
trusted library allocation
page read and write
18A87576000
heap
page read and write
1C0921EA000
heap
page read and write
1C095276000
trusted library allocation
page read and write
1C0921D5000
heap
page read and write
1C0A1543000
trusted library allocation
page read and write
1C0A1265000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A50A9000
trusted library allocation
page read and write
1C09A950000
trusted library allocation
page read and write
1C09A862000
trusted library allocation
page read and write
1C09A58E000
trusted library allocation
page read and write
1C09AE9E000
trusted library allocation
page read and write
1C09CDE7000
trusted library allocation
page read and write
1C09A9FA000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A465E000
trusted library allocation
page read and write
1C09AE93000
trusted library allocation
page read and write
1C09CDE9000
trusted library allocation
page read and write
1C09AD78000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0921CE000
heap
page read and write
1C0921CF000
heap
page read and write
1C0921E5000
heap
page read and write
1C09C8AE000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C09A3FC000
trusted library allocation
page read and write
1C0A57A5000
trusted library allocation
page read and write
1C09929A000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C0A1577000
trusted library allocation
page read and write
1C09AE80000
trusted library allocation
page read and write
1C09AE9E000
trusted library allocation
page read and write
24F405F4000
heap
page read and write
1C0921E2000
heap
page read and write
1C0A158D000
trusted library allocation
page read and write
1C0A1675000
trusted library allocation
page read and write
1C0A4F97000
trusted library allocation
page read and write
1C09A7BC000
trusted library allocation
page read and write
1C09C86D000
trusted library allocation
page read and write
24B79400000
trusted library allocation
page read and write
1C0A549C000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F1000
heap
page read and write
1C0921D6000
heap
page read and write
1C09AAC5000
trusted library allocation
page read and write
1C0A39C0000
trusted library allocation
page read and write
1C09BB88000
trusted library allocation
page read and write
1C0A3840000
trusted library allocation
page read and write
1C09B5C4000
trusted library allocation
page read and write
1C099296000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C096512000
trusted library allocation
page read and write
1C09A99D000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C09ACD0000
trusted library allocation
page read and write
1C09A9A2000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C09B600000
trusted library allocation
page read and write
1C09B4C7000
trusted library allocation
page read and write
1C0A2CD6000
trusted library allocation
page read and write
24F41063000
heap
page read and write
1C09A9E9000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C09923B000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A5C01000
heap
page read and write
1C0A5C9B000
heap
page read and write
1C0A5171000
trusted library allocation
page read and write
24F40461000
trusted library allocation
page read and write
24B79605000
heap
page read and write
1C09A689000
trusted library allocation
page read and write
1C09A0C8000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0A2C13000
trusted library allocation
page read and write
1C09BAB4000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09ADDF000
trusted library allocation
page read and write
1C09ACD4000
trusted library allocation
page read and write
1C09BBC3000
trusted library allocation
page read and write
1C09A630000
trusted library allocation
page read and write
1C0A5CA5000
heap
page read and write
1C0A1398000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A5409000
trusted library allocation
page read and write
1C09AE95000
trusted library allocation
page read and write
24F4107F000
heap
page read and write
1C0A2CA2000
trusted library allocation
page read and write
1C09A6B2000
trusted library allocation
page read and write
1C09BBF3000
trusted library allocation
page read and write
1C0A4677000
trusted library allocation
page read and write
1C09B4C7000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0921EA000
heap
page read and write
1C096AD9000
heap
page read and write
1C0A1679000
trusted library allocation
page read and write
1C0A1677000
trusted library allocation
page read and write
1C099DBB000
trusted library allocation
page read and write
1C09AE4B000
trusted library allocation
page read and write
1C09A6F5000
trusted library allocation
page read and write
1C099279000
trusted library allocation
page read and write
1C09A4D2000
trusted library allocation
page read and write
1C09A911000
trusted library allocation
page read and write
1C0A1232000
trusted library allocation
page read and write
1C098D0B000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C0921C6000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921CF000
heap
page read and write
3DE1000
heap
page read and write
1C0A38F3000
trusted library allocation
page read and write
24F409A0000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C0921E2000
heap
page read and write
1C099284000
trusted library allocation
page read and write
1C09AA07000
trusted library allocation
page read and write
1C0921FB000
heap
page read and write
1C0A2C96000
trusted library allocation
page read and write
1C09B89F000
trusted library allocation
page read and write
1C096505000
trusted library allocation
page read and write
1C09AD7A000
trusted library allocation
page read and write
24B7955D000
trusted library allocation
page read and write
1C09A11D000
trusted library allocation
page read and write
1C09CA5C000
trusted library allocation
page read and write
1C0A5487000
trusted library allocation
page read and write
1C0A1587000
trusted library allocation
page read and write
1C09B38F000
trusted library allocation
page read and write
1C09AE22000
trusted library allocation
page read and write
1C092233000
heap
page read and write
1C0A1378000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A964000
trusted library allocation
page read and write
1C09957F000
trusted library allocation
page read and write
1C0A1416000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A54D4000
trusted library allocation
page read and write
1C099275000
trusted library allocation
page read and write
1C09A6E7000
trusted library allocation
page read and write
1C09688A000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C099107000
trusted library allocation
page read and write
1C09A7B5000
trusted library allocation
page read and write
1C099064000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09AEB3000
trusted library allocation
page read and write
1C0A2D43000
trusted library allocation
page read and write
1C09AE0B000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A1423000
trusted library allocation
page read and write
1C09A43D000
trusted library allocation
page read and write
1C0A1413000
trusted library allocation
page read and write
1C09AE25000
trusted library allocation
page read and write
C67FC3B000
stack
page read and write
1C0992BE000
trusted library allocation
page read and write
24F404BA000
trusted library allocation
page read and write
1C0A465E000
trusted library allocation
page read and write
24B79518000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A0C8000
trusted library allocation
page read and write
1C0995D5000
trusted library allocation
page read and write
1C099DBA000
trusted library allocation
page read and write
1C0A2E33000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A54F2000
trusted library allocation
page read and write
1C0A2CE1000
trusted library allocation
page read and write
1C0A5CAD000
heap
page read and write
1C0921D1000
heap
page read and write
1C0A398A000
trusted library allocation
page read and write
1C09A1A0000
trusted library allocation
page read and write
1C094CA6000
trusted library allocation
page read and write
1ABC2D30000
heap
page read and write
1C09B5AA000
trusted library allocation
page read and write
1C09AE93000
trusted library allocation
page read and write
1C0953C6000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C09A361000
trusted library allocation
page read and write
1C0A1310000
trusted library allocation
page read and write
1C0A14B7000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C099071000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C09A7D2000
trusted library allocation
page read and write
1C0992BB000
trusted library allocation
page read and write
1C09B847000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921D7000
heap
page read and write
1C09A73B000
trusted library allocation
page read and write
1C099D15000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C09ACDA000
trusted library allocation
page read and write
1C09A76C000
trusted library allocation
page read and write
1C09C8F9000
trusted library allocation
page read and write
1C0A3997000
trusted library allocation
page read and write
1C09AA2A000
trusted library allocation
page read and write
1C0A46C4000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C094C98000
trusted library allocation
page read and write
1C09227A000
heap
page read and write
1C0A5430000
trusted library allocation
page read and write
1C0A46FE000
trusted library allocation
page read and write
C7AFFE000
stack
page read and write
1C09BAC6000
trusted library allocation
page read and write
1C0A11EA000
trusted library allocation
page read and write
1C0A129E000
trusted library allocation
page read and write
1C09AED4000
trusted library allocation
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921FC000
heap
page read and write
158E000
heap
page read and write
1C0A51AA000
trusted library allocation
page read and write
1C09AAF8000
trusted library allocation
page read and write
1C0965BE000
trusted library allocation
page read and write
1C099C30000
trusted library allocation
page read and write
24F41179000
heap
page read and write
1C09AE10000
trusted library allocation
page read and write
1C0A4C8F000
trusted library allocation
page read and write
1C0965C1000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C099D8F000
trusted library allocation
page read and write
1C0A2CE5000
trusted library allocation
page read and write
1C09BAF8000
trusted library allocation
page read and write
1C096544000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C09BCF9000
trusted library allocation
page read and write
1C096846000
trusted library allocation
page read and write
1C0A157A000
trusted library allocation
page read and write
1C09BE5A000
trusted library allocation
page read and write
24F410F1000
heap
page read and write
18A87190000
heap
page read and write
1C09AE93000
trusted library allocation
page read and write
1C0A1B6B000
trusted library allocation
page read and write
CF0000
heap
page read and write
24F41060000
heap
page read and write
1C0921CE000
heap
page read and write
1C09A4B5000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C09A977000
trusted library allocation
page read and write
1C0A6243000
trusted library allocation
page read and write
1C0965F0000
trusted library allocation
page read and write
1C092240000
heap
page read and write
1C09AEDB000
trusted library allocation
page read and write
1C0992BE000
trusted library allocation
page read and write
1C09648A000
trusted library allocation
page read and write
24F41158000
heap
page read and write
1C09220A000
heap
page read and write
24F40A41000
heap
page read and write
1C0921F2000
heap
page read and write
24F410E6000
heap
page read and write
1C0A46BE000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C09A99D000
trusted library allocation
page read and write
1C09AC9C000
trusted library allocation
page read and write
24F404F3000
trusted library allocation
page read and write
1C09BEC2000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C0995ED000
trusted library allocation
page read and write
1C099CE0000
trusted library allocation
page read and write
1C0921D1000
heap
page read and write
24F41177000
heap
page read and write
1C09B9DF000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C09A4CE000
trusted library allocation
page read and write
1C09222B000
heap
page read and write
1C0964FE000
trusted library allocation
page read and write
1C09ACDA000
trusted library allocation
page read and write
1C09B847000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0A2D0C000
trusted library allocation
page read and write
24B7955F000
trusted library allocation
page read and write
1C09CAFD000
trusted library allocation
page read and write
1C09AEBB000
trusted library allocation
page read and write
1C0A4683000
trusted library allocation
page read and write
1C09A37C000
trusted library allocation
page read and write
1C09C877000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C09A683000
trusted library allocation
page read and write
1C0995C3000
trusted library allocation
page read and write
1C09B842000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0921DB000
heap
page read and write
18A87663000
trusted library allocation
page read and write
1C0965F6000
trusted library allocation
page read and write
24F41122000
heap
page read and write
1C09927B000
trusted library allocation
page read and write
1C09A639000
trusted library allocation
page read and write
24F4108A000
heap
page read and write
24F40A30000
heap
page read and write
1C09A9E7000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C09CBB8000
trusted library allocation
page read and write
1C0A132F000
trusted library allocation
page read and write
24B79511000
trusted library allocation
page read and write
1C0A1282000
trusted library allocation
page read and write
1C0A46F5000
trusted library allocation
page read and write
1C099D8F000
trusted library allocation
page read and write
1C09AAF5000
trusted library allocation
page read and write
1C0A2C96000
trusted library allocation
page read and write
1C09A784000
trusted library allocation
page read and write
1C0A16D1000
trusted library allocation
page read and write
1C096581000
trusted library allocation
page read and write
1C0A46C5000
trusted library allocation
page read and write
1C0A5781000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0921D4000
heap
page read and write
1C0A54FE000
trusted library allocation
page read and write
1C0A1700000
trusted library allocation
page read and write
1C09B98E000
trusted library allocation
page read and write
1C0A16FE000
trusted library allocation
page read and write
1C0921E6000
heap
page read and write
1C094CBF000
trusted library allocation
page read and write
1C0A5C4D000
heap
page read and write
1C09A562000
trusted library allocation
page read and write
1C09BDDE000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C092235000
heap
page read and write
1C0921F0000
heap
page read and write
1C09BBDD000
trusted library allocation
page read and write
553B5D8000
stack
page read and write
1C09A456000
trusted library allocation
page read and write
1C0A5462000
trusted library allocation
page read and write
1C0A5776000
trusted library allocation
page read and write
3A94000
heap
page read and write
1C09AEB4000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A328000
trusted library allocation
page read and write
1C09C8EF000
trusted library allocation
page read and write
1C099CF5000
trusted library allocation
page read and write
1C09ABA3000
trusted library allocation
page read and write
24F410F2000
heap
page read and write
1C09AE8C000
trusted library allocation
page read and write
1C09ACD0000
trusted library allocation
page read and write
1C099DA6000
trusted library allocation
page read and write
1C09923D000
trusted library allocation
page read and write
1C0A1531000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C0921F1000
heap
page read and write
1C092238000
heap
page read and write
1C09AB83000
trusted library allocation
page read and write
1C0A13AD000
trusted library allocation
page read and write
1C09A0E6000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C0921D6000
heap
page read and write
1C099DD8000
trusted library allocation
page read and write
1C092227000
heap
page read and write
1C09A3C8000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A7F7000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09ACD4000
trusted library allocation
page read and write
1C0968F4000
trusted library allocation
page read and write
1C09653E000
trusted library allocation
page read and write
1C09A6D7000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0962F1000
trusted library allocation
page read and write
1C09653E000
trusted library allocation
page read and write
1C0A14D7000
trusted library allocation
page read and write
1C0A5078000
trusted library allocation
page read and write
1C09BC8C000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09905E000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C09B4E5000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09BBC7000
trusted library allocation
page read and write
1C099CE8000
trusted library allocation
page read and write
1C09AE09000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C0A13E0000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0A1442000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0921FC000
heap
page read and write
1C09224B000
heap
page read and write
1C0A2C9C000
trusted library allocation
page read and write
1C0A5164000
trusted library allocation
page read and write
1C0A4617000
trusted library allocation
page read and write
1C09956B000
trusted library allocation
page read and write
1C09ACDA000
trusted library allocation
page read and write
1C0A1240000
trusted library allocation
page read and write
1C0A140D000
trusted library allocation
page read and write
24F4113B000
heap
page read and write
1C09BEF2000
trusted library allocation
page read and write
1C09AD81000
trusted library allocation
page read and write
1C09A6D4000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0921FE000
heap
page read and write
1C09AE43000
trusted library allocation
page read and write
1C0A2CF1000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09C853000
trusted library allocation
page read and write
1C0A54EA000
trusted library allocation
page read and write
1C09ABCA000
trusted library allocation
page read and write
1C09928C000
trusted library allocation
page read and write
1C09AB43000
trusted library allocation
page read and write
1C09223E000
heap
page read and write
1C09919E000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921CE000
heap
page read and write
1C09B4D3000
trusted library allocation
page read and write
1C09A999000
trusted library allocation
page read and write
1C0A15CD000
trusted library allocation
page read and write
1C0965DD000
trusted library allocation
page read and write
1C0992C4000
trusted library allocation
page read and write
1C09CE27000
trusted library allocation
page read and write
1C09CDC8000
trusted library allocation
page read and write
1C096544000
trusted library allocation
page read and write
1C09A6E7000
trusted library allocation
page read and write
1C09C82C000
trusted library allocation
page read and write
1C09644B000
trusted library allocation
page read and write
1C099D65000
trusted library allocation
page read and write
1C0A51C3000
trusted library allocation
page read and write
1C0A15D0000
trusted library allocation
page read and write
1C0A3831000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C098D34000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0A126E000
trusted library allocation
page read and write
1C099D6D000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C09AAA8000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0921D4000
heap
page read and write
1C09A74B000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09AD54000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A3836000
trusted library allocation
page read and write
1C099D71000
trusted library allocation
page read and write
1C0A5188000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C099D77000
trusted library allocation
page read and write
1C0A5067000
trusted library allocation
page read and write
1C0A4F75000
trusted library allocation
page read and write
1C0A1585000
trusted library allocation
page read and write
1C0A5492000
trusted library allocation
page read and write
1C09A0C2000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09D000000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
18A86FD0000
heap
page read and write
38388DE1000
trusted library allocation
page execute read
1C09BB1D000
trusted library allocation
page read and write
1C0921DB000
heap
page read and write
1C0921F0000
heap
page read and write
1C096853000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09C8F7000
trusted library allocation
page read and write
1C0A517C000
trusted library allocation
page read and write
1C0A57A5000
trusted library allocation
page read and write
1C09A3AF000
trusted library allocation
page read and write
1C0A1223000
trusted library allocation
page read and write
18A87273000
heap
page read and write
1C09222E000
heap
page read and write
1C09BBBF000
trusted library allocation
page read and write
1C0A54F8000
trusted library allocation
page read and write
1C0921B4000
heap
page read and write
1C09C896000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C098F00000
trusted library allocation
page read and write
1FD84F10000
heap
page read and write
1C09950F000
trusted library allocation
page read and write
1C0A5C35000
heap
page read and write
1C09BBBB000
trusted library allocation
page read and write
C67FCBC000
stack
page read and write
1C092204000
heap
page read and write
1C09A34C000
trusted library allocation
page read and write
553AB8E000
unkown
page readonly
1C0968F4000
trusted library allocation
page read and write
1D4E000
stack
page read and write
1C09AEDB000
trusted library allocation
page read and write
1C09913C000
trusted library allocation
page read and write
1C096505000
trusted library allocation
page read and write
1C09AEB9000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A1B9C000
trusted library allocation
page read and write
1C096622000
trusted library allocation
page read and write
1C0A4780000
trusted library allocation
page read and write
1C09A9EB000
trusted library allocation
page read and write
18A8766E000
trusted library allocation
page read and write
1C099CE6000
trusted library allocation
page read and write
1C09CB49000
trusted library allocation
page read and write
1C09653E000
trusted library allocation
page read and write
FF2000
unkown
page readonly
1C09AEDB000
trusted library allocation
page read and write
24F40F17000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C096517000
trusted library allocation
page read and write
1C09A753000
trusted library allocation
page read and write
46FFC7E000
unkown
page readonly
1C09AAB3000
trusted library allocation
page read and write
1572000
heap
page read and write
1C09A773000
trusted library allocation
page read and write
1C0A12E7000
trusted library allocation
page read and write
1C09B9DF000
trusted library allocation
page read and write
1C099D58000
trusted library allocation
page read and write
1FD84F19000
heap
page read and write
1C0992AD000
trusted library allocation
page read and write
1C09952E000
trusted library allocation
page read and write
1C09A922000
trusted library allocation
page read and write
1C0A4CFA000
trusted library allocation
page read and write
1C0A4635000
trusted library allocation
page read and write
1C099527000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A9EF000
trusted library allocation
page read and write
24F41177000
heap
page read and write
1C09A6FE000
trusted library allocation
page read and write
1C09AE68000
trusted library allocation
page read and write
1C09A395000
trusted library allocation
page read and write
1C09A551000
trusted library allocation
page read and write
46FFD7E000
unkown
page readonly
1C092241000
heap
page read and write
1C09B9BA000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C09A364000
trusted library allocation
page read and write
1C09AA7E000
trusted library allocation
page read and write
1C09AE68000
trusted library allocation
page read and write
1C09AAF8000
trusted library allocation
page read and write
1C092228000
heap
page read and write
24F40991000
unkown
page execute read
1C09A6F0000
trusted library allocation
page read and write
1C09CE86000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A13FC000
trusted library allocation
page read and write
1C09BC28000
trusted library allocation
page read and write
1C0A4FE4000
trusted library allocation
page read and write
1C09C8C1000
trusted library allocation
page read and write
1C099D1E000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A5078000
trusted library allocation
page read and write
1C0A4CFA000
trusted library allocation
page read and write
1C09A6CE000
trusted library allocation
page read and write
1C099D36000
trusted library allocation
page read and write
1C0A5413000
trusted library allocation
page read and write
1C0A13E5000
trusted library allocation
page read and write
1C099D77000
trusted library allocation
page read and write
1C09AB61000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C09A3DA000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A2CA3000
trusted library allocation
page read and write
18A8718F000
unclassified section
page read and write
1C0921D9000
heap
page read and write
1C0A5787000
trusted library allocation
page read and write
1C09A7F3000
trusted library allocation
page read and write
1C0992D6000
trusted library allocation
page read and write
1C09BEF6000
trusted library allocation
page read and write
1C0A465E000
trusted library allocation
page read and write
24F40F08000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C0921F2000
heap
page read and write
1C09AABB000
trusted library allocation
page read and write
24F410EC000
heap
page read and write
1C0992CE000
trusted library allocation
page read and write
1C0A5C54000
heap
page read and write
1C0965F6000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C099CEF000
trusted library allocation
page read and write
24F410AA000
heap
page read and write
1C0A51B7000
trusted library allocation
page read and write
1C092231000
heap
page read and write
1C09A839000
trusted library allocation
page read and write
1C0921CD000
heap
page read and write
1C0A1286000
trusted library allocation
page read and write
1C09A424000
trusted library allocation
page read and write
1C0A1685000
trusted library allocation
page read and write
1C0A46C1000
trusted library allocation
page read and write
18A870C0000
heap
page read and write
1ABC2B8B000
heap
page read and write
1C09A0B5000
trusted library allocation
page read and write
1C09A685000
trusted library allocation
page read and write
1C0A13CA000
trusted library allocation
page read and write
1C0A1297000
trusted library allocation
page read and write
1C0921CD000
heap
page read and write
1C0921D6000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A4674000
trusted library allocation
page read and write
1C09AC83000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C0A626D000
trusted library allocation
page read and write
1C09A6B0000
trusted library allocation
page read and write
1C09AE48000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09227A000
heap
page read and write
1C09A3C8000
trusted library allocation
page read and write
1C0A164B000
trusted library allocation
page read and write
1ABC0FBD000
heap
page read and write
1C099D8F000
trusted library allocation
page read and write
1C09A71E000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A7F9000
trusted library allocation
page read and write
1C09C851000
trusted library allocation
page read and write
1C0965EB000
trusted library allocation
page read and write
1C09A07A000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A488000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C09688E000
trusted library allocation
page read and write
1C0A5164000
trusted library allocation
page read and write
1C095223000
trusted library allocation
page read and write
24F4105C000
heap
page read and write
1C0A3985000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A14AC000
trusted library allocation
page read and write
1C099182000
trusted library allocation
page read and write
1C09222F000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921FC000
heap
page read and write
1C0A3838000
trusted library allocation
page read and write
1C09CEAE000
trusted library allocation
page read and write
1C098DDC000
trusted library allocation
page read and write
1C09223E000
heap
page read and write
1C09ABA3000
trusted library allocation
page read and write
1C09CA06000
trusted library allocation
page read and write
1C0A1582000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921CE000
heap
page read and write
1C0921E9000
heap
page read and write
1C09220A000
heap
page read and write
1C09A0D5000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C09BE6B000
trusted library allocation
page read and write
1C09C8BA000
trusted library allocation
page read and write
1C0A4639000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921D6000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A51B7000
trusted library allocation
page read and write
1C09A7B5000
trusted library allocation
page read and write
24B790D0000
unclassified section
page readonly
1C09A85D000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
158E000
heap
page read and write
1C0921CE000
heap
page read and write
1C09918A000
trusted library allocation
page read and write
1C0964D9000
trusted library allocation
page read and write
1C0A12B9000
trusted library allocation
page read and write
1C09CB3A000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09AAF5000
trusted library allocation
page read and write
24F40410000
trusted library allocation
page read and write
1C0A5487000
trusted library allocation
page read and write
1C09BEED000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
1C092232000
heap
page read and write
1C09A5B3000
trusted library allocation
page read and write
18A87600000
trusted library allocation
page read and write
1C09A9FA000
trusted library allocation
page read and write
24B79600000
heap
page read and write
1C0921D4000
heap
page read and write
18A86F30000
unclassified section
page readonly
18A87180000
unclassified section
page read and write
1C0A5CAB000
heap
page read and write
1C0921E2000
heap
page read and write
1C09C8F9000
trusted library allocation
page read and write
1C09B9C3000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09222F000
heap
page read and write
1C0A1B87000
trusted library allocation
page read and write
1C0A12B9000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C0921D0000
heap
page read and write
1C098D60000
trusted library allocation
page read and write
1C0A11CE000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921D4000
heap
page read and write
1C0A2CF1000
trusted library allocation
page read and write
1C099CF5000
trusted library allocation
page read and write
1C099DE1000
trusted library allocation
page read and write
1C0965AA000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C0A1675000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C099CEF000
trusted library allocation
page read and write
1C0A5018000
trusted library allocation
page read and write
1C09BC95000
trusted library allocation
page read and write
1C0952FB000
trusted library allocation
page read and write
1C09A7DA000
trusted library allocation
page read and write
1C0A54E4000
trusted library allocation
page read and write
1C0A51B7000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09BC04000
trusted library allocation
page read and write
24F40477000
trusted library allocation
page read and write
1C09684F000
trusted library allocation
page read and write
1C0965C1000
trusted library allocation
page read and write
1C09AA23000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C09A977000
trusted library allocation
page read and write
1C09C8F7000
trusted library allocation
page read and write
1C0A2CA2000
trusted library allocation
page read and write
1C0921D3000
heap
page read and write
1C0A501B000
trusted library allocation
page read and write
24B79700000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C099576000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0A578D000
trusted library allocation
page read and write
1C0992D4000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09AE50000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0965A6000
trusted library allocation
page read and write
1C0A12F8000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921F2000
heap
page read and write
1C099DA6000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0A578F000
trusted library allocation
page read and write
1C09ACA0000
trusted library allocation
page read and write
1C09A922000
trusted library allocation
page read and write
1C0921EB000
heap
page read and write
1C09222E000
heap
page read and write
1C0921D7000
heap
page read and write
1C09AE9C000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0921E2000
heap
page read and write
1C0921DD000
heap
page read and write
24F41158000
heap
page read and write
1C0921D8000
heap
page read and write
1C0921F2000
heap
page read and write
18A87400000
trusted library allocation
page read and write
1C09B895000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A12EA000
trusted library allocation
page read and write
1C0A62AC000
trusted library allocation
page read and write
1C09A6D4000
trusted library allocation
page read and write
46FFC3C000
stack
page read and write
1C09AACC000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C09537D000
trusted library allocation
page read and write
1C0A4CA3000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A968000
trusted library allocation
page read and write
1C0A2E57000
trusted library allocation
page read and write
1C092241000
heap
page read and write
24F4108D000
heap
page read and write
1C0A1163000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A9EE000
trusted library allocation
page read and write
1C0A1272000
trusted library allocation
page read and write
1578000
heap
page read and write
1C09AE36000
trusted library allocation
page read and write
1C09A6B2000
trusted library allocation
page read and write
24F410E8000
heap
page read and write
1C09A9C7000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C0A2DB3000
trusted library allocation
page read and write
24F40419000
trusted library allocation
page read and write
1C09AEB4000
trusted library allocation
page read and write
1C0A5160000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
24F409B1000
unkown
page execute read
1C0A46F3000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
38388D31000
trusted library allocation
page execute read
1C0921F2000
heap
page read and write
1C0A13EE000
trusted library allocation
page read and write
1C09BE65000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C09A9E9000
trusted library allocation
page read and write
1C0A5492000
trusted library allocation
page read and write
24F4107D000
heap
page read and write
1C09651A000
trusted library allocation
page read and write
1C09A3A7000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C09A9E9000
trusted library allocation
page read and write
1C0A5789000
trusted library allocation
page read and write
1550000
heap
page read and write
1C0921F9000
heap
page read and write
1C09A7F9000
trusted library allocation
page read and write
1C0A578F000
trusted library allocation
page read and write
1C09A9E7000
trusted library allocation
page read and write
1C09AE19000
trusted library allocation
page read and write
1C09AAAE000
trusted library allocation
page read and write
1C0990C9000
trusted library allocation
page read and write
1ABC0FA0000
heap
page read and write
1C0A6357000
trusted library allocation
page read and write
24F410EC000
heap
page read and write
1C099D65000
trusted library allocation
page read and write
1C09A05B000
trusted library allocation
page read and write
1C09A9C7000
trusted library allocation
page read and write
1C0964B8000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0A46EB000
trusted library allocation
page read and write
1C09A6F9000
trusted library allocation
page read and write
1C096520000
trusted library allocation
page read and write
1C0A5C0B000
heap
page read and write
1C09A71B000
trusted library allocation
page read and write
1C0A2C98000
trusted library allocation
page read and write
1C09A43B000
trusted library allocation
page read and write
1C099554000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0992BE000
trusted library allocation
page read and write
1C09C8CD000
trusted library allocation
page read and write
1C09A780000
trusted library allocation
page read and write
1C0992BE000
trusted library allocation
page read and write
1FD84F50000
heap
page read and write
1C099DA8000
trusted library allocation
page read and write
1C09AEB7000
trusted library allocation
page read and write
D3E000
stack
page read and write
1C0921E2000
heap
page read and write
1C0995D5000
trusted library allocation
page read and write
1C0A46F3000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921D1000
heap
page read and write
1580000
heap
page read and write
1C09A750000
trusted library allocation
page read and write
1C09A7DA000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C09AE4A000
trusted library allocation
page read and write
1C09A9A1000
trusted library allocation
page read and write
1C09CE19000
heap
page read and write
18A87A40000
heap
page read and write
1C0A50BF000
trusted library allocation
page read and write
18A87300000
trusted library allocation
page read and write
24B795F4000
trusted library allocation
page read and write
1C09A7DA000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921C6000
heap
page read and write
1C0A54ED000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
1C0A2DA3000
trusted library allocation
page read and write
1C09AA1D000
trusted library allocation
page read and write
1C09A958000
trusted library allocation
page read and write
1C09658F000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C095375000
trusted library allocation
page read and write
1C09AE9E000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
1C098D28000
trusted library allocation
page read and write
1C09906D000
trusted library allocation
page read and write
1C0A2CA0000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09C8F7000
trusted library allocation
page read and write
1C09BC52000
trusted library allocation
page read and write
1C09A97E000
trusted library allocation
page read and write
1C09AE4D000
trusted library allocation
page read and write
1C0A1628000
trusted library allocation
page read and write
46807FE000
unkown
page readonly
1C09AE16000
trusted library allocation
page read and write
1C09AE0B000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A733000
trusted library allocation
page read and write
1C0964FE000
trusted library allocation
page read and write
1C0968A9000
trusted library allocation
page read and write
1C09CED7000
trusted library allocation
page read and write
1C0965DC000
trusted library allocation
page read and write
1C09B9BA000
trusted library allocation
page read and write
24B79500000
trusted library allocation
page read and write
1C09BC1F000
trusted library allocation
page read and write
24B79154000
remote allocation
page execute read
1C0A4C60000
trusted library allocation
page read and write
1C0A463D000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C094C9E000
trusted library allocation
page read and write
1C0A1548000
trusted library allocation
page read and write
1C09A402000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0964B6000
trusted library allocation
page read and write
1C0A46C4000
trusted library allocation
page read and write
1C09A44A000
trusted library allocation
page read and write
24F41177000
heap
page read and write
1C0921CF000
heap
page read and write
1C0A3833000
trusted library allocation
page read and write
1C09A341000
trusted library allocation
page read and write
1C09C837000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C099D10000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C09CAEF000
trusted library allocation
page read and write
1C094CCD000
trusted library allocation
page read and write
1C09BC9E000
trusted library allocation
page read and write
1C09A6F9000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C099282000
trusted library allocation
page read and write
1C0A2C98000
trusted library allocation
page read and write
1C0965C7000
trusted library allocation
page read and write
1C0992A0000
trusted library allocation
page read and write
1C0A13CA000
trusted library allocation
page read and write
1C099C4B000
trusted library allocation
page read and write
1C09AE78000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C0A5950000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09ADE5000
trusted library allocation
page read and write
24F41144000
heap
page read and write
1C0921EE000
heap
page read and write
1C0992FC000
trusted library allocation
page read and write
1C099156000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C096A9A000
heap
page read and write
1C0A154F000
trusted library allocation
page read and write
1C0A2DA7000
trusted library allocation
page read and write
1C099C47000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0A4612000
trusted library allocation
page read and write
1C09A72C000
trusted library allocation
page read and write
1C0A1593000
trusted library allocation
page read and write
1C09923B000
trusted library allocation
page read and write
1C09AA2A000
trusted library allocation
page read and write
24F4116A000
heap
page read and write
24F400D0000
heap
page read and write
1C099DAD000
trusted library allocation
page read and write
1C0921F5000
heap
page read and write
FCC000
unkown
page readonly
1C09A841000
trusted library allocation
page read and write
D84000
heap
page read and write
1C0991CE000
trusted library allocation
page read and write
1C09A6D7000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921FC000
heap
page read and write
1C09AE4D000
trusted library allocation
page read and write
24B79370000
heap
page read and write
13DF000
stack
page read and write
1C0921F7000
heap
page read and write
1C09ADE8000
trusted library allocation
page read and write
1C0A15CB000
trusted library allocation
page read and write
1C0A54C3000
trusted library allocation
page read and write
1C0A51D8000
trusted library allocation
page read and write
1C0A1288000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1581000
heap
page read and write
1C0A5085000
trusted library allocation
page read and write
1C0A13CA000
trusted library allocation
page read and write
1C09A658000
trusted library allocation
page read and write
1C09AE1F000
trusted library allocation
page read and write
1C0A1BF6000
trusted library allocation
page read and write
1C09A649000
trusted library allocation
page read and write
1C09A364000
trusted library allocation
page read and write
3DE1000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A1406000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09A7F7000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C0A1637000
trusted library allocation
page read and write
1C0952F6000
trusted library allocation
page read and write
1C09A9F2000
trusted library allocation
page read and write
1C092235000
heap
page read and write
1C099CC3000
trusted library allocation
page read and write
1C096844000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A88A000
trusted library allocation
page read and write
1C096886000
trusted library allocation
page read and write
1C092227000
heap
page read and write
1C09AE2A000
trusted library allocation
page read and write
1C09BC47000
trusted library allocation
page read and write
1C09A7EE000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
24F41144000
heap
page read and write
1C099104000
trusted library allocation
page read and write
1C099DCF000
trusted library allocation
page read and write
26B05FF000
stack
page read and write
14A0000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A1BC5000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C099CF5000
trusted library allocation
page read and write
1C09B5B9000
trusted library allocation
page read and write
1C09B878000
trusted library allocation
page read and write
1C0A6333000
trusted library allocation
page read and write
1C099DB8000
trusted library allocation
page read and write
1C09A361000
trusted library allocation
page read and write
1C0A13C2000
trusted library allocation
page read and write
1C0A16BF000
trusted library allocation
page read and write
553AA4E000
stack
page read and write
1ABC0F30000
heap
page read and write
1C09CE06000
trusted library allocation
page read and write
1C0A1271000
trusted library allocation
page read and write
1C09AEB3000
trusted library allocation
page read and write
1C09ABCF000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C0921FE000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921F2000
heap
page read and write
1C09BC88000
trusted library allocation
page read and write
1C09ABDB000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09AE43000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C0921E1000
heap
page read and write
1C0921FC000
heap
page read and write
1C0A16D1000
trusted library allocation
page read and write
1C0A132A000
trusted library allocation
page read and write
24F402E0000
trusted library allocation
page read and write
1C09B3EB000
trusted library allocation
page read and write
18A8767A000
trusted library allocation
page read and write
1C09BCAB000
trusted library allocation
page read and write
1C09A747000
trusted library allocation
page read and write
D84000
heap
page read and write
1C0A54EA000
trusted library allocation
page read and write
C6027FE000
stack
page read and write
24F4112A000
heap
page read and write
1C0921F2000
heap
page read and write
24F40300000
trusted library allocation
page read and write
1C0A15D2000
trusted library allocation
page read and write
24B795B6000
trusted library allocation
page read and write
1C09BEE0000
trusted library allocation
page read and write
1C09ABCA000
trusted library allocation
page read and write
1C0A13AF000
trusted library allocation
page read and write
1C0A13DB000
trusted library allocation
page read and write
1C09D22F000
trusted library allocation
page read and write
1C09B559000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
24F41060000
heap
page read and write
1C0A2E0A000
trusted library allocation
page read and write
1C0A11BA000
trusted library allocation
page read and write
1C0962C5000
trusted library allocation
page read and write
1C099DB0000
trusted library allocation
page read and write
1C09AE8F000
trusted library allocation
page read and write
1C0A4C99000
trusted library allocation
page read and write
1C09A380000
trusted library allocation
page read and write
1C09A6B9000
trusted library allocation
page read and write
1C09AA8D000
trusted library allocation
page read and write
1C0A467C000
trusted library allocation
page read and write
24F4099C000
unkown
page execute read
1C0921F2000
heap
page read and write
1C0921EB000
heap
page read and write
1C0992AD000
trusted library allocation
page read and write
24F410EC000
heap
page read and write
1C099DFB000
trusted library allocation
page read and write
1C09AABB000
trusted library allocation
page read and write
1C0A51C0000
trusted library allocation
page read and write
18A86FB0000
unclassified section
page readonly
C601FFE000
unkown
page readonly
1C09AE54000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
24F410E0000
heap
page read and write
1C099C47000
trusted library allocation
page read and write
1C0921D8000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A39AA000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0A2E2E000
trusted library allocation
page read and write
1C09A084000
trusted library allocation
page read and write
24B795B1000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C09AAC5000
trusted library allocation
page read and write
F31000
unkown
page execute read
1C09AA2A000
trusted library allocation
page read and write
1C09688A000
trusted library allocation
page read and write
1C09A395000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A5C9B000
heap
page read and write
1C0A4FE4000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09A5B0000
trusted library allocation
page read and write
1C0A1BBA000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
18A8767D000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0A5CA8000
heap
page read and write
1ABC13D0000
heap
page read and write
1C09924D000
trusted library allocation
page read and write
1C09A0F3000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
24F405F0000
heap
page read and write
18A8762E000
trusted library allocation
page read and write
1C099090000
trusted library allocation
page read and write
1C0A4640000
trusted library allocation
page read and write
1C09A32D000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
1C0A4FA5000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C09AE9E000
trusted library allocation
page read and write
158E000
heap
page read and write
1C0921FC000
heap
page read and write
1C0A507D000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0A46C1000
trusted library allocation
page read and write
1C0A12E4000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A46E000
trusted library allocation
page read and write
1C09A6B4000
trusted library allocation
page read and write
1C0A14D7000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0A4CA3000
trusted library allocation
page read and write
1C0A1598000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
24F41159000
heap
page read and write
1C094C81000
trusted library allocation
page read and write
1C092240000
heap
page read and write
1C09A870000
trusted library allocation
page read and write
1C09AA7E000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0921F1000
heap
page read and write
1C0965BE000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921ED000
heap
page read and write
24B79576000
trusted library allocation
page read and write
1C0965F6000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C096862000
trusted library allocation
page read and write
1C09A4EC000
trusted library allocation
page read and write
1C0965F8000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C09CB80000
trusted library allocation
page read and write
157D000
heap
page read and write
1C0A14D9000
trusted library allocation
page read and write
1C09B4E4000
trusted library allocation
page read and write
1C09A392000
trusted library allocation
page read and write
1C09A7F5000
trusted library allocation
page read and write
1C09C875000
trusted library allocation
page read and write
1C099279000
trusted library allocation
page read and write
1C09B55D000
trusted library allocation
page read and write
1C09223E000
heap
page read and write
24B795C4000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A517C000
trusted library allocation
page read and write
1C099CF5000
trusted library allocation
page read and write
1C09AB63000
trusted library allocation
page read and write
1C092241000
heap
page read and write
24F41177000
heap
page read and write
1C09AEAF000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
D84000
heap
page read and write
1C09A98F000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A39C6000
trusted library allocation
page read and write
1C0921D8000
heap
page read and write
1C0921CE000
heap
page read and write
1C09A3F8000
trusted library allocation
page read and write
1C09A39C000
trusted library allocation
page read and write
1C09AEDB000
trusted library allocation
page read and write
1C0A15D0000
trusted library allocation
page read and write
1C09AA23000
trusted library allocation
page read and write
1C09BC84000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A72C000
trusted library allocation
page read and write
1C099DA3000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C09AE9E000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C0A39F4000
trusted library allocation
page read and write
1ABC2B80000
heap
page read and write
1C0A1512000
trusted library allocation
page read and write
553AACD000
stack
page read and write
1C09AE4D000
trusted library allocation
page read and write
1C0A4C89000
trusted library allocation
page read and write
24F41121000
heap
page read and write
1C0921D4000
heap
page read and write
1C099D36000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921CE000
heap
page read and write
1C09A74E000
trusted library allocation
page read and write
1C0A1386000
trusted library allocation
page read and write
1C0A14E6000
trusted library allocation
page read and write
1C09A883000
trusted library allocation
page read and write
1C0A12A6000
trusted library allocation
page read and write
1C0A4F90000
trusted library allocation
page read and write
1C09A982000
trusted library allocation
page read and write
1C09A69D000
trusted library allocation
page read and write
C7B7FE000
stack
page read and write
1C0921D4000
heap
page read and write
1C0A11E1000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C09A3F4000
trusted library allocation
page read and write
1C09AE95000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C0921D4000
heap
page read and write
553D5FE000
stack
page read and write
1C0921F2000
heap
page read and write
1C0964FE000
trusted library allocation
page read and write
1C0A5C99000
heap
page read and write
1C09B5FC000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09A98F000
trusted library allocation
page read and write
1C099182000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A117F000
trusted library allocation
page read and write
1C09A9FD000
trusted library allocation
page read and write
1C09A69D000
trusted library allocation
page read and write
1C09B857000
trusted library allocation
page read and write
1C0A62E4000
trusted library allocation
page read and write
1C09ABB3000
trusted library allocation
page read and write
1C09ACBC000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C092260000
heap
page read and write
D84000
heap
page read and write
1C0992C1000
trusted library allocation
page read and write
1C0A5785000
trusted library allocation
page read and write
FFC000
unkown
page write copy
1C0965BC000
trusted library allocation
page read and write
1C0A39FD000
trusted library allocation
page read and write
1C099C30000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A463C000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A1396000
trusted library allocation
page read and write
1C09C847000
trusted library allocation
page read and write
1C09B4DF000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0921D1000
heap
page read and write
1C09AE3F000
trusted library allocation
page read and write
1C09A357000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921CF000
heap
page read and write
1C0A1589000
trusted library allocation
page read and write
1C0A62A3000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C099DAD000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09C8D2000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09AE39000
trusted library allocation
page read and write
1C099D49000
trusted library allocation
page read and write
1C0A544C000
trusted library allocation
page read and write
1C09BE88000
trusted library allocation
page read and write
1C099D92000
trusted library allocation
page read and write
1C0A11FE000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A13CA000
trusted library allocation
page read and write
1C09C8B7000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
1C0A5C9B000
heap
page read and write
24B79222000
unclassified section
page read and write
1C09AE25000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A13C2000
trusted library allocation
page read and write
24F41158000
heap
page read and write
1C0921D8000
heap
page read and write
1C0921F5000
heap
page read and write
1C0921F9000
heap
page read and write
1C0992FC000
trusted library allocation
page read and write
1C0A61E5000
trusted library allocation
page read and write
1C099DCF000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C09CE23000
trusted library allocation
page read and write
24B79246000
heap
page read and write
1C092211000
heap
page read and write
1C09A7B5000
trusted library allocation
page read and write
26ADDFF000
stack
page read and write
1C098DDF000
trusted library allocation
page read and write
1C0A16F5000
trusted library allocation
page read and write
1C09A713000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C096581000
trusted library allocation
page read and write
1C099264000
trusted library allocation
page read and write
1C09A6AD000
trusted library allocation
page read and write
1C09A1EF000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09684F000
trusted library allocation
page read and write
1C099279000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921E7000
heap
page read and write
1C09A6A7000
trusted library allocation
page read and write
1C09B56D000
trusted library allocation
page read and write
158E000
heap
page read and write
24F410E8000
heap
page read and write
1C0A5C3E000
heap
page read and write
24F40400000
trusted library allocation
page read and write
1C09CDDF000
trusted library allocation
page read and write
1C0A50DA000
trusted library allocation
page read and write
1C09A86A000
trusted library allocation
page read and write
24B79800000
trusted library allocation
page read and write
1C0992FC000
trusted library allocation
page read and write
1C0A4CCE000
trusted library allocation
page read and write
1C0A4640000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09A375000
trusted library allocation
page read and write
1C09ABEA000
trusted library allocation
page read and write
46817FE000
unkown
page readonly
1C09659D000
trusted library allocation
page read and write
1572000
heap
page read and write
1C09658C000
trusted library allocation
page read and write
1C092234000
heap
page read and write
1C099247000
trusted library allocation
page read and write
1C0A1B93000
trusted library allocation
page read and write
1C099C43000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09BEB6000
trusted library allocation
page read and write
1C09A9B7000
trusted library allocation
page read and write
24F41144000
heap
page read and write
1C0921E2000
heap
page read and write
1C09BEA2000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C0921CE000
heap
page read and write
1C09B9E3000
trusted library allocation
page read and write
1C09A783000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
553E5FE000
stack
page read and write
1C092241000
heap
page read and write
1C0A5C9A000
heap
page read and write
1C099D49000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09BBEC000
trusted library allocation
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0A2C11000
trusted library allocation
page read and write
1ABC0F40000
heap
page read and write
1C0962DF000
trusted library allocation
page read and write
1C0992B9000
trusted library allocation
page read and write
1C09A8C6000
trusted library allocation
page read and write
1C0A1286000
trusted library allocation
page read and write
1C0A1336000
trusted library allocation
page read and write
1C092280000
heap
page read and write
1C099DE0000
trusted library allocation
page read and write
1C09A5AB000
trusted library allocation
page read and write
1C09C873000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921E2000
heap
page read and write
24B79330000
heap
page read and write
1C0A166D000
trusted library allocation
page read and write
1C0A46FE000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C099260000
trusted library allocation
page read and write
1C0921E5000
heap
page read and write
1C09BBBD000
trusted library allocation
page read and write
1C0A1577000
trusted library allocation
page read and write
1C0A157D000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A5058000
trusted library allocation
page read and write
1C09A6E4000
trusted library allocation
page read and write
1C09A8B4000
trusted library allocation
page read and write
1C096242000
trusted library allocation
page read and write
1C09918A000
trusted library allocation
page read and write
1C0A1B80000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C099DC3000
trusted library allocation
page read and write
1C09A9EF000
trusted library allocation
page read and write
1C09A333000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C09A72C000
trusted library allocation
page read and write
18A87698000
trusted library allocation
page read and write
1C09B89F000
trusted library allocation
page read and write
7603241E000
trusted library allocation
page read and write
1C09ABCA000
trusted library allocation
page read and write
1C09BC3B000
trusted library allocation
page read and write
1C092239000
heap
page read and write
1C09A422000
trusted library allocation
page read and write
1C09A30A000
trusted library allocation
page read and write
24F40466000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A5413000
trusted library allocation
page read and write
1C0A127A000
trusted library allocation
page read and write
1C09A747000
trusted library allocation
page read and write
1C09A911000
trusted library allocation
page read and write
1C09B58D000
trusted library allocation
page read and write
C8A000
stack
page read and write
1C09A7F9000
trusted library allocation
page read and write
1C09AE43000
trusted library allocation
page read and write
18A8765D000
trusted library allocation
page read and write
1C0A5773000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0921D6000
heap
page read and write
1C092228000
heap
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C0A12C3000
trusted library allocation
page read and write
1C09A760000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
1C0A1332000
trusted library allocation
page read and write
1C098D33000
trusted library allocation
page read and write
1C09955F000
trusted library allocation
page read and write
1C0A15C3000
trusted library allocation
page read and write
1C0A14E6000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921FA000
heap
page read and write
1C09B99C000
trusted library allocation
page read and write
1C0A59AC000
trusted library allocation
page read and write
1C09223D000
heap
page read and write
24F4113B000
heap
page read and write
F30000
unkown
page readonly
1C0921D4000
heap
page read and write
1C0A130D000
trusted library allocation
page read and write
1C099268000
trusted library allocation
page read and write
1C09B842000
trusted library allocation
page read and write
1C0953EE000
trusted library allocation
page read and write
1C0A14E6000
trusted library allocation
page read and write
1C0A14F4000
trusted library allocation
page read and write
46FFBFE000
stack
page read and write
1C09C8EF000
trusted library allocation
page read and write
18A87410000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C09A6A0000
trusted library allocation
page read and write
1C09A973000
trusted library allocation
page read and write
1C0A11F0000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C092211000
heap
page read and write
1C0A38FC000
trusted library allocation
page read and write
1C0A4640000
trusted library allocation
page read and write
1C0A4619000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C092227000
heap
page read and write
1C09A8D0000
trusted library allocation
page read and write
1C0A54D9000
trusted library allocation
page read and write
1C09A0C4000
trusted library allocation
page read and write
553AB0E000
unkown
page readonly
1C0A4643000
trusted library allocation
page read and write
1C0A2E06000
trusted library allocation
page read and write
1C09ACDA000
trusted library allocation
page read and write
18A876BA000
trusted library allocation
page read and write
1C09A950000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
1C09C843000
trusted library allocation
page read and write
1C096544000
trusted library allocation
page read and write
1C0965F6000
trusted library allocation
page read and write
1C0A4C8F000
trusted library allocation
page read and write
1C0A578B000
trusted library allocation
page read and write
24F40040000
unclassified section
page readonly
1C0921E9000
heap
page read and write
1C09A780000
trusted library allocation
page read and write
1C0A164B000
trusted library allocation
page read and write
1C0A2C64000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C09BB51000
trusted library allocation
page read and write
1C09A73B000
trusted library allocation
page read and write
1C0A16FE000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F3000
heap
page read and write
18A8765B000
trusted library allocation
page read and write
1C0921F9000
heap
page read and write
1C099084000
trusted library allocation
page read and write
1C099CEC000
trusted library allocation
page read and write
1C09A6D2000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C0A4646000
trusted library allocation
page read and write
1ABC1100000
trusted library allocation
page read and write
1C099CE0000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09AC9E000
trusted library allocation
page read and write
1C0921D8000
heap
page read and write
553AB4E000
stack
page read and write
1C09953D000
trusted library allocation
page read and write
1C094CEF000
trusted library allocation
page read and write
1C099CE6000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09B972000
trusted library allocation
page read and write
1C0921B7000
heap
page read and write
1C0921D6000
heap
page read and write
24F40486000
trusted library allocation
page read and write
1C09A63B000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C092237000
heap
page read and write
1C099057000
trusted library allocation
page read and write
1C09A9F2000
trusted library allocation
page read and write
1C09A46A000
trusted library allocation
page read and write
1C0965DD000
trusted library allocation
page read and write
1C09A836000
trusted library allocation
page read and write
1C09A83B000
trusted library allocation
page read and write
1C0A13B4000
trusted library allocation
page read and write
1C09AD89000
trusted library allocation
page read and write
1C09AE39000
trusted library allocation
page read and write
1C0A13DB000
trusted library allocation
page read and write
1C098DAF000
trusted library allocation
page read and write
1C09A5A6000
trusted library allocation
page read and write
1C0A1327000
trusted library allocation
page read and write
1C0921C5000
heap
page read and write
1C09916A000
trusted library allocation
page read and write
1C09A3F8000
trusted library allocation
page read and write
1C09A361000
trusted library allocation
page read and write
1C0A5067000
trusted library allocation
page read and write
1C0A2D86000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C0A578B000
trusted library allocation
page read and write
24B79253000
heap
page read and write
1C09A978000
trusted library allocation
page read and write
24F410FD000
heap
page read and write
1C0921E1000
heap
page read and write
1C09C875000
trusted library allocation
page read and write
1C0A57D8000
trusted library allocation
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0A1276000
trusted library allocation
page read and write
1C09CDAA000
trusted library allocation
page read and write
24B79140000
remote allocation
page read and write
1C0921F2000
heap
page read and write
1C0921F0000
heap
page read and write
D84000
heap
page read and write
1C0A5C26000
heap
page read and write
1C09A35F000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0921E2000
heap
page read and write
1C095382000
trusted library allocation
page read and write
24F4046A000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C092205000
heap
page read and write
1C092228000
heap
page read and write
1C0A2C9E000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09954E000
trusted library allocation
page read and write
1C0A2D93000
trusted library allocation
page read and write
1C0A4659000
trusted library allocation
page read and write
1C099262000
trusted library allocation
page read and write
1C099CAB000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921E5000
heap
page read and write
46FEBD8000
stack
page read and write
1C0921D4000
heap
page read and write
1C0A2C9E000
trusted library allocation
page read and write
1C0A4FD8000
trusted library allocation
page read and write
1C09A34C000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921E7000
heap
page read and write
1C09A699000
trusted library allocation
page read and write
1C09A8B0000
trusted library allocation
page read and write
1C09A124000
trusted library allocation
page read and write
1C09A3AD000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C09A357000
trusted library allocation
page read and write
1C09A874000
trusted library allocation
page read and write
1C0A504E000
trusted library allocation
page read and write
1C09ACD6000
trusted library allocation
page read and write
1C09AA1F000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C0A117B000
trusted library allocation
page read and write
1C09B888000
trusted library allocation
page read and write
D84000
heap
page read and write
1C09AE8B000
trusted library allocation
page read and write
1C0A3983000
trusted library allocation
page read and write
1C09BB0F000
trusted library allocation
page read and write
1C0A11E6000
trusted library allocation
page read and write
1C0A1637000
trusted library allocation
page read and write
24F41158000
heap
page read and write
1C0921CE000
heap
page read and write
1C09A37C000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C092241000
heap
page read and write
1C0921CE000
heap
page read and write
1C0A544C000
trusted library allocation
page read and write
24F410A1000
heap
page read and write
1C0A4C8C000
trusted library allocation
page read and write
1C0968BA000
trusted library allocation
page read and write
1C09A3B3000
trusted library allocation
page read and write
1C09A3D7000
trusted library allocation
page read and write
1C09953A000
trusted library allocation
page read and write
1C092264000
heap
page read and write
24F40A55000
heap
page read and write
1C0921D1000
heap
page read and write
24B79160000
unclassified section
page readonly
1C092246000
heap
page read and write
1C09AAFB000
trusted library allocation
page read and write
24F410E3000
heap
page read and write
1C09A753000
trusted library allocation
page read and write
1C09B5B5000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0921D4000
heap
page read and write
1C0921D2000
heap
page read and write
1C0A5CA8000
heap
page read and write
1C09B59C000
trusted library allocation
page read and write
1C09C86B000
trusted library allocation
page read and write
1C09A99F000
trusted library allocation
page read and write
1C09652E000
trusted library allocation
page read and write
1C0A11E1000
trusted library allocation
page read and write
1C0A5776000
trusted library allocation
page read and write
1C09A3B3000
trusted library allocation
page read and write
1C09225C000
heap
page read and write
1C099053000
trusted library allocation
page read and write
24F4116A000
heap
page read and write
18A87570000
heap
page read and write
1C0921EA000
heap
page read and write
1C0A50BF000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0A14B7000
trusted library allocation
page read and write
1C096588000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C0A51C3000
trusted library allocation
page read and write
1C09AEB3000
trusted library allocation
page read and write
1C09AA19000
trusted library allocation
page read and write
157C000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921DF000
heap
page read and write
1C09ACBC000
trusted library allocation
page read and write
1C09A1A0000
trusted library allocation
page read and write
1C0A2CDB000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A502C000
trusted library allocation
page read and write
1C09BBC1000
trusted library allocation
page read and write
1C09A8BB000
trusted library allocation
page read and write
1C09A451000
trusted library allocation
page read and write
24F4112D000
heap
page read and write
1C0A16F4000
trusted library allocation
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C0921E4000
heap
page read and write
1C09AE50000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0A5458000
trusted library allocation
page read and write
1C0921D6000
heap
page read and write
1C099DC0000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09A5FE000
trusted library allocation
page read and write
1C0A16FE000
trusted library allocation
page read and write
1C09A73B000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C09222C000
heap
page read and write
1C0A11F6000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
18A87610000
trusted library allocation
page read and write
ED0000
heap
page read and write
24B79569000
trusted library allocation
page read and write
1C09A868000
trusted library allocation
page read and write
1C092238000
heap
page read and write
24F40412000
trusted library allocation
page read and write
1C099259000
trusted library allocation
page read and write
1C0A1654000
trusted library allocation
page read and write
1C09C8EF000
trusted library allocation
page read and write
1ABC1200000
trusted library allocation
page read and write
1C0A5CAD000
heap
page read and write
1C0992FC000
trusted library allocation
page read and write
1FD85107000
trusted library allocation
page read and write
1C09AEB3000
trusted library allocation
page read and write
1C0A13C2000
trusted library allocation
page read and write
1C09AAFB000
trusted library allocation
page read and write
1C09659D000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A5CA9000
heap
page read and write
1C09AD46000
trusted library allocation
page read and write
1C099552000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0992AD000
trusted library allocation
page read and write
1C098D1D000
trusted library allocation
page read and write
1C0A11D7000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0921D4000
heap
page read and write
1ABC1207000
trusted library allocation
page read and write
4680FFE000
stack
page read and write
1C0A38E5000
trusted library allocation
page read and write
1C09CBD3000
trusted library allocation
page read and write
1C09AE3A000
trusted library allocation
page read and write
1C0A15E1000
trusted library allocation
page read and write
D84000
heap
page read and write
1C0995C5000
trusted library allocation
page read and write
1C09AE19000
trusted library allocation
page read and write
1C09C861000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0921FC000
heap
page read and write
C67FC7E000
unkown
page readonly
1C0A148D000
trusted library allocation
page read and write
1C0A1419000
trusted library allocation
page read and write
1C0A39BC000
trusted library allocation
page read and write
1C0A2CA4000
trusted library allocation
page read and write
1C09CDE9000
trusted library allocation
page read and write
D7E000
stack
page read and write
1C0A2C9A000
trusted library allocation
page read and write
1C096863000
trusted library allocation
page read and write
1C09B9E3000
trusted library allocation
page read and write
1C09A3A3000
trusted library allocation
page read and write
1C0A2C64000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C0921F2000
heap
page read and write
24F4042F000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A9B7000
trusted library allocation
page read and write
1C09A3AA000
trusted library allocation
page read and write
1C09A99B000
trusted library allocation
page read and write
1C09A995000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09B878000
trusted library allocation
page read and write
1C0A61C8000
trusted library allocation
page read and write
1C0A516D000
trusted library allocation
page read and write
1C0A5CAF000
heap
page read and write
1C09A667000
trusted library allocation
page read and write
24F40F00000
trusted library allocation
page read and write
1C0A5444000
trusted library allocation
page read and write
1C099D3A000
trusted library allocation
page read and write
1C0A4672000
trusted library allocation
page read and write
1C0A2D05000
trusted library allocation
page read and write
1C092230000
heap
page read and write
1C09A37C000
trusted library allocation
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09A687000
trusted library allocation
page read and write
1ABC13D5000
heap
page read and write
1C099D6F000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C099DC3000
trusted library allocation
page read and write
1C09CEAC000
trusted library allocation
page read and write
1C0A11EA000
trusted library allocation
page read and write
1C099DC3000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A4CE1000
trusted library allocation
page read and write
1C0A2CA0000
trusted library allocation
page read and write
1C09C86D000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09AEAF000
trusted library allocation
page read and write
1C09AE48000
trusted library allocation
page read and write
1C096481000
trusted library allocation
page read and write
1C09BEBD000
trusted library allocation
page read and write
1C09ABB0000
trusted library allocation
page read and write
F10000
heap
page read and write
24F4108A000
heap
page read and write
1C09A10D000
trusted library allocation
page read and write
1C0A11FC000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C092233000
heap
page read and write
1C0921F5000
heap
page read and write
1C0A39C6000
trusted library allocation
page read and write
1C0A11E6000
trusted library allocation
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0A51BA000
trusted library allocation
page read and write
1C0953B1000
trusted library allocation
page read and write
1C099C5F000
trusted library allocation
page read and write
1C0A1B3D000
trusted library allocation
page read and write
1C0964FE000
trusted library allocation
page read and write
FFC000
unkown
page read and write
1C09684D000
trusted library allocation
page read and write
24F40B70000
heap
page read and write
1C09A9A1000
trusted library allocation
page read and write
1C09BCEF000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C0921E2000
heap
page read and write
1578000
heap
page read and write
1C09ACA2000
trusted library allocation
page read and write
1C096256000
trusted library allocation
page read and write
1C0A4670000
trusted library allocation
page read and write
1C09A8D0000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
1C099DD5000
trusted library allocation
page read and write
1C09AEE3000
trusted library allocation
page read and write
1C0953A2000
trusted library allocation
page read and write
1C0A1312000
trusted library allocation
page read and write
1C092278000
heap
page read and write
1C0921F1000
heap
page read and write
1C09A9E3000
trusted library allocation
page read and write
1C0965DC000
trusted library allocation
page read and write
1C09A741000
trusted library allocation
page read and write
1C09AE63000
trusted library allocation
page read and write
1C09A9EE000
trusted library allocation
page read and write
1C09BEA9000
trusted library allocation
page read and write
1C09B4DF000
trusted library allocation
page read and write
1C09BEE5000
trusted library allocation
page read and write
1C0992A5000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C0921D4000
heap
page read and write
1C0992CC000
trusted library allocation
page read and write
1C0A16C1000
trusted library allocation
page read and write
1004000
unkown
page readonly
1C092280000
heap
page read and write
1C09A7EE000
trusted library allocation
page read and write
1C09CB82000
trusted library allocation
page read and write
1C09AEC1000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A2C75000
trusted library allocation
page read and write
1C099D8C000
trusted library allocation
page read and write
1C09B97A000
trusted library allocation
page read and write
1C0A1595000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C096853000
trusted library allocation
page read and write
1C0A13DE000
trusted library allocation
page read and write
1C09AE56000
trusted library allocation
page read and write
1C098DC6000
trusted library allocation
page read and write
1C0A4CCA000
trusted library allocation
page read and write
1ABC2B8C000
heap
page read and write
1C0A4FD8000
trusted library allocation
page read and write
1C0A4FE4000
trusted library allocation
page read and write
1C09ABDB000
trusted library allocation
page read and write
1C0A4653000
trusted library allocation
page read and write
1C0A46EB000
trusted library allocation
page read and write
1C099D2F000
trusted library allocation
page read and write
1C098D61000
trusted library allocation
page read and write
1C095326000
trusted library allocation
page read and write
C6017FE000
stack
page read and write
24F410E6000
heap
page read and write
1C09A793000
trusted library allocation
page read and write
1C0A6186000
trusted library allocation
page read and write
1C0992B7000
trusted library allocation
page read and write
1C09AEC7000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
24F41009000
heap
page read and write
1C092227000
heap
page read and write
1C0965EB000
trusted library allocation
page read and write
1C0A39D2000
trusted library allocation
page read and write
1C0A14BB000
trusted library allocation
page read and write
1C0A1288000
trusted library allocation
page read and write
1C09CBC0000
trusted library allocation
page read and write
1C09B585000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C099078000
trusted library allocation
page read and write
1C09CD34000
trusted library allocation
page read and write
1C0A54C7000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0921CE000
heap
page read and write
1C09BC84000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09A3B3000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C09A687000
trusted library allocation
page read and write
1C09B5A7000
trusted library allocation
page read and write
1C098DDF000
trusted library allocation
page read and write
1C09A6D2000
trusted library allocation
page read and write
1C0A15CB000
trusted library allocation
page read and write
1C09AEAC000
trusted library allocation
page read and write
1C09AE68000
trusted library allocation
page read and write
24F410E9000
heap
page read and write
1C09B857000
trusted library allocation
page read and write
1C098D60000
trusted library allocation
page read and write
157C000
heap
page read and write
1C0921F2000
heap
page read and write
1C0A16FC000
trusted library allocation
page read and write
1C0A1B72000
trusted library allocation
page read and write
1C0921ED000
heap
page read and write
1C09BCB6000
trusted library allocation
page read and write
1C099DA6000
trusted library allocation
page read and write
1C0921FA000
heap
page read and write
1C09A3A0000
trusted library allocation
page read and write
1C0A5C9B000
heap
page read and write
1C0921EC000
heap
page read and write
1C09ACDA000
trusted library allocation
page read and write
1C0A50DA000
trusted library allocation
page read and write
1C0921E8000
heap
page read and write
1C0921B4000
heap
page read and write
1C096A94000
heap
page read and write
1C096542000
trusted library allocation
page read and write
1C0995FD000
trusted library allocation
page read and write
1C09B847000
trusted library allocation
page read and write
1C09A314000
trusted library allocation
page read and write
1C0A13C0000
trusted library allocation
page read and write
1C0A5CA5000
heap
page read and write
1C0A632C000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C099DF9000
trusted library allocation
page read and write
1C0A4CD6000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C0921EC000
heap
page read and write
1C0992CD000
trusted library allocation
page read and write
1C092259000
heap
page read and write
1C09C8AE000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
24F410E8000
heap
page read and write
1C09A3C8000
trusted library allocation
page read and write
1C099DA4000
trusted library allocation
page read and write
24F41158000
heap
page read and write
1C099275000
trusted library allocation
page read and write
1C0A11DB000
trusted library allocation
page read and write
1C09AE78000
trusted library allocation
page read and write
1C09AE95000
trusted library allocation
page read and write
C602FFE000
unkown
page readonly
1C09C877000
trusted library allocation
page read and write
1C0A1677000
trusted library allocation
page read and write
1C0965A5000
trusted library allocation
page read and write
1C09B83C000
trusted library allocation
page read and write
1C0953E4000
trusted library allocation
page read and write
1C0921C6000
heap
page read and write
24B79250000
heap
page read and write
1C0A46E0000
trusted library allocation
page read and write
1C09911F000
trusted library allocation
page read and write
1C09A41E000
trusted library allocation
page read and write
24F404C7000
trusted library allocation
page read and write
1C0A5067000
trusted library allocation
page read and write
1C0A6301000
trusted library allocation
page read and write
24F41177000
heap
page read and write
1C09A663000
trusted library allocation
page read and write
1C0A6286000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09BBC1000
trusted library allocation
page read and write
1C0921DB000
heap
page read and write
1C0964D7000
trusted library allocation
page read and write
1C0A5193000
trusted library allocation
page read and write
1C0A540B000
trusted library allocation
page read and write
1C092225000
heap
page read and write
1C0921DE000
heap
page read and write
1C09A9FA000
trusted library allocation
page read and write
1C09B48E000
trusted library allocation
page read and write
1C09CB84000
trusted library allocation
page read and write
1C0A11FC000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
24F40403000
trusted library allocation
page read and write
1C09A35B000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09223C000
heap
page read and write
1C0A15CD000
trusted library allocation
page read and write
1C0A13B8000
trusted library allocation
page read and write
3DE1000
heap
page read and write
1C0A5092000
trusted library allocation
page read and write
1C0A15C3000
trusted library allocation
page read and write
1C09BE93000
trusted library allocation
page read and write
1C0A51D8000
trusted library allocation
page read and write
1C09A9A1000
trusted library allocation
page read and write
1C0A4CAF000
trusted library allocation
page read and write
1C09222E000
heap
page read and write
1C09222E000
heap
page read and write
1C09BBEC000
trusted library allocation
page read and write
1C09222F000
heap
page read and write
1C0A1286000
trusted library allocation
page read and write
1C0965A8000
trusted library allocation
page read and write
1C09A594000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C099CE0000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09A753000
trusted library allocation
page read and write
1C0A11DB000
trusted library allocation
page read and write
1C09AA1F000
trusted library allocation
page read and write
1C0921F7000
heap
page read and write
1C09A7F7000
trusted library allocation
page read and write
1C096AA2000
heap
page read and write
1C09A999000
trusted library allocation
page read and write
1C0A1531000
trusted library allocation
page read and write
1C094C90000
trusted library allocation
page read and write
1C0A4643000
trusted library allocation
page read and write
1C09BCEB000
trusted library allocation
page read and write
1C09C8F9000
trusted library allocation
page read and write
1C09A71B000
trusted library allocation
page read and write
1C0991A5000
trusted library allocation
page read and write
1C0964DA000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0990CF000
trusted library allocation
page read and write
1C09A331000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921D7000
heap
page read and write
1C09AA33000
trusted library allocation
page read and write
1C0A1216000
trusted library allocation
page read and write
1C0921B4000
heap
page read and write
1C09D2CE000
trusted library allocation
page read and write
1C09B5B3000
trusted library allocation
page read and write
1C09ACAB000
trusted library allocation
page read and write
1C0A16BF000
trusted library allocation
page read and write
1C0A51BC000
trusted library allocation
page read and write
1C092238000
heap
page read and write
1C0A1282000
trusted library allocation
page read and write
1FD8510A000
trusted library allocation
page read and write
1C099282000
trusted library allocation
page read and write
1C09A6B2000
trusted library allocation
page read and write
1C0A5764000
trusted library allocation
page read and write
1C09A796000
trusted library allocation
page read and write
1C0A46E3000
trusted library allocation
page read and write
1C09A6AD000
trusted library allocation
page read and write
1C0A1B91000
trusted library allocation
page read and write
18A876CA000
trusted library allocation
page read and write
1C09623E000
trusted library allocation
page read and write
1C09223C000
heap
page read and write
1C0A2C75000
trusted library allocation
page read and write
1C099D1E000
trusted library allocation
page read and write
1C09AC97000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09A81E000
trusted library allocation
page read and write
553C5FE000
stack
page read and write
1C09AAFB000
trusted library allocation
page read and write
1C09AE48000
trusted library allocation
page read and write
1C09A9E9000
trusted library allocation
page read and write
1C0992D6000
trusted library allocation
page read and write
1C0A129B000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C09AA23000
trusted library allocation
page read and write
18A87270000
heap
page read and write
1C09A63E000
trusted library allocation
page read and write
1C099DFE000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0921E8000
heap
page read and write
1C09ADAD000
trusted library allocation
page read and write
1C09A5AB000
trusted library allocation
page read and write
1C09AAFB000
trusted library allocation
page read and write
1C09907E000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09629C000
trusted library allocation
page read and write
1C0A39D4000
trusted library allocation
page read and write
1C0A5C9F000
heap
page read and write
1C09A742000
trusted library allocation
page read and write
1C0A13CA000
trusted library allocation
page read and write
1C09A7A0000
trusted library allocation
page read and write
24F404C2000
trusted library allocation
page read and write
24F410F1000
heap
page read and write
1C09A6A7000
trusted library allocation
page read and write
1C09ABB3000
trusted library allocation
page read and write
1C09AE4A000
trusted library allocation
page read and write
1C09A62A000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C099DAD000
trusted library allocation
page read and write
1C0965F0000
trusted library allocation
page read and write
24F4112A000
heap
page read and write
1C09BEFB000
trusted library allocation
page read and write
1C09AAB5000
trusted library allocation
page read and write
1C09A7D4000
trusted library allocation
page read and write
1C0965BC000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C0992AE000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A1527000
trusted library allocation
page read and write
1C09BC3E000
trusted library allocation
page read and write
1C09A35B000
trusted library allocation
page read and write
1C0A2C87000
trusted library allocation
page read and write
1C09927B000
trusted library allocation
page read and write
1C099071000
trusted library allocation
page read and write
1C096A94000
heap
page read and write
1C0921E2000
heap
page read and write
1C09905E000
trusted library allocation
page read and write
46FFE3E000
stack
page read and write
1C0A1B80000
trusted library allocation
page read and write
1C09AE3B000
trusted library allocation
page read and write
1C09AECD000
trusted library allocation
page read and write
1C0A4F78000
trusted library allocation
page read and write
1C0A4FCD000
trusted library allocation
page read and write
1C09BDA6000
trusted library allocation
page read and write
1C099557000
trusted library allocation
page read and write
1C09AE19000
trusted library allocation
page read and write
1C0A1329000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A5193000
trusted library allocation
page read and write
1C099275000
trusted library allocation
page read and write
1C0A14DF000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C0A5426000
trusted library allocation
page read and write
1C0A507E000
trusted library allocation
page read and write
1C09B858000
trusted library allocation
page read and write
553DDFE000
unkown
page readonly
1C0A5092000
trusted library allocation
page read and write
1C099094000
trusted library allocation
page read and write
1C09A975000
trusted library allocation
page read and write
1C0921DE000
heap
page read and write
1C099DB4000
trusted library allocation
page read and write
1C09CBE5000
trusted library allocation
page read and write
1C0921D9000
heap
page read and write
1C0921E7000
heap
page read and write
1C09C8CD000
trusted library allocation
page read and write
1C099538000
trusted library allocation
page read and write
1C0A2E17000
trusted library allocation
page read and write
1C09AEBD000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C09220A000
heap
page read and write
1C0A6248000
trusted library allocation
page read and write
1C092205000
heap
page read and write
1C0A51C3000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
24B79530000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09A98B000
trusted library allocation
page read and write
1C09906A000
trusted library allocation
page read and write
1C0921D7000
heap
page read and write
1C0A13DF000
trusted library allocation
page read and write
1C09A36B000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C099D58000
trusted library allocation
page read and write
1C099CAB000
trusted library allocation
page read and write
1C0A12F3000
trusted library allocation
page read and write
1C0A4FA5000
trusted library allocation
page read and write
1C099C3B000
trusted library allocation
page read and write
1C09AE3D000
trusted library allocation
page read and write
1C09AAFB000
trusted library allocation
page read and write
1C0A144C000
trusted library allocation
page read and write
1C0A12EA000
trusted library allocation
page read and write
1C092258000
heap
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C092204000
heap
page read and write
1C09A960000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09AEC3000
trusted library allocation
page read and write
1C0A15BB000
trusted library allocation
page read and write
1C09B600000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C0A2C98000
trusted library allocation
page read and write
1C099DB0000
trusted library allocation
page read and write
1C0A516D000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0992A9000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09AEA4000
trusted library allocation
page read and write
24F41177000
heap
page read and write
1C098D08000
trusted library allocation
page read and write
1C0A11CE000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09A8FE000
trusted library allocation
page read and write
1C09A753000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0921F0000
heap
page read and write
1C09A630000
trusted library allocation
page read and write
1C09AE97000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C09A4BB000
trusted library allocation
page read and write
24F410E0000
heap
page read and write
1C09AD48000
trusted library allocation
page read and write
1C09BBC3000
trusted library allocation
page read and write
1C09A995000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
24B79572000
trusted library allocation
page read and write
1C09A67E000
trusted library allocation
page read and write
1C094CC5000
trusted library allocation
page read and write
1C0965DD000
trusted library allocation
page read and write
1C0964B5000
trusted library allocation
page read and write
1C0A46CB000
trusted library allocation
page read and write
1C09A64A000
trusted library allocation
page read and write
1C09C853000
trusted library allocation
page read and write
1C09A8C1000
trusted library allocation
page read and write
1C0A5C9A000
heap
page read and write
1C0A2C0F000
trusted library allocation
page read and write
1C09222F000
heap
page read and write
1C099CE6000
trusted library allocation
page read and write
24F41177000
heap
page read and write
1C092228000
heap
page read and write
1C09BAEF000
trusted library allocation
page read and write
1C0A16B3000
trusted library allocation
page read and write
18A8740C000
trusted library allocation
page read and write
1C0921E9000
heap
page read and write
1C09A6C4000
trusted library allocation
page read and write
1C099D92000
trusted library allocation
page read and write
1C0A1332000
trusted library allocation
page read and write
1C0921D0000
heap
page read and write
1C0921DB000
heap
page read and write
1C0921CF000
heap
page read and write
1C0A5755000
trusted library allocation
page read and write
1C0921F0000
heap
page read and write
553CDFE000
unkown
page readonly
1C0A4674000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C09A1A6000
trusted library allocation
page read and write
1C099063000
trusted library allocation
page read and write
1C0A2D41000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0A50A9000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C0A1390000
trusted library allocation
page read and write
1C099586000
trusted library allocation
page read and write
1C0A11F6000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
1C09227A000
heap
page read and write
1C092228000
heap
page read and write
24F4116A000
heap
page read and write
1C092258000
heap
page read and write
1C0921E2000
heap
page read and write
13EF000
stack
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0A11E6000
trusted library allocation
page read and write
1C0A4F85000
trusted library allocation
page read and write
1C09918B000
trusted library allocation
page read and write
1C099289000
trusted library allocation
page read and write
1C0A5444000
trusted library allocation
page read and write
157E000
heap
page read and write
1C098D33000
trusted library allocation
page read and write
1C0A5CA8000
heap
page read and write
1C0921CE000
heap
page read and write
1C09A7A6000
trusted library allocation
page read and write
1C09A679000
trusted library allocation
page read and write
1C09AA9D000
trusted library allocation
page read and write
1C09919E000
trusted library allocation
page read and write
1C09BD9B000
trusted library allocation
page read and write
1C0A51E4000
trusted library allocation
page read and write
1C09CE81000
trusted library allocation
page read and write
D80000
heap
page read and write
1C09A6D4000
trusted library allocation
page read and write
1C0991CE000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C0921F2000
heap
page read and write
1C098DDF000
trusted library allocation
page read and write
1C099C3B000
trusted library allocation
page read and write
1C0A5757000
trusted library allocation
page read and write
1C096533000
trusted library allocation
page read and write
1C0962E3000
trusted library allocation
page read and write
1C09B958000
trusted library allocation
page read and write
1C09B495000
trusted library allocation
page read and write
1C09AEA4000
trusted library allocation
page read and write
1C0A1593000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
24B79582000
trusted library allocation
page read and write
1C0A57BA000
trusted library allocation
page read and write
1C092233000
heap
page read and write
1C09A311000
trusted library allocation
page read and write
1C096898000
trusted library allocation
page read and write
1C09BCAB000
trusted library allocation
page read and write
1C094CEF000
trusted library allocation
page read and write
1C0992BB000
trusted library allocation
page read and write
1C09A978000
trusted library allocation
page read and write
1C09AE48000
trusted library allocation
page read and write
1C09A72C000
trusted library allocation
page read and write
1C09A5F2000
trusted library allocation
page read and write
1C0A51C0000
trusted library allocation
page read and write
1C0A11EA000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C0A14A5000
trusted library allocation
page read and write
1C0A15CD000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C099D86000
trusted library allocation
page read and write
24F4109C000
heap
page read and write
1C0A51E4000
trusted library allocation
page read and write
24B79608000
heap
page read and write
1C09A685000
trusted library allocation
page read and write
1C0A11FC000
trusted library allocation
page read and write
1C0A14F5000
trusted library allocation
page read and write
1C0A4683000
trusted library allocation
page read and write
1C0A54BA000
trusted library allocation
page read and write
1C09B557000
trusted library allocation
page read and write
1C09A064000
trusted library allocation
page read and write
1C09C8DA000
trusted library allocation
page read and write
1C099DA3000
trusted library allocation
page read and write
24F41100000
heap
page read and write
1C0A4CB7000
trusted library allocation
page read and write
1C0A11C0000
trusted library allocation
page read and write
1C0A5C01000
heap
page read and write
1C09A69B000
trusted library allocation
page read and write
1C09B32A000
trusted library allocation
page read and write
1C09C817000
trusted library allocation
page read and write
1C0921E7000
heap
page read and write
1C0A1B6B000
trusted library allocation
page read and write
24B79705000
trusted library allocation
page read and write
1C096581000
trusted library allocation
page read and write
24B79244000
heap
page read and write
1C09AE19000
trusted library allocation
page read and write
141E000
stack
page read and write
1C09AAC5000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
1C09A653000
trusted library allocation
page read and write
1C0A4677000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
D84000
heap
page read and write
1C0A50A0000
trusted library allocation
page read and write
1C0A4633000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C09CD36000
trusted library allocation
page read and write
1C09A9E3000
trusted library allocation
page read and write
1C09AEDB000
trusted library allocation
page read and write
1C09A4FA000
trusted library allocation
page read and write
1578000
heap
page read and write
1C09A6D4000
trusted library allocation
page read and write
1C09AAF8000
trusted library allocation
page read and write
1C09A7F9000
trusted library allocation
page read and write
1C09AA7E000
trusted library allocation
page read and write
1C096635000
trusted library allocation
page read and write
1C09A73B000
trusted library allocation
page read and write
1C09A818000
trusted library allocation
page read and write
24F41060000
heap
page read and write
1C09222B000
heap
page read and write
1C0A2C9A000
trusted library allocation
page read and write
1C0921CF000
heap
page read and write
1C09A6F9000
trusted library allocation
page read and write
1C0921D4000
heap
page read and write
1C0921D0000
heap
page read and write
24B7958F000
trusted library allocation
page read and write
1C0A4674000
trusted library allocation
page read and write
1C09223A000
heap
page read and write
1C0A5426000
trusted library allocation
page read and write
1C09A968000
trusted library allocation
page read and write
1C09A922000
trusted library allocation
page read and write
1C09220A000
heap
page read and write
1C09A11F000
trusted library allocation
page read and write
24F41158000
heap
page read and write
1C0A1376000
trusted library allocation
page read and write
1C096520000
trusted library allocation
page read and write
24B791C0000
heap
page read and write
1C0A11F0000
trusted library allocation
page read and write
1C0992BE000
trusted library allocation
page read and write
24F40270000
heap
page readonly
1C0921DC000
heap
page read and write
1C099177000
trusted library allocation
page read and write
1C09B34F000
trusted library allocation
page read and write
1C092237000
heap
page read and write
1C0A2DE4000
trusted library allocation
page read and write
1C0921FC000
heap
page read and write
1C0A2CEF000
trusted library allocation
page read and write
1C0A5D09000
heap
page read and write
24F410E8000
heap
page read and write
1C09A780000
trusted library allocation
page read and write
1C0965EB000
trusted library allocation
page read and write
1C09907C000
trusted library allocation
page read and write
1C09A9C9000
trusted library allocation
page read and write
1C0921EC000
heap
page read and write
1C096588000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09A5A6000
trusted library allocation
page read and write
1C0921F2000
heap
page read and write
C7A7FF000
stack
page read and write
1C09AA19000
trusted library allocation
page read and write
1C0921E3000
heap
page read and write
1C0921F2000
heap
page read and write
1C0921E7000
heap
page read and write
1C09AAC5000
trusted library allocation
page read and write
1C092228000
heap
page read and write
1C0921E7000
heap
page read and write
1C0921FE000
heap
page read and write
1C099155000
trusted library allocation
page read and write
1C096523000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09BBDD000
trusted library allocation
page read and write
1C09A7EE000
trusted library allocation
page read and write
1C09689D000
trusted library allocation
page read and write
1C09906A000
trusted library allocation
page read and write
1C09C8BD000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A2C9E000
trusted library allocation
page read and write
1C09AA79000
trusted library allocation
page read and write
1C0A6306000
trusted library allocation
page read and write
1C09A7F9000
trusted library allocation
page read and write
1C0A13AB000
trusted library allocation
page read and write
1C099538000
trusted library allocation
page read and write
1C0A2DC5000
trusted library allocation
page read and write
1C0A14F4000
trusted library allocation
page read and write
D84000
heap
page read and write
1C0A5491000
trusted library allocation
page read and write
1C099D52000
trusted library allocation
page read and write
1C09907C000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C09B8A4000
trusted library allocation
page read and write
1C0A15C1000
trusted library allocation
page read and write
1C099182000
trusted library allocation
page read and write
1C0A5416000
trusted library allocation
page read and write
1C092235000
heap
page read and write
1C099078000
trusted library allocation
page read and write
1C0921E1000
heap
page read and write
1C09A60F000
trusted library allocation
page read and write
1C098D26000
trusted library allocation
page read and write
1C09A78A000
trusted library allocation
page read and write
1C0A51C3000
trusted library allocation
page read and write
1C09A5EE000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09BC80000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C099D7C000
trusted library allocation
page read and write
1C09A459000
trusted library allocation
page read and write
1C0A15B0000
trusted library allocation
page read and write
1C095313000
trusted library allocation
page read and write
1C09B895000
trusted library allocation
page read and write
1C099DB0000
trusted library allocation
page read and write
1C0A51E4000
trusted library allocation
page read and write
1C0921E3000
heap
page read and write
1C0921E0000
heap
page read and write
1C09BAE6000
trusted library allocation
page read and write
1C09A4AC000
trusted library allocation
page read and write
1C09CB8C000
trusted library allocation
page read and write
1C099DDB000
trusted library allocation
page read and write
1C0A46D6000
trusted library allocation
page read and write
1C0A1187000
trusted library allocation
page read and write
24B79570000
trusted library allocation
page read and write
1C09ABDB000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C09BC95000
trusted library allocation
page read and write
1C0A11C0000
trusted library allocation
page read and write
1C0921CE000
heap
page read and write
1C09AEC5000
trusted library allocation
page read and write
1C0A1B2D000
trusted library allocation
page read and write
1C0A39FD000
trusted library allocation
page read and write
1C0A6205000
trusted library allocation
page read and write
1C096A9A000
heap
page read and write
1C09CBE5000
trusted library allocation
page read and write
1C099DA8000
trusted library allocation
page read and write
1C09A851000
trusted library allocation
page read and write
1C09A98C000
trusted library allocation
page read and write
1C09AE54000
trusted library allocation
page read and write
1C09AE32000
trusted library allocation
page read and write
1C096AD9000
heap
page read and write
1C0965AB000
trusted library allocation
page read and write
1C0992BB000
trusted library allocation
page read and write
1C0A5073000
trusted library allocation
page read and write
24F4045F000
trusted library allocation
page read and write
1C0921FE000
heap
page read and write
1C09A334000
trusted library allocation
page read and write
1C09A839000
trusted library allocation
page read and write
1C0921F1000
heap
page read and write
1C09ABA3000
trusted library allocation
page read and write
1C09B58A000
trusted library allocation
page read and write
1C09A6D4000
trusted library allocation
page read and write
24F40481000
trusted library allocation
page read and write
1C0921E2000
heap
page read and write
1C0A2C9A000
trusted library allocation
page read and write
1C092232000
heap
page read and write
1C0A1200000
trusted library allocation
page read and write
1C099C55000
trusted library allocation
page read and write
214F000
stack
page read and write
1C09CAEF000
trusted library allocation
page read and write
1C096552000
trusted library allocation
page read and write
1C0A1429000
trusted library allocation
page read and write
FF2000
unkown
page readonly
1C09C8CD000
trusted library allocation
page read and write
1C09CD41000
trusted library allocation
page read and write
1C0965C7000
trusted library allocation
page read and write
D84000
heap
page read and write
1C098DEF000
trusted library allocation
page read and write
1C09A771000
trusted library allocation
page read and write
1C0A16FC000
trusted library allocation
page read and write
1C0A16A4000
trusted library allocation
page read and write
1C0A515B000
trusted library allocation
page read and write
1C09ACD4000
trusted library allocation
page read and write
F31000
unkown
page execute read
1C09AEC5000
trusted library allocation
page read and write
1C0A4CB7000
trusted library allocation
page read and write
There are 4080 hidden memdumps, click here to show them.