IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8e1024c6-a904-4ad9-9906-d3c31a0dc2d3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8e1024c6-a904-4ad9-9906-d3c31a0dc2d3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N2YU3HEZYD5C986D5N5B.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TUHCJ7T574UJFMNWO596.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\3b4c2b4a-1b81-42ec-94c0-357cc9ee0926 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\3b4c2b4a-1b81-42ec-94c0-357cc9ee0926.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2232 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7aeda06e-1277-45a8-823c-dc715986717c} 1700 "\\.\pipe\gecko-crash-server-pipe.1700" 1dd6816e510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4512 -parentBuildID 20230927232528 -prefsHandle 3876 -prefMapHandle 3120 -prefsLen 26309 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fa0e31d-f123-4488-bb82-ef33fd8d5505} 1700 "\\.\pipe\gecko-crash-server-pipe.1700" 1dd7a133110 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4932 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5000 -prefMapHandle 4996 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {478ec684-3c8f-4465-8153-7285f54d1359} 1700 "\\.\pipe\gecko-crash-server-pipe.1700" 1dd83b44d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://youtube.comP
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://login.li
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://spocs.getpocket.com/CN=The
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.18.110
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
172.217.18.110
youtube.com
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
26387EEC000
heap
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD77DEE000
trusted library allocation
page read and write
1DD80196000
trusted library allocation
page read and write
1DD831A8000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
18CEB472000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD7379E000
trusted library allocation
page read and write
1DD74F9B000
trusted library allocation
page read and write
1DD7881D000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE76000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD83C9A000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD7A3BE000
trusted library allocation
page read and write
1DD78CF8000
trusted library allocation
page read and write
1F1633C0000
unclassified section
page readonly
1DD6EE42000
heap
page read and write
1DD80059000
trusted library allocation
page read and write
1DD7A15C000
trusted library allocation
page read and write
1DD7B6FC000
trusted library allocation
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD7FF71000
trusted library allocation
page read and write
26387E5C000
heap
page read and write
1DD7FFAC000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD7A082000
trusted library allocation
page read and write
1DD7C067000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD81866000
trusted library allocation
page read and write
1DD792E6000
trusted library allocation
page read and write
1DD73790000
trusted library allocation
page read and write
1DD78CC6000
trusted library allocation
page read and write
1DD7A951000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD791FA000
trusted library allocation
page read and write
1DD80FB4000
trusted library allocation
page read and write
1DD74D37000
trusted library allocation
page read and write
1DD80037000
trusted library allocation
page read and write
26387F77000
heap
page read and write
1DD801FD000
trusted library allocation
page read and write
1DD797B4000
trusted library allocation
page read and write
1DD80FF8000
trusted library allocation
page read and write
1F16349A000
heap
page read and write
1DD6EE3F000
heap
page read and write
1DD74F56000
trusted library allocation
page read and write
1DD7FDFD000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD7914F000
trusted library allocation
page read and write
1DD797D3000
trusted library allocation
page read and write
1DD6EE77000
heap
page read and write
26387096000
unkown
page execute read
1DD6EE41000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD7B37B000
trusted library allocation
page read and write
1DD7B5A1000
trusted library allocation
page read and write
1DD79155000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD797EE000
trusted library allocation
page read and write
1DD7916C000
trusted library allocation
page read and write
263872F4000
heap
page read and write
1DD7A73B000
trusted library allocation
page read and write
1DD77941000
heap
page read and write
1DD7B83E000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD77D86000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD824F6000
trusted library allocation
page read and write
1DD801BC000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1DD77D78000
trusted library allocation
page read and write
1DD79763000
trusted library allocation
page read and write
1DD77963000
heap
page read and write
1DD7917B000
trusted library allocation
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD7A9E5000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD7A9C1000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
732000
unkown
page readonly
1DD7A8B5000
trusted library allocation
page read and write
1DD79FDF000
trusted library allocation
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD7A934000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7FCC9000
trusted library allocation
page read and write
1DD7B6F9000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD7A7B2000
trusted library allocation
page read and write
1DD79B60000
trusted library allocation
page read and write
1DD7FE4E000
trusted library allocation
page read and write
1DD750F6000
trusted library allocation
page read and write
1DD791A5000
trusted library allocation
page read and write
1DD7884D000
trusted library allocation
page read and write
1DD80043000
trusted library allocation
page read and write
26387F44000
heap
page read and write
1DD792A6000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD78976000
trusted library allocation
page read and write
1DD750C7000
trusted library allocation
page read and write
1DD7801F000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD83BEC000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD774DC000
trusted library allocation
page read and write
1DD83DDD000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD7FED2000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD6EEAA000
heap
page read and write
1DD80FDB000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
1DD80F8D000
trusted library allocation
page read and write
1DD6EE35000
heap
page read and write
1DD800EE000
trusted library allocation
page read and write
1DD7A0F3000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1F1635AF000
unclassified section
page read and write
1DD801C2000
trusted library allocation
page read and write
1DD79FDF000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD78E1B000
trusted library allocation
page read and write
1DD8133C000
trusted library allocation
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD7A7AE000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1F16390C000
trusted library allocation
page read and write
1DD78992000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD80043000
trusted library allocation
page read and write
1DD6EEBB000
heap
page read and write
1DD792A0000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD801A2000
trusted library allocation
page read and write
1DD77B67000
trusted library allocation
page read and write
1DD750A1000
trusted library allocation
page read and write
1DD79608000
trusted library allocation
page read and write
1DD7882C000
trusted library allocation
page read and write
1DD823F1000
trusted library allocation
page read and write
1DD7803D000
trusted library allocation
page read and write
218D83F8000
heap
page read and write
1DD7919A000
trusted library allocation
page read and write
1DD79274000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD7FDC1000
trusted library allocation
page read and write
1DD83BF8000
trusted library allocation
page read and write
1DD6EE01000
heap
page read and write
1DD6EE53000
heap
page read and write
13BF000
stack
page read and write
1F163700000
trusted library allocation
page read and write
1DD78CC3000
trusted library allocation
page read and write
1DD808EB000
trusted library allocation
page read and write
1DD7B6B8000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD792DC000
trusted library allocation
page read and write
1DD7FFED000
trusted library allocation
page read and write
198656B0000
heap
page read and write
26386FD0000
trusted library allocation
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD77936000
heap
page read and write
1F16385D000
trusted library allocation
page read and write
1DD6EE2D000
heap
page read and write
1DD791BF000
trusted library allocation
page read and write
1DD78826000
trusted library allocation
page read and write
1DD7A3BA000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD74D4B000
trusted library allocation
page read and write
1DD78E3E000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD780AF000
trusted library allocation
page read and write
1DD83B9D000
trusted library allocation
page read and write
1DD78814000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD8132A000
trusted library allocation
page read and write
1DD80F6F000
trusted library allocation
page read and write
18CEB40C000
trusted library allocation
page read and write
1DD83C40000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD792DC000
trusted library allocation
page read and write
1DD789F8000
trusted library allocation
page read and write
1DD7FDA3000
trusted library allocation
page read and write
AAD1F8E000
stack
page read and write
1DD6EE42000
heap
page read and write
1DD6EE19000
heap
page read and write
1DD81889000
trusted library allocation
page read and write
18CEB481000
trusted library allocation
page read and write
1DD79730000
trusted library allocation
page read and write
1DD80FC3000
trusted library allocation
page read and write
1DD79AFC000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7B8D9000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
7FC1FFF000
stack
page read and write
1DD78BEE000
trusted library allocation
page read and write
1DD7914F000
trusted library allocation
page read and write
263873C4000
trusted library allocation
page read and write
1DD750A6000
trusted library allocation
page read and write
1DD7FFFE000
trusted library allocation
page read and write
3F10000
trusted library allocation
page read and write
1DD79678000
trusted library allocation
page read and write
26387E69000
heap
page read and write
1DD78CFA000
trusted library allocation
page read and write
1DD7A3AA000
trusted library allocation
page read and write
1DD7A3FB000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD80F42000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD7B580000
trusted library allocation
page read and write
1DD78CDB000
trusted library allocation
page read and write
1DD81319000
trusted library allocation
page read and write
1DD6EE47000
heap
page read and write
1DD6EE0E000
heap
page read and write
26387E60000
heap
page read and write
1DD7925B000
trusted library allocation
page read and write
1DD800BC000
trusted library allocation
page read and write
1DD801C0000
trusted library allocation
page read and write
1DD800AF000
trusted library allocation
page read and write
1DD78EF2000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD82B00000
trusted library allocation
page read and write
1DD7FDCE000
trusted library allocation
page read and write
1DD80F8B000
trusted library allocation
page read and write
1DD74F59000
trusted library allocation
page read and write
1F16387D000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD79123000
trusted library allocation
page read and write
1DD80FD1000
trusted library allocation
page read and write
1DD7B323000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD80F8D000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD80F3A000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
18CEB4F5000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE24000
heap
page read and write
1DD7A89C000
trusted library allocation
page read and write
1DD7898A000
trusted library allocation
page read and write
1DD80F17000
trusted library allocation
page read and write
1DD791C9000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE6C000
heap
page read and write
1DD7FD16000
trusted library allocation
page read and write
1DD7FE3A000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD80010000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD8136D000
trusted library allocation
page read and write
1DD813BB000
trusted library allocation
page read and write
1DD780D0000
trusted library allocation
page read and write
1DD6EE26000
heap
page read and write
198656C0000
heap
page read and write
1DD7917F000
trusted library allocation
page read and write
1DD74FD4000
trusted library allocation
page read and write
1DD800E3000
trusted library allocation
page read and write
1DD791BA000
trusted library allocation
page read and write
1DD791FD000
trusted library allocation
page read and write
1DD780D0000
trusted library allocation
page read and write
1DD813B9000
trusted library allocation
page read and write
1DD6EE7D000
heap
page read and write
1DD796EE000
trusted library allocation
page read and write
1DD80817000
trusted library allocation
page read and write
1DD79138000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD7FDAE000
trusted library allocation
page read and write
1DD74FB0000
trusted library allocation
page read and write
1DD79162000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD6EE27000
heap
page read and write
1DD77DDB000
trusted library allocation
page read and write
1DD7802E000
trusted library allocation
page read and write
1DD800C3000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE52000
heap
page read and write
1DD7FD77000
trusted library allocation
page read and write
1DD7FEC8000
trusted library allocation
page read and write
1647000
heap
page read and write
1DD797FA000
trusted library allocation
page read and write
26387D11000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD797D0000
trusted library allocation
page read and write
1DD83C23000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD791C9000
trusted library allocation
page read and write
1DD792C6000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD6EE92000
heap
page read and write
1DD80F44000
trusted library allocation
page read and write
1DD78E79000
trusted library allocation
page read and write
1DD80FEB000
trusted library allocation
page read and write
1DD8156C000
trusted library allocation
page read and write
1DD79274000
trusted library allocation
page read and write
1DD7A9DA000
trusted library allocation
page read and write
1DD79694000
trusted library allocation
page read and write
1DD80F6A000
trusted library allocation
page read and write
1DD7FD9F000
trusted library allocation
page read and write
1DD77948000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD79FAD000
trusted library allocation
page read and write
1DD7925B000
trusted library allocation
page read and write
1DD7929E000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD790F6000
trusted library allocation
page read and write
1DD80F4D000
trusted library allocation
page read and write
1DD7C09E000
heap
page read and write
1DD7919C000
trusted library allocation
page read and write
1DD7A977000
trusted library allocation
page read and write
1DD7B377000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD750DC000
trusted library allocation
page read and write
1DD73D71000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD77BCE000
trusted library allocation
page read and write
18CEB000000
unclassified section
page readonly
1DD7B326000
trusted library allocation
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD79128000
trusted library allocation
page read and write
1DD808E8000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
26387EF1000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD77936000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD83300000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD811AD000
trusted library allocation
page read and write
1DD83CA6000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
18CEB26F000
unclassified section
page read and write
1DD78928000
trusted library allocation
page read and write
1DD809D3000
trusted library allocation
page read and write
1DD78CE0000
trusted library allocation
page read and write
1DD78E95000
trusted library allocation
page read and write
1DD74F78000
trusted library allocation
page read and write
26387E69000
heap
page read and write
1DD8019C000
trusted library allocation
page read and write
1DD7A3D7000
trusted library allocation
page read and write
1DD78012000
trusted library allocation
page read and write
1DD7FE3F000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD80F57000
trusted library allocation
page read and write
1DD6EE0F000
heap
page read and write
1DD7A3F7000
trusted library allocation
page read and write
1DD818B4000
trusted library allocation
page read and write
1DD809C5000
trusted library allocation
page read and write
1DD7FDB4000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7CA02000
trusted library allocation
page read and write
DE0000
heap
page read and write
1DD791C8000
trusted library allocation
page read and write
1DD78093000
trusted library allocation
page read and write
1DD7C05F000
heap
page read and write
1DD791BF000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1DD6EE40000
heap
page read and write
1DD74F6D000
trusted library allocation
page read and write
1DD77D8B000
trusted library allocation
page read and write
1DD7A3F7000
trusted library allocation
page read and write
1DD80F6B000
trusted library allocation
page read and write
1DD7B383000
trusted library allocation
page read and write
1DD7FFFE000
trusted library allocation
page read and write
1DD80013000
trusted library allocation
page read and write
1DD80FF8000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD7FF48000
trusted library allocation
page read and write
1DD8081E000
trusted library allocation
page read and write
1DD800B7000
trusted library allocation
page read and write
1DD77936000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD79194000
trusted library allocation
page read and write
1DD83CA4000
trusted library allocation
page read and write
1DD79162000
trusted library allocation
page read and write
3F10000
trusted library allocation
page read and write
1DD78976000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7B630000
trusted library allocation
page read and write
1540000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD7926B000
trusted library allocation
page read and write
208FB71000
trusted library allocation
page execute read
1DD8005B000
trusted library allocation
page read and write
1DD79680000
trusted library allocation
page read and write
1DD78867000
trusted library allocation
page read and write
1DD7A740000
trusted library allocation
page read and write
18CEB463000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD7FF43000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD7888D000
trusted library allocation
page read and write
18CEB413000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7918D000
trusted library allocation
page read and write
1DD788D6000
trusted library allocation
page read and write
1DD78870000
trusted library allocation
page read and write
1DD7B8D9000
trusted library allocation
page read and write
26387F77000
heap
page read and write
1DD83BF5000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD80F19000
trusted library allocation
page read and write
1DD797A9000
trusted library allocation
page read and write
1DD77663000
trusted library allocation
page read and write
1DD80166000
trusted library allocation
page read and write
1DD7A3BD000
trusted library allocation
page read and write
1DD815BA000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD80FEB000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD73D76000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7B5BC000
trusted library allocation
page read and write
1DD7FDF6000
trusted library allocation
page read and write
1DD77941000
heap
page read and write
1DD7A3EB000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD791C4000
trusted library allocation
page read and write
1631000
heap
page read and write
1DD7509D000
trusted library allocation
page read and write
1DD7A056000
trusted library allocation
page read and write
1DD7761F000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD7B645000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
26387F2A000
heap
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7928D000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD7801F000
trusted library allocation
page read and write
1DD80192000
trusted library allocation
page read and write
1DD6EE76000
heap
page read and write
1DD79162000
trusted library allocation
page read and write
1DD800DE000
trusted library allocation
page read and write
1DD792DC000
trusted library allocation
page read and write
1DD800C9000
trusted library allocation
page read and write
1DD818FC000
trusted library allocation
page read and write
1DD809E8000
trusted library allocation
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD7FD6E000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD6EE7F000
heap
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD7974F000
trusted library allocation
page read and write
1DD801A4000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD6EE76000
heap
page read and write
19865710000
heap
page read and write
1DD7A985000
trusted library allocation
page read and write
1DD6EE27000
heap
page read and write
1DD6EE75000
heap
page read and write
1DD80FFB000
trusted library allocation
page read and write
1DD6EE2B000
heap
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD78EB3000
trusted library allocation
page read and write
1DD800B7000
trusted library allocation
page read and write
1DD792FD000
trusted library allocation
page read and write
26386E40000
heap
page read and write
1DD7FFD5000
trusted library allocation
page read and write
1DD797E9000
trusted library allocation
page read and write
26387D00000
trusted library allocation
page read and write
1DD789A8000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD813C1000
trusted library allocation
page read and write
1DD73798000
trusted library allocation
page read and write
1DD81317000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD77B93000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD818F4000
trusted library allocation
page read and write
7FC17FE000
stack
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD83DC4000
trusted library allocation
page read and write
1DD77D93000
trusted library allocation
page read and write
1DD780B4000
trusted library allocation
page read and write
1DD74F8D000
trusted library allocation
page read and write
1DD78055000
trusted library allocation
page read and write
1DD8389A000
trusted library allocation
page read and write
1DD80FC0000
trusted library allocation
page read and write
1DD7749B000
trusted library allocation
page read and write
1DD77D80000
trusted library allocation
page read and write
26387790000
heap
page read and write
1DD73E82000
trusted library allocation
page read and write
18CEB0A0000
heap
page read and write
1DD6EE1C000
heap
page read and write
1DD838F3000
trusted library allocation
page read and write
1DD7FE8F000
trusted library allocation
page read and write
1DD79254000
trusted library allocation
page read and write
18CEB430000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD74F81000
trusted library allocation
page read and write
26387E7F000
heap
page read and write
1DD7FF2F000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD808F2000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD6EE7A000
heap
page read and write
1DD6EE46000
heap
page read and write
26387E60000
heap
page read and write
1DD7A778000
trusted library allocation
page read and write
1DD78017000
trusted library allocation
page read and write
1DD780E3000
trusted library allocation
page read and write
1DD788C3000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1F16389F000
trusted library allocation
page read and write
1DD78966000
trusted library allocation
page read and write
1DD7B555000
trusted library allocation
page read and write
1DD791C8000
trusted library allocation
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD788D6000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD74F6D000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
26387E60000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD73E26000
trusted library allocation
page read and write
1DD797AA000
trusted library allocation
page read and write
1DD80F4B000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD78987000
trusted library allocation
page read and write
1DD83C54000
trusted library allocation
page read and write
18CEB290000
unclassified section
page readonly
1DD6EE00000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD774D7000
trusted library allocation
page read and write
1DD813BD000
trusted library allocation
page read and write
1DD808A8000
trusted library allocation
page read and write
1DD7B3C1000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD83897000
trusted library allocation
page read and write
1DD824CF000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD790E8000
trusted library allocation
page read and write
1DD7FE4E000
trusted library allocation
page read and write
D90000
heap
page read and write
1DD8136E000
trusted library allocation
page read and write
26387F58000
heap
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD792A5000
trusted library allocation
page read and write
1DD7A7CD000
trusted library allocation
page read and write
1DD83BE9000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD78999000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD7FF08000
trusted library allocation
page read and write
1DD7FD92000
trusted library allocation
page read and write
1DD80F07000
trusted library allocation
page read and write
1DD815D6000
trusted library allocation
page read and write
1DD737DF000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD788FE000
trusted library allocation
page read and write
1DD797AF000
trusted library allocation
page read and write
13CF000
stack
page read and write
59BCF3E000
unkown
page readonly
1DD79BC3000
trusted library allocation
page read and write
1DD78EF2000
trusted library allocation
page read and write
1DD79723000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD6EE29000
heap
page read and write
1DD6EE73000
heap
page read and write
1DD7FD88000
trusted library allocation
page read and write
1DD7A7C1000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7802E000
trusted library allocation
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD80F57000
trusted library allocation
page read and write
1DD79164000
trusted library allocation
page read and write
1DD78E82000
trusted library allocation
page read and write
1DD7C0D8000
heap
page read and write
1DD79FAD000
trusted library allocation
page read and write
1DD801AC000
trusted library allocation
page read and write
1DD77936000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD77C3C000
trusted library allocation
page read and write
1DD6EE3F000
heap
page read and write
1DD81566000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7FF2D000
trusted library allocation
page read and write
1DD80050000
trusted library allocation
page read and write
1DD80FB3000
trusted library allocation
page read and write
1DD7886B000
trusted library allocation
page read and write
59BABED000
stack
page read and write
1DD83CF8000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD78CB8000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD6EE4C000
heap
page read and write
1DD809C0000
trusted library allocation
page read and write
1DD7FDEA000
trusted library allocation
page read and write
1DD81904000
trusted library allocation
page read and write
1DD81333000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD78CFD000
trusted library allocation
page read and write
1DD813FD000
trusted library allocation
page read and write
1DD78CC9000
trusted library allocation
page read and write
1DD79726000
trusted library allocation
page read and write
1DD7A1C9000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
26387EE9000
heap
page read and write
1DD77C63000
trusted library allocation
page read and write
1DD800CC000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD80187000
trusted library allocation
page read and write
1DD7A3A8000
trusted library allocation
page read and write
1DD74F78000
trusted library allocation
page read and write
1DD78E3A000
trusted library allocation
page read and write
1DD7912B000
trusted library allocation
page read and write
1DD77B52000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD797E2000
trusted library allocation
page read and write
1DD789EB000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD80FE1000
trusted library allocation
page read and write
1DD77C77000
trusted library allocation
page read and write
1DD81315000
trusted library allocation
page read and write
1DD77D97000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD7B3AE000
trusted library allocation
page read and write
1DD78E33000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
740000
unkown
page write copy
1DD6EE3A000
heap
page read and write
744000
unkown
page readonly
1DD7B667000
trusted library allocation
page read and write
1DD7B65D000
trusted library allocation
page read and write
1DD788BF000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD80F39000
trusted library allocation
page read and write
1DD823F6000
trusted library allocation
page read and write
1DD78017000
trusted library allocation
page read and write
1DD7898A000
trusted library allocation
page read and write
1DD78B77000
trusted library allocation
page read and write
1DD78E4A000
trusted library allocation
page read and write
1DD6EE2D000
heap
page read and write
1F163883000
trusted library allocation
page read and write
1DD75024000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1DD791CB000
trusted library allocation
page read and write
1DD80165000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
59BB5D8000
stack
page read and write
59BD73E000
stack
page read and write
1DD801FB000
trusted library allocation
page read and write
1DD77B74000
trusted library allocation
page read and write
1DD79611000
trusted library allocation
page read and write
1F163932000
trusted library allocation
page read and write
1DD791BA000
trusted library allocation
page read and write
1DD81572000
trusted library allocation
page read and write
1DD800DE000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD77B4B000
trusted library allocation
page read and write
1F163800000
trusted library allocation
page read and write
1DD7FEB1000
trusted library allocation
page read and write
1DD83C5F000
trusted library allocation
page read and write
1DD79194000
trusted library allocation
page read and write
1DD8000C000
trusted library allocation
page read and write
26387092000
unkown
page execute read
1DD78890000
trusted library allocation
page read and write
1DD7A7D7000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD801B8000
trusted library allocation
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD7888D000
trusted library allocation
page read and write
26387F6D000
heap
page read and write
1DD79763000
trusted library allocation
page read and write
1DD77D6B000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD80179000
trusted library allocation
page read and write
1DD818CA000
trusted library allocation
page read and write
1DD77D95000
trusted library allocation
page read and write
1DD818BD000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD7A93F000
trusted library allocation
page read and write
1DD7FEB7000
trusted library allocation
page read and write
1DD83B9F000
trusted library allocation
page read and write
1DD74F48000
trusted library allocation
page read and write
1DD78E71000
trusted library allocation
page read and write
1DD6EEBB000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD815CF000
trusted library allocation
page read and write
1DD7761F000
trusted library allocation
page read and write
671000
unkown
page execute read
1DD7A400000
trusted library allocation
page read and write
1DD80141000
trusted library allocation
page read and write
1DD7883F000
trusted library allocation
page read and write
1DD75070000
trusted library allocation
page read and write
1DD818F9000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD83C4A000
trusted library allocation
page read and write
1DD7A0FB000
trusted library allocation
page read and write
1DD81384000
trusted library allocation
page read and write
1DD79276000
trusted library allocation
page read and write
1DD79FD7000
trusted library allocation
page read and write
1DD6EE2F000
heap
page read and write
1DD79155000
trusted library allocation
page read and write
1DD792A5000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD6EE1F000
heap
page read and write
1DD78E60000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD80F17000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD6EE1B000
heap
page read and write
1DD6EE43000
heap
page read and write
1F16386E000
trusted library allocation
page read and write
1DD8084F000
trusted library allocation
page read and write
1DD6EE2D000
heap
page read and write
1DD7FE4A000
trusted library allocation
page read and write
1DD81345000
trusted library allocation
page read and write
1DD79763000
trusted library allocation
page read and write
26387F2A000
heap
page read and write
1DD7883F000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD7B555000
trusted library allocation
page read and write
1DD78918000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD81337000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE6B000
heap
page read and write
1DD6EE6C000
heap
page read and write
1DD77B92000
trusted library allocation
page read and write
1DD780CA000
trusted library allocation
page read and write
1DD74DDF000
trusted library allocation
page read and write
1DD7916C000
trusted library allocation
page read and write
1DD7881D000
trusted library allocation
page read and write
1DD83B8D000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD7B6F3000
trusted library allocation
page read and write
1DD7977A000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD77B59000
trusted library allocation
page read and write
1DD7A08A000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD7A7D5000
trusted library allocation
page read and write
1DD83885000
trusted library allocation
page read and write
1DD814FC000
trusted library allocation
page read and write
1DD78E1F000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD843D3000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD77DDD000
trusted library allocation
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD6EE82000
heap
page read and write
1DD77952000
heap
page read and write
1DD7886F000
trusted library allocation
page read and write
1DD6EE1E000
heap
page read and write
1DD797C2000
trusted library allocation
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD7FEA3000
trusted library allocation
page read and write
208FB60000
trusted library allocation
page execute read
1DD6EE20000
heap
page read and write
1DD6EE43000
heap
page read and write
1DD7FE99000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD78B6B000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD77DD6000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD77C8E000
trusted library allocation
page read and write
1DD80099000
trusted library allocation
page read and write
1DD814C3000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD78E84000
trusted library allocation
page read and write
1DD7A2B4000
trusted library allocation
page read and write
1DD818B1000
trusted library allocation
page read and write
1DD7A289000
trusted library allocation
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD83BE9000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD80F86000
trusted library allocation
page read and write
1DD780ED000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD750BC000
trusted library allocation
page read and write
1DD824D4000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD797B0000
trusted library allocation
page read and write
1DD78EDB000
trusted library allocation
page read and write
1DD74F9E000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD80085000
trusted library allocation
page read and write
1DD797B4000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD78CE3000
trusted library allocation
page read and write
26387365000
trusted library allocation
page read and write
1DD7B30C000
trusted library allocation
page read and write
1DD791D7000
trusted library allocation
page read and write
1DD77DFE000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD81874000
trusted library allocation
page read and write
1DD7B33F000
trusted library allocation
page read and write
1DD8232F000
trusted library allocation
page read and write
1DD78CE3000
trusted library allocation
page read and write
1DD7B6F6000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1F1633E0000
heap
page read and write
1DD78081000
trusted library allocation
page read and write
1DD83BF8000
trusted library allocation
page read and write
1DD7806D000
trusted library allocation
page read and write
1DD7FCCE000
trusted library allocation
page read and write
1631000
heap
page read and write
1DD80F87000
trusted library allocation
page read and write
1DD7C06D000
heap
page read and write
1DD6EE2D000
heap
page read and write
1DD77DFE000
trusted library allocation
page read and write
1DD80F55000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
26387EE1000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD79138000
trusted library allocation
page read and write
1DD7893B000
trusted library allocation
page read and write
1DD789FB000
trusted library allocation
page read and write
1DD77C8A000
trusted library allocation
page read and write
1DD7918D000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD79B47000
trusted library allocation
page read and write
1DD7FDDA000
trusted library allocation
page read and write
18CEB707000
trusted library allocation
page read and write
1DD77B4B000
trusted library allocation
page read and write
1DD791BF000
trusted library allocation
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD7FEB4000
trusted library allocation
page read and write
1DD74D4B000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD6EE2F000
heap
page read and write
1DD7C103000
heap
page read and write
1DD78872000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD7A7A9000
trusted library allocation
page read and write
1DD7794B000
heap
page read and write
1DD7B85C000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
26387E5C000
heap
page read and write
1DD79168000
trusted library allocation
page read and write
1F163A06000
heap
page read and write
1DD79183000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD73E6A000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD7FE3F000
trusted library allocation
page read and write
1DD796FA000
trusted library allocation
page read and write
1DD7FDE7000
trusted library allocation
page read and write
1DD7A08D000
trusted library allocation
page read and write
1DD8159D000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD780E3000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD6EE43000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7FE46000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
263873B3000
trusted library allocation
page read and write
1DD79193000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE82000
heap
page read and write
1DD80853000
trusted library allocation
page read and write
1DD77DCC000
trusted library allocation
page read and write
18CEAFF0000
unclassified section
page readonly
1DD74F81000
trusted library allocation
page read and write
263873BB000
trusted library allocation
page read and write
1DD77DE4000
trusted library allocation
page read and write
1DD7A74F000
trusted library allocation
page read and write
1F1638AE000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD81348000
trusted library allocation
page read and write
1DD7FECC000
trusted library allocation
page read and write
1F1635B0000
heap
page read and write
1DD78984000
trusted library allocation
page read and write
1DD79150000
trusted library allocation
page read and write
1DD77DFE000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD801D2000
trusted library allocation
page read and write
162E000
heap
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
26387E5F000
heap
page read and write
1DD78867000
trusted library allocation
page read and write
1DD7A78C000
trusted library allocation
page read and write
1DD7FDEA000
trusted library allocation
page read and write
1DD8016B000
trusted library allocation
page read and write
1DD78BE8000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD82F00000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD808FD000
trusted library allocation
page read and write
1DD7890C000
trusted library allocation
page read and write
1DD7FDE8000
trusted library allocation
page read and write
1DD6EE47000
heap
page read and write
1DD6EE2D000
heap
page read and write
1DD80F39000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD7768C000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1544000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD7A7AE000
trusted library allocation
page read and write
7FBF7FF000
stack
page read and write
1DD77460000
trusted library allocation
page read and write
1DD83BD6000
trusted library allocation
page read and write
1DD77B8D000
trusted library allocation
page read and write
1DD776C4000
trusted library allocation
page read and write
1DD73E66000
trusted library allocation
page read and write
1DD7A0F7000
trusted library allocation
page read and write
7FC07FE000
stack
page read and write
1DD77936000
heap
page read and write
1DD7B889000
trusted library allocation
page read and write
2638735C000
trusted library allocation
page read and write
1DD77C88000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE6C000
heap
page read and write
1DD774EF000
trusted library allocation
page read and write
1DD790CF000
trusted library allocation
page read and write
21FF000
stack
page read and write
1DD6EE53000
heap
page read and write
1DD6EE6A000
heap
page read and write
1630000
heap
page read and write
1DD79ADA000
trusted library allocation
page read and write
1DD7FEB2000
trusted library allocation
page read and write
1DD78976000
trusted library allocation
page read and write
1DD7793E000
heap
page read and write
18CEB800000
trusted library allocation
page read and write
1F16391B000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD80F57000
trusted library allocation
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD6EE24000
heap
page read and write
1DD77C6A000
trusted library allocation
page read and write
1DD7FFED000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD74D87000
trusted library allocation
page read and write
1DD6EE43000
heap
page read and write
1DD78055000
trusted library allocation
page read and write
1F163454000
heap
page read and write
3A90000
heap
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD79286000
trusted library allocation
page read and write
1DD824D4000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
3E11000
heap
page read and write
1DD79276000
trusted library allocation
page read and write
1DD81158000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
218D83F1000
heap
page read and write
1DD7A77E000
trusted library allocation
page read and write
1DD6EE04000
heap
page read and write
1DD78C18000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD6EE52000
heap
page read and write
1DD6EE42000
heap
page read and write
26387F79000
heap
page read and write
1DD8018B000
trusted library allocation
page read and write
1DD80860000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD78988000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD737EF000
trusted library allocation
page read and write
1DD77D76000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD838F0000
trusted library allocation
page read and write
1DD792CD000
trusted library allocation
page read and write
1DD79500000
trusted library allocation
page read and write
1622000
heap
page read and write
1DD6EE1E000
heap
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD7FD00000
trusted library allocation
page read and write
1DD780F0000
trusted library allocation
page read and write
1DD77DED000
trusted library allocation
page read and write
1DD79643000
trusted library allocation
page read and write
1DD8385F000
trusted library allocation
page read and write
1DD791BF000
trusted library allocation
page read and write
18CEB449000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
78C157E000
unkown
page readonly
1DD6EE42000
heap
page read and write
1DD808A0000
trusted library allocation
page read and write
1DD77952000
heap
page read and write
1DD6EE73000
heap
page read and write
1DD7793A000
heap
page read and write
1DD7B5DE000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
AAD41FE000
unkown
page readonly
1DD6EE21000
heap
page read and write
1DD83BA1000
trusted library allocation
page read and write
1DD83CCE000
trusted library allocation
page read and write
1DD79BFC000
trusted library allocation
page read and write
1DD78E5D000
trusted library allocation
page read and write
1DD6EE1B000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD824D4000
trusted library allocation
page read and write
1DD6EE92000
heap
page read and write
78C2FFE000
stack
page read and write
1DD6EE41000
heap
page read and write
26387EE6000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7B6C6000
trusted library allocation
page read and write
1DD6EE77000
heap
page read and write
1DD78E80000
trusted library allocation
page read and write
1DD791F6000
trusted library allocation
page read and write
1DD80FA9000
trusted library allocation
page read and write
1DD78BE2000
trusted library allocation
page read and write
218D85C5000
heap
page read and write
59BF03E000
unkown
page readonly
1DD77DED000
trusted library allocation
page read and write
1DD78E22000
trusted library allocation
page read and write
1DD77D9D000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE78000
heap
page read and write
1DD74FF4000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD81818000
trusted library allocation
page read and write
1DD79229000
trusted library allocation
page read and write
1DD73D2F000
trusted library allocation
page read and write
1DD7B8E6000
trusted library allocation
page read and write
1DD80FF8000
trusted library allocation
page read and write
26387EE9000
heap
page read and write
1DD6EE40000
heap
page read and write
26387EF1000
heap
page read and write
1DD7913A000
trusted library allocation
page read and write
1DD78CE6000
trusted library allocation
page read and write
1DD7890D000
trusted library allocation
page read and write
1DD74F96000
trusted library allocation
page read and write
1DD80F57000
trusted library allocation
page read and write
1DD7A84A000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1DD7B6B6000
trusted library allocation
page read and write
18CEB45F000
trusted library allocation
page read and write
1DD7881D000
trusted library allocation
page read and write
26387389000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD774DB000
trusted library allocation
page read and write
26387F3B000
heap
page read and write
1DD7A79E000
trusted library allocation
page read and write
1DD6EE43000
heap
page read and write
1DD750C1000
trusted library allocation
page read and write
208FB51000
trusted library allocation
page execute read
1DD6EE32000
heap
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD78988000
trusted library allocation
page read and write
1DD789F7000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
26387374000
trusted library allocation
page read and write
1DD7FE42000
trusted library allocation
page read and write
1DD7B6B3000
trusted library allocation
page read and write
1DD77B4B000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD78C24000
trusted library allocation
page read and write
1DD77D6B000
trusted library allocation
page read and write
26387F59000
heap
page read and write
1DD792A8000
trusted library allocation
page read and write
26386E20000
unclassified section
page readonly
1DD78E14000
trusted library allocation
page read and write
1DD7B38D000
trusted library allocation
page read and write
1DD7A0EC000
trusted library allocation
page read and write
1DD6EE2F000
heap
page read and write
1DD7FFC0000
trusted library allocation
page read and write
1DD7FEE8000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD7C0A9000
heap
page read and write
13FE000
stack
page read and write
1DD6EE2F000
heap
page read and write
1DD7B641000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE27000
heap
page read and write
1DD824D4000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD77DDB000
trusted library allocation
page read and write
78C37FE000
unkown
page readonly
1DD7883F000
trusted library allocation
page read and write
1DD74F81000
trusted library allocation
page read and write
1DD789F8000
trusted library allocation
page read and write
1DD7802E000
trusted library allocation
page read and write
26387F3B000
heap
page read and write
1DD7B6A1000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD7C663000
trusted library allocation
page read and write
1DD7A789000
trusted library allocation
page read and write
1DD7FD9F000
trusted library allocation
page read and write
1DD78E87000
trusted library allocation
page read and write
1DD780C2000
trusted library allocation
page read and write
1DD7FFED000
trusted library allocation
page read and write
1DD7A987000
trusted library allocation
page read and write
AAD1FCE000
unkown
page readonly
1DD80F48000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE6A000
heap
page read and write
26387381000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD74DF1000
trusted library allocation
page read and write
218D9EA7000
heap
page read and write
1DD80054000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD80F97000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD79155000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD78075000
trusted library allocation
page read and write
1DD7A960000
trusted library allocation
page read and write
1DD797D3000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD74DA4000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7965E000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD792A8000
trusted library allocation
page read and write
78C387E000
unkown
page readonly
1DD737CD000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD74F9B000
trusted library allocation
page read and write
1DD7886B000
trusted library allocation
page read and write
1DD8185C000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD7FECC000
trusted library allocation
page read and write
26387348000
trusted library allocation
page read and write
1DD6EE24000
heap
page read and write
1DD7B3C1000
trusted library allocation
page read and write
26387E60000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD801BC000
trusted library allocation
page read and write
1DD80FB5000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE40000
heap
page read and write
1DD7FF1F000
trusted library allocation
page read and write
1DD79AE4000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD780CB000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD80025000
trusted library allocation
page read and write
1DD808C4000
trusted library allocation
page read and write
1DD6EE2B000
heap
page read and write
26387F77000
heap
page read and write
1DD7A087000
trusted library allocation
page read and write
1DD7977A000
trusted library allocation
page read and write
1DD7A7C8000
trusted library allocation
page read and write
1DD789EB000
trusted library allocation
page read and write
1F163653000
heap
page read and write
1DD7A9F0000
trusted library allocation
page read and write
1DD7801F000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD7B3E2000
trusted library allocation
page read and write
1DD74F78000
trusted library allocation
page read and write
1DD83B8D000
trusted library allocation
page read and write
1DD800C4000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD774DE000
trusted library allocation
page read and write
1DD7FE98000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
218D9EA9000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7A7D5000
trusted library allocation
page read and write
1DD7893B000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
1DD78BD1000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD7A762000
trusted library allocation
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD788E6000
trusted library allocation
page read and write
1DD7FF6E000
trusted library allocation
page read and write
59BC5FE000
stack
page read and write
59BDF7E000
stack
page read and write
1DD81315000
trusted library allocation
page read and write
1DD78820000
trusted library allocation
page read and write
1F1635A2000
unclassified section
page read and write
1DD77963000
heap
page read and write
1DD6EE32000
heap
page read and write
59BCE3E000
unkown
page readonly
1DD7FF71000
trusted library allocation
page read and write
1DD78E45000
trusted library allocation
page read and write
1DD801F5000
trusted library allocation
page read and write
218D8380000
heap
page read and write
1DD78E36000
trusted library allocation
page read and write
1DD7886B000
trusted library allocation
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD7B35C000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
1DD7B657000
trusted library allocation
page read and write
1DD80189000
trusted library allocation
page read and write
1DD78E36000
trusted library allocation
page read and write
1DD7FFD4000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE20000
heap
page read and write
263872F6000
heap
page read and write
1DD79B57000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD77C76000
trusted library allocation
page read and write
1DD750C7000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7801F000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1DD6EE78000
heap
page read and write
26387F44000
heap
page read and write
1DD6EE2F000
heap
page read and write
1DD81335000
trusted library allocation
page read and write
1DD77D85000
trusted library allocation
page read and write
1DD791A0000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
26387EFD000
heap
page read and write
1DD77460000
trusted library allocation
page read and write
1DD7916C000
trusted library allocation
page read and write
1DD77D85000
trusted library allocation
page read and write
1DD79168000
trusted library allocation
page read and write
1F1633A0000
remote allocation
page read and write
1DD80117000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD801C0000
trusted library allocation
page read and write
1DD79261000
trusted library allocation
page read and write
1DD809F4000
trusted library allocation
page read and write
1DD7FEFC000
trusted library allocation
page read and write
1DD801CD000
trusted library allocation
page read and write
1DD7B3F7000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1DD838F3000
trusted library allocation
page read and write
1DD790F4000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD7FFFB000
trusted library allocation
page read and write
1DD79ADC000
trusted library allocation
page read and write
1DD838F3000
trusted library allocation
page read and write
1DD78CD4000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
208FB11000
trusted library allocation
page execute read
1DD789E0000
trusted library allocation
page read and write
1DD6EE22000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE78000
heap
page read and write
1DD7C021000
heap
page read and write
163E000
heap
page read and write
1DD79F56000
trusted library allocation
page read and write
1DD79732000
trusted library allocation
page read and write
1DD7A7B2000
trusted library allocation
page read and write
1F163810000
trusted library allocation
page read and write
18CEB45D000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD77D6D000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE77000
heap
page read and write
1DD8018B000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
218D8607000
trusted library allocation
page read and write
1DD800C1000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1DD7B5E0000
trusted library allocation
page read and write
1DD7FCD3000
trusted library allocation
page read and write
1DD74DDB000
trusted library allocation
page read and write
1DD7FD82000
trusted library allocation
page read and write
1DD77D8E000
trusted library allocation
page read and write
1DD80F69000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7C091000
heap
page read and write
1DD7796D000
heap
page read and write
1DD78CE6000
trusted library allocation
page read and write
1DD797D3000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
2638709F000
unkown
page execute read
1DD6EE24000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD7B3B9000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD77DE4000
trusted library allocation
page read and write
1DD7FFB5000
trusted library allocation
page read and write
1DD74FF4000
trusted library allocation
page read and write
1DD78907000
trusted library allocation
page read and write
1DD78E33000
trusted library allocation
page read and write
1DD808F0000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD80849000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD80F39000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD7FECC000
trusted library allocation
page read and write
1DD83DB4000
trusted library allocation
page read and write
1DD7A2EA000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD7795A000
heap
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD7B6D0000
trusted library allocation
page read and write
1DD77DDE000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
1DD78955000
trusted library allocation
page read and write
1DD7FED2000
trusted library allocation
page read and write
1DD7A3CA000
trusted library allocation
page read and write
1DD83C4A000
trusted library allocation
page read and write
1DD7C07C000
heap
page read and write
1DD77B9D000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7A272000
trusted library allocation
page read and write
1DD83B57000
trusted library allocation
page read and write
1DD78EB3000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD797EE000
trusted library allocation
page read and write
1DD77471000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
26386FA0000
heap
page readonly
1DD78B61000
trusted library allocation
page read and write
1DD81329000
trusted library allocation
page read and write
1DD77952000
heap
page read and write
1DD808C2000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD77B81000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD78995000
trusted library allocation
page read and write
1DD7A88D000
trusted library allocation
page read and write
1DD7B3A0000
trusted library allocation
page read and write
1DD792E5000
trusted library allocation
page read and write
1DD7FDBD000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD792A6000
trusted library allocation
page read and write
1DD7B33B000
trusted library allocation
page read and write
1DD77BB6000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD800B1000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD73E1B000
trusted library allocation
page read and write
1DD7FCDD000
trusted library allocation
page read and write
1DD77DF2000
trusted library allocation
page read and write
1DD838FA000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1631000
heap
page read and write
1DD780DC000
trusted library allocation
page read and write
1DD83102000
trusted library allocation
page read and write
1DD78040000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD7A3E9000
trusted library allocation
page read and write
1DD6EE29000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD77D93000
trusted library allocation
page read and write
1DD815DF000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD792D1000
trusted library allocation
page read and write
18CEB477000
trusted library allocation
page read and write
1DD7FE42000
trusted library allocation
page read and write
1DD7A3C6000
trusted library allocation
page read and write
1DD77433000
trusted library allocation
page read and write
1DD7B3C5000
trusted library allocation
page read and write
18CEB262000
unclassified section
page read and write
1DD6EE46000
heap
page read and write
1DD6EE53000
heap
page read and write
73C000
unkown
page read and write
1DD6EE3A000
heap
page read and write
1DD79218000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD6EE42000
heap
page read and write
163E000
heap
page read and write
1DD7928D000
trusted library allocation
page read and write
1DD7A7D7000
trusted library allocation
page read and write
1DD838FD000
trusted library allocation
page read and write
1DD77C8C000
trusted library allocation
page read and write
208FB60000
trusted library allocation
page execute read
1DD80049000
trusted library allocation
page read and write
1DD818F7000
trusted library allocation
page read and write
1DD78C35000
trusted library allocation
page read and write
26387E6C000
heap
page read and write
1544000
heap
page read and write
1DD7A2CE000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
26387F3B000
heap
page read and write
1DD77BF6000
trusted library allocation
page read and write
1DD79071000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD7A2E7000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD791A9000
trusted library allocation
page read and write
1DD780DB000
trusted library allocation
page read and write
1DD79296000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD791B5000
trusted library allocation
page read and write
1DD73E1E000
trusted library allocation
page read and write
1DD80187000
trusted library allocation
page read and write
1DD737A4000
trusted library allocation
page read and write
263873C7000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD80F57000
trusted library allocation
page read and write
1DD79193000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD80048000
trusted library allocation
page read and write
1DD81591000
trusted library allocation
page read and write
1DD808C2000
trusted library allocation
page read and write
1DD78814000
trusted library allocation
page read and write
26387EF1000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD80FF8000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD83C9E000
trusted library allocation
page read and write
1DD77D9A000
trusted library allocation
page read and write
1DD6EE3E000
heap
page read and write
1DD73E26000
trusted library allocation
page read and write
18CEB1EA000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7898A000
trusted library allocation
page read and write
1DD7A2E7000
trusted library allocation
page read and write
78C383E000
stack
page read and write
1DD6EE7A000
heap
page read and write
1DD6EE19000
heap
page read and write
1DD7FEEA000
trusted library allocation
page read and write
1DD80050000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD796B7000
trusted library allocation
page read and write
18CEB470000
trusted library allocation
page read and write
1FCD4DE24000
trusted library allocation
page read and write
1DD792AF000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD797E5000
trusted library allocation
page read and write
1DD80896000
trusted library allocation
page read and write
26386FCF000
unclassified section
page read and write
1DD788C9000
trusted library allocation
page read and write
1DD79154000
trusted library allocation
page read and write
1DD6EE25000
heap
page read and write
1DD83BDE000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
26387E7D000
heap
page read and write
1DD80F2F000
trusted library allocation
page read and write
1DD7A3EF000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD824CB000
trusted library allocation
page read and write
1DD78894000
trusted library allocation
page read and write
18CEB220000
heap
page read and write
19865A00000
trusted library allocation
page read and write
1DD7B3F7000
trusted library allocation
page read and write
1DD808F2000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD78832000
trusted library allocation
page read and write
1DD73DFB000
trusted library allocation
page read and write
1DD77958000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD78999000
trusted library allocation
page read and write
1DD78999000
trusted library allocation
page read and write
1DD797AA000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD77CCE000
trusted library allocation
page read and write
18CEB4AA000
trusted library allocation
page read and write
1DD7FEC2000
trusted library allocation
page read and write
1DD780E3000
trusted library allocation
page read and write
3E11000
heap
page read and write
78C407E000
stack
page read and write
1DD79B3D000
trusted library allocation
page read and write
26387E8A000
heap
page read and write
1DD797FA000
trusted library allocation
page read and write
1DD74F81000
trusted library allocation
page read and write
1DD8080D000
trusted library allocation
page read and write
1DD83BE3000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD7A96C000
trusted library allocation
page read and write
1DD7886B000
trusted library allocation
page read and write
1DD780CB000
trusted library allocation
page read and write
1DD8132C000
trusted library allocation
page read and write
1DD77D90000
trusted library allocation
page read and write
26387378000
trusted library allocation
page read and write
1DD7FE4E000
trusted library allocation
page read and write
1DD8084F000
trusted library allocation
page read and write
1DD80F63000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD78CDD000
trusted library allocation
page read and write
1DD79726000
trusted library allocation
page read and write
1DD7762F000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD791CA000
trusted library allocation
page read and write
1DD7A77B000
trusted library allocation
page read and write
1DD79274000
trusted library allocation
page read and write
26386F50000
heap
page read and write
1DD6EE46000
heap
page read and write
2638732F000
trusted library allocation
page read and write
1DD774D7000
trusted library allocation
page read and write
1DD78E58000
trusted library allocation
page read and write
1DD8018B000
trusted library allocation
page read and write
1DD817C1000
trusted library allocation
page read and write
1DD813C3000
trusted library allocation
page read and write
1DD792A0000
trusted library allocation
page read and write
732000
unkown
page readonly
1DD789F2000
trusted library allocation
page read and write
26387E4D000
heap
page read and write
1DD80880000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD6EE1B000
heap
page read and write
1DD774F3000
trusted library allocation
page read and write
26387EF1000
heap
page read and write
1DD79728000
trusted library allocation
page read and write
1DD79F75000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD79274000
trusted library allocation
page read and write
1DD69D58000
heap
page read and write
1DD77D8E000
trusted library allocation
page read and write
1DD6EE29000
heap
page read and write
1DD79241000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD78F0A000
trusted library allocation
page read and write
1DD78CBE000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
1DD7FE92000
trusted library allocation
page read and write
1DD7A1B6000
trusted library allocation
page read and write
1DD80F17000
trusted library allocation
page read and write
218DA080000
heap
page read and write
1DD788B4000
trusted library allocation
page read and write
1DD7A3CA000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD81572000
trusted library allocation
page read and write
1DD7B37F000
trusted library allocation
page read and write
26387E60000
heap
page read and write
26387F44000
heap
page read and write
218D9EB7000
heap
page read and write
1DD6EE19000
heap
page read and write
1DD80052000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
26387EE8000
heap
page read and write
1DD77DE4000
trusted library allocation
page read and write
1DD81339000
trusted library allocation
page read and write
1DD7A3CA000
trusted library allocation
page read and write
1DD78037000
trusted library allocation
page read and write
1DD79B53000
trusted library allocation
page read and write
1DD7A998000
trusted library allocation
page read and write
1DD74F4B000
trusted library allocation
page read and write
1DD7A3C6000
trusted library allocation
page read and write
1DD7B3FC000
trusted library allocation
page read and write
1DD824C5000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
78C15BE000
stack
page read and write
1DD79FEB000
trusted library allocation
page read and write
1DD8082A000
trusted library allocation
page read and write
1DD6EE16000
heap
page read and write
1DD791FA000
trusted library allocation
page read and write
1DD78EF2000
trusted library allocation
page read and write
1DD77476000
trusted library allocation
page read and write
1DD74F7C000
trusted library allocation
page read and write
19865670000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD7A7DE000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE3D000
heap
page read and write
1DD7A295000
trusted library allocation
page read and write
1DD6EE2F000
heap
page read and write
1DD77460000
trusted library allocation
page read and write
218D9EAE000
heap
page read and write
1DD78CD2000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD80196000
trusted library allocation
page read and write
1DD77BCE000
trusted library allocation
page read and write
26387EE8000
heap
page read and write
1DD6EE2D000
heap
page read and write
1DD6EE3C000
heap
page read and write
26387F2A000
heap
page read and write
1DD7FE21000
trusted library allocation
page read and write
1DD78873000
trusted library allocation
page read and write
1DD80FB6000
trusted library allocation
page read and write
1DD78EC6000
trusted library allocation
page read and write
1DD78992000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
208FB89000
trusted library allocation
page execute read
1DD824D4000
trusted library allocation
page read and write
1DD8089C000
trusted library allocation
page read and write
1DD7FFD4000
trusted library allocation
page read and write
18CEB190000
heap
page read and write
1DD83BB7000
trusted library allocation
page read and write
1DD7FD67000
trusted library allocation
page read and write
1DD8081E000
trusted library allocation
page read and write
1DD7C056000
heap
page read and write
1DD8131E000
trusted library allocation
page read and write
1DD74F81000
trusted library allocation
page read and write
1DD7FE4E000
trusted library allocation
page read and write
1DD74FD4000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD6EE6C000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD824E2000
trusted library allocation
page read and write
1DD7FFFE000
trusted library allocation
page read and write
1DD7892B000
trusted library allocation
page read and write
1DD8082D000
trusted library allocation
page read and write
1DD7A769000
trusted library allocation
page read and write
1DD838AA000
trusted library allocation
page read and write
1DD77BF6000
trusted library allocation
page read and write
1DD80817000
trusted library allocation
page read and write
1DD801FD000
trusted library allocation
page read and write
1DD7B842000
trusted library allocation
page read and write
26387F77000
heap
page read and write
1DD796BE000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD7FEB0000
trusted library allocation
page read and write
1DD81382000
trusted library allocation
page read and write
1DD815A6000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD791D7000
trusted library allocation
page read and write
1DD78E43000
trusted library allocation
page read and write
1DD7A778000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD77936000
heap
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD7A9EC000
trusted library allocation
page read and write
1DD7911F000
trusted library allocation
page read and write
1DD80FB1000
trusted library allocation
page read and write
1DD82495000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
218D9EA0000
heap
page read and write
1DD792AA000
trusted library allocation
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD6EE1F000
heap
page read and write
1DD77DF9000
trusted library allocation
page read and write
18CEB400000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD838E2000
trusted library allocation
page read and write
26387EB9000
heap
page read and write
1DD774D9000
trusted library allocation
page read and write
1DD815CF000
trusted library allocation
page read and write
1DD78B87000
trusted library allocation
page read and write
1DD74F78000
trusted library allocation
page read and write
218D83E2000
heap
page read and write
1DD776C8000
trusted library allocation
page read and write
1DD7B341000
trusted library allocation
page read and write
1DD7FEA1000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1F16391D000
trusted library allocation
page read and write
1DD78873000
trusted library allocation
page read and write
1DD791C4000
trusted library allocation
page read and write
1DD77472000
trusted library allocation
page read and write
1DD78955000
trusted library allocation
page read and write
1DD81859000
trusted library allocation
page read and write
AAD39FE000
stack
page read and write
1DD80F6A000
trusted library allocation
page read and write
1DD77C1F000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE3C000
heap
page read and write
26387F58000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD6EE1C000
heap
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD83500000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD77DDB000
trusted library allocation
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD7B6BE000
trusted library allocation
page read and write
1DD750BE000
trusted library allocation
page read and write
1DD74DA4000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
AAD1E8B000
stack
page read and write
1DD797B4000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD7B63E000
trusted library allocation
page read and write
1DD83BB7000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD780FC000
trusted library allocation
page read and write
218D83A0000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD6EE4F000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD77D85000
trusted library allocation
page read and write
78C1FD8000
stack
page read and write
1DD801F5000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD7FEF2000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD81319000
trusted library allocation
page read and write
1DD7FF4F000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD815BA000
trusted library allocation
page read and write
1DD6EE7E000
heap
page read and write
1DD7A7DE000
trusted library allocation
page read and write
1DD7C0C0000
heap
page read and write
1DD791BA000
trusted library allocation
page read and write
1DD6EE22000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD789F2000
trusted library allocation
page read and write
1DD7FF6E000
trusted library allocation
page read and write
1DD7B5D2000
trusted library allocation
page read and write
1DD7A3C4000
trusted library allocation
page read and write
1DD792E5000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD6EE27000
heap
page read and write
1DD6EE8F000
heap
page read and write
1DD7B85C000
trusted library allocation
page read and write
1DD808AA000
trusted library allocation
page read and write
1DD7C0C1000
heap
page read and write
1DD7FFED000
trusted library allocation
page read and write
1DD81924000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD7A9FE000
trusted library allocation
page read and write
1DD79155000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD77D55000
trusted library allocation
page read and write
1DD77B7F000
trusted library allocation
page read and write
1DD6EE77000
heap
page read and write
26387E9C000
heap
page read and write
1DD6EE7D000
heap
page read and write
1DD7FDA3000
trusted library allocation
page read and write
1DD75051000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD80192000
trusted library allocation
page read and write
1DD791A5000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE6B000
heap
page read and write
1DD77D8B000
trusted library allocation
page read and write
1DD78E38000
trusted library allocation
page read and write
1DD824C8000
trusted library allocation
page read and write
1DD789E0000
trusted library allocation
page read and write
1DD78C37000
trusted library allocation
page read and write
1DD78C1D000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD80043000
trusted library allocation
page read and write
1DD79B51000
trusted library allocation
page read and write
1F1633BC000
remote allocation
page execute read
1DD77628000
trusted library allocation
page read and write
1DD7512C000
trusted library allocation
page read and write
1DD7FECC000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD7B318000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD7916C000
trusted library allocation
page read and write
1DD7897B000
trusted library allocation
page read and write
1DD77C88000
trusted library allocation
page read and write
1DD7B5AF000
trusted library allocation
page read and write
1DD83C9C000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE40000
heap
page read and write
1DD6EE3A000
heap
page read and write
26387EFD000
heap
page read and write
1DD750BE000
trusted library allocation
page read and write
1DD797EE000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD814CA000
trusted library allocation
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD791BB000
trusted library allocation
page read and write
1DD77433000
trusted library allocation
page read and write
1DD7886B000
trusted library allocation
page read and write
1DD800BC000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD78CB8000
trusted library allocation
page read and write
26387EE6000
heap
page read and write
1DD79713000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD788F0000
trusted library allocation
page read and write
1DD800AD000
trusted library allocation
page read and write
1DD83851000
trusted library allocation
page read and write
1DD8080A000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD7A3B1000
trusted library allocation
page read and write
1DD77B87000
trusted library allocation
page read and write
1DD7A7D7000
trusted library allocation
page read and write
1DD7C08B000
heap
page read and write
1DD7916C000
trusted library allocation
page read and write
1DD774CA000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
3AC4000
heap
page read and write
1DD79155000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
218D8290000
heap
page read and write
1DD813C3000
trusted library allocation
page read and write
1DD6EE3F000
heap
page read and write
26387F21000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD78012000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
163E000
heap
page read and write
1DD79254000
trusted library allocation
page read and write
1DD780DF000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE23000
heap
page read and write
1DD792A6000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD79728000
trusted library allocation
page read and write
1DD7A97F000
trusted library allocation
page read and write
1DD7C0DC000
heap
page read and write
1DD838E2000
trusted library allocation
page read and write
1DD79286000
trusted library allocation
page read and write
1DD7A9E7000
trusted library allocation
page read and write
1DD7FDC8000
trusted library allocation
page read and write
1DD791C1000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1F163450000
heap
page read and write
26387F6D000
heap
page read and write
1F1638B7000
trusted library allocation
page read and write
1DD776C8000
trusted library allocation
page read and write
1DD7A37A000
trusted library allocation
page read and write
1DD7A9F5000
trusted library allocation
page read and write
1DD81384000
trusted library allocation
page read and write
1DD7FFBC000
trusted library allocation
page read and write
1DD78FE0000
trusted library allocation
page read and write
1DD780E7000
trusted library allocation
page read and write
1DD788E6000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD7A998000
trusted library allocation
page read and write
1DD7FFFB000
trusted library allocation
page read and write
1DD83CCE000
trusted library allocation
page read and write
1DD6EE2D000
heap
page read and write
1DD792D4000
trusted library allocation
page read and write
1DD79257000
trusted library allocation
page read and write
26387E01000
heap
page read and write
1DD79F75000
trusted library allocation
page read and write
1DD75056000
trusted library allocation
page read and write
1DD79673000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD81322000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD7A9C1000
trusted library allocation
page read and write
1DD80F47000
trusted library allocation
page read and write
1DD6EE47000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD6EE1E000
heap
page read and write
1DD78E2E000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD79B57000
trusted library allocation
page read and write
1DD78939000
trusted library allocation
page read and write
1DD77C8A000
trusted library allocation
page read and write
1DD77BD2000
trusted library allocation
page read and write
1DD79149000
trusted library allocation
page read and write
1DD77DCC000
trusted library allocation
page read and write
1DD7A3ED000
trusted library allocation
page read and write
1DD77DCC000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD788F0000
trusted library allocation
page read and write
1DD80896000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD79173000
trusted library allocation
page read and write
1DD78BF2000
trusted library allocation
page read and write
1DD7FD7C000
trusted library allocation
page read and write
1DD789AD000
trusted library allocation
page read and write
1DD808A0000
trusted library allocation
page read and write
1DD838F0000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD780A8000
trusted library allocation
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD79286000
trusted library allocation
page read and write
1DD78BF2000
trusted library allocation
page read and write
1DD79218000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD7A05A000
trusted library allocation
page read and write
2638730C000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD83DB4000
trusted library allocation
page read and write
1DD801A4000
trusted library allocation
page read and write
1DD6EE76000
heap
page read and write
1DD78CE3000
trusted library allocation
page read and write
1DD6EE1B000
heap
page read and write
1DD823DE000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD792AA000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD792AE000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
263870C9000
unkown
page execute read
1DD792A0000
trusted library allocation
page read and write
1DD7B6BA000
trusted library allocation
page read and write
1DD7FE8F000
trusted library allocation
page read and write
1DD808B0000
trusted library allocation
page read and write
1DD815C4000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD80899000
trusted library allocation
page read and write
1DD7A95A000
trusted library allocation
page read and write
1DD7802E000
trusted library allocation
page read and write
26387EE0000
heap
page read and write
1DD7919C000
trusted library allocation
page read and write
1DD789C3000
trusted library allocation
page read and write
26387F6D000
heap
page read and write
1DD80956000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE78000
heap
page read and write
1DD83DC8000
trusted library allocation
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
218D83C0000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD74F6D000
trusted library allocation
page read and write
1DD77628000
trusted library allocation
page read and write
1DD78BFB000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD74F6D000
trusted library allocation
page read and write
218D8400000
trusted library allocation
page read and write
1DD8130C000
trusted library allocation
page read and write
1DD791BF000
trusted library allocation
page read and write
1DD80022000
trusted library allocation
page read and write
1DD78945000
trusted library allocation
page read and write
1DD6EE77000
heap
page read and write
1DD792DC000
trusted library allocation
page read and write
1DD77DC7000
trusted library allocation
page read and write
1DD78B79000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD78955000
trusted library allocation
page read and write
1DD74FA9000
trusted library allocation
page read and write
1DD789FB000
trusted library allocation
page read and write
1DD77DC2000
trusted library allocation
page read and write
1DD800AD000
trusted library allocation
page read and write
3E10000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD6EE7F000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD790EC000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD77948000
heap
page read and write
1DD79218000
trusted library allocation
page read and write
26387D04000
trusted library allocation
page read and write
1DD7A7A9000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD80179000
trusted library allocation
page read and write
218D8600000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD7A3C4000
trusted library allocation
page read and write
1DD7A3E3000
trusted library allocation
page read and write
1DD81591000
trusted library allocation
page read and write
1F163873000
trusted library allocation
page read and write
1DD80F6B000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD6EE77000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD77B7F000
trusted library allocation
page read and write
1DD6EE82000
heap
page read and write
1DD77D58000
trusted library allocation
page read and write
1DD7B6B8000
trusted library allocation
page read and write
1DD83C2D000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD77DCE000
trusted library allocation
page read and write
1DD7A7DE000
trusted library allocation
page read and write
1DD7796B000
heap
page read and write
1DD7FEA8000
trusted library allocation
page read and write
1DD7802E000
trusted library allocation
page read and write
26386DA0000
unclassified section
page readonly
1DD78EC6000
trusted library allocation
page read and write
1DD78968000
trusted library allocation
page read and write
26387E63000
heap
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
26387F77000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD8088D000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
263877B2000
heap
page read and write
1DD7FEC4000
trusted library allocation
page read and write
AAD51FE000
unkown
page readonly
1DD774E1000
trusted library allocation
page read and write
1DD7FE8F000
trusted library allocation
page read and write
1DD7969C000
trusted library allocation
page read and write
1DD801C7000
trusted library allocation
page read and write
1DD79F5D000
trusted library allocation
page read and write
1DD6EE82000
heap
page read and write
1DD78BFB000
trusted library allocation
page read and write
1DD6EE26000
heap
page read and write
1DD7FEB0000
trusted library allocation
page read and write
1DD8019C000
trusted library allocation
page read and write
1DD80FEC000
trusted library allocation
page read and write
1DD7922D000
trusted library allocation
page read and write
26387376000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD7FEC8000
trusted library allocation
page read and write
1DD789F2000
trusted library allocation
page read and write
1DD7B6E9000
trusted library allocation
page read and write
1DD80860000
trusted library allocation
page read and write
1DD77952000
heap
page read and write
1DD8248E000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD815E3000
trusted library allocation
page read and write
2638730A000
trusted library allocation
page read and write
1DD7977A000
trusted library allocation
page read and write
1DD6EE29000
heap
page read and write
1DD7A270000
trusted library allocation
page read and write
1DD801C7000
trusted library allocation
page read and write
1DD78915000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD7B660000
trusted library allocation
page read and write
1DD81348000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD78017000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD6EE3C000
heap
page read and write
2638700A000
heap
page read and write
1DD79286000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD78EF2000
trusted library allocation
page read and write
1DD776CF000
trusted library allocation
page read and write
1DD77C8A000
trusted library allocation
page read and write
1DD78939000
trusted library allocation
page read and write
18CEB411000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
26387F6D000
heap
page read and write
1DD79262000
trusted library allocation
page read and write
18CEB250000
heap
page readonly
1DD77952000
heap
page read and write
1DD7FF79000
trusted library allocation
page read and write
1DD818BD000
trusted library allocation
page read and write
1DD789A5000
trusted library allocation
page read and write
1DD79B4D000
trusted library allocation
page read and write
1DD6EE04000
heap
page read and write
1DD6EE47000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE6A000
heap
page read and write
1F163900000
trusted library allocation
page read and write
1DD79628000
trusted library allocation
page read and write
163E000
heap
page read and write
1DD79692000
trusted library allocation
page read and write
1DD77D76000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD8016F000
trusted library allocation
page read and write
1DD7977A000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7C0B9000
heap
page read and write
1DD7B38B000
trusted library allocation
page read and write
1DD78CE1000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7A3D7000
trusted library allocation
page read and write
1DD81196000
trusted library allocation
page read and write
1DD7FF35000
trusted library allocation
page read and write
1DD81305000
trusted library allocation
page read and write
1DD792A8000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD7FFFE000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD83BE2000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD7B6D3000
trusted library allocation
page read and write
1DD79276000
trusted library allocation
page read and write
1DD7929E000
trusted library allocation
page read and write
1DD7B5EA000
trusted library allocation
page read and write
1DD789BC000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD815BA000
trusted library allocation
page read and write
1622000
heap
page read and write
1DD6EE16000
heap
page read and write
1DD7762A000
trusted library allocation
page read and write
1DD818CC000
trusted library allocation
page read and write
1DD81565000
trusted library allocation
page read and write
1DD79B51000
trusted library allocation
page read and write
1DD797D0000
trusted library allocation
page read and write
1DD801C2000
trusted library allocation
page read and write
1DD7B316000
trusted library allocation
page read and write
1DD74DF1000
trusted library allocation
page read and write
1DD791B5000
trusted library allocation
page read and write
1DD78055000
trusted library allocation
page read and write
1DD73E7D000
trusted library allocation
page read and write
1DD78F9A000
trusted library allocation
page read and write
1DD78E38000
trusted library allocation
page read and write
1DD791AA000
trusted library allocation
page read and write
1FCD4DE1E000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
26386FC0000
unclassified section
page read and write
1F16393D000
trusted library allocation
page read and write
1DD824D4000
trusted library allocation
page read and write
1DD788B3000
trusted library allocation
page read and write
1DD83BE7000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1F163922000
trusted library allocation
page read and write
1DD79713000
trusted library allocation
page read and write
1DD6EE4D000
heap
page read and write
1DD77972000
heap
page read and write
1DD78995000
trusted library allocation
page read and write
1DD838FD000
trusted library allocation
page read and write
1DD7A978000
trusted library allocation
page read and write
1DD79294000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD80896000
trusted library allocation
page read and write
1DD7B8E6000
trusted library allocation
page read and write
26387E09000
heap
page read and write
1DD7A7AE000
trusted library allocation
page read and write
1DD80F19000
trusted library allocation
page read and write
26387040000
trusted library section
page readonly
1DD7916C000
trusted library allocation
page read and write
1DD81581000
trusted library allocation
page read and write
1DD7FDCE000
trusted library allocation
page read and write
263873E8000
trusted library allocation
page read and write
1DD78CDB000
trusted library allocation
page read and write
26387EEC000
heap
page read and write
26387EF2000
heap
page read and write
1DD80F6A000
trusted library allocation
page read and write
1DD8011B000
trusted library allocation
page read and write
1DD7A3F5000
trusted library allocation
page read and write
1DD792CD000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD78987000
trusted library allocation
page read and write
1DD824CF000
trusted library allocation
page read and write
1DD838F0000
trusted library allocation
page read and write
1DD8131F000
trusted library allocation
page read and write
1DD7B371000
trusted library allocation
page read and write
1DD796D4000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD791E2000
trusted library allocation
page read and write
1DD77DED000
trusted library allocation
page read and write
1DD7B50B000
trusted library allocation
page read and write
1DD7A3D7000
trusted library allocation
page read and write
1DD78CDD000
trusted library allocation
page read and write
1DD7B889000
trusted library allocation
page read and write
1DD774D2000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD792A5000
trusted library allocation
page read and write
1DD78814000
trusted library allocation
page read and write
1DD7FFFB000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD78899000
trusted library allocation
page read and write
1DD7B6BC000
trusted library allocation
page read and write
1DD796AA000
trusted library allocation
page read and write
1DD83CA2000
trusted library allocation
page read and write
1DD791AF000
trusted library allocation
page read and write
1DD83BFB000
trusted library allocation
page read and write
1DD808F0000
trusted library allocation
page read and write
1DD6EE1B000
heap
page read and write
1DD7C6C3000
trusted library allocation
page read and write
1DD78C33000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD80FCB000
trusted library allocation
page read and write
7FBF7FA000
stack
page read and write
1DD6EE3C000
heap
page read and write
1DD7887C000
trusted library allocation
page read and write
1DD79763000
trusted library allocation
page read and write
1DD797A7000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD80883000
trusted library allocation
page read and write
1986571F000
heap
page read and write
1DD7FF35000
trusted library allocation
page read and write
1DD7964C000
trusted library allocation
page read and write
1DD791FD000
trusted library allocation
page read and write
1DD7929E000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD7FE3A000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD77D80000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD6EE29000
heap
page read and write
1DD79092000
trusted library allocation
page read and write
1DD7A3B8000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD7B6BC000
trusted library allocation
page read and write
1600000
heap
page read and write
1DD7C056000
heap
page read and write
1DD6EE2A000
heap
page read and write
1DD80F47000
trusted library allocation
page read and write
1DD81317000
trusted library allocation
page read and write
1DD77DC2000
trusted library allocation
page read and write
1DD77B7B000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD78867000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD77B9F000
trusted library allocation
page read and write
1DD80FE8000
trusted library allocation
page read and write
1DD7B32F000
trusted library allocation
page read and write
1DD78051000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1608000
heap
page read and write
1DD83B34000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD7FE3F000
trusted library allocation
page read and write
1DD6EE1B000
heap
page read and write
18CEB403000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7FDDA000
trusted library allocation
page read and write
26387EA8000
heap
page read and write
1DD6EE2A000
heap
page read and write
1DD750C7000
trusted library allocation
page read and write
1DD83BE0000
trusted library allocation
page read and write
1DD750DC000
trusted library allocation
page read and write
1DD78966000
trusted library allocation
page read and write
1F1635A0000
unclassified section
page read and write
1DD6EE80000
heap
page read and write
1DD83BE7000
trusted library allocation
page read and write
1DD77DCC000
trusted library allocation
page read and write
162A000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD7A754000
trusted library allocation
page read and write
1F163898000
trusted library allocation
page read and write
1DD73D71000
trusted library allocation
page read and write
1DD74DDF000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD7912C000
trusted library allocation
page read and write
1DD7B6F9000
trusted library allocation
page read and write
1DD7A81D000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD79233000
trusted library allocation
page read and write
1DD81326000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD77D3B000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD75024000
trusted library allocation
page read and write
1DD8134C000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD78F05000
trusted library allocation
page read and write
1DD6EE2B000
heap
page read and write
1DD7FE99000
trusted library allocation
page read and write
1DD78992000
trusted library allocation
page read and write
1DD7A729000
trusted library allocation
page read and write
1DD792FD000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE47000
heap
page read and write
1DD7FE4F000
trusted library allocation
page read and write
1DD6EE78000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD800F4000
trusted library allocation
page read and write
1DD78CE3000
trusted library allocation
page read and write
1DD797AD000
trusted library allocation
page read and write
1DD6EE2B000
heap
page read and write
1DD79193000
trusted library allocation
page read and write
1DD7FD88000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1F163896000
trusted library allocation
page read and write
1DD78C27000
trusted library allocation
page read and write
1DD7A74D000
trusted library allocation
page read and write
1DD6EE22000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD7916C000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7891B000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD838AA000
trusted library allocation
page read and write
1DD792E5000
trusted library allocation
page read and write
1DD80056000
trusted library allocation
page read and write
1544000
heap
page read and write
1F163400000
heap
page read and write
1DD77C61000
trusted library allocation
page read and write
1DD69D50000
heap
page read and write
1DD7B840000
trusted library allocation
page read and write
1DD78E41000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1F163863000
trusted library allocation
page read and write
26387F58000
heap
page read and write
1DD78E41000
trusted library allocation
page read and write
1DD7FE4F000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE2A000
heap
page read and write
1DD73D2F000
trusted library allocation
page read and write
1DD824DD000
trusted library allocation
page read and write
1DD83B9F000
trusted library allocation
page read and write
26386F30000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7FDFD000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD83B4C000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD80179000
trusted library allocation
page read and write
1DD78F8A000
trusted library allocation
page read and write
1DD82D00000
trusted library allocation
page read and write
1DD6EE40000
heap
page read and write
5AD7DFF000
stack
page read and write
1DD791D8000
trusted library allocation
page read and write
1DD73DFE000
trusted library allocation
page read and write
1DD8089C000
trusted library allocation
page read and write
26387F77000
heap
page read and write
1DD80066000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD7FEB5000
trusted library allocation
page read and write
1DD750C1000
trusted library allocation
page read and write
26387F2D000
heap
page read and write
26387F58000
heap
page read and write
1DD80FA3000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD83CA0000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7502C000
trusted library allocation
page read and write
1DD801AC000
trusted library allocation
page read and write
1DD83B7E000
trusted library allocation
page read and write
1DD78899000
trusted library allocation
page read and write
1DD813DB000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD78E12000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7FFD4000
trusted library allocation
page read and write
1DD8094F000
trusted library allocation
page read and write
1DD79FFB000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD780D3000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD808B0000
trusted library allocation
page read and write
1DD80845000
trusted library allocation
page read and write
26387317000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD7A3FB000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD83DC4000
trusted library allocation
page read and write
1DD7509A000
trusted library allocation
page read and write
1DD80F71000
trusted library allocation
page read and write
1DD77D80000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD8000A000
trusted library allocation
page read and write
1DD788B4000
trusted library allocation
page read and write
1DD77B52000
trusted library allocation
page read and write
1DD7892B000
trusted library allocation
page read and write
1DD7A7EE000
trusted library allocation
page read and write
1DD79FFE000
trusted library allocation
page read and write
1DD81581000
trusted library allocation
page read and write
1DD7A3A6000
trusted library allocation
page read and write
1DD7FF5B000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD7892B000
trusted library allocation
page read and write
1DD79670000
trusted library allocation
page read and write
1DD83BD6000
trusted library allocation
page read and write
1DD77D5E000
trusted library allocation
page read and write
1DD7925E000
trusted library allocation
page read and write
1DD7A72E000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD78925000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD6EE20000
heap
page read and write
1DD6EE1B000
heap
page read and write
1DD74F81000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD8016B000
trusted library allocation
page read and write
163E000
heap
page read and write
1DD79164000
trusted library allocation
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD796BC000
trusted library allocation
page read and write
1DD78EDB000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
3AC0000
heap
page read and write
162B000
heap
page read and write
1DD79652000
trusted library allocation
page read and write
1DD7FDF6000
trusted library allocation
page read and write
1DD79665000
trusted library allocation
page read and write
1DD790F9000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD8081E000
trusted library allocation
page read and write
1DD77D8B000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD78966000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD78FA7000
trusted library allocation
page read and write
1DD79B3D000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1544000
heap
page read and write
1DD7A970000
trusted library allocation
page read and write
1DD75096000
trusted library allocation
page read and write
1DD79667000
trusted library allocation
page read and write
1DD79238000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD7A7D5000
trusted library allocation
page read and write
1DD792E6000
trusted library allocation
page read and write
218D83F8000
heap
page read and write
1DD801CB000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD7FDAE000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
26386DB0000
unclassified section
page readonly
1DD6EE71000
heap
page read and write
18CEB060000
remote allocation
page read and write
1DD6EE07000
heap
page read and write
1DD780ED000
trusted library allocation
page read and write
1DD80FA5000
trusted library allocation
page read and write
1DD78CC3000
trusted library allocation
page read and write
1DD824DD000
trusted library allocation
page read and write
1DD83DDD000
trusted library allocation
page read and write
AAD1F4E000
unkown
page readonly
1DD6EE42000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD83B34000
trusted library allocation
page read and write
1DD7B588000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD7FEB7000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
26387E60000
heap
page read and write
1DD7749B000
trusted library allocation
page read and write
1DD791BD000
trusted library allocation
page read and write
1DD808E8000
trusted library allocation
page read and write
1DD824C9000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7A77B000
trusted library allocation
page read and write
1DD7B66F000
trusted library allocation
page read and write
1DD78E8E000
trusted library allocation
page read and write
1DD789A5000
trusted library allocation
page read and write
1DD79150000
trusted library allocation
page read and write
1DD7FE35000
trusted library allocation
page read and write
1DD7917B000
trusted library allocation
page read and write
26387100000
trusted library allocation
page read and write
1DD80FFD000
trusted library allocation
page read and write
1DD7FF0A000
trusted library allocation
page read and write
1DD77963000
heap
page read and write
1DD78984000
trusted library allocation
page read and write
18CEB4B1000
trusted library allocation
page read and write
1DD6EE16000
heap
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD78867000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD80189000
trusted library allocation
page read and write
1DD78E93000
trusted library allocation
page read and write
1DD750EB000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1F163420000
heap
page read and write
1DD7913A000
trusted library allocation
page read and write
1DD824C6000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD7B6D3000
trusted library allocation
page read and write
1DD7A7D2000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD8387D000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE4D000
heap
page read and write
1DD6EE20000
heap
page read and write
1DD7FE34000
trusted library allocation
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD788C3000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD78939000
trusted library allocation
page read and write
1DD801BA000
trusted library allocation
page read and write
1DD7881C000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD801B8000
trusted library allocation
page read and write
26387E00000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD776F4000
trusted library allocation
page read and write
1DD774D7000
trusted library allocation
page read and write
1DD83BA1000
trusted library allocation
page read and write
1DD78CCE000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
26387E7D000
heap
page read and write
1DD7FD82000
trusted library allocation
page read and write
1DD81386000
trusted library allocation
page read and write
1DD78E58000
trusted library allocation
page read and write
1DD815A6000
trusted library allocation
page read and write
1DD7A3ED000
trusted library allocation
page read and write
1DD6EE6C000
heap
page read and write
1DD7FF2D000
trusted library allocation
page read and write
1DD823FC000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD6EE82000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD77628000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
26387E69000
heap
page read and write
1DD791AA000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD80189000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD817FC000
trusted library allocation
page read and write
5AD75FF000
stack
page read and write
1DD6EE56000
heap
page read and write
1DD6EE7A000
heap
page read and write
1DD6EE6C000
heap
page read and write
1DD789F7000
trusted library allocation
page read and write
1DD7887C000
trusted library allocation
page read and write
1DD77B52000
trusted library allocation
page read and write
26387EE8000
heap
page read and write
1DD7FDE0000
trusted library allocation
page read and write
26387F44000
heap
page read and write
1DD6EE77000
heap
page read and write
1DD78918000
trusted library allocation
page read and write
1F163456000
heap
page read and write
1DD79298000
trusted library allocation
page read and write
1DD7803B000
trusted library allocation
page read and write
D29000
stack
page read and write
1DD7B6F6000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD796A0000
trusted library allocation
page read and write
1DD792D5000
trusted library allocation
page read and write
1DD792C6000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD6EE77000
heap
page read and write
1DD77B92000
trusted library allocation
page read and write
1DD81865000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD7802E000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD776C8000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD6EE41000
heap
page read and write
1F16382E000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD800C9000
trusted library allocation
page read and write
1DD77C55000
trusted library allocation
page read and write
1DD7B667000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD78E38000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD6EE06000
heap
page read and write
1DD78CC6000
trusted library allocation
page read and write
1DD750EB000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD808B3000
trusted library allocation
page read and write
1DD7C0C1000
heap
page read and write
26387EE0000
heap
page read and write
1DD6EE40000
heap
page read and write
1DD6EE2C000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD8005B000
trusted library allocation
page read and write
1DD7FF61000
trusted library allocation
page read and write
1DD77D57000
trusted library allocation
page read and write
1DD801F3000
trusted library allocation
page read and write
26387E6C000
heap
page read and write
1DD79155000
trusted library allocation
page read and write
1F163490000
heap
page read and write
1DD7A987000
trusted library allocation
page read and write
1DD7A0A9000
trusted library allocation
page read and write
1DD791C1000
trusted library allocation
page read and write
1DD83B4C000
trusted library allocation
page read and write
26387000000
heap
page read and write
1DD6EE20000
heap
page read and write
1DD7B6C6000
trusted library allocation
page read and write
1DD83DC6000
trusted library allocation
page read and write
26387386000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD7A7CD000
trusted library allocation
page read and write
1DD7922F000
trusted library allocation
page read and write
1DD7FD79000
trusted library allocation
page read and write
1DD78EB3000
trusted library allocation
page read and write
1DD814CA000
trusted library allocation
page read and write
1DD78E43000
trusted library allocation
page read and write
1DD780E3000
trusted library allocation
page read and write
1DD78968000
trusted library allocation
page read and write
1DD74F53000
trusted library allocation
page read and write
1DD7762F000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE6A000
heap
page read and write
26387F00000
heap
page read and write
1DD77B6D000
trusted library allocation
page read and write
1DD79FFB000
trusted library allocation
page read and write
1DD80FFD000
trusted library allocation
page read and write
1DD7796D000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7B662000
trusted library allocation
page read and write
1DD74DDB000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD6EE6B000
heap
page read and write
1DD788D6000
trusted library allocation
page read and write
1DD824E0000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7A7B2000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD801BA000
trusted library allocation
page read and write
1DD80F97000
trusted library allocation
page read and write
26387EFD000
heap
page read and write
1DD797E6000
trusted library allocation
page read and write
1DD7B39A000
trusted library allocation
page read and write
1DD7B366000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD789FA000
trusted library allocation
page read and write
1DD809DA000
trusted library allocation
page read and write
1DD6EE78000
heap
page read and write
1DD7893B000
trusted library allocation
page read and write
1DD789F2000
trusted library allocation
page read and write
1DD7A0F7000
trusted library allocation
page read and write
1DD7B6D8000
trusted library allocation
page read and write
1DD7FCE9000
trusted library allocation
page read and write
218D83F8000
heap
page read and write
1DD7A7D2000
trusted library allocation
page read and write
26386FC2000
unclassified section
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD80F69000
trusted library allocation
page read and write
AAD1ECE000
unkown
page readonly
1DD83CCC000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD7C101000
heap
page read and write
1DD78E92000
trusted library allocation
page read and write
1DD7A3EB000
trusted library allocation
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD7A1FD000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD80F53000
trusted library allocation
page read and write
1DD7912C000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD78845000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD79197000
trusted library allocation
page read and write
1DD7FE8F000
trusted library allocation
page read and write
1DD7768F000
trusted library allocation
page read and write
1DD77622000
trusted library allocation
page read and write
1DD776C8000
trusted library allocation
page read and write
1DD7FF79000
trusted library allocation
page read and write
1DD81572000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
26387EEC000
heap
page read and write
1DD8080D000
trusted library allocation
page read and write
1DD791C1000
trusted library allocation
page read and write
1DD81C00000
trusted library allocation
page read and write
1DD78C22000
trusted library allocation
page read and write
1DD79150000
trusted library allocation
page read and write
1DD78079000
trusted library allocation
page read and write
1DD78E16000
trusted library allocation
page read and write
2014ACA03000
trusted library allocation
page read and write
1DD79286000
trusted library allocation
page read and write
1DD788D6000
trusted library allocation
page read and write
670000
unkown
page readonly
218D860A000
trusted library allocation
page read and write
1DD78EAA000
trusted library allocation
page read and write
1DD7C065000
heap
page read and write
1DD79B60000
trusted library allocation
page read and write
1DD7A09C000
trusted library allocation
page read and write
1DD79254000
trusted library allocation
page read and write
1DD7FE38000
trusted library allocation
page read and write
1DD77BF6000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
18CEB080000
unclassified section
page readonly
1DD83B7E000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD79274000
trusted library allocation
page read and write
19865690000
heap
page read and write
1DD78FBF000
trusted library allocation
page read and write
1DD81343000
trusted library allocation
page read and write
1DD6EE74000
heap
page read and write
78C15FE000
unkown
page readonly
1DD7B36A000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD79262000
trusted library allocation
page read and write
1DD6EE76000
heap
page read and write
1DD792FD000
trusted library allocation
page read and write
1DD6EE4B000
heap
page read and write
1DD77938000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD7A7D2000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
26387EEC000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD7C021000
heap
page read and write
1DD77B59000
trusted library allocation
page read and write
1DD7906D000
trusted library allocation
page read and write
1DD7B6BE000
trusted library allocation
page read and write
1DD750F6000
trusted library allocation
page read and write
1DD818CC000
trusted library allocation
page read and write
1DD74F56000
trusted library allocation
page read and write
1DD81591000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD79162000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD791F6000
trusted library allocation
page read and write
59BE03E000
unkown
page readonly
1DD7A3EF000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD77D3D000
trusted library allocation
page read and write
1DD79713000
trusted library allocation
page read and write
26387EA1000
heap
page read and write
1DD6EE24000
heap
page read and write
1DD78090000
trusted library allocation
page read and write
26387EEC000
heap
page read and write
1DD79276000
trusted library allocation
page read and write
1DD7FE92000
trusted library allocation
page read and write
1DD78012000
trusted library allocation
page read and write
1DD79620000
trusted library allocation
page read and write
1DD7762F000
trusted library allocation
page read and write
1DD6EE24000
heap
page read and write
1DD6EE79000
heap
page read and write
1DD80F4B000
trusted library allocation
page read and write
1DD81319000
trusted library allocation
page read and write
1DD74D4F000
trusted library allocation
page read and write
AAD49FE000
stack
page read and write
1DD79150000
trusted library allocation
page read and write
AAD29D8000
stack
page read and write
1DD6EE46000
heap
page read and write
1DD7969A000
trusted library allocation
page read and write
1DD780ED000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD77C8C000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD78F95000
trusted library allocation
page read and write
1DD7A3F5000
trusted library allocation
page read and write
1DD78E3E000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD7FFFB000
trusted library allocation
page read and write
1DD80821000
trusted library allocation
page read and write
1DD78985000
trusted library allocation
page read and write
1DD6EE79000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD77C72000
trusted library allocation
page read and write
1DD8389A000
trusted library allocation
page read and write
70C000
unkown
page readonly
1DD6EE45000
heap
page read and write
1DD737BF000
trusted library allocation
page read and write
13EF000
stack
page read and write
1DD6EE21000
heap
page read and write
150E000
stack
page read and write
1DD6EE15000
heap
page read and write
1DD7A2BA000
trusted library allocation
page read and write
1DD82333000
trusted library allocation
page read and write
26387361000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD7FE98000
trusted library allocation
page read and write
1DD7A819000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD78CF8000
trusted library allocation
page read and write
1DD77C8D000
trusted library allocation
page read and write
1DD7FF61000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE2D000
heap
page read and write
1DD80FFB000
trusted library allocation
page read and write
1DD7B385000
trusted library allocation
page read and write
1DD78976000
trusted library allocation
page read and write
19865719000
heap
page read and write
1F1638E7000
trusted library allocation
page read and write
26387F77000
heap
page read and write
1DD7973D000
trusted library allocation
page read and write
1DD77687000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD78CFD000
trusted library allocation
page read and write
1DD7A3AF000
trusted library allocation
page read and write
1DD788F0000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7A77E000
trusted library allocation
page read and write
18CEB260000
unclassified section
page read and write
1DD7B3B9000
trusted library allocation
page read and write
26387EEC000
heap
page read and write
1DD6EE7F000
heap
page read and write
1DD788E6000
trusted library allocation
page read and write
1DD7A942000
trusted library allocation
page read and write
1DD77952000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD7A3E3000
trusted library allocation
page read and write
1DD801D2000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD6EE6D000
heap
page read and write
1DD796D9000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD7FD86000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD6EE53000
heap
page read and write
1DFE000
stack
page read and write
1DD789BC000
trusted library allocation
page read and write
1DD81374000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
18CEB300000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
2638736A000
trusted library allocation
page read and write
1DD7FD7C000
trusted library allocation
page read and write
26387E6C000
heap
page read and write
1DD797D3000
trusted library allocation
page read and write
26387303000
trusted library allocation
page read and write
1DD7A3FB000
trusted library allocation
page read and write
1DD77B52000
trusted library allocation
page read and write
1DD77D83000
trusted library allocation
page read and write
1DD74FF5000
trusted library allocation
page read and write
1DD750AA000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
3E11000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD79F53000
trusted library allocation
page read and write
1DD80849000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD815E3000
trusted library allocation
page read and write
1DD78CD5000
trusted library allocation
page read and write
26387E64000
heap
page read and write
1DD83BCB000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD80F47000
trusted library allocation
page read and write
1DD7963D000
trusted library allocation
page read and write
1DD7747A000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD797D0000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD6EE7A000
heap
page read and write
1DD7A9DA000
trusted library allocation
page read and write
1DD73E7F000
trusted library allocation
page read and write
1DD797C4000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7A26D000
trusted library allocation
page read and write
26387F21000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD797B4000
trusted library allocation
page read and write
26387E5C000
heap
page read and write
1DD6EE32000
heap
page read and write
59BE83E000
stack
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD7797C000
heap
page read and write
1DD789FB000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD8082A000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD77461000
trusted library allocation
page read and write
218D85C0000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD809C2000
trusted library allocation
page read and write
1DD78BEE000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD6EE80000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD78E43000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD838E2000
trusted library allocation
page read and write
1DD80845000
trusted library allocation
page read and write
1DD80FB3000
trusted library allocation
page read and write
1DD788C3000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD78082000
trusted library allocation
page read and write
18CEB419000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
26387F58000
heap
page read and write
1DD7886B000
trusted library allocation
page read and write
1DD79298000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
1DD7FEC4000
trusted library allocation
page read and write
1DD808FA000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD788D6000
trusted library allocation
page read and write
1DD6EE78000
heap
page read and write
1DD823EF000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
18CEB576000
heap
page read and write
1DD6EE31000
heap
page read and write
1DD78BE0000
trusted library allocation
page read and write
1DD7FF3E000
trusted library allocation
page read and write
1DD7FD32000
trusted library allocation
page read and write
1DD7C0C1000
heap
page read and write
1DD7A3E3000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD79150000
trusted library allocation
page read and write
1DD7A066000
trusted library allocation
page read and write
1DD78F07000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD77DCC000
trusted library allocation
page read and write
1DD6EE3F000
heap
page read and write
1DD78CBE000
trusted library allocation
page read and write
1DD77DE1000
trusted library allocation
page read and write
1DD79168000
trusted library allocation
page read and write
1DD7504E000
trusted library allocation
page read and write
1DD7A3F9000
trusted library allocation
page read and write
1DD6EE47000
heap
page read and write
1DD7FDF6000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7C06E000
heap
page read and write
1DD789E0000
trusted library allocation
page read and write
1DD80F4E000
trusted library allocation
page read and write
1DD74FD1000
trusted library allocation
page read and write
1DD7A75B000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1F163A02000
heap
page read and write
1DD796C2000
trusted library allocation
page read and write
1DD809F8000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD7793F000
heap
page read and write
1DD78845000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD80FE9000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD6EE52000
heap
page read and write
18CEB574000
heap
page read and write
1DD7A069000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD83CFC000
trusted library allocation
page read and write
1DD7FDBD000
trusted library allocation
page read and write
1DD78987000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD8186C000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7FF53000
trusted library allocation
page read and write
18CEB424000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD77936000
heap
page read and write
1DD83875000
trusted library allocation
page read and write
1DD78CE9000
trusted library allocation
page read and write
1DD6EE26000
heap
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
5AD6DFC000
stack
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
26387E8D000
heap
page read and write
1DD7FED2000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD7FEC8000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD838E2000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE2D000
heap
page read and write
18CEB570000
heap
page read and write
1F163A00000
heap
page read and write
1DD81862000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD83C40000
trusted library allocation
page read and write
1DD7A3C4000
trusted library allocation
page read and write
1DD79B6D000
trusted library allocation
page read and write
1DD7FEB0000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD7897B000
trusted library allocation
page read and write
1DD77B65000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7911E000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD7FCE1000
trusted library allocation
page read and write
1DD7892E000
trusted library allocation
page read and write
1DD78BE0000
trusted library allocation
page read and write
1DD7A7C1000
trusted library allocation
page read and write
1DD81581000
trusted library allocation
page read and write
1DD7A7A9000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
26387F58000
heap
page read and write
1DD6EE1B000
heap
page read and write
1DD78BE2000
trusted library allocation
page read and write
1DD792DA000
trusted library allocation
page read and write
1DD79645000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD7FF17000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
26387E69000
heap
page read and write
1DD6EE3A000
heap
page read and write
26387310000
trusted library allocation
page read and write
1F163919000
trusted library allocation
page read and write
1DD79FE7000
trusted library allocation
page read and write
1DD6EE7A000
heap
page read and write
1DD80893000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
26387300000
trusted library allocation
page read and write
1DD7FD69000
trusted library allocation
page read and write
1DD780B4000
trusted library allocation
page read and write
1DD6EE92000
heap
page read and write
1DD6EE3A000
heap
page read and write
5AD6DFF000
stack
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD801CD000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD737EF000
trusted library allocation
page read and write
18CEB580000
heap
page read and write
1F163879000
trusted library allocation
page read and write
1DD7FEB2000
trusted library allocation
page read and write
1DD8002E000
trusted library allocation
page read and write
1DD7A0AC000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD80F44000
trusted library allocation
page read and write
1F163340000
unclassified section
page readonly
1DD797B4000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD79162000
trusted library allocation
page read and write
1DD6EE7C000
heap
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD78899000
trusted library allocation
page read and write
1DD80059000
trusted library allocation
page read and write
1DD7FCEF000
trusted library allocation
page read and write
1DD7A9D8000
trusted library allocation
page read and write
1DD7FE0F000
trusted library allocation
page read and write
1DD792DC000
trusted library allocation
page read and write
78C487E000
unkown
page readonly
1DD7B5A0000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD6EE2B000
heap
page read and write
1DD7FCD9000
trusted library allocation
page read and write
1DD77DC2000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD77D80000
trusted library allocation
page read and write
1DD78E3A000
trusted library allocation
page read and write
1DD78B85000
trusted library allocation
page read and write
1DD6EE45000
heap
page read and write
1DD808C2000
trusted library allocation
page read and write
1DD7C08D000
heap
page read and write
1DD780DB000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE76000
heap
page read and write
1DD73E75000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD78E3A000
trusted library allocation
page read and write
1DD737C0000
trusted library allocation
page read and write
1DD79168000
trusted library allocation
page read and write
1DD796B5000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE31000
heap
page read and write
1DD78987000
trusted library allocation
page read and write
1DD7A3F9000
trusted library allocation
page read and write
1DD7B37D000
trusted library allocation
page read and write
1DD77B59000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD80F68000
trusted library allocation
page read and write
1DD78867000
trusted library allocation
page read and write
1DD83C54000
trusted library allocation
page read and write
1DD79270000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD7B82F000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD78C2C000
trusted library allocation
page read and write
1DD77B4D000
trusted library allocation
page read and write
1DD80845000
trusted library allocation
page read and write
1DD824DD000
trusted library allocation
page read and write
18CEB48E000
trusted library allocation
page read and write
1DD6EE33000
heap
page read and write
1DD74F6D000
trusted library allocation
page read and write
1DD78E3E000
trusted library allocation
page read and write
1DD774DC000
trusted library allocation
page read and write
18CEB1C3000
heap
page read and write
26387080000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD77C8C000
trusted library allocation
page read and write
1DD79616000
trusted library allocation
page read and write
18CEB4DA000
trusted library allocation
page read and write
1DD6EE2A000
heap
page read and write
1DD6EE7A000
heap
page read and write
1DD77BCC000
trusted library allocation
page read and write
1DD7A7F4000
trusted library allocation
page read and write
1DD792B1000
trusted library allocation
page read and write
1F163912000
trusted library allocation
page read and write
18CEB704000
trusted library allocation
page read and write
1F163330000
unclassified section
page readonly
1DD7914D000
trusted library allocation
page read and write
1DD80845000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD797A6000
trusted library allocation
page read and write
1DD83B7E000
trusted library allocation
page read and write
218D83F3000
heap
page read and write
263873F3000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD6EE79000
heap
page read and write
1DD7A7CD000
trusted library allocation
page read and write
1DD7FF79000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD78FB3000
trusted library allocation
page read and write
1DD7B39A000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD77D6D000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD73781000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD77934000
heap
page read and write
1DD78CE1000
trusted library allocation
page read and write
1DD79257000
trusted library allocation
page read and write
1DD8080D000
trusted library allocation
page read and write
1DD73D23000
trusted library allocation
page read and write
1DD77DC2000
trusted library allocation
page read and write
1544000
heap
page read and write
1DD78869000
trusted library allocation
page read and write
1DD77474000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD7A9D8000
trusted library allocation
page read and write
1DD77937000
heap
page read and write
1DD79257000
trusted library allocation
page read and write
1DD788E6000
trusted library allocation
page read and write
1DD77D9B000
trusted library allocation
page read and write
1DD77D47000
trusted library allocation
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD801FB000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD77B52000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD7892B000
trusted library allocation
page read and write
1DD77DDB000
trusted library allocation
page read and write
1DD78EB3000
trusted library allocation
page read and write
1DD80F19000
trusted library allocation
page read and write
1DD815C4000
trusted library allocation
page read and write
18CEB466000
trusted library allocation
page read and write
26387312000
trusted library allocation
page read and write
1DD78E64000
trusted library allocation
page read and write
1628000
heap
page read and write
1DD79173000
trusted library allocation
page read and write
1DD80FCB000
trusted library allocation
page read and write
1DD791B5000
trusted library allocation
page read and write
1DD7A2C3000
trusted library allocation
page read and write
18CEB270000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD788E6000
trusted library allocation
page read and write
1626000
heap
page read and write
19865A0A000
trusted library allocation
page read and write
1DD815A6000
trusted library allocation
page read and write
59BCEBB000
stack
page read and write
1DD7919C000
trusted library allocation
page read and write
1DD78E14000
trusted library allocation
page read and write
1DD815CF000
trusted library allocation
page read and write
1DD7A3EF000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
18CEB469000
trusted library allocation
page read and write
1DD78CFA000
trusted library allocation
page read and write
1DD77948000
heap
page read and write
1DD78F02000
trusted library allocation
page read and write
744000
unkown
page readonly
1DD6EE4C000
heap
page read and write
1DD6EE32000
heap
page read and write
1F163480000
heap
page readonly
1DD6EE32000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD7B3E2000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD792DC000
trusted library allocation
page read and write
1DD83B39000
trusted library allocation
page read and write
1DD801F3000
trusted library allocation
page read and write
1DD7C091000
heap
page read and write
1DD788B3000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD7918D000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD78EA1000
trusted library allocation
page read and write
1DD6EE29000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD838FD000
trusted library allocation
page read and write
1DD7A2EA000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1F163823000
trusted library allocation
page read and write
1DD79605000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD78079000
trusted library allocation
page read and write
1DD73F00000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD8082F000
trusted library allocation
page read and write
1DD78BD1000
trusted library allocation
page read and write
1DD780E3000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD8159D000
trusted library allocation
page read and write
1DD7795A000
heap
page read and write
1DD7884B000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1F163847000
trusted library allocation
page read and write
1DD80F68000
trusted library allocation
page read and write
1DD6EE71000
heap
page read and write
1DD8249B000
trusted library allocation
page read and write
1DD79FEB000
trusted library allocation
page read and write
1DD7898A000
trusted library allocation
page read and write
1DD8233A000
trusted library allocation
page read and write
1DD77B4B000
trusted library allocation
page read and write
1DD75122000
trusted library allocation
page read and write
1DD79239000
trusted library allocation
page read and write
1DD809A3000
trusted library allocation
page read and write
1DD7FE46000
trusted library allocation
page read and write
1DD79164000
trusted library allocation
page read and write
1DD77963000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7B6E9000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD6EE52000
heap
page read and write
1DD78B5F000
trusted library allocation
page read and write
1DD6EE79000
heap
page read and write
1DD78EC5000
trusted library allocation
page read and write
1DD80052000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD80FFD000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD797CE000
trusted library allocation
page read and write
1DD6EE20000
heap
page read and write
1DD80FD1000
trusted library allocation
page read and write
1DD78BE8000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD79173000
trusted library allocation
page read and write
1DD78E3A000
trusted library allocation
page read and write
1DD79173000
trusted library allocation
page read and write
1DD79259000
trusted library allocation
page read and write
1DD78B55000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1DD7A27D000
trusted library allocation
page read and write
1DD6EE23000
heap
page read and write
162E000
heap
page read and write
1DD7FF71000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD7797C000
heap
page read and write
1F163903000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
1DD776C8000
trusted library allocation
page read and write
1DD78E45000
trusted library allocation
page read and write
1F16387B000
trusted library allocation
page read and write
1DD81861000
trusted library allocation
page read and write
1DD77B52000
trusted library allocation
page read and write
1DD77963000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE52000
heap
page read and write
26387EE3000
heap
page read and write
1DD780E7000
trusted library allocation
page read and write
1DD7B3FC000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD789A8000
trusted library allocation
page read and write
1DD77936000
heap
page read and write
1DD77D7D000
trusted library allocation
page read and write
1DD73E13000
trusted library allocation
page read and write
1DD7B66E000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD74DDF000
trusted library allocation
page read and write
1DD79B4E000
trusted library allocation
page read and write
1DD811E1000
trusted library allocation
page read and write
1DD77B4B000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD75031000
trusted library allocation
page read and write
1DD6EE87000
heap
page read and write
1DD77DCC000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD7929E000
trusted library allocation
page read and write
1DD78E58000
trusted library allocation
page read and write
1DD79150000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
1DD80192000
trusted library allocation
page read and write
1DD79FE7000
trusted library allocation
page read and write
1DD789E0000
trusted library allocation
page read and write
1DD7FD4F000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD80FEB000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD83C16000
trusted library allocation
page read and write
1DD7A9F9000
trusted library allocation
page read and write
1DD7C021000
heap
page read and write
1DD7FE27000
trusted library allocation
page read and write
1DD818BD000
trusted library allocation
page read and write
1DD808F2000
trusted library allocation
page read and write
1DD77460000
trusted library allocation
page read and write
263870A0000
trusted library allocation
page read and write
1DD77D8B000
trusted library allocation
page read and write
1DD83B39000
trusted library allocation
page read and write
1DD77689000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD7919C000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD78E64000
trusted library allocation
page read and write
1F163650000
heap
page read and write
1DD6EE72000
heap
page read and write
1F163803000
trusted library allocation
page read and write
1DD6EE52000
heap
page read and write
1544000
heap
page read and write
2638735F000
trusted library allocation
page read and write
1DD80893000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD792FD000
trusted library allocation
page read and write
1DD7883E000
trusted library allocation
page read and write
1DD7A8A9000
trusted library allocation
page read and write
1DD83BE4000
trusted library allocation
page read and write
1DD7916E000
trusted library allocation
page read and write
1DD7A759000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD79251000
trusted library allocation
page read and write
1DD6EE3F000
heap
page read and write
1DD7893B000
trusted library allocation
page read and write
1DD809A9000
trusted library allocation
page read and write
19865900000
trusted library allocation
page read and write
1DD80F53000
trusted library allocation
page read and write
1DD79763000
trusted library allocation
page read and write
1DD79274000
trusted library allocation
page read and write
1DD78FCD000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE3A000
heap
page read and write
1DD808A0000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD7B6B6000
trusted library allocation
page read and write
1DD78869000
trusted library allocation
page read and write
AAD1F0C000
stack
page read and write
1DD77DEE000
trusted library allocation
page read and write
1DD79150000
trusted library allocation
page read and write
1DD7918D000
trusted library allocation
page read and write
1DD7B6D8000
trusted library allocation
page read and write
1DD788C3000
trusted library allocation
page read and write
1DD80FA1000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD78936000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7FE3C000
trusted library allocation
page read and write
1DD75048000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7FE05000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD7C021000
heap
page read and write
1DD78CE0000
trusted library allocation
page read and write
1DD776C8000
trusted library allocation
page read and write
59BCEB8000
stack
page read and write
26387F6D000
heap
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD78017000
trusted library allocation
page read and write
218D83DD000
heap
page read and write
1DD83897000
trusted library allocation
page read and write
1DD79F5D000
trusted library allocation
page read and write
1DD814EA000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD82490000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD79276000
trusted library allocation
page read and write
1DD791D6000
trusted library allocation
page read and write
1DD8133C000
trusted library allocation
page read and write
1DD7B568000
trusted library allocation
page read and write
1DD78E61000
trusted library allocation
page read and write
1DD7FCE5000
trusted library allocation
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD78955000
trusted library allocation
page read and write
1DD824DD000
trusted library allocation
page read and write
1DD7A7EE000
trusted library allocation
page read and write
1DD801F9000
trusted library allocation
page read and write
1DD817BA000
trusted library allocation
page read and write
1DD7A737000
trusted library allocation
page read and write
26387EF1000
heap
page read and write
1DD78E22000
trusted library allocation
page read and write
1DD77DC2000
trusted library allocation
page read and write
1DD74FC6000
trusted library allocation
page read and write
15F0000
heap
page read and write
7FBFFFD000
stack
page read and write
1DD791D6000
trusted library allocation
page read and write
1DD80F09000
trusted library allocation
page read and write
1DD838A2000
trusted library allocation
page read and write
1DD7A7EE000
trusted library allocation
page read and write
26386E14000
remote allocation
page execute read
1DD6EE21000
heap
page read and write
1DD796FE000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD77D83000
trusted library allocation
page read and write
1DD79173000
trusted library allocation
page read and write
1DD77B97000
trusted library allocation
page read and write
670000
unkown
page readonly
1DD6EE1E000
heap
page read and write
1DD7797C000
heap
page read and write
1DD7B672000
trusted library allocation
page read and write
1DD6EE6D000
heap
page read and write
1DD6EE2A000
heap
page read and write
1DD7B5A9000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD80070000
trusted library allocation
page read and write
1DD792B8000
trusted library allocation
page read and write
1DD8136D000
trusted library allocation
page read and write
1DD797D0000
trusted library allocation
page read and write
1DD7A980000
trusted library allocation
page read and write
1DD81390000
trusted library allocation
page read and write
1F163860000
trusted library allocation
page read and write
1DD791ED000
trusted library allocation
page read and write
1DD74D66000
trusted library allocation
page read and write
1DD7913A000
trusted library allocation
page read and write
1DD791D7000
trusted library allocation
page read and write
1DD790EF000
trusted library allocation
page read and write
1DD80F44000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD8136D000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD7FEC2000
trusted library allocation
page read and write
1DD78E36000
trusted library allocation
page read and write
1DD77CCE000
trusted library allocation
page read and write
1DD77CA5000
trusted library allocation
page read and write
1DD77B63000
trusted library allocation
page read and write
18CEB4C3000
trusted library allocation
page read and write
1DD79294000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE0E000
heap
page read and write
1DD791C9000
trusted library allocation
page read and write
26387F22000
heap
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
59BDFFE000
stack
page read and write
1DD6EE04000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD7B34D000
trusted library allocation
page read and write
1DD7A2DF000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD74DF1000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD815E3000
trusted library allocation
page read and write
1DD74F92000
trusted library allocation
page read and write
1F16385B000
trusted library allocation
page read and write
1DD80F92000
trusted library allocation
page read and write
163E000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE21000
heap
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD8385F000
trusted library allocation
page read and write
1DD6EE19000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD7803D000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD83BDE000
trusted library allocation
page read and write
1DD792E5000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD792AA000
trusted library allocation
page read and write
1DD7A7C1000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD7FD86000
trusted library allocation
page read and write
1DD79259000
trusted library allocation
page read and write
26387EE0000
heap
page read and write
1DD7FD51000
trusted library allocation
page read and write
2638736F000
trusted library allocation
page read and write
1DD801F9000
trusted library allocation
page read and write
1DD7A299000
trusted library allocation
page read and write
1DD824CF000
trusted library allocation
page read and write
1DD79274000
trusted library allocation
page read and write
1DD780FC000
trusted library allocation
page read and write
1DD80F97000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD81443000
trusted library allocation
page read and write
1DD788E6000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD74D9C000
trusted library allocation
page read and write
1DD7FF6E000
trusted library allocation
page read and write
1DD80140000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD7A3E9000
trusted library allocation
page read and write
1DD69D44000
heap
page read and write
263870B0000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD815DF000
trusted library allocation
page read and write
1DD838F3000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD838FD000
trusted library allocation
page read and write
1DD6EE6E000
heap
page read and write
263872F0000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE43000
heap
page read and write
1DD77B59000
trusted library allocation
page read and write
26387F6D000
heap
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7A7C8000
trusted library allocation
page read and write
1DD81315000
trusted library allocation
page read and write
1DD7A0D4000
trusted library allocation
page read and write
1DD815C4000
trusted library allocation
page read and write
1DD7B83B000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD6EE7F000
heap
page read and write
1DD6EE52000
heap
page read and write
1DD6EE20000
heap
page read and write
1DD81901000
trusted library allocation
page read and write
1DD78984000
trusted library allocation
page read and write
1DD6EE00000
heap
page read and write
7FC0FFF000
stack
page read and write
1DD789F2000
trusted library allocation
page read and write
1DD790BD000
trusted library allocation
page read and write
1DD79F4F000
trusted library allocation
page read and write
1DD7A7F4000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD789F4000
trusted library allocation
page read and write
1DD7379B000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD79259000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD80FEB000
trusted library allocation
page read and write
1DD797BA000
trusted library allocation
page read and write
1DD74DA4000
trusted library allocation
page read and write
1DD83BD6000
trusted library allocation
page read and write
1DD73E17000
trusted library allocation
page read and write
1DD80897000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD83BF5000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD7C600000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD74F95000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
1DD80883000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD792C9000
trusted library allocation
page read and write
1DD788D3000
trusted library allocation
page read and write
1DD7FF2F000
trusted library allocation
page read and write
1DD792F2000
trusted library allocation
page read and write
1DD789F8000
trusted library allocation
page read and write
1DD6EE82000
heap
page read and write
1DD7C0AD000
heap
page read and write
1DD79274000
trusted library allocation
page read and write
1DD79173000
trusted library allocation
page read and write
1DD6EE0E000
heap
page read and write
1DD81337000
trusted library allocation
page read and write
1DD6EE78000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD6EE7F000
heap
page read and write
1DD6EE42000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD7891E000
trusted library allocation
page read and write
1DD8082F000
trusted library allocation
page read and write
26387E8A000
heap
page read and write
1DD7B5D2000
trusted library allocation
page read and write
73C000
unkown
page write copy
1DD774F6000
trusted library allocation
page read and write
26387EAA000
heap
page read and write
1DD813FB000
trusted library allocation
page read and write
1DD6EE3F000
heap
page read and write
1DD838AA000
trusted library allocation
page read and write
1DD7FEB4000
trusted library allocation
page read and write
26387EF1000
heap
page read and write
1DD80FF5000
trusted library allocation
page read and write
1DD81309000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD788EA000
trusted library allocation
page read and write
1DD737FE000
trusted library allocation
page read and write
1DD74DDB000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD791D7000
trusted library allocation
page read and write
18CEB1C0000
heap
page read and write
1DD808B6000
trusted library allocation
page read and write
1DD79193000
trusted library allocation
page read and write
1DD79286000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD74DDF000
trusted library allocation
page read and write
1DD7B388000
trusted library allocation
page read and write
1DD78012000
trusted library allocation
page read and write
1DD83BEC000
trusted library allocation
page read and write
1DD801A2000
trusted library allocation
page read and write
1DD75072000
trusted library allocation
page read and write
1DD6EE80000
heap
page read and write
1DD75074000
trusted library allocation
page read and write
1DD808B6000
trusted library allocation
page read and write
70C000
unkown
page readonly
1DD7A921000
trusted library allocation
page read and write
1DD6EE41000
heap
page read and write
1DD7FDE2000
trusted library allocation
page read and write
1DD7FE96000
trusted library allocation
page read and write
1DD843B3000
trusted library allocation
page read and write
1DD6EEAA000
heap
page read and write
1DD7B837000
trusted library allocation
page read and write
1DD7A3C6000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD815DF000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7B3C5000
trusted library allocation
page read and write
1DD792B9000
trusted library allocation
page read and write
1DD7FEC8000
trusted library allocation
page read and write
1DD8136D000
trusted library allocation
page read and write
1DD7925B000
trusted library allocation
page read and write
1DD80F63000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1F163866000
trusted library allocation
page read and write
1F1635D0000
unclassified section
page readonly
1DD737BF000
trusted library allocation
page read and write
1DD7FEA8000
trusted library allocation
page read and write
1DD80FF5000
trusted library allocation
page read and write
1DD79123000
trusted library allocation
page read and write
1DD74D9C000
trusted library allocation
page read and write
13DB000
stack
page read and write
1DD6EE41000
heap
page read and write
1DD83C6B000
trusted library allocation
page read and write
1DD77D6D000
trusted library allocation
page read and write
1DD7A7C8000
trusted library allocation
page read and write
1DD6EE07000
heap
page read and write
78C153E000
stack
page read and write
1DD6EE77000
heap
page read and write
1DD79164000
trusted library allocation
page read and write
1DD83B9D000
trusted library allocation
page read and write
1DD788FC000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1F163914000
trusted library allocation
page read and write
1DD77439000
trusted library allocation
page read and write
1DD792C6000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD792B1000
trusted library allocation
page read and write
1DD7A864000
trusted library allocation
page read and write
1DD78995000
trusted library allocation
page read and write
1DD791C9000
trusted library allocation
page read and write
1F163812000
trusted library allocation
page read and write
59BDFBE000
unkown
page readonly
1DD6EE6D000
heap
page read and write
1DD78966000
trusted library allocation
page read and write
1DD6EE1F000
heap
page read and write
1DD79FD7000
trusted library allocation
page read and write
1DD800C4000
trusted library allocation
page read and write
1DD81343000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD77DC2000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD791A9000
trusted library allocation
page read and write
1DD792D1000
trusted library allocation
page read and write
1DD77A00000
trusted library allocation
page read and write
1DD7B3E7000
trusted library allocation
page read and write
1DD7B353000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD809FB000
trusted library allocation
page read and write
1DD796D7000
trusted library allocation
page read and write
1DD74D66000
trusted library allocation
page read and write
1DD78082000
trusted library allocation
page read and write
1DD83BCD000
trusted library allocation
page read and write
1DD792C0000
trusted library allocation
page read and write
1DD808B3000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD73DF6000
trusted library allocation
page read and write
1DD8082D000
trusted library allocation
page read and write
1DD6EE31000
heap
page read and write
1DD77BAF000
trusted library allocation
page read and write
1DD789C3000
trusted library allocation
page read and write
1DD6EE43000
heap
page read and write
1DD78040000
trusted library allocation
page read and write
1DD80F71000
trusted library allocation
page read and write
1DD77969000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD813C3000
trusted library allocation
page read and write
1DD7FE33000
trusted library allocation
page read and write
1DD6EE4C000
heap
page read and write
1DD824CB000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD737B3000
trusted library allocation
page read and write
1DD780F2000
trusted library allocation
page read and write
18CEB80C000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD78E2E000
trusted library allocation
page read and write
1DD77DD0000
trusted library allocation
page read and write
1DD83CA8000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD788BF000
trusted library allocation
page read and write
1DD80F8D000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD6EE78000
heap
page read and write
1DD7B6D0000
trusted library allocation
page read and write
1DD83CF8000
trusted library allocation
page read and write
1DD791FE000
trusted library allocation
page read and write
1DD797EE000
trusted library allocation
page read and write
1DD6EE6B000
heap
page read and write
1DD6EE07000
heap
page read and write
1DD7B5D2000
trusted library allocation
page read and write
18CEB07C000
remote allocation
page execute read
1DD8136D000
trusted library allocation
page read and write
1DD797DA000
trusted library allocation
page read and write
1DD8389F000
trusted library allocation
page read and write
1DD7B829000
trusted library allocation
page read and write
1DD80FCE000
trusted library allocation
page read and write
1DD80F44000
trusted library allocation
page read and write
671000
unkown
page execute read
1DD8088D000
trusted library allocation
page read and write
1DD797E0000
trusted library allocation
page read and write
1DD74DF1000
trusted library allocation
page read and write
1DD7FECA000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE16000
heap
page read and write
1DD79649000
trusted library allocation
page read and write
18CEB700000
trusted library allocation
page read and write
1DD7B6B3000
trusted library allocation
page read and write
1DD77DDF000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD7B6BA000
trusted library allocation
page read and write
1DD780CA000
trusted library allocation
page read and write
1DD80F47000
trusted library allocation
page read and write
1DD80880000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD79162000
trusted library allocation
page read and write
1DD792FD000
trusted library allocation
page read and write
1DD6EE53000
heap
page read and write
1DD6EE00000
heap
page read and write
1DD7795B000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD7914D000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
161F000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD8187E000
trusted library allocation
page read and write
1DD81583000
trusted library allocation
page read and write
1DD79170000
trusted library allocation
page read and write
1DD7883B000
trusted library allocation
page read and write
1DD8001C000
trusted library allocation
page read and write
1DD79162000
trusted library allocation
page read and write
1DD6EE27000
heap
page read and write
DDE000
stack
page read and write
1DD6EE46000
heap
page read and write
1DD792A6000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD6EE1D000
heap
page read and write
1DD7A1DF000
trusted library allocation
page read and write
1DD77C8E000
trusted library allocation
page read and write
1DD824CB000
trusted library allocation
page read and write
1DD800EE000
trusted library allocation
page read and write
1DD791D6000
trusted library allocation
page read and write
1DD6EE42000
heap
page read and write
1DD809AF000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
218D9EB8000
heap
page read and write
1544000
heap
page read and write
26387EE3000
heap
page read and write
1DD6EE2F000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD6EE3E000
heap
page read and write
1DD77952000
heap
page read and write
1DD6EE53000
heap
page read and write
1DD801CB000
trusted library allocation
page read and write
1DD6EE3A000
heap
page read and write
1DD78F81000
trusted library allocation
page read and write
1DD7A3A0000
trusted library allocation
page read and write
1DD792D3000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD789AD000
trusted library allocation
page read and write
1DD792E4000
trusted library allocation
page read and write
1DD77963000
heap
page read and write
1DD6EE3C000
heap
page read and write
1DD77968000
heap
page read and write
1DD78E4A000
trusted library allocation
page read and write
1DD8384E000
trusted library allocation
page read and write
59BCDFE000
unkown
page readonly
1DD78E6D000
trusted library allocation
page read and write
1DD780B6000
trusted library allocation
page read and write
1DD7FEB0000
trusted library allocation
page read and write
1DD791C9000
trusted library allocation
page read and write
1DD77DCC000
trusted library allocation
page read and write
1DD80F6B000
trusted library allocation
page read and write
1DD74DA4000
trusted library allocation
page read and write
1DD780DD000
trusted library allocation
page read and write
1DD81317000
trusted library allocation
page read and write
26387920000
heap
page read and write
1DD83DB1000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7FE18000
trusted library allocation
page read and write
1DD78E4C000
trusted library allocation
page read and write
26387EE8000
heap
page read and write
1DD80FFD000
trusted library allocation
page read and write
1DD792C7000
trusted library allocation
page read and write
1DD838F0000
trusted library allocation
page read and write
1DD80817000
trusted library allocation
page read and write
1DD7971A000
trusted library allocation
page read and write
1DD7917B000
trusted library allocation
page read and write
1DD7A7F4000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD7796D000
heap
page read and write
1DD74DDB000
trusted library allocation
page read and write
1DD79FFE000
trusted library allocation
page read and write
1DD80F8D000
trusted library allocation
page read and write
1DD73D23000
trusted library allocation
page read and write
1DD78E45000
trusted library allocation
page read and write
1DD80FC3000
trusted library allocation
page read and write
18CEB4A1000
trusted library allocation
page read and write
18CEB1E0000
heap
page read and write
1DD6EE72000
heap
page read and write
1DD7B50E000
trusted library allocation
page read and write
1DD6EE3C000
heap
page read and write
1DD6EE32000
heap
page read and write
1DD788B3000
trusted library allocation
page read and write
263873C2000
trusted library allocation
page read and write
1DD6EE72000
heap
page read and write
1DD78079000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
26387E60000
heap
page read and write
18CEB415000
trusted library allocation
page read and write
1DD6EE7F000
heap
page read and write
1DD77D83000
trusted library allocation
page read and write
1DD7A9DF000
trusted library allocation
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD77C5A000
trusted library allocation
page read and write
1DD7FD3C000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD81565000
trusted library allocation
page read and write
1DD83B4D000
trusted library allocation
page read and write
1DD78E3E000
trusted library allocation
page read and write
1DD8082C000
trusted library allocation
page read and write
1DD78E47000
trusted library allocation
page read and write
1DD791C1000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7C021000
heap
page read and write
1DD6EE41000
heap
page read and write
1DD6EE46000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD6EE1A000
heap
page read and write
1DD6EE20000
heap
page read and write
1DD83BDB000
trusted library allocation
page read and write
19865A07000
trusted library allocation
page read and write
1DD789A5000
trusted library allocation
page read and write
1DD7796D000
heap
page read and write
1DD80FE6000
trusted library allocation
page read and write
1DD7A928000
trusted library allocation
page read and write
1DD808FA000
trusted library allocation
page read and write
1DD6EE48000
heap
page read and write
1DD6EE48000
heap
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD7960B000
trusted library allocation
page read and write
1DD7916F000
trusted library allocation
page read and write
1DD7885D000
trusted library allocation
page read and write
1DD7A8DC000
trusted library allocation
page read and write
1DD77C9E000
trusted library allocation
page read and write
1DD77C6D000
trusted library allocation
page read and write
1DD6EE32000
heap
page read and write
1DD789A8000
trusted library allocation
page read and write
1DD79198000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD796D2000
trusted library allocation
page read and write
1DD79138000
trusted library allocation
page read and write
1DD79236000
trusted library allocation
page read and write
1DD780E8000
trusted library allocation
page read and write
1DD6EE1A000
heap
page read and write
1DD808ED000
trusted library allocation
page read and write
1DD6EE73000
heap
page read and write
1DD79198000
trusted library allocation
page read and write
1DD7805A000
trusted library allocation
page read and write
1DD7A3B8000
trusted library allocation
page read and write
1DD7B683000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD818F7000
trusted library allocation
page read and write
1DD8084B000
trusted library allocation
page read and write
1DD6EE6A000
heap
page read and write
1DD7918D000
trusted library allocation
page read and write
1DD7926C000
trusted library allocation
page read and write
1DD6EE77000
heap
page read and write
1DD808FA000
trusted library allocation
page read and write
1DD7FDB4000
trusted library allocation
page read and write
1DD818F7000
trusted library allocation
page read and write
1DD81680000
trusted library allocation
page read and write
218D9EAC000
heap
page read and write
1DD6EE6A000
heap
page read and write
1DD7741B000
trusted library allocation
page read and write
26387323000
trusted library allocation
page read and write
1DD791A5000
trusted library allocation
page read and write
1DD7FDC8000
trusted library allocation
page read and write
1DD79155000
trusted library allocation
page read and write
1DD6EE21000
heap
page read and write
1DD7918A000
trusted library allocation
page read and write
1DD7914F000
trusted library allocation
page read and write
1DD7FD98000
trusted library allocation
page read and write
1DD7FED2000
trusted library allocation
page read and write
1DD6EE46000
heap
page read and write
1DD81885000
trusted library allocation
page read and write
1DD80817000
trusted library allocation
page read and write
1DD78895000
trusted library allocation
page read and write
1DD7B3E7000
trusted library allocation
page read and write
There are 3878 hidden memdumps, click here to show them.