IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_e2e6f87c-8106-4e54-89f8-914cd0653fbb.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_e2e6f87c-8106-4e54-89f8-914cd0653fbb.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BL8R07ZCWCRZBXTB55X5.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SFF5UO3UKOK0M4S8WU53.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88431419-431f-449e-bac4-71b5cf1fdcda} 7940 "\\.\pipe\gecko-crash-server-pipe.7940" 2ca2cf6eb10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4380 -parentBuildID 20230927232528 -prefsHandle 876 -prefMapHandle 1040 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c29d4d0f-f96b-4cd9-b96a-0f109be8bb1f} 7940 "\\.\pipe\gecko-crash-server-pipe.7940" 2ca3f0f6010 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5424 -prefMapHandle 5432 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72d13148-600e-45f3-99e5-72b76429e2d6} 7940 "\\.\pipe\gecko-crash-server-pipe.7940" 2ca484bb110 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
http://crl3.digice
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://getpocket.com/recommendations
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
unknown
https://lit.dev/docs/templates/directives/#stylemap
unknown
https://push.services.mozilla.com
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2CA44EDC000
trusted library allocation
page read and write
2CA3DFDA000
trusted library allocation
page read and write
2CA33C04000
heap
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA40168000
trusted library allocation
page read and write
2CA48C6A000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA33CBA000
heap
page read and write
2CA33C2F000
heap
page read and write
2CA33C72000
heap
page read and write
2CA3DF21000
trusted library allocation
page read and write
2CA3D5ED000
trusted library allocation
page read and write
1E5D1D8000
stack
page read and write
2CA33C32000
heap
page read and write
2CA4044E000
trusted library allocation
page read and write
2CA44DB1000
trusted library allocation
page read and write
2CA404B0000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3F4D1000
trusted library allocation
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA48C77000
trusted library allocation
page read and write
2CA401CB000
trusted library allocation
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA3D549000
trusted library allocation
page read and write
2CA3D9D1000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA404B0000
trusted library allocation
page read and write
2CA3DFB0000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA3DFDA000
trusted library allocation
page read and write
2CA3CD87000
trusted library allocation
page read and write
2CA4012D000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3E423000
trusted library allocation
page read and write
1154000
heap
page read and write
193A5A76000
heap
page read and write
2CA3E53E000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33CA0000
heap
page read and write
265E5280000
heap
page read and write
2CA475C1000
trusted library allocation
page read and write
2CA3C932000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA3FFAA000
trusted library allocation
page read and write
2CA404B9000
trusted library allocation
page read and write
2CA3F4C8000
trusted library allocation
page read and write
2CA3E590000
trusted library allocation
page read and write
2CA455DB000
trusted library allocation
page read and write
2CA48C73000
trusted library allocation
page read and write
2CA3FFC2000
trusted library allocation
page read and write
2CA48CD6000
trusted library allocation
page read and write
2CA3CF1B000
trusted library allocation
page read and write
2CA4059A000
trusted library allocation
page read and write
2CA3CEA7000
trusted library allocation
page read and write
2CA3F652000
trusted library allocation
page read and write
2CA480E2000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA3E6C6000
trusted library allocation
page read and write
2CA33C33000
heap
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA44C3C000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA3CD40000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA3F02E000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA3F2E9000
trusted library allocation
page read and write
2CA3E41C000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA3F3EE000
trusted library allocation
page read and write
2CA3E365000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA3C831000
trusted library allocation
page read and write
2CA3F3E0000
trusted library allocation
page read and write
193A66E3000
heap
page read and write
4B6AD3E000
stack
page read and write
C87C7E000
stack
page read and write
2CA33C71000
heap
page read and write
2CA3F435000
trusted library allocation
page read and write
2CA33CAC000
heap
page read and write
4B68BD8000
stack
page read and write
2CA33C6B000
heap
page read and write
2CA3DAA6000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
2CA487F7000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA3E572000
trusted library allocation
page read and write
1B5CB20A000
heap
page read and write
2CA3F2D0000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
193A5720000
heap
page read and write
2CA33CA2000
heap
page read and write
2CA33CA8000
heap
page read and write
2CA3E48D000
trusted library allocation
page read and write
2CA33C04000
heap
page read and write
193A596F000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA38D00000
trusted library allocation
page read and write
2CA3D54F000
trusted library allocation
page read and write
2CA40575000
trusted library allocation
page read and write
2CA4736B000
trusted library allocation
page read and write
14905903000
trusted library allocation
page read and write
2CA48409000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA44DB8000
trusted library allocation
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA4056A000
trusted library allocation
page read and write
193A5610000
heap
page read and write
2CA3D5E4000
trusted library allocation
page read and write
2CA40BE5000
trusted library allocation
page read and write
193A666C000
heap
page read and write
2CA33C35000
heap
page read and write
2CA3F4A1000
trusted library allocation
page read and write
2CA3A3F1000
heap
page read and write
2CA3CFC9000
trusted library allocation
page read and write
2CA3CDA7000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3E3D4000
trusted library allocation
page read and write
14905896000
trusted library allocation
page read and write
2CA3DF78000
trusted library allocation
page read and write
2CA3F5F2000
trusted library allocation
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA40484000
trusted library allocation
page read and write
2CA3F1AD000
trusted library allocation
page read and write
135A000
heap
page read and write
1490568A000
heap
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA3F271000
trusted library allocation
page read and write
2CA40F89000
trusted library allocation
page read and write
2CA476A8000
trusted library allocation
page read and write
14905680000
heap
page read and write
2CA3F2AA000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
2CA3DAA8000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA3F635000
trusted library allocation
page read and write
2CA3D7F1000
trusted library allocation
page read and write
2CA3DF36000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA33C73000
heap
page read and write
2CA3F6A1000
trusted library allocation
page read and write
2CA48C83000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA385C5000
trusted library allocation
page read and write
2472E1FA000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3F5BF000
trusted library allocation
page read and write
2CA38B2F000
trusted library allocation
page read and write
2CA3D95F000
trusted library allocation
page read and write
2CA3E5E1000
trusted library allocation
page read and write
2CA3E4C7000
trusted library allocation
page read and write
2CA3F592000
trusted library allocation
page read and write
2CA3E3D6000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3F677000
trusted library allocation
page read and write
2CA3DF19000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3CF9A000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA3F4D1000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA480DC000
trusted library allocation
page read and write
2CA3FFF3000
trusted library allocation
page read and write
2CA45580000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E4E0000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C80000
heap
page read and write
2CA33C87000
heap
page read and write
2CA40BEC000
trusted library allocation
page read and write
2CA3F01D000
trusted library allocation
page read and write
2CA40BF9000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA3F4D6000
trusted library allocation
page read and write
2CA3CE72000
trusted library allocation
page read and write
2CA44E96000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
2CA38C26000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
1490593B000
trusted library allocation
page read and write
2CA33C7B000
heap
page read and write
1360000
heap
page read and write
2CA3D53B000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C87000
heap
page read and write
2CA44DFD000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3DFB0000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA44ECC000
trusted library allocation
page read and write
193A673B000
heap
page read and write
2CA3DADF000
trusted library allocation
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA487F7000
trusted library allocation
page read and write
2CA33CAE000
heap
page read and write
2CA47387000
trusted library allocation
page read and write
2CA3E3C0000
trusted library allocation
page read and write
2CA33C54000
heap
page read and write
2CA33CA8000
heap
page read and write
193A5969000
trusted library allocation
page read and write
2CA3FFE2000
trusted library allocation
page read and write
2CA3CED3000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA48076000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA3E582000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3A3BD000
heap
page read and write
2CA3FFC8000
trusted library allocation
page read and write
2CA4762B000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA3F5F7000
trusted library allocation
page read and write
2CA3F2DF000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C20000
heap
page read and write
2CA3DA3E000
trusted library allocation
page read and write
2CA48733000
trusted library allocation
page read and write
2CA3F5F4000
trusted library allocation
page read and write
14905A05000
heap
page read and write
2CA44E9F000
trusted library allocation
page read and write
2CA3DF2F000
trusted library allocation
page read and write
2CA4554C000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
2CA3DA5B000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA3A413000
heap
page read and write
2CA45520000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33CBF000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3A3F4000
heap
page read and write
2CA403BA000
trusted library allocation
page read and write
193A66EE000
heap
page read and write
2CA33C69000
heap
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA3F2D7000
trusted library allocation
page read and write
2CA3F6F7000
trusted library allocation
page read and write
2CA3FFCF000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA480F9000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
9A0000
heap
page read and write
2CA3F183000
trusted library allocation
page read and write
1B5CCCAE000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C25000
heap
page read and write
2CA3DA2E000
trusted library allocation
page read and write
2CA45520000
trusted library allocation
page read and write
193A676C000
heap
page read and write
2CA3A3F7000
heap
page read and write
2CA3E384000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA44DDD000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA44DE8000
trusted library allocation
page read and write
2CA3F695000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA4045B000
trusted library allocation
page read and write
2CA3E4D0000
trusted library allocation
page read and write
110E000
stack
page read and write
2CA33C3B000
heap
page read and write
1B5CCCA7000
heap
page read and write
2CA33C32000
heap
page read and write
2CA487EF000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA3D96B000
trusted library allocation
page read and write
2CA487D3000
trusted library allocation
page read and write
2CA33C31000
heap
page read and write
2CA3E5D6000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3F5EE000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA3E41C000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA4848E000
trusted library allocation
page read and write
2CA45551000
trusted library allocation
page read and write
2CA40F85000
trusted library allocation
page read and write
2CA473FB000
trusted library allocation
page read and write
2CA33C4A000
heap
page read and write
2CA3CE49000
trusted library allocation
page read and write
2CA3E46C000
trusted library allocation
page read and write
2CA40543000
trusted library allocation
page read and write
2CA3DF21000
trusted library allocation
page read and write
2CA4045B000
trusted library allocation
page read and write
2CA33CBA000
heap
page read and write
2CA3F639000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA39EA0000
trusted library allocation
page read and write
2CA484CB000
trusted library allocation
page read and write
2CA33CA5000
heap
page read and write
2CA3E4C5000
trusted library allocation
page read and write
2CA4017E000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA44EB8000
trusted library allocation
page read and write
2CA47685000
trusted library allocation
page read and write
1154000
heap
page read and write
193A66EE000
heap
page read and write
193A66E1000
heap
page read and write
2CA44C2D000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA4736B000
trusted library allocation
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA45519000
trusted library allocation
page read and write
2CA3DB23000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44EB4000
trusted library allocation
page read and write
2CA3E36D000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C80000
heap
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA3F405000
trusted library allocation
page read and write
1B5CB400000
trusted library allocation
page read and write
193A5A70000
heap
page read and write
2CA3F667000
trusted library allocation
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3DBE5000
trusted library allocation
page read and write
2CA3F535000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3CDD0000
trusted library allocation
page read and write
2CA40562000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3F1C8000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C80000
heap
page read and write
3B50000
trusted library allocation
page read and write
2CA40198000
trusted library allocation
page read and write
2CA40F61000
trusted library allocation
page read and write
2472E603000
trusted library allocation
page read and write
136F000
heap
page read and write
2CA33C60000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA48C65000
trusted library allocation
page read and write
2CA3F677000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33C30000
heap
page read and write
2CA33C34000
heap
page read and write
2CA40142000
trusted library allocation
page read and write
2CA48749000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C5A000
heap
page read and write
2CA33C76000
heap
page read and write
2CA33C68000
heap
page read and write
2CA3D567000
trusted library allocation
page read and write
2CA3F4F6000
trusted library allocation
page read and write
68309FF000
stack
page read and write
2CA3E3DD000
trusted library allocation
page read and write
1490565F000
unclassified section
page read and write
2CA3CF35000
trusted library allocation
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C25000
heap
page read and write
2CA3E484000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
2CA3F596000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA3F42D000
trusted library allocation
page read and write
2CA4045F000
trusted library allocation
page read and write
2CA33C46000
heap
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3FFBB000
trusted library allocation
page read and write
2CA3E40A000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33CAB000
heap
page read and write
2CA4045F000
trusted library allocation
page read and write
193A667D000
heap
page read and write
2CA3E3CC000
trusted library allocation
page read and write
2CA44EB8000
trusted library allocation
page read and write
2CA3E441000
trusted library allocation
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA3D7F0000
trusted library allocation
page read and write
2CA405A1000
trusted library allocation
page read and write
2CA3CDD0000
trusted library allocation
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA3E4AA000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
894000
unkown
page readonly
2CA39CF5000
trusted library allocation
page read and write
2CA33C2F000
heap
page read and write
2CA3F1C8000
trusted library allocation
page read and write
193A668A000
heap
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
149055D0000
heap
page read and write
2CA484CE000
trusted library allocation
page read and write
2CA3F631000
trusted library allocation
page read and write
2CA3CDA7000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA3E3CB000
trusted library allocation
page read and write
2CA3DA3E000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
2CA45558000
trusted library allocation
page read and write
2CA38C82000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3F5FD000
trusted library allocation
page read and write
2CA3E668000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA44DF7000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA44C44000
trusted library allocation
page read and write
2CA4056D000
trusted library allocation
page read and write
2CA3A3F8000
heap
page read and write
2CA33CBA000
heap
page read and write
7C1000
unkown
page execute read
2CA33CA0000
heap
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA3F2AA000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA33C69000
heap
page read and write
2CA3E356000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3D5BB000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455C5000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA3EF91000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA3E3B4000
trusted library allocation
page read and write
2CA3CF1F000
trusted library allocation
page read and write
2CA39E9A000
trusted library allocation
page read and write
2CA40316000
trusted library allocation
page read and write
2CA33C43000
heap
page read and write
2CA3DBB2000
trusted library allocation
page read and write
2CA484CB000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA33C31000
heap
page read and write
2CA3FFC8000
trusted library allocation
page read and write
2CA3DBC4000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA39B65000
trusted library allocation
page read and write
2CA3D7C7000
trusted library allocation
page read and write
149058C8000
trusted library allocation
page read and write
149054A0000
unclassified section
page readonly
2CA33C5A000
heap
page read and write
2CA33C7A000
heap
page read and write
2CA3E668000
trusted library allocation
page read and write
2CA385C7000
trusted library allocation
page read and write
2CA3F5FD000
trusted library allocation
page read and write
193A66A1000
heap
page read and write
2CA3D55E000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA44DA6000
trusted library allocation
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3D7E5000
trusted library allocation
page read and write
2CA4555D000
trusted library allocation
page read and write
149054C0000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3D6A3000
trusted library allocation
page read and write
2CA3E462000
trusted library allocation
page read and write
2CA484CE000
trusted library allocation
page read and write
68331FE000
stack
page read and write
2CA3EFD7000
trusted library allocation
page read and write
2CA33CB1000
heap
page read and write
2CA33C30000
heap
page read and write
2CA3E5DE000
trusted library allocation
page read and write
193A6660000
heap
page read and write
2CA40BFD000
trusted library allocation
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA33CAB000
heap
page read and write
68309FB000
stack
page read and write
2CA3F6EE000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3F6D1000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C68000
heap
page read and write
2CA45593000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C3B000
heap
page read and write
2CA3CE8C000
trusted library allocation
page read and write
193A5800000
trusted library allocation
page read and write
2CA33CAB000
heap
page read and write
68319FE000
stack
page read and write
2CA33C44000
heap
page read and write
2CA3F645000
trusted library allocation
page read and write
2CA3F0D7000
trusted library allocation
page read and write
2CA3CEA4000
trusted library allocation
page read and write
2472E050000
heap
page read and write
2CA39EAF000
trusted library allocation
page read and write
2CA3E462000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA48C77000
trusted library allocation
page read and write
2CA3E47E000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA3D557000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA48C77000
trusted library allocation
page read and write
2CA40BC5000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA33C35000
heap
page read and write
2CA487D3000
trusted library allocation
page read and write
2CA3A427000
heap
page read and write
2CA4872F000
trusted library allocation
page read and write
2CA3FFE1000
trusted library allocation
page read and write
2CA3E430000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3DA5B000
trusted library allocation
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA4768B000
trusted library allocation
page read and write
14905823000
trusted library allocation
page read and write
2CA3F4D4000
trusted library allocation
page read and write
9914FFF000
stack
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA3F6B2000
trusted library allocation
page read and write
99157FE000
stack
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA44EB8000
trusted library allocation
page read and write
2472E700000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA33CBA000
heap
page read and write
2CA33C42000
heap
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA4840B000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA3F5FD000
trusted library allocation
page read and write
2CA473BD000
trusted library allocation
page read and write
2CA33C67000
heap
page read and write
2CA3DFAA000
trusted library allocation
page read and write
2CA3CED3000
trusted library allocation
page read and write
2CA3E447000
trusted library allocation
page read and write
2CA44ECC000
trusted library allocation
page read and write
2CA3DF23000
trusted library allocation
page read and write
2CA45524000
trusted library allocation
page read and write
2CA44DA0000
trusted library allocation
page read and write
1E5C78E000
unkown
page readonly
2CA3D5A0000
trusted library allocation
page read and write
2CA4847B000
trusted library allocation
page read and write
2CA3F5EE000
trusted library allocation
page read and write
1B5CB180000
heap
page read and write
2CA48432000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
2CA44C37000
trusted library allocation
page read and write
2CA3EFFD000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3DAAD000
trusted library allocation
page read and write
2CA3E3C8000
trusted library allocation
page read and write
2CA45580000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C2E000
heap
page read and write
2CA3F5FB000
trusted library allocation
page read and write
2CA40495000
trusted library allocation
page read and write
2CA3E593000
trusted library allocation
page read and write
193A55B0000
unclassified section
page readonly
2CA404E6000
trusted library allocation
page read and write
2CA44E9F000
trusted library allocation
page read and write
2CA3D5B6000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2472E1C2000
unclassified section
page read and write
2CA33C24000
heap
page read and write
2CA3D7E7000
trusted library allocation
page read and write
2CA3DF7E000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C3C000
heap
page read and write
2CA401D6000
trusted library allocation
page read and write
2CA3DF2B000
trusted library allocation
page read and write
2CA33C31000
heap
page read and write
2CA47364000
trusted library allocation
page read and write
2CA487C5000
trusted library allocation
page read and write
2CA3DF3D000
trusted library allocation
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA3A3FD000
heap
page read and write
2CA33C7B000
heap
page read and write
2CA3D5BB000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C78000
heap
page read and write
2CA3E688000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C80000
heap
page read and write
1384000
heap
page read and write
2CA476B4000
trusted library allocation
page read and write
2CA3F4CC000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA413B8000
heap
page read and write
2CA33C74000
heap
page read and write
2CA48769000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3CEF9000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA3D58B000
trusted library allocation
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44D49000
trusted library allocation
page read and write
2CA3F29C000
trusted library allocation
page read and write
2CA4173B000
trusted library allocation
page read and write
2CA3FF38000
trusted library allocation
page read and write
2CA3F405000
trusted library allocation
page read and write
2CA3CDD0000
trusted library allocation
page read and write
193A595F000
trusted library allocation
page read and write
2CA3E6F1000
trusted library allocation
page read and write
2CA3D5DF000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA41371000
heap
page read and write
2CA4011E000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA480F9000
trusted library allocation
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3F4AE000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
2CA404B0000
trusted library allocation
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA44DB3000
trusted library allocation
page read and write
2CA33C3A000
heap
page read and write
2CA4135C000
heap
page read and write
2CA33C24000
heap
page read and write
2CA48C65000
trusted library allocation
page read and write
2CA48EE1000
trusted library allocation
page read and write
2CA3DA44000
trusted library allocation
page read and write
2CA3E41A000
trusted library allocation
page read and write
2CA44EB4000
trusted library allocation
page read and write
3A51000
heap
page read and write
193A6700000
heap
page read and write
2CA3E40A000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
193A6660000
heap
page read and write
2CA3F54B000
trusted library allocation
page read and write
2CA3F2D8000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA3D71D000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3CF86000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA40545000
trusted library allocation
page read and write
2CA3F5E4000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA3F4B0000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
193A6744000
heap
page read and write
2CA3CEE1000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3E4A7000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA44EB8000
trusted library allocation
page read and write
2472E80C000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
99147FF000
stack
page read and write
2CA3DBD8000
trusted library allocation
page read and write
2CA404D8000
trusted library allocation
page read and write
1352000
heap
page read and write
2CA33CA8000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3C9F6000
trusted library allocation
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C71000
heap
page read and write
2CA385F9000
trusted library allocation
page read and write
2CA48E96000
trusted library allocation
page read and write
2CA3D533000
trusted library allocation
page read and write
2CA3DBBC000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA3E642000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA33C5A000
heap
page read and write
2CA44C7B000
trusted library allocation
page read and write
193A5964000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA4059A000
trusted library allocation
page read and write
2CA3C989000
trusted library allocation
page read and write
1490585D000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C21000
heap
page read and write
2CA33C24000
heap
page read and write
2CA44EC3000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3E4AD000
trusted library allocation
page read and write
2CA3DA9A000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3A3E6000
heap
page read and write
2CA3E345000
trusted library allocation
page read and write
FBF000
stack
page read and write
2CA38C1E000
trusted library allocation
page read and write
2CA3F269000
trusted library allocation
page read and write
2CA3F05E000
trusted library allocation
page read and write
2CA44C79000
trusted library allocation
page read and write
2CA3DAA6000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA3F6EE000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C57000
heap
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA3E3BD000
trusted library allocation
page read and write
1B5CCCA9000
heap
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
193A5981000
trusted library allocation
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA40572000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA4876D000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA48481000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E6EF000
trusted library allocation
page read and write
2CA3C9D1000
trusted library allocation
page read and write
2CA3CE76000
trusted library allocation
page read and write
2CA3F1CF000
trusted library allocation
page read and write
2CA3E4B2000
trusted library allocation
page read and write
2CA39E82000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
1382000
heap
page read and write
2CA39CA8000
trusted library allocation
page read and write
149058B7000
trusted library allocation
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA3E3EF000
trusted library allocation
page read and write
2CA3DBD8000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA3E35B000
trusted library allocation
page read and write
2CA3DADF000
trusted library allocation
page read and write
2CA44FE8000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA40EB6000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA4012D000
trusted library allocation
page read and write
2CA3D5BB000
trusted library allocation
page read and write
2CA3E4D0000
trusted library allocation
page read and write
2CA3DBEF000
trusted library allocation
page read and write
2CA3DF78000
trusted library allocation
page read and write
2472E350000
unclassified section
page readonly
2CA484B3000
trusted library allocation
page read and write
2CA33C42000
heap
page read and write
2CA3E4D9000
trusted library allocation
page read and write
2CA40451000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA48C1C000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3D71D000
trusted library allocation
page read and write
2CA40162000
trusted library allocation
page read and write
2CA3E655000
trusted library allocation
page read and write
2CA3EEBA000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA3A42D000
heap
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA455F5000
trusted library allocation
page read and write
85C000
unkown
page readonly
2CA3DB25000
trusted library allocation
page read and write
193A60E0000
heap
page read and write
2CA33C36000
heap
page read and write
2472E65D000
trusted library allocation
page read and write
2CA3E680000
trusted library allocation
page read and write
265E5190000
heap
page read and write
14905480000
remote allocation
page read and write
2CA487AF000
trusted library allocation
page read and write
2CA3DF23000
trusted library allocation
page read and write
2CA3DAE1000
trusted library allocation
page read and write
193A6777000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA3E56F000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C57000
heap
page read and write
2CA33C4B000
heap
page read and write
193A5912000
trusted library allocation
page read and write
1B5CB300000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3E45F000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
193A66E8000
heap
page read and write
2CA44D8E000
trusted library allocation
page read and write
2CA3CE92000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA33C71000
heap
page read and write
193A665C000
heap
page read and write
2CA3D597000
trusted library allocation
page read and write
2CA33C74000
heap
page read and write
2CA40137000
trusted library allocation
page read and write
2CA3E5A0000
trusted library allocation
page read and write
2CA3F541000
trusted library allocation
page read and write
2CA3CF27000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3A426000
heap
page read and write
2CA33C69000
heap
page read and write
2CA3E4DF000
trusted library allocation
page read and write
2CA4807C000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA4048B000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3DAA6000
trusted library allocation
page read and write
2CA33C7C000
heap
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA3F541000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2472E619000
trusted library allocation
page read and write
2CA3CE98000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA3DA24000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA3F6BD000
trusted library allocation
page read and write
136D000
heap
page read and write
2CA3A3F4000
heap
page read and write
2CA3D5C2000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3E4D9000
trusted library allocation
page read and write
2CA39BE1000
trusted library allocation
page read and write
2CA3E6EA000
trusted library allocation
page read and write
2CA4013E000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA45580000
trusted library allocation
page read and write
2CA3E655000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C71000
heap
page read and write
2CA3E6B7000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA44DA0000
trusted library allocation
page read and write
2CA3A3F8000
heap
page read and write
2CA4848C000
trusted library allocation
page read and write
193A672A000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA3E3EF000
trusted library allocation
page read and write
1382000
heap
page read and write
2CA33C33000
heap
page read and write
2CA40BFD000
trusted library allocation
page read and write
2472E600000
trusted library allocation
page read and write
2472E140000
heap
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
3B50000
trusted library allocation
page read and write
2CA3F3EE000
trusted library allocation
page read and write
2CA48767000
trusted library allocation
page read and write
2CA3F2CA000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA44EA0000
trusted library allocation
page read and write
2CA3E4C7000
trusted library allocation
page read and write
2CA40BE5000
trusted library allocation
page read and write
2CA40BE5000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA40495000
trusted library allocation
page read and write
1E5EA3E000
unkown
page readonly
2CA3F53A000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA48C73000
trusted library allocation
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA44DE8000
trusted library allocation
page read and write
2CA3CEDA000
trusted library allocation
page read and write
1490582E000
trusted library allocation
page read and write
2CA3E3E4000
trusted library allocation
page read and write
2CA3DFC6000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C3D000
heap
page read and write
2CA484CE000
trusted library allocation
page read and write
2CA4807A000
trusted library allocation
page read and write
2CA413E1000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA3F4B0000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA40445000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA3EECB000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33C78000
heap
page read and write
2CA33C71000
heap
page read and write
2CA33C68000
heap
page read and write
1B5CB20A000
heap
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
14905650000
unclassified section
page read and write
2CA3F4D1000
trusted library allocation
page read and write
2CA48C27000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA3C9CA000
trusted library allocation
page read and write
2CA3DA3E000
trusted library allocation
page read and write
136B000
heap
page read and write
2CA3E3BD000
trusted library allocation
page read and write
2CA33C43000
heap
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA4802A000
trusted library allocation
page read and write
2CA3DF19000
trusted library allocation
page read and write
2CA3F421000
trusted library allocation
page read and write
2CA33C7E000
heap
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA45583000
trusted library allocation
page read and write
2CA47618000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C33000
heap
page read and write
2CA33C78000
heap
page read and write
2CA405A3000
trusted library allocation
page read and write
2CA3F253000
trusted library allocation
page read and write
2CA33C4E000
heap
page read and write
2CA38C7D000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3F4CC000
trusted library allocation
page read and write
2CA3DAB4000
trusted library allocation
page read and write
2CA3D5F2000
trusted library allocation
page read and write
1330000
heap
page read and write
2CA33C21000
heap
page read and write
2CA3E633000
trusted library allocation
page read and write
2CA3DF2F000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA45520000
trusted library allocation
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA48749000
trusted library allocation
page read and write
2CA3E4AA000
trusted library allocation
page read and write
2CA33C28000
heap
page read and write
2CA3A426000
heap
page read and write
2472E611000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA404A8000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
193A5900000
trusted library allocation
page read and write
2CA3A402000
heap
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3E5B7000
trusted library allocation
page read and write
2CA3CD57000
trusted library allocation
page read and write
2CA33CB0000
heap
page read and write
2CA48CD6000
trusted library allocation
page read and write
2CA3A3BD000
heap
page read and write
2CA38581000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA33C1D000
heap
page read and write
2CA3E3EF000
trusted library allocation
page read and write
2CA3DA2C000
trusted library allocation
page read and write
2CA3D5E3000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA403EC000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
1360000
heap
page read and write
2CA3F299000
trusted library allocation
page read and write
2CA3E48D000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3E4D0000
trusted library allocation
page read and write
2CA4015B000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
2CA481EF000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA41301000
heap
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C43000
heap
page read and write
2CA33C39000
heap
page read and write
2CA33C76000
heap
page read and write
2CA33C69000
heap
page read and write
2CA33C80000
heap
page read and write
193A66EE000
heap
page read and write
2CA3A427000
heap
page read and write
2CA45524000
trusted library allocation
page read and write
193A66E0000
heap
page read and write
2CA33C5A000
heap
page read and write
2CA3E4A7000
trusted library allocation
page read and write
2CA487E7000
trusted library allocation
page read and write
193A592F000
trusted library allocation
page read and write
2CA3E48D000
trusted library allocation
page read and write
2CA3E46B000
trusted library allocation
page read and write
2CA45595000
trusted library allocation
page read and write
2CA3A413000
heap
page read and write
2CA3DA3C000
trusted library allocation
page read and write
2CA3FFCA000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA476F6000
trusted library allocation
page read and write
2CA3F58F000
trusted library allocation
page read and write
2CA39EC8000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C87000
heap
page read and write
2CA476B4000
trusted library allocation
page read and write
2CA3D72D000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA3E5D6000
trusted library allocation
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA3F26D000
trusted library allocation
page read and write
2CA3D7EB000
trusted library allocation
page read and write
2CA404B0000
trusted library allocation
page read and write
2CA3F547000
trusted library allocation
page read and write
2CA3E4D0000
trusted library allocation
page read and write
2CA3DF28000
trusted library allocation
page read and write
2CA48C73000
trusted library allocation
page read and write
2CA3D72D000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA33C25000
heap
page read and write
2CA33C21000
heap
page read and write
2CA48CF4000
trusted library allocation
page read and write
2CA3E3F9000
trusted library allocation
page read and write
193A66E0000
heap
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA33C4B000
heap
page read and write
2CA33C51000
heap
page read and write
2CA3E464000
trusted library allocation
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA3DF3D000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3D585000
trusted library allocation
page read and write
2CA4848E000
trusted library allocation
page read and write
2CA3C9B1000
trusted library allocation
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA487EF000
trusted library allocation
page read and write
2CA3DBEF000
trusted library allocation
page read and write
2CA33C42000
heap
page read and write
2CA3F53A000
trusted library allocation
page read and write
2CA3D5FC000
trusted library allocation
page read and write
2CA3FF3B000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
2CA33C24000
heap
page read and write
2472E67B000
trusted library allocation
page read and write
2CA455A3000
trusted library allocation
page read and write
2CA4057A000
trusted library allocation
page read and write
2CA4873B000
trusted library allocation
page read and write
14905660000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3E6B9000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C2C000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA3F4B9000
trusted library allocation
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA3F5CA000
trusted library allocation
page read and write
2CA3CEA6000
trusted library allocation
page read and write
1F2E000
stack
page read and write
2CA33C30000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3E414000
trusted library allocation
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA403D2000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3F59D000
trusted library allocation
page read and write
3A51000
heap
page read and write
2CA3CECF000
trusted library allocation
page read and write
2CA3F0A3000
trusted library allocation
page read and write
2CA44DF3000
trusted library allocation
page read and write
2CA33C7E000
heap
page read and write
2CA3E3C2000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3E3F9000
trusted library allocation
page read and write
193A6663000
heap
page read and write
2CA40153000
trusted library allocation
page read and write
2CA3E4B8000
trusted library allocation
page read and write
2CA3F5F1000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA33C4B000
heap
page read and write
193A650E000
trusted library allocation
page read and write
2CA3DFC6000
trusted library allocation
page read and write
1E5C74D000
stack
page read and write
2CA3DB23000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA3E68F000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33CBF000
heap
page read and write
2CA3F1B9000
trusted library allocation
page read and write
2CA3D67C000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
2CA3F3DE000
trusted library allocation
page read and write
2CA44DE6000
trusted library allocation
page read and write
2CA3F4B0000
trusted library allocation
page read and write
2CA3CD8F000
trusted library allocation
page read and write
2CA3A39E000
heap
page read and write
2CA33C1F000
heap
page read and write
2CA3DF0E000
trusted library allocation
page read and write
2CA33C54000
heap
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA40431000
trusted library allocation
page read and write
2CA45534000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C32000
heap
page read and write
1354000
heap
page read and write
2CA3E3CB000
trusted library allocation
page read and write
14905A00000
heap
page read and write
2CA3DA34000
trusted library allocation
page read and write
2CA3A42D000
heap
page read and write
2CA3E6F1000
trusted library allocation
page read and write
2CA405A1000
trusted library allocation
page read and write
1358000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3D5E3000
trusted library allocation
page read and write
2CA3E4DC000
trusted library allocation
page read and write
2CA3DA2E000
trusted library allocation
page read and write
149056C0000
unclassified section
page readonly
2CA33C87000
heap
page read and write
2CA3DA28000
trusted library allocation
page read and write
2CA44EB4000
trusted library allocation
page read and write
2CA3CF6F000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA48CE4000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C20000
heap
page read and write
2CA44C00000
trusted library allocation
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA3F659000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3D736000
trusted library allocation
page read and write
2CA3F3C5000
trusted library allocation
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA3F1B3000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3C873000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA3FFD3000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C57000
heap
page read and write
2CA3F0BB000
trusted library allocation
page read and write
2CA3DF19000
trusted library allocation
page read and write
193A66FD000
heap
page read and write
2CA4176A000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E3CB000
trusted library allocation
page read and write
2CA33C42000
heap
page read and write
2CA47701000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA48082000
trusted library allocation
page read and write
2CA33C3A000
heap
page read and write
88C000
unkown
page write copy
2CA3F681000
trusted library allocation
page read and write
2CA3E358000
trusted library allocation
page read and write
2CA3C984000
trusted library allocation
page read and write
2CA3DA56000
trusted library allocation
page read and write
2CA4033F000
trusted library allocation
page read and write
2CA3DBC2000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA44E83000
trusted library allocation
page read and write
2CA48490000
trusted library allocation
page read and write
2CA48CD6000
trusted library allocation
page read and write
193A66E6000
heap
page read and write
2CA40481000
trusted library allocation
page read and write
2CA44C7B000
trusted library allocation
page read and write
2CA4767D000
trusted library allocation
page read and write
2CA3CEAF000
trusted library allocation
page read and write
265E52D0000
heap
page read and write
2CA3D5F2000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA33C31000
heap
page read and write
2CA3F2D8000
trusted library allocation
page read and write
2CA3C963000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3DA2C000
trusted library allocation
page read and write
2CA33C35000
heap
page read and write
2CA3DA28000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
1377000
heap
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA3F162000
trusted library allocation
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3CD6D000
trusted library allocation
page read and write
193A665F000
heap
page read and write
2CA40495000
trusted library allocation
page read and write
2CA401CB000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA484F1000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
2CA45582000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA3E46B000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3F5DF000
trusted library allocation
page read and write
2CA33C2F000
heap
page read and write
265E52D9000
heap
page read and write
2CA33C21000
heap
page read and write
2CA3DA34000
trusted library allocation
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA40457000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C25000
heap
page read and write
2CA3CD67000
trusted library allocation
page read and write
2CA3E8D3000
trusted library allocation
page read and write
2CA3F6C1000
trusted library allocation
page read and write
2CA3CE8C000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3F41B000
trusted library allocation
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2472E030000
unclassified section
page readonly
2CA3DF0E000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
3A51000
heap
page read and write
2CA3A3F2000
heap
page read and write
1154000
heap
page read and write
2CA3A3F5000
heap
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA3E4B8000
trusted library allocation
page read and write
2CA3A3BC000
heap
page read and write
2CA33CAD000
heap
page read and write
2CA3F024000
trusted library allocation
page read and write
2CA3E642000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA3D71F000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
14905867000
trusted library allocation
page read and write
2CA44EAA000
trusted library allocation
page read and write
2CA45300000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA33C80000
heap
page read and write
2CA33C42000
heap
page read and write
2CA3CFC2000
trusted library allocation
page read and write
2CA38BFE000
trusted library allocation
page read and write
149055F0000
heap
page read and write
2CA3E5AB000
trusted library allocation
page read and write
2CA47724000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
2CA44E96000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA44E83000
trusted library allocation
page read and write
2CA3D7EE000
trusted library allocation
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA39CD2000
trusted library allocation
page read and write
2CA3E6E6000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA45534000
trusted library allocation
page read and write
2CA3E3CC000
trusted library allocation
page read and write
14905900000
trusted library allocation
page read and write
2CA3DA34000
trusted library allocation
page read and write
2CA3E57A000
trusted library allocation
page read and write
2CA3D7C3000
trusted library allocation
page read and write
2CA33C33000
heap
page read and write
2CA3F667000
trusted library allocation
page read and write
2CA3E3C8000
trusted library allocation
page read and write
2CA403E3000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA33C68000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C2E000
heap
page read and write
2CA33C39000
heap
page read and write
2CA39F26000
trusted library allocation
page read and write
2CA48CE4000
trusted library allocation
page read and write
2CA44DAA000
trusted library allocation
page read and write
2CA3F2FA000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
2CA48C22000
trusted library allocation
page read and write
2CA33C42000
heap
page read and write
2CA3A3FD000
heap
page read and write
2CA484B3000
trusted library allocation
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA3CE9F000
trusted library allocation
page read and write
7A8BB51000
trusted library allocation
page execute read
2CA476A8000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
3F2D8741E000
trusted library allocation
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA33CA3000
heap
page read and write
2CA33C4B000
heap
page read and write
2CA33C21000
heap
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3A413000
heap
page read and write
2CA3F4A1000
trusted library allocation
page read and write
2CA33C28000
heap
page read and write
2CA3DA56000
trusted library allocation
page read and write
2CA47666000
trusted library allocation
page read and write
2CA3DAAD000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA33C87000
heap
page read and write
2CA48416000
trusted library allocation
page read and write
193A6721000
heap
page read and write
2CA4137E000
heap
page read and write
2CA3E3BD000
trusted library allocation
page read and write
2CA3F662000
trusted library allocation
page read and write
2CA3DD0A000
trusted library allocation
page read and write
2CA39E97000
trusted library allocation
page read and write
2CA3E398000
trusted library allocation
page read and write
2CA3DA5B000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3E4F0000
trusted library allocation
page read and write
265E5400000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA33C42000
heap
page read and write
2CA403E6000
trusted library allocation
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA3D9B9000
trusted library allocation
page read and write
2CA3E462000
trusted library allocation
page read and write
2CA3E5E4000
trusted library allocation
page read and write
C8953E000
unkown
page readonly
2CA455AE000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C1D000
heap
page read and write
2CA33C39000
heap
page read and write
2CA405FD000
trusted library allocation
page read and write
2CA3CD21000
trusted library allocation
page read and write
2CA3E35A000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA33C80000
heap
page read and write
4B6A47D000
stack
page read and write
2CA3E495000
trusted library allocation
page read and write
2CA3CDA7000
trusted library allocation
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA3DADF000
trusted library allocation
page read and write
2CA3C8FE000
trusted library allocation
page read and write
193A6758000
heap
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA4550B000
trusted library allocation
page read and write
2CA3E5C8000
trusted library allocation
page read and write
2CA44DB7000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA33C68000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA3F695000
trusted library allocation
page read and write
2CA33C2E000
heap
page read and write
2CA3D586000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA4043A000
trusted library allocation
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA3CD86000
trusted library allocation
page read and write
2CA3CD76000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
2CA33C24000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA4842D000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C7A000
heap
page read and write
2CA33C76000
heap
page read and write
2CA33C24000
heap
page read and write
2CA4048B000
trusted library allocation
page read and write
2CA3F19A000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C30000
heap
page read and write
2CA33C42000
heap
page read and write
C851BB000
stack
page read and write
2CA3DB21000
trusted library allocation
page read and write
193A667D000
heap
page read and write
2CA3DD07000
trusted library allocation
page read and write
2CA3CE76000
trusted library allocation
page read and write
2472E6B2000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA3D58B000
trusted library allocation
page read and write
2CA3E3E4000
trusted library allocation
page read and write
2CA3F535000
trusted library allocation
page read and write
2CA33C47000
heap
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA3DAB4000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA33C4B000
heap
page read and write
2CA33C62000
heap
page read and write
2CA33C80000
heap
page read and write
193A6744000
heap
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA40BEC000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA48042000
trusted library allocation
page read and write
2CA44F00000
trusted library allocation
page read and write
1B5CCCAD000
heap
page read and write
2CA3A40E000
heap
page read and write
2CA33CA2000
heap
page read and write
2CA41004000
trusted library allocation
page read and write
2CA3F41B000
trusted library allocation
page read and write
2CA3DB08000
trusted library allocation
page read and write
2CA3F58F000
trusted library allocation
page read and write
2CA401C0000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3A426000
heap
page read and write
2CA476CA000
trusted library allocation
page read and write
2CA3F407000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C24000
heap
page read and write
2CA48C44000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA33C3D000
heap
page read and write
1B5CB201000
heap
page read and write
2CA3CF7D000
trusted library allocation
page read and write
2CA4057A000
trusted library allocation
page read and write
2CA40593000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA3E4B8000
trusted library allocation
page read and write
2CA3F652000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA3A3EA000
heap
page read and write
2CA3DF2B000
trusted library allocation
page read and write
2CA3FFEA000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA3A3FD000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA47677000
trusted library allocation
page read and write
193A66E0000
heap
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA4551C000
trusted library allocation
page read and write
2472E500000
trusted library allocation
page read and write
2CA3D595000
trusted library allocation
page read and write
193A5FD1000
heap
page read and write
2CA3CDA7000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA38C66000
trusted library allocation
page read and write
2CA476B4000
trusted library allocation
page read and write
2CA4550B000
trusted library allocation
page read and write
2CA3E35B000
trusted library allocation
page read and write
2CA40BF9000
trusted library allocation
page read and write
193A5540000
unclassified section
page readonly
2CA3EEEA000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
193A66F1000
heap
page read and write
2CA403FD000
trusted library allocation
page read and write
2CA47667000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA3E4E0000
trusted library allocation
page read and write
2CA44EE3000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E3BD000
trusted library allocation
page read and write
2CA3E473000
trusted library allocation
page read and write
2472E682000
trusted library allocation
page read and write
2CA3A3F7000
heap
page read and write
2CA3CF82000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3E688000
trusted library allocation
page read and write
2CA3F54B000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
193A5A28000
unkown
page execute read
2CA3E680000
trusted library allocation
page read and write
FCE000
stack
page read and write
2CA33C1E000
heap
page read and write
2CA3FFBD000
trusted library allocation
page read and write
2CA33C78000
heap
page read and write
2472E1C0000
unclassified section
page read and write
2CA3E365000
trusted library allocation
page read and write
2CA4130B000
heap
page read and write
2CA3E4DC000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA3FFAA000
trusted library allocation
page read and write
2CA3A3FD000
heap
page read and write
2CA3DFA2000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA481AE000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA3FFF8000
trusted library allocation
page read and write
2CA3F58C000
trusted library allocation
page read and write
2CA3F68C000
trusted library allocation
page read and write
2CA3A3F1000
heap
page read and write
2CA48CD1000
trusted library allocation
page read and write
2CA3F1B9000
trusted library allocation
page read and write
2CA3F4BF000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3E4B3000
trusted library allocation
page read and write
2CA3C991000
trusted library allocation
page read and write
2CA48E58000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3DF21000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA3DAF8000
trusted library allocation
page read and write
2CA3E3D4000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA3F4CC000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA3CFE6000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3C8DB000
trusted library allocation
page read and write
2CA48CE4000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
193A6779000
heap
page read and write
2CA3A3F7000
heap
page read and write
2CA3F596000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA3E4DC000
trusted library allocation
page read and write
2CA4057A000
trusted library allocation
page read and write
2CA3F5FD000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C39000
heap
page read and write
2CA44EEB000
trusted library allocation
page read and write
193A6777000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3D5ED000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA38598000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA44DBE000
trusted library allocation
page read and write
193A66F1000
heap
page read and write
2CA33C42000
heap
page read and write
2CA44FE8000
trusted library allocation
page read and write
2CA3CEE1000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3F4D4000
trusted library allocation
page read and write
2CA3DBC6000
trusted library allocation
page read and write
2CA39EC2000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA401F2000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA48449000
trusted library allocation
page read and write
2CA3C923000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
2CA3E4C7000
trusted library allocation
page read and write
2CA3CEE1000
trusted library allocation
page read and write
2CA3DA3E000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA48490000
trusted library allocation
page read and write
2CA3E463000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3E36D000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3DF5C000
trusted library allocation
page read and write
2CA3DFDA000
trusted library allocation
page read and write
2CA3A39E000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C57000
heap
page read and write
2CA3F029000
trusted library allocation
page read and write
2CA48C65000
trusted library allocation
page read and write
2CA3CF5D000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2472E677000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA3F5FB000
trusted library allocation
page read and write
2CA3CE79000
trusted library allocation
page read and write
2CA3DFAC000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33C24000
heap
page read and write
2CA47657000
trusted library allocation
page read and write
2CA38B23000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA3E5FA000
trusted library allocation
page read and write
2CA3DAE3000
trusted library allocation
page read and write
193A66E8000
heap
page read and write
2CA33C60000
heap
page read and write
2CA3E4B5000
trusted library allocation
page read and write
2CA40142000
trusted library allocation
page read and write
2CA3A39E000
heap
page read and write
2CA3C8B9000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA38BFB000
trusted library allocation
page read and write
193A5972000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C76000
heap
page read and write
2CA48469000
trusted library allocation
page read and write
2CA48CA8000
trusted library allocation
page read and write
2CA3DFEF000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA44C16000
trusted library allocation
page read and write
2CA3E4D9000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA3CF1F000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA487EB000
trusted library allocation
page read and write
2CA3F4AE000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA45563000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA41389000
heap
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA40458000
trusted library allocation
page read and write
2CA33C27000
heap
page read and write
2CA3A3F4000
heap
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA3E3C0000
trusted library allocation
page read and write
2CA3CF5D000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3FF6A000
trusted library allocation
page read and write
2CA4018B000
trusted library allocation
page read and write
2CA3DB08000
trusted library allocation
page read and write
2CA3C8B0000
trusted library allocation
page read and write
68311FE000
stack
page read and write
2CA33C78000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA3F58A000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA33C15000
heap
page read and write
2CA3E36D000
trusted library allocation
page read and write
2CA33CAB000
heap
page read and write
2CA44E96000
trusted library allocation
page read and write
2CA3D7E8000
trusted library allocation
page read and write
2CA3E37C000
trusted library allocation
page read and write
2CA48CA8000
trusted library allocation
page read and write
2CA3E5B0000
trusted library allocation
page read and write
2CA45530000
trusted library allocation
page read and write
2CA40178000
trusted library allocation
page read and write
1110000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C68000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3CEDC000
trusted library allocation
page read and write
2CA3F2B1000
trusted library allocation
page read and write
2CA33CB7000
heap
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3E3AC000
trusted library allocation
page read and write
2CA401B5000
trusted library allocation
page read and write
2CA40ED4000
trusted library allocation
page read and write
2CA3F3DE000
trusted library allocation
page read and write
2CA3F3CC000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA3F26B000
trusted library allocation
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA3DAE1000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA401EE000
trusted library allocation
page read and write
2CA3F6B7000
trusted library allocation
page read and write
2CA3F4CC000
trusted library allocation
page read and write
14905912000
trusted library allocation
page read and write
2CA3F2FA000
trusted library allocation
page read and write
2CA3DF78000
trusted library allocation
page read and write
2CA4055E000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E39B000
trusted library allocation
page read and write
2CA3F592000
trusted library allocation
page read and write
2CA3E493000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3D5DA000
trusted library allocation
page read and write
2CA3F4C8000
trusted library allocation
page read and write
2CA44EAD000
trusted library allocation
page read and write
2CA40488000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA33CB1000
heap
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3D7FB000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA33C1D000
heap
page read and write
14905918000
trusted library allocation
page read and write
2CA404A8000
trusted library allocation
page read and write
4B6B53E000
unkown
page readonly
2CA3F4D9000
trusted library allocation
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA484F3000
trusted library allocation
page read and write
2CA33C78000
heap
page read and write
193A6758000
heap
page read and write
2CA33C32000
heap
page read and write
2CA480D1000
trusted library allocation
page read and write
2CA3F183000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA45580000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA44EAD000
trusted library allocation
page read and write
2CA48CD6000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA41301000
heap
page read and write
2CA45524000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
4B6A43E000
unkown
page readonly
2CA3CF2F000
trusted library allocation
page read and write
2CA3F42D000
trusted library allocation
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA44D4E000
trusted library allocation
page read and write
2CA33C43000
heap
page read and write
2CA3DB17000
trusted library allocation
page read and write
2CA41352000
heap
page read and write
2CA3A426000
heap
page read and write
2CA3CF27000
trusted library allocation
page read and write
2CA3DAE1000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA3D58B000
trusted library allocation
page read and write
2CA3F4DE000
trusted library allocation
page read and write
2CA3DA9A000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C32000
heap
page read and write
2CA4735C000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
1320000
heap
page read and write
2CA33C5A000
heap
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA487C3000
trusted library allocation
page read and write
2CA3CF80000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3DBDC000
trusted library allocation
page read and write
2CA3DAA8000
trusted library allocation
page read and write
2CA3E3E4000
trusted library allocation
page read and write
149058A1000
trusted library allocation
page read and write
2CA3E396000
trusted library allocation
page read and write
1B5CB1DA000
heap
page read and write
2CA3DFAA000
trusted library allocation
page read and write
2CA3CE7A000
trusted library allocation
page read and write
2CA3EFE7000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA33C28000
heap
page read and write
2CA33C62000
heap
page read and write
2CA40EAE000
trusted library allocation
page read and write
2CA487D3000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3F4C2000
trusted library allocation
page read and write
2CA3E46C000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA3E642000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3D536000
trusted library allocation
page read and write
2CA3E4B8000
trusted library allocation
page read and write
2CA3DF31000
trusted library allocation
page read and write
2CA3CE7D000
trusted library allocation
page read and write
193A5700000
heap
page read and write
2CA3DBB5000
trusted library allocation
page read and write
2CA33C2F000
heap
page read and write
2CA33C08000
heap
page read and write
68321FE000
stack
page read and write
2CA40F59000
trusted library allocation
page read and write
2CA3CF2F000
trusted library allocation
page read and write
2472E010000
remote allocation
page read and write
2CA3D571000
trusted library allocation
page read and write
2CA3E483000
trusted library allocation
page read and write
2CA48C83000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA3E327000
trusted library allocation
page read and write
2CA3F4D4000
trusted library allocation
page read and write
1377000
heap
page read and write
2CA33C76000
heap
page read and write
2CA401D8000
trusted library allocation
page read and write
193A66EE000
heap
page read and write
2CA4136B000
heap
page read and write
2CA33C87000
heap
page read and write
2CA4840B000
trusted library allocation
page read and write
2CA33C4E000
heap
page read and write
2CA40BFD000
trusted library allocation
page read and write
2CA3A3F8000
heap
page read and write
2CA3FFD8000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C25000
heap
page read and write
14905863000
trusted library allocation
page read and write
193A6777000
heap
page read and write
2CA33C80000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3DA5B000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA3C98C000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA48477000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA3DAAD000
trusted library allocation
page read and write
2CA4059C000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3F4E7000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA3DF1E000
trusted library allocation
page read and write
2CA3A3F5000
heap
page read and write
2CA3D59C000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3FFDC000
trusted library allocation
page read and write
2CA473B7000
trusted library allocation
page read and write
2CA3FFC2000
trusted library allocation
page read and write
2CA3D6F2000
trusted library allocation
page read and write
C851B8000
stack
page read and write
2CA33C5A000
heap
page read and write
2CA33CA8000
heap
page read and write
2CA4044B000
trusted library allocation
page read and write
2CA3F4B9000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA4059A000
trusted library allocation
page read and write
2CA44EBE000
trusted library allocation
page read and write
2CA3DBF2000
trusted library allocation
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA4136B000
heap
page read and write
193A676C000
heap
page read and write
2CA3A3BC000
heap
page read and write
193A676C000
heap
page read and write
68329FF000
stack
page read and write
2CA3E396000
trusted library allocation
page read and write
2CA4520B000
trusted library allocation
page read and write
2CA3D953000
trusted library allocation
page read and write
2CA3F3D3000
trusted library allocation
page read and write
2CA3CEA7000
trusted library allocation
page read and write
2CA3F3FD000
trusted library allocation
page read and write
2472E403000
heap
page read and write
2CA33C32000
heap
page read and write
193A6660000
heap
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3F41F000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
193A66A8000
heap
page read and write
2CA41336000
heap
page read and write
2CA3CE8C000
trusted library allocation
page read and write
2CA3859E000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA4873F000
trusted library allocation
page read and write
2CA3E3AC000
trusted library allocation
page read and write
2CA40BC0000
trusted library allocation
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA405FD000
trusted library allocation
page read and write
2CA3F3E9000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA39EBF000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C71000
heap
page read and write
2CA487E7000
trusted library allocation
page read and write
2CA3A39F000
heap
page read and write
2CA3CEA7000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
1B5CB150000
heap
page read and write
193A669C000
heap
page read and write
2CA33C44000
heap
page read and write
2CA33C6B000
heap
page read and write
2472E6DB000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C33000
heap
page read and write
2CA3E4C5000
trusted library allocation
page read and write
2CA3CFC2000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
193A667F000
heap
page read and write
2CA3A3FF000
heap
page read and write
2CA33C6B000
heap
page read and write
1381000
heap
page read and write
2CA3F6C1000
trusted library allocation
page read and write
2CA3DAAD000
trusted library allocation
page read and write
2CA3F477000
trusted library allocation
page read and write
2CA3D585000
trusted library allocation
page read and write
2CA3E495000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
FFE000
stack
page read and write
2CA3D55F000
trusted library allocation
page read and write
2CA3A3F6000
heap
page read and write
2CA3D5ED000
trusted library allocation
page read and write
890000
unkown
page write copy
2CA39E3F000
trusted library allocation
page read and write
2CA3F2D0000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA4045B000
trusted library allocation
page read and write
2CA4051E000
trusted library allocation
page read and write
2CA3F2E3000
trusted library allocation
page read and write
2CA3E4C5000
trusted library allocation
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3E62B000
trusted library allocation
page read and write
2CA3FFBB000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA4807E000
trusted library allocation
page read and write
2CA3F6D1000
trusted library allocation
page read and write
2CA33C3A000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3DBF2000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA33C76000
heap
page read and write
2CA3F273000
trusted library allocation
page read and write
2CA3E39B000
trusted library allocation
page read and write
2CA3D5BB000
trusted library allocation
page read and write
1B5CCE20000
heap
page read and write
2CA3A3F8000
heap
page read and write
2CA3D732000
trusted library allocation
page read and write
3C64FAC03000
trusted library allocation
page read and write
2CA33C3C000
heap
page read and write
2CA33CB7000
heap
page read and write
2CA3FFF8000
trusted library allocation
page read and write
2CA33C41000
heap
page read and write
2CA3CF80000
trusted library allocation
page read and write
2CA3DF7E000
trusted library allocation
page read and write
193A59E9000
trusted library allocation
page read and write
2CA3F4DE000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA3D5E3000
trusted library allocation
page read and write
2CA4529B000
trusted library allocation
page read and write
2CA3D571000
trusted library allocation
page read and write
1338000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA405A1000
trusted library allocation
page read and write
2CA48C22000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA480DE000
trusted library allocation
page read and write
2CA3DFA2000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA3E48D000
trusted library allocation
page read and write
2CA3CF1F000
trusted library allocation
page read and write
2CA3EEC7000
trusted library allocation
page read and write
2CA39CEF000
trusted library allocation
page read and write
C873FE000
unkown
page readonly
2CA38B71000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3DAE3000
trusted library allocation
page read and write
2CA40198000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3E5EA000
trusted library allocation
page read and write
2CA3DBC2000
trusted library allocation
page read and write
2CA44FE8000
trusted library allocation
page read and write
2CA33C2E000
heap
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA39EF7000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
9F0000
heap
page read and write
2CA33C87000
heap
page read and write
2CA480F4000
trusted library allocation
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA475FC000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3F4E8000
trusted library allocation
page read and write
1384000
heap
page read and write
2472DFB0000
unclassified section
page readonly
2CA3C9B1000
trusted library allocation
page read and write
2CA3C863000
trusted library allocation
page read and write
2CA44DFD000
trusted library allocation
page read and write
2CA3E4C7000
trusted library allocation
page read and write
193A5A2B000
unkown
page execute read
2CA3F659000
trusted library allocation
page read and write
193A59BE000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3E3C3000
trusted library allocation
page read and write
2CA3F2AD000
trusted library allocation
page read and write
1384000
heap
page read and write
1B5CCCA0000
heap
page read and write
2CA33C2E000
heap
page read and write
2CA33C62000
heap
page read and write
2CA4044E000
trusted library allocation
page read and write
2CA404A8000
trusted library allocation
page read and write
2CA3D58B000
trusted library allocation
page read and write
2CA3E4DC000
trusted library allocation
page read and write
2CA33C44000
heap
page read and write
2CA40483000
trusted library allocation
page read and write
2CA385CD000
trusted library allocation
page read and write
2CA3CF5D000
trusted library allocation
page read and write
2CA3CF9A000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
193A5978000
trusted library allocation
page read and write
2CA44EB4000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA45567000
trusted library allocation
page read and write
2CA44DA4000
trusted library allocation
page read and write
2CA3D543000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C21000
heap
page read and write
149055B0000
heap
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3FFFE000
trusted library allocation
page read and write
2CA3E47A000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA3E46C000
trusted library allocation
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA48490000
trusted library allocation
page read and write
2CA44EB1000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C7E000
heap
page read and write
2CA33C69000
heap
page read and write
2472E250000
heap
page read and write
2CA3E4AA000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3DF23000
trusted library allocation
page read and write
2CA3F5EE000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA4054B000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
2CA3F6A5000
trusted library allocation
page read and write
2CA3E3B9000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA44D3D000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
14905652000
unclassified section
page read and write
2CA40528000
trusted library allocation
page read and write
2CA3E483000
trusted library allocation
page read and write
2CA3DD05000
trusted library allocation
page read and write
2CA3E3B9000
trusted library allocation
page read and write
2CA3CF8B000
trusted library allocation
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA33C3D000
heap
page read and write
2CA38C13000
trusted library allocation
page read and write
2CA3A427000
heap
page read and write
2CA33C21000
heap
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA3E411000
trusted library allocation
page read and write
2CA3D5BB000
trusted library allocation
page read and write
2CA3D9DD000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA48C73000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C5A000
heap
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA47704000
trusted library allocation
page read and write
2CA3D6EC000
trusted library allocation
page read and write
2CA44DB5000
trusted library allocation
page read and write
2CA4765C000
trusted library allocation
page read and write
2CA39E33000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA3E3DA000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
193A6664000
heap
page read and write
2CA33CA3000
heap
page read and write
2CA4048B000
trusted library allocation
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA38590000
trusted library allocation
page read and write
2CA455A0000
trusted library allocation
page read and write
193A5A30000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C15000
heap
page read and write
7C1000
unkown
page execute read
2CA39EAB000
trusted library allocation
page read and write
1E5E1FE000
stack
page read and write
2472E1B0000
heap
page readonly
2CA3CF9A000
trusted library allocation
page read and write
2CA3A402000
heap
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA3D7E7000
trusted library allocation
page read and write
193A59F3000
trusted library allocation
page read and write
2472E649000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
193A6660000
heap
page read and write
2CA44DD2000
trusted library allocation
page read and write
2CA3E3B4000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA45582000
trusted library allocation
page read and write
193A664D000
heap
page read and write
2CA3A40E000
heap
page read and write
2CA3D5A7000
trusted library allocation
page read and write
2CA3DAE1000
trusted library allocation
page read and write
2CA3DBC6000
trusted library allocation
page read and write
2CA33C04000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA40111000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA33C7E000
heap
page read and write
2CA3DFAA000
trusted library allocation
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA33CB1000
heap
page read and write
2CA4133F000
heap
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA3C8FE000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3E40B000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA480B0000
trusted library allocation
page read and write
2CA40BE1000
trusted library allocation
page read and write
7A8BB61000
trusted library allocation
page execute read
2CA3FFDC000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA33C7E000
heap
page read and write
2CA3A40E000
heap
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA3E39B000
trusted library allocation
page read and write
134F000
heap
page read and write
265E5500000
trusted library allocation
page read and write
2CA401BA000
trusted library allocation
page read and write
2CA3F6A5000
trusted library allocation
page read and write
2CA3E8FA000
trusted library allocation
page read and write
2CA3E473000
trusted library allocation
page read and write
2CA3F4EC000
trusted library allocation
page read and write
193A5948000
trusted library allocation
page read and write
14905847000
trusted library allocation
page read and write
2CA3CFD1000
trusted library allocation
page read and write
2CA3CED6000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2472E68F000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33CAD000
heap
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA44ECC000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA3F58C000
trusted library allocation
page read and write
2CA3F4DE000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA3D751000
trusted library allocation
page read and write
2CA3DBE0000
trusted library allocation
page read and write
2CA3E41A000
trusted library allocation
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA3F29E000
trusted library allocation
page read and write
2CA48C5A000
trusted library allocation
page read and write
2CA44ED3000
trusted library allocation
page read and write
2CA3F6B7000
trusted library allocation
page read and write
1E5C6CB000
stack
page read and write
2CA44C32000
trusted library allocation
page read and write
2CA3CDD0000
trusted library allocation
page read and write
2CA3E411000
trusted library allocation
page read and write
2CA3F5F1000
trusted library allocation
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA48477000
trusted library allocation
page read and write
2CA45563000
trusted library allocation
page read and write
2CA3CD60000
trusted library allocation
page read and write
193A6721000
heap
page read and write
193A66FD000
heap
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA3D5A7000
trusted library allocation
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA39BE5000
trusted library allocation
page read and write
14905881000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA3F635000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3E4DF000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA3E4D9000
trusted library allocation
page read and write
2CA48C2B000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
265E5670000
heap
page read and write
2CA3DF2F000
trusted library allocation
page read and write
2CA3E3B9000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA3E389000
trusted library allocation
page read and write
2CA4842D000
trusted library allocation
page read and write
2CA33CBA000
heap
page read and write
2CA3F58A000
trusted library allocation
page read and write
2CA3E648000
trusted library allocation
page read and write
2472E1E4000
heap
page read and write
2CA40495000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
193A5770000
heap
page readonly
2CA44C33000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33C6A000
heap
page read and write
2CA33CB2000
heap
page read and write
2CA33C72000
heap
page read and write
2CA33C75000
heap
page read and write
2CA44E9C000
trusted library allocation
page read and write
2CA3E662000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
2CA48449000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3CE3D000
trusted library allocation
page read and write
193A55C0000
heap
page read and write
2CA3E5A0000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
2CA44D4E000
trusted library allocation
page read and write
2CA45555000
trusted library allocation
page read and write
2CA480F7000
trusted library allocation
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA4045F000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C6A000
heap
page read and write
2CA33C71000
heap
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA33C68000
heap
page read and write
2CA3F5DF000
trusted library allocation
page read and write
2CA3F66D000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33C30000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA39E8D000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA3D5B6000
trusted library allocation
page read and write
193A5FA0000
heap
page read and write
1377000
heap
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA3D5E4000
trusted library allocation
page read and write
68339FF000
stack
page read and write
2CA33C87000
heap
page read and write
193A676C000
heap
page read and write
14905410000
unclassified section
page readonly
2CA40451000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA33C32000
heap
page read and write
2CA4045F000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3F594000
trusted library allocation
page read and write
2CA3E424000
trusted library allocation
page read and write
2CA3DB2C000
trusted library allocation
page read and write
193A66E8000
heap
page read and write
2CA33C76000
heap
page read and write
2CA3CF86000
trusted library allocation
page read and write
2CA3F432000
trusted library allocation
page read and write
2CA4768B000
trusted library allocation
page read and write
2CA3F3FE000
trusted library allocation
page read and write
2472E1CF000
unclassified section
page read and write
2CA48C1E000
trusted library allocation
page read and write
2CA3E4AD000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA3E4D0000
trusted library allocation
page read and write
2472E624000
trusted library allocation
page read and write
2CA48084000
trusted library allocation
page read and write
2CA3E4C7000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3E4E0000
trusted library allocation
page read and write
2CA3E6C9000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33CB6000
heap
page read and write
2CA44CCC000
trusted library allocation
page read and write
2CA3FFC8000
trusted library allocation
page read and write
2CA44C92000
trusted library allocation
page read and write
2CA3F535000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA39BA8000
trusted library allocation
page read and write
2CA3E4A4000
trusted library allocation
page read and write
2CA3F533000
trusted library allocation
page read and write
2CA3D5E3000
trusted library allocation
page read and write
2CA3F6D8000
trusted library allocation
page read and write
2472E230000
heap
page read and write
2CA3F090000
trusted library allocation
page read and write
2CA476C8000
trusted library allocation
page read and write
2CA3E68F000
trusted library allocation
page read and write
193A666C000
heap
page read and write
2CA40FCA000
trusted library allocation
page read and write
1B5CCCB8000
heap
page read and write
2CA33C60000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA3E3D1000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA3DB2C000
trusted library allocation
page read and write
2CA40EFC000
trusted library allocation
page read and write
2CA3F4EC000
trusted library allocation
page read and write
2CA48480000
trusted library allocation
page read and write
2CA3FFCA000
trusted library allocation
page read and write
2CA47693000
trusted library allocation
page read and write
2CA3D59C000
trusted library allocation
page read and write
2CA3CF7D000
trusted library allocation
page read and write
2CA3E4E8000
trusted library allocation
page read and write
2CA33C31000
heap
page read and write
2CA33C28000
heap
page read and write
2CA45574000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3F596000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA44DA7000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA473FB000
trusted library allocation
page read and write
2CA401C2000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA3CF27000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3DADF000
trusted library allocation
page read and write
2CA405A3000
trusted library allocation
page read and write
2CA3E4DA000
trusted library allocation
page read and write
193A55AB000
remote allocation
page execute read
2CA3E4A4000
trusted library allocation
page read and write
2CA3E39B000
trusted library allocation
page read and write
2CA45505000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA401D2000
trusted library allocation
page read and write
2CA385B3000
trusted library allocation
page read and write
2472E707000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA40162000
trusted library allocation
page read and write
2CA4048B000
trusted library allocation
page read and write
2CA3E4C1000
trusted library allocation
page read and write
2CA3CF63000
trusted library allocation
page read and write
1B5CB060000
heap
page read and write
2CA33C60000
heap
page read and write
2CA3DFC6000
trusted library allocation
page read and write
2CA401B0000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA38C1A000
trusted library allocation
page read and write
2CA3DA44000
trusted library allocation
page read and write
193A5A10000
trusted library allocation
page read and write
2CA3E4AA000
trusted library allocation
page read and write
2CA3E566000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3E5D2000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA3E447000
trusted library allocation
page read and write
2CA3C92E000
trusted library allocation
page read and write
2CA3C885000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA3F2E5000
trusted library allocation
page read and write
2CA3E47A000
trusted library allocation
page read and write
2CA33C28000
heap
page read and write
2CA33C78000
heap
page read and write
2CA3E3CB000
trusted library allocation
page read and write
2CA33C5F000
heap
page read and write
2CA33C62000
heap
page read and write
193A66B9000
heap
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA3E486000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA44EB6000
trusted library allocation
page read and write
2CA3E655000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA33C32000
heap
page read and write
2472E1E6000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA33C1E000
heap
page read and write
1352000
heap
page read and write
2CA39EEC000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3CF35000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
137F000
heap
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA3E365000
trusted library allocation
page read and write
193A5FB0000
heap
page read and write
2CA47635000
trusted library allocation
page read and write
1B2F000
stack
page read and write
2CA3A3F7000
heap
page read and write
2CA45574000
trusted library allocation
page read and write
2CA3F547000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA3D732000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA3E358000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA3E648000
trusted library allocation
page read and write
2CA3E4DC000
trusted library allocation
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA33CB0000
heap
page read and write
193A6722000
heap
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA3CF1B000
trusted library allocation
page read and write
2CA3FF78000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
14905620000
heap
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA3F58A000
trusted library allocation
page read and write
193A66F1000
heap
page read and write
2CA3F6DB000
trusted library allocation
page read and write
193A595C000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA3DFEF000
trusted library allocation
page read and write
2CA3E464000
trusted library allocation
page read and write
2CA3D5ED000
trusted library allocation
page read and write
2CA403CE000
trusted library allocation
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA4765F000
trusted library allocation
page read and write
2CA3E38B000
trusted library allocation
page read and write
2CA3D6C3000
trusted library allocation
page read and write
2CA3CE76000
trusted library allocation
page read and write
193A5903000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3F4C8000
trusted library allocation
page read and write
2CA484EF000
trusted library allocation
page read and write
2CA44C47000
trusted library allocation
page read and write
2CA3A3F5000
heap
page read and write
2CA33C49000
heap
page read and write
2CA484F3000
trusted library allocation
page read and write
2CA3E4B4000
trusted library allocation
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3A3BD000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C57000
heap
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA3DA43000
trusted library allocation
page read and write
14905623000
heap
page read and write
193A6530000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA3A427000
heap
page read and write
2CA3DAE7000
trusted library allocation
page read and write
193A5986000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA3D7D6000
trusted library allocation
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
2CA33C5F000
heap
page read and write
2CA33C78000
heap
page read and write
C88D3E000
stack
page read and write
2CA33C5E000
heap
page read and write
2CA476C8000
trusted library allocation
page read and write
3594000
heap
page read and write
2CA44E96000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA4018B000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C62000
heap
page read and write
2CA473FB000
trusted library allocation
page read and write
2CA3F126000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3DA56000
trusted library allocation
page read and write
2CA3E6EF000
trusted library allocation
page read and write
2CA40133000
trusted library allocation
page read and write
2CA44C8B000
trusted library allocation
page read and write
2CA47667000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3F552000
trusted library allocation
page read and write
2CA3E4A7000
trusted library allocation
page read and write
193A5A74000
heap
page read and write
2CA3E565000
trusted library allocation
page read and write
2CA3F4C5000
trusted library allocation
page read and write
2CA33C4E000
heap
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3E300000
trusted library allocation
page read and write
2CA44DC1000
trusted library allocation
page read and write
2CA3E420000
trusted library allocation
page read and write
2CA44C2D000
trusted library allocation
page read and write
2CA44DF6000
trusted library allocation
page read and write
2CA33CA3000
heap
page read and write
1377000
heap
page read and write
2CA33C2F000
heap
page read and write
193A6744000
heap
page read and write
2CA3E675000
trusted library allocation
page read and write
2CA3F4C5000
trusted library allocation
page read and write
2CA4874E000
trusted library allocation
page read and write
2CA3F4EC000
trusted library allocation
page read and write
2CA3DF6B000
trusted library allocation
page read and write
3F2D87424000
trusted library allocation
page read and write
2CA33C7B000
heap
page read and write
2CA33C60000
heap
page read and write
2CA39EC5000
trusted library allocation
page read and write
2CA45512000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
135E000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3F6F7000
trusted library allocation
page read and write
2CA3E4DD000
trusted library allocation
page read and write
2CA3E3CB000
trusted library allocation
page read and write
2CA385EF000
trusted library allocation
page read and write
2472E1E0000
heap
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA481DD000
trusted library allocation
page read and write
2CA3A39E000
heap
page read and write
2472E800000
trusted library allocation
page read and write
2CA3E473000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3DA9A000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3E3AB000
trusted library allocation
page read and write
2CA3D7DF000
trusted library allocation
page read and write
193A5792000
unclassified section
page read and write
2CA33C4B000
heap
page read and write
2CA33C15000
heap
page read and write
2CA3CF9A000
trusted library allocation
page read and write
2CA3D7F7000
trusted library allocation
page read and write
2472E674000
trusted library allocation
page read and write
193A59C4000
trusted library allocation
page read and write
2CA480F4000
trusted library allocation
page read and write
2CA3E3F0000
trusted library allocation
page read and write
135F000
heap
page read and write
2CA44C44000
trusted library allocation
page read and write
1B5CB1F2000
heap
page read and write
193A673B000
heap
page read and write
2CA484EF000
trusted library allocation
page read and write
2CA3C95A000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA33C80000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3F26F000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3A3FC000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA404D6000
trusted library allocation
page read and write
14905800000
trusted library allocation
page read and write
2CA47661000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA48880000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
193A673B000
heap
page read and write
2CA3E662000
trusted library allocation
page read and write
193A676C000
heap
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3CF8B000
trusted library allocation
page read and write
2CA401D4000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
14905860000
trusted library allocation
page read and write
2CA33CA3000
heap
page read and write
2CA48784000
trusted library allocation
page read and write
2CA44C17000
trusted library allocation
page read and write
2CA3F541000
trusted library allocation
page read and write
2CA3DA2C000
trusted library allocation
page read and write
2CA48078000
trusted library allocation
page read and write
2CA481C3000
trusted library allocation
page read and write
2CA404B0000
trusted library allocation
page read and write
2CA33C73000
heap
page read and write
2CA3E4DF000
trusted library allocation
page read and write
2CA3DAA6000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA3E3D6000
trusted library allocation
page read and write
2CA33C07000
heap
page read and write
2CA44D97000
trusted library allocation
page read and write
2CA40543000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
193A6669000
heap
page read and write
2CA33C62000
heap
page read and write
2472E662000
trusted library allocation
page read and write
2CA3E430000
trusted library allocation
page read and write
2CA33C54000
heap
page read and write
2CA33C76000
heap
page read and write
2CA33C71000
heap
page read and write
2CA3A3F7000
heap
page read and write
2CA3DA2E000
trusted library allocation
page read and write
2CA4134D000
heap
page read and write
2CA33C62000
heap
page read and write
2CA3DAE1000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA39CD8000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3A3F5000
heap
page read and write
2CA33C21000
heap
page read and write
2CA48C6B000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA33C3D000
heap
page read and write
2CA3E5F6000
trusted library allocation
page read and write
2CA3D5E9000
trusted library allocation
page read and write
2CA48CD1000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA41301000
heap
page read and write
2CA3E5D2000
trusted library allocation
page read and write
2CA33C72000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3DA81000
trusted library allocation
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA40702000
trusted library allocation
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
265E5507000
trusted library allocation
page read and write
2CA3A3F7000
heap
page read and write
2CA45595000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C43000
heap
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA41761000
trusted library allocation
page read and write
2CA3CE8C000
trusted library allocation
page read and write
2CA3DAF8000
trusted library allocation
page read and write
2CA33C7E000
heap
page read and write
193A672D000
heap
page read and write
2CA401B0000
trusted library allocation
page read and write
2CA3E4AA000
trusted library allocation
page read and write
2CA3DA9A000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3DFA2000
trusted library allocation
page read and write
2CA3E46B000
trusted library allocation
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA3F41F000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA44C3C000
trusted library allocation
page read and write
2CA4045F000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA39EE1000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
2CA3CEDA000
trusted library allocation
page read and write
2CA3DA5B000
trusted library allocation
page read and write
2CA3F4E7000
trusted library allocation
page read and write
2CA44DBA000
trusted library allocation
page read and write
2CA3A3BC000
heap
page read and write
2CA33C68000
heap
page read and write
2CA3A413000
heap
page read and write
2CA3DB21000
trusted library allocation
page read and write
2CA3A42D000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3F645000
trusted library allocation
page read and write
2CA3F435000
trusted library allocation
page read and write
2CA3F594000
trusted library allocation
page read and write
2CA476FC000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3DA3C000
trusted library allocation
page read and write
2CA3FFD3000
trusted library allocation
page read and write
1E5E9FE000
unkown
page readonly
2CA3D5CD000
trusted library allocation
page read and write
3A50000
heap
page read and write
2CA3DF1E000
trusted library allocation
page read and write
2CA3E4B2000
trusted library allocation
page read and write
2CA455A9000
trusted library allocation
page read and write
4B681EE000
stack
page read and write
193A6777000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3E5FA000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA3D597000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3CE72000
trusted library allocation
page read and write
2CA3D569000
trusted library allocation
page read and write
2CA3E55F000
trusted library allocation
page read and write
193A6744000
heap
page read and write
2CA3F4B0000
trusted library allocation
page read and write
2CA46B00000
trusted library allocation
page read and write
2CA3A3F7000
heap
page read and write
2CA33C2F000
heap
page read and write
2CA33CA8000
heap
page read and write
2CA48472000
trusted library allocation
page read and write
2CA3A39F000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3D7EB000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA3CEAF000
trusted library allocation
page read and write
193A6777000
heap
page read and write
2CA40495000
trusted library allocation
page read and write
2CA3D55E000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA41336000
heap
page read and write
2CA3E4FD000
trusted library allocation
page read and write
2CA3A3BD000
heap
page read and write
2CA4550E000
trusted library allocation
page read and write
2CA3FFEA000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA44C50000
trusted library allocation
page read and write
2CA3DF3D000
trusted library allocation
page read and write
2CA33CB6000
heap
page read and write
2CA33C60000
heap
page read and write
2CA487B1000
trusted library allocation
page read and write
2CA39F22000
trusted library allocation
page read and write
2CA45580000
trusted library allocation
page read and write
2CA3CD71000
trusted library allocation
page read and write
2CA3A3BC000
heap
page read and write
2CA33CB1000
heap
page read and write
2CA3A3BD000
heap
page read and write
2CA3FF54000
trusted library allocation
page read and write
2CA33C49000
heap
page read and write
2CA3F549000
trusted library allocation
page read and write
2CA3E586000
trusted library allocation
page read and write
2CA3E6C1000
trusted library allocation
page read and write
2CA48EAD000
trusted library allocation
page read and write
2CA3F5F7000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA33CBF000
heap
page read and write
1E5C70E000
unkown
page readonly
2CA3FF35000
trusted library allocation
page read and write
2CA3A3FD000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3D71F000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3E675000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA33C4E000
heap
page read and write
2CA33C32000
heap
page read and write
4B6A3FE000
unkown
page readonly
193A5790000
unclassified section
page read and write
2CA3DF23000
trusted library allocation
page read and write
2CA3F19A000
trusted library allocation
page read and write
2CA4049E000
trusted library allocation
page read and write
193A66AA000
heap
page read and write
2CA33C1D000
heap
page read and write
2CA33C76000
heap
page read and write
2CA33C72000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3E45E000
trusted library allocation
page read and write
149058B5000
trusted library allocation
page read and write
2CA33CA3000
heap
page read and write
2CA3E68F000
trusted library allocation
page read and write
2CA3F5DF000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA38C18000
trusted library allocation
page read and write
2CA45555000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA3DAB4000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA3E59B000
trusted library allocation
page read and write
2CA487A0000
trusted library allocation
page read and write
2CA3F5F2000
trusted library allocation
page read and write
2CA481D1000
trusted library allocation
page read and write
2CA40541000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3A3F7000
heap
page read and write
2CA40FF9000
trusted library allocation
page read and write
193A66E6000
heap
page read and write
2CA33CA4000
heap
page read and write
2CA33C4C000
heap
page read and write
2CA3E389000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3E4C2000
trusted library allocation
page read and write
2CA3E6F1000
trusted library allocation
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA3E544000
trusted library allocation
page read and write
2CA401BA000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3E3F5000
trusted library allocation
page read and write
193A672A000
heap
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA3A3F2000
heap
page read and write
C8847E000
unkown
page readonly
2CA44DFD000
trusted library allocation
page read and write
2CA3E3AC000
trusted library allocation
page read and write
2CA3DA2E000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA33CBA000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C87000
heap
page read and write
2CA45582000
trusted library allocation
page read and write
1E5C7CE000
stack
page read and write
2CA3E668000
trusted library allocation
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA33C3D000
heap
page read and write
2CA3CD8B000
trusted library allocation
page read and write
2CA4015B000
trusted library allocation
page read and write
2CA3F265000
trusted library allocation
page read and write
2CA3DA3C000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
2CA3E3AC000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA48C6A000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3E4C5000
trusted library allocation
page read and write
2CA45550000
trusted library allocation
page read and write
2CA3D686000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3FFD8000
trusted library allocation
page read and write
2CA44E9F000
trusted library allocation
page read and write
2CA4041B000
trusted library allocation
page read and write
2CA476AC000
trusted library allocation
page read and write
2CA455CD000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA47659000
trusted library allocation
page read and write
2CA44C4D000
trusted library allocation
page read and write
2CA3CFE6000
trusted library allocation
page read and write
2CA48C5A000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3E675000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA33CAD000
heap
page read and write
2CA33C24000
heap
page read and write
2CA4848D000
trusted library allocation
page read and write
2CA33C51000
heap
page read and write
2CA3FFD8000
trusted library allocation
page read and write
14905A08000
heap
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA48409000
trusted library allocation
page read and write
2CA4048B000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA33C7A000
heap
page read and write
2CA3CE82000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA45577000
trusted library allocation
page read and write
2CA481F2000
trusted library allocation
page read and write
2CA484B3000
trusted library allocation
page read and write
2CA3E3C0000
trusted library allocation
page read and write
2CA44DD6000
trusted library allocation
page read and write
4B6A4FE000
stack
page read and write
2CA3D58D000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33C32000
heap
page read and write
2CA3F5F4000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
1490589C000
trusted library allocation
page read and write
1B5CCCBC000
heap
page read and write
2CA484B3000
trusted library allocation
page read and write
2CA3C8FE000
trusted library allocation
page read and write
2CA33C54000
heap
page read and write
2CA33C5D000
heap
page read and write
C8513E000
unkown
page readonly
2CA3F4EC000
trusted library allocation
page read and write
2CA4769D000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA487A0000
trusted library allocation
page read and write
2CA3EEF9000
trusted library allocation
page read and write
2CA40FFC000
trusted library allocation
page read and write
193A66E9000
heap
page read and write
2CA3E424000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA48CD1000
trusted library allocation
page read and write
2CA3E3E4000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3D7DD000
trusted library allocation
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3F6CD000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA45524000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3A3F7000
heap
page read and write
2CA3F68C000
trusted library allocation
page read and write
2CA3E420000
trusted library allocation
page read and write
2CA3F4C5000
trusted library allocation
page read and write
2CA3E483000
trusted library allocation
page read and write
2CA3DF2D000
trusted library allocation
page read and write
2CA3CEF7000
trusted library allocation
page read and write
193A5530000
unclassified section
page readonly
2CA3D55B000
trusted library allocation
page read and write
2CA40577000
trusted library allocation
page read and write
14905872000
trusted library allocation
page read and write
2CA3A3BB000
heap
page read and write
2CA33C62000
heap
page read and write
193A6609000
heap
page read and write
2CA33C72000
heap
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
193A666C000
heap
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA3F1A1000
trusted library allocation
page read and write
2CA3C8D7000
trusted library allocation
page read and write
2CA3E420000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA48755000
trusted library allocation
page read and write
2CA3F18F000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA33C24000
heap
page read and write
2CA40FB4000
trusted library allocation
page read and write
2CA3E41C000
trusted library allocation
page read and write
2CA3F477000
trusted library allocation
page read and write
2CA3E4A7000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C4C000
heap
page read and write
1B5CB20A000
heap
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA3F1DA000
trusted library allocation
page read and write
2CA3FF32000
trusted library allocation
page read and write
2CA3E62B000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA404EC000
trusted library allocation
page read and write
2CA3DBB5000
trusted library allocation
page read and write
2CA45511000
trusted library allocation
page read and write
2CA3C9F6000
trusted library allocation
page read and write
1B5CB40A000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
193A579F000
unclassified section
page read and write
2CA47677000
trusted library allocation
page read and write
2CA3D5DF000
trusted library allocation
page read and write
2CA40BF1000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA3CF7D000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA3DF25000
trusted library allocation
page read and write
2CA3A40F000
heap
page read and write
2CA33C39000
heap
page read and write
2CA46900000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C31000
heap
page read and write
2CA3E397000
trusted library allocation
page read and write
2CA3D5ED000
trusted library allocation
page read and write
2CA3CF89000
trusted library allocation
page read and write
2CA45509000
trusted library allocation
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA4049E000
trusted library allocation
page read and write
2CA401C0000
trusted library allocation
page read and write
2CA3CDA7000
trusted library allocation
page read and write
2CA40BEC000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA40BF9000
trusted library allocation
page read and write
2CA3D5E5000
trusted library allocation
page read and write
2CA3D5BB000
trusted library allocation
page read and write
14905803000
trusted library allocation
page read and write
2CA3DAB4000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA3D7DF000
trusted library allocation
page read and write
2CA3DFD6000
trusted library allocation
page read and write
2CA33C35000
heap
page read and write
2472E65F000
trusted library allocation
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA3FFD3000
trusted library allocation
page read and write
2CA3DF6C000
trusted library allocation
page read and write
2CA404A8000
trusted library allocation
page read and write
2CA476AC000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA47689000
trusted library allocation
page read and write
2CA4761D000
trusted library allocation
page read and write
2CA33CB2000
heap
page read and write
2CA3F65D000
trusted library allocation
page read and write
2CA44EB8000
trusted library allocation
page read and write
2CA3E6B9000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA484CB000
trusted library allocation
page read and write
2CA3E4DD000
trusted library allocation
page read and write
2CA3C8AC000
trusted library allocation
page read and write
193A6660000
heap
page read and write
193A6660000
heap
page read and write
2CA3D7D7000
trusted library allocation
page read and write
2CA39CCB000
trusted library allocation
page read and write
2CA3F52E000
trusted library allocation
page read and write
2CA48C1C000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA40488000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3C95B000
trusted library allocation
page read and write
2CA44C72000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA33C7A000
heap
page read and write
2CA33C3C000
heap
page read and write
149055F4000
heap
page read and write
2CA41704000
trusted library allocation
page read and write
2CA33C15000
heap
page read and write
2CA45577000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3DFB0000
trusted library allocation
page read and write
2CA3A3BB000
heap
page read and write
2CA3F4CC000
trusted library allocation
page read and write
2CA3CECF000
trusted library allocation
page read and write
193A6777000
heap
page read and write
2CA40153000
trusted library allocation
page read and write
2CA473FE000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA3E4D9000
trusted library allocation
page read and write
2CA3F2BD000
trusted library allocation
page read and write
2CA45550000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
1B5CB1D0000
heap
page read and write
2CA487EB000
trusted library allocation
page read and write
2472E60C000
trusted library allocation
page read and write
2CA45574000
trusted library allocation
page read and write
2CA40B78000
trusted library allocation
page read and write
2CA3D7C5000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA3CF89000
trusted library allocation
page read and write
2CA40137000
trusted library allocation
page read and write
2CA401D8000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA33C76000
heap
page read and write
2472E66A000
trusted library allocation
page read and write
2CA3DBDC000
trusted library allocation
page read and write
2CA3F0B6000
trusted library allocation
page read and write
2CA3DB25000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C71000
heap
page read and write
2472E630000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
193A57A0000
trusted library section
page readonly
2CA33CBA000
heap
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
193A66E3000
heap
page read and write
2CA3D5A7000
trusted library allocation
page read and write
2CA405FD000
trusted library allocation
page read and write
2CA3E6C6000
trusted library allocation
page read and write
2CA44D39000
trusted library allocation
page read and write
2CA3F4D6000
trusted library allocation
page read and write
2CA45580000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3C8B6000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2472E666000
trusted library allocation
page read and write
2CA48C77000
trusted library allocation
page read and write
2CA3DBF4000
trusted library allocation
page read and write
2CA38BF6000
trusted library allocation
page read and write
2CA3DAE7000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
2CA487B3000
trusted library allocation
page read and write
2CA3CEA7000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA3D6CF000
trusted library allocation
page read and write
2CA3C864000
trusted library allocation
page read and write
2CA401B5000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA475BA000
trusted library allocation
page read and write
193A66F2000
heap
page read and write
2CA40F18000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA33C78000
heap
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA487E7000
trusted library allocation
page read and write
2CA33C43000
heap
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA3DF2F000
trusted library allocation
page read and write
2CA3CD88000
trusted library allocation
page read and write
2CA33C3C000
heap
page read and write
2CA40545000
trusted library allocation
page read and write
2CA3CEEE000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA3F65D000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA47633000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
193A5914000
trusted library allocation
page read and write
2CA33C33000
heap
page read and write
193A6669000
heap
page read and write
2CA40575000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA39E43000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA455B9000
trusted library allocation
page read and write
2CA3F657000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA3DFB0000
trusted library allocation
page read and write
2CA40ED9000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
2CA33C7E000
heap
page read and write
2CA3F68A000
trusted library allocation
page read and write
2CA40133000
trusted library allocation
page read and write
2CA3E54B000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
193A6758000
heap
page read and write
2CA3E5A5000
trusted library allocation
page read and write
2CA3E35A000
trusted library allocation
page read and write
2CA3F4BA000
trusted library allocation
page read and write
2CA3F4E7000
trusted library allocation
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA33C2E000
heap
page read and write
2CA33C32000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C60000
heap
page read and write
2CA45580000
trusted library allocation
page read and write
2CA3E648000
trusted library allocation
page read and write
2CA3F5BF000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
14905812000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA44E9F000
trusted library allocation
page read and write
2CA38C26000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3E4E0000
trusted library allocation
page read and write
2CA3DF2D000
trusted library allocation
page read and write
2CA39E45000
trusted library allocation
page read and write
2CA40170000
trusted library allocation
page read and write
2CA3DBC4000
trusted library allocation
page read and write
2CA3DA28000
trusted library allocation
page read and write
2CA3A427000
heap
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3FF56000
trusted library allocation
page read and write
2CA33C7E000
heap
page read and write
2CA3CE3F000
trusted library allocation
page read and write
2CA33C33000
heap
page read and write
2CA3A3FE000
heap
page read and write
2CA3D5BB000
trusted library allocation
page read and write
2472DFA0000
unclassified section
page readonly
2CA33C75000
heap
page read and write
2CA44EC3000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA48469000
trusted library allocation
page read and write
2CA3E5E7000
trusted library allocation
page read and write
14905700000
trusted library allocation
page read and write
2CA44C72000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
193A6669000
heap
page read and write
1384000
heap
page read and write
2CA3D59A000
trusted library allocation
page read and write
193A676C000
heap
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA4017E000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA39CF2000
trusted library allocation
page read and write
2CA3CF35000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA3E6B7000
trusted library allocation
page read and write
2CA3DB17000
trusted library allocation
page read and write
2CA487C5000
trusted library allocation
page read and write
2CA4013E000
trusted library allocation
page read and write
2CA481C8000
trusted library allocation
page read and write
2CA404EA000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3DFDA000
trusted library allocation
page read and write
2CA3CD85000
trusted library allocation
page read and write
C8747E000
unkown
page readonly
2CA4735E000
trusted library allocation
page read and write
2CA33CA5000
heap
page read and write
2CA3A413000
heap
page read and write
2CA3DAC2000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C4C000
heap
page read and write
2CA4049E000
trusted library allocation
page read and write
2CA48C83000
trusted library allocation
page read and write
2CA3F543000
trusted library allocation
page read and write
2CA3F62B000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA41399000
heap
page read and write
939000
stack
page read and write
2CA4842A000
trusted library allocation
page read and write
2CA33C11000
heap
page read and write
2CA3F3E0000
trusted library allocation
page read and write
193A668D000
heap
page read and write
2CA3F58C000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA3E4B2000
trusted library allocation
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA48469000
trusted library allocation
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA3EED3000
trusted library allocation
page read and write
2CA3E47A000
trusted library allocation
page read and write
2CA3E4C2000
trusted library allocation
page read and write
C884BE000
unkown
page readonly
2CA33C60000
heap
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA3CDA7000
trusted library allocation
page read and write
1365000
heap
page read and write
2CA44EE5000
trusted library allocation
page read and write
1E5F23E000
stack
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA3DF0E000
trusted library allocation
page read and write
2CA3F3EA000
trusted library allocation
page read and write
2CA48080000
trusted library allocation
page read and write
2CA3F657000
trusted library allocation
page read and write
2CA4848C000
trusted library allocation
page read and write
2CA39EA9000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA33C80000
heap
page read and write
2CA48490000
trusted library allocation
page read and write
2CA33C1D000
heap
page read and write
2CA33C87000
heap
page read and write
193A66F1000
heap
page read and write
2CA3D5F4000
trusted library allocation
page read and write
2CA3F4C5000
trusted library allocation
page read and write
2CA3E8C5000
trusted library allocation
page read and write
2CA3FFE2000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3D5F2000
trusted library allocation
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA3E3E4000
trusted library allocation
page read and write
2CA4059C000
trusted library allocation
page read and write
2CA3DA3C000
trusted library allocation
page read and write
2CA405FD000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
2CA481EF000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA3D5FD000
trusted library allocation
page read and write
2CA3D557000
trusted library allocation
page read and write
C86BFE000
stack
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
193A5910000
trusted library allocation
page read and write
2CA40495000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3CFD1000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA455DB000
trusted library allocation
page read and write
2CA3F6F7000
trusted library allocation
page read and write
2CA476F6000
trusted library allocation
page read and write
2CA481F8000
trusted library allocation
page read and write
2CA4134E000
heap
page read and write
1490586E000
trusted library allocation
page read and write
2CA3E578000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3F4E8000
trusted library allocation
page read and write
2CA3CB00000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3DA34000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA40178000
trusted library allocation
page read and write
2CA4059C000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33CC0000
heap
page read and write
2CA4849B000
trusted library allocation
page read and write
2CA3F5FD000
trusted library allocation
page read and write
2CA3CD6D000
trusted library allocation
page read and write
9EE000
stack
page read and write
2CA33CAC000
heap
page read and write
2CA41371000
heap
page read and write
2CA3CE76000
trusted library allocation
page read and write
2CA4804D000
trusted library allocation
page read and write
2CA33C15000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3F5FE000
trusted library allocation
page read and write
1369000
heap
page read and write
2CA413E1000
heap
page read and write
2CA33CA8000
heap
page read and write
265E52DF000
heap
page read and write
2CA33C5D000
heap
page read and write
193A59C7000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3E3C6000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA3DFC6000
trusted library allocation
page read and write
2CA39E92000
trusted library allocation
page read and write
2CA3DF1E000
trusted library allocation
page read and write
2CA487EF000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
193A599E000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA3F1CF000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3DBB2000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
1490590C000
trusted library allocation
page read and write
2CA39BCD000
trusted library allocation
page read and write
2CA4769D000
trusted library allocation
page read and write
2CA4011E000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44C37000
trusted library allocation
page read and write
2CA3CF8B000
trusted library allocation
page read and write
2CA3CF80000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA3CD6C000
trusted library allocation
page read and write
2CA4055E000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA33C60000
heap
page read and write
2CA33C62000
heap
page read and write
2CA44DC4000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA44EDC000
trusted library allocation
page read and write
1B5CB407000
trusted library allocation
page read and write
C850FD000
stack
page read and write
2CA3DAB4000
trusted library allocation
page read and write
2CA3F4E7000
trusted library allocation
page read and write
2CA4046D000
trusted library allocation
page read and write
2CA3E430000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3CDD0000
trusted library allocation
page read and write
2CA3F3EA000
trusted library allocation
page read and write
2CA46500000
trusted library allocation
page read and write
2CA3CEA7000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA3F2E9000
trusted library allocation
page read and write
2CA39CC1000
trusted library allocation
page read and write
2CA33C44000
heap
page read and write
1490585B000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA3CFE8000
trusted library allocation
page read and write
2CA40BF1000
trusted library allocation
page read and write
2CA3F3E6000
trusted library allocation
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA3E3F0000
trusted library allocation
page read and write
2CA476C8000
trusted library allocation
page read and write
2CA3F523000
trusted library allocation
page read and write
2CA3E468000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA33C4B000
heap
page read and write
2CA3D5A0000
trusted library allocation
page read and write
2CA33CA8000
heap
page read and write
2CA33C32000
heap
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA3DAA8000
trusted library allocation
page read and write
2CA3DADF000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3D5F8000
trusted library allocation
page read and write
2CA455C8000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3DAE7000
trusted library allocation
page read and write
2CA3F0FE000
trusted library allocation
page read and write
2CA3D7F0000
trusted library allocation
page read and write
2CA455C7000
trusted library allocation
page read and write
2CA4520B000
trusted library allocation
page read and write
2CA48C83000
trusted library allocation
page read and write
2CA3DF27000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA33C32000
heap
page read and write
2CA3CE6D000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3E3DB000
trusted library allocation
page read and write
2CA487AF000
trusted library allocation
page read and write
2CA41301000
heap
page read and write
2CA3F6E3000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C24000
heap
page read and write
2CA3F61C000
trusted library allocation
page read and write
193A672A000
heap
page read and write
2CA3CD7F000
trusted library allocation
page read and write
2CA3D58E000
trusted library allocation
page read and write
2CA3D5DB000
trusted library allocation
page read and write
2CA44EB8000
trusted library allocation
page read and write
2CA3CDA0000
trusted library allocation
page read and write
2CA33C78000
heap
page read and write
2CA41024000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA3CF89000
trusted library allocation
page read and write
2CA40168000
trusted library allocation
page read and write
2CA33C6E000
heap
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA3E3BA000
trusted library allocation
page read and write
2CA3E4A7000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA3E394000
trusted library allocation
page read and write
2CA405A3000
trusted library allocation
page read and write
1384000
heap
page read and write
2CA48490000
trusted library allocation
page read and write
2CA48432000
trusted library allocation
page read and write
2CA33C54000
heap
page read and write
14905879000
trusted library allocation
page read and write
2CA3DFEA000
trusted library allocation
page read and write
193A5A20000
unkown
page execute read
2CA404B0000
trusted library allocation
page read and write
2CA3E4E5000
trusted library allocation
page read and write
2CA33C1D000
heap
page read and write
2CA3FF2D000
trusted library allocation
page read and write
2CA33CB1000
heap
page read and write
2CA3DBEF000
trusted library allocation
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA40F66000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA3F432000
trusted library allocation
page read and write
2CA39E4A000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA3D554000
trusted library allocation
page read and write
2CA33CAD000
heap
page read and write
2CA3E3CB000
trusted library allocation
page read and write
2CA33CA2000
heap
page read and write
2CA33C72000
heap
page read and write
2CA3E662000
trusted library allocation
page read and write
2CA44CEA000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA480E2000
trusted library allocation
page read and write
2CA3E388000
trusted library allocation
page read and write
2CA3F4D9000
trusted library allocation
page read and write
2CA3FFF8000
trusted library allocation
page read and write
2CA44C79000
trusted library allocation
page read and write
2CA484CE000
trusted library allocation
page read and write
2CA3E3EF000
trusted library allocation
page read and write
2CA3F6CD000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
193A6500000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA487C8000
trusted library allocation
page read and write
2CA3DF66000
trusted library allocation
page read and write
2CA467A8000
trusted library allocation
page read and write
2CA3E521000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
2CA3DAE7000
trusted library allocation
page read and write
2CA44D32000
trusted library allocation
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA3D5BB000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA33C71000
heap
page read and write
2CA33C43000
heap
page read and write
2CA3E48D000
trusted library allocation
page read and write
2CA3CE6A000
trusted library allocation
page read and write
1490591A000
trusted library allocation
page read and write
2CA3DF2D000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA3F59A000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3DAF8000
trusted library allocation
page read and write
2CA3F6CB000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
2CA33C24000
heap
page read and write
2CA44C35000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA3E40A000
trusted library allocation
page read and write
2CA33C41000
heap
page read and write
2CA33C24000
heap
page read and write
2CA33C1D000
heap
page read and write
2CA33C25000
heap
page read and write
2CA455AA000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3DBE5000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA455DB000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA45574000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
3590000
heap
page read and write
2CA33C60000
heap
page read and write
2CA33C4B000
heap
page read and write
2CA33C32000
heap
page read and write
2CA3F6F7000
trusted library allocation
page read and write
4B69BFE000
stack
page read and write
2CA385EF000
trusted library allocation
page read and write
2CA3F4DC000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C62000
heap
page read and write
2CA401C2000
trusted library allocation
page read and write
193A66F1000
heap
page read and write
2CA3D736000
trusted library allocation
page read and write
14905932000
trusted library allocation
page read and write
193A66E8000
heap
page read and write
2CA3DF2D000
trusted library allocation
page read and write
FEF000
stack
page read and write
2CA33C80000
heap
page read and write
2CA40BC0000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA3F34C000
trusted library allocation
page read and write
2CA44EC0000
trusted library allocation
page read and write
2CA3FF3F000
trusted library allocation
page read and write
2CA3E3FD000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA33C1D000
heap
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA3DBBC000
trusted library allocation
page read and write
2CA3F649000
trusted library allocation
page read and write
193A5A2E000
unkown
page execute read
2472E6F6000
trusted library allocation
page read and write
193A66EE000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA4555E000
trusted library allocation
page read and write
2CA33C62000
heap
page read and write
2CA455A0000
trusted library allocation
page read and write
2CA33C75000
heap
page read and write
2CA3E463000
trusted library allocation
page read and write
2CA3E8C3000
trusted library allocation
page read and write
2CA3E37C000
trusted library allocation
page read and write
2CA44EC2000
trusted library allocation
page read and write
2472E026000
remote allocation
page execute read
2CA3DAF8000
trusted library allocation
page read and write
2CA3F681000
trusted library allocation
page read and write
2CA40111000
trusted library allocation
page read and write
2CA3D5B6000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA487B1000
trusted library allocation
page read and write
2CA40FB1000
trusted library allocation
page read and write
2CA3D546000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA41301000
heap
page read and write
2CA40BD3000
trusted library allocation
page read and write
2CA44C3C000
trusted library allocation
page read and write
1360000
heap
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA44C45000
trusted library allocation
page read and write
2CA44EE5000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3D7D3000
trusted library allocation
page read and write
2CA3FFDC000
trusted library allocation
page read and write
2CA3CF7D000
trusted library allocation
page read and write
2CA4849B000
trusted library allocation
page read and write
2CA3D571000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA3CECF000
trusted library allocation
page read and write
2CA3CD90000
trusted library allocation
page read and write
2CA33CAC000
heap
page read and write
2CA3E680000
trusted library allocation
page read and write
2472E670000
trusted library allocation
page read and write
2CA39E52000
trusted library allocation
page read and write
2CA3F4DC000
trusted library allocation
page read and write
2CA44EE8000
trusted library allocation
page read and write
2CA3DA63000
trusted library allocation
page read and write
2CA405CC000
trusted library allocation
page read and write
1384000
heap
page read and write
2CA44C17000
trusted library allocation
page read and write
2CA3A39E000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C80000
heap
page read and write
2CA33CA0000
heap
page read and write
2CA3F4B9000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA33C51000
heap
page read and write
2CA3F6BD000
trusted library allocation
page read and write
4B6A53E000
unkown
page readonly
265E550A000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3CFD1000
trusted library allocation
page read and write
2CA481F8000
trusted library allocation
page read and write
2CA3D5D5000
trusted library allocation
page read and write
2CA3F662000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA40577000
trusted library allocation
page read and write
2CA3FFBD000
trusted library allocation
page read and write
2CA3DF37000
trusted library allocation
page read and write
1B5CB1ED000
heap
page read and write
2CA40BF1000
trusted library allocation
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA3CEEE000
trusted library allocation
page read and write
2CA3E4B3000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA33C4B000
heap
page read and write
1377000
heap
page read and write
2CA3E3F9000
trusted library allocation
page read and write
2CA48CA8000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA33C76000
heap
page read and write
2CA44D91000
trusted library allocation
page read and write
2CA3E6B7000
trusted library allocation
page read and write
882000
unkown
page readonly
2CA3D5D5000
trusted library allocation
page read and write
2CA3E6E6000
trusted library allocation
page read and write
2CA413BC000
heap
page read and write
2CA48C3D000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3A413000
heap
page read and write
2CA45534000
trusted library allocation
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA45100000
trusted library allocation
page read and write
2CA45524000
trusted library allocation
page read and write
2CA3DAEA000
trusted library allocation
page read and write
2CA44EDC000
trusted library allocation
page read and write
2CA385DF000
trusted library allocation
page read and write
2CA487C9000
trusted library allocation
page read and write
2CA3DAE7000
trusted library allocation
page read and write
2CA47693000
trusted library allocation
page read and write
2CA3F3FE000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA476F9000
trusted library allocation
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA3DFA2000
trusted library allocation
page read and write
2CA3D5C7000
trusted library allocation
page read and write
2CA4045F000
trusted library allocation
page read and write
2CA3E3C0000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3E423000
trusted library allocation
page read and write
2CA3DAA8000
trusted library allocation
page read and write
2CA3D5B3000
trusted library allocation
page read and write
2CA3F4EC000
trusted library allocation
page read and write
2CA33C71000
heap
page read and write
193A57E0000
trusted library allocation
page read and write
2CA401D2000
trusted library allocation
page read and write
2CA3E3DD000
trusted library allocation
page read and write
1490587B000
trusted library allocation
page read and write
2CA3F699000
trusted library allocation
page read and write
2CA455C3000
trusted library allocation
page read and write
2CA3DA81000
trusted library allocation
page read and write
2CA33C7A000
heap
page read and write
2CA3D5C2000
trusted library allocation
page read and write
2CA3E345000
trusted library allocation
page read and write
2CA3FFC2000
trusted library allocation
page read and write
2CA3FFF3000
trusted library allocation
page read and write
2CA33C4E000
heap
page read and write
2CA33C71000
heap
page read and write
2CA33C41000
heap
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA3E4C2000
trusted library allocation
page read and write
2CA33CBA000
heap
page read and write
2CA3A3FB000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3DD02000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA44CEB000
trusted library allocation
page read and write
C85BD8000
stack
page read and write
2CA3D5EF000
trusted library allocation
page read and write
2CA40170000
trusted library allocation
page read and write
149055F6000
heap
page read and write
2CA3DAAD000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3DF4A000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3C833000
trusted library allocation
page read and write
2CA3CFB1000
trusted library allocation
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA33C3B000
heap
page read and write
2CA3F4DE000
trusted library allocation
page read and write
894000
unkown
page readonly
2CA33C52000
heap
page read and write
2CA33C71000
heap
page read and write
2CA3D7F9000
trusted library allocation
page read and write
C8853E000
unkown
page readonly
2CA33C87000
heap
page read and write
2CA48C5A000
trusted library allocation
page read and write
2CA3A3BD000
heap
page read and write
2CA3DF27000
trusted library allocation
page read and write
193A55CA000
heap
page read and write
2CA3FF9F000
trusted library allocation
page read and write
2CA3CDD0000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA3E4F5000
trusted library allocation
page read and write
2CA3DAA8000
trusted library allocation
page read and write
2CA3E447000
trusted library allocation
page read and write
149058E9000
trusted library allocation
page read and write
193A59AE000
trusted library allocation
page read and write
2CA3E418000
trusted library allocation
page read and write
2CA3EEDB000
trusted library allocation
page read and write
2CA3DBE0000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA3D5A7000
trusted library allocation
page read and write
2CA484CB000
trusted library allocation
page read and write
193A668A000
heap
page read and write
2CA40BDF000
trusted library allocation
page read and write
2CA404E6000
trusted library allocation
page read and write
2CA33C78000
heap
page read and write
2CA3DA44000
trusted library allocation
page read and write
2CA3DF37000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3E3A4000
trusted library allocation
page read and write
2CA44EB4000
trusted library allocation
page read and write
1B5CB190000
heap
page read and write
2CA4049E000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA404D8000
trusted library allocation
page read and write
2CA3CF86000
trusted library allocation
page read and write
2CA33C57000
heap
page read and write
2CA3E3F5000
trusted library allocation
page read and write
2CA3F407000
trusted library allocation
page read and write
2CA3FFEA000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
2CA41345000
heap
page read and write
2CA33C24000
heap
page read and write
193A6777000
heap
page read and write
14905A02000
heap
page read and write
193A6503000
trusted library allocation
page read and write
2CA3F18F000
trusted library allocation
page read and write
2CA41727000
trusted library allocation
page read and write
2CA33C72000
heap
page read and write
2CA3E4C2000
trusted library allocation
page read and write
2CA3CEFA000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA3E3A4000
trusted library allocation
page read and write
2CA3F4C8000
trusted library allocation
page read and write
2CA44C59000
trusted library allocation
page read and write
2CA3CD65000
trusted library allocation
page read and write
2CA38B76000
trusted library allocation
page read and write
2CA3CF2F000
trusted library allocation
page read and write
2CA3E4DD000
trusted library allocation
page read and write
2CA3DAEE000
trusted library allocation
page read and write
2CA33CB7000
heap
page read and write
193A66E9000
heap
page read and write
265E52A0000
heap
page read and write
2CA33C4C000
heap
page read and write
2CA45534000
trusted library allocation
page read and write
2CA41723000
trusted library allocation
page read and write
2CA3E3D6000
trusted library allocation
page read and write
2CA3E3E9000
trusted library allocation
page read and write
2CA44C33000
trusted library allocation
page read and write
2CA3F66D000
trusted library allocation
page read and write
2CA3E424000
trusted library allocation
page read and write
2CA33C20000
heap
page read and write
2CA3A413000
heap
page read and write
2CA3F53A000
trusted library allocation
page read and write
2CA3F5FD000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
1490549B000
remote allocation
page execute read
2CA487A0000
trusted library allocation
page read and write
2CA3D7F4000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA3DA44000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA3E464000
trusted library allocation
page read and write
2CA46702000
trusted library allocation
page read and write
2CA48CA8000
trusted library allocation
page read and write
2CA45580000
trusted library allocation
page read and write
2CA3F594000
trusted library allocation
page read and write
2CA3F532000
trusted library allocation
page read and write
2CA487C9000
trusted library allocation
page read and write
2CA3A3F7000
heap
page read and write
2CA3CF89000
trusted library allocation
page read and write
2CA4056D000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA45550000
trusted library allocation
page read and write
2CA4767D000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA33C1E000
heap
page read and write
2CA33CA2000
heap
page read and write
2CA3D5A0000
trusted library allocation
page read and write
14905640000
heap
page readonly
2CA480A8000
trusted library allocation
page read and write
2CA33C6C000
heap
page read and write
2CA3F3EE000
trusted library allocation
page read and write
2CA3A426000
heap
page read and write
2CA3F54B000
trusted library allocation
page read and write
2CA47648000
trusted library allocation
page read and write
193A6600000
heap
page read and write
2CA480F7000
trusted library allocation
page read and write
2CA40575000
trusted library allocation
page read and write
2CA44DCF000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA3FFCA000
trusted library allocation
page read and write
2CA3DF27000
trusted library allocation
page read and write
2CA3DF3D000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
193A5923000
trusted library allocation
page read and write
7C0000
unkown
page readonly
2CA33CAD000
heap
page read and write
2CA3A3F8000
heap
page read and write
2CA3D5BB000
trusted library allocation
page read and write
193A66FD000
heap
page read and write
85C000
unkown
page readonly
2472E6A2000
trusted library allocation
page read and write
2CA3DF4A000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA3A3F8000
heap
page read and write
193A665C000
heap
page read and write
149058BA000
trusted library allocation
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA33C6A000
heap
page read and write
2CA40EB1000
trusted library allocation
page read and write
2CA33C80000
heap
page read and write
2CA44EC2000
trusted library allocation
page read and write
2CA3F5F7000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA33C24000
heap
page read and write
2472E6C4000
trusted library allocation
page read and write
2CA33C87000
heap
page read and write
2CA44ECC000
trusted library allocation
page read and write
2CA45550000
trusted library allocation
page read and write
2CA41001000
trusted library allocation
page read and write
2CA33CAF000
heap
page read and write
2CA33C32000
heap
page read and write
2CA33C42000
heap
page read and write
2CA3E554000
trusted library allocation
page read and write
2CA33C25000
heap
page read and write
2CA33C6B000
heap
page read and write
2CA404D6000
trusted library allocation
page read and write
2CA3F3DA000
trusted library allocation
page read and write
2CA40BBA000
trusted library allocation
page read and write
2CA33C3D000
heap
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA33C60000
heap
page read and write
2CA38C75000
trusted library allocation
page read and write
2CA3D7EB000
trusted library allocation
page read and write
2CA405A3000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
193A66EE000
heap
page read and write
2CA40590000
trusted library allocation
page read and write
2CA3F4D9000
trusted library allocation
page read and write
193A5A44000
unkown
page execute read
2CA40B83000
trusted library allocation
page read and write
2CA3C8FE000
trusted library allocation
page read and write
2CA45555000
trusted library allocation
page read and write
2CA3F5A4000
trusted library allocation
page read and write
2CA3D7EB000
trusted library allocation
page read and write
2CA3CEF7000
trusted library allocation
page read and write
193A6758000
heap
page read and write
2CA3C8D3000
trusted library allocation
page read and write
2CA476B1000
trusted library allocation
page read and write
2CA33C38000
heap
page read and write
C884FE000
stack
page read and write
2CA3FFCF000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA3D59C000
trusted library allocation
page read and write
2CA3DF7E000
trusted library allocation
page read and write
2CA3CD85000
trusted library allocation
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA455D4000
trusted library allocation
page read and write
2CA3E356000
trusted library allocation
page read and write
2CA44EFC000
trusted library allocation
page read and write
2CA3E448000
trusted library allocation
page read and write
2CA3F4D6000
trusted library allocation
page read and write
2CA401D6000
trusted library allocation
page read and write
2CA455C5000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA404A8000
trusted library allocation
page read and write
2CA40F5C000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
1E5FA3E000
unkown
page readonly
2CA3F4A8000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44EFE000
trusted library allocation
page read and write
2CA3F68A000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA455A7000
trusted library allocation
page read and write
2CA48C6A000
trusted library allocation
page read and write
2CA3F6A1000
trusted library allocation
page read and write
2CA45577000
trusted library allocation
page read and write
2CA3E4ED000
trusted library allocation
page read and write
2CA3CF87000
trusted library allocation
page read and write
2CA33C32000
heap
page read and write
2CA3F162000
trusted library allocation
page read and write
2CA33C68000
heap
page read and write
2CA487F7000
trusted library allocation
page read and write
1150000
heap
page read and write
2CA3A3F2000
heap
page read and write
2CA3CE96000
trusted library allocation
page read and write
2CA404FB000
trusted library allocation
page read and write
2CA3DF21000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2472E613000
trusted library allocation
page read and write
2CA33C3D000
heap
page read and write
2CA33CA4000
heap
page read and write
2CA33C71000
heap
page read and write
2CA3F2FA000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA3A3EA000
heap
page read and write
2CA33C71000
heap
page read and write
2CA40330000
trusted library allocation
page read and write
2CA3CFE8000
trusted library allocation
page read and write
2CA3A3F1000
heap
page read and write
2CA33C25000
heap
page read and write
2472E1F0000
heap
page read and write
2CA3E3AC000
trusted library allocation
page read and write
2CA3DAA6000
trusted library allocation
page read and write
2CA3F54F000
trusted library allocation
page read and write
2CA33C1E000
heap
page read and write
7C0000
unkown
page readonly
2CA3E6B9000
trusted library allocation
page read and write
C851FE000
stack
page read and write
2CA3E4B8000
trusted library allocation
page read and write
2CA4032E000
trusted library allocation
page read and write
2CA3A3F8000
heap
page read and write
2CA4765D000
trusted library allocation
page read and write
2CA3C8CB000
trusted library allocation
page read and write
2CA33C7E000
heap
page read and write
2CA401D4000
trusted library allocation
page read and write
2CA3E6EF000
trusted library allocation
page read and write
2CA3E35A000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA33C3A000
heap
page read and write
2CA404E8000
trusted library allocation
page read and write
2CA487AF000
trusted library allocation
page read and write
2CA48449000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
88C000
unkown
page read and write
2CA48CE4000
trusted library allocation
page read and write
2CA3D7FB000
trusted library allocation
page read and write
2CA3D592000
trusted library allocation
page read and write
2CA3FFF3000
trusted library allocation
page read and write
2CA401E6000
trusted library allocation
page read and write
2CA3F5F7000
trusted library allocation
page read and write
1B5CB185000
heap
page read and write
193A66F1000
heap
page read and write
2CA33C87000
heap
page read and write
2CA3C877000
trusted library allocation
page read and write
2CA44CEA000
trusted library allocation
page read and write
2CA3F300000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA487EB000
trusted library allocation
page read and write
2CA3E688000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA3E4D0000
trusted library allocation
page read and write
FDB000
stack
page read and write
2CA33C1E000
heap
page read and write
2CA33C7E000
heap
page read and write
1357000
heap
page read and write
2472E160000
heap
page read and write
2CA44EA3000
trusted library allocation
page read and write
2CA45593000
trusted library allocation
page read and write
2CA33C30000
heap
page read and write
2CA3F5BF000
trusted library allocation
page read and write
2CA41783000
trusted library allocation
page read and write
2CA33C39000
heap
page read and write
2CA33C62000
heap
page read and write
2CA33C3A000
heap
page read and write
193A665C000
heap
page read and write
2CA33C60000
heap
page read and write
2CA455E8000
trusted library allocation
page read and write
2CA44D47000
trusted library allocation
page read and write
2CA40BE9000
trusted library allocation
page read and write
2CA44ED2000
trusted library allocation
page read and write
2CA3CE7A000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA3F59D000
trusted library allocation
page read and write
2CA44EEB000
trusted library allocation
page read and write
2CA33C4C000
heap
page read and write
2CA45593000
trusted library allocation
page read and write
2CA3D5ED000
trusted library allocation
page read and write
14905420000
unclassified section
page readonly
2CA3DFAA000
trusted library allocation
page read and write
2CA33CA0000
heap
page read and write
2CA3D5CD000
trusted library allocation
page read and write
2CA33C33000
heap
page read and write
2CA3E3B9000
trusted library allocation
page read and write
2CA33C24000
heap
page read and write
2CA44DA4000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA33C68000
heap
page read and write
2CA33C68000
heap
page read and write
2CA3E4B5000
trusted library allocation
page read and write
2CA3DA38000
trusted library allocation
page read and write
193A6759000
heap
page read and write
2CA3E41A000
trusted library allocation
page read and write
193A6758000
heap
page read and write
2CA3FFCF000
trusted library allocation
page read and write
2CA3A406000
heap
page read and write
2CA45580000
trusted library allocation
page read and write
2CA3C863000
trusted library allocation
page read and write
2CA3E5F4000
trusted library allocation
page read and write
2CA3D7E3000
trusted library allocation
page read and write
1154000
heap
page read and write
2CA33C1E000
heap
page read and write
2472E703000
trusted library allocation
page read and write
2CA3A413000
heap
page read and write
2CA3CF1B000
trusted library allocation
page read and write
2CA3E4F5000
trusted library allocation
page read and write
193A6758000
heap
page read and write
2CA3D5AB000
trusted library allocation
page read and write
2CA3DBF9000
trusted library allocation
page read and write
2CA33C5D000
heap
page read and write
2CA3DF81000
trusted library allocation
page read and write
2CA33C70000
heap
page read and write
2CA3CF8B000
trusted library allocation
page read and write
2CA33C34000
heap
page read and write
2CA45595000
trusted library allocation
page read and write
2CA3CE72000
trusted library allocation
page read and write
2CA3E462000
trusted library allocation
page read and write
2CA3C833000
trusted library allocation
page read and write
2CA3C863000
trusted library allocation
page read and write
193A6669000
heap
page read and write
2CA455BE000
trusted library allocation
page read and write
2CA4550B000
trusted library allocation
page read and write
14905810000
trusted library allocation
page read and write
2CA3EE6C000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA33C21000
heap
page read and write
2CA4846D000
trusted library allocation
page read and write
2CA455A9000
trusted library allocation
page read and write
2CA3A40E000
heap
page read and write
2CA33C87000
heap
page read and write
2CA33C80000
heap
page read and write
2CA3E4C5000
trusted library allocation
page read and write
2CA3D59A000
trusted library allocation
page read and write
2CA33C4B000
heap
page read and write
193A6660000
heap
page read and write
2CA33CA8000
heap
page read and write
882000
unkown
page readonly
2CA3D7D6000
trusted library allocation
page read and write
2CA44CD2000
trusted library allocation
page read and write
4B6A4BE000
unkown
page readonly
2CA48C4D000
trusted library allocation
page read and write
2CA44EBE000
trusted library allocation
page read and write
2CA3E39C000
trusted library allocation
page read and write
99147FC000
stack
page read and write
2CA3F5EE000
trusted library allocation
page read and write
2CA33C6B000
heap
page read and write
2CA3D585000
trusted library allocation
page read and write
2CA476F6000
trusted library allocation
page read and write
2CA33C1F000
heap
page read and write
2CA3C87B000
trusted library allocation
page read and write
2CA3E3E0000
trusted library allocation
page read and write
2CA33C69000
heap
page read and write
1B5CB202000
heap
page read and write
2472E400000
heap
page read and write
2CA3E5D4000
trusted library allocation
page read and write
2CA44C35000
trusted library allocation
page read and write
2CA3F699000
trusted library allocation
page read and write
2CA3E3E3000
trusted library allocation
page read and write
2CA33C5A000
heap
page read and write
2CA3CF80000
trusted library allocation
page read and write
2CA40577000
trusted library allocation
page read and write
2CA45567000
trusted library allocation
page read and write
2CA3F5FB000
trusted library allocation
page read and write
2CA404A8000
trusted library allocation
page read and write
2CA3A3FE000
heap
page read and write
There are 3994 hidden memdumps, click here to show them.