IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfbc8475-05d4-4163-af93-87d0c3f1feb8.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfbc8475-05d4-4163-af93-87d0c3f1feb8.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dd69434-b1bf-4028-b798-7c4ee918bc54} 7860 "\\.\pipe\gecko-crash-server-pipe.7860" 14edf76f710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3828 -parentBuildID 20230927232528 -prefsHandle 3808 -prefMapHandle 2780 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81a23b37-65e5-4176-a8ce-8938ffe3cfe9} 7860 "\\.\pipe\gecko-crash-server-pipe.7860" 14ef1865210 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5500 -prefMapHandle 5476 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69513a0f-09df-48a4-80b6-37d61aa73f6e} 7860 "\\.\pipe\gecko-crash-server-pipe.7860" 14edf774310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
14EFB27A000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF2D65000
trusted library allocation
page read and write
14EEAE81000
trusted library allocation
page read and write
14EF04B8000
trusted library allocation
page read and write
207ACBE000
stack
page read and write
14EEF7CB000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
1B27950C000
trusted library allocation
page read and write
14EF0BB5000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE64A1000
heap
page read and write
14EE6471000
heap
page read and write
14EE6492000
heap
page read and write
14EE6487000
heap
page read and write
14EE6502000
heap
page read and write
14EF9B84000
trusted library allocation
page read and write
14EF04B6000
trusted library allocation
page read and write
1B279530000
trusted library allocation
page read and write
14EF2A83000
trusted library allocation
page read and write
1F42AA58000
heap
page read and write
14EF08FB000
trusted library allocation
page read and write
14EEFBAB000
trusted library allocation
page read and write
2A959FE000
stack
page read and write
14EE649F000
heap
page read and write
14EF1E7F000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
14EF7B89000
trusted library allocation
page read and write
14EEC763000
trusted library allocation
page read and write
199162FB000
heap
page read and write
14EE6492000
heap
page read and write
14EE6502000
heap
page read and write
14EF1A89000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF7DFC000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF94E9000
trusted library allocation
page read and write
14EEC6A9000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
14EF04E4000
trusted library allocation
page read and write
14EEF7BF000
trusted library allocation
page read and write
14EF199E000
trusted library allocation
page read and write
5F6000
heap
page read and write
168886A3000
heap
page read and write
14EF1073000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EE64DF000
heap
page read and write
14EF951E000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EF7B9E000
trusted library allocation
page read and write
1F42A9E0000
heap
page read and write
14EF34DE000
trusted library allocation
page read and write
1F429DC7000
trusted library allocation
page read and write
1F429D86000
trusted library allocation
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EF7537000
trusted library allocation
page read and write
14EF0F46000
trusted library allocation
page read and write
14EF0C30000
trusted library allocation
page read and write
1B279576000
trusted library allocation
page read and write
14EEEAB7000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF0D13000
trusted library allocation
page read and write
14EF2DE0000
trusted library allocation
page read and write
1F429DE9000
trusted library allocation
page read and write
14EFB14C000
trusted library allocation
page read and write
1F429D12000
trusted library allocation
page read and write
14EF7BA0000
trusted library allocation
page read and write
14EF7AA5000
trusted library allocation
page read and write
14EF7E7F000
trusted library allocation
page read and write
14EF7B26000
trusted library allocation
page read and write
14EF7CD4000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EF00EA000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF2D80000
trusted library allocation
page read and write
14EE6483000
heap
page read and write
14EEEDF0000
heap
page read and write
14EEC7C0000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
14EEF17E000
trusted library allocation
page read and write
14EF7EFA000
trusted library allocation
page read and write
14EF0AAF000
trusted library allocation
page read and write
14EE646B000
heap
page read and write
14EF7CB5000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EF7E67000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EE646B000
heap
page read and write
14EF2D7B000
trusted library allocation
page read and write
14EEC4D9000
trusted library allocation
page read and write
14EEC7C7000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EF0AA9000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EEED8F000
heap
page read and write
14EF0DE3000
trusted library allocation
page read and write
14EF0FFC000
trusted library allocation
page read and write
14EF0776000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE64A1000
heap
page read and write
14EF7A49000
trusted library allocation
page read and write
1F42AA59000
heap
page read and write
14EE648C000
heap
page read and write
14EE649F000
heap
page read and write
14EF1055000
trusted library allocation
page read and write
168884D0000
heap
page read and write
14EFAED9000
trusted library allocation
page read and write
168884FA000
heap
page read and write
14EF09C5000
trusted library allocation
page read and write
14EEFB27000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF106E000
trusted library allocation
page read and write
14EF0ADB000
trusted library allocation
page read and write
52A000
stack
page read and write
F82000
heap
page read and write
16888A00000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE6482000
heap
page read and write
14EF0496000
trusted library allocation
page read and write
14EF047B000
trusted library allocation
page read and write
14EF0FF1000
trusted library allocation
page read and write
14EF077B000
trusted library allocation
page read and write
14EF2F6D000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF17BA000
trusted library allocation
page read and write
14EF106E000
trusted library allocation
page read and write
14EEED93000
heap
page read and write
14EEF738000
trusted library allocation
page read and write
14EF0BA8000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF043A000
trusted library allocation
page read and write
14EF2DC0000
trusted library allocation
page read and write
14EEFF4E000
trusted library allocation
page read and write
14EF1ED2000
trusted library allocation
page read and write
14EF103C000
trusted library allocation
page read and write
14EF0BD4000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EEF190000
trusted library allocation
page read and write
19914B35000
heap
page read and write
14EEF7CA000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
14EF1EFB000
trusted library allocation
page read and write
14EF0ECB000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
32867FE000
stack
page read and write
14EF0DCB000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
14EEC744000
trusted library allocation
page read and write
14EF2A54000
trusted library allocation
page read and write
14EF2D56000
trusted library allocation
page read and write
14EF76A1000
heap
page read and write
14EF1AEE000
trusted library allocation
page read and write
14EF00E1000
trusted library allocation
page read and write
14EEF386000
trusted library allocation
page read and write
14EFB15F000
trusted library allocation
page read and write
14EF75F7000
trusted library allocation
page read and write
14EFB159000
trusted library allocation
page read and write
14EF0ABB000
trusted library allocation
page read and write
14EF34EC000
trusted library allocation
page read and write
1F42A969000
heap
page read and write
1F42AA6D000
heap
page read and write
14EF7B34000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
14EF10C2000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE6471000
heap
page read and write
14EF2FFC000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EE6498000
heap
page read and write
14EF0496000
trusted library allocation
page read and write
14EF94FD000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
14EF7B75000
trusted library allocation
page read and write
14EF34F0000
trusted library allocation
page read and write
14EEED99000
heap
page read and write
1B279582000
trusted library allocation
page read and write
14EFAE07000
trusted library allocation
page read and write
14EEFB9B000
trusted library allocation
page read and write
1B27955F000
trusted library allocation
page read and write
14EF1E79000
trusted library allocation
page read and write
1B279549000
trusted library allocation
page read and write
14EF7ABB000
trusted library allocation
page read and write
14EEED9D000
heap
page read and write
14EEF10D000
trusted library allocation
page read and write
14EEEAC5000
trusted library allocation
page read and write
14EEC779000
trusted library allocation
page read and write
14EE6479000
heap
page read and write
14EF00AC000
trusted library allocation
page read and write
14EF0F61000
trusted library allocation
page read and write
14EF10B2000
trusted library allocation
page read and write
14EEF738000
trusted library allocation
page read and write
14EEEDBE000
heap
page read and write
14EE64A6000
heap
page read and write
14EF7514000
trusted library allocation
page read and write
14EEC763000
trusted library allocation
page read and write
14EF7E79000
trusted library allocation
page read and write
14EEC7EB000
trusted library allocation
page read and write
2A969FE000
stack
page read and write
14EF1E71000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE649F000
heap
page read and write
14EFB2D4000
trusted library allocation
page read and write
14EEED7F000
heap
page read and write
14EEED92000
heap
page read and write
14EF0AFB000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6482000
heap
page read and write
14EFAEE7000
trusted library allocation
page read and write
14EF0BA8000
trusted library allocation
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF2A26000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF1075000
trusted library allocation
page read and write
14EF2D86000
trusted library allocation
page read and write
14EEC769000
trusted library allocation
page read and write
14EFB111000
trusted library allocation
page read and write
14EF1EED000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEF28E000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EF7B89000
trusted library allocation
page read and write
14EEEBC8000
trusted library allocation
page read and write
14EF1E56000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF0AA7000
trusted library allocation
page read and write
14EEF269000
trusted library allocation
page read and write
14EEEDC1000
heap
page read and write
14EFAE5D000
trusted library allocation
page read and write
14EEF77F000
trusted library allocation
page read and write
14EF1E59000
trusted library allocation
page read and write
14EF0A75000
trusted library allocation
page read and write
14EF2D92000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EF0B63000
trusted library allocation
page read and write
1F42A9E8000
heap
page read and write
F5C000
heap
page read and write
F82000
heap
page read and write
14EF04E4000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EF044A000
trusted library allocation
page read and write
14EEF28D000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF09E5000
trusted library allocation
page read and write
14EEF28E000
trusted library allocation
page read and write
F4F000
heap
page read and write
14EF1084000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6498000
heap
page read and write
14EF29CA000
trusted library allocation
page read and write
14EEFB33000
trusted library allocation
page read and write
14EF7D37000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE64A6000
heap
page read and write
14EF0AE3000
trusted library allocation
page read and write
14EF7D62000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EF752A000
trusted library allocation
page read and write
14EF0B86000
trusted library allocation
page read and write
14EEF29E000
trusted library allocation
page read and write
14EEFB8D000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EEF383000
trusted library allocation
page read and write
14EF047E000
trusted library allocation
page read and write
14EF7E63000
trusted library allocation
page read and write
14EF7DD9000
trusted library allocation
page read and write
A24000
unkown
page readonly
14EEF7EC000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EE647A000
heap
page read and write
14EF0F4F000
trusted library allocation
page read and write
14EF106A000
trusted library allocation
page read and write
14EEC7C7000
trusted library allocation
page read and write
14EF0ACB000
trusted library allocation
page read and write
14EFB25E000
trusted library allocation
page read and write
168883F0000
unclassified section
page readonly
1F429CE6000
heap
page read and write
14EE64AF000
heap
page read and write
14EF76E1000
heap
page read and write
14EF09B0000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EEED9D000
heap
page read and write
1F429D48000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
1F429D69000
trusted library allocation
page read and write
14EF75E3000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EEF160000
trusted library allocation
page read and write
14EEEDC1000
heap
page read and write
14EF2D4E000
trusted library allocation
page read and write
14EFAE82000
trusted library allocation
page read and write
14EEFBFB000
trusted library allocation
page read and write
14EEC763000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
16888640000
unclassified section
page read and write
14EEEBCF000
trusted library allocation
page read and write
14EF0755000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE64F9000
heap
page read and write
14EF7CA9000
trusted library allocation
page read and write
14EFAE88000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EEEAC5000
trusted library allocation
page read and write
93EC9FE000
stack
page read and write
5F4000
heap
page read and write
14EE6471000
heap
page read and write
14EEF7C2000
trusted library allocation
page read and write
14EF2D7B000
trusted library allocation
page read and write
14EEAEEF000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF7606000
heap
page read and write
14EF9CD2000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE649D000
heap
page read and write
14EF9BFD000
trusted library allocation
page read and write
14EEF17C000
trusted library allocation
page read and write
14EE646B000
heap
page read and write
14EF0BAC000
trusted library allocation
page read and write
14EEF76E000
trusted library allocation
page read and write
14EF7C34000
trusted library allocation
page read and write
14EF7D66000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EE649F000
heap
page read and write
14EF7ADC000
trusted library allocation
page read and write
14EF0B63000
trusted library allocation
page read and write
14EEF160000
trusted library allocation
page read and write
14EEC7A1000
trusted library allocation
page read and write
14EF0BF8000
trusted library allocation
page read and write
14EF0B48000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE64AF000
heap
page read and write
14EF7D21000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF19C0000
trusted library allocation
page read and write
F52000
heap
page read and write
14EEF284000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF0B50000
trusted library allocation
page read and write
14EF0445000
trusted library allocation
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EF048C000
trusted library allocation
page read and write
14EF2DE0000
trusted library allocation
page read and write
14EF7B9E000
trusted library allocation
page read and write
16888810000
trusted library allocation
page read and write
14EF0ED6000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF9CC6000
trusted library allocation
page read and write
14EF0B43000
trusted library allocation
page read and write
1688886E000
trusted library allocation
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EF0F5B000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
F5F000
heap
page read and write
14EF8ECA000
trusted library allocation
page read and write
1F429AC0000
trusted library section
page readonly
14EFAE82000
trusted library allocation
page read and write
14EFAE88000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF7A6B000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE649E000
heap
page read and write
14EF2A8F000
trusted library allocation
page read and write
2A948FE000
stack
page read and write
14EE64DF000
heap
page read and write
14EE649F000
heap
page read and write
14EE6482000
heap
page read and write
16888470000
unclassified section
page readonly
14EEED99000
heap
page read and write
14EF759D000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EE6473000
heap
page read and write
14EFB273000
trusted library allocation
page read and write
1B2791D0000
heap
page read and write
14EE6503000
heap
page read and write
14EF2F25000
trusted library allocation
page read and write
14EEC7A6000
trusted library allocation
page read and write
9C561FE000
stack
page read and write
19914850000
heap
page read and write
14EF7DE2000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE645B000
heap
page read and write
14EF1AC1000
trusted library allocation
page read and write
14EF07D3000
trusted library allocation
page read and write
14EF080A000
trusted library allocation
page read and write
14EE64F1000
heap
page read and write
14EFAEE9000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EEFB99000
trusted library allocation
page read and write
14EF7CE8000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEED7E000
heap
page read and write
14EFABF1000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF7CE1000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
5F6000
heap
page read and write
14EF7DD9000
trusted library allocation
page read and write
9EC000
unkown
page readonly
14EE647B000
heap
page read and write
14EF7B3E000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
14EF29F1000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
1F429DB6000
trusted library allocation
page read and write
14EF7E1E000
trusted library allocation
page read and write
14EF0A65000
trusted library allocation
page read and write
14EF7A52000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE64A5000
heap
page read and write
14EFAE8A000
trusted library allocation
page read and write
14EF10DD000
trusted library allocation
page read and write
1B279524000
trusted library allocation
page read and write
16888803000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EF0ACE000
trusted library allocation
page read and write
14EF10BB000
trusted library allocation
page read and write
14EEFB6D000
trusted library allocation
page read and write
16888872000
trusted library allocation
page read and write
14EEF29E000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EE64A6000
heap
page read and write
14EEED8E000
heap
page read and write
14EF1E4E000
trusted library allocation
page read and write
14EEC767000
trusted library allocation
page read and write
14EF7BA0000
trusted library allocation
page read and write
14EFAE88000
trusted library allocation
page read and write
14EF1ADC000
trusted library allocation
page read and write
14EF7ADC000
trusted library allocation
page read and write
14EEED7D000
heap
page read and write
14EE6480000
heap
page read and write
14EE64A5000
heap
page read and write
14EEEDF0000
heap
page read and write
14EEF11F000
trusted library allocation
page read and write
14EEF28E000
trusted library allocation
page read and write
14EF7549000
trusted library allocation
page read and write
2A940FE000
unkown
page readonly
14EF7CC4000
trusted library allocation
page read and write
14EF7514000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE646A000
heap
page read and write
14EF34C4000
trusted library allocation
page read and write
14EF7BEA000
trusted library allocation
page read and write
14EF2ACA000
trusted library allocation
page read and write
14EF2D80000
trusted library allocation
page read and write
14EF7535000
trusted library allocation
page read and write
14EF0CFD000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE64F1000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
14EF0BF9000
trusted library allocation
page read and write
14EEC7C1000
trusted library allocation
page read and write
14EF0FE3000
trusted library allocation
page read and write
2A961FE000
unkown
page readonly
14EFB961000
trusted library allocation
page read and write
14EF751E000
trusted library allocation
page read and write
14EE6454000
heap
page read and write
16888812000
trusted library allocation
page read and write
14EEF286000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE647A000
heap
page read and write
14EEF379000
trusted library allocation
page read and write
14EF0DED000
trusted library allocation
page read and write
27FFF271000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EFB227000
trusted library allocation
page read and write
14EF0BD5000
trusted library allocation
page read and write
14EF0FFC000
trusted library allocation
page read and write
14EEED75000
heap
page read and write
14EEEAFA000
trusted library allocation
page read and write
1F429AB2000
unclassified section
page read and write
14EE648C000
heap
page read and write
14EE6482000
heap
page read and write
14EF0F5F000
trusted library allocation
page read and write
14EEEDB5000
heap
page read and write
14EE6450000
heap
page read and write
14EF7A38000
trusted library allocation
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EEED80000
heap
page read and write
14EF099B000
trusted library allocation
page read and write
14EF75C8000
trusted library allocation
page read and write
14EF7A44000
trusted library allocation
page read and write
14EF7600000
trusted library allocation
page read and write
14EE645F000
heap
page read and write
F78000
heap
page read and write
14EF2D84000
trusted library allocation
page read and write
14EFAB50000
trusted library allocation
page read and write
14EFB235000
trusted library allocation
page read and write
14EF7D7D000
trusted library allocation
page read and write
14EF0AE3000
trusted library allocation
page read and write
14EF0DE9000
trusted library allocation
page read and write
14EF2F7C000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF2D92000
trusted library allocation
page read and write
14EF750E000
trusted library allocation
page read and write
199148E2000
heap
page read and write
14EE6469000
heap
page read and write
1F42A9E3000
heap
page read and write
14EF7595000
trusted library allocation
page read and write
14EF2FE8000
trusted library allocation
page read and write
14EF1A5F000
trusted library allocation
page read and write
14EF75C1000
trusted library allocation
page read and write
14EF7AA2000
trusted library allocation
page read and write
14EEF11C000
trusted library allocation
page read and write
14EEFDFD000
trusted library allocation
page read and write
14EEAEB3000
trusted library allocation
page read and write
1F42AA2A000
heap
page read and write
14EEED92000
heap
page read and write
14EE6471000
heap
page read and write
14EF759B000
trusted library allocation
page read and write
14EF2DD3000
trusted library allocation
page read and write
16888881000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EE6450000
heap
page read and write
14EF7B96000
trusted library allocation
page read and write
14EEFBEE000
trusted library allocation
page read and write
14EF2D65000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EEEDB2000
heap
page read and write
14EE64A5000
heap
page read and write
2A927D8000
stack
page read and write
14EF29FA000
trusted library allocation
page read and write
14EF7C74000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EE6471000
heap
page read and write
14EEF78D000
trusted library allocation
page read and write
14EF2A54000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
14EFB2AF000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EF29C1000
trusted library allocation
page read and write
1F42A1A0000
trusted library allocation
page read and write
14EF1025000
trusted library allocation
page read and write
14EF2DBB000
trusted library allocation
page read and write
14EF2F44000
trusted library allocation
page read and write
14EF0CBE000
trusted library allocation
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EF7EF6000
trusted library allocation
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EF7D74000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6498000
heap
page read and write
14EFAC80000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EE64A5000
heap
page read and write
14EF75F3000
trusted library allocation
page read and write
14EF046A000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EEED9D000
heap
page read and write
14EE6471000
heap
page read and write
14EF0DA2000
trusted library allocation
page read and write
1F42A9EB000
heap
page read and write
14EF2D53000
trusted library allocation
page read and write
14EEED76000
heap
page read and write
14EF9CDD000
trusted library allocation
page read and write
14EEC7C1000
trusted library allocation
page read and write
1B2795F6000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF7B8D000
trusted library allocation
page read and write
14EF0455000
trusted library allocation
page read and write
14EF2D82000
trusted library allocation
page read and write
14EF7B98000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF8E51000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EFB285000
trusted library allocation
page read and write
14EEF194000
trusted library allocation
page read and write
14EF9BFB000
trusted library allocation
page read and write
14EF1D94000
trusted library allocation
page read and write
14EF7B72000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF29CA000
trusted library allocation
page read and write
2A91DFE000
unkown
page readonly
14EEC72C000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EF1AA2000
trusted library allocation
page read and write
14EF09BB000
trusted library allocation
page read and write
14EF1B9F000
trusted library allocation
page read and write
14EF0ADB000
trusted library allocation
page read and write
14EF7D72000
trusted library allocation
page read and write
14EEEDC7000
heap
page read and write
14EE6492000
heap
page read and write
14EEC798000
trusted library allocation
page read and write
14EF0D13000
trusted library allocation
page read and write
14EF0D8B000
trusted library allocation
page read and write
14EF299C000
trusted library allocation
page read and write
14EEEA91000
trusted library allocation
page read and write
1F42A9E8000
heap
page read and write
14EEF27C000
trusted library allocation
page read and write
14EF90B1000
trusted library allocation
page read and write
14EF2A3A000
trusted library allocation
page read and write
14EF0AA9000
trusted library allocation
page read and write
14EF078B000
trusted library allocation
page read and write
14EF0CB2000
trusted library allocation
page read and write
14EF7A98000
trusted library allocation
page read and write
14EF29D7000
trusted library allocation
page read and write
14EF0BEE000
trusted library allocation
page read and write
14EEED9D000
heap
page read and write
1B27990C000
trusted library allocation
page read and write
93EE9FE000
stack
page read and write
14EE6471000
heap
page read and write
14EF1EB5000
trusted library allocation
page read and write
14EF0BEE000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EF9124000
trusted library allocation
page read and write
14EF8E47000
trusted library allocation
page read and write
14EF29DB000
trusted library allocation
page read and write
14EF0F33000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EE648C000
heap
page read and write
14EF0FE3000
trusted library allocation
page read and write
14EF1E90000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF1AD6000
trusted library allocation
page read and write
1F42A2D0000
heap
page read and write
14EE649F000
heap
page read and write
5F4000
heap
page read and write
14EF07CF000
trusted library allocation
page read and write
14EEED90000
heap
page read and write
14EE645B000
heap
page read and write
14EF0AAC000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE6471000
heap
page read and write
14EF1D9B000
trusted library allocation
page read and write
14EF106C000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
16888650000
heap
page read and write
14EF0DD5000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF07D3000
trusted library allocation
page read and write
14EFAE4C000
trusted library allocation
page read and write
207713E000
unkown
page readonly
14EE6483000
heap
page read and write
14EE647D000
heap
page read and write
14EE64A6000
heap
page read and write
14EE645E000
heap
page read and write
14EF106E000
trusted library allocation
page read and write
14EF7A80000
trusted library allocation
page read and write
14EEF3B5000
trusted library allocation
page read and write
14EE6486000
heap
page read and write
14EEAE98000
trusted library allocation
page read and write
14EF75F7000
trusted library allocation
page read and write
14EF106A000
trusted library allocation
page read and write
1C90000
heap
page read and write
14EE6474000
heap
page read and write
14EF104A000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EEEAD8000
trusted library allocation
page read and write
14EFAE4C000
trusted library allocation
page read and write
14EF0DF3000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EF8EF1000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EFB15D000
trusted library allocation
page read and write
14EF103C000
trusted library allocation
page read and write
14EF0AFB000
trusted library allocation
page read and write
14EF2A7B000
trusted library allocation
page read and write
14EF1073000
trusted library allocation
page read and write
14EF29E5000
trusted library allocation
page read and write
F62000
heap
page read and write
14EF10D5000
trusted library allocation
page read and write
14EEF285000
trusted library allocation
page read and write
168886A0000
heap
page read and write
14EF10BB000
trusted library allocation
page read and write
14EEF11F000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
5F6000
heap
page read and write
14EEFBBD000
trusted library allocation
page read and write
14EF07D8000
trusted library allocation
page read and write
14EF106C000
trusted library allocation
page read and write
1F429B00000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
14EFB247000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF2AF7000
trusted library allocation
page read and write
14EF7AC7000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE648C000
heap
page read and write
14EF0EF0000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEF7ED000
trusted library allocation
page read and write
14EEC7EB000
trusted library allocation
page read and write
14EF7CC4000
trusted library allocation
page read and write
14EF7AA2000
trusted library allocation
page read and write
14EFAE10000
trusted library allocation
page read and write
2A951BE000
stack
page read and write
14EE6498000
heap
page read and write
14EF29E0000
trusted library allocation
page read and write
14EF34CB000
trusted library allocation
page read and write
14EF2ADD000
trusted library allocation
page read and write
14EF7E7F000
trusted library allocation
page read and write
14EF1AE3000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF0F5F000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EE6470000
heap
page read and write
14EE6496000
heap
page read and write
14EEFB49000
trusted library allocation
page read and write
14EF7D97000
trusted library allocation
page read and write
14EF7E95000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EEEDB7000
heap
page read and write
14EF08F8000
trusted library allocation
page read and write
14EF7B8D000
trusted library allocation
page read and write
19914900000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF106A000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE6482000
heap
page read and write
14EF75DB000
trusted library allocation
page read and write
14EF29CA000
trusted library allocation
page read and write
14EFA900000
trusted library allocation
page read and write
14EF7C6E000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
14EF0B63000
trusted library allocation
page read and write
93EAF2E000
unkown
page readonly
14EE649F000
heap
page read and write
14EE6492000
heap
page read and write
14EF7E63000
trusted library allocation
page read and write
14EEC4DE000
trusted library allocation
page read and write
14EF1E71000
trusted library allocation
page read and write
14EE6494000
heap
page read and write
14EF1EDF000
trusted library allocation
page read and write
14EF0BCF000
trusted library allocation
page read and write
1F42A9F1000
heap
page read and write
14EF0D13000
trusted library allocation
page read and write
1F42A960000
heap
page read and write
16888847000
trusted library allocation
page read and write
14EF0C44000
trusted library allocation
page read and write
1B279565000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EF0BF0000
trusted library allocation
page read and write
14EEEDEB000
heap
page read and write
14EF7CC8000
trusted library allocation
page read and write
199162E8000
heap
page read and write
14EE64DF000
heap
page read and write
14EEF255000
trusted library allocation
page read and write
14EF2D7B000
trusted library allocation
page read and write
1F42A9F2000
heap
page read and write
14EE6471000
heap
page read and write
14EF90F9000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
1B27915D000
remote allocation
page execute read
14EF7C8C000
trusted library allocation
page read and write
14EF0A1F000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE648A000
heap
page read and write
14EE6470000
heap
page read and write
14EF00CD000
trusted library allocation
page read and write
14EF9C8A000
trusted library allocation
page read and write
199148C0000
heap
page read and write
14EF045E000
trusted library allocation
page read and write
14EEFB40000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
1F42AA6D000
heap
page read and write
1F42A9F1000
heap
page read and write
14EF1011000
trusted library allocation
page read and write
14EF94E2000
trusted library allocation
page read and write
14EF7B9E000
trusted library allocation
page read and write
14EF1066000
trusted library allocation
page read and write
14EF3491000
trusted library allocation
page read and write
27FFF240000
heap
page read and write
14EE649E000
heap
page read and write
1F42AA58000
heap
page read and write
1F42AA44000
heap
page read and write
14EE6471000
heap
page read and write
14EEC686000
trusted library allocation
page read and write
14EF2C82000
trusted library allocation
page read and write
14EF0AF4000
trusted library allocation
page read and write
14EF7C93000
trusted library allocation
page read and write
14EEF17E000
trusted library allocation
page read and write
14EF04A4000
trusted library allocation
page read and write
14EF9BF4000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EEC798000
trusted library allocation
page read and write
14EEF378000
trusted library allocation
page read and write
14EF7584000
trusted library allocation
page read and write
14EF0774000
trusted library allocation
page read and write
14EEED8F000
heap
page read and write
14EE64A5000
heap
page read and write
14EF1027000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF1073000
trusted library allocation
page read and write
14EE6491000
heap
page read and write
14EF0B43000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EE6502000
heap
page read and write
14EE645B000
heap
page read and write
14EF7601000
heap
page read and write
1F42AA58000
heap
page read and write
14EEC73F000
trusted library allocation
page read and write
1F429CD0000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF0B45000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EEFB35000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE6498000
heap
page read and write
14EE648A000
heap
page read and write
1F42A96C000
heap
page read and write
14EF2C57000
trusted library allocation
page read and write
14EF0EE6000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF34D6000
trusted library allocation
page read and write
14EF1E3C000
trusted library allocation
page read and write
14EFABF1000
trusted library allocation
page read and write
1F42A960000
heap
page read and write
14EF7AD2000
trusted library allocation
page read and write
14EEFB40000
trusted library allocation
page read and write
14EF7597000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEEDAF000
heap
page read and write
14EE6454000
heap
page read and write
14EF8E4F000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EF0AB1000
trusted library allocation
page read and write
9C551FC000
stack
page read and write
14EE647D000
heap
page read and write
14EE6470000
heap
page read and write
14EF1E79000
trusted library allocation
page read and write
14EF0F5F000
trusted library allocation
page read and write
14EF0C6E000
trusted library allocation
page read and write
14EF0AB1000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF7AA2000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF047B000
trusted library allocation
page read and write
14EF0B28000
trusted library allocation
page read and write
14EEF33D000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
16888A0E000
trusted library allocation
page read and write
14EEFB78000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
1F429D64000
trusted library allocation
page read and write
14EEFDB5000
trusted library allocation
page read and write
14EF7AE6000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EF0B50000
trusted library allocation
page read and write
14EEF78D000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6454000
heap
page read and write
14EE6498000
heap
page read and write
14EF1990000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EF298F000
trusted library allocation
page read and write
14EF04B6000
trusted library allocation
page read and write
14EEC7BE000
trusted library allocation
page read and write
1F42A98A000
heap
page read and write
14EF7CE3000
trusted library allocation
page read and write
14EF0EFC000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF103C000
trusted library allocation
page read and write
14EF1E9F000
trusted library allocation
page read and write
199148F2000
heap
page read and write
14EF0AAF000
trusted library allocation
page read and write
14EF7D2E000
trusted library allocation
page read and write
14EF0805000
trusted library allocation
page read and write
14EF077B000
trusted library allocation
page read and write
14EF7CFE000
trusted library allocation
page read and write
93EAF6E000
stack
page read and write
14EF04B1000
trusted library allocation
page read and write
14EF8FC1000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
14EF0497000
trusted library allocation
page read and write
14EF1EFB000
trusted library allocation
page read and write
14EE64F5000
heap
page read and write
14EF7601000
heap
page read and write
14EF10BB000
trusted library allocation
page read and write
14EF1084000
trusted library allocation
page read and write
14EE6483000
heap
page read and write
16888A19000
trusted library allocation
page read and write
14EF0A97000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EF08E0000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EEC7EB000
trusted library allocation
page read and write
14EF1763000
trusted library allocation
page read and write
14EEC7AA000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF0A75000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EEC796000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EE64A6000
heap
page read and write
14EF2995000
trusted library allocation
page read and write
14EF0BBA000
trusted library allocation
page read and write
14EF7D29000
trusted library allocation
page read and write
14EEFBAE000
trusted library allocation
page read and write
14EF9CD0000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF00B9000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
1F429860000
unclassified section
page readonly
14EEFB68000
trusted library allocation
page read and write
14EF752A000
trusted library allocation
page read and write
14EF7AC5000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF75D0000
trusted library allocation
page read and write
14EF2A87000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF2D7D000
trusted library allocation
page read and write
14EE6451000
heap
page read and write
14EF10D5000
trusted library allocation
page read and write
14EF2952000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE649F000
heap
page read and write
14EEF1B0000
trusted library allocation
page read and write
14EF7DFC000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EF0B3F000
trusted library allocation
page read and write
14EEEA61000
trusted library allocation
page read and write
14EF1DA4000
trusted library allocation
page read and write
14EF2962000
trusted library allocation
page read and write
14EF0C27000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE647C000
heap
page read and write
14EF34E6000
trusted library allocation
page read and write
2A94078000
stack
page read and write
14EF1020000
trusted library allocation
page read and write
14EFB189000
trusted library allocation
page read and write
14EEEADC000
trusted library allocation
page read and write
14EF7D35000
trusted library allocation
page read and write
14EEF177000
trusted library allocation
page read and write
14EF0469000
trusted library allocation
page read and write
14EEF3B5000
trusted library allocation
page read and write
168888E7000
trusted library allocation
page read and write
14EF0BD5000
trusted library allocation
page read and write
14EEED8F000
heap
page read and write
14EF7DE2000
trusted library allocation
page read and write
14EF13EE000
trusted library allocation
page read and write
14EEFDF0000
trusted library allocation
page read and write
14EF7ED7000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF04B6000
trusted library allocation
page read and write
14EF0AF6000
trusted library allocation
page read and write
1B279900000
trusted library allocation
page read and write
14EF7B89000
trusted library allocation
page read and write
14EF1E9F000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF0DD2000
trusted library allocation
page read and write
1B279606000
heap
page read and write
14EF0DB9000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EF0A7F000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EE6491000
heap
page read and write
14EF75F7000
trusted library allocation
page read and write
14EF0DB7000
trusted library allocation
page read and write
951000
unkown
page execute read
14EF105B000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
2A937FE000
stack
page read and write
14EE6466000
heap
page read and write
14EF049A000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EE64DF000
heap
page read and write
14EE6482000
heap
page read and write
14EF75D0000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EFB1DB000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF0AF6000
trusted library allocation
page read and write
14EEF3E8000
trusted library allocation
page read and write
14EF7CEB000
trusted library allocation
page read and write
14EFAB47000
trusted library allocation
page read and write
14EEF18A000
trusted library allocation
page read and write
14EF0DD2000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF7DD7000
trusted library allocation
page read and write
3440000
heap
page read and write
9EC000
unkown
page readonly
14EE64F1000
heap
page read and write
14EEFB33000
trusted library allocation
page read and write
14EEF131000
trusted library allocation
page read and write
2A971FE000
unkown
page readonly
14EE648A000
heap
page read and write
14EFAEC8000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EEED97000
heap
page read and write
14EF7DD7000
trusted library allocation
page read and write
14EF7C97000
trusted library allocation
page read and write
14EEFB26000
trusted library allocation
page read and write
14EEB423000
trusted library allocation
page read and write
14EFB2EF000
trusted library allocation
page read and write
14EF2D80000
trusted library allocation
page read and write
14EF07CF000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EE6492000
heap
page read and write
14EF7DF3000
trusted library allocation
page read and write
14EF758C000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EEC7A8000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EEEDBB000
heap
page read and write
14EE6498000
heap
page read and write
14EE6487000
heap
page read and write
14EE6465000
heap
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EEEDBD000
heap
page read and write
14EE64AA000
heap
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EF04E4000
trusted library allocation
page read and write
14EF04A3000
trusted library allocation
page read and write
14EF7D35000
trusted library allocation
page read and write
14EF7B96000
trusted library allocation
page read and write
14EF7557000
trusted library allocation
page read and write
14EF106E000
trusted library allocation
page read and write
14EF0AE6000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF2D7D000
trusted library allocation
page read and write
14EF7EDD000
trusted library allocation
page read and write
14EF103C000
trusted library allocation
page read and write
14EF9B55000
trusted library allocation
page read and write
14EF1089000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EF2A77000
trusted library allocation
page read and write
14EFB927000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EFB15F000
trusted library allocation
page read and write
14EEF347000
trusted library allocation
page read and write
35F0000
heap
page read and write
14EF759B000
trusted library allocation
page read and write
14EF0EE6000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EF046B000
trusted library allocation
page read and write
14EF0AE3000
trusted library allocation
page read and write
14EF7E7C000
trusted library allocation
page read and write
14EF7AE6000
trusted library allocation
page read and write
14EFAE36000
trusted library allocation
page read and write
14EE6466000
heap
page read and write
14EFB29D000
trusted library allocation
page read and write
14EF7ECD000
trusted library allocation
page read and write
14EE6491000
heap
page read and write
5F6000
heap
page read and write
14EF1EE5000
trusted library allocation
page read and write
14EF1AA2000
trusted library allocation
page read and write
14EF10FD000
trusted library allocation
page read and write
14EEEAD8000
trusted library allocation
page read and write
14EEFB49000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EF34E2000
trusted library allocation
page read and write
14EE646B000
heap
page read and write
14EF0A9E000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
1F42A9EB000
heap
page read and write
14EFABDA000
trusted library allocation
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EF0BCF000
trusted library allocation
page read and write
14EF34F0000
trusted library allocation
page read and write
14EFABE0000
trusted library allocation
page read and write
14EEEAD8000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF1051000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EEFF1D000
trusted library allocation
page read and write
14EF10E2000
trusted library allocation
page read and write
14EEED98000
heap
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EF76E1000
heap
page read and write
14EEEDBB000
heap
page read and write
14EE648C000
heap
page read and write
14EFA502000
trusted library allocation
page read and write
14EEEAD2000
trusted library allocation
page read and write
14EEEDBD000
heap
page read and write
14EEFBEA000
trusted library allocation
page read and write
1B2F000
stack
page read and write
14EEFB45000
trusted library allocation
page read and write
1688880D000
trusted library allocation
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
14EF0B23000
trusted library allocation
page read and write
14EF7B82000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EEC76C000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF9B2D000
trusted library allocation
page read and write
14EEF7BF000
trusted library allocation
page read and write
14EF8E55000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
1B279370000
unclassified section
page readonly
14EF1084000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
2079CBE000
stack
page read and write
14EF10C2000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EE648A000
heap
page read and write
14EEC7F4000
trusted library allocation
page read and write
14EEEBF4000
trusted library allocation
page read and write
14EF9CBD000
trusted library allocation
page read and write
14EF0779000
trusted library allocation
page read and write
14EF9C8E000
trusted library allocation
page read and write
14EF09D1000
trusted library allocation
page read and write
14EF10B2000
trusted library allocation
page read and write
14EEED5C000
heap
page read and write
14EE64DF000
heap
page read and write
14EF0B3B000
trusted library allocation
page read and write
14EF7DD3000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EE6470000
heap
page read and write
1F42A95C000
heap
page read and write
14EEF78D000
trusted library allocation
page read and write
14EEF732000
trusted library allocation
page read and write
14EE6479000
heap
page read and write
14EF90CA000
trusted library allocation
page read and write
14EEEDC1000
heap
page read and write
14EF7CC8000
trusted library allocation
page read and write
1F42A9F1000
heap
page read and write
14EEEAD2000
trusted library allocation
page read and write
14EF75DB000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF0BA4000
trusted library allocation
page read and write
14EF1A79000
trusted library allocation
page read and write
14EF8FFC000
trusted library allocation
page read and write
14EF34C4000
trusted library allocation
page read and write
14EF29FA000
trusted library allocation
page read and write
14EF09E7000
trusted library allocation
page read and write
14EF7BEC000
trusted library allocation
page read and write
14EEF7BF000
trusted library allocation
page read and write
14EF2A1F000
trusted library allocation
page read and write
14EFB180000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF049A000
trusted library allocation
page read and write
14EF7A96000
trusted library allocation
page read and write
1F42A97D000
heap
page read and write
14EF0B23000
trusted library allocation
page read and write
14EF0EAB000
trusted library allocation
page read and write
14EEAECB000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EEC77E000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
35F4000
heap
page read and write
14EEF125000
trusted library allocation
page read and write
14EF0DF3000
trusted library allocation
page read and write
14EF7B39000
trusted library allocation
page read and write
16888A12000
trusted library allocation
page read and write
14EF1ADA000
trusted library allocation
page read and write
16888630000
heap
page readonly
14EF2D86000
trusted library allocation
page read and write
14EF10BC000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF048F000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF7B7D000
trusted library allocation
page read and write
14EE6473000
heap
page read and write
14EF1AC7000
trusted library allocation
page read and write
14EF076F000
trusted library allocation
page read and write
14EF04FA000
trusted library allocation
page read and write
14EF7AA4000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
1C20000
trusted library allocation
page read and write
14EF2D86000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF2F7C000
trusted library allocation
page read and write
14EF2D82000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
1F42AA77000
heap
page read and write
14EE649F000
heap
page read and write
14EF0F47000
trusted library allocation
page read and write
14EEFBAE000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EFAEBD000
trusted library allocation
page read and write
14EF1E31000
trusted library allocation
page read and write
14EF0BA4000
trusted library allocation
page read and write
14EF2D40000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EEED93000
heap
page read and write
14EE6482000
heap
page read and write
14EF0BB5000
trusted library allocation
page read and write
14EEED9D000
heap
page read and write
14EE647D000
heap
page read and write
14EF2A3A000
trusted library allocation
page read and write
14EEF3F9000
trusted library allocation
page read and write
1F42AA6D000
heap
page read and write
14EE64F0000
heap
page read and write
14EEFBAD000
trusted library allocation
page read and write
5E0000
heap
page read and write
14EE649F000
heap
page read and write
16888450000
remote allocation
page read and write
14EF0A8C000
trusted library allocation
page read and write
14EFAEC8000
trusted library allocation
page read and write
14EE6479000
heap
page read and write
14EF7D74000
trusted library allocation
page read and write
14EF7B9E000
trusted library allocation
page read and write
14EF1AFB000
trusted library allocation
page read and write
14EFABE0000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EEED94000
heap
page read and write
14EEF1AC000
trusted library allocation
page read and write
1F429D81000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EEF7CB000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF2DE0000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
1F429AB0000
unclassified section
page read and write
14EEF3EB000
trusted library allocation
page read and write
1B279803000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
14EF0B3B000
trusted library allocation
page read and write
14EEC744000
trusted library allocation
page read and write
14EF07A6000
trusted library allocation
page read and write
14EF755E000
trusted library allocation
page read and write
14EF7D66000
trusted library allocation
page read and write
14EEEDE8000
heap
page read and write
14EE647D000
heap
page read and write
14EF9B33000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EE64A1000
heap
page read and write
14EF7BB0000
trusted library allocation
page read and write
14EF19FB000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EE64F0000
heap
page read and write
14EF04AC000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE64F3000
heap
page read and write
14EFAE6D000
trusted library allocation
page read and write
14EEB526000
trusted library allocation
page read and write
14EF2AE7000
trusted library allocation
page read and write
1F42AA58000
heap
page read and write
14EF2D82000
trusted library allocation
page read and write
14EE6491000
heap
page read and write
14EF8ED9000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
14EEED7F000
heap
page read and write
14EE64A5000
heap
page read and write
14EEF752000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE647D000
heap
page read and write
14EF1EFD000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEEAD2000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEFBBD000
trusted library allocation
page read and write
14EF7EDF000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF1055000
trusted library allocation
page read and write
14EF753C000
trusted library allocation
page read and write
A20000
unkown
page write copy
14EEEDB2000
heap
page read and write
14EE6491000
heap
page read and write
14EE6477000
heap
page read and write
14EE648C000
heap
page read and write
14EF34D6000
trusted library allocation
page read and write
14EEB575000
trusted library allocation
page read and write
1F42A98D000
heap
page read and write
F65000
heap
page read and write
14EF2DAC000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
32857FE000
stack
page read and write
14EEFBAB000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE646A000
heap
page read and write
14EF9C83000
trusted library allocation
page read and write
14EF29E0000
trusted library allocation
page read and write
14EEEAB7000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF7A77000
trusted library allocation
page read and write
14EF7CD0000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
1F42A97F000
heap
page read and write
14EE648A000
heap
page read and write
14EF0C84000
trusted library allocation
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EF104E000
trusted library allocation
page read and write
14EF0E00000
trusted library allocation
page read and write
14EF0D80000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EE6466000
heap
page read and write
14EF04A6000
trusted library allocation
page read and write
14EF29F1000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF1AC3000
trusted library allocation
page read and write
14EF10BB000
trusted library allocation
page read and write
14EF104A000
trusted library allocation
page read and write
14EF1D8F000
trusted library allocation
page read and write
14EF34F0000
trusted library allocation
page read and write
14EFAE10000
trusted library allocation
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EF7B89000
trusted library allocation
page read and write
1F42A2EF000
heap
page read and write
14EE6482000
heap
page read and write
14EE647D000
heap
page read and write
14EE64A5000
heap
page read and write
14EEEB82000
trusted library allocation
page read and write
14EEF368000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
1F42A960000
heap
page read and write
14EEED93000
heap
page read and write
1F42A9EB000
heap
page read and write
1F42A9EB000
heap
page read and write
14EF0EE6000
trusted library allocation
page read and write
14EEEAB5000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
5F6000
heap
page read and write
14EF8E4B000
trusted library allocation
page read and write
14EEF3F3000
trusted library allocation
page read and write
1B27956A000
trusted library allocation
page read and write
1B2792B0000
heap
page read and write
14EE6483000
heap
page read and write
14EE649F000
heap
page read and write
14EF34D2000
trusted library allocation
page read and write
14EF7D7D000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
1F429DC4000
trusted library allocation
page read and write
14EF2F39000
trusted library allocation
page read and write
14EF7EDF000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EE6494000
heap
page read and write
14EF2A72000
trusted library allocation
page read and write
14EF04EC000
trusted library allocation
page read and write
14EFAE72000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EFB1EC000
trusted library allocation
page read and write
14EEEDBB000
heap
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EF1037000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EEED98000
heap
page read and write
14EF7CD2000
trusted library allocation
page read and write
14EF752F000
trusted library allocation
page read and write
14EF2DC0000
trusted library allocation
page read and write
14EEF3C9000
trusted library allocation
page read and write
14EF7B82000
trusted library allocation
page read and write
14EF0CC1000
trusted library allocation
page read and write
14EEFD5B000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF8EB8000
trusted library allocation
page read and write
14EEC7A5000
trusted library allocation
page read and write
14EEEADB000
trusted library allocation
page read and write
14EEF162000
trusted library allocation
page read and write
14EF2ACE000
trusted library allocation
page read and write
14EF1E90000
trusted library allocation
page read and write
14EF1DFC000
trusted library allocation
page read and write
14EEF39A000
trusted library allocation
page read and write
14EE64AB000
heap
page read and write
14EF0F5D000
trusted library allocation
page read and write
14EF7D95000
trusted library allocation
page read and write
14EF08E9000
trusted library allocation
page read and write
14EEC76E000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EE6482000
heap
page read and write
14EE6450000
heap
page read and write
14EF0EAB000
trusted library allocation
page read and write
14EF1055000
trusted library allocation
page read and write
14EF107B000
trusted library allocation
page read and write
14EEF391000
trusted library allocation
page read and write
14EF2D4B000
trusted library allocation
page read and write
14EF7A48000
trusted library allocation
page read and write
19914A00000
trusted library allocation
page read and write
14EEF171000
trusted library allocation
page read and write
1B2792FA000
heap
page read and write
14EF098A000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF0DA2000
trusted library allocation
page read and write
14EEC444000
trusted library allocation
page read and write
14EF7B85000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EF2AEF000
trusted library allocation
page read and write
14EF2FE2000
trusted library allocation
page read and write
14EF07F0000
trusted library allocation
page read and write
168888B7000
trusted library allocation
page read and write
1F42AA44000
heap
page read and write
14EF0A93000
trusted library allocation
page read and write
14EE6473000
heap
page read and write
14EF7D5E000
trusted library allocation
page read and write
14EF0B3B000
trusted library allocation
page read and write
14EF8E1E000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EEED99000
heap
page read and write
14EF1E75000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF2A19000
trusted library allocation
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EF7E23000
trusted library allocation
page read and write
14EF7BEA000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE648C000
heap
page read and write
14EE64A5000
heap
page read and write
14EE645B000
heap
page read and write
14EE647B000
heap
page read and write
14EF7549000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EF9CEC000
trusted library allocation
page read and write
14EEB4FB000
trusted library allocation
page read and write
14EF753E000
trusted library allocation
page read and write
14EEB423000
trusted library allocation
page read and write
14EF08DD000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
5F6000
heap
page read and write
14EEFB49000
trusted library allocation
page read and write
E0F000
stack
page read and write
14EE64DF000
heap
page read and write
14EE646A000
heap
page read and write
14EF2A61000
trusted library allocation
page read and write
14EFA300000
trusted library allocation
page read and write
14EE64FC000
heap
page read and write
14EFAEF9000
trusted library allocation
page read and write
14EE6502000
heap
page read and write
14EF7B96000
trusted library allocation
page read and write
14EEFBB2000
trusted library allocation
page read and write
14EEFBC2000
trusted library allocation
page read and write
14EF0DB7000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF7DCA000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EF2AEF000
trusted library allocation
page read and write
14EEC4B2000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EEF771000
trusted library allocation
page read and write
1688885B000
trusted library allocation
page read and write
14EF2D4B000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EE646B000
heap
page read and write
14EE6471000
heap
page read and write
14EE64A6000
heap
page read and write
14EF0DCB000
trusted library allocation
page read and write
14EF7537000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EF107B000
trusted library allocation
page read and write
14EEED90000
heap
page read and write
14EE6470000
heap
page read and write
14EE64F1000
heap
page read and write
14EF0BF6000
trusted library allocation
page read and write
14EF106E000
trusted library allocation
page read and write
14EF7509000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EEED5C000
heap
page read and write
14EEC779000
trusted library allocation
page read and write
14EEF776000
trusted library allocation
page read and write
14EF1AD5000
trusted library allocation
page read and write
14EF2DF9000
trusted library allocation
page read and write
14EF04FD000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF2AEF000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF10B9000
trusted library allocation
page read and write
14EF104E000
trusted library allocation
page read and write
16888920000
heap
page read and write
14EE647B000
heap
page read and write
14EEFB6D000
trusted library allocation
page read and write
14EEC769000
trusted library allocation
page read and write
14EEC798000
trusted library allocation
page read and write
14EF0BF6000
trusted library allocation
page read and write
14EF08D0000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EEF177000
trusted library allocation
page read and write
1F42A95C000
heap
page read and write
14EF29E5000
trusted library allocation
page read and write
14EF04B4000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
14EF106A000
trusted library allocation
page read and write
14EEEA91000
trusted library allocation
page read and write
14EF1E3B000
trusted library allocation
page read and write
14EF1967000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE6450000
heap
page read and write
14EF1058000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EE6492000
heap
page read and write
14EF2D39000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
F5D000
heap
page read and write
14EF0460000
trusted library allocation
page read and write
14EF1E69000
trusted library allocation
page read and write
14EF0DB2000
trusted library allocation
page read and write
1B279500000
trusted library allocation
page read and write
16888800000
trusted library allocation
page read and write
14EFB256000
trusted library allocation
page read and write
14EF7CB5000
trusted library allocation
page read and write
14EF9066000
trusted library allocation
page read and write
14EF10B9000
trusted library allocation
page read and write
207A4BE000
unkown
page readonly
16888866000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
14EF8EF1000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE6492000
heap
page read and write
14EE64A1000
heap
page read and write
14EE645E000
heap
page read and write
14EE64F0000
heap
page read and write
14EF0CD8000
trusted library allocation
page read and write
14EF7ED9000
trusted library allocation
page read and write
14EF045D000
trusted library allocation
page read and write
19914740000
heap
page read and write
14EEEDB3000
heap
page read and write
14EF0A5B000
trusted library allocation
page read and write
F62000
heap
page read and write
14EEC7C7000
trusted library allocation
page read and write
14EFB289000
trusted library allocation
page read and write
14EE6494000
heap
page read and write
14EF10D5000
trusted library allocation
page read and write
14EF7AA5000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF75C8000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF0EB6000
trusted library allocation
page read and write
14EEEDB5000
heap
page read and write
14EF1073000
trusted library allocation
page read and write
207B4BE000
unkown
page readonly
14EEEDC7000
heap
page read and write
14EF0AED000
trusted library allocation
page read and write
14EF1075000
trusted library allocation
page read and write
1B27955D000
trusted library allocation
page read and write
14EFAEF9000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE647B000
heap
page read and write
14EF09C0000
trusted library allocation
page read and write
14EF7ED9000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEF283000
trusted library allocation
page read and write
14EF0D92000
trusted library allocation
page read and write
14EF0AA9000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
14EE6472000
heap
page read and write
14EF047D000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EF0AFB000
trusted library allocation
page read and write
14EF045D000
trusted library allocation
page read and write
14EF7CE8000
trusted library allocation
page read and write
2A9513E000
stack
page read and write
14EEC79D000
trusted library allocation
page read and write
F7B000
heap
page read and write
14EF7CA7000
trusted library allocation
page read and write
14EEF125000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EF1EF5000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF0BCC000
trusted library allocation
page read and write
14EF94F1000
trusted library allocation
page read and write
14EFB96A000
trusted library allocation
page read and write
F82000
heap
page read and write
14EE6482000
heap
page read and write
14EE6492000
heap
page read and write
14EF2AC1000
trusted library allocation
page read and write
14EEFDEA000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EE64F3000
heap
page read and write
1F42A9F1000
heap
page read and write
14EEC7F6000
trusted library allocation
page read and write
14EF2D53000
trusted library allocation
page read and write
20793FE000
unkown
page readonly
14EF2D84000
trusted library allocation
page read and write
14EF2F6D000
trusted library allocation
page read and write
14EFB138000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF132E000
trusted library allocation
page read and write
3441000
heap
page read and write
14EF00E6000
trusted library allocation
page read and write
14EEF3C9000
trusted library allocation
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EE64F4000
heap
page read and write
14EE647D000
heap
page read and write
14EF1EF1000
trusted library allocation
page read and write
14EF2FE5000
trusted library allocation
page read and write
14EEF34D000
trusted library allocation
page read and write
199162EE000
heap
page read and write
14EEB582000
trusted library allocation
page read and write
14EF7AD9000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF0DC7000
trusted library allocation
page read and write
14EFAE6D000
trusted library allocation
page read and write
14EFA5A8000
trusted library allocation
page read and write
14EEC6FB000
trusted library allocation
page read and write
14EF9510000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF0795000
trusted library allocation
page read and write
14EEED72000
heap
page read and write
14EE647D000
heap
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EF7800000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF2DD3000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EF7699000
heap
page read and write
14EEEA61000
trusted library allocation
page read and write
14EEF21F000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EF2D84000
trusted library allocation
page read and write
93EAEAE000
unkown
page readonly
14EF7D72000
trusted library allocation
page read and write
14EEEA72000
trusted library allocation
page read and write
14EEEAFA000
trusted library allocation
page read and write
14EEED97000
heap
page read and write
14EEFB35000
trusted library allocation
page read and write
14EF2A61000
trusted library allocation
page read and write
14EF2956000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF14AA000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
14EE6471000
heap
page read and write
14EE64F9000
heap
page read and write
14EF2D34000
trusted library allocation
page read and write
14EEF361000
trusted library allocation
page read and write
16888A03000
trusted library allocation
page read and write
14EF0CB4000
trusted library allocation
page read and write
14EEF16A000
trusted library allocation
page read and write
14EF7AB5000
trusted library allocation
page read and write
14EE64FB000
heap
page read and write
1F42A9E0000
heap
page read and write
14EE64A1000
heap
page read and write
1B2795C4000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE6482000
heap
page read and write
14EF1051000
trusted library allocation
page read and write
14EF2A42000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EF1051000
trusted library allocation
page read and write
14EF7B9E000
trusted library allocation
page read and write
14EEFB6C000
trusted library allocation
page read and write
14EF0ECB000
trusted library allocation
page read and write
14EE64F1000
heap
page read and write
14EE64F0000
heap
page read and write
14EE6470000
heap
page read and write
14EF09EF000
trusted library allocation
page read and write
14EF04FD000
trusted library allocation
page read and write
14EF2A72000
trusted library allocation
page read and write
14EF17FC000
trusted library allocation
page read and write
14EEF361000
trusted library allocation
page read and write
14EF0D95000
trusted library allocation
page read and write
14EF2DF9000
trusted library allocation
page read and write
14EF0FF4000
trusted library allocation
page read and write
93EF1FE000
unkown
page readonly
14EE6450000
heap
page read and write
14EEF184000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
14EF042C000
trusted library allocation
page read and write
14EEF1CA000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF1479000
trusted library allocation
page read and write
14EF0C33000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EEFB6A000
trusted library allocation
page read and write
1B279807000
trusted library allocation
page read and write
14EF7A96000
trusted library allocation
page read and write
14EF2D7D000
trusted library allocation
page read and write
14EF1A91000
trusted library allocation
page read and write
14EEFBC2000
trusted library allocation
page read and write
14EF8E13000
trusted library allocation
page read and write
1B279350000
heap
page read and write
14EF106C000
trusted library allocation
page read and write
14EE6502000
heap
page read and write
14EE64A5000
heap
page read and write
14EEC7F6000
trusted library allocation
page read and write
14EF7DFA000
trusted library allocation
page read and write
14EF0BF6000
trusted library allocation
page read and write
14EEC7BE000
trusted library allocation
page read and write
14EEFBB2000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EF7DFC000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EE64AA000
heap
page read and write
14EF1E75000
trusted library allocation
page read and write
14EF1EAF000
trusted library allocation
page read and write
14EF1E69000
trusted library allocation
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE649F000
heap
page read and write
14EEF11F000
trusted library allocation
page read and write
14EF106C000
trusted library allocation
page read and write
14EF0A0B000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
1F42A963000
heap
page read and write
14EF7ADD000
trusted library allocation
page read and write
93ED9FE000
stack
page read and write
14EF7D2E000
trusted library allocation
page read and write
14EFB256000
trusted library allocation
page read and write
14EF0BCC000
trusted library allocation
page read and write
1F429D5C000
trusted library allocation
page read and write
14EE64F9000
heap
page read and write
F78000
heap
page read and write
90E000
stack
page read and write
14EEFBAD000
trusted library allocation
page read and write
14EEFB45000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EF8ED9000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE6470000
heap
page read and write
14EF2D84000
trusted library allocation
page read and write
14EF2ADD000
trusted library allocation
page read and write
14EF1EAA000
trusted library allocation
page read and write
14EEF29E000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF104A000
trusted library allocation
page read and write
14EF04A6000
trusted library allocation
page read and write
14EEF358000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF7B96000
trusted library allocation
page read and write
14EFB137000
trusted library allocation
page read and write
14EF2AF7000
trusted library allocation
page read and write
1F42AA77000
heap
page read and write
14EE64AA000
heap
page read and write
14EF7595000
trusted library allocation
page read and write
14EEEA61000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EFB27B000
trusted library allocation
page read and write
14EF04E4000
trusted library allocation
page read and write
14EF104E000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEED99000
heap
page read and write
14EEF3B5000
trusted library allocation
page read and write
14EF0D95000
trusted library allocation
page read and write
14EF7EF7000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE6479000
heap
page read and write
14EF0D95000
trusted library allocation
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
1B279604000
heap
page read and write
14EE64A5000
heap
page read and write
14EFB1EC000
trusted library allocation
page read and write
14EE6481000
heap
page read and write
14EE64B0000
heap
page read and write
14EF2D65000
trusted library allocation
page read and write
14EF34EC000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EEEDF0000
heap
page read and write
168884B0000
heap
page read and write
14EEB4FE000
trusted library allocation
page read and write
14EEF77F000
trusted library allocation
page read and write
14EF2CBC000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
199148DD000
heap
page read and write
14EE64F0000
heap
page read and write
14EF0C72000
trusted library allocation
page read and write
14EF0DCE000
trusted library allocation
page read and write
14EEEDB7000
heap
page read and write
14EF2DE2000
trusted library allocation
page read and write
14EF0CC9000
trusted library allocation
page read and write
14EF7CDC000
trusted library allocation
page read and write
14EF2DF9000
trusted library allocation
page read and write
14EEC769000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EEFF1B000
trusted library allocation
page read and write
14EF0AB1000
trusted library allocation
page read and write
14EF00DC000
trusted library allocation
page read and write
3286FFF000
stack
page read and write
F67000
heap
page read and write
14EFB212000
trusted library allocation
page read and write
14EFB210000
trusted library allocation
page read and write
14EF0BB3000
trusted library allocation
page read and write
14EEEDC1000
heap
page read and write
14EE6450000
heap
page read and write
14EF7ED3000
trusted library allocation
page read and write
14EF7A77000
trusted library allocation
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EFB186000
trusted library allocation
page read and write
14EEC77E000
trusted library allocation
page read and write
14EEF262000
trusted library allocation
page read and write
14EF1E28000
trusted library allocation
page read and write
14EF7E23000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF0951000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EF7ED3000
trusted library allocation
page read and write
14EEED80000
heap
page read and write
14EF1084000
trusted library allocation
page read and write
14EF7ED7000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE645E000
heap
page read and write
1B2795B1000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEEDA4000
heap
page read and write
14EF0FFC000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EEFB35000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF7AAE000
trusted library allocation
page read and write
14EF7B85000
trusted library allocation
page read and write
14EF2F68000
trusted library allocation
page read and write
14EF10E3000
trusted library allocation
page read and write
14EEEA12000
trusted library allocation
page read and write
14EEF3D7000
trusted library allocation
page read and write
14EF10E2000
trusted library allocation
page read and write
14EEF757000
trusted library allocation
page read and write
1C88C2103000
trusted library allocation
page read and write
14EF0447000
trusted library allocation
page read and write
14EF34E2000
trusted library allocation
page read and write
14EF767E000
heap
page read and write
14EF047E000
trusted library allocation
page read and write
5F6000
heap
page read and write
1F429ABF000
unclassified section
page read and write
14EF04E5000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE6482000
heap
page read and write
14EF7A9D000
trusted library allocation
page read and write
14EF9CDC000
trusted library allocation
page read and write
14EF7DFA000
trusted library allocation
page read and write
1F429930000
heap
page read and write
1F429850000
unclassified section
page readonly
207717C000
stack
page read and write
14EE64AA000
heap
page read and write
14EFAB21000
trusted library allocation
page read and write
14EF1EED000
trusted library allocation
page read and write
14EEEA33000
trusted library allocation
page read and write
1F42AA6D000
heap
page read and write
14EF0F3A000
trusted library allocation
page read and write
14EF0D39000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EF0EFC000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EF0769000
trusted library allocation
page read and write
27FFF220000
heap
page read and write
1F429D2F000
trusted library allocation
page read and write
14EE64D3000
heap
page read and write
14EF2CD6000
trusted library allocation
page read and write
14EF2FE6000
trusted library allocation
page read and write
1F42A9E8000
heap
page read and write
14EF1E7F000
trusted library allocation
page read and write
14EE6502000
heap
page read and write
14EFB1DB000
trusted library allocation
page read and write
14EF29C1000
trusted library allocation
page read and write
14EF1053000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EEF267000
trusted library allocation
page read and write
14EEED99000
heap
page read and write
14EE6483000
heap
page read and write
14EF7B85000
trusted library allocation
page read and write
14EEC73F000
trusted library allocation
page read and write
14EEF771000
trusted library allocation
page read and write
14EF7EFE000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE64DF000
heap
page read and write
14EEED95000
heap
page read and write
14EF2A36000
trusted library allocation
page read and write
1F42A96C000
heap
page read and write
14EF099E000
trusted library allocation
page read and write
14EF2CA1000
trusted library allocation
page read and write
14EF7BD4000
trusted library allocation
page read and write
F65000
heap
page read and write
14EE6471000
heap
page read and write
14EF2D7B000
trusted library allocation
page read and write
14EEC77E000
trusted library allocation
page read and write
14EF9B80000
trusted library allocation
page read and write
14EEEAA9000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EE6498000
heap
page read and write
1F42A901000
heap
page read and write
14EE647B000
heap
page read and write
14EF7AD2000
trusted library allocation
page read and write
14EF7BA0000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF19C4000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EE6496000
heap
page read and write
14EE64A6000
heap
page read and write
14EE64A1000
heap
page read and write
14EF7601000
heap
page read and write
14EEED72000
heap
page read and write
14EEFB45000
trusted library allocation
page read and write
F78000
heap
page read and write
14EF2A89000
trusted library allocation
page read and write
14EF1A85000
trusted library allocation
page read and write
14EFAEE9000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF106F000
trusted library allocation
page read and write
1F42AA77000
heap
page read and write
14EF7ED1000
trusted library allocation
page read and write
14EF7DEF000
trusted library allocation
page read and write
14EF7646000
heap
page read and write
14EF193C000
trusted library allocation
page read and write
14EF0B8B000
trusted library allocation
page read and write
14EEF171000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EE6498000
heap
page read and write
14EF2CB5000
trusted library allocation
page read and write
14EF104E000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EEFF37000
trusted library allocation
page read and write
14EF7B75000
trusted library allocation
page read and write
14EF0F56000
trusted library allocation
page read and write
14EF0AE3000
trusted library allocation
page read and write
14EF7CE0000
trusted library allocation
page read and write
14EF2FE2000
trusted library allocation
page read and write
14EF1037000
trusted library allocation
page read and write
14EF2DBB000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
14EF2995000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF7BEA000
trusted library allocation
page read and write
14EF0BED000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EEF281000
trusted library allocation
page read and write
14EE6483000
heap
page read and write
14EF7D35000
trusted library allocation
page read and write
1B2795B5000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EF7CE3000
trusted library allocation
page read and write
14EEC7DD000
trusted library allocation
page read and write
14EF758C000
trusted library allocation
page read and write
1F42A960000
heap
page read and write
14EE64A6000
heap
page read and write
14EE6474000
heap
page read and write
14EE6493000
heap
page read and write
14EE646A000
heap
page read and write
14EF0BBD000
trusted library allocation
page read and write
14EF04E4000
trusted library allocation
page read and write
14EEAEDF000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF1E56000
trusted library allocation
page read and write
14EF0BAC000
trusted library allocation
page read and write
14EEFB40000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF2D2E000
trusted library allocation
page read and write
14EF0A5E000
trusted library allocation
page read and write
14EF9018000
trusted library allocation
page read and write
16888642000
unclassified section
page read and write
14EEEA1F000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF10DD000
trusted library allocation
page read and write
14EFAE6D000
trusted library allocation
page read and write
14EF102B000
trusted library allocation
page read and write
1F42AA3B000
heap
page read and write
14EE64A5000
heap
page read and write
14EF7AE6000
trusted library allocation
page read and write
14EF8E4D000
trusted library allocation
page read and write
1F42A969000
heap
page read and write
14EE6474000
heap
page read and write
14EF7D72000
trusted library allocation
page read and write
14EF08C2000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF0C62000
trusted library allocation
page read and write
14EF2AA2000
trusted library allocation
page read and write
14EFB93B000
trusted library allocation
page read and write
1F42AA58000
heap
page read and write
14EF106A000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEC725000
trusted library allocation
page read and write
14EF0B81000
trusted library allocation
page read and write
14EFB109000
trusted library allocation
page read and write
14EF7A9D000
trusted library allocation
page read and write
14EF296A000
trusted library allocation
page read and write
14EFB283000
trusted library allocation
page read and write
1B2795DB000
trusted library allocation
page read and write
5F6000
heap
page read and write
2A91DBC000
stack
page read and write
14EF2D65000
trusted library allocation
page read and write
14EF34A1000
trusted library allocation
page read and write
14EFABC3000
trusted library allocation
page read and write
14EF2D86000
trusted library allocation
page read and write
14EEF776000
trusted library allocation
page read and write
14EF2A94000
trusted library allocation
page read and write
14EF1E7F000
trusted library allocation
page read and write
14EF9BF2000
trusted library allocation
page read and write
14EF34D2000
trusted library allocation
page read and write
14EF10DD000
trusted library allocation
page read and write
14EEF3D7000
trusted library allocation
page read and write
14EEED5C000
heap
page read and write
1F42AA79000
heap
page read and write
14EE6491000
heap
page read and write
14EFAE1F000
trusted library allocation
page read and write
14EF7D62000
trusted library allocation
page read and write
14EFABFE000
trusted library allocation
page read and write
1F42AA6D000
heap
page read and write
14EEF7EE000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EEED99000
heap
page read and write
14EF7E7C000
trusted library allocation
page read and write
14EF34E2000
trusted library allocation
page read and write
14EF0DB7000
trusted library allocation
page read and write
9C551FF000
stack
page read and write
14EEC779000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF298F000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF106A000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
14EF34C8000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF7EDF000
trusted library allocation
page read and write
14EEF26F000
trusted library allocation
page read and write
14EFB246000
trusted library allocation
page read and write
14EEC6F9000
trusted library allocation
page read and write
14EF08B7000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
2078BFE000
stack
page read and write
14EFAE4F000
trusted library allocation
page read and write
14EFAE5D000
trusted library allocation
page read and write
3285FFF000
stack
page read and write
1688882E000
trusted library allocation
page read and write
1B2790E0000
unclassified section
page readonly
14EEF378000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EEF162000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EEC769000
trusted library allocation
page read and write
14EEED94000
heap
page read and write
14EF2DC0000
trusted library allocation
page read and write
14EF10E2000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EE64A5000
heap
page read and write
14EF19C4000
trusted library allocation
page read and write
14EEEAD2000
trusted library allocation
page read and write
14EF1AA9000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
DFF000
stack
page read and write
14EE646B000
heap
page read and write
14EF75F9000
trusted library allocation
page read and write
14EEF74E000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF34D6000
trusted library allocation
page read and write
14EF3467000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EF1A86000
trusted library allocation
page read and write
14EEFF3A000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EFAEBD000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE647F000
heap
page read and write
14EF1E3B000
trusted library allocation
page read and write
14EF103E000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF7DE2000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
1F42A9EB000
heap
page read and write
14EF2D7B000
trusted library allocation
page read and write
5F0000
heap
page read and write
14EF29CA000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
F7D000
heap
page read and write
14EE6474000
heap
page read and write
14EE64A5000
heap
page read and write
14EF1FB4000
trusted library allocation
page read and write
14EF2FBF000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EF8E8F000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EF100B000
trusted library allocation
page read and write
14EF7CB9000
trusted library allocation
page read and write
14EF0B48000
trusted library allocation
page read and write
14EF7D89000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
93EAEED000
stack
page read and write
14EEEA62000
trusted library allocation
page read and write
14EEF25A000
trusted library allocation
page read and write
1F42A9FD000
heap
page read and write
14EF75D0000
trusted library allocation
page read and write
14EEF277000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF0469000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF2D8F000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF07A0000
trusted library allocation
page read and write
14EEFB9B000
trusted library allocation
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EF2AA2000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF7E99000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF34DE000
trusted library allocation
page read and write
14EF2D82000
trusted library allocation
page read and write
14EF752F000
trusted library allocation
page read and write
14EF04FC000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EEF379000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EEEAF7000
trusted library allocation
page read and write
14EF7B96000
trusted library allocation
page read and write
14EF00D5000
trusted library allocation
page read and write
14EF7C88000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EEED98000
heap
page read and write
14EE64A5000
heap
page read and write
E1B000
stack
page read and write
14EF1ECE000
trusted library allocation
page read and write
1F42AA22000
heap
page read and write
14EF1953000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EFABBB000
trusted library allocation
page read and write
14EF8EF1000
trusted library allocation
page read and write
14EF7DFA000
trusted library allocation
page read and write
14EF7BE1000
trusted library allocation
page read and write
14EEB51E000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE64A5000
heap
page read and write
14EEED77000
heap
page read and write
14EF1EF5000
trusted library allocation
page read and write
14EFABCC000
trusted library allocation
page read and write
14EEEAD8000
trusted library allocation
page read and write
14EF7D76000
trusted library allocation
page read and write
14EF1A68000
trusted library allocation
page read and write
1F42AA77000
heap
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF0BBA000
trusted library allocation
page read and write
14EF7EFE000
trusted library allocation
page read and write
14EEEA8F000
trusted library allocation
page read and write
14EEFDDF000
trusted library allocation
page read and write
14EF2A9C000
trusted library allocation
page read and write
14EF1B00000
trusted library allocation
page read and write
14EF1E9F000
trusted library allocation
page read and write
14EEC76C000
trusted library allocation
page read and write
14EF7D76000
trusted library allocation
page read and write
E2F000
stack
page read and write
14EF7535000
trusted library allocation
page read and write
14EF0AA9000
trusted library allocation
page read and write
14EF34DE000
trusted library allocation
page read and write
14EF7C16000
trusted library allocation
page read and write
1F42A9E9000
heap
page read and write
14EEB526000
trusted library allocation
page read and write
14EF7ECA000
trusted library allocation
page read and write
93EE1FE000
unkown
page readonly
1F429D0C000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF1EFD000
trusted library allocation
page read and write
14EF0B3F000
trusted library allocation
page read and write
14EEF74E000
trusted library allocation
page read and write
14EF7509000
trusted library allocation
page read and write
14EF2D92000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF103E000
trusted library allocation
page read and write
14EF2AC4000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EFABF5000
trusted library allocation
page read and write
14EF7B26000
trusted library allocation
page read and write
14EF048C000
trusted library allocation
page read and write
14EEEBF4000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF0B86000
trusted library allocation
page read and write
14EEF138000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
14EE647D000
heap
page read and write
14EF7E99000
trusted library allocation
page read and write
1F42AA21000
heap
page read and write
14EF0F59000
trusted library allocation
page read and write
14EF1A79000
trusted library allocation
page read and write
1F42A1B6000
unkown
page execute read
14EF2D7D000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EE64AB000
heap
page read and write
14EF0AC9000
trusted library allocation
page read and write
14EF7CE0000
trusted library allocation
page read and write
14EEEABF000
trusted library allocation
page read and write
14EF106E000
trusted library allocation
page read and write
14EEC71B000
trusted library allocation
page read and write
27FFF200000
heap
page read and write
14EF10B9000
trusted library allocation
page read and write
14EF0CD2000
trusted library allocation
page read and write
14EEED76000
heap
page read and write
14EEF33B000
trusted library allocation
page read and write
14EEEDC1000
heap
page read and write
14EF1E75000
trusted library allocation
page read and write
14EF1E79000
trusted library allocation
page read and write
14EEC7A8000
trusted library allocation
page read and write
14EEFBAB000
trusted library allocation
page read and write
14EEEAAD000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
1F42A969000
heap
page read and write
14EF7D95000
trusted library allocation
page read and write
14EF04B4000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EF2C69000
trusted library allocation
page read and write
14EF2AF2000
trusted library allocation
page read and write
14EEF3EF000
trusted library allocation
page read and write
32847FA000
stack
page read and write
14EF0B63000
trusted library allocation
page read and write
14EF1979000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF7D76000
trusted library allocation
page read and write
1F42AA44000
heap
page read and write
14EE64A1000
heap
page read and write
14EF7BA0000
trusted library allocation
page read and write
16888A0C000
trusted library allocation
page read and write
14EEF19C000
trusted library allocation
page read and write
14EEF39A000
trusted library allocation
page read and write
27FFF269000
heap
page read and write
14EE6471000
heap
page read and write
14EF103E000
trusted library allocation
page read and write
14EFB29D000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
F58000
heap
page read and write
F84000
heap
page read and write
14EF1DBC000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE6492000
heap
page read and write
14EF9061000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EF753C000
trusted library allocation
page read and write
14EEFBEE000
trusted library allocation
page read and write
14EFAB64000
trusted library allocation
page read and write
93EAE6E000
stack
page read and write
14EF7B82000
trusted library allocation
page read and write
14EF7516000
trusted library allocation
page read and write
14EF1AB2000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF0B92000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF0C6A000
trusted library allocation
page read and write
14EF04A4000
trusted library allocation
page read and write
14EF17BC000
trusted library allocation
page read and write
14EF1E71000
trusted library allocation
page read and write
1F42A95C000
heap
page read and write
14EE64A5000
heap
page read and write
14EE649F000
heap
page read and write
14EE646A000
heap
page read and write
14EF0464000
trusted library allocation
page read and write
14EFABF9000
trusted library allocation
page read and write
14EF7EBA000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE6471000
heap
page read and write
14EF0F43000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
168888C8000
trusted library allocation
page read and write
14EF0BD4000
trusted library allocation
page read and write
14EE6480000
heap
page read and write
14EF29E0000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF10F6000
trusted library allocation
page read and write
14EF0795000
trusted library allocation
page read and write
14EF0ABB000
trusted library allocation
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EF7A9D000
trusted library allocation
page read and write
14EF7BFB000
trusted library allocation
page read and write
1688885D000
trusted library allocation
page read and write
14EF10E5000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EEC6D4000
trusted library allocation
page read and write
16888700000
trusted library allocation
page read and write
14EF9B30000
trusted library allocation
page read and write
14EF1E69000
trusted library allocation
page read and write
14EF0AF8000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
FE5B611E000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF0BB3000
trusted library allocation
page read and write
14EEF391000
trusted library allocation
page read and write
14EEF382000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
1F42AA00000
heap
page read and write
14EF7B4A000
trusted library allocation
page read and write
14EF0F43000
trusted library allocation
page read and write
14EF0EFC000
trusted library allocation
page read and write
14EEF384000
trusted library allocation
page read and write
14EEED5C000
heap
page read and write
14EF7532000
trusted library allocation
page read and write
1B279800000
trusted library allocation
page read and write
14EF0B1D000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF2DD3000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE645B000
heap
page read and write
1F42A805000
trusted library allocation
page read and write
1B279503000
trusted library allocation
page read and write
14EF7626000
heap
page read and write
14EE647B000
heap
page read and write
14EF1781000
trusted library allocation
page read and write
F62000
heap
page read and write
14EE645E000
heap
page read and write
14EF7B6F000
trusted library allocation
page read and write
14EF09B7000
trusted library allocation
page read and write
14EF0AA7000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE6493000
heap
page read and write
14EF10E3000
trusted library allocation
page read and write
14EF7BA0000
trusted library allocation
page read and write
1F42A909000
heap
page read and write
14EEF1CF000
trusted library allocation
page read and write
1F42A9E8000
heap
page read and write
14EEFB45000
trusted library allocation
page read and write
14EF2DF9000
trusted library allocation
page read and write
27FFF500000
trusted library allocation
page read and write
14EF7D28000
trusted library allocation
page read and write
14EEF378000
trusted library allocation
page read and write
14EEF7C5000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EE64A5000
heap
page read and write
14EFAEC8000
trusted library allocation
page read and write
14EEF1B0000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EF2DBB000
trusted library allocation
page read and write
14EF04A6000
trusted library allocation
page read and write
14EEC7BE000
trusted library allocation
page read and write
14EE64F9000
heap
page read and write
14EF7B69000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EF0B45000
trusted library allocation
page read and write
14EEEDA9000
heap
page read and write
14EEFB9B000
trusted library allocation
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF176E000
trusted library allocation
page read and write
27FFF50A000
trusted library allocation
page read and write
14EF7DBD000
trusted library allocation
page read and write
14EF07AA000
trusted library allocation
page read and write
14EF7D72000
trusted library allocation
page read and write
14EF0BF6000
trusted library allocation
page read and write
14EFB216000
trusted library allocation
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
1F42A98A000
heap
page read and write
14EF1ED2000
trusted library allocation
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EF1DC7000
trusted library allocation
page read and write
14EF29B8000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EEFBC2000
trusted library allocation
page read and write
14EF34E6000
trusted library allocation
page read and write
14EF0BFB000
trusted library allocation
page read and write
14EF7B2E000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EEFBF8000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF2DBB000
trusted library allocation
page read and write
14EE646B000
heap
page read and write
14EE649E000
heap
page read and write
14EF0CA4000
trusted library allocation
page read and write
14EFB13D000
trusted library allocation
page read and write
14EF048C000
trusted library allocation
page read and write
1B27934F000
unclassified section
page read and write
14EEED80000
heap
page read and write
14EF759B000
trusted library allocation
page read and write
1F42AA2A000
heap
page read and write
14EE64F0000
heap
page read and write
14EE649F000
heap
page read and write
14EF7E70000
trusted library allocation
page read and write
14EF1D96000
trusted library allocation
page read and write
14EEEAB1000
trusted library allocation
page read and write
14EEF34B000
trusted library allocation
page read and write
14EF2D4E000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EF7DEF000
trusted library allocation
page read and write
14EF0DB7000
trusted library allocation
page read and write
14EF7AE3000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EF7AAE000
trusted library allocation
page read and write
168886B0000
unclassified section
page readonly
14EEEDF0000
heap
page read and write
14EEF361000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF7D15000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF7CE8000
trusted library allocation
page read and write
20771FE000
stack
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EF29F9000
trusted library allocation
page read and write
1F429A90000
heap
page readonly
16888A1F000
trusted library allocation
page read and write
14EFB2D4000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
F62000
heap
page read and write
14EF7BD4000
trusted library allocation
page read and write
14EFB268000
trusted library allocation
page read and write
14EEC7C0000
trusted library allocation
page read and write
F78000
heap
page read and write
14EF0DF3000
trusted library allocation
page read and write
1F42AA3B000
heap
page read and write
14EE64A6000
heap
page read and write
14EE6469000
heap
page read and write
14EF1E56000
trusted library allocation
page read and write
2A950FE000
unkown
page readonly
14EEF3EF000
trusted library allocation
page read and write
14EF1006000
trusted library allocation
page read and write
14EEB476000
trusted library allocation
page read and write
14EF7EFE000
trusted library allocation
page read and write
14EF0F61000
trusted library allocation
page read and write
14EF7DF3000
trusted library allocation
page read and write
14EEF283000
trusted library allocation
page read and write
14EF08F0000
trusted library allocation
page read and write
14EF347F000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF0AFB000
trusted library allocation
page read and write
1F42A2F1000
heap
page read and write
14EF0DBB000
trusted library allocation
page read and write
14EFAE8A000
trusted library allocation
page read and write
14EF2D82000
trusted library allocation
page read and write
14EEB4F6000
trusted library allocation
page read and write
14EF0C24000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF2ADD000
trusted library allocation
page read and write
14EE6491000
heap
page read and write
14EEF393000
trusted library allocation
page read and write
14EEF125000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EEED9D000
heap
page read and write
14EEFBBD000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EEC779000
trusted library allocation
page read and write
16888A1C000
trusted library allocation
page read and write
14EF7ED3000
trusted library allocation
page read and write
14EEFBAE000
trusted library allocation
page read and write
14EF9BF7000
trusted library allocation
page read and write
14EEF177000
trusted library allocation
page read and write
14EEC744000
trusted library allocation
page read and write
168884F0000
heap
page read and write
14EE649F000
heap
page read and write
14EE649E000
heap
page read and write
14EF07AA000
trusted library allocation
page read and write
14EEF184000
trusted library allocation
page read and write
14EF1A91000
trusted library allocation
page read and write
14EF09FE000
trusted library allocation
page read and write
14EEED80000
heap
page read and write
14EF2AF2000
trusted library allocation
page read and write
F5E000
heap
page read and write
14EF0BEE000
trusted library allocation
page read and write
1F42A800000
trusted library allocation
page read and write
14EF1A63000
trusted library allocation
page read and write
1F42AA44000
heap
page read and write
14EEF16A000
trusted library allocation
page read and write
1F42A9E6000
heap
page read and write
14EE64A5000
heap
page read and write
14EEED9D000
heap
page read and write
14EFB159000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EF29B8000
trusted library allocation
page read and write
14EE646E000
heap
page read and write
3441000
heap
page read and write
14EEFB9B000
trusted library allocation
page read and write
14EF7B7E000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF0FF4000
trusted library allocation
page read and write
14EF04F8000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
1B279400000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EFAB44000
trusted library allocation
page read and write
14EEF284000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EFAEF9000
trusted library allocation
page read and write
14EF1AA8000
trusted library allocation
page read and write
14EEAE9E000
trusted library allocation
page read and write
14EEF73D000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
168883E0000
unclassified section
page readonly
14EEFF15000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE648C000
heap
page read and write
172E000
stack
page read and write
1F42AA6D000
heap
page read and write
14EF1EFD000
trusted library allocation
page read and write
1F42A1D7000
unkown
page execute read
F80000
heap
page read and write
14EF10B9000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EEFBB2000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF0439000
trusted library allocation
page read and write
14EF178E000
trusted library allocation
page read and write
14EFB25E000
trusted library allocation
page read and write
14EF7B85000
trusted library allocation
page read and write
14EF00D0000
trusted library allocation
page read and write
14EF75D0000
trusted library allocation
page read and write
1F42A9E9000
heap
page read and write
14EEF77F000
trusted library allocation
page read and write
1688887A000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF2DF9000
trusted library allocation
page read and write
14EF766D000
heap
page read and write
14EFB23D000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EE6471000
heap
page read and write
14EE6470000
heap
page read and write
1B2792F0000
heap
page read and write
14EF044A000
trusted library allocation
page read and write
EE0000
heap
page read and write
14EE64A5000
heap
page read and write
14EF2DAC000
trusted library allocation
page read and write
14EF90B4000
trusted library allocation
page read and write
14EEF171000
trusted library allocation
page read and write
14EE6472000
heap
page read and write
14EF8ED9000
trusted library allocation
page read and write
14EF0A73000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF0AF6000
trusted library allocation
page read and write
14EF106E000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EFABDA000
trusted library allocation
page read and write
14EF2CE7000
trusted library allocation
page read and write
14EF34DA000
trusted library allocation
page read and write
14EF0AA7000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EEED98000
heap
page read and write
1B279342000
unclassified section
page read and write
14EE6496000
heap
page read and write
14EF1027000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF2DC0000
trusted library allocation
page read and write
14EFB2D4000
trusted library allocation
page read and write
14EFAE70000
trusted library allocation
page read and write
14EEF1CF000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EFABBB000
trusted library allocation
page read and write
14EF0DEE000
trusted library allocation
page read and write
14EF04C3000
trusted library allocation
page read and write
14EF298D000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF0A17000
trusted library allocation
page read and write
14EF1075000
trusted library allocation
page read and write
14EE6456000
heap
page read and write
14EEC7E5000
trusted library allocation
page read and write
14EF0A9E000
trusted library allocation
page read and write
14EF2D92000
trusted library allocation
page read and write
14EF9059000
trusted library allocation
page read and write
14EF107B000
trusted library allocation
page read and write
14EF0D9B000
trusted library allocation
page read and write
14EF34FE000
trusted library allocation
page read and write
14EEB42F000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EF1786000
trusted library allocation
page read and write
14EEFFCD000
trusted library allocation
page read and write
14EEC7F6000
trusted library allocation
page read and write
14EF0A24000
trusted library allocation
page read and write
14EF2A94000
trusted library allocation
page read and write
1F429D76000
trusted library allocation
page read and write
14EE6493000
heap
page read and write
14EE6482000
heap
page read and write
14EF0C05000
trusted library allocation
page read and write
1F429DBB000
trusted library allocation
page read and write
F30000
heap
page read and write
14EEED99000
heap
page read and write
14EF2D86000
trusted library allocation
page read and write
14EEF29E000
trusted library allocation
page read and write
14EEED77000
heap
page read and write
14EF0AF4000
trusted library allocation
page read and write
14EF29A4000
trusted library allocation
page read and write
14EFB180000
trusted library allocation
page read and write
14EEF184000
trusted library allocation
page read and write
14EF7EE7000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
14EF2D40000
trusted library allocation
page read and write
14EEFB91000
trusted library allocation
page read and write
14EFB13D000
trusted library allocation
page read and write
14EF7DF3000
trusted library allocation
page read and write
14EEF386000
trusted library allocation
page read and write
14EF1E31000
trusted library allocation
page read and write
19914B30000
heap
page read and write
14EF34D2000
trusted library allocation
page read and write
1F429D6F000
trusted library allocation
page read and write
14EEF7D7000
trusted library allocation
page read and write
14EE6481000
heap
page read and write
14EE649E000
heap
page read and write
14EF04F2000
trusted library allocation
page read and write
14EFB2EF000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EF2D80000
trusted library allocation
page read and write
14EEF752000
trusted library allocation
page read and write
14EF2D84000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
14EEFB6D000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EEF72E000
trusted library allocation
page read and write
14EF107A000
trusted library allocation
page read and write
14EF046B000
trusted library allocation
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EF0ED1000
trusted library allocation
page read and write
1B279570000
trusted library allocation
page read and write
14EF2A2B000
trusted library allocation
page read and write
5F4000
heap
page read and write
1B279140000
remote allocation
page read and write
14EF10B9000
trusted library allocation
page read and write
14EF29DB000
trusted library allocation
page read and write
14EF10BB000
trusted library allocation
page read and write
14EF9CE1000
trusted library allocation
page read and write
14EF75F9000
trusted library allocation
page read and write
14EF0EB6000
trusted library allocation
page read and write
14EF04F2000
trusted library allocation
page read and write
14EF08BB000
trusted library allocation
page read and write
14EF34F0000
trusted library allocation
page read and write
F68000
heap
page read and write
14EE6474000
heap
page read and write
14EF7EDD000
trusted library allocation
page read and write
14EF0DA5000
trusted library allocation
page read and write
14EEEB86000
trusted library allocation
page read and write
14EF047D000
trusted library allocation
page read and write
14EF0AE3000
trusted library allocation
page read and write
14EE64FA000
heap
page read and write
14EF75F3000
trusted library allocation
page read and write
FE5B6124000
trusted library allocation
page read and write
14EF1075000
trusted library allocation
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EF9089000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
1B279610000
heap
page read and write
14EF0A93000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF34E6000
trusted library allocation
page read and write
14EEF74E000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EEFB6F000
trusted library allocation
page read and write
A24000
unkown
page readonly
14EEFB33000
trusted library allocation
page read and write
14EF29D7000
trusted library allocation
page read and write
14EEED90000
heap
page read and write
14EF7DBD000
trusted library allocation
page read and write
14EF7522000
trusted library allocation
page read and write
14EEC79D000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EF34D0000
trusted library allocation
page read and write
14EF0F57000
trusted library allocation
page read and write
14EF0FFC000
trusted library allocation
page read and write
14EFAB92000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
1F42A9EB000
heap
page read and write
14EEFBF2000
trusted library allocation
page read and write
14EFABCC000
trusted library allocation
page read and write
14EF2DD3000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF1EE1000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE6492000
heap
page read and write
14EFB215000
trusted library allocation
page read and write
14EEC769000
trusted library allocation
page read and write
93EAFAE000
unkown
page readonly
14EF8E53000
trusted library allocation
page read and write
14EFAEE7000
trusted library allocation
page read and write
14EEEDAD000
heap
page read and write
14EF0496000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EE64DE000
heap
page read and write
14EE648A000
heap
page read and write
14EF10F3000
trusted library allocation
page read and write
14EEF391000
trusted library allocation
page read and write
14EF1DF6000
trusted library allocation
page read and write
14EF7BA7000
trusted library allocation
page read and write
14EE6487000
heap
page read and write
14EF2F7A000
trusted library allocation
page read and write
14EF0807000
trusted library allocation
page read and write
14EEF1AC000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
14EE647D000
heap
page read and write
14EF1B00000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF04E4000
trusted library allocation
page read and write
14EEF13E000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EF0ABC000
trusted library allocation
page read and write
14EEEDB3000
heap
page read and write
14EE645B000
heap
page read and write
14EEF357000
trusted library allocation
page read and write
14EEEADB000
trusted library allocation
page read and write
14EFAB8F000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EF7A7C000
trusted library allocation
page read and write
14EF7597000
trusted library allocation
page read and write
14EEEBF4000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
1F42A9A1000
heap
page read and write
14EF0D33000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EF0B6B000
trusted library allocation
page read and write
14EF0F46000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
14EEAEF9000
trusted library allocation
page read and write
14EF0ECF000
trusted library allocation
page read and write
14EEEDB6000
heap
page read and write
14EF7D06000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EE64AA000
heap
page read and write
14EE64A6000
heap
page read and write
14EF7B82000
trusted library allocation
page read and write
14EFAB49000
trusted library allocation
page read and write
14EEF358000
trusted library allocation
page read and write
14EEC7BC000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE64B0000
heap
page read and write
14EF7CC8000
trusted library allocation
page read and write
14EF0C64000
trusted library allocation
page read and write
14EEC76C000
trusted library allocation
page read and write
14EF75C8000
trusted library allocation
page read and write
1F429CE4000
heap
page read and write
14EF3473000
trusted library allocation
page read and write
14EF10B2000
trusted library allocation
page read and write
14EEC7DE000
trusted library allocation
page read and write
14EF7662000
heap
page read and write
14EE64FB000
heap
page read and write
14EF00DA000
trusted library allocation
page read and write
1F42AA58000
heap
page read and write
20771BE000
unkown
page readonly
14EEF7AC000
trusted library allocation
page read and write
14EF2D7D000
trusted library allocation
page read and write
1B279340000
unclassified section
page read and write
14EF0BBA000
trusted library allocation
page read and write
1B279511000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF9BE1000
trusted library allocation
page read and write
14EF94D7000
trusted library allocation
page read and write
14EF1084000
trusted library allocation
page read and write
14EEC711000
trusted library allocation
page read and write
14EF0EF0000
trusted library allocation
page read and write
14EF0C3A000
trusted library allocation
page read and write
14EF0AE6000
trusted library allocation
page read and write
14EEED76000
heap
page read and write
14EF7B8D000
trusted library allocation
page read and write
14EF29A4000
trusted library allocation
page read and write
14EF29DB000
trusted library allocation
page read and write
14EF1AE1000
trusted library allocation
page read and write
19914820000
heap
page read and write
14EE64F0000
heap
page read and write
1688887F000
trusted library allocation
page read and write
14EF04B6000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF750E000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EE647B000
heap
page read and write
14EF2DF9000
trusted library allocation
page read and write
14EE6491000
heap
page read and write
14EF1AC9000
trusted library allocation
page read and write
14EEED7E000
heap
page read and write
14EF0D56000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EE6482000
heap
page read and write
14EE649E000
heap
page read and write
14EFB273000
trusted library allocation
page read and write
14EEF3D7000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EF29A4000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEC725000
trusted library allocation
page read and write
14EEF19A000
trusted library allocation
page read and write
14EF077B000
trusted library allocation
page read and write
14EE6480000
heap
page read and write
14EE64AA000
heap
page read and write
14EEFFDB000
trusted library allocation
page read and write
14EE6503000
heap
page read and write
14EFB268000
trusted library allocation
page read and write
14EEB513000
trusted library allocation
page read and write
14EF04B4000
trusted library allocation
page read and write
14EFB287000
trusted library allocation
page read and write
14EFB20E000
trusted library allocation
page read and write
14EEEADB000
trusted library allocation
page read and write
14EF7B82000
trusted library allocation
page read and write
14EEAEEF000
trusted library allocation
page read and write
14EF7C26000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EF7B7E000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EE6482000
heap
page read and write
14EF7C15000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EE649E000
heap
page read and write
14EF9101000
trusted library allocation
page read and write
14EF2A77000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EF1073000
trusted library allocation
page read and write
14EF10BB000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EF2CF6000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF0BF8000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EF04EC000
trusted library allocation
page read and write
16888A38000
trusted library allocation
page read and write
14EF0BF0000
trusted library allocation
page read and write
14EF1055000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
1F42A960000
heap
page read and write
14EEEDF0000
heap
page read and write
14EEFDD2000
trusted library allocation
page read and write
14EF7CB6000
trusted library allocation
page read and write
F5B000
heap
page read and write
14EF1EE5000
trusted library allocation
page read and write
14EF17F2000
trusted library allocation
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EF0AA9000
trusted library allocation
page read and write
14EF0A9E000
trusted library allocation
page read and write
14EEF162000
trusted library allocation
page read and write
14EEF3C9000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
14EF0B9C000
trusted library allocation
page read and write
14EF29E5000
trusted library allocation
page read and write
27FFF400000
trusted library allocation
page read and write
14EFAB7C000
trusted library allocation
page read and write
199162EA000
heap
page read and write
14EF0DF3000
trusted library allocation
page read and write
14EF7CDA000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF9B84000
trusted library allocation
page read and write
14EF2C9F000
trusted library allocation
page read and write
14EF0B63000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE646A000
heap
page read and write
1F42AA21000
heap
page read and write
14EFB29D000
trusted library allocation
page read and write
14EF0BA1000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EEED92000
heap
page read and write
14EE6492000
heap
page read and write
14EEEAFE000
trusted library allocation
page read and write
14EF0AFB000
trusted library allocation
page read and write
14EF3002000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEEAA1000
trusted library allocation
page read and write
14EEFB61000
trusted library allocation
page read and write
14EF29E0000
trusted library allocation
page read and write
14EF049C000
trusted library allocation
page read and write
1F42AA77000
heap
page read and write
1F42A99C000
heap
page read and write
14EEF000000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE64F0000
heap
page read and write
14EF7DBD000
trusted library allocation
page read and write
14EF04A3000
trusted library allocation
page read and write
14EF0C35000
trusted library allocation
page read and write
14EEEAA3000
trusted library allocation
page read and write
14EF76BC000
heap
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EF1EAA000
trusted library allocation
page read and write
14EEED8F000
heap
page read and write
16888863000
trusted library allocation
page read and write
14EF2DE0000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
1F42AA77000
heap
page read and write
1B279180000
heap
page read and write
14EF1ACB000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EE64B0000
heap
page read and write
1F42AA2A000
heap
page read and write
14EF7BCF000
trusted library allocation
page read and write
14EF049A000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
1F42A960000
heap
page read and write
14EEF197000
trusted library allocation
page read and write
14EF7D66000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF1037000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EEC480000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF2D40000
trusted library allocation
page read and write
14EF0A78000
trusted library allocation
page read and write
14EF0AB1000
trusted library allocation
page read and write
14EF1420000
trusted library allocation
page read and write
14EEEA7A000
trusted library allocation
page read and write
14EF763F000
heap
page read and write
14EF1DF8000
trusted library allocation
page read and write
14EF08FD000
trusted library allocation
page read and write
14EF10DD000
trusted library allocation
page read and write
5F4000
heap
page read and write
16888467000
remote allocation
page execute read
14EF7BA0000
trusted library allocation
page read and write
14EF10DD000
trusted library allocation
page read and write
14EF0F61000
trusted library allocation
page read and write
14EF7D6E000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EE6486000
heap
page read and write
14EE6466000
heap
page read and write
14EF10E5000
trusted library allocation
page read and write
14EF0AED000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EE6482000
heap
page read and write
14EF9C85000
trusted library allocation
page read and write
5DD000
stack
page read and write
14EE64A6000
heap
page read and write
14EF7B7D000
trusted library allocation
page read and write
14EEEA76000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EE64A5000
heap
page read and write
14EE6498000
heap
page read and write
14EF7CB8000
trusted library allocation
page read and write
14EF2AE7000
trusted library allocation
page read and write
14EF00DE000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EEC79A000
trusted library allocation
page read and write
F78000
heap
page read and write
14EEC829000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE649E000
heap
page read and write
14EF2A35000
trusted library allocation
page read and write
14EF75F7000
trusted library allocation
page read and write
1C20000
trusted library allocation
page read and write
14EF7D62000
trusted library allocation
page read and write
14EF2ACA000
trusted library allocation
page read and write
14EF7D95000
trusted library allocation
page read and write
14EF10D5000
trusted library allocation
page read and write
14EF10D5000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE647D000
heap
page read and write
14EF1918000
trusted library allocation
page read and write
14EF0ACE000
trusted library allocation
page read and write
14EF2D34000
trusted library allocation
page read and write
14EEB56A000
trusted library allocation
page read and write
14EF7D97000
trusted library allocation
page read and write
14EF9085000
trusted library allocation
page read and write
14EF07A0000
trusted library allocation
page read and write
14EE646B000
heap
page read and write
14EF94FD000
trusted library allocation
page read and write
14EF9489000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF1774000
trusted library allocation
page read and write
14EF34DA000
trusted library allocation
page read and write
14EFB134000
trusted library allocation
page read and write
14EF7636000
heap
page read and write
14EF1075000
trusted library allocation
page read and write
14EEF7CB000
trusted library allocation
page read and write
14EFB148000
trusted library allocation
page read and write
14EEF361000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EE6498000
heap
page read and write
27FFF507000
trusted library allocation
page read and write
14EF7525000
trusted library allocation
page read and write
14EF10AC000
trusted library allocation
page read and write
14EF7E83000
trusted library allocation
page read and write
14EEF7EE000
trusted library allocation
page read and write
14EF0CA1000
trusted library allocation
page read and write
1B27950E000
trusted library allocation
page read and write
950000
unkown
page readonly
14EE64AA000
heap
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF0B69000
trusted library allocation
page read and write
14EF0A49000
trusted library allocation
page read and write
14EF0F5D000
trusted library allocation
page read and write
14EF0BA8000
trusted library allocation
page read and write
14EF1EAF000
trusted library allocation
page read and write
14EF0AF8000
trusted library allocation
page read and write
1F42A9FD000
heap
page read and write
1F429D16000
trusted library allocation
page read and write
19914A0A000
trusted library allocation
page read and write
14EF7BA0000
trusted library allocation
page read and write
14EF0F48000
trusted library allocation
page read and write
F78000
heap
page read and write
14EEF7D5000
trusted library allocation
page read and write
1688864F000
unclassified section
page read and write
14EF7A6B000
trusted library allocation
page read and write
14EF0AAF000
trusted library allocation
page read and write
14EF7B3C000
trusted library allocation
page read and write
14EEC7BE000
trusted library allocation
page read and write
14EF17A1000
trusted library allocation
page read and write
14EF104A000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EE649F000
heap
page read and write
14EEFB99000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EEED72000
heap
page read and write
5F6000
heap
page read and write
14EF0F5F000
trusted library allocation
page read and write
14EF0BF6000
trusted library allocation
page read and write
14EF1A6D000
trusted library allocation
page read and write
14EF0D33000
trusted library allocation
page read and write
14EF0B5A000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EF1DB9000
trusted library allocation
page read and write
14EF755E000
trusted library allocation
page read and write
14EF0468000
trusted library allocation
page read and write
14EF7645000
heap
page read and write
5F6000
heap
page read and write
14EF10B9000
trusted library allocation
page read and write
14EF1EF1000
trusted library allocation
page read and write
1B279330000
heap
page readonly
14EF8EC1000
trusted library allocation
page read and write
1F429D23000
trusted library allocation
page read and write
14EF1EAA000
trusted library allocation
page read and write
1F429DC1000
trusted library allocation
page read and write
14EF7CE0000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF10B2000
trusted library allocation
page read and write
14EF9B55000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF7D97000
trusted library allocation
page read and write
14EF1055000
trusted library allocation
page read and write
14EF29F1000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
1F4298F0000
heap
page read and write
14EF0D91000
trusted library allocation
page read and write
14EEFB45000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EF0BEE000
trusted library allocation
page read and write
14EF7D7D000
trusted library allocation
page read and write
14EF0A46000
trusted library allocation
page read and write
14EFB2AF000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEFB99000
trusted library allocation
page read and write
1F429D10000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6502000
heap
page read and write
14EF2D80000
trusted library allocation
page read and write
14EEFB35000
trusted library allocation
page read and write
14EFAED9000
trusted library allocation
page read and write
14EE64F9000
heap
page read and write
14EEFB6D000
trusted library allocation
page read and write
F82000
heap
page read and write
14EF1DFA000
trusted library allocation
page read and write
14EF7500000
trusted library allocation
page read and write
14EEC77E000
trusted library allocation
page read and write
14EEC733000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE646A000
heap
page read and write
32847FF000
stack
page read and write
14EF2AC7000
trusted library allocation
page read and write
16888861000
trusted library allocation
page read and write
14EF2A26000
trusted library allocation
page read and write
14EF7CFC000
trusted library allocation
page read and write
14EF76A1000
heap
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EF7637000
heap
page read and write
14EF1051000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EFB149000
trusted library allocation
page read and write
14EEF18A000
trusted library allocation
page read and write
14EE6498000
heap
page read and write
14EF2A9C000
trusted library allocation
page read and write
14EF8EA6000
trusted library allocation
page read and write
14EF7C16000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EF759D000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE6471000
heap
page read and write
14EEFBAB000
trusted library allocation
page read and write
14EFB189000
trusted library allocation
page read and write
1F42AA2D000
heap
page read and write
14EEC7A6000
trusted library allocation
page read and write
14EF10BF000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
14EEFD67000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF2D4E000
trusted library allocation
page read and write
1F42A803000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EF106C000
trusted library allocation
page read and write
14EF103E000
trusted library allocation
page read and write
14EF10E5000
trusted library allocation
page read and write
1F42A9E1000
heap
page read and write
14EF08BD000
trusted library allocation
page read and write
14EEC77E000
trusted library allocation
page read and write
14EE6479000
heap
page read and write
14EEC822000
trusted library allocation
page read and write
14EF34EC000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
5F6000
heap
page read and write
14EFB28B000
trusted library allocation
page read and write
14EEC6F4000
trusted library allocation
page read and write
14EF7B96000
trusted library allocation
page read and write
14EF7B89000
trusted library allocation
page read and write
14EF7A52000
trusted library allocation
page read and write
14EE6481000
heap
page read and write
14EF753E000
trusted library allocation
page read and write
14EEF2CE000
trusted library allocation
page read and write
A12000
unkown
page readonly
14EF29F1000
trusted library allocation
page read and write
14EF1046000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEFBF9000
trusted library allocation
page read and write
14EE64F9000
heap
page read and write
14EEFB68000
trusted library allocation
page read and write
14EF7EF1000
trusted library allocation
page read and write
14EF109C000
trusted library allocation
page read and write
14EEEDB2000
heap
page read and write
14EEFB35000
trusted library allocation
page read and write
14EEC7C7000
trusted library allocation
page read and write
3441000
heap
page read and write
14EE6475000
heap
page read and write
14EF07D8000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
1F429D03000
trusted library allocation
page read and write
14EF94DD000
trusted library allocation
page read and write
14EF7ADD000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
5F6000
heap
page read and write
14EFB159000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
168888A4000
trusted library allocation
page read and write
14EF0B5A000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EE64A8000
heap
page read and write
14EE6498000
heap
page read and write
14EF0F43000
trusted library allocation
page read and write
1F42A1C0000
trusted library allocation
page read and write
14EF0BA1000
trusted library allocation
page read and write
14EF2D28000
trusted library allocation
page read and write
14EF0AED000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
590000
heap
page read and write
1F42AA3B000
heap
page read and write
14EF94F9000
trusted library allocation
page read and write
14EEFBC3000
trusted library allocation
page read and write
14EF0D39000
trusted library allocation
page read and write
14EF7DD3000
trusted library allocation
page read and write
14EF7AC5000
trusted library allocation
page read and write
199148C7000
heap
page read and write
1F429CE0000
heap
page read and write
14EEF784000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
14EF0C3C000
trusted library allocation
page read and write
14EF1075000
trusted library allocation
page read and write
1F429D00000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EE6482000
heap
page read and write
14EF1EDF000
trusted library allocation
page read and write
1F42A960000
heap
page read and write
14EF0460000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EEC779000
trusted library allocation
page read and write
2A9517E000
unkown
page readonly
14EF2CE2000
trusted library allocation
page read and write
14EF7EFE000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6482000
heap
page read and write
14EF1E2D000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EFAEE9000
trusted library allocation
page read and write
14EF7D76000
trusted library allocation
page read and write
14EE64E4000
heap
page read and write
14EE646B000
heap
page read and write
14EE64AF000
heap
page read and write
14EEFB40000
trusted library allocation
page read and write
14EFABC4000
trusted library allocation
page read and write
14EF7525000
trusted library allocation
page read and write
14EF0F3E000
trusted library allocation
page read and write
14EF7EDD000
trusted library allocation
page read and write
14EF07D3000
trusted library allocation
page read and write
14EF1915000
trusted library allocation
page read and write
168888CB000
trusted library allocation
page read and write
14EEC7DE000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF07A0000
trusted library allocation
page read and write
16888490000
heap
page read and write
14EE6498000
heap
page read and write
14EEC76C000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF7579000
trusted library allocation
page read and write
14EF2A2B000
trusted library allocation
page read and write
14EFAB7C000
trusted library allocation
page read and write
14EE64F1000
heap
page read and write
14EEEAA6000
trusted library allocation
page read and write
1B279160000
unclassified section
page readonly
14EEEACA000
trusted library allocation
page read and write
14EF0DE9000
trusted library allocation
page read and write
14EFB14C000
trusted library allocation
page read and write
14EFAEBD000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF04C0000
trusted library allocation
page read and write
14EEC79D000
trusted library allocation
page read and write
14EF0F59000
trusted library allocation
page read and write
14EF0A5F000
trusted library allocation
page read and write
14EE64F4000
heap
page read and write
14EF09C9000
trusted library allocation
page read and write
14EE6494000
heap
page read and write
14EF1921000
trusted library allocation
page read and write
14EF0EF0000
trusted library allocation
page read and write
14EE64F3000
heap
page read and write
14EF7CB9000
trusted library allocation
page read and write
14EEEDB7000
heap
page read and write
14EE6479000
heap
page read and write
14EF0D87000
trusted library allocation
page read and write
14EF1ABF000
trusted library allocation
page read and write
14EF7A7C000
trusted library allocation
page read and write
14EFABF1000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE64F0000
heap
page read and write
14EE64B0000
heap
page read and write
14EE6482000
heap
page read and write
2A9407B000
stack
page read and write
A12000
unkown
page readonly
14EE6498000
heap
page read and write
F52000
heap
page read and write
14EEF381000
trusted library allocation
page read and write
14EEF1F3000
trusted library allocation
page read and write
14EF0998000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EEFB6C000
trusted library allocation
page read and write
14EF7B75000
trusted library allocation
page read and write
14EF7579000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EEC76C000
trusted library allocation
page read and write
14EF7ED7000
trusted library allocation
page read and write
1F429D9F000
trusted library allocation
page read and write
14EF7CD9000
trusted library allocation
page read and write
1F429D78000
trusted library allocation
page read and write
14EEFBA5000
trusted library allocation
page read and write
14EF0AAC000
trusted library allocation
page read and write
14EFB111000
trusted library allocation
page read and write
3F0A1211000
trusted library allocation
page execute read
14EE6492000
heap
page read and write
14EF10B6000
trusted library allocation
page read and write
14EF2D40000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EEC7F6000
trusted library allocation
page read and write
14EF2AC1000
trusted library allocation
page read and write
14EF0C8D000
trusted library allocation
page read and write
14EE64F3000
heap
page read and write
14EF2CF6000
trusted library allocation
page read and write
1F429910000
heap
page read and write
1F42A964000
heap
page read and write
14EF7A98000
trusted library allocation
page read and write
14EF0460000
trusted library allocation
page read and write
14EF0C87000
trusted library allocation
page read and write
14EF2AE7000
trusted library allocation
page read and write
14EF0DF5000
trusted library allocation
page read and write
14EF044A000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF045D000
trusted library allocation
page read and write
14EEED6E000
heap
page read and write
14EF75DB000
trusted library allocation
page read and write
14EF7D6E000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EEF36D000
trusted library allocation
page read and write
16888823000
trusted library allocation
page read and write
14EF7DEF000
trusted library allocation
page read and write
14EF7557000
trusted library allocation
page read and write
14EF04E4000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
1F42AA77000
heap
page read and write
14EF0AD4000
trusted library allocation
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
1F42A250000
heap
page read and write
14EEF70F000
trusted library allocation
page read and write
14EFABE0000
trusted library allocation
page read and write
14EF0524000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EEEB63000
trusted library allocation
page read and write
14EF1051000
trusted library allocation
page read and write
14EF2A19000
trusted library allocation
page read and write
1F42A9B9000
heap
page read and write
27FFF6B0000
heap
page read and write
14EF7DD3000
trusted library allocation
page read and write
14EF7AA4000
trusted library allocation
page read and write
14EF753A000
trusted library allocation
page read and write
14EF0B63000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF9483000
trusted library allocation
page read and write
14EF04F0000
trusted library allocation
page read and write
14EEC7E5000
trusted library allocation
page read and write
14EF7EBA000
trusted library allocation
page read and write
14EF1ED2000
trusted library allocation
page read and write
14EEF7E7000
trusted library allocation
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EF0FF4000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EF29F9000
trusted library allocation
page read and write
14EF7D37000
trusted library allocation
page read and write
14EF7CD4000
trusted library allocation
page read and write
14EF0ECF000
trusted library allocation
page read and write
14EF0BEE000
trusted library allocation
page read and write
14EF1EE1000
trusted library allocation
page read and write
14EF0F56000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF2A8F000
trusted library allocation
page read and write
14EE64F0000
heap
page read and write
14EF2D7D000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EEF2CE000
trusted library allocation
page read and write
14EFAB8F000
trusted library allocation
page read and write
14EF295A000
trusted library allocation
page read and write
14EE645B000
heap
page read and write
14EF2A35000
trusted library allocation
page read and write
14EF0A93000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE648C000
heap
page read and write
1B279600000
heap
page read and write
14EF04B6000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EFABCC000
trusted library allocation
page read and write
14EF34DA000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
14EF0DED000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE645E000
heap
page read and write
14EF0D8E000
trusted library allocation
page read and write
14EF7D74000
trusted library allocation
page read and write
14EF294C000
trusted library allocation
page read and write
14EEC7A6000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EE647A000
heap
page read and write
14EEF73D000
trusted library allocation
page read and write
14EEB580000
trusted library allocation
page read and write
14EF0A9E000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
199148F4000
heap
page read and write
14EF0795000
trusted library allocation
page read and write
14EFA700000
trusted library allocation
page read and write
14EF2AF2000
trusted library allocation
page read and write
14EF0460000
trusted library allocation
page read and write
14EEC7BC000
trusted library allocation
page read and write
14EF7E91000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EF7AEB000
trusted library allocation
page read and write
14EEC7DD000
trusted library allocation
page read and write
14EF34EC000
trusted library allocation
page read and write
14EE64AA000
heap
page read and write
14EE6479000
heap
page read and write
14EF0A6B000
trusted library allocation
page read and write
14EEF7D5000
trusted library allocation
page read and write
14EF2D4B000
trusted library allocation
page read and write
1F42993A000
heap
page read and write
14EE6487000
heap
page read and write
14EF0B3B000
trusted library allocation
page read and write
14EEEDA0000
heap
page read and write
14EF7CD6000
trusted library allocation
page read and write
14EF298D000
trusted library allocation
page read and write
14EEF71C000
trusted library allocation
page read and write
14EEF29E000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EE647A000
heap
page read and write
14EF297C000
trusted library allocation
page read and write
14EFB15F000
trusted library allocation
page read and write
14EF0A78000
trusted library allocation
page read and write
14EF2A85000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EF04A1000
trusted library allocation
page read and write
14EF0AF6000
trusted library allocation
page read and write
199162ED000
heap
page read and write
14EE645E000
heap
page read and write
14EE6482000
heap
page read and write
14EE6496000
heap
page read and write
14EE6498000
heap
page read and write
14EF0B48000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
14EF0AAC000
trusted library allocation
page read and write
14EF94E7000
trusted library allocation
page read and write
14EEFB49000
trusted library allocation
page read and write
14EF2CD6000
trusted library allocation
page read and write
14EEF752000
trusted library allocation
page read and write
14EF753C000
trusted library allocation
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EE64A1000
heap
page read and write
14EEFB6D000
trusted library allocation
page read and write
1F42A9E3000
heap
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EE6498000
heap
page read and write
14EEB518000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF2D82000
trusted library allocation
page read and write
14EEB5F0000
trusted library allocation
page read and write
14EEC7F4000
trusted library allocation
page read and write
14EF19C8000
trusted library allocation
page read and write
14EF29C1000
trusted library allocation
page read and write
14EF2A3A000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EE648C000
heap
page read and write
14EF2CA3000
trusted library allocation
page read and write
14EF7D6E000
trusted library allocation
page read and write
14EF7B85000
trusted library allocation
page read and write
14EFAED9000
trusted library allocation
page read and write
14EE6496000
heap
page read and write
14EF1DFE000
trusted library allocation
page read and write
14EF94DF000
trusted library allocation
page read and write
14EF0F43000
trusted library allocation
page read and write
14EF1EFB000
trusted library allocation
page read and write
14EFAE4C000
trusted library allocation
page read and write
14EF1EE1000
trusted library allocation
page read and write
14EEED7F000
heap
page read and write
14EE64DF000
heap
page read and write
14EF751E000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF8E49000
trusted library allocation
page read and write
14EF13D2000
trusted library allocation
page read and write
14EF1E90000
trusted library allocation
page read and write
14EF2D84000
trusted library allocation
page read and write
14EF0BCF000
trusted library allocation
page read and write
F67000
heap
page read and write
14EE64B0000
heap
page read and write
14EF7ECD000
trusted library allocation
page read and write
14EF0DF3000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEF3E4000
trusted library allocation
page read and write
14EFB2AF000
trusted library allocation
page read and write
14EF7601000
heap
page read and write
14EFAB8C000
trusted library allocation
page read and write
14EE6469000
heap
page read and write
14EF0B39000
trusted library allocation
page read and write
14EF0AAC000
trusted library allocation
page read and write
14EEB600000
trusted library allocation
page read and write
14EEEDB5000
heap
page read and write
14EF7BAA000
trusted library allocation
page read and write
14EEC741000
trusted library allocation
page read and write
14EFAE8A000
trusted library allocation
page read and write
14EF29C3000
trusted library allocation
page read and write
14EF0B81000
trusted library allocation
page read and write
14EEEAFA000
trusted library allocation
page read and write
14EFB189000
trusted library allocation
page read and write
14EF0F5D000
trusted library allocation
page read and write
14EF07A6000
trusted library allocation
page read and write
14EF0AC4000
trusted library allocation
page read and write
14EEFBA5000
trusted library allocation
page read and write
14EF7ECA000
trusted library allocation
page read and write
14EEFBE8000
trusted library allocation
page read and write
14EF2D4B000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EF2D2E000
trusted library allocation
page read and write
14EF0799000
trusted library allocation
page read and write
14EF04B6000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE64A5000
heap
page read and write
14EF1EDF000
trusted library allocation
page read and write
1F42A9FD000
heap
page read and write
1B27958F000
trusted library allocation
page read and write
14EE6466000
heap
page read and write
14EF0DED000
trusted library allocation
page read and write
14EF7BEC000
trusted library allocation
page read and write
14EEF16A000
trusted library allocation
page read and write
14EF106A000
trusted library allocation
page read and write
14EF0F57000
trusted library allocation
page read and write
3284FFE000
stack
page read and write
14EF7D7D000
trusted library allocation
page read and write
14EF0DE9000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6492000
heap
page read and write
14EF10BB000
trusted library allocation
page read and write
14EF1055000
trusted library allocation
page read and write
14EEF18A000
trusted library allocation
page read and write
14EE647F000
heap
page read and write
1F42A94D000
heap
page read and write
14EE6503000
heap
page read and write
F78000
heap
page read and write
14EE648A000
heap
page read and write
14EF29DB000
trusted library allocation
page read and write
14EEC763000
trusted library allocation
page read and write
14EEC76E000
trusted library allocation
page read and write
14EEF73A000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF0496000
trusted library allocation
page read and write
14EF1EE5000
trusted library allocation
page read and write
16888897000
trusted library allocation
page read and write
14EEED92000
heap
page read and write
199148A0000
heap
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EF7B7D000
trusted library allocation
page read and write
14EF1EED000
trusted library allocation
page read and write
14EF9543000
trusted library allocation
page read and write
14EE646A000
heap
page read and write
14EE64DF000
heap
page read and write
14EFB134000
trusted library allocation
page read and write
14EEEDF0000
heap
page read and write
14EF2DBB000
trusted library allocation
page read and write
14EF0A8C000
trusted library allocation
page read and write
14EFAE70000
trusted library allocation
page read and write
16888926000
heap
page read and write
14EE64A5000
heap
page read and write
14EE646B000
heap
page read and write
14EE64A6000
heap
page read and write
1B279513000
trusted library allocation
page read and write
14EEF378000
trusted library allocation
page read and write
14EFABFE000
trusted library allocation
page read and write
14EF2A1F000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EEF373000
trusted library allocation
page read and write
14EF2C8B000
trusted library allocation
page read and write
14EF1AFB000
trusted library allocation
page read and write
14EF34DA000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EF04E4000
trusted library allocation
page read and write
1F42A1B0000
unkown
page execute read
14EF1055000
trusted library allocation
page read and write
14EEF388000
trusted library allocation
page read and write
14EF0A73000
trusted library allocation
page read and write
14EFABFE000
trusted library allocation
page read and write
14EEAEA7000
trusted library allocation
page read and write
14EF2F7A000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF07F0000
trusted library allocation
page read and write
14EF7A40000
trusted library allocation
page read and write
14EEED8E000
heap
page read and write
1B2791D3000
heap
page read and write
14EF2AF7000
trusted library allocation
page read and write
14EF0C50000
trusted library allocation
page read and write
14EF75DB000
trusted library allocation
page read and write
14EF2D92000
trusted library allocation
page read and write
14EF7BEA000
trusted library allocation
page read and write
14EF0BAF000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EF0B5C000
trusted library allocation
page read and write
14EF345F000
trusted library allocation
page read and write
14EF1EF1000
trusted library allocation
page read and write
14EF10DD000
trusted library allocation
page read and write
14EF106A000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE645E000
heap
page read and write
14EE6492000
heap
page read and write
14EF106C000
trusted library allocation
page read and write
14EF34E2000
trusted library allocation
page read and write
14EF0AAF000
trusted library allocation
page read and write
951000
unkown
page execute read
14EF29D7000
trusted library allocation
page read and write
14EF7E95000
trusted library allocation
page read and write
14EE64C1000
heap
page read and write
14EE6471000
heap
page read and write
14EF7B72000
trusted library allocation
page read and write
14EEFB95000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE64A6000
heap
page read and write
14EE6482000
heap
page read and write
14EE6494000
heap
page read and write
2077BD8000
stack
page read and write
14EF7DCA000
trusted library allocation
page read and write
1F429DF3000
trusted library allocation
page read and write
1F429D0A000
trusted library allocation
page read and write
14EE64F4000
heap
page read and write
14EEEDBB000
heap
page read and write
14EF90FC000
trusted library allocation
page read and write
14EF0A9E000
trusted library allocation
page read and write
14EF10C2000
trusted library allocation
page read and write
14EF2D4E000
trusted library allocation
page read and write
14EF0BA1000
trusted library allocation
page read and write
950000
unkown
page readonly
1F429D5F000
trusted library allocation
page read and write
14EE649E000
heap
page read and write
14EF75F3000
trusted library allocation
page read and write
14EF8FBA000
trusted library allocation
page read and write
1B2790D0000
unclassified section
page readonly
14EF7B9E000
trusted library allocation
page read and write
14EF7D66000
trusted library allocation
page read and write
14EEFBE2000
trusted library allocation
page read and write
14EE6470000
heap
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
14EF7B8D000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
3F0A1221000
trusted library allocation
page execute read
14EF0BF6000
trusted library allocation
page read and write
14EEED98000
heap
page read and write
14EE64FB000
heap
page read and write
14EF0966000
trusted library allocation
page read and write
14EE647A000
heap
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF044A000
trusted library allocation
page read and write
14EF0439000
trusted library allocation
page read and write
14EEF23C000
trusted library allocation
page read and write
14EF10BC000
trusted library allocation
page read and write
14EEFFC3000
trusted library allocation
page read and write
14EEC79D000
trusted library allocation
page read and write
1F42A9E0000
heap
page read and write
14EEF11D000
trusted library allocation
page read and write
14EF9508000
trusted library allocation
page read and write
9C559FE000
stack
page read and write
14EEED92000
heap
page read and write
14EF8E79000
trusted library allocation
page read and write
14EE645E000
heap
page read and write
16888B00000
heap
page read and write
14EEF39A000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EE648A000
heap
page read and write
2A951FE000
unkown
page readonly
14EE64A6000
heap
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EF7CE3000
trusted library allocation
page read and write
16888A32000
trusted library allocation
page read and write
14EF299A000
trusted library allocation
page read and write
14EF1796000
trusted library allocation
page read and write
14EF34D6000
trusted library allocation
page read and write
1B279505000
trusted library allocation
page read and write
14EEC7EB000
trusted library allocation
page read and write
14EE6492000
heap
page read and write
1F429A40000
heap
page read and write
14EF34DE000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF9486000
trusted library allocation
page read and write
14EF7BB5000
trusted library allocation
page read and write
14EFB28B000
trusted library allocation
page read and write
14EEF72E000
trusted library allocation
page read and write
14EF0802000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF7B62000
trusted library allocation
page read and write
14EF2DD3000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EF7671000
heap
page read and write
14EF29BA000
trusted library allocation
page read and write
14EEFB49000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE6492000
heap
page read and write
14EF2A7B000
trusted library allocation
page read and write
14EE64AF000
heap
page read and write
14EF9487000
trusted library allocation
page read and write
14EF10E5000
trusted library allocation
page read and write
14EF10D5000
trusted library allocation
page read and write
14EF7A9D000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
5F6000
heap
page read and write
14EE64AF000
heap
page read and write
14EE6482000
heap
page read and write
14EF0F5B000
trusted library allocation
page read and write
14EF7671000
heap
page read and write
14EEFF54000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
5F6000
heap
page read and write
14EFB180000
trusted library allocation
page read and write
14EF0D9F000
trusted library allocation
page read and write
14EEB57E000
trusted library allocation
page read and write
14EF2950000
trusted library allocation
page read and write
14EE6450000
heap
page read and write
14EF10AE000
trusted library allocation
page read and write
1F42A96C000
heap
page read and write
A1C000
unkown
page read and write
14EEF373000
trusted library allocation
page read and write
E3E000
stack
page read and write
1F42A2C0000
heap
page read and write
14EF0ED1000
trusted library allocation
page read and write
1F4298C2000
remote allocation
page execute read
14EE647B000
heap
page read and write
14EF7D74000
trusted library allocation
page read and write
168888A8000
trusted library allocation
page read and write
14EFAE4C000
trusted library allocation
page read and write
14EF0B63000
trusted library allocation
page read and write
14EEEAD5000
trusted library allocation
page read and write
14EF075C000
trusted library allocation
page read and write
14EEF78D000
trusted library allocation
page read and write
14EF7D37000
trusted library allocation
page read and write
14EFABC3000
trusted library allocation
page read and write
14EF103E000
trusted library allocation
page read and write
14EF905C000
trusted library allocation
page read and write
14EE6479000
heap
page read and write
14EE6470000
heap
page read and write
14EE6482000
heap
page read and write
14EEB42F000
trusted library allocation
page read and write
14EF07A6000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EF19C8000
trusted library allocation
page read and write
27FFF260000
heap
page read and write
14EE64A5000
heap
page read and write
14EF0AA7000
trusted library allocation
page read and write
14EF2AC7000
trusted library allocation
page read and write
1F42A9A8000
heap
page read and write
14EF8E9C000
trusted library allocation
page read and write
14EEB471000
trusted library allocation
page read and write
16888924000
heap
page read and write
1F4298D0000
unclassified section
page readonly
14EF0AAC000
trusted library allocation
page read and write
1F429D9D000
trusted library allocation
page read and write
1F42A82E000
trusted library allocation
page read and write
1F42A9AA000
heap
page read and write
14EFAE5D000
trusted library allocation
page read and write
14EEEA33000
trusted library allocation
page read and write
14EF1055000
trusted library allocation
page read and write
16888A16000
trusted library allocation
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EF7DD9000
trusted library allocation
page read and write
14EF2A42000
trusted library allocation
page read and write
5F6000
heap
page read and write
14EFB2EF000
trusted library allocation
page read and write
14EEF191000
trusted library allocation
page read and write
14EEC70E000
trusted library allocation
page read and write
14EF768B000
heap
page read and write
1F42A97D000
heap
page read and write
14EE64A5000
heap
page read and write
14EE648C000
heap
page read and write
14EE64A5000
heap
page read and write
14EF7B9E000
trusted library allocation
page read and write
14EEED7D000
heap
page read and write
207943E000
unkown
page readonly
14EE648D000
heap
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EE6472000
heap
page read and write
14EF0F44000
trusted library allocation
page read and write
14EEED76000
heap
page read and write
14EF7EEC000
trusted library allocation
page read and write
14EE64A5000
heap
page read and write
14EF0B39000
trusted library allocation
page read and write
14EF2D7B000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE6492000
heap
page read and write
14EE64DF000
heap
page read and write
14EE6486000
heap
page read and write
14EE64F3000
heap
page read and write
14EE6492000
heap
page read and write
14EF0DB2000
trusted library allocation
page read and write
14EEEDAF000
heap
page read and write
14EF0A7B000
trusted library allocation
page read and write
14EF759D000
trusted library allocation
page read and write
14EF7D37000
trusted library allocation
page read and write
14EEED97000
heap
page read and write
14EE645B000
heap
page read and write
14EE6450000
heap
page read and write
14EFAE51000
trusted library allocation
page read and write
14EEB423000
trusted library allocation
page read and write
14EF2A6E000
trusted library allocation
page read and write
19914A07000
trusted library allocation
page read and write
14EFB149000
trusted library allocation
page read and write
14EF2AC4000
trusted library allocation
page read and write
14EEFFDB000
trusted library allocation
page read and write
14EF0AA7000
trusted library allocation
page read and write
14EEEADB000
trusted library allocation
page read and write
14EF0FF4000
trusted library allocation
page read and write
2A93FFE000
unkown
page readonly
1F42A900000
heap
page read and write
14EE6482000
heap
page read and write
1F42A9E6000
heap
page read and write
14EFB109000
trusted library allocation
page read and write
14EEB42F000
trusted library allocation
page read and write
14EF9CE9000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF0BA4000
trusted library allocation
page read and write
F53000
heap
page read and write
14EF764D000
heap
page read and write
14EF7C4D000
trusted library allocation
page read and write
14EF0DA2000
trusted library allocation
page read and write
14EF753C000
trusted library allocation
page read and write
14EE647B000
heap
page read and write
14EF29D7000
trusted library allocation
page read and write
14EE64A6000
heap
page read and write
14EF2D86000
trusted library allocation
page read and write
14EF766B000
heap
page read and write
14EF0BAC000
trusted library allocation
page read and write
14EF0AF4000
trusted library allocation
page read and write
14EF7CA7000
trusted library allocation
page read and write
14EF19FB000
trusted library allocation
page read and write
14EE64A3000
heap
page read and write
1B279578000
trusted library allocation
page read and write
1F42A95F000
heap
page read and write
14EE647B000
heap
page read and write
14EE64F9000
heap
page read and write
14EF0BD4000
trusted library allocation
page read and write
14EF07AA000
trusted library allocation
page read and write
93EB9D8000
stack
page read and write
14EF297C000
trusted library allocation
page read and write
14EEF1CA000
trusted library allocation
page read and write
14EF7D35000
trusted library allocation
page read and write
14EF095B000
trusted library allocation
page read and write
14EEEAC5000
trusted library allocation
page read and write
14EF0BB3000
trusted library allocation
page read and write
14EF9CC9000
trusted library allocation
page read and write
14EEB566000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF1EF5000
trusted library allocation
page read and write
14EE648A000
heap
page read and write
14EE647D000
heap
page read and write
14EFAE82000
trusted library allocation
page read and write
14EF75F3000
trusted library allocation
page read and write
14EEFB68000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EEED76000
heap
page read and write
14EEC767000
trusted library allocation
page read and write
14EF1AC5000
trusted library allocation
page read and write
14EEF119000
trusted library allocation
page read and write
14EF07D8000
trusted library allocation
page read and write
14EF9104000
trusted library allocation
page read and write
14EF75F9000
trusted library allocation
page read and write
14EF107B000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EEF29E000
trusted library allocation
page read and write
14EE6474000
heap
page read and write
14EF1037000
trusted library allocation
page read and write
14EE649F000
heap
page read and write
14EEFB99000
trusted library allocation
page read and write
14EEFB40000
trusted library allocation
page read and write
14EF2D80000
trusted library allocation
page read and write
14EF0A8C000
trusted library allocation
page read and write
14EF1086000
trusted library allocation
page read and write
14EF2DE5000
trusted library allocation
page read and write
14EEC6B6000
trusted library allocation
page read and write
14EF044C000
trusted library allocation
page read and write
14EEFBED000
trusted library allocation
page read and write
14EEEAFA000
trusted library allocation
page read and write
14EF1037000
trusted library allocation
page read and write
14EEFBA4000
trusted library allocation
page read and write
14EEF13C000
trusted library allocation
page read and write
14EF0B3B000
trusted library allocation
page read and write
F59000
heap
page read and write
14EE6479000
heap
page read and write
14EF1A6D000
trusted library allocation
page read and write
14EEF738000
trusted library allocation
page read and write
14EF2FBF000
trusted library allocation
page read and write
14EF0496000
trusted library allocation
page read and write
14EEFBE0000
trusted library allocation
page read and write
14EF7BE1000
trusted library allocation
page read and write
14EE64A8000
heap
page read and write
14EEFB6A000
trusted library allocation
page read and write
14EF75F9000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE64A5000
heap
page read and write
14EF2971000
trusted library allocation
page read and write
14EF0F5D000
trusted library allocation
page read and write
14EEED9F000
heap
page read and write
14EF34D2000
trusted library allocation
page read and write
14EF17FC000
trusted library allocation
page read and write
1F42A1B2000
unkown
page execute read
199162E0000
heap
page read and write
14EF106C000
trusted library allocation
page read and write
14EF0ED6000
trusted library allocation
page read and write
5F4000
heap
page read and write
14EF0BB5000
trusted library allocation
page read and write
14EF7B39000
trusted library allocation
page read and write
A1C000
unkown
page write copy
14EEAE90000
trusted library allocation
page read and write
14EF7D6E000
trusted library allocation
page read and write
14EF34E6000
trusted library allocation
page read and write
14EF7BEA000
trusted library allocation
page read and write
14EE648C000
heap
page read and write
14EF7BBA000
trusted library allocation
page read and write
14EF7A6E000
trusted library allocation
page read and write
14EEF1F3000
trusted library allocation
page read and write
14EF1025000
trusted library allocation
page read and write
14EEF2A5000
trusted library allocation
page read and write
14EF103C000
trusted library allocation
page read and write
14EFB904000
trusted library allocation
page read and write
1F42A969000
heap
page read and write
1F42A9F1000
heap
page read and write
14EEC76E000
trusted library allocation
page read and write
14EE6471000
heap
page read and write
14EE6450000
heap
page read and write
199162F8000
heap
page read and write
14EF7DD7000
trusted library allocation
page read and write
14EF9B80000
trusted library allocation
page read and write
14EF0C90000
trusted library allocation
page read and write
14EF1EAF000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF10C2000
trusted library allocation
page read and write
14EE64DF000
heap
page read and write
14EE6450000
heap
page read and write
14EE64F6000
heap
page read and write
14EE6502000
heap
page read and write
93ED1FE000
unkown
page readonly
14EF2A6E000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EF04A6000
trusted library allocation
page read and write
14EF09A5000
trusted library allocation
page read and write
14EEC7A8000
trusted library allocation
page read and write
1B2791A0000
heap
page read and write
14EF07CF000
trusted library allocation
page read and write
14EF0AD4000
trusted library allocation
page read and write
14EF0B8B000
trusted library allocation
page read and write
14EF7AA2000
trusted library allocation
page read and write
14EF753E000
trusted library allocation
page read and write
14EF0F61000
trusted library allocation
page read and write
20770FB000
stack
page read and write
14EF7DCA000
trusted library allocation
page read and write
14EF7CCE000
trusted library allocation
page read and write
14EEF391000
trusted library allocation
page read and write
14EF29E5000
trusted library allocation
page read and write
14EE647F000
heap
page read and write
14EFB983000
trusted library allocation
page read and write
14EF0D9F000
trusted library allocation
page read and write
1F42A9F1000
heap
page read and write
14EEF73D000
trusted library allocation
page read and write
14EF7CD4000
trusted library allocation
page read and write
14EE6482000
heap
page read and write
14EE646B000
heap
page read and write
14EF2DC0000
trusted library allocation
page read and write
14EEEB90000
trusted library allocation
page read and write
F78000
heap
page read and write
14EF106C000
trusted library allocation
page read and write
14EF08E3000
trusted library allocation
page read and write
14EF7B72000
trusted library allocation
page read and write
14EE647D000
heap
page read and write
14EE6487000
heap
page read and write
14EF07F0000
trusted library allocation
page read and write
14EE6473000
heap
page read and write
14EEEDA0000
heap
page read and write
14EF7592000
trusted library allocation
page read and write
14EF2DE0000
trusted library allocation
page read and write
14EF048C000
trusted library allocation
page read and write
F38000
heap
page read and write
F7F000
heap
page read and write
14EF10E2000
trusted library allocation
page read and write
14EE64B0000
heap
page read and write
There are 3864 hidden memdumps, click here to show them.