IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1a8fe094-ef80-4de2-9d30-5f01a2cf35e5.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1a8fe094-ef80-4de2-9d30-5f01a2cf35e5.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\ef088af3-85e9-4777-b52a-23cda8f75161 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\ef088af3-85e9-4777-b52a-23cda8f75161.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62211066-fcf4-4010-9dd2-8db042710cef} 7048 "\\.\pipe\gecko-crash-server-pipe.7048" 19f5db70b10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4084 -parentBuildID 20230927232528 -prefsHandle 4108 -prefMapHandle 4104 -prefsLen 26309 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c7d6957-7151-45d2-b5b6-8f2ec3916663} 7048 "\\.\pipe\gecko-crash-server-pipe.7048" 19f6fd1fd10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5188 -prefMapHandle 5184 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {646331cb-5b0f-4d7b-bbca-1ef13fcf4349} 7048 "\\.\pipe\gecko-crash-server-pipe.7048" 19f7c525510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://youtube.comP
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://vk.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.23.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.186.142
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
19F6F499000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F70F58000
trusted library allocation
page read and write
1ACB3AD0000
heap
page read and write
19F7AFBA000
trusted library allocation
page read and write
19F6AABE000
trusted library allocation
page read and write
19F7BA02000
trusted library allocation
page read and write
19F64959000
heap
page read and write
1DA3126C000
heap
page read and write
19F71164000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F70E26000
trusted library allocation
page read and write
19F6E1A8000
trusted library allocation
page read and write
19F7A733000
trusted library allocation
page read and write
19F6B3BE000
trusted library allocation
page read and write
16F1000
heap
page read and write
19F7691D000
trusted library allocation
page read and write
19F711A8000
trusted library allocation
page read and write
19F6F58C000
trusted library allocation
page read and write
19F6F5A7000
trusted library allocation
page read and write
19F6FEBF000
trusted library allocation
page read and write
19F64965000
heap
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F6F2AC000
trusted library allocation
page read and write
19F6FD7F000
trusted library allocation
page read and write
19F7747E000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F711A2000
trusted library allocation
page read and write
19F7742B000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F7A7FE000
trusted library allocation
page read and write
19F6F9D1000
trusted library allocation
page read and write
19F75C2C000
trusted library allocation
page read and write
19F75C17000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F76ABD000
trusted library allocation
page read and write
19F70F68000
trusted library allocation
page read and write
19F7A64A000
trusted library allocation
page read and write
19F6E42B000
trusted library allocation
page read and write
19F7A6A3000
trusted library allocation
page read and write
19F6D88A000
trusted library allocation
page read and write
19F6F006000
trusted library allocation
page read and write
19F6FDB1000
trusted library allocation
page read and write
19F70F87000
trusted library allocation
page read and write
19F714B5000
trusted library allocation
page read and write
19F6D63C000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
1DA312F1000
heap
page read and write
19F64924000
heap
page read and write
19F6ABDB000
trusted library allocation
page read and write
19F6EEDF000
trusted library allocation
page read and write
19F6AA7C000
trusted library allocation
page read and write
19F75C9C000
trusted library allocation
page read and write
19F76CEF000
trusted library allocation
page read and write
19F69917000
trusted library allocation
page read and write
CDFCFD8000
stack
page read and write
19F6D40A000
trusted library allocation
page read and write
3F31000
heap
page read and write
19F6495D000
heap
page read and write
19F6ED24000
trusted library allocation
page read and write
19F75BFD000
trusted library allocation
page read and write
1DA30330000
heap
page read and write
19F64996000
heap
page read and write
19F6FFA4000
trusted library allocation
page read and write
19F76CE8000
trusted library allocation
page read and write
19F6F98F000
trusted library allocation
page read and write
19F6F9BA000
trusted library allocation
page read and write
19F64940000
heap
page read and write
254566B3000
trusted library allocation
page read and write
19F76970000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6496D000
heap
page read and write
19F6F700000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F698FE000
trusted library allocation
page read and write
19F7B0F9000
trusted library allocation
page read and write
19F714AB000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F712D4000
trusted library allocation
page read and write
19F75963000
trusted library allocation
page read and write
1DA303D0000
heap
page read and write
19F6B363000
trusted library allocation
page read and write
19F6F2D3000
trusted library allocation
page read and write
19F6E468000
trusted library allocation
page read and write
19F76C3B000
trusted library allocation
page read and write
19F70FDD000
trusted library allocation
page read and write
19F6B255000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F75DFE000
trusted library allocation
page read and write
CDFF7FE000
unkown
page readonly
19F6F587000
trusted library allocation
page read and write
1DA30780000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F6F490000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F7C57F000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6AB74000
trusted library allocation
page read and write
19F7747E000
trusted library allocation
page read and write
19F758E5000
trusted library allocation
page read and write
19F6E1E4000
trusted library allocation
page read and write
19F70FBB000
trusted library allocation
page read and write
19F75D8C000
trusted library allocation
page read and write
2D882FE000
unkown
page readonly
19F6494F000
heap
page read and write
19F6F44C000
trusted library allocation
page read and write
19F75C91000
trusted library allocation
page read and write
19F7C5F4000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6929A000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F7A6B6000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F769F2000
trusted library allocation
page read and write
1ACB3AD3000
heap
page read and write
1DA31260000
heap
page read and write
19F6F4B0000
trusted library allocation
page read and write
19F76ACC000
trusted library allocation
page read and write
19F6EACD000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6F485000
trusted library allocation
page read and write
19F64935000
heap
page read and write
19F75C76000
trusted library allocation
page read and write
19F6EA9C000
trusted library allocation
page read and write
19F6F53B000
trusted library allocation
page read and write
19F6B29E000
trusted library allocation
page read and write
19F6F0E4000
trusted library allocation
page read and write
19F70F1B000
trusted library allocation
page read and write
19F6F00A000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F70ECD000
trusted library allocation
page read and write
1534000
heap
page read and write
19F76ABD000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6EEEB000
trusted library allocation
page read and write
19F6D4C8000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6F2E7000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
157D000
stack
page read and write
19F6496D000
heap
page read and write
19F6499A000
heap
page read and write
19F6EA9C000
trusted library allocation
page read and write
19F75D8C000
trusted library allocation
page read and write
24EE7AA2000
heap
page read and write
19F649A5000
heap
page read and write
19F6F58C000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6E1A6000
trusted library allocation
page read and write
29BB99C1000
trusted library allocation
page execute read
1DA31200000
heap
page read and write
19F6E490000
trusted library allocation
page read and write
19F70E26000
trusted library allocation
page read and write
19F6DC27000
trusted library allocation
page read and write
19F779F8000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F649A9000
heap
page read and write
1ACB3D00000
heap
page readonly
19F6F07E000
trusted library allocation
page read and write
19F70F6C000
trusted library allocation
page read and write
19F75C9A000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6492B000
heap
page read and write
19F70E13000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64974000
heap
page read and write
19F6D894000
trusted library allocation
page read and write
19F6E1A5000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6493E000
heap
page read and write
19F714DD000
trusted library allocation
page read and write
19F714D3000
trusted library allocation
page read and write
19F76A30000
trusted library allocation
page read and write
19F758C1000
trusted library allocation
page read and write
1DA31260000
heap
page read and write
19F6D4D6000
trusted library allocation
page read and write
19F76EE8000
heap
page read and write
19F75D7E000
trusted library allocation
page read and write
1ACB3C0E000
trusted library allocation
page read and write
19F75CBF000
trusted library allocation
page read and write
1ACB3C0C000
trusted library allocation
page read and write
19F70044000
trusted library allocation
page read and write
19F7B18D000
trusted library allocation
page read and write
19F7007C000
trusted library allocation
page read and write
19F7003E000
trusted library allocation
page read and write
19F64948000
heap
page read and write
19F64975000
heap
page read and write
19F712FB000
trusted library allocation
page read and write
19F6F9D3000
trusted library allocation
page read and write
19F64948000
heap
page read and write
19F75CC4000
trusted library allocation
page read and write
19F64959000
heap
page read and write
16F2000
heap
page read and write
19F76C2C000
trusted library allocation
page read and write
19F6F558000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F64961000
heap
page read and write
19F6492B000
heap
page read and write
19F6F9DD000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F6E48E000
trusted library allocation
page read and write
19F6F4BC000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
19F76E78000
heap
page read and write
19F6F1ED000
trusted library allocation
page read and write
19F75DF9000
trusted library allocation
page read and write
19F6F4AA000
trusted library allocation
page read and write
19F7C604000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F4B0000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F71146000
trusted library allocation
page read and write
19F6F4C7000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64941000
heap
page read and write
19F6497B000
heap
page read and write
19F6F4D4000
trusted library allocation
page read and write
19F6AAA5000
trusted library allocation
page read and write
19F758B5000
trusted library allocation
page read and write
19F7B066000
trusted library allocation
page read and write
19F75A7C000
trusted library allocation
page read and write
19F6E1A1000
trusted library allocation
page read and write
19F6E475000
trusted library allocation
page read and write
19F76911000
trusted library allocation
page read and write
19F75BFB000
trusted library allocation
page read and write
19F6B38E000
trusted library allocation
page read and write
19F711DF000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6DCCA000
trusted library allocation
page read and write
19F6EACA000
trusted library allocation
page read and write
19F6E417000
trusted library allocation
page read and write
19F7B15B000
trusted library allocation
page read and write
19F75FF0000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
19F64965000
heap
page read and write
19F64952000
heap
page read and write
19F7C43E000
trusted library allocation
page read and write
19F6EA8C000
trusted library allocation
page read and write
1DA30673000
trusted library allocation
page read and write
19F7AD7E000
trusted library allocation
page read and write
19F6F499000
trusted library allocation
page read and write
19F6D638000
trusted library allocation
page read and write
19F700B6000
trusted library allocation
page read and write
19F75D7E000
trusted library allocation
page read and write
19F6EED0000
trusted library allocation
page read and write
19F6EECE000
trusted library allocation
page read and write
19F6F4CD000
trusted library allocation
page read and write
19F70E57000
trusted library allocation
page read and write
19F6F55B000
trusted library allocation
page read and write
19F7B089000
trusted library allocation
page read and write
19F7B0CA000
trusted library allocation
page read and write
1DA303A0000
heap
page readonly
19F64944000
heap
page read and write
19F772A3000
trusted library allocation
page read and write
19F6F5AE000
trusted library allocation
page read and write
19F6F9E8000
trusted library allocation
page read and write
19F711BF000
trusted library allocation
page read and write
19F7A6A3000
trusted library allocation
page read and write
553D1FE000
stack
page read and write
19F64952000
heap
page read and write
19F6EA85000
trusted library allocation
page read and write
19F75C82000
trusted library allocation
page read and write
19F71193000
trusted library allocation
page read and write
19F6F48A000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F700DD000
trusted library allocation
page read and write
19F6D86A000
trusted library allocation
page read and write
19F6EEE1000
trusted library allocation
page read and write
19F6E418000
trusted library allocation
page read and write
19F7C42E000
trusted library allocation
page read and write
19F6EAC3000
trusted library allocation
page read and write
19F7C5F4000
trusted library allocation
page read and write
19F6D4F2000
trusted library allocation
page read and write
19F75CDA000
trusted library allocation
page read and write
19F6E40C000
trusted library allocation
page read and write
19F769CB000
trusted library allocation
page read and write
19F76995000
trusted library allocation
page read and write
19F7B167000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F75CDA000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6499A000
heap
page read and write
19F700B8000
trusted library allocation
page read and write
19F70F9C000
trusted library allocation
page read and write
114A3FF000
stack
page read and write
19F6F014000
trusted library allocation
page read and write
19F70E20000
trusted library allocation
page read and write
19F6F4DF000
trusted library allocation
page read and write
1DA303DA000
heap
page read and write
19F64999000
heap
page read and write
19F71124000
trusted library allocation
page read and write
19F7B075000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6499A000
heap
page read and write
19F64996000
heap
page read and write
19F6E480000
trusted library allocation
page read and write
19F6AAEF000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6E142000
trusted library allocation
page read and write
19F6F487000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F649AB000
heap
page read and write
19F6F5AE000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
19F76E00000
heap
page read and write
19F6D462000
trusted library allocation
page read and write
19F700B6000
trusted library allocation
page read and write
1DA31321000
heap
page read and write
19F75DE7000
trusted library allocation
page read and write
19F6E436000
trusted library allocation
page read and write
19F759AE000
trusted library allocation
page read and write
19F70083000
trusted library allocation
page read and write
19F6FEB3000
trusted library allocation
page read and write
19F7A7D6000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F7B1D5000
trusted library allocation
page read and write
19F6FE37000
trusted library allocation
page read and write
19F70FED000
trusted library allocation
page read and write
25456040000
unclassified section
page readonly
19F75932000
trusted library allocation
page read and write
19F7C5FE000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F6F5C0000
trusted library allocation
page read and write
19F6F998000
trusted library allocation
page read and write
19F75C04000
trusted library allocation
page read and write
19F75DE1000
trusted library allocation
page read and write
25456703000
trusted library allocation
page read and write
19F6AB19000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6492B000
heap
page read and write
19F7C63B000
trusted library allocation
page read and write
19F75D56000
trusted library allocation
page read and write
1DA31358000
heap
page read and write
1ACB3918000
remote allocation
page execute read
19F6FDA0000
trusted library allocation
page read and write
19F7A68F000
trusted library allocation
page read and write
1ACB400C000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
2545662E000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F6EED0000
trusted library allocation
page read and write
19F769C1000
trusted library allocation
page read and write
19F6F1FD000
trusted library allocation
page read and write
19F6F009000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6493E000
heap
page read and write
19F75B56000
trusted library allocation
page read and write
19F7BE00000
trusted library allocation
page read and write
19F70010000
trusted library allocation
page read and write
19F76927000
trusted library allocation
page read and write
19F7586B000
trusted library allocation
page read and write
19F6B288000
trusted library allocation
page read and write
19F6E4FC000
trusted library allocation
page read and write
19F77415000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F64955000
heap
page read and write
19F6F560000
trusted library allocation
page read and write
19F6D645000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6B3BE000
trusted library allocation
page read and write
19F6F5F4000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6F542000
trusted library allocation
page read and write
19F700D7000
trusted library allocation
page read and write
19F76CE9000
trusted library allocation
page read and write
19F70E4E000
trusted library allocation
page read and write
19F711C5000
trusted library allocation
page read and write
19F7B059000
trusted library allocation
page read and write
19F7C535000
trusted library allocation
page read and write
19F700C0000
trusted library allocation
page read and write
19F6F9BA000
trusted library allocation
page read and write
19F75C8B000
trusted library allocation
page read and write
553B9FE000
unkown
page readonly
19F6492B000
heap
page read and write
19F7694F000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F649A2000
heap
page read and write
19F6F9AA000
trusted library allocation
page read and write
19F6496C000
heap
page read and write
19F70F7D000
trusted library allocation
page read and write
19F6B15C000
heap
page read and write
19F6F093000
trusted library allocation
page read and write
1DA303C2000
unclassified section
page read and write
19F71133000
trusted library allocation
page read and write
19F7C5CF000
trusted library allocation
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F64940000
heap
page read and write
24EE7A00000
heap
page read and write
19F70E13000
trusted library allocation
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F7692C000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F76A59000
trusted library allocation
page read and write
19F6929E000
trusted library allocation
page read and write
1DA3065C000
trusted library allocation
page read and write
19F7694F000
trusted library allocation
page read and write
2D8833E000
stack
page read and write
19F6D64D000
trusted library allocation
page read and write
19F6F58C000
trusted library allocation
page read and write
5D297FF000
stack
page read and write
19F6495D000
heap
page read and write
19F75B6C000
trusted library allocation
page read and write
25456295000
heap
page read and write
19F6F0C4000
trusted library allocation
page read and write
1534000
heap
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F76E00000
heap
page read and write
19F7C40E000
trusted library allocation
page read and write
1ACB3C82000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F7C427000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6F0FA000
trusted library allocation
page read and write
19F71219000
trusted library allocation
page read and write
19F6EEE1000
trusted library allocation
page read and write
19F698F6000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6499C000
heap
page read and write
19F64999000
heap
page read and write
19F75CA3000
trusted library allocation
page read and write
19F6B12F000
heap
page read and write
19F70083000
trusted library allocation
page read and write
19F6D894000
trusted library allocation
page read and write
19F6E46D000
trusted library allocation
page read and write
19F6D430000
trusted library allocation
page read and write
19F76938000
trusted library allocation
page read and write
19F6EEAB000
trusted library allocation
page read and write
2545666E000
trusted library allocation
page read and write
19F6E17D000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6E1E4000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F712C7000
trusted library allocation
page read and write
19F758E5000
trusted library allocation
page read and write
1DA31201000
heap
page read and write
19F75D37000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F75CA3000
trusted library allocation
page read and write
19F6FD35000
trusted library allocation
page read and write
19F6FFD1000
trusted library allocation
page read and write
19F75DEE000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6D623000
trusted library allocation
page read and write
19F76CF9000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6D4BA000
trusted library allocation
page read and write
19F700C0000
trusted library allocation
page read and write
55396DD000
stack
page read and write
19F6EACA000
trusted library allocation
page read and write
19F75979000
trusted library allocation
page read and write
19F6D64D000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7A588000
trusted library allocation
page read and write
19F711F8000
trusted library allocation
page read and write
19F7A646000
trusted library allocation
page read and write
19F75CD1000
trusted library allocation
page read and write
19F69876000
trusted library allocation
page read and write
19F76E6A000
heap
page read and write
19F70FE5000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64969000
heap
page read and write
19F6E182000
trusted library allocation
page read and write
553B1FE000
stack
page read and write
19F6FCE1000
trusted library allocation
page read and write
19F6F1F4000
trusted library allocation
page read and write
19F6F53F000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6B381000
trusted library allocation
page read and write
19F6F072000
trusted library allocation
page read and write
19F6F0F5000
trusted library allocation
page read and write
19F75C06000
trusted library allocation
page read and write
19F6FE8F000
trusted library allocation
page read and write
19F6F9D3000
trusted library allocation
page read and write
19F75D5B000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6F485000
trusted library allocation
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F6F4BD000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F76CE5000
trusted library allocation
page read and write
CDFC45D000
stack
page read and write
19F64944000
heap
page read and write
2545665D000
trusted library allocation
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F6B374000
trusted library allocation
page read and write
19F7148F000
trusted library allocation
page read and write
1ACB3D10000
unclassified section
page read and write
19F692EF000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F64996000
heap
page read and write
19F711B3000
trusted library allocation
page read and write
19F76E02000
heap
page read and write
19F6F9E5000
trusted library allocation
page read and write
25456612000
trusted library allocation
page read and write
19F70FD6000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
24EE7A8D000
heap
page read and write
19F76C2B000
trusted library allocation
page read and write
19F711B3000
trusted library allocation
page read and write
19F64974000
heap
page read and write
1DA31358000
heap
page read and write
19F6F5B0000
trusted library allocation
page read and write
1DA30686000
trusted library allocation
page read and write
19F64943000
heap
page read and write
19F6FFAA000
trusted library allocation
page read and write
1D310C70000
heap
page read and write
19F6493E000
heap
page read and write
19F70E7E000
trusted library allocation
page read and write
19F6B0C3000
heap
page read and write
19F7A646000
trusted library allocation
page read and write
19F7C535000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F7116A000
trusted library allocation
page read and write
19F6EE97000
trusted library allocation
page read and write
25456190000
unclassified section
page read and write
19F75DF9000
trusted library allocation
page read and write
19F649AE000
heap
page read and write
19F6FFD1000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6497B000
heap
page read and write
16EA000
heap
page read and write
19F7C4EC000
trusted library allocation
page read and write
2545671C000
trusted library allocation
page read and write
19F7A69F000
trusted library allocation
page read and write
19F6B35D000
trusted library allocation
page read and write
19F7B0EB000
trusted library allocation
page read and write
19F6F290000
trusted library allocation
page read and write
19F70D56000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F75CA4000
trusted library allocation
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F6F4AA000
trusted library allocation
page read and write
19F6EAA5000
trusted library allocation
page read and write
1DA3127D000
heap
page read and write
19F6F4FA000
trusted library allocation
page read and write
19F76E5D000
heap
page read and write
19F75CF3000
trusted library allocation
page read and write
19F6F4F3000
trusted library allocation
page read and write
19F6B123000
heap
page read and write
19F75C9D000
trusted library allocation
page read and write
19F7B1CB000
trusted library allocation
page read and write
24EE966E000
heap
page read and write
19F649A2000
heap
page read and write
19F6496D000
heap
page read and write
19F6493E000
heap
page read and write
19F64946000
heap
page read and write
19F6AB0F000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F7A79D000
trusted library allocation
page read and write
19F649A3000
heap
page read and write
1DA30350000
heap
page read and write
19F64959000
heap
page read and write
19F7AFC1000
trusted library allocation
page read and write
5D28FFF000
stack
page read and write
19F6F47E000
trusted library allocation
page read and write
19F70048000
trusted library allocation
page read and write
19F7C547000
trusted library allocation
page read and write
19F75A6B000
trusted library allocation
page read and write
19F76DFC000
heap
page read and write
19F70FC1000
trusted library allocation
page read and write
1DA3133B000
heap
page read and write
19F6496F000
heap
page read and write
19F649CC000
heap
page read and write
19F64975000
heap
page read and write
1ACB3F07000
trusted library allocation
page read and write
19F7747C000
trusted library allocation
page read and write
19F6494D000
heap
page read and write
19F70FC1000
trusted library allocation
page read and write
19F6F072000
trusted library allocation
page read and write
19F6F560000
trusted library allocation
page read and write
19F71146000
trusted library allocation
page read and write
1DA312E8000
heap
page read and write
1DA31100000
trusted library allocation
page read and write
19F6F05C000
trusted library allocation
page read and write
1DA3126C000
heap
page read and write
19F64975000
heap
page read and write
19F70E32000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F758BF000
trusted library allocation
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6496F000
heap
page read and write
19F7B198000
trusted library allocation
page read and write
2D882BC000
stack
page read and write
1ACB3940000
heap
page read and write
19F7B1CF000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6F4BD000
trusted library allocation
page read and write
19F6496C000
heap
page read and write
19F64975000
heap
page read and write
19F64999000
heap
page read and write
19F649AE000
heap
page read and write
19F76E00000
heap
page read and write
19F6F53B000
trusted library allocation
page read and write
19F649CE000
heap
page read and write
19F6496F000
heap
page read and write
2545669E000
trusted library allocation
page read and write
19F6F55A000
trusted library allocation
page read and write
19F6DCD7000
trusted library allocation
page read and write
1DA31260000
heap
page read and write
19F71133000
trusted library allocation
page read and write
19F71459000
trusted library allocation
page read and write
19F69926000
trusted library allocation
page read and write
19F6F5F8000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F76ABD000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F64952000
heap
page read and write
19F77474000
trusted library allocation
page read and write
25456130000
heap
page read and write
D04000
unkown
page readonly
19F6496D000
heap
page read and write
19F75BB7000
trusted library allocation
page read and write
19F64952000
heap
page read and write
16F4000
heap
page read and write
19F71197000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F64976000
heap
page read and write
19F64975000
heap
page read and write
19F6496D000
heap
page read and write
1DA3110B000
trusted library allocation
page read and write
19F6FF31000
trusted library allocation
page read and write
19F64946000
heap
page read and write
1DA306C7000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F7B15F000
trusted library allocation
page read and write
19F6B3BB000
trusted library allocation
page read and write
375607A03000
trusted library allocation
page read and write
19F700B8000
trusted library allocation
page read and write
19F711D0000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F759AC000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F7A612000
trusted library allocation
page read and write
19F769F2000
trusted library allocation
page read and write
1534000
heap
page read and write
19F649B6000
heap
page read and write
19F70D5D000
trusted library allocation
page read and write
19F64965000
heap
page read and write
19F75C91000
trusted library allocation
page read and write
19F75FA8000
trusted library allocation
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F64961000
heap
page read and write
19F6F581000
trusted library allocation
page read and write
16DF000
heap
page read and write
19F75973000
trusted library allocation
page read and write
19F77476000
trusted library allocation
page read and write
19F7C57F000
trusted library allocation
page read and write
19F6F465000
trusted library allocation
page read and write
19F6F4F1000
trusted library allocation
page read and write
19F6E42E000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6495F000
heap
page read and write
16F0000
heap
page read and write
19F6AC25000
trusted library allocation
page read and write
19F6D89A000
trusted library allocation
page read and write
19F75CCD000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64974000
heap
page read and write
19F6ABB0000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6B29E000
trusted library allocation
page read and write
19F70FD6000
trusted library allocation
page read and write
19F70D5C000
trusted library allocation
page read and write
19F711F8000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F6F5B0000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
1DA3124D000
heap
page read and write
19F76DF5000
heap
page read and write
19F692C0000
trusted library allocation
page read and write
19F6D8B3000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F700BC000
trusted library allocation
page read and write
1534000
heap
page read and write
19F75F7F000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F75916000
trusted library allocation
page read and write
19F6AB94000
trusted library allocation
page read and write
19F6ABEB000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F7C5C0000
trusted library allocation
page read and write
19F714BC000
trusted library allocation
page read and write
19F6F5C4000
trusted library allocation
page read and write
19F76E49000
heap
page read and write
19F6F2CD000
trusted library allocation
page read and write
19F64939000
heap
page read and write
19F7B016000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F6496D000
heap
page read and write
19F75DF9000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F649CB000
heap
page read and write
1ACB3CB0000
trusted library allocation
page read and write
19F6F4FD000
trusted library allocation
page read and write
19F7C50B000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6EE97000
trusted library allocation
page read and write
19F7A7CF000
trusted library allocation
page read and write
19F6FF5F000
trusted library allocation
page read and write
19F6AB78000
trusted library allocation
page read and write
19F64946000
heap
page read and write
19F76988000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6F02A000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F6B3D2000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6493E000
heap
page read and write
19F6F465000
trusted library allocation
page read and write
19F75BB9000
trusted library allocation
page read and write
19F6F4BF000
trusted library allocation
page read and write
24EE7EB0000
heap
page read and write
19F75CCD000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F76973000
trusted library allocation
page read and write
19F6B3C5000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6499A000
heap
page read and write
19F6EEE3000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F77483000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F64924000
heap
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F6EEE4000
trusted library allocation
page read and write
19F6E66F000
trusted library allocation
page read and write
CF2000
unkown
page readonly
19F7145D000
trusted library allocation
page read and write
25456260000
heap
page read and write
19F774C3000
trusted library allocation
page read and write
2545671A000
trusted library allocation
page read and write
19F75C04000
trusted library allocation
page read and write
19F64996000
heap
page read and write
1680000
heap
page read and write
19F64996000
heap
page read and write
19F76E4C000
heap
page read and write
19F6494E000
heap
page read and write
19F7A5E8000
trusted library allocation
page read and write
19F75C98000
trusted library allocation
page read and write
19F711FD000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F649AB000
heap
page read and write
19F70FD2000
trusted library allocation
page read and write
19F700D7000
trusted library allocation
page read and write
19F76E98000
heap
page read and write
19F6499C000
heap
page read and write
254560F0000
heap
page read and write
19F64959000
heap
page read and write
19F649A2000
heap
page read and write
19F6B3AE000
trusted library allocation
page read and write
19F77474000
trusted library allocation
page read and write
1DA312F2000
heap
page read and write
19F6F47C000
trusted library allocation
page read and write
19F6B3C9000
trusted library allocation
page read and write
19F6EAA2000
trusted library allocation
page read and write
19F76CF0000
trusted library allocation
page read and write
19F6FF21000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64996000
heap
page read and write
19F7A69F000
trusted library allocation
page read and write
1DA31260000
heap
page read and write
19F64949000
heap
page read and write
19F64975000
heap
page read and write
1DA306C4000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F7C55B000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6494F000
heap
page read and write
19F6D878000
trusted library allocation
page read and write
19F64967000
heap
page read and write
19F7B046000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F64971000
heap
page read and write
19F75A24000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F758EB000
trusted library allocation
page read and write
19F7743D000
trusted library allocation
page read and write
19F6F582000
trusted library allocation
page read and write
19F6F487000
trusted library allocation
page read and write
19F75AF3000
trusted library allocation
page read and write
19F76CC3000
trusted library allocation
page read and write
19F70FC4000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F70EA1000
trusted library allocation
page read and write
19F6E40A000
trusted library allocation
page read and write
19F6B385000
trusted library allocation
page read and write
19F6F2DA000
trusted library allocation
page read and write
19F712A4000
trusted library allocation
page read and write
19F6B280000
trusted library allocation
page read and write
19F7C661000
trusted library allocation
page read and write
19F76CC3000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F7596B000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F64996000
heap
page read and write
19F700F9000
trusted library allocation
page read and write
19F76EE0000
heap
page read and write
1ACB399A000
heap
page read and write
19F64944000
heap
page read and write
19F692B3000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64940000
heap
page read and write
19F6997D000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F75D8A000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F6D64E000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F64944000
heap
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F75D90000
trusted library allocation
page read and write
19F76937000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6495D000
heap
page read and write
19F64924000
heap
page read and write
19F6F9A7000
trusted library allocation
page read and write
19F6F990000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6B3CE000
trusted library allocation
page read and write
19F64923000
heap
page read and write
19F64979000
heap
page read and write
19F6496D000
heap
page read and write
19F77423000
trusted library allocation
page read and write
19F6B385000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6B2CE000
trusted library allocation
page read and write
19F75995000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F7692C000
trusted library allocation
page read and write
19F6E679000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F7C5C0000
trusted library allocation
page read and write
19F6F2DD000
trusted library allocation
page read and write
553979E000
unkown
page readonly
19F6496F000
heap
page read and write
19F70F8F000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F64952000
heap
page read and write
19F7C4EC000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6499A000
heap
page read and write
24EE967C000
heap
page read and write
19F76AB4000
trusted library allocation
page read and write
19F6D871000
trusted library allocation
page read and write
19F6493C000
heap
page read and write
19F6FFCB000
trusted library allocation
page read and write
19F64970000
heap
page read and write
19F6495F000
heap
page read and write
19F6D650000
trusted library allocation
page read and write
19F7A646000
trusted library allocation
page read and write
19F75C04000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6495D000
heap
page read and write
19F7BC00000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6496D000
heap
page read and write
19F76A4D000
trusted library allocation
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F759F0000
trusted library allocation
page read and write
19F6D86A000
trusted library allocation
page read and write
19F6E1A0000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F649A2000
heap
page read and write
19F64952000
heap
page read and write
19F6F4CD000
trusted library allocation
page read and write
19F75CD1000
trusted library allocation
page read and write
CDFC49E000
unkown
page readonly
19F6F4BC000
trusted library allocation
page read and write
19F7118E000
trusted library allocation
page read and write
19F6AB0D000
trusted library allocation
page read and write
19F6B347000
trusted library allocation
page read and write
1DA30679000
trusted library allocation
page read and write
19F6F97B000
trusted library allocation
page read and write
19F692C6000
trusted library allocation
page read and write
19F6B391000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F711A2000
trusted library allocation
page read and write
19F70FED000
trusted library allocation
page read and write
19F6D462000
trusted library allocation
page read and write
1DA312B9000
heap
page read and write
19F6B3BB000
trusted library allocation
page read and write
19F7C469000
trusted library allocation
page read and write
19F6FF67000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F649A2000
heap
page read and write
19F6F562000
trusted library allocation
page read and write
19F6AAC5000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
1DA3128A000
heap
page read and write
13DB000
stack
page read and write
19F7A537000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F7B13F000
trusted library allocation
page read and write
19F64969000
heap
page read and write
1DA30240000
heap
page read and write
19F7C5D6000
trusted library allocation
page read and write
1DA3128D000
heap
page read and write
19F7C43B000
trusted library allocation
page read and write
254566C8000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F6F587000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
19F64961000
heap
page read and write
19F649AB000
heap
page read and write
19F6495C000
heap
page read and write
1DA30220000
unclassified section
page readonly
19F649A2000
heap
page read and write
19F64975000
heap
page read and write
19F700BA000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F64934000
heap
page read and write
19F7A663000
trusted library allocation
page read and write
19F7B081000
trusted library allocation
page read and write
19F7C5E4000
trusted library allocation
page read and write
19F649A9000
heap
page read and write
19F700DD000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F70FD6000
trusted library allocation
page read and write
19F6F2AC000
trusted library allocation
page read and write
1DA30700000
trusted library section
page readonly
19F759B0000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F649A2000
heap
page read and write
19F7C5C0000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F70083000
trusted library allocation
page read and write
1DA3127D000
heap
page read and write
19F64971000
heap
page read and write
19F7A667000
trusted library allocation
page read and write
19F75B64000
trusted library allocation
page read and write
19F6F487000
trusted library allocation
page read and write
25456665000
trusted library allocation
page read and write
19F64949000
heap
page read and write
19F7B161000
trusted library allocation
page read and write
19F70FC1000
trusted library allocation
page read and write
1DA31377000
heap
page read and write
19F6494B000
heap
page read and write
25456800000
heap
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F6F2F0000
trusted library allocation
page read and write
19F6EEBD000
trusted library allocation
page read and write
19F6F4B2000
trusted library allocation
page read and write
19F6FD91000
trusted library allocation
page read and write
19F6AB16000
trusted library allocation
page read and write
19F6B28A000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F4F1000
trusted library allocation
page read and write
19F758F1000
trusted library allocation
page read and write
19F64961000
heap
page read and write
1D311007000
trusted library allocation
page read and write
1410000
heap
page read and write
19F64996000
heap
page read and write
19F6F570000
trusted library allocation
page read and write
19F75A0F000
trusted library allocation
page read and write
19F6E42F000
trusted library allocation
page read and write
19F6F595000
trusted library allocation
page read and write
19F6D878000
trusted library allocation
page read and write
16E6000
heap
page read and write
19F6494E000
heap
page read and write
19F7595F000
trusted library allocation
page read and write
19F7A65A000
trusted library allocation
page read and write
19F70076000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
2D869D8000
stack
page read and write
19F700EE000
trusted library allocation
page read and write
19F7596F000
trusted library allocation
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F64959000
heap
page read and write
19F6F084000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F64945000
heap
page read and write
19F711FB000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6493A000
heap
page read and write
19F6E1AA000
trusted library allocation
page read and write
19F7B0A7000
trusted library allocation
page read and write
19F64999000
heap
page read and write
1DA3126C000
heap
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6ABF2000
trusted library allocation
page read and write
1DA31358000
heap
page read and write
19F6F542000
trusted library allocation
page read and write
19F7C57F000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F6F4CD000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6B13C000
heap
page read and write
19F6F98F000
trusted library allocation
page read and write
19F7C5CF000
trusted library allocation
page read and write
19F712D4000
trusted library allocation
page read and write
19F7C52D000
trusted library allocation
page read and write
19F6F084000
trusted library allocation
page read and write
19F6B3BB000
trusted library allocation
page read and write
19F7C5E4000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F64961000
heap
page read and write
19F769DA000
trusted library allocation
page read and write
19F6E6EC000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64975000
heap
page read and write
19F7111F000
trusted library allocation
page read and write
19F75C29000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F69966000
trusted library allocation
page read and write
19F6F4F8000
trusted library allocation
page read and write
1DA306BA000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6496F000
heap
page read and write
19F64949000
heap
page read and write
19F6F4B0000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F711BF000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6F028000
trusted library allocation
page read and write
19F6F44D000
trusted library allocation
page read and write
19F76CF5000
trusted library allocation
page read and write
19F711C7000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F75D4E000
trusted library allocation
page read and write
19F6F4D7000
trusted library allocation
page read and write
19F649AE000
heap
page read and write
19F6D8B3000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F6F5D0000
trusted library allocation
page read and write
19F7743D000
trusted library allocation
page read and write
19F70FBE000
trusted library allocation
page read and write
19F70066000
trusted library allocation
page read and write
19F6E1E4000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F7B05C000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F7A6C3000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6492B000
heap
page read and write
19F6F4DB000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6F9C9000
trusted library allocation
page read and write
19F64999000
heap
page read and write
1F731291E000
trusted library allocation
page read and write
19F76A3D000
trusted library allocation
page read and write
19F70F5C000
trusted library allocation
page read and write
1DA312E9000
heap
page read and write
19F6AAB7000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F64924000
heap
page read and write
19F7B1D1000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F64952000
heap
page read and write
19F64999000
heap
page read and write
19F6F006000
trusted library allocation
page read and write
3F31000
heap
page read and write
19F64959000
heap
page read and write
19F6F4BF000
trusted library allocation
page read and write
19F64948000
heap
page read and write
19F64952000
heap
page read and write
19F64946000
heap
page read and write
19F64952000
heap
page read and write
254561C3000
heap
page read and write
19F7A64E000
trusted library allocation
page read and write
19F7C5F4000
trusted library allocation
page read and write
19F75DFB000
trusted library allocation
page read and write
24EE9780000
heap
page read and write
16F2000
heap
page read and write
19F6F2DF000
trusted library allocation
page read and write
19F75DF7000
trusted library allocation
page read and write
19F7AD78000
trusted library allocation
page read and write
19F6F24A000
trusted library allocation
page read and write
19F6E459000
trusted library allocation
page read and write
19F6B133000
heap
page read and write
19F64999000
heap
page read and write
DA9000
stack
page read and write
1DA31269000
heap
page read and write
19F6EA8C000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F70F0C000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6496D000
heap
page read and write
19F76946000
trusted library allocation
page read and write
19F70D61000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7AFFC000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F7B0B2000
trusted library allocation
page read and write
19F6EEF3000
trusted library allocation
page read and write
19F6E40A000
trusted library allocation
page read and write
19F700B0000
trusted library allocation
page read and write
19F6F0AB000
trusted library allocation
page read and write
19F70EC9000
trusted library allocation
page read and write
19F64965000
heap
page read and write
19F64944000
heap
page read and write
19F7A66B000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F711DB000
trusted library allocation
page read and write
19F6F490000
trusted library allocation
page read and write
19F64971000
heap
page read and write
1DA3127F000
heap
page read and write
19F6F4AE000
trusted library allocation
page read and write
19F712FB000
trusted library allocation
page read and write
19F711B9000
trusted library allocation
page read and write
19F7B0B5000
trusted library allocation
page read and write
19F6F057000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F6EE8B000
trusted library allocation
page read and write
1ACB3990000
heap
page read and write
19F6E677000
trusted library allocation
page read and write
19F75D54000
trusted library allocation
page read and write
1ACB3CF6000
trusted library allocation
page read and write
19F70021000
trusted library allocation
page read and write
19F70E1B000
trusted library allocation
page read and write
19F700C0000
trusted library allocation
page read and write
19F649CE000
heap
page read and write
19F6D4DB000
trusted library allocation
page read and write
1DA30600000
trusted library allocation
page read and write
1ACB3CA2000
trusted library allocation
page read and write
19F71265000
trusted library allocation
page read and write
19F6E1A3000
trusted library allocation
page read and write
19F7596F000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F75951000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F75C9D000
trusted library allocation
page read and write
19F711CD000
trusted library allocation
page read and write
CD80FFE000
unkown
page readonly
19F6DCC5000
trusted library allocation
page read and write
19F6F26E000
trusted library allocation
page read and write
19F6D89A000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F6B378000
trusted library allocation
page read and write
19F76C42000
trusted library allocation
page read and write
1DA312E8000
heap
page read and write
19F64924000
heap
page read and write
19F75C20000
trusted library allocation
page read and write
19F6F4D9000
trusted library allocation
page read and write
19F6D462000
trusted library allocation
page read and write
19F7C557000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F76940000
trusted library allocation
page read and write
19F6B34B000
trusted library allocation
page read and write
19F6F493000
trusted library allocation
page read and write
1DA30612000
trusted library allocation
page read and write
19F71143000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F70FED000
trusted library allocation
page read and write
19F7B01D000
trusted library allocation
page read and write
19F70E3E000
trusted library allocation
page read and write
19F759A6000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F7598E000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6EABA000
trusted library allocation
page read and write
1ACB3C8F000
trusted library allocation
page read and write
19F64999000
heap
page read and write
2545667B000
trusted library allocation
page read and write
19F7B0A4000
trusted library allocation
page read and write
19F6AC22000
trusted library allocation
page read and write
19F6D8AC000
trusted library allocation
page read and write
19F6F465000
trusted library allocation
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F6F44A000
trusted library allocation
page read and write
1DA3065F000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F7C5FE000
trusted library allocation
page read and write
19F6D884000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6B3BE000
trusted library allocation
page read and write
19F759FB000
trusted library allocation
page read and write
19F76E00000
heap
page read and write
19F7743D000
trusted library allocation
page read and write
19F7A7FE000
trusted library allocation
page read and write
19F70F2C000
trusted library allocation
page read and write
19F75C99000
trusted library allocation
page read and write
19F7B14C000
trusted library allocation
page read and write
19F6DCC8000
trusted library allocation
page read and write
19F649AE000
heap
page read and write
2545670C000
trusted library allocation
page read and write
19F7B101000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F75BA7000
trusted library allocation
page read and write
19F712FD000
trusted library allocation
page read and write
19F649B6000
heap
page read and write
19F75A0B000
trusted library allocation
page read and write
19F6D6F4000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
2545671F000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F70DF8000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
1D310D50000
heap
page read and write
19F6493C000
heap
page read and write
19F7B018000
trusted library allocation
page read and write
19F75DF1000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6B136000
heap
page read and write
19F6E6B3000
trusted library allocation
page read and write
19F7A663000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F692DF000
trusted library allocation
page read and write
1DA312EF000
heap
page read and write
19F64935000
heap
page read and write
19F700BA000
trusted library allocation
page read and write
19F7C517000
trusted library allocation
page read and write
19F70E38000
trusted library allocation
page read and write
19F77476000
trusted library allocation
page read and write
19F6F218000
trusted library allocation
page read and write
19F64979000
heap
page read and write
114A3FC000
stack
page read and write
19F7692F000
trusted library allocation
page read and write
19F6D884000
trusted library allocation
page read and write
19F64951000
heap
page read and write
19F7A62D000
trusted library allocation
page read and write
1534000
heap
page read and write
19F6EEDF000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F769D0000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6EAA2000
trusted library allocation
page read and write
19F6B39A000
trusted library allocation
page read and write
19F6F595000
trusted library allocation
page read and write
19F712C3000
trusted library allocation
page read and write
19F7C66A000
trusted library allocation
page read and write
1DA31359000
heap
page read and write
19F70EC6000
trusted library allocation
page read and write
19F75D4A000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F6F9DD000
trusted library allocation
page read and write
19F6F998000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F7A621000
trusted library allocation
page read and write
19F6B386000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F75F97000
trusted library allocation
page read and write
19F75F73000
trusted library allocation
page read and write
19F64954000
heap
page read and write
19F6499C000
heap
page read and write
19F7A65F000
trusted library allocation
page read and write
19F7C683000
trusted library allocation
page read and write
19F6D658000
trusted library allocation
page read and write
19F6E14A000
trusted library allocation
page read and write
29BB9A21000
trusted library allocation
page execute read
19F64971000
heap
page read and write
1534000
heap
page read and write
19F6A8E2000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6B3C4000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F6F4B9000
trusted library allocation
page read and write
19F71143000
trusted library allocation
page read and write
19F76A39000
trusted library allocation
page read and write
19F75CEA000
trusted library allocation
page read and write
CD807FE000
stack
page read and write
19F6E436000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F76CEF000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6E46D000
trusted library allocation
page read and write
19F70F44000
trusted library allocation
page read and write
19F75DD3000
trusted library allocation
page read and write
19F64947000
heap
page read and write
19F75C8A000
trusted library allocation
page read and write
19F76C23000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F7007C000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F7C57C000
trusted library allocation
page read and write
19F6493C000
heap
page read and write
19F711D0000
trusted library allocation
page read and write
19F75C8A000
trusted library allocation
page read and write
19F6F99A000
trusted library allocation
page read and write
19F70EDD000
trusted library allocation
page read and write
19F6F2EC000
trusted library allocation
page read and write
19F6E1AD000
trusted library allocation
page read and write
19F71493000
trusted library allocation
page read and write
19F64925000
heap
page read and write
19F7B1B1000
trusted library allocation
page read and write
19F6F4C4000
trusted library allocation
page read and write
19F70066000
trusted library allocation
page read and write
19F6FDB5000
trusted library allocation
page read and write
19F6B3BB000
trusted library allocation
page read and write
19F75C8A000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6E4B8000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F6F44C000
trusted library allocation
page read and write
19F6E1A8000
trusted library allocation
page read and write
19F75887000
trusted library allocation
page read and write
19F76E35000
heap
page read and write
19F64944000
heap
page read and write
19F6F53B000
trusted library allocation
page read and write
19F70FC4000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6FD30000
trusted library allocation
page read and write
19F7A7FA000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6E454000
trusted library allocation
page read and write
19F7B134000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F64999000
heap
page read and write
19F64975000
heap
page read and write
19F6DCFC000
trusted library allocation
page read and write
19F7C517000
trusted library allocation
page read and write
19F6E4FC000
trusted library allocation
page read and write
19F759A8000
trusted library allocation
page read and write
19F6D4C8000
trusted library allocation
page read and write
19F75C23000
trusted library allocation
page read and write
19F76E00000
heap
page read and write
19F70066000
trusted library allocation
page read and write
19F6EA8C000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6E1F2000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6B34E000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
1ACB3C78000
trusted library allocation
page read and write
19F6EECE000
trusted library allocation
page read and write
19F700BC000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F75BC1000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F6F542000
trusted library allocation
page read and write
13EF000
stack
page read and write
19F64952000
heap
page read and write
19F700FD000
trusted library allocation
page read and write
19F6B360000
trusted library allocation
page read and write
19F76990000
trusted library allocation
page read and write
19F6EEA3000
trusted library allocation
page read and write
19F6D676000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6E6D8000
trusted library allocation
page read and write
19F70F9C000
trusted library allocation
page read and write
19F6F0EB000
trusted library allocation
page read and write
25456698000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F490000
trusted library allocation
page read and write
19F75CC4000
trusted library allocation
page read and write
19F6F48A000
trusted library allocation
page read and write
19F7A6C3000
trusted library allocation
page read and write
19F6F0C4000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F714D7000
trusted library allocation
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F71173000
trusted library allocation
page read and write
19F7A667000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F7C4CF000
trusted library allocation
page read and write
19F64974000
heap
page read and write
24EE967A000
heap
page read and write
13CF000
stack
page read and write
19F6493A000
heap
page read and write
19F71220000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F70FE8000
trusted library allocation
page read and write
19F6F29A000
trusted library allocation
page read and write
19F6D878000
trusted library allocation
page read and write
19F6F9FE000
trusted library allocation
page read and write
19F6F4F8000
trusted library allocation
page read and write
19F6FE7E000
trusted library allocation
page read and write
19F76C2B000
trusted library allocation
page read and write
16E8000
heap
page read and write
1DA30614000
trusted library allocation
page read and write
19F714D5000
trusted library allocation
page read and write
19F7B0A2000
trusted library allocation
page read and write
19F6E6EF000
trusted library allocation
page read and write
19F769A8000
trusted library allocation
page read and write
19F75ABE000
trusted library allocation
page read and write
19F711C7000
trusted library allocation
page read and write
19F6E1AF000
trusted library allocation
page read and write
19F6E1A8000
trusted library allocation
page read and write
19F6E4B4000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64940000
heap
page read and write
19F64934000
heap
page read and write
19F6FF6D000
trusted library allocation
page read and write
19F75D44000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F64944000
heap
page read and write
19F76955000
trusted library allocation
page read and write
19F6E483000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6F983000
trusted library allocation
page read and write
19F6B0E1000
heap
page read and write
19F711A0000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F70F9C000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F75C7C000
trusted library allocation
page read and write
19F6F9A1000
trusted library allocation
page read and write
19F70F4D000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
1DA3136E000
heap
page read and write
19F6FF93000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6EEEB000
trusted library allocation
page read and write
19F6F081000
trusted library allocation
page read and write
19F75999000
trusted library allocation
page read and write
19F6B2CE000
trusted library allocation
page read and write
1DA312E3000
heap
page read and write
19F75A11000
trusted library allocation
page read and write
19F6FFEA000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F7B0B1000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F7A6C3000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6E4C1000
trusted library allocation
page read and write
19F6F4CD000
trusted library allocation
page read and write
19F75B72000
trusted library allocation
page read and write
19F6EAFB000
trusted library allocation
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F6D650000
trusted library allocation
page read and write
19F6D88A000
trusted library allocation
page read and write
19F75C91000
trusted library allocation
page read and write
19F7A64A000
trusted library allocation
page read and write
19F6B12F000
heap
page read and write
19F6E6C3000
trusted library allocation
page read and write
19F7A58C000
trusted library allocation
page read and write
19F649AE000
heap
page read and write
19F6FCC7000
trusted library allocation
page read and write
1DA3132A000
heap
page read and write
19F6F9C7000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F6B262000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F64944000
heap
page read and write
19F6F268000
trusted library allocation
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F6496C000
heap
page read and write
19F6EACA000
trusted library allocation
page read and write
19F70FE5000
trusted library allocation
page read and write
19F6FFE2000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7C5CF000
trusted library allocation
page read and write
19F6E1A1000
trusted library allocation
page read and write
19F70E46000
trusted library allocation
page read and write
19F7B1C9000
trusted library allocation
page read and write
19F6E40A000
trusted library allocation
page read and write
19F6B125000
heap
page read and write
19F64940000
heap
page read and write
19F64996000
heap
page read and write
19F75AD6000
trusted library allocation
page read and write
19F7A7C9000
trusted library allocation
page read and write
19F6E4F3000
trusted library allocation
page read and write
19F75DD7000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F9BA000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6492B000
heap
page read and write
19F6FD33000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6D4D2000
trusted library allocation
page read and write
19F6B3CC000
trusted library allocation
page read and write
19F75D42000
trusted library allocation
page read and write
19F7A53C000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F6EE9A000
trusted library allocation
page read and write
19F6B34F000
trusted library allocation
page read and write
19F6F47E000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F75C06000
trusted library allocation
page read and write
19F6B15C000
heap
page read and write
19F76C42000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6493A000
heap
page read and write
19F6F4CD000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F75B4F000
trusted library allocation
page read and write
1DA31263000
heap
page read and write
19F7692B000
trusted library allocation
page read and write
19F76955000
trusted library allocation
page read and write
19F64943000
heap
page read and write
19F77263000
trusted library allocation
page read and write
19F6B39C000
trusted library allocation
page read and write
19F75BB7000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6495D000
heap
page read and write
19F711B3000
trusted library allocation
page read and write
19F76924000
trusted library allocation
page read and write
19F6F1F8000
trusted library allocation
page read and write
19F6F9CD000
trusted library allocation
page read and write
19F70FA2000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6496F000
heap
page read and write
19F714D9000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F75DE1000
trusted library allocation
page read and write
19F64951000
heap
page read and write
19F6F4A8000
trusted library allocation
page read and write
1DA312F1000
heap
page read and write
2D8823B000
stack
page read and write
19F6496F000
heap
page read and write
19F7B0F8000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6D405000
trusted library allocation
page read and write
19F70FC1000
trusted library allocation
page read and write
19F76937000
trusted library allocation
page read and write
24EE7EB5000
heap
page read and write
19F7C5E4000
trusted library allocation
page read and write
19F6F5F8000
trusted library allocation
page read and write
19F70DF9000
trusted library allocation
page read and write
254560CF000
remote allocation
page execute read
19F64969000
heap
page read and write
1DA312E3000
heap
page read and write
19F75AC5000
trusted library allocation
page read and write
19F70DA7000
trusted library allocation
page read and write
19F6F485000
trusted library allocation
page read and write
19F64922000
heap
page read and write
19F6495B000
heap
page read and write
1ACB3C03000
trusted library allocation
page read and write
25456603000
trusted library allocation
page read and write
19F6F5C4000
trusted library allocation
page read and write
19F70FD2000
trusted library allocation
page read and write
19F6F45A000
trusted library allocation
page read and write
19F700B6000
trusted library allocation
page read and write
19F7C57C000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F6FFEF000
trusted library allocation
page read and write
19F649A3000
heap
page read and write
19F6F57A000
trusted library allocation
page read and write
19F7C5E4000
trusted library allocation
page read and write
1DA31344000
heap
page read and write
254561D0000
unclassified section
page readonly
19F6D8F3000
trusted library allocation
page read and write
19F64965000
heap
page read and write
19F6499C000
heap
page read and write
19F7596B000
trusted library allocation
page read and write
19F769CB000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F7A5E8000
trusted library allocation
page read and write
19F6AB96000
trusted library allocation
page read and write
19F6FCFE000
trusted library allocation
page read and write
19F77471000
trusted library allocation
page read and write
19F7004D000
trusted library allocation
page read and write
19F75A19000
trusted library allocation
page read and write
25456806000
heap
page read and write
19F6496F000
heap
page read and write
19F76E8A000
heap
page read and write
1DA312FD000
heap
page read and write
19F64948000
heap
page read and write
19F6AA78000
trusted library allocation
page read and write
CDFF87E000
stack
page read and write
19F6493E000
heap
page read and write
19F714DD000
trusted library allocation
page read and write
19F6F98F000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6FD61000
trusted library allocation
page read and write
19F7A72E000
trusted library allocation
page read and write
19F75A11000
trusted library allocation
page read and write
1DA31377000
heap
page read and write
19F64975000
heap
page read and write
19F6496D000
heap
page read and write
1DA31321000
heap
page read and write
19F7148F000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F700D7000
trusted library allocation
page read and write
25456647000
trusted library allocation
page read and write
1534000
heap
page read and write
1ACB3C69000
trusted library allocation
page read and write
19F64959000
heap
page read and write
24EE7AA0000
heap
page read and write
19F700DD000
trusted library allocation
page read and write
19F6F090000
trusted library allocation
page read and write
19F769DA000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F6495D000
heap
page read and write
19F711B3000
trusted library allocation
page read and write
19F70D7A000
trusted library allocation
page read and write
19F6F560000
trusted library allocation
page read and write
19F7AD71000
trusted library allocation
page read and write
1DA3136E000
heap
page read and write
19F77420000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6A8D9000
trusted library allocation
page read and write
19F6493D000
heap
page read and write
19F75C52000
trusted library allocation
page read and write
CDFC51B000
stack
page read and write
25456660000
trusted library allocation
page read and write
19F71136000
trusted library allocation
page read and write
19F6F08B000
trusted library allocation
page read and write
19F75C16000
trusted library allocation
page read and write
19F6EACD000
trusted library allocation
page read and write
1DA3133B000
heap
page read and write
19F64962000
heap
page read and write
19F6E1A8000
trusted library allocation
page read and write
19F649B6000
heap
page read and write
19F6F5BB000
trusted library allocation
page read and write
19F75DF7000
trusted library allocation
page read and write
19F6B133000
heap
page read and write
19F6E474000
trusted library allocation
page read and write
19F76A3E000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6EED4000
trusted library allocation
page read and write
19F7A65A000
trusted library allocation
page read and write
19F76CF0000
trusted library allocation
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F6E1E4000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6496F000
heap
page read and write
19F64975000
heap
page read and write
19F64944000
heap
page read and write
19F64974000
heap
page read and write
19F6496F000
heap
page read and write
19F6E48E000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6A8ED000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F7A5F4000
trusted library allocation
page read and write
19F6F48A000
trusted library allocation
page read and write
19F649D3000
heap
page read and write
19F64975000
heap
page read and write
19F6F4AE000
trusted library allocation
page read and write
19F76947000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6E6F9000
trusted library allocation
page read and write
19F6F2BE000
trusted library allocation
page read and write
19F6E63C000
trusted library allocation
page read and write
19F75C1C000
trusted library allocation
page read and write
1ACB3C7B000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6E6D4000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6EEAF000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F649AB000
heap
page read and write
2D88BFE000
stack
page read and write
19F7C522000
trusted library allocation
page read and write
19F6F583000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6F4F7000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64954000
heap
page read and write
19F6FFFA000
trusted library allocation
page read and write
19F7A5A7000
trusted library allocation
page read and write
16E6000
heap
page read and write
19F649A4000
heap
page read and write
19F76ACE000
trusted library allocation
page read and write
19F70011000
trusted library allocation
page read and write
19F7A100000
trusted library allocation
page read and write
19F75FD9000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F649A3000
heap
page read and write
2545665B000
trusted library allocation
page read and write
19F6F474000
trusted library allocation
page read and write
19F6F9B8000
trusted library allocation
page read and write
19F6F462000
trusted library allocation
page read and write
19F70095000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F77476000
trusted library allocation
page read and write
1707000
heap
page read and write
19F6496F000
heap
page read and write
19F64959000
heap
page read and write
19F64996000
heap
page read and write
19F64971000
heap
page read and write
19F7A7B4000
trusted library allocation
page read and write
19F6D884000
trusted library allocation
page read and write
19F6495B000
heap
page read and write
19F6B37A000
trusted library allocation
page read and write
1D310DF7000
heap
page read and write
19F6F4BC000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6F4F1000
trusted library allocation
page read and write
19F700D8000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
19F71143000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F69913000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F75DFB000
trusted library allocation
page read and write
19F6F4C4000
trusted library allocation
page read and write
19F6B0D4000
heap
page read and write
19F70095000
trusted library allocation
page read and write
19F6F4BF000
trusted library allocation
page read and write
19F715C3000
trusted library allocation
page read and write
19F64947000
heap
page read and write
19F64951000
heap
page read and write
19F6493D000
heap
page read and write
19F70E20000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6496D000
heap
page read and write
19F649A2000
heap
page read and write
19F75CF8000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F7A69F000
trusted library allocation
page read and write
19F6B376000
trusted library allocation
page read and write
19F75D3E000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F649AE000
heap
page read and write
1DA312E9000
heap
page read and write
19F64959000
heap
page read and write
D00000
unkown
page write copy
19F64920000
heap
page read and write
19F7699C000
trusted library allocation
page read and write
19F6B3AC000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F75A0A000
trusted library allocation
page read and write
19F7C4A5000
trusted library allocation
page read and write
19F75DE7000
trusted library allocation
page read and write
1DA312E0000
heap
page read and write
19F64999000
heap
page read and write
19F6493D000
heap
page read and write
19F75A5E000
trusted library allocation
page read and write
19F76AD0000
trusted library allocation
page read and write
19F6DCD0000
trusted library allocation
page read and write
19F6EA98000
trusted library allocation
page read and write
19F6EEC8000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F759B0000
trusted library allocation
page read and write
19F77480000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F64961000
heap
page read and write
19F64996000
heap
page read and write
19F64959000
heap
page read and write
1DA30C10000
heap
page read and write
1DA31344000
heap
page read and write
19F6B394000
trusted library allocation
page read and write
19F6B371000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F76C3B000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F64961000
heap
page read and write
19F6496D000
heap
page read and write
1ACB3C45000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F76924000
trusted library allocation
page read and write
19F7003E000
trusted library allocation
page read and write
19F6F93C000
trusted library allocation
page read and write
1D310D80000
heap
page read and write
19F6499A000
heap
page read and write
19F6FDCA000
trusted library allocation
page read and write
19F76CF0000
trusted library allocation
page read and write
19F700EE000
trusted library allocation
page read and write
19F75C4B000
trusted library allocation
page read and write
19F700C0000
trusted library allocation
page read and write
19F6F595000
trusted library allocation
page read and write
19F6E1A3000
trusted library allocation
page read and write
19F6EECE000
trusted library allocation
page read and write
19F6E67C000
trusted library allocation
page read and write
19F6494A000
heap
page read and write
19F711B0000
trusted library allocation
page read and write
19F6B283000
trusted library allocation
page read and write
19F75DFE000
trusted library allocation
page read and write
19F649A3000
heap
page read and write
19F700F6000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F711CD000
trusted library allocation
page read and write
19F6ABAE000
trusted library allocation
page read and write
19F6B36E000
trusted library allocation
page read and write
19F7115F000
trusted library allocation
page read and write
19F6D660000
trusted library allocation
page read and write
19F71188000
trusted library allocation
page read and write
19F6E4C7000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F6493E000
heap
page read and write
19F75DF7000
trusted library allocation
page read and write
19F6F050000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F64975000
heap
page read and write
19F6D871000
trusted library allocation
page read and write
19F6F44C000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6D42B000
trusted library allocation
page read and write
1DA3060C000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6E4C5000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F64967000
heap
page read and write
19F649AB000
heap
page read and write
19F6496D000
heap
page read and write
19F649A2000
heap
page read and write
19F711CD000
trusted library allocation
page read and write
19F6F5E3000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6F011000
trusted library allocation
page read and write
19F7003C000
trusted library allocation
page read and write
19F6F4F3000
trusted library allocation
page read and write
19F70F87000
trusted library allocation
page read and write
19F7B091000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6F025000
trusted library allocation
page read and write
19F700BC000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F64996000
heap
page read and write
19F70E66000
trusted library allocation
page read and write
19F75FAB000
trusted library allocation
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F76AB4000
trusted library allocation
page read and write
1534000
heap
page read and write
19F64969000
heap
page read and write
19F6F01D000
trusted library allocation
page read and write
19F7A5F9000
trusted library allocation
page read and write
19F70FFA000
trusted library allocation
page read and write
19F70E0E000
trusted library allocation
page read and write
19F6E685000
trusted library allocation
page read and write
19F75C85000
trusted library allocation
page read and write
19F75F82000
trusted library allocation
page read and write
19F6D87C000
trusted library allocation
page read and write
19F64955000
heap
page read and write
1DA30689000
trusted library allocation
page read and write
19F6FE82000
trusted library allocation
page read and write
19F6AB7C000
trusted library allocation
page read and write
19F6FFCE000
trusted library allocation
page read and write
19F6EAA1000
trusted library allocation
page read and write
19F69982000
trusted library allocation
page read and write
19F7A65A000
trusted library allocation
page read and write
19F769FD000
trusted library allocation
page read and write
19F6B2A5000
trusted library allocation
page read and write
19F76E70000
heap
page read and write
19F711CD000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F6F4F8000
trusted library allocation
page read and write
1530000
heap
page read and write
19F7007C000
trusted library allocation
page read and write
19F75C41000
trusted library allocation
page read and write
19F6B3CE000
trusted library allocation
page read and write
19F7B1D3000
trusted library allocation
page read and write
19F6A85E000
trusted library allocation
page read and write
19F6F5E7000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7B169000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6F0B3000
trusted library allocation
page read and write
19F75C7C000
trusted library allocation
page read and write
1DA30210000
remote allocation
page execute read
19F6EEAB000
trusted library allocation
page read and write
19F75FD6000
trusted library allocation
page read and write
19F6E43D000
trusted library allocation
page read and write
3F30000
heap
page read and write
19F7A7E1000
trusted library allocation
page read and write
19F75CAA000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F75A06000
trusted library allocation
page read and write
19F70066000
trusted library allocation
page read and write
19F7B124000
trusted library allocation
page read and write
19F7A540000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6FC98000
trusted library allocation
page read and write
19F6494A000
heap
page read and write
24EE7A70000
heap
page read and write
19F6999B000
trusted library allocation
page read and write
19F6E1AD000
trusted library allocation
page read and write
19F76948000
trusted library allocation
page read and write
19F711FB000
trusted library allocation
page read and write
25456590000
heap
page read and write
19F75BB4000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F75BE5000
trusted library allocation
page read and write
19F6495A000
heap
page read and write
19F75FBE000
trusted library allocation
page read and write
19F649CB000
heap
page read and write
19F64999000
heap
page read and write
19F6493E000
heap
page read and write
19F64934000
heap
page read and write
19F64940000
heap
page read and write
19F6499E000
heap
page read and write
19F6FD27000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F64984000
heap
page read and write
1DA312A8000
heap
page read and write
19F6E499000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F75999000
trusted library allocation
page read and write
19F70FBE000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6B2CE000
trusted library allocation
page read and write
19F6494D000
heap
page read and write
19F75DFE000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F6494F000
heap
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F7A5FC000
trusted library allocation
page read and write
19F64945000
heap
page read and write
19F6F0BC000
trusted library allocation
page read and write
19F7B026000
trusted library allocation
page read and write
19F6492D000
heap
page read and write
19F6F4BC000
trusted library allocation
page read and write
19F6E443000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6496B000
heap
page read and write
19F64959000
heap
page read and write
19F70083000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6F487000
trusted library allocation
page read and write
19F76AEC000
trusted library allocation
page read and write
19F76940000
trusted library allocation
page read and write
19F70D93000
trusted library allocation
page read and write
19F6FE67000
trusted library allocation
page read and write
19F6EC6E000
trusted library allocation
page read and write
19F6DCC0000
trusted library allocation
page read and write
19F70053000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F96F000
trusted library allocation
page read and write
19F6E4B4000
trusted library allocation
page read and write
19F6F98F000
trusted library allocation
page read and write
19F6B15C000
heap
page read and write
19F700DD000
trusted library allocation
page read and write
1DA31377000
heap
page read and write
19F76CE0000
trusted library allocation
page read and write
19F711D0000
trusted library allocation
page read and write
24EE7D00000
trusted library allocation
page read and write
19F6B122000
heap
page read and write
19F75873000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F6E681000
trusted library allocation
page read and write
19F6E412000
trusted library allocation
page read and write
24EE9660000
heap
page read and write
19F6B240000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F70ECF000
trusted library allocation
page read and write
19F6EECB000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F64975000
heap
page read and write
19F70E78000
trusted library allocation
page read and write
19F6FEB1000
trusted library allocation
page read and write
19F75B30000
trusted library allocation
page read and write
19F75C2F000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6ABDB000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F64944000
heap
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F6F0A5000
trusted library allocation
page read and write
19F6F050000
trusted library allocation
page read and write
19F6493C000
heap
page read and write
19F75956000
trusted library allocation
page read and write
19F75927000
trusted library allocation
page read and write
19F6F5E7000
trusted library allocation
page read and write
19F75D8A000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F7C461000
trusted library allocation
page read and write
19F76AA3000
trusted library allocation
page read and write
19F70D20000
trusted library allocation
page read and write
19F70FC8000
trusted library allocation
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F7590F000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F64941000
heap
page read and write
1534000
heap
page read and write
19F711CD000
trusted library allocation
page read and write
19F6F9B8000
trusted library allocation
page read and write
19F7A568000
trusted library allocation
page read and write
19F7C44B000
trusted library allocation
page read and write
19F64949000
heap
page read and write
19F6499C000
heap
page read and write
19F70DCD000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F76934000
trusted library allocation
page read and write
1ACB3D40000
heap
page read and write
19F75D6F000
trusted library allocation
page read and write
19F6EA95000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F6F1FA000
trusted library allocation
page read and write
19F6B35B000
trusted library allocation
page read and write
19F7747C000
trusted library allocation
page read and write
19F6B139000
heap
page read and write
19F649BF000
heap
page read and write
19F6ABB0000
trusted library allocation
page read and write
19F6EE8B000
trusted library allocation
page read and write
19F6E184000
trusted library allocation
page read and write
19F75999000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F7597B000
trusted library allocation
page read and write
19F6F01C000
trusted library allocation
page read and write
19F70F14000
trusted library allocation
page read and write
19F6D871000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F70FFA000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F05C000
trusted library allocation
page read and write
19F76911000
trusted library allocation
page read and write
19F75A72000
trusted library allocation
page read and write
19F64959000
heap
page read and write
152E000
stack
page read and write
19F64924000
heap
page read and write
19F64961000
heap
page read and write
19F75D3B000
trusted library allocation
page read and write
19F6FC13000
trusted library allocation
page read and write
19F649AC000
heap
page read and write
19F6FFCB000
trusted library allocation
page read and write
19F6F081000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F7C547000
trusted library allocation
page read and write
19F6B370000
trusted library allocation
page read and write
19F7B01B000
trusted library allocation
page read and write
19F6B3FC000
trusted library allocation
page read and write
19F6FF61000
trusted library allocation
page read and write
19F6A8FD000
trusted library allocation
page read and write
19F712D4000
trusted library allocation
page read and write
19F700F8000
trusted library allocation
page read and write
19F64996000
heap
page read and write
1ACB3C49000
trusted library allocation
page read and write
1ACB3C73000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F64984000
heap
page read and write
19F64952000
heap
page read and write
553A1D8000
stack
page read and write
19F6EEFC000
trusted library allocation
page read and write
19F76E35000
heap
page read and write
19F6F01D000
trusted library allocation
page read and write
19F6F585000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6E459000
trusted library allocation
page read and write
19F6997F000
trusted library allocation
page read and write
19F6FF0F000
trusted library allocation
page read and write
19F70D93000
trusted library allocation
page read and write
19F6D65F000
trusted library allocation
page read and write
1ACB3C13000
trusted library allocation
page read and write
19F76E6A000
heap
page read and write
19F711FD000
trusted library allocation
page read and write
25456596000
heap
page read and write
19F64996000
heap
page read and write
19F6F229000
trusted library allocation
page read and write
19F6EAA2000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6EEDF000
trusted library allocation
page read and write
19F6F9E5000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
1DA31377000
heap
page read and write
19F70044000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64959000
heap
page read and write
1DA303CF000
unclassified section
page read and write
19F649AB000
heap
page read and write
19F6FFF3000
trusted library allocation
page read and write
19F6F4B9000
trusted library allocation
page read and write
19F6DC0F000
trusted library allocation
page read and write
24EE79C0000
heap
page read and write
19F7C547000
trusted library allocation
page read and write
19F6EACA000
trusted library allocation
page read and write
5D29FFF000
stack
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F711FB000
trusted library allocation
page read and write
19F6B37D000
trusted library allocation
page read and write
19F64975000
heap
page read and write
1D311000000
trusted library allocation
page read and write
19F700EE000
trusted library allocation
page read and write
19F692F8000
trusted library allocation
page read and write
19F64976000
heap
page read and write
19F71152000
trusted library allocation
page read and write
19F6F2B6000
trusted library allocation
page read and write
19F6E67E000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F75D85000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F64952000
heap
page read and write
19F6F4F1000
trusted library allocation
page read and write
19F714D9000
trusted library allocation
page read and write
19F76AB4000
trusted library allocation
page read and write
19F75B2C000
trusted library allocation
page read and write
1DA31260000
heap
page read and write
19F70053000
trusted library allocation
page read and write
19F69871000
trusted library allocation
page read and write
19F6E6EC000
trusted library allocation
page read and write
19F75F94000
trusted library allocation
page read and write
19F6ABF6000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F64945000
heap
page read and write
2D8837E000
unkown
page readonly
1EBE000
stack
page read and write
19F6F2E1000
trusted library allocation
page read and write
19F7691F000
trusted library allocation
page read and write
19F75A1F000
trusted library allocation
page read and write
19F75DC7000
trusted library allocation
page read and write
19F6E4BF000
trusted library allocation
page read and write
19F76CEF000
trusted library allocation
page read and write
19F6496C000
heap
page read and write
19F6EEE3000
trusted library allocation
page read and write
19F76CC3000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F649A2000
heap
page read and write
19F6F0F7000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6DCD7000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
19F6F215000
trusted library allocation
page read and write
19F6AAAA000
trusted library allocation
page read and write
19F6F9BA000
trusted library allocation
page read and write
19F6F007000
trusted library allocation
page read and write
19F7C5D6000
trusted library allocation
page read and write
19F6DCF4000
trusted library allocation
page read and write
19F7B0B0000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6495D000
heap
page read and write
19F7BAA8000
trusted library allocation
page read and write
19F649AE000
heap
page read and write
19F64940000
heap
page read and write
16C0000
heap
page read and write
1DA31377000
heap
page read and write
19F6D41B000
trusted library allocation
page read and write
19F6EABD000
trusted library allocation
page read and write
19F76C5C000
trusted library allocation
page read and write
19F76A63000
trusted library allocation
page read and write
1ACB3920000
unclassified section
page readonly
2545619F000
unclassified section
page read and write
19F71207000
trusted library allocation
page read and write
19F75FC4000
trusted library allocation
page read and write
19F70E4E000
trusted library allocation
page read and write
19F6DCEA000
trusted library allocation
page read and write
19F6B29E000
trusted library allocation
page read and write
19F71195000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F6496D000
heap
page read and write
19F7A667000
trusted library allocation
page read and write
19F6F4A1000
trusted library allocation
page read and write
24EE7D07000
trusted library allocation
page read and write
19F64969000
heap
page read and write
1DA312FD000
heap
page read and write
19F76E4F000
heap
page read and write
19F6B3CC000
trusted library allocation
page read and write
19F6EEFC000
trusted library allocation
page read and write
19F70044000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F64996000
heap
page read and write
19F6496D000
heap
page read and write
19F75A0F000
trusted library allocation
page read and write
19F70DCD000
trusted library allocation
page read and write
19F75D47000
trusted library allocation
page read and write
1DA312F1000
heap
page read and write
19F70FD2000
trusted library allocation
page read and write
19F649AA000
heap
page read and write
1DA312FD000
heap
page read and write
19F6F9DB000
trusted library allocation
page read and write
19F64949000
heap
page read and write
19F6B29E000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F71173000
trusted library allocation
page read and write
19F6B3BE000
trusted library allocation
page read and write
19F7C557000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F76973000
trusted library allocation
page read and write
19F712FB000
trusted library allocation
page read and write
19F75C2F000
trusted library allocation
page read and write
19F6F47E000
trusted library allocation
page read and write
19F75C3C000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6495D000
heap
page read and write
19F6493E000
heap
page read and write
19F700FD000
trusted library allocation
page read and write
19F7B0EB000
trusted library allocation
page read and write
19F7C627000
trusted library allocation
page read and write
19F6E1F3000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6B3C1000
trusted library allocation
page read and write
19F75AB1000
trusted library allocation
page read and write
19F6FF99000
trusted library allocation
page read and write
19F6E1F2000
trusted library allocation
page read and write
19F6F55F000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64968000
heap
page read and write
25456600000
trusted library allocation
page read and write
19F75DE1000
trusted library allocation
page read and write
19F6E4C7000
trusted library allocation
page read and write
19F6FCE7000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6DCF3000
trusted library allocation
page read and write
19F6E499000
trusted library allocation
page read and write
19F64949000
heap
page read and write
19F64974000
heap
page read and write
19F76EB9000
heap
page read and write
19F75CB4000
trusted library allocation
page read and write
19F6D87C000
trusted library allocation
page read and write
19F71197000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F649A2000
heap
page read and write
1DA30770000
heap
page read and write
19F64962000
heap
page read and write
19F6493E000
heap
page read and write
19F6496F000
heap
page read and write
19F7C5C0000
trusted library allocation
page read and write
19F6A8C3000
trusted library allocation
page read and write
19F76C22000
trusted library allocation
page read and write
1ACB3CDB000
trusted library allocation
page read and write
19F6DCF0000
trusted library allocation
page read and write
19F6F2FD000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6494E000
heap
page read and write
19F64940000
heap
page read and write
19F6F25A000
trusted library allocation
page read and write
19F71204000
trusted library allocation
page read and write
19F75914000
trusted library allocation
page read and write
19F6991E000
trusted library allocation
page read and write
19F6B394000
trusted library allocation
page read and write
25456610000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6F43D000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F70FBB000
trusted library allocation
page read and write
19F7C557000
trusted library allocation
page read and write
19F6DCF4000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6D6CF000
trusted library allocation
page read and write
19F6EEAF000
trusted library allocation
page read and write
19F6EE8F000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F64952000
heap
page read and write
19F6F909000
trusted library allocation
page read and write
19F6F44C000
trusted library allocation
page read and write
19F6F045000
trusted library allocation
page read and write
19F70E46000
trusted library allocation
page read and write
19F75C7C000
trusted library allocation
page read and write
24EE9677000
heap
page read and write
19F64944000
heap
page read and write
19F76E46000
heap
page read and write
19F6FCA3000
trusted library allocation
page read and write
19F75D8E000
trusted library allocation
page read and write
19F75A19000
trusted library allocation
page read and write
19F64946000
heap
page read and write
19F64959000
heap
page read and write
19F6E186000
trusted library allocation
page read and write
19F6FCEA000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
19F70FC4000
trusted library allocation
page read and write
19F76A63000
trusted library allocation
page read and write
19F6F272000
trusted library allocation
page read and write
19F6FFAE000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F7A300000
trusted library allocation
page read and write
19F6495F000
heap
page read and write
19F64924000
heap
page read and write
19F6F9C7000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F75900000
trusted library allocation
page read and write
19F6F5DE000
trusted library allocation
page read and write
19F70F8D000
trusted library allocation
page read and write
19F6F050000
trusted library allocation
page read and write
19F711B3000
trusted library allocation
page read and write
1DA30668000
trusted library allocation
page read and write
19F7747E000
trusted library allocation
page read and write
19F6B38E000
trusted library allocation
page read and write
19F6A8FD000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6494E000
heap
page read and write
19F6F9BA000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F714BC000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6E6E0000
trusted library allocation
page read and write
19F6D862000
trusted library allocation
page read and write
19F6F465000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6494D000
heap
page read and write
19F6F9A9000
trusted library allocation
page read and write
1DA3133B000
heap
page read and write
19F70F8D000
trusted library allocation
page read and write
19F6F4C3000
trusted library allocation
page read and write
1534000
heap
page read and write
19F75FC2000
trusted library allocation
page read and write
19F7A654000
trusted library allocation
page read and write
19F7742D000
trusted library allocation
page read and write
19F71543000
trusted library allocation
page read and write
19F6FEDE000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6F998000
trusted library allocation
page read and write
19F64923000
heap
page read and write
19F64952000
heap
page read and write
19F6FE5A000
trusted library allocation
page read and write
5D277FF000
stack
page read and write
19F6E49F000
trusted library allocation
page read and write
19F70EFB000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6F0B3000
trusted library allocation
page read and write
19F6F329000
trusted library allocation
page read and write
19F6F4D9000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64975000
heap
page read and write
19F7118C000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F711FD000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F714E2000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6EC7A000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6D853000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F75BF5000
trusted library allocation
page read and write
254566CA000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
1DA312E8000
heap
page read and write
19F7694F000
trusted library allocation
page read and write
19F769A8000
trusted library allocation
page read and write
19F76E46000
heap
page read and write
19F7A64A000
trusted library allocation
page read and write
19F6EE86000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6EE83000
trusted library allocation
page read and write
19F7B018000
trusted library allocation
page read and write
19F6F48A000
trusted library allocation
page read and write
19F70FBE000
trusted library allocation
page read and write
19F75C9D000
trusted library allocation
page read and write
19F75CA3000
trusted library allocation
page read and write
19F769D0000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6A8D3000
trusted library allocation
page read and write
19F7A712000
trusted library allocation
page read and write
19F6EA9C000
trusted library allocation
page read and write
19F70F8F000
trusted library allocation
page read and write
19F6999B000
trusted library allocation
page read and write
1DA3132A000
heap
page read and write
19F75981000
trusted library allocation
page read and write
19F6F9DD000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64924000
heap
page read and write
19F64952000
heap
page read and write
19F75FA2000
trusted library allocation
page read and write
19F6F4CF000
trusted library allocation
page read and write
19F649CE000
heap
page read and write
19F6D63C000
trusted library allocation
page read and write
19F71234000
trusted library allocation
page read and write
19F6FE44000
trusted library allocation
page read and write
19F712FD000
trusted library allocation
page read and write
19F6F4B9000
trusted library allocation
page read and write
19F6F281000
trusted library allocation
page read and write
19F76C7C000
trusted library allocation
page read and write
19F76A59000
trusted library allocation
page read and write
25456732000
trusted library allocation
page read and write
19F6B0F1000
heap
page read and write
19F64957000
heap
page read and write
19F64944000
heap
page read and write
19F714D3000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F64975000
heap
page read and write
19F6F5C0000
trusted library allocation
page read and write
19F711A8000
trusted library allocation
page read and write
19F6F5E7000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F76E02000
heap
page read and write
19F649AB000
heap
page read and write
19F7747E000
trusted library allocation
page read and write
19F6FFA2000
trusted library allocation
page read and write
19F6FFC0000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F76990000
trusted library allocation
page read and write
19F700EE000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F71164000
trusted library allocation
page read and write
19F711A2000
trusted library allocation
page read and write
19F6ABAE000
trusted library allocation
page read and write
19F75968000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F75CAC000
trusted library allocation
page read and write
19F6EEE3000
trusted library allocation
page read and write
19F6F98F000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6D462000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F64974000
heap
page read and write
19F7C541000
trusted library allocation
page read and write
19F70E0E000
trusted library allocation
page read and write
19F6F4D7000
trusted library allocation
page read and write
19F6F242000
trusted library allocation
page read and write
19F75C95000
trusted library allocation
page read and write
19F6FE97000
trusted library allocation
page read and write
19F711FD000
trusted library allocation
page read and write
19F712FB000
trusted library allocation
page read and write
19F6B3AC000
trusted library allocation
page read and write
19F75C26000
trusted library allocation
page read and write
19F6B265000
trusted library allocation
page read and write
19F7B056000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6E673000
trusted library allocation
page read and write
19F6FD58000
trusted library allocation
page read and write
19F700F9000
trusted library allocation
page read and write
19F7B085000
trusted library allocation
page read and write
19F76E02000
heap
page read and write
19F70F8F000
trusted library allocation
page read and write
19F69298000
trusted library allocation
page read and write
19F6E479000
trusted library allocation
page read and write
19F7C517000
trusted library allocation
page read and write
19F6EAA5000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
1DA3125F000
heap
page read and write
19F6FDE1000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F6EECB000
trusted library allocation
page read and write
19F649D3000
heap
page read and write
19F76AB7000
trusted library allocation
page read and write
19F7AD9F000
trusted library allocation
page read and write
19F6991B000
trusted library allocation
page read and write
19F76A39000
trusted library allocation
page read and write
19F6E6E0000
trusted library allocation
page read and write
19F759F0000
trusted library allocation
page read and write
5D287FE000
stack
page read and write
19F649A1000
heap
page read and write
29BB9A11000
trusted library allocation
page execute read
16E2000
heap
page read and write
19F6ABF6000
trusted library allocation
page read and write
1DA31269000
heap
page read and write
19F64955000
heap
page read and write
19F6EED0000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F76A24000
trusted library allocation
page read and write
1ACB3C00000
trusted library allocation
page read and write
19F7A559000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F64974000
heap
page read and write
19F70FDD000
trusted library allocation
page read and write
19F6B29E000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F6F4CA000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F7598E000
trusted library allocation
page read and write
25456802000
heap
page read and write
19F6E697000
trusted library allocation
page read and write
25456050000
unclassified section
page readonly
19F6F5D6000
trusted library allocation
page read and write
19F6F9D5000
trusted library allocation
page read and write
CDFDFFE000
stack
page read and write
19F76E02000
heap
page read and write
25456400000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6EEE1000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F711F8000
trusted library allocation
page read and write
19F6D8CB000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F64999000
heap
page read and write
553C9FE000
unkown
page readonly
19F6F466000
trusted library allocation
page read and write
19F6A8FD000
trusted library allocation
page read and write
19F75956000
trusted library allocation
page read and write
19F6F43C000
trusted library allocation
page read and write
19F76937000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
1DA30610000
trusted library allocation
page read and write
19F711F8000
trusted library allocation
page read and write
19F77472000
trusted library allocation
page read and write
19F70FE8000
trusted library allocation
page read and write
19F712C4000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F76CDC000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F649AB000
heap
page read and write
1DA312EF000
heap
page read and write
19F7ADF0000
trusted library allocation
page read and write
19F70E1B000
trusted library allocation
page read and write
19F6EEC8000
trusted library allocation
page read and write
19F7C541000
trusted library allocation
page read and write
19F6D653000
trusted library allocation
page read and write
19F6ABF2000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
1DA3136E000
heap
page read and write
19F75C8A000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F7B2FA000
trusted library allocation
page read and write
2545626A000
heap
page read and write
553965E000
stack
page read and write
19F7A64E000
trusted library allocation
page read and write
254561C0000
heap
page read and write
1DA3062F000
trusted library allocation
page read and write
19F6EA84000
trusted library allocation
page read and write
19F76AF1000
trusted library allocation
page read and write
19F70FC4000
trusted library allocation
page read and write
19F6B3AC000
trusted library allocation
page read and write
19F649CE000
heap
page read and write
19F6E4CE000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F76CF9000
trusted library allocation
page read and write
19F7116A000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F980000
trusted library allocation
page read and write
1DA30766000
unkown
page execute read
19F6D4C3000
trusted library allocation
page read and write
19F6E41E000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F6D4D2000
trusted library allocation
page read and write
19F6F5C4000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F64975000
heap
page read and write
19F64961000
heap
page read and write
19F64961000
heap
page read and write
19F6B13C000
heap
page read and write
19F7C4DE000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F64971000
heap
page read and write
19F711A2000
trusted library allocation
page read and write
19F64969000
heap
page read and write
19F69281000
trusted library allocation
page read and write
19F6F4B0000
trusted library allocation
page read and write
19F6FEC5000
trusted library allocation
page read and write
19F7C541000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6496D000
heap
page read and write
19F6D89C000
trusted library allocation
page read and write
19F6AA78000
trusted library allocation
page read and write
19F76DF1000
heap
page read and write
19F64959000
heap
page read and write
19F649AC000
heap
page read and write
19F692EF000
trusted library allocation
page read and write
19F76C3B000
trusted library allocation
page read and write
19F7A68F000
trusted library allocation
page read and write
19F75AAC000
trusted library allocation
page read and write
19F7B15D000
trusted library allocation
page read and write
16E8000
heap
page read and write
19F6F995000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6B368000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6F583000
trusted library allocation
page read and write
19F69823000
trusted library allocation
page read and write
19F6B133000
heap
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F6DCF0000
trusted library allocation
page read and write
19F6F58C000
trusted library allocation
page read and write
19F6D863000
trusted library allocation
page read and write
19F70D40000
trusted library allocation
page read and write
19F7747E000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F75C23000
trusted library allocation
page read and write
1ACB3AA0000
heap
page read and write
19F6D86D000
trusted library allocation
page read and write
19F6FF2C000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F649AB000
heap
page read and write
19F64975000
heap
page read and write
19F7C5A8000
trusted library allocation
page read and write
19F7B089000
trusted library allocation
page read and write
19F6F21C000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6B2CE000
trusted library allocation
page read and write
19F6E4C7000
trusted library allocation
page read and write
19F7004D000
trusted library allocation
page read and write
19F700FD000
trusted library allocation
page read and write
19F6D683000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F64975000
heap
page read and write
19F6496F000
heap
page read and write
19F6F0E8000
trusted library allocation
page read and write
19F7694B000
trusted library allocation
page read and write
19F714D7000
trusted library allocation
page read and write
19F76966000
trusted library allocation
page read and write
19F64935000
heap
page read and write
19F6DC75000
trusted library allocation
page read and write
1ACB3B00000
trusted library allocation
page read and write
19F6FDDA000
trusted library allocation
page read and write
19F6FF69000
trusted library allocation
page read and write
19F6E1A8000
trusted library allocation
page read and write
19F6B139000
heap
page read and write
19F6B15C000
heap
page read and write
19F712BC000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F64975000
heap
page read and write
19F6D676000
trusted library allocation
page read and write
19F64971000
heap
page read and write
1DA307B6000
heap
page read and write
19F6FF6B000
trusted library allocation
page read and write
19F711F8000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
19F6497B000
heap
page read and write
19F64957000
heap
page read and write
19F69975000
trusted library allocation
page read and write
19F6E492000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6F05C000
trusted library allocation
page read and write
19F75D68000
trusted library allocation
page read and write
19F7AD82000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F698FB000
trusted library allocation
page read and write
19F7C47E000
trusted library allocation
page read and write
1ACB3CB6000
trusted library allocation
page read and write
19F75995000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
1DA301A0000
unclassified section
page readonly
19F712FD000
trusted library allocation
page read and write
19F77420000
trusted library allocation
page read and write
13FE000
stack
page read and write
19F70F7D000
trusted library allocation
page read and write
1ACB3C5F000
trusted library allocation
page read and write
19F6AAAC000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F75C8C000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F64959000
heap
page read and write
19F64971000
heap
page read and write
19F6E418000
trusted library allocation
page read and write
1DA31300000
heap
page read and write
19F75BB4000
trusted library allocation
page read and write
19F6B385000
trusted library allocation
page read and write
19F7B057000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6D87E000
trusted library allocation
page read and write
19F6F255000
trusted library allocation
page read and write
19F64957000
heap
page read and write
19F6496F000
heap
page read and write
19F75C89000
trusted library allocation
page read and write
19F64979000
heap
page read and write
2D8A3FE000
unkown
page readonly
19F6499B000
heap
page read and write
19F75C9F000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F64962000
heap
page read and write
19F6496F000
heap
page read and write
19F64996000
heap
page read and write
19F6B33D000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6499A000
heap
page read and write
19F6F002000
trusted library allocation
page read and write
19F71193000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F6F9A1000
trusted library allocation
page read and write
19F70E5D000
trusted library allocation
page read and write
19F6494F000
heap
page read and write
19F6E1F5000
trusted library allocation
page read and write
19F6F4B9000
trusted library allocation
page read and write
19F6F485000
trusted library allocation
page read and write
19F75C5F000
trusted library allocation
page read and write
5D277FB000
stack
page read and write
3BE0000
heap
page read and write
19F64941000
heap
page read and write
19F6F5F8000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F6FFC0000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
1DA3125C000
heap
page read and write
19F700B6000
trusted library allocation
page read and write
1DA31377000
heap
page read and write
19F6B3D9000
trusted library allocation
page read and write
19F6493D000
heap
page read and write
19F6D635000
trusted library allocation
page read and write
19F712C4000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F70FDD000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F6F9A3000
trusted library allocation
page read and write
19F6F4CF000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F6499A000
heap
page read and write
19F6B133000
heap
page read and write
19F64941000
heap
page read and write
19F70F27000
trusted library allocation
page read and write
1ACB3F00000
trusted library allocation
page read and write
19F711D0000
trusted library allocation
page read and write
19F6E192000
trusted library allocation
page read and write
1DA30661000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
1DA30795000
unkown
page execute read
19F6B2CE000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F64944000
heap
page read and write
19F6494E000
heap
page read and write
19F6F4CF000
trusted library allocation
page read and write
553969E000
unkown
page readonly
19F6EACA000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6E1E4000
trusted library allocation
page read and write
CDFC59E000
unkown
page readonly
19F75DFE000
trusted library allocation
page read and write
19F70F5F000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64999000
heap
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F70F33000
trusted library allocation
page read and write
19F6E48A000
trusted library allocation
page read and write
19F6E687000
trusted library allocation
page read and write
254560D0000
unclassified section
page readonly
19F7C4FC000
trusted library allocation
page read and write
19F6B3AC000
trusted library allocation
page read and write
254561A0000
heap
page read and write
19F6F026000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6D832000
trusted library allocation
page read and write
19F6F461000
trusted library allocation
page read and write
19F70D20000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6F47E000
trusted library allocation
page read and write
19F649A1000
heap
page read and write
19F64975000
heap
page read and write
1DA312EF000
heap
page read and write
19F64976000
heap
page read and write
254560B0000
remote allocation
page read and write
19F75CA3000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
19F7747C000
trusted library allocation
page read and write
19F6F998000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F769EC000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F6EEEB000
trusted library allocation
page read and write
19F7C4FC000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64974000
heap
page read and write
19F64974000
heap
page read and write
19F6492B000
heap
page read and write
19F70E98000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F6F57A000
trusted library allocation
page read and write
19F649A4000
heap
page read and write
19F7B2C4000
trusted library allocation
page read and write
1DA30648000
trusted library allocation
page read and write
19F64926000
heap
page read and write
19F711BB000
trusted library allocation
page read and write
19F7C5D6000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F75C8C000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6B37D000
trusted library allocation
page read and write
19F6B385000
trusted library allocation
page read and write
19F6EAC0000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6E1A1000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6EAC0000
trusted library allocation
page read and write
19F6EACD000
trusted library allocation
page read and write
19F6FF65000
trusted library allocation
page read and write
19F6FFA2000
trusted library allocation
page read and write
16EE000
heap
page read and write
19F6F5F8000
trusted library allocation
page read and write
19F6F072000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F64976000
heap
page read and write
19F64979000
heap
page read and write
19F7A64E000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64971000
heap
page read and write
19F64977000
heap
page read and write
19F6493E000
heap
page read and write
19F6496F000
heap
page read and write
19F76CFE000
trusted library allocation
page read and write
19F6F4F3000
trusted library allocation
page read and write
1ACB3C11000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64924000
heap
page read and write
19F7C5F4000
trusted library allocation
page read and write
19F76AB7000
trusted library allocation
page read and write
19F7123E000
trusted library allocation
page read and write
19F6F4B9000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F70E38000
trusted library allocation
page read and write
19F77415000
trusted library allocation
page read and write
19F76979000
trusted library allocation
page read and write
19F6FC44000
trusted library allocation
page read and write
3BE4000
heap
page read and write
19F71133000
trusted library allocation
page read and write
19F6A8AA000
trusted library allocation
page read and write
19F70095000
trusted library allocation
page read and write
19F6AAB2000
trusted library allocation
page read and write
19F70076000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F64975000
heap
page read and write
1DA3061A000
trusted library allocation
page read and write
19F7A531000
trusted library allocation
page read and write
19F7697E000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F649A5000
heap
page read and write
25456681000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F75FFC000
trusted library allocation
page read and write
1DA30664000
trusted library allocation
page read and write
19F64947000
heap
page read and write
19F6F9D3000
trusted library allocation
page read and write
19F76C42000
trusted library allocation
page read and write
19F7C5A8000
trusted library allocation
page read and write
19F75CA3000
trusted library allocation
page read and write
19F6EEC3000
trusted library allocation
page read and write
19F70FE5000
trusted library allocation
page read and write
19F6F00B000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F70F64000
trusted library allocation
page read and write
19F64965000
heap
page read and write
19F6B3D4000
trusted library allocation
page read and write
1DA31358000
heap
page read and write
19F64948000
heap
page read and write
19F64955000
heap
page read and write
19F64971000
heap
page read and write
19F6F5C0000
trusted library allocation
page read and write
19F6494D000
heap
page read and write
19F76DFE000
heap
page read and write
19F649CE000
heap
page read and write
24EE79D0000
heap
page read and write
19F70E3E000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F7B0F8000
trusted library allocation
page read and write
19F6FFCE000
trusted library allocation
page read and write
19F76CC3000
trusted library allocation
page read and write
19F769C1000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64961000
heap
page read and write
19F6499A000
heap
page read and write
19F6F0E4000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F70F7D000
trusted library allocation
page read and write
19F649D3000
heap
page read and write
19F75D40000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F649A2000
heap
page read and write
19F64976000
heap
page read and write
19F6AAB2000
trusted library allocation
page read and write
19F6EABD000
trusted library allocation
page read and write
3F31000
heap
page read and write
19F6F995000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6D47A000
trusted library allocation
page read and write
19F6B137000
heap
page read and write
19F6F9AA000
trusted library allocation
page read and write
19F70FCB000
trusted library allocation
page read and write
19F71133000
trusted library allocation
page read and write
19F6F0B3000
trusted library allocation
page read and write
19F6D472000
trusted library allocation
page read and write
1DA312F1000
heap
page read and write
19F649A4000
heap
page read and write
19F64934000
heap
page read and write
19F71188000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6A864000
trusted library allocation
page read and write
19F75C91000
trusted library allocation
page read and write
19F70FDD000
trusted library allocation
page read and write
19F6E4C1000
trusted library allocation
page read and write
19F70FED000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F69926000
trusted library allocation
page read and write
19F6FFF5000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6494E000
heap
page read and write
19F64996000
heap
page read and write
19F6E4A5000
trusted library allocation
page read and write
19F6F9CF000
trusted library allocation
page read and write
19F76AF1000
trusted library allocation
page read and write
19F64954000
heap
page read and write
19F6EA8C000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
1ACB3890000
unclassified section
page readonly
19F6AA76000
trusted library allocation
page read and write
19F692C0000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F7694C000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6F9A3000
trusted library allocation
page read and write
19F6E4CE000
trusted library allocation
page read and write
19F6AB69000
trusted library allocation
page read and write
1D31100A000
trusted library allocation
page read and write
19F6F9CF000
trusted library allocation
page read and write
19F758F1000
trusted library allocation
page read and write
19F70FBE000
trusted library allocation
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F711C5000
trusted library allocation
page read and write
19F7B1C7000
trusted library allocation
page read and write
19F6DCCA000
trusted library allocation
page read and write
19F6FDB5000
trusted library allocation
page read and write
19F75CD1000
trusted library allocation
page read and write
19F712CD000
trusted library allocation
page read and write
19F6EACD000
trusted library allocation
page read and write
25456679000
trusted library allocation
page read and write
19F6F4D4000
trusted library allocation
page read and write
19F70DDC000
trusted library allocation
page read and write
19F64946000
heap
page read and write
19F64922000
heap
page read and write
19F7A68F000
trusted library allocation
page read and write
19F64950000
heap
page read and write
2D881FE000
unkown
page readonly
19F6493A000
heap
page read and write
19F6AA23000
trusted library allocation
page read and write
19F6F4AA000
trusted library allocation
page read and write
19F75DA6000
trusted library allocation
page read and write
1DA306F3000
trusted library allocation
page read and write
19F6B381000
trusted library allocation
page read and write
19F6EAC2000
trusted library allocation
page read and write
19F6EAC3000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F64974000
heap
page read and write
19F64999000
heap
page read and write
19F6E4F3000
trusted library allocation
page read and write
19F70048000
trusted library allocation
page read and write
553971E000
unkown
page readonly
19F6F4CD000
trusted library allocation
page read and write
19F76CD4000
trusted library allocation
page read and write
19F64970000
heap
page read and write
19F700BC000
trusted library allocation
page read and write
19F759A4000
trusted library allocation
page read and write
25456717000
trusted library allocation
page read and write
1ACB3D20000
heap
page read and write
19F6F487000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F7A66B000
trusted library allocation
page read and write
19F6F0EB000
trusted library allocation
page read and write
19F6FEA3000
trusted library allocation
page read and write
19F64949000
heap
page read and write
19F6AA95000
trusted library allocation
page read and write
19F6EA8C000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F64952000
heap
page read and write
19F6497A000
heap
page read and write
19F6B0EC000
heap
page read and write
19F71146000
trusted library allocation
page read and write
19F6AAB0000
trusted library allocation
page read and write
16EC000
heap
page read and write
19F64961000
heap
page read and write
19F70FFA000
trusted library allocation
page read and write
19F75C19000
trusted library allocation
page read and write
1DA3066F000
trusted library allocation
page read and write
19F700DD000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F7B0B4000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F64934000
heap
page read and write
19F64944000
heap
page read and write
19F6B33B000
trusted library allocation
page read and write
19F6B2A5000
trusted library allocation
page read and write
1F7312924000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F64996000
heap
page read and write
19F649AA000
heap
page read and write
19F6FC1D000
trusted library allocation
page read and write
19F6EAB8000
trusted library allocation
page read and write
19F758C7000
trusted library allocation
page read and write
19F6495A000
heap
page read and write
1DA31344000
heap
page read and write
19F76CE5000
trusted library allocation
page read and write
1670000
heap
page read and write
19F6492B000
heap
page read and write
19F6492B000
heap
page read and write
1DA3129C000
heap
page read and write
19F711C5000
trusted library allocation
page read and write
19F6B376000
trusted library allocation
page read and write
19F75C85000
trusted library allocation
page read and write
19F6F9DB000
trusted library allocation
page read and write
1DA30C00000
heap
page read and write
19F71151000
trusted library allocation
page read and write
19F64967000
heap
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F75F8C000
trusted library allocation
page read and write
19F75FC8000
trusted library allocation
page read and write
19F70F8B000
trusted library allocation
page read and write
19F6497A000
heap
page read and write
19F6F057000
trusted library allocation
page read and write
19F6B119000
heap
page read and write
19F75968000
trusted library allocation
page read and write
19F758AF000
trusted library allocation
page read and write
24EE966C000
heap
page read and write
19F64975000
heap
page read and write
2D893FE000
unkown
page readonly
114ABFE000
stack
page read and write
1534000
heap
page read and write
C30000
unkown
page readonly
24EE967D000
heap
page read and write
19F64941000
heap
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F75DE7000
trusted library allocation
page read and write
19F6E6B9000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F7B2BF000
trusted library allocation
page read and write
19F7A546000
trusted library allocation
page read and write
19F7C51B000
trusted library allocation
page read and write
19F714F4000
trusted library allocation
page read and write
19F6D6F5000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6E188000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F714B3000
trusted library allocation
page read and write
19F6E6DB000
trusted library allocation
page read and write
19F6EECC000
trusted library allocation
page read and write
19F64961000
heap
page read and write
25456694000
trusted library allocation
page read and write
19F6D653000
trusted library allocation
page read and write
1DA31264000
heap
page read and write
19F6EACA000
trusted library allocation
page read and write
19F75CC4000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F64996000
heap
page read and write
19F6492B000
heap
page read and write
19F6F0FE000
trusted library allocation
page read and write
19F70F8B000
trusted library allocation
page read and write
19F6E1F2000
trusted library allocation
page read and write
19F6F5E6000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F6EC86000
trusted library allocation
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F6F51B000
trusted library allocation
page read and write
19F6E1F2000
trusted library allocation
page read and write
19F6EACF000
trusted library allocation
page read and write
19F64976000
heap
page read and write
19F64934000
heap
page read and write
19F6AAC1000
trusted library allocation
page read and write
19F64961000
heap
page read and write
24EE7A79000
heap
page read and write
19F6B394000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6493B000
heap
page read and write
19F649AB000
heap
page read and write
19F7692B000
trusted library allocation
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F7C4D7000
trusted library allocation
page read and write
25456192000
unclassified section
page read and write
19F76C23000
trusted library allocation
page read and write
19F70FBB000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6E1BF000
trusted library allocation
page read and write
25456110000
heap
page read and write
1DA31260000
heap
page read and write
19F6497B000
heap
page read and write
19F6E68C000
trusted library allocation
page read and write
19F6F4E0000
trusted library allocation
page read and write
19F7C557000
trusted library allocation
page read and write
19F6F5B0000
trusted library allocation
page read and write
19F7A5E4000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7A560000
trusted library allocation
page read and write
C30000
unkown
page readonly
19F6499C000
heap
page read and write
19F64975000
heap
page read and write
19F6493A000
heap
page read and write
19F6EEFC000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6499A000
heap
page read and write
19F649A4000
heap
page read and write
19F76CE5000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F6E192000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F75CC4000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F75D4C000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6F4F3000
trusted library allocation
page read and write
19F711BF000
trusted library allocation
page read and write
19F75F4D000
trusted library allocation
page read and write
1DA306E8000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F9D5000
trusted library allocation
page read and write
19F75DF7000
trusted library allocation
page read and write
19F7B077000
trusted library allocation
page read and write
19F6F53F000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F6AABA000
trusted library allocation
page read and write
19F75963000
trusted library allocation
page read and write
19F649CC000
heap
page read and write
19F6496D000
heap
page read and write
25456594000
heap
page read and write
19F75DF9000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F712D4000
trusted library allocation
page read and write
19F6F0CC000
trusted library allocation
page read and write
19F6FE6E000
trusted library allocation
page read and write
1DA30764000
unkown
page execute read
19F6493E000
heap
page read and write
19F6E41E000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F76924000
trusted library allocation
page read and write
19F7AD86000
trusted library allocation
page read and write
19F711BF000
trusted library allocation
page read and write
19F6AACE000
trusted library allocation
page read and write
19F64951000
heap
page read and write
19F779EC000
trusted library allocation
page read and write
1ACB3C24000
trusted library allocation
page read and write
1DA31269000
heap
page read and write
19F64952000
heap
page read and write
19F6F5C0000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F7115F000
trusted library allocation
page read and write
19F711D0000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F71143000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6B29E000
trusted library allocation
page read and write
19F6FC2A000
trusted library allocation
page read and write
19F6FFFA000
trusted library allocation
page read and write
19F75FD0000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F64968000
heap
page read and write
19F711FB000
trusted library allocation
page read and write
19F6494E000
heap
page read and write
1DA312E0000
heap
page read and write
19F64940000
heap
page read and write
19F6F5B8000
trusted library allocation
page read and write
19F6B28E000
trusted library allocation
page read and write
19F70D40000
trusted library allocation
page read and write
19F6F4BF000
trusted library allocation
page read and write
19F75A46000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F7B061000
trusted library allocation
page read and write
19F6EAC0000
trusted library allocation
page read and write
19F6F974000
trusted library allocation
page read and write
19F6E16D000
trusted library allocation
page read and write
19F6FEA0000
trusted library allocation
page read and write
CFC000
unkown
page write copy
19F6496F000
heap
page read and write
19F64971000
heap
page read and write
19F75DA6000
trusted library allocation
page read and write
19F6F07E000
trusted library allocation
page read and write
254566E9000
trusted library allocation
page read and write
19F76E08000
heap
page read and write
19F6ABEB000
trusted library allocation
page read and write
19F6AB96000
trusted library allocation
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F71197000
trusted library allocation
page read and write
19F6493D000
heap
page read and write
2545667E000
trusted library allocation
page read and write
19F70FE5000
trusted library allocation
page read and write
25456700000
trusted library allocation
page read and write
19F7A579000
trusted library allocation
page read and write
19F6F5C0000
trusted library allocation
page read and write
1DA312F1000
heap
page read and write
19F64975000
heap
page read and write
19F6B39A000
trusted library allocation
page read and write
19F6EEFC000
trusted library allocation
page read and write
2D879FE000
stack
page read and write
553D9FE000
unkown
page readonly
19F6B128000
heap
page read and write
19F75B66000
trusted library allocation
page read and write
19F6EA98000
trusted library allocation
page read and write
19F6B15F000
heap
page read and write
254566B7000
trusted library allocation
page read and write
19F7A6B9000
trusted library allocation
page read and write
19F6DCE5000
trusted library allocation
page read and write
19F6F493000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6493A000
heap
page read and write
2545660D000
trusted library allocation
page read and write
19F6B2CE000
trusted library allocation
page read and write
19F6F3E5000
trusted library allocation
page read and write
19F64924000
heap
page read and write
1ACB3E40000
unclassified section
page readonly
19F64971000
heap
page read and write
19F6E4CE000
trusted library allocation
page read and write
19F76AB7000
trusted library allocation
page read and write
CDFC517000
stack
page read and write
1DA3132D000
heap
page read and write
19F6E1B4000
trusted library allocation
page read and write
1DA30603000
trusted library allocation
page read and write
19F6B29E000
trusted library allocation
page read and write
1DA30623000
trusted library allocation
page read and write
1D311140000
heap
page read and write
19F6F0F9000
trusted library allocation
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6493A000
heap
page read and write
19F75D6F000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F75DFE000
trusted library allocation
page read and write
19F64959000
heap
page read and write
1DA312E1000
heap
page read and write
19F6F264000
trusted library allocation
page read and write
19F6B3FC000
trusted library allocation
page read and write
19F6B3BE000
trusted library allocation
page read and write
19F6F0E8000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F76C3B000
trusted library allocation
page read and write
19F6FD0D000
trusted library allocation
page read and write
19F6DC31000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
1DA312EF000
heap
page read and write
19F76E02000
heap
page read and write
19F6EEE6000
trusted library allocation
page read and write
19F6F5A7000
trusted library allocation
page read and write
19F7A635000
trusted library allocation
page read and write
19F6AB6D000
trusted library allocation
page read and write
19F6D63B000
trusted library allocation
page read and write
22BE000
stack
page read and write
19F6FC9B000
trusted library allocation
page read and write
19F6F4F3000
trusted library allocation
page read and write
19F71195000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F6F563000
trusted library allocation
page read and write
1DA30C3A000
heap
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F6B3C5000
trusted library allocation
page read and write
19F6FDDA000
trusted library allocation
page read and write
19F77471000
trusted library allocation
page read and write
19F6494F000
heap
page read and write
19F6E679000
trusted library allocation
page read and write
19F6ABC7000
trusted library allocation
page read and write
19F75D7C000
trusted library allocation
page read and write
CCC000
unkown
page readonly
19F75C12000
trusted library allocation
page read and write
19F64979000
heap
page read and write
19F6499B000
heap
page read and write
19F7A65F000
trusted library allocation
page read and write
19F6D82B000
trusted library allocation
page read and write
19F6EED4000
trusted library allocation
page read and write
19F64944000
heap
page read and write
5D27FFE000
stack
page read and write
19F649A2000
heap
page read and write
19F75D4E000
trusted library allocation
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F6B28B000
trusted library allocation
page read and write
19F6FE85000
trusted library allocation
page read and write
19F75A8F000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6496F000
heap
page read and write
19F6B129000
heap
page read and write
19F7697E000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6F4CF000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
CDFE7FE000
unkown
page readonly
19F6F58C000
trusted library allocation
page read and write
19F700B0000
trusted library allocation
page read and write
19F6F269000
trusted library allocation
page read and write
1DA3060A000
trusted library allocation
page read and write
19F75CA8000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F64941000
heap
page read and write
19F6F0E4000
trusted library allocation
page read and write
19F6F5BB000
trusted library allocation
page read and write
19F64972000
heap
page read and write
19F6E4CE000
trusted library allocation
page read and write
19F6F24E000
trusted library allocation
page read and write
19F75FD2000
trusted library allocation
page read and write
19F76947000
trusted library allocation
page read and write
19F6B287000
trusted library allocation
page read and write
19F6A8D3000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F7A534000
trusted library allocation
page read and write
19F6F5BC000
trusted library allocation
page read and write
19F7694F000
trusted library allocation
page read and write
19F75DF7000
trusted library allocation
page read and write
19F6D6F5000
trusted library allocation
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F75C4B000
trusted library allocation
page read and write
19F6FF1E000
trusted library allocation
page read and write
19F6B28D000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6B283000
trusted library allocation
page read and write
19F7B104000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
1DA31260000
heap
page read and write
19F70009000
trusted library allocation
page read and write
19F75AD6000
trusted library allocation
page read and write
19F6E1D6000
trusted library allocation
page read and write
19F7690D000
trusted library allocation
page read and write
19F758BC000
trusted library allocation
page read and write
19F75FA6000
trusted library allocation
page read and write
CDFF8BE000
unkown
page readonly
19F75C8A000
trusted library allocation
page read and write
19F64935000
heap
page read and write
19F6496F000
heap
page read and write
1ACB3C66000
trusted library allocation
page read and write
19F6B368000
trusted library allocation
page read and write
19F779EA000
trusted library allocation
page read and write
19F6B282000
trusted library allocation
page read and write
19F6EEF3000
trusted library allocation
page read and write
19F712B6000
trusted library allocation
page read and write
19F7007C000
trusted library allocation
page read and write
19F6492B000
heap
page read and write
19F6EACD000
trusted library allocation
page read and write
19F64999000
heap
page read and write
16F2000
heap
page read and write
19F75AA5000
trusted library allocation
page read and write
19F6DCBE000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F64996000
heap
page read and write
19F64957000
heap
page read and write
19F6AA95000
trusted library allocation
page read and write
19F75F86000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F70E70000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F70D61000
trusted library allocation
page read and write
19F6F4C8000
trusted library allocation
page read and write
1DA31269000
heap
page read and write
19F64969000
heap
page read and write
19F711A2000
trusted library allocation
page read and write
19F64922000
heap
page read and write
19F75FCE000
trusted library allocation
page read and write
19F6FCD2000
trusted library allocation
page read and write
19F6F265000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F64941000
heap
page read and write
19F6E42E000
trusted library allocation
page read and write
19F70F87000
trusted library allocation
page read and write
16ED000
heap
page read and write
CD81FFE000
unkown
page readonly
19F714D5000
trusted library allocation
page read and write
19F7A654000
trusted library allocation
page read and write
19F7B037000
trusted library allocation
page read and write
25456623000
trusted library allocation
page read and write
19F6F2FD000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6499E000
heap
page read and write
19F75BAF000
trusted library allocation
page read and write
1ACB38A0000
unclassified section
page readonly
19F6F0AB000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6F465000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F75A93000
trusted library allocation
page read and write
19F6FC16000
trusted library allocation
page read and write
19F6F44E000
trusted library allocation
page read and write
19F779FB000
trusted library allocation
page read and write
19F6B125000
heap
page read and write
19F7AD90000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F70FE8000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F6496D000
heap
page read and write
19F6499C000
heap
page read and write
24EE7D0A000
trusted library allocation
page read and write
19F7A77F000
trusted library allocation
page read and write
19F75DFE000
trusted library allocation
page read and write
1DA3136E000
heap
page read and write
19F64999000
heap
page read and write
19F6FD6F000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F6B13D000
heap
page read and write
19F6EEBA000
trusted library allocation
page read and write
19F75DC4000
trusted library allocation
page read and write
19F714FD000
trusted library allocation
page read and write
19F692C3000
trusted library allocation
page read and write
C31000
unkown
page execute read
19F64944000
heap
page read and write
19F64959000
heap
page read and write
19F7C52F000
trusted library allocation
page read and write
19F6E1B2000
trusted library allocation
page read and write
19F75AFA000
trusted library allocation
page read and write
19F7594E000
trusted library allocation
page read and write
19F6F465000
trusted library allocation
page read and write
19F774C3000
trusted library allocation
page read and write
19F6B15C000
heap
page read and write
19F70E32000
trusted library allocation
page read and write
19F6B3A8000
trusted library allocation
page read and write
25456672000
trusted library allocation
page read and write
19F6F48A000
trusted library allocation
page read and write
19F75FCA000
trusted library allocation
page read and write
19F76ACC000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F75CCD000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6F53B000
trusted library allocation
page read and write
19F77476000
trusted library allocation
page read and write
19F6F24C000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F7C52D000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6E4B4000
trusted library allocation
page read and write
1DA3125C000
heap
page read and write
19F6496F000
heap
page read and write
19F75C9D000
trusted library allocation
page read and write
19F6F5EE000
trusted library allocation
page read and write
19F6D6F4000
trusted library allocation
page read and write
19F75986000
trusted library allocation
page read and write
19F75C25000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F77487000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F6F441000
trusted library allocation
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F6EEE6000
trusted library allocation
page read and write
19F75D8E000
trusted library allocation
page read and write
19F7C5CF000
trusted library allocation
page read and write
19F6F44A000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F649B6000
heap
page read and write
19F6DCC8000
trusted library allocation
page read and write
1ACB3D12000
unclassified section
page read and write
19F6496F000
heap
page read and write
19F64971000
heap
page read and write
19F7C522000
trusted library allocation
page read and write
19F6D890000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6B386000
trusted library allocation
page read and write
19F6EA95000
trusted library allocation
page read and write
1DA3136E000
heap
page read and write
19F6EAA2000
trusted library allocation
page read and write
19F7690F000
trusted library allocation
page read and write
19F6F98F000
trusted library allocation
page read and write
19F7118A000
trusted library allocation
page read and write
19F6F98E000
trusted library allocation
page read and write
19F76CDC000
trusted library allocation
page read and write
19F77474000
trusted library allocation
page read and write
19F6F998000
trusted library allocation
page read and write
19F64975000
heap
page read and write
1ACB3980000
heap
page read and write
1DA312AA000
heap
page read and write
19F7B112000
trusted library allocation
page read and write
1DA307B4000
heap
page read and write
19F6F457000
trusted library allocation
page read and write
1ACB3984000
heap
page read and write
19F75D85000
trusted library allocation
page read and write
19F6B37A000
trusted library allocation
page read and write
19F6D4E1000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F7695F000
trusted library allocation
page read and write
19F758BA000
trusted library allocation
page read and write
19F6B13A000
heap
page read and write
19F70D7A000
trusted library allocation
page read and write
19F6F5C4000
trusted library allocation
page read and write
19F700B8000
trusted library allocation
page read and write
19F7C522000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F70D93000
trusted library allocation
page read and write
19F6F2E4000
trusted library allocation
page read and write
19F700FD000
trusted library allocation
page read and write
19F75995000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F6495D000
heap
page read and write
19F64940000
heap
page read and write
19F6E687000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F71146000
trusted library allocation
page read and write
19F6EEF3000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
1ACB3986000
heap
page read and write
19F64971000
heap
page read and write
19F76AB2000
trusted library allocation
page read and write
19F6E680000
trusted library allocation
page read and write
1534000
heap
page read and write
19F6495B000
heap
page read and write
19F6F9D1000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
1ACB3D1F000
unclassified section
page read and write
19F759F8000
trusted library allocation
page read and write
19F64976000
heap
page read and write
19F75D52000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6496D000
heap
page read and write
19F649A2000
heap
page read and write
19F6F97F000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6496F000
heap
page read and write
1ACB3900000
remote allocation
page read and write
19F6EACA000
trusted library allocation
page read and write
19F6493C000
heap
page read and write
1D310F00000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F69A00000
trusted library allocation
page read and write
19F6A8A2000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F711B3000
trusted library allocation
page read and write
24EE7C00000
trusted library allocation
page read and write
19F7C4A7000
trusted library allocation
page read and write
19F76CC3000
trusted library allocation
page read and write
1ACB3C1A000
trusted library allocation
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F6F487000
trusted library allocation
page read and write
1ACB3C30000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F64962000
heap
page read and write
19F649A2000
heap
page read and write
19F6E689000
trusted library allocation
page read and write
19F6E14A000
trusted library allocation
page read and write
19F7C5A8000
trusted library allocation
page read and write
19F64951000
heap
page read and write
19F6FEBF000
trusted library allocation
page read and write
19F77200000
trusted library allocation
page read and write
19F7690B000
trusted library allocation
page read and write
19F6F326000
trusted library allocation
page read and write
CDFF83E000
unkown
page readonly
19F75CCD000
trusted library allocation
page read and write
19F7A6A4000
trusted library allocation
page read and write
19F6D65F000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F64974000
heap
page read and write
19F769EC000
trusted library allocation
page read and write
1DA31322000
heap
page read and write
19F6D87E000
trusted library allocation
page read and write
19F75CAE000
trusted library allocation
page read and write
19F64984000
heap
page read and write
CFC000
unkown
page read and write
1DA312E0000
heap
page read and write
19F6EE94000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F70FD6000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6F9A3000
trusted library allocation
page read and write
19F64969000
heap
page read and write
19F700BA000
trusted library allocation
page read and write
19F6FD91000
trusted library allocation
page read and write
1580000
heap
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F70F8B000
trusted library allocation
page read and write
19F6FF91000
trusted library allocation
page read and write
19F6D433000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7747C000
trusted library allocation
page read and write
19F6F4C7000
trusted library allocation
page read and write
1ACB4000000
trusted library allocation
page read and write
19F6F4AA000
trusted library allocation
page read and write
19F759F8000
trusted library allocation
page read and write
1534000
heap
page read and write
19F6EA8C000
trusted library allocation
page read and write
19F76E80000
trusted library allocation
page read and write
19F6496B000
heap
page read and write
19F6D6F4000
trusted library allocation
page read and write
19F6B39C000
trusted library allocation
page read and write
19F75AEA000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6F0AB000
trusted library allocation
page read and write
19F64954000
heap
page read and write
19F70076000
trusted library allocation
page read and write
19F6EED4000
trusted library allocation
page read and write
2D8827E000
unkown
page readonly
19F75C7C000
trusted library allocation
page read and write
19F6F499000
trusted library allocation
page read and write
19F76ADA000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6F005000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F64952000
heap
page read and write
19F76970000
trusted library allocation
page read and write
19F6B12F000
heap
page read and write
19F64952000
heap
page read and write
1DA31358000
heap
page read and write
19F7B073000
trusted library allocation
page read and write
19F6E68C000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F649AC000
heap
page read and write
19F6F1E0000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F7A556000
trusted library allocation
page read and write
2D89BFE000
stack
page read and write
CDFEFFE000
stack
page read and write
19F7C436000
trusted library allocation
page read and write
19F6F4ED000
trusted library allocation
page read and write
19F711A5000
trusted library allocation
page read and write
19F77000000
trusted library allocation
page read and write
19F7A57C000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F7690D000
trusted library allocation
page read and write
19F70048000
trusted library allocation
page read and write
19F76AFA000
trusted library allocation
page read and write
19F70F1F000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6496F000
heap
page read and write
19F71177000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6494D000
heap
page read and write
19F70076000
trusted library allocation
page read and write
19F7A5EA000
trusted library allocation
page read and write
19F6F1E7000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F75CAB000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F7A65F000
trusted library allocation
page read and write
19F6E499000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6E4C7000
trusted library allocation
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6F5E0000
trusted library allocation
page read and write
19F75D51000
trusted library allocation
page read and write
19F6B12F000
heap
page read and write
19F69290000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6496D000
heap
page read and write
19F6F48A000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6F4A8000
trusted library allocation
page read and write
19F6FFEA000
trusted library allocation
page read and write
19F6FCA7000
trusted library allocation
page read and write
19F6B2CE000
trusted library allocation
page read and write
19F64922000
heap
page read and write
19F64946000
heap
page read and write
19F75DF7000
trusted library allocation
page read and write
19F6D433000
trusted library allocation
page read and write
19F6B28D000
trusted library allocation
page read and write
1DA3136E000
heap
page read and write
19F75DBF000
trusted library allocation
page read and write
19F7C420000
trusted library allocation
page read and write
19F75C38000
trusted library allocation
page read and write
19F70021000
trusted library allocation
page read and write
19F6F441000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F7B165000
trusted library allocation
page read and write
19F6F58C000
trusted library allocation
page read and write
19F6B3C4000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6F432000
trusted library allocation
page read and write
19F700F9000
trusted library allocation
page read and write
19F6F0F9000
trusted library allocation
page read and write
19F76AEC000
trusted library allocation
page read and write
19F6F485000
trusted library allocation
page read and write
19F75A78000
trusted library allocation
page read and write
19F6D88A000
trusted library allocation
page read and write
19F64959000
heap
page read and write
19F7C52D000
trusted library allocation
page read and write
19F6493E000
heap
page read and write
19F6998D000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6B368000
trusted library allocation
page read and write
19F70FC8000
trusted library allocation
page read and write
19F6EEC8000
trusted library allocation
page read and write
19F6F9CE000
trusted library allocation
page read and write
1DA30681000
trusted library allocation
page read and write
19F76AF3000
trusted library allocation
page read and write
CF2000
unkown
page readonly
19F70DE5000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F76A39000
trusted library allocation
page read and write
1DA30761000
unkown
page execute read
19F6F48E000
trusted library allocation
page read and write
16C8000
heap
page read and write
19F64962000
heap
page read and write
19F7003E000
trusted library allocation
page read and write
19F6F9BF000
trusted library allocation
page read and write
19F7695F000
trusted library allocation
page read and write
19F6B11B000
heap
page read and write
19F7B02B000
trusted library allocation
page read and write
19F75CAA000
trusted library allocation
page read and write
19F70F9C000
trusted library allocation
page read and write
19F769A5000
trusted library allocation
page read and write
19F70FE8000
trusted library allocation
page read and write
19F7C555000
trusted library allocation
page read and write
19F7B0FC000
trusted library allocation
page read and write
19F700D7000
trusted library allocation
page read and write
19F711A5000
trusted library allocation
page read and write
19F64951000
heap
page read and write
19F6F454000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F7692F000
trusted library allocation
page read and write
1D310DF0000
heap
page read and write
19F6ABF4000
trusted library allocation
page read and write
19F6B3C4000
trusted library allocation
page read and write
19F6F575000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6496D000
heap
page read and write
19F6499C000
heap
page read and write
19F6496F000
heap
page read and write
1DA303C0000
unclassified section
page read and write
CD817FE000
stack
page read and write
19F76927000
trusted library allocation
page read and write
19F75DC4000
trusted library allocation
page read and write
19F6F4A8000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F7B0B5000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F6A8A4000
trusted library allocation
page read and write
19F6B21F000
trusted library allocation
page read and write
19F6F573000
trusted library allocation
page read and write
553C1FE000
stack
page read and write
19F6F281000
trusted library allocation
page read and write
19F6EEE1000
trusted library allocation
page read and write
19F6EAB9000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F649AB000
heap
page read and write
19F649AB000
heap
page read and write
19F6493D000
heap
page read and write
19F759FE000
trusted library allocation
page read and write
19F7004D000
trusted library allocation
page read and write
19F700B0000
trusted library allocation
page read and write
19F6F487000
trusted library allocation
page read and write
19F6F040000
trusted library allocation
page read and write
19F6E4FC000
trusted library allocation
page read and write
19F7692F000
trusted library allocation
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6B26D000
trusted library allocation
page read and write
19F75981000
trusted library allocation
page read and write
19F6E157000
trusted library allocation
page read and write
19F6F5B6000
trusted library allocation
page read and write
19F64974000
heap
page read and write
19F75B86000
trusted library allocation
page read and write
19F6E13E000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6499C000
heap
page read and write
19F6499D000
heap
page read and write
19F70F8D000
trusted library allocation
page read and write
19F64971000
heap
page read and write
19F7118C000
trusted library allocation
page read and write
19F70E8A000
trusted library allocation
page read and write
19F649D3000
heap
page read and write
19F64959000
heap
page read and write
19F64996000
heap
page read and write
19F64934000
heap
page read and write
19F649A2000
heap
page read and write
3B50000
trusted library allocation
page read and write
1DA31111000
trusted library allocation
page read and write
19F6E192000
trusted library allocation
page read and write
19F6499C000
heap
page read and write
19F6496D000
heap
page read and write
19F6B12F000
heap
page read and write
19F6496F000
heap
page read and write
19F6F52B000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F6FDE1000
trusted library allocation
page read and write
19F7B12A000
trusted library allocation
page read and write
19F6B3A3000
trusted library allocation
page read and write
16FE000
heap
page read and write
19F64971000
heap
page read and write
19F64999000
heap
page read and write
19F75DC7000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F64971000
heap
page read and write
19F6B3C1000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F711B0000
trusted library allocation
page read and write
19F77476000
trusted library allocation
page read and write
19F6DCD7000
trusted library allocation
page read and write
19F6B3DC000
trusted library allocation
page read and write
19F649A2000
heap
page read and write
19F7A52A000
trusted library allocation
page read and write
1DA3125C000
heap
page read and write
19F6F5DC000
trusted library allocation
page read and write
19F6495B000
heap
page read and write
19F7C584000
trusted library allocation
page read and write
19F769FC000
trusted library allocation
page read and write
1ACB3F03000
trusted library allocation
page read and write
19F6F587000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F6F0F2000
trusted library allocation
page read and write
19F75C4B000
trusted library allocation
page read and write
19F700C0000
trusted library allocation
page read and write
19F75D65000
trusted library allocation
page read and write
1DA312EF000
heap
page read and write
19F7A717000
trusted library allocation
page read and write
19F64962000
heap
page read and write
19F7747C000
trusted library allocation
page read and write
19F6FC3F000
trusted library allocation
page read and write
CDFC5DE000
stack
page read and write
19F75F70000
trusted library allocation
page read and write
19F6F4AA000
trusted library allocation
page read and write
1DA30500000
trusted library allocation
page read and write
19F7747E000
trusted library allocation
page read and write
19F6494D000
heap
page read and write
3B50000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F75FFE000
trusted library allocation
page read and write
19F64955000
heap
page read and write
19F6AADC000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F6495C000
heap
page read and write
19F75C1C000
trusted library allocation
page read and write
19F6B3BB000
trusted library allocation
page read and write
19F6F2EE000
trusted library allocation
page read and write
19F6F5D6000
trusted library allocation
page read and write
19F6EEE8000
trusted library allocation
page read and write
CCC000
unkown
page readonly
19F6F057000
trusted library allocation
page read and write
24EE7A92000
heap
page read and write
19F64999000
heap
page read and write
19F6E4C5000
trusted library allocation
page read and write
19F76A44000
trusted library allocation
page read and write
19F70EFD000
trusted library allocation
page read and write
19F6D6A9000
trusted library allocation
page read and write
19F70DBD000
trusted library allocation
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F6E673000
trusted library allocation
page read and write
19F70FFA000
trusted library allocation
page read and write
19F75C11000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F76AAD000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F5FC000
trusted library allocation
page read and write
19F700BA000
trusted library allocation
page read and write
1DA31209000
heap
page read and write
1DA31344000
heap
page read and write
19F7699C000
trusted library allocation
page read and write
19F7A7FC000
trusted library allocation
page read and write
19F6F4F8000
trusted library allocation
page read and write
19F64948000
heap
page read and write
19F71452000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F7C57C000
trusted library allocation
page read and write
19F6F4D4000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6ECE0000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6FF63000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F64955000
heap
page read and write
19F7C5A8000
trusted library allocation
page read and write
19F76AEC000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6EEA3000
trusted library allocation
page read and write
19F692A4000
trusted library allocation
page read and write
1DA31379000
heap
page read and write
19F75C89000
trusted library allocation
page read and write
19F6EACA000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F75A1F000
trusted library allocation
page read and write
19F6FEC5000
trusted library allocation
page read and write
1DA3128A000
heap
page read and write
25456808000
heap
page read and write
19F712FD000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6499C000
heap
page read and write
19F6B3B9000
trusted library allocation
page read and write
19F6B39A000
trusted library allocation
page read and write
1ACB3C5D000
trusted library allocation
page read and write
19F6E4FC000
trusted library allocation
page read and write
1DA31358000
heap
page read and write
19F64962000
heap
page read and write
1DA307B0000
heap
page read and write
19F6F07E000
trusted library allocation
page read and write
1ACB3C63000
trusted library allocation
page read and write
19F6495D000
heap
page read and write
19F6EC92000
trusted library allocation
page read and write
19F6F081000
trusted library allocation
page read and write
19F6E4C5000
trusted library allocation
page read and write
D04000
unkown
page readonly
19F70053000
trusted library allocation
page read and write
19F6F4AE000
trusted library allocation
page read and write
19F6EECB000
trusted library allocation
page read and write
19F6D88F000
trusted library allocation
page read and write
19F6FDA0000
trusted library allocation
page read and write
19F6497A000
heap
page read and write
19F6D4DC000
trusted library allocation
page read and write
19F7C57C000
trusted library allocation
page read and write
19F75FAD000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64948000
heap
page read and write
19F6D462000
trusted library allocation
page read and write
19F6B38E000
trusted library allocation
page read and write
19F75CA4000
trusted library allocation
page read and write
19F649A3000
heap
page read and write
16FE000
heap
page read and write
19F6E4C5000
trusted library allocation
page read and write
19F6E142000
trusted library allocation
page read and write
19F6982F000
trusted library allocation
page read and write
19F6FFE2000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F6496D000
heap
page read and write
1DA30768000
unkown
page execute read
19F64996000
heap
page read and write
19F75CCA000
trusted library allocation
page read and write
19F76AF1000
trusted library allocation
page read and write
1ACB3960000
heap
page read and write
19F7B1CD000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F7125E000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F6EABD000
trusted library allocation
page read and write
19F64996000
heap
page read and write
19F714B7000
trusted library allocation
page read and write
19F6FDCA000
trusted library allocation
page read and write
19F6D6CB000
trusted library allocation
page read and write
1ACB3CB2000
trusted library allocation
page read and write
19F6B381000
trusted library allocation
page read and write
19F70DCF000
trusted library allocation
page read and write
19F711B0000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F6B35A000
trusted library allocation
page read and write
19F75DB6000
trusted library allocation
page read and write
19F64940000
heap
page read and write
1DA30677000
trusted library allocation
page read and write
19F64940000
heap
page read and write
19F6F4E8000
trusted library allocation
page read and write
19F6D4C3000
trusted library allocation
page read and write
19F7C584000
trusted library allocation
page read and write
19F711B3000
trusted library allocation
page read and write
19F64946000
heap
page read and write
19F72602000
trusted library allocation
page read and write
19F7A663000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F75FD4000
trusted library allocation
page read and write
19F64952000
heap
page read and write
19F64924000
heap
page read and write
19F6496D000
heap
page read and write
19F64934000
heap
page read and write
19F64944000
heap
page read and write
19F6B370000
trusted library allocation
page read and write
19F6F53F000
trusted library allocation
page read and write
19F6D645000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F700B8000
trusted library allocation
page read and write
19F6499D000
heap
page read and write
114B3FE000
stack
page read and write
19F64965000
heap
page read and write
19F64924000
heap
page read and write
19F7A6BF000
trusted library allocation
page read and write
19F6AA7A000
trusted library allocation
page read and write
25456180000
heap
page readonly
19F64961000
heap
page read and write
19F6F9C9000
trusted library allocation
page read and write
19F649A3000
heap
page read and write
1DA312E6000
heap
page read and write
19F6E1F2000
trusted library allocation
page read and write
19F7593C000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F759F2000
trusted library allocation
page read and write
19F6F9C3000
trusted library allocation
page read and write
19F6E479000
trusted library allocation
page read and write
19F6ABC7000
trusted library allocation
page read and write
1DA3132A000
heap
page read and write
1DA304E0000
trusted library allocation
page read and write
1DA30750000
trusted library allocation
page read and write
19F6E496000
trusted library allocation
page read and write
19F76ACC000
trusted library allocation
page read and write
19F70E9F000
trusted library allocation
page read and write
19F75DE7000
trusted library allocation
page read and write
19F6FE4C000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F7C5FE000
trusted library allocation
page read and write
19F6B3FC000
trusted library allocation
page read and write
19F6E41E000
trusted library allocation
page read and write
19F76CF0000
trusted library allocation
page read and write
19F712AD000
trusted library allocation
page read and write
19F64934000
heap
page read and write
19F71158000
trusted library allocation
page read and write
19F6F4D4000
trusted library allocation
page read and write
19F6FCD9000
trusted library allocation
page read and write
19F70D59000
trusted library allocation
page read and write
19F6F29A000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F649A2000
heap
page read and write
19F6D463000
trusted library allocation
page read and write
19F75C80000
trusted library allocation
page read and write
1ACB3CC4000
trusted library allocation
page read and write
19F64999000
heap
page read and write
19F6EEC2000
trusted library allocation
page read and write
19F64924000
heap
page read and write
19F64959000
heap
page read and write
19F70F92000
trusted library allocation
page read and write
19F6EAC1000
trusted library allocation
page read and write
19F6499A000
heap
page read and write
19F6F084000
trusted library allocation
page read and write
1DA312A1000
heap
page read and write
19F64999000
heap
page read and write
19F6EA93000
trusted library allocation
page read and write
19F6F246000
trusted library allocation
page read and write
19F70095000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F64941000
heap
page read and write
19F6F5A7000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F6D4E7000
trusted library allocation
page read and write
19F6F5E3000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F70020000
trusted library allocation
page read and write
19F70FBB000
trusted library allocation
page read and write
19F64940000
heap
page read and write
1DA312E6000
heap
page read and write
1DA31377000
heap
page read and write
19F7B163000
trusted library allocation
page read and write
19F6F537000
trusted library allocation
page read and write
19F64935000
heap
page read and write
19F6F485000
trusted library allocation
page read and write
19F64961000
heap
page read and write
553975E000
stack
page read and write
19F75DD3000
trusted library allocation
page read and write
19F7A654000
trusted library allocation
page read and write
19F649D3000
heap
page read and write
19F6F5D6000
trusted library allocation
page read and write
1DA312F1000
heap
page read and write
19F7C535000
trusted library allocation
page read and write
19F64979000
heap
page read and write
13BF000
stack
page read and write
19F700B0000
trusted library allocation
page read and write
19F6496D000
heap
page read and write
19F70E76000
trusted library allocation
page read and write
19F6F019000
trusted library allocation
page read and write
19F6D700000
trusted library allocation
page read and write
19F6D4E3000
trusted library allocation
page read and write
19F6E1C3000
trusted library allocation
page read and write
19F6DCE0000
trusted library allocation
page read and write
19F64961000
heap
page read and write
19F6F9DD000
trusted library allocation
page read and write
19F6F485000
trusted library allocation
page read and write
19F6D6A1000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
1DA312E8000
heap
page read and write
19F75D90000
trusted library allocation
page read and write
19F6FD7F000
trusted library allocation
page read and write
19F759F2000
trusted library allocation
page read and write
1ACB3C70000
trusted library allocation
page read and write
19F7A7FA000
trusted library allocation
page read and write
19F64967000
heap
page read and write
1DA312EF000
heap
page read and write
19F6B14D000
heap
page read and write
19F7A66B000
trusted library allocation
page read and write
19F6B3FC000
trusted library allocation
page read and write
19F75C9F000
trusted library allocation
page read and write
19F6E455000
trusted library allocation
page read and write
19F6FDC5000
trusted library allocation
page read and write
19F7116A000
trusted library allocation
page read and write
19F6F5A6000
trusted library allocation
page read and write
19F7A5F7000
trusted library allocation
page read and write
19F6F261000
trusted library allocation
page read and write
1ACB3C76000
trusted library allocation
page read and write
19F6F543000
trusted library allocation
page read and write
19F7692F000
trusted library allocation
page read and write
19F6494D000
heap
page read and write
19F758EB000
trusted library allocation
page read and write
19F76DF7000
heap
page read and write
19F6F995000
trusted library allocation
page read and write
19F6F5EB000
trusted library allocation
page read and write
19F64944000
heap
page read and write
19F6492B000
heap
page read and write
19F75F84000
trusted library allocation
page read and write
1DA306C2000
trusted library allocation
page read and write
19F64999000
heap
page read and write
1DA301B0000
unclassified section
page readonly
19F70ECB000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F7C5FE000
trusted library allocation
page read and write
19F75CD1000
trusted library allocation
page read and write
19F7C57F000
trusted library allocation
page read and write
19F6AB81000
trusted library allocation
page read and write
19F6AA95000
trusted library allocation
page read and write
19F6493D000
heap
page read and write
19F64962000
heap
page read and write
1D310E00000
heap
page read and write
19F70A00000
trusted library allocation
page read and write
19F6EE92000
trusted library allocation
page read and write
C31000
unkown
page execute read
19F6F54F000
trusted library allocation
page read and write
19F64941000
heap
page read and write
19F75C38000
trusted library allocation
page read and write
19F75F90000
trusted library allocation
page read and write
19F77413000
trusted library allocation
page read and write
19F6F454000
trusted library allocation
page read and write
19F759F0000
trusted library allocation
page read and write
19F714E2000
trusted library allocation
page read and write
19F7A6BC000
trusted library allocation
page read and write
19F6497B000
heap
page read and write
19F77474000
trusted library allocation
page read and write
19F6FDB1000
trusted library allocation
page read and write
19F77443000
trusted library allocation
page read and write
19F6493A000
heap
page read and write
19F6493E000
heap
page read and write
19F649A5000
heap
page read and write
19F6F4F1000
trusted library allocation
page read and write
19F6FCB8000
trusted library allocation
page read and write
19F6F5AE000
trusted library allocation
page read and write
19F700EE000
trusted library allocation
page read and write
19F6EC71000
trusted library allocation
page read and write
19F649AB000
heap
page read and write
19F649CB000
heap
page read and write
19F6497B000
heap
page read and write
19F64952000
heap
page read and write
19F6DCFC000
trusted library allocation
page read and write
19F649A5000
heap
page read and write
19F6493C000
heap
page read and write
19F7005E000
trusted library allocation
page read and write
19F6F4CF000
trusted library allocation
page read and write
19F7C5D6000
trusted library allocation
page read and write
19F6F4DC000
trusted library allocation
page read and write
19F64975000
heap
page read and write
19F6F9FB000
trusted library allocation
page read and write
19F75DE7000
trusted library allocation
page read and write
19F6496F000
heap
page read and write
19F649AB000
heap
page read and write
19F6499A000
heap
page read and write
19F64965000
heap
page read and write
19F6F567000
trusted library allocation
page read and write
There are 4037 hidden memdumps, click here to show them.