IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_86eb8470-c60d-4f76-9c03-3ab2cebecb21.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_86eb8470-c60d-4f76-9c03-3ab2cebecb21.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2f53fb4-f41f-4ad4-bf60-a7c4f431874e} 7812 "\\.\pipe\gecko-crash-server-pipe.7812" 1a2ee06d310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4200 -parentBuildID 20230927232528 -prefsHandle 3916 -prefMapHandle 3872 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {25cb7036-35d6-4930-967d-0ea6458a771e} 7812 "\\.\pipe\gecko-crash-server-pipe.7812" 1a3003be110 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5500 -prefMapHandle 5524 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd47ad4d-ee96-47ae-be13-5a28d62fa25a} 7812 "\\.\pipe\gecko-crash-server-pipe.7812" 1a309888b10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://gpuweb.github.io/gpuweb/_$reparentDisconnectables
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://github.com/w3c/csswg-drafts/issues/4650layout.css.grid-template-masonry-value.enabledsetWebT
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://compose.mail.yahoo.co.jp/ym/Compose?To=%s
unknown
https://www.google.com/complete/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.18.14
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
9B0000
heap
page read and write
malicious
9B7000
heap
page read and write
malicious
1A300735000
trusted library allocation
page read and write
1A30676A000
trusted library allocation
page read and write
23F47910000
unclassified section
page readonly
1A2FFCD9000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FF08E000
trusted library allocation
page read and write
1A305EB8000
trusted library allocation
page read and write
1A305FF3000
trusted library allocation
page read and write
1A2F9ED2000
trusted library allocation
page read and write
1A2FF98E000
trusted library allocation
page read and write
1A30A3FE000
trusted library allocation
page read and write
23F47B00000
trusted library allocation
page read and write
187A3540000
unclassified section
page readonly
1A30603A000
trusted library allocation
page read and write
1A3060EC000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A3002BE000
trusted library allocation
page read and write
1A2FC486000
trusted library allocation
page read and write
1A301BC8000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30A1E2000
trusted library allocation
page read and write
1A2FDDB0000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A2FE986000
trusted library allocation
page read and write
71B51FF000
stack
page read and write
1A2FF49A000
trusted library allocation
page read and write
1A2FF225000
trusted library allocation
page read and write
1A30085F000
trusted library allocation
page read and write
23F483FC000
heap
page read and write
1A30074C000
trusted library allocation
page read and write
1A30603A000
trusted library allocation
page read and write
23F47E5F000
trusted library allocation
page read and write
1A2FF324000
trusted library allocation
page read and write
1A2FDDF8000
trusted library allocation
page read and write
1A2FECF3000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FFCDB000
trusted library allocation
page read and write
1A2FDA63000
trusted library allocation
page read and write
1A3005AB000
trusted library allocation
page read and write
1A306068000
trusted library allocation
page read and write
1A30A1D9000
trusted library allocation
page read and write
1A2FE949000
trusted library allocation
page read and write
1A3017F7000
trusted library allocation
page read and write
1A2F4E2D000
heap
page read and write
8A0000
heap
page read and write
1A301942000
trusted library allocation
page read and write
1A2F4E1C000
heap
page read and write
1A2FDD9F000
trusted library allocation
page read and write
1A302244000
heap
page read and write
23F47DB0000
heap
page read and write
1A3079DE000
trusted library allocation
page read and write
7DB0C3D000
stack
page read and write
1A2FE97D000
trusted library allocation
page read and write
1A2FE1D0000
trusted library allocation
page read and write
1A2FDC3C000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A30A64F000
trusted library allocation
page read and write
1A3007A3000
trusted library allocation
page read and write
1A2F4E12000
heap
page read and write
1A2FB09A000
trusted library allocation
page read and write
1A2FE9AC000
trusted library allocation
page read and write
1A2FDC86000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30199F000
trusted library allocation
page read and write
1A30A043000
trusted library allocation
page read and write
1A30A23B000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A30A370000
trusted library allocation
page read and write
1A30A196000
trusted library allocation
page read and write
266FC5E0000
heap
page read and write
187A35C0000
unclassified section
page readonly
1A2FC4C8000
trusted library allocation
page read and write
A63D1FB000
stack
page read and write
1A300573000
trusted library allocation
page read and write
9C5000
heap
page read and write
1A306079000
trusted library allocation
page read and write
1A301730000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E3B000
heap
page read and write
1A2FAFC5000
trusted library allocation
page read and write
1A30222A000
heap
page read and write
1A3006B9000
trusted library allocation
page read and write
24DE420C000
trusted library allocation
page read and write
23F47E14000
trusted library allocation
page read and write
1A30144B000
trusted library allocation
page read and write
1A30048C000
trusted library allocation
page read and write
1A2FE110000
trusted library allocation
page read and write
1A2FF17F000
trusted library allocation
page read and write
1A30797E000
trusted library allocation
page read and write
1A2F4E75000
heap
page read and write
1A2FE996000
trusted library allocation
page read and write
23F4896A000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FDD52000
trusted library allocation
page read and write
1A300249000
trusted library allocation
page read and write
1A2FAF6D000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E50000
heap
page read and write
1A2FEC75000
trusted library allocation
page read and write
1A2FE9A6000
trusted library allocation
page read and write
187A37A0000
heap
page readonly
1A30984F000
trusted library allocation
page read and write
1A2F4E05000
heap
page read and write
266FC240000
heap
page read and write
1A300957000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FFA85000
trusted library allocation
page read and write
1A2FD70A000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A305E62000
trusted library allocation
page read and write
23F47E18000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A3060EC000
trusted library allocation
page read and write
1A2FEC39000
trusted library allocation
page read and write
1A2FF94B000
trusted library allocation
page read and write
1A302205000
heap
page read and write
1A30797E000
trusted library allocation
page read and write
1A305EDC000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E21000
heap
page read and write
1A2F4E15000
heap
page read and write
1A2FF979000
trusted library allocation
page read and write
1A2FE1E8000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
1A30609C000
trusted library allocation
page read and write
1A2F4E3A000
heap
page read and write
1A2F9DF6000
trusted library allocation
page read and write
1A2FF078000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A3080A1000
trusted library allocation
page read and write
1A2FFA91000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A30A3F2000
trusted library allocation
page read and write
BE981BE000
unkown
page readonly
1A30074C000
trusted library allocation
page read and write
1A2FFCB8000
trusted library allocation
page read and write
1A2FF9D0000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
23F4848E000
heap
page read and write
1A300AF5000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A3007B8000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A2F4E12000
heap
page read and write
1A2FF1FE000
trusted library allocation
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2FF4EA000
trusted library allocation
page read and write
1A305FE1000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A30228D000
heap
page read and write
23F489B9000
heap
page read and write
23F47D32000
unclassified section
page read and write
1A30A22B000
trusted library allocation
page read and write
1A3019D8000
trusted library allocation
page read and write
1A2FFC7B000
trusted library allocation
page read and write
1A2FBABB000
trusted library allocation
page read and write
1A2FDD7F000
trusted library allocation
page read and write
1A2FFCB8000
trusted library allocation
page read and write
1A3007D0000
trusted library allocation
page read and write
23F48403000
heap
page read and write
1A3007CE000
trusted library allocation
page read and write
1A2FC47C000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FF2E7000
trusted library allocation
page read and write
1A2FAF24000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A305EDC000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A30175A000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FDD95000
trusted library allocation
page read and write
1A2FF1FB000
trusted library allocation
page read and write
1A3007C9000
trusted library allocation
page read and write
1A2F4E39000
heap
page read and write
1A2F4E66000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A3021CE000
heap
page read and write
1A305EBA000
trusted library allocation
page read and write
1A2FF3A8000
trusted library allocation
page read and write
1A3007AF000
trusted library allocation
page read and write
1A30988D000
trusted library allocation
page read and write
1A300A0B000
trusted library allocation
page read and write
3BD482A1E000
trusted library allocation
page read and write
1A301942000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E22000
heap
page read and write
1A305EE0000
trusted library allocation
page read and write
1A3017F3000
trusted library allocation
page read and write
1A2FF2DD000
trusted library allocation
page read and write
1A2FDA5B000
trusted library allocation
page read and write
1A3028AC000
trusted library allocation
page read and write
187A396E000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2FB0DD000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FF981000
trusted library allocation
page read and write
1A2F4DF8000
heap
page read and write
1A3004B1000
trusted library allocation
page read and write
1A2FF955000
trusted library allocation
page read and write
1A2FDD5A000
trusted library allocation
page read and write
1A2F4E15000
heap
page read and write
40F6B8000
stack
page read and write
1A300931000
trusted library allocation
page read and write
24DE3E00000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A2F4E33000
heap
page read and write
1A2FD709000
heap
page read and write
1A2FFCE4000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FEC0A000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A305F75000
trusted library allocation
page read and write
FA4000
unkown
page readonly
A63F1FE000
stack
page read and write
1A2FC4B8000
trusted library allocation
page read and write
1A3079D0000
trusted library allocation
page read and write
1A30092F000
trusted library allocation
page read and write
1A2F4E6D000
heap
page read and write
1A300AC2000
trusted library allocation
page read and write
1A30A1E8000
trusted library allocation
page read and write
1A30A0E7000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E38000
heap
page read and write
1A2FEC9D000
trusted library allocation
page read and write
1A2FBADA000
trusted library allocation
page read and write
1A2FC4A6000
trusted library allocation
page read and write
1A301C6D000
trusted library allocation
page read and write
1A301497000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2FB0DD000
trusted library allocation
page read and write
1A2FF489000
trusted library allocation
page read and write
1A30281C000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
24DE3B60000
unclassified section
page readonly
1A2FDAF8000
trusted library allocation
page read and write
1A2FD702000
heap
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A306018000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A2FFBBF000
trusted library allocation
page read and write
1A2F4E10000
heap
page read and write
23F48390000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A30844D000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
23F48999000
heap
page read and write
1A30A0F1000
trusted library allocation
page read and write
1A30174E000
trusted library allocation
page read and write
1A2FE97B000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A305E50000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E29000
heap
page read and write
1A301488000
trusted library allocation
page read and write
1A3007DD000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A3006EE000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A30606F000
trusted library allocation
page read and write
1A300954000
trusted library allocation
page read and write
1A3084C5000
trusted library allocation
page read and write
23F47EEB000
trusted library allocation
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2F4E79000
heap
page read and write
1A3007C9000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F48488000
heap
page read and write
1A3084AC000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FB096000
trusted library allocation
page read and write
1A3004BF000
trusted library allocation
page read and write
1A30A04D000
trusted library allocation
page read and write
1A30055A000
trusted library allocation
page read and write
4107FE000
stack
page read and write
1A300681000
trusted library allocation
page read and write
1A3007FE000
trusted library allocation
page read and write
9B9000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2FC454000
trusted library allocation
page read and write
1A2FF06B000
trusted library allocation
page read and write
1A2FFCE4000
trusted library allocation
page read and write
1A301722000
trusted library allocation
page read and write
8A4000
heap
page read and write
23F47E89000
trusted library allocation
page read and write
1A2F4E65000
heap
page read and write
84F000
stack
page read and write
1A2FE9A0000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A2F4E66000
heap
page read and write
1A30608D000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A3001B8000
trusted library allocation
page read and write
1A2FEAC3000
trusted library allocation
page read and write
1A2F4E44000
heap
page read and write
24DE3FFE000
trusted library allocation
page read and write
1A2FE9B6000
trusted library allocation
page read and write
23F48491000
heap
page read and write
1A30093A000
trusted library allocation
page read and write
1A30A1DD000
trusted library allocation
page read and write
1A2FF4CE000
trusted library allocation
page read and write
1A2FDD64000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
24DE3F49000
trusted library allocation
page read and write
1A2FF9C1000
trusted library allocation
page read and write
1A306030000
trusted library allocation
page read and write
1A3021EF000
heap
page read and write
1A30A1B5000
trusted library allocation
page read and write
7DB2C7E000
unkown
page readonly
1A306083000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2F4E26000
heap
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A300749000
trusted library allocation
page read and write
1A30A0E7000
trusted library allocation
page read and write
1A301747000
trusted library allocation
page read and write
1A2FECB6000
trusted library allocation
page read and write
1A2FAF13000
trusted library allocation
page read and write
1A3017F3000
trusted library allocation
page read and write
1A30A013000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FE1D2000
trusted library allocation
page read and write
1A7F9200000
trusted library allocation
page read and write
1A2FDDC6000
trusted library allocation
page read and write
1A2FB0A6000
trusted library allocation
page read and write
1A2FEC60000
trusted library allocation
page read and write
1A2FBA62000
trusted library allocation
page read and write
1A30988D000
trusted library allocation
page read and write
1A3005A5000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FAF13000
trusted library allocation
page read and write
1A3019FC000
trusted library allocation
page read and write
1A3008DD000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FF96F000
trusted library allocation
page read and write
1A2FDDF8000
trusted library allocation
page read and write
1A2FF0FB000
trusted library allocation
page read and write
1A3007A4000
trusted library allocation
page read and write
1A3009A5000
trusted library allocation
page read and write
1A3008E8000
trusted library allocation
page read and write
1A30A62A000
trusted library allocation
page read and write
1A306732000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
8A4000
heap
page read and write
23F4797C000
remote allocation
page execute read
1A300395000
trusted library allocation
page read and write
1A301753000
trusted library allocation
page read and write
1A30A3AB000
trusted library allocation
page read and write
1A2F4DF4000
heap
page read and write
1A308E02000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A306073000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2FADD6000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A300733000
trusted library allocation
page read and write
187A35E0000
heap
page read and write
1A2F4E2B000
heap
page read and write
1A2FF9F0000
trusted library allocation
page read and write
1A2F4EB9000
heap
page read and write
1A2FB125000
trusted library allocation
page read and write
1A305F24000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FEC66000
trusted library allocation
page read and write
1A2FFA9B000
trusted library allocation
page read and write
7DB247E000
stack
page read and write
1A300AE0000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FF2D3000
trusted library allocation
page read and write
1A2FF925000
trusted library allocation
page read and write
23F47EC7000
trusted library allocation
page read and write
23F4799A000
heap
page read and write
1A2FFA8F000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A306748000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A30609C000
trusted library allocation
page read and write
1A2FF2F2000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
187A37BF000
unclassified section
page read and write
1A2FF066000
trusted library allocation
page read and write
1A2FF31F000
trusted library allocation
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A3009E3000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
71B59FF000
stack
page read and write
1A2FE9C7000
trusted library allocation
page read and write
1A3017F9000
trusted library allocation
page read and write
23F48480000
heap
page read and write
1A305F42000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A3008ED000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A3017F9000
trusted library allocation
page read and write
1A2FF94B000
trusted library allocation
page read and write
1A306021000
trusted library allocation
page read and write
1A2FC42E000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A30A3AB000
trusted library allocation
page read and write
1A305F42000
trusted library allocation
page read and write
1A2FF46F000
trusted library allocation
page read and write
1A2F4E31000
heap
page read and write
1A3080F0000
trusted library allocation
page read and write
1A3017F9000
trusted library allocation
page read and write
1A2FAF24000
trusted library allocation
page read and write
1A30670B000
trusted library allocation
page read and write
1A30A3E5000
trusted library allocation
page read and write
266FC100000
heap
page read and write
1A2FFCDB000
trusted library allocation
page read and write
1A2F4E05000
heap
page read and write
1A3005F3000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
FA0000
unkown
page write copy
1A2F4E33000
heap
page read and write
1A305E68000
trusted library allocation
page read and write
1A2FFE0B000
trusted library allocation
page read and write
7DAE93E000
stack
page read and write
1A305E54000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
24DE3F79000
trusted library allocation
page read and write
1A2FFBD1000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A3098A1000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A3027F1000
trusted library allocation
page read and write
1A2FDC65000
trusted library allocation
page read and write
BE99BFE000
stack
page read and write
1A2F4E29000
heap
page read and write
39D0000
heap
page read and write
1A2F4E76000
heap
page read and write
1A2F4E24000
heap
page read and write
1A2F4E36000
heap
page read and write
1A30272F000
trusted library allocation
page read and write
1C40000
heap
page read and write
1A30A0B9000
trusted library allocation
page read and write
266FDD90000
heap
page read and write
1A3007A4000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
23F47C00000
heap
page read and write
1A3007C0000
trusted library allocation
page read and write
1A30199F000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A3009D8000
trusted library allocation
page read and write
1A2FFECE000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FDD85000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A3021F6000
heap
page read and write
1A3080F3000
trusted library allocation
page read and write
1A305E2F000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A30144B000
trusted library allocation
page read and write
1A30A1FD000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FDD6C000
trusted library allocation
page read and write
1A2FDDF8000
trusted library allocation
page read and write
24DE3B5C000
remote allocation
page execute read
1A2F4E0F000
heap
page read and write
1A2F4E05000
heap
page read and write
1A305EC3000
trusted library allocation
page read and write
1A2FF0A4000
trusted library allocation
page read and write
1A2F9D71000
trusted library allocation
page read and write
1A2FF9B9000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A2FBA62000
trusted library allocation
page read and write
1A2FE99D000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A300A16000
trusted library allocation
page read and write
1A2FEA75000
trusted library allocation
page read and write
1A2F97B3000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A300263000
trusted library allocation
page read and write
1A306032000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FC45D000
trusted library allocation
page read and write
1A306050000
trusted library allocation
page read and write
1A2F4E1E000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FFBAA000
trusted library allocation
page read and write
1A301D2E000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E70000
heap
page read and write
1A2F9D71000
trusted library allocation
page read and write
1A3080F3000
trusted library allocation
page read and write
1A2FE97F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A30A3F4000
trusted library allocation
page read and write
187A3B1D000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A2FFB8A000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A2F4E6C000
heap
page read and write
1A2FB0BE000
trusted library allocation
page read and write
1A2FF0E6000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2FEAA1000
trusted library allocation
page read and write
1A2FFAAB000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FDA19000
trusted library allocation
page read and write
1A2FF0B4000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A300A53000
trusted library allocation
page read and write
1A2F4E81000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FF3AB000
trusted library allocation
page read and write
1A2FF2C1000
trusted library allocation
page read and write
187A3A00000
unclassified section
page readonly
15EEF3E9000
trusted library allocation
page execute read
1A305EC8000
trusted library allocation
page read and write
1A2FF9D6000
trusted library allocation
page read and write
1A2F4E1B000
heap
page read and write
1A302279000
heap
page read and write
1A30178F000
trusted library allocation
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E33000
heap
page read and write
1A30A29A000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2FB052000
trusted library allocation
page read and write
1A305DE7000
trusted library allocation
page read and write
1A2FE1D1000
trusted library allocation
page read and write
1A30670B000
trusted library allocation
page read and write
1A2F9ED2000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
1A30A2EE000
trusted library allocation
page read and write
1A2FDA50000
trusted library allocation
page read and write
1A305F13000
trusted library allocation
page read and write
1A2FDD8C000
trusted library allocation
page read and write
1A2FFCAE000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FEC98000
trusted library allocation
page read and write
23F483A1000
heap
page read and write
1A2FDDF5000
trusted library allocation
page read and write
1A2FE98D000
trusted library allocation
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A3007A3000
trusted library allocation
page read and write
1A3006EE000
trusted library allocation
page read and write
1A2FE1FE000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FAF87000
trusted library allocation
page read and write
1A305F24000
trusted library allocation
page read and write
1A3007C7000
trusted library allocation
page read and write
1A30A2C3000
trusted library allocation
page read and write
1A30A1E2000
trusted library allocation
page read and write
1A30A3E9000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A2FF2D6000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A30797E000
trusted library allocation
page read and write
1A2FDA8B000
trusted library allocation
page read and write
1A300995000
trusted library allocation
page read and write
1A306100000
trusted library allocation
page read and write
1A305EA8000
trusted library allocation
page read and write
1A3006E9000
trusted library allocation
page read and write
1A2FDD7A000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A2FADFD000
trusted library allocation
page read and write
1A3008EA000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E10000
heap
page read and write
1A2FF502000
trusted library allocation
page read and write
1A2FE9BA000
trusted library allocation
page read and write
1A2F4E44000
heap
page read and write
1A309879000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A2FB0EB000
trusted library allocation
page read and write
1A301747000
trusted library allocation
page read and write
1A300A73000
trusted library allocation
page read and write
1A30A1F3000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A305E62000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A305E3F000
trusted library allocation
page read and write
1A2FC4F5000
trusted library allocation
page read and write
23F4842A000
heap
page read and write
1A30840C000
trusted library allocation
page read and write
266FC300000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F47DD9000
unkown
page execute read
3684000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A2FDDF5000
trusted library allocation
page read and write
1A3007FE000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E70000
heap
page read and write
1A309200000
trusted library allocation
page read and write
187A39C8000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
23F4897B000
heap
page read and write
1A2FDA6B000
trusted library allocation
page read and write
1A2FDD5A000
trusted library allocation
page read and write
1A30852C000
trusted library allocation
page read and write
1A309B67000
trusted library allocation
page read and write
1A2F4E44000
heap
page read and write
1A3007F3000
trusted library allocation
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A30A2C3000
trusted library allocation
page read and write
1A2FDA2B000
trusted library allocation
page read and write
1A2FE1D3000
trusted library allocation
page read and write
1A2FE1DB000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A305FD0000
trusted library allocation
page read and write
1A2F4E05000
heap
page read and write
1A2FF9D4000
trusted library allocation
page read and write
1A2F9781000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FE1FA000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A3060B6000
trusted library allocation
page read and write
1A2FF2F2000
trusted library allocation
page read and write
1A3014C8000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A309B37000
trusted library allocation
page read and write
1A2F4E15000
heap
page read and write
1A2FAF16000
trusted library allocation
page read and write
1A300249000
trusted library allocation
page read and write
1A3021F0000
heap
page read and write
1A2FF505000
trusted library allocation
page read and write
1A2FDA6B000
trusted library allocation
page read and write
1A2FEC66000
trusted library allocation
page read and write
1A2FFCDB000
trusted library allocation
page read and write
24DE3CE0000
heap
page read and write
1A2FFAFC000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E1D000
heap
page read and write
23F48492000
heap
page read and write
23F48400000
heap
page read and write
1A3009B8000
trusted library allocation
page read and write
23F4840C000
heap
page read and write
1A2FDDD3000
trusted library allocation
page read and write
1A2FD74C000
heap
page read and write
1A300954000
trusted library allocation
page read and write
1A2FDD62000
trusted library allocation
page read and write
1A305FA2000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2FDD88000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A308486000
trusted library allocation
page read and write
1A2FEAC1000
trusted library allocation
page read and write
1A2F97A9000
trusted library allocation
page read and write
BE9A4BE000
unkown
page readonly
1A30A3EE000
trusted library allocation
page read and write
1A30056E000
trusted library allocation
page read and write
1A2FDACE000
trusted library allocation
page read and write
1A30175D000
trusted library allocation
page read and write
266FC1F0000
heap
page read and write
1A2F4E1B000
heap
page read and write
1A30A642000
trusted library allocation
page read and write
1A2FDAF4000
trusted library allocation
page read and write
1A2F9E1B000
trusted library allocation
page read and write
1A2FEABD000
trusted library allocation
page read and write
1A2F4E75000
heap
page read and write
23F47D30000
unclassified section
page read and write
1A3005DC000
trusted library allocation
page read and write
1A2FDACF000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2F4E18000
heap
page read and write
1A30149A000
trusted library allocation
page read and write
1A2FDD3B000
trusted library allocation
page read and write
1A3007D0000
trusted library allocation
page read and write
1A2FADFD000
trusted library allocation
page read and write
1A3008A3000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A30093B000
trusted library allocation
page read and write
1A2FE131000
trusted library allocation
page read and write
39D1000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2F4E3D000
heap
page read and write
1A3007EB000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E6C000
heap
page read and write
1A305FB0000
trusted library allocation
page read and write
1A309893000
trusted library allocation
page read and write
1A305E4B000
trusted library allocation
page read and write
1A3019D6000
trusted library allocation
page read and write
1A2FF9F3000
trusted library allocation
page read and write
1A2FDA85000
trusted library allocation
page read and write
1A2FECA4000
trusted library allocation
page read and write
1A30288A000
trusted library allocation
page read and write
1A3007EC000
trusted library allocation
page read and write
1A2F9E7D000
trusted library allocation
page read and write
BE98BD8000
stack
page read and write
1A2FEC9F000
trusted library allocation
page read and write
ED1000
unkown
page execute read
1A2FEAC3000
trusted library allocation
page read and write
1A3019D6000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A30A657000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FD700000
heap
page read and write
1A2FF313000
trusted library allocation
page read and write
1A302205000
heap
page read and write
1A2FB0FE000
trusted library allocation
page read and write
1A302867000
trusted library allocation
page read and write
1A2FEA63000
trusted library allocation
page read and write
1A301C4D000
trusted library allocation
page read and write
1A7F8FB0000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FFCE5000
trusted library allocation
page read and write
1A2FECFA000
trusted library allocation
page read and write
1A2FD700000
heap
page read and write
23F48486000
heap
page read and write
1A2FF0F5000
trusted library allocation
page read and write
23F48961000
heap
page read and write
1A2FF08E000
trusted library allocation
page read and write
1A2F4E01000
heap
page read and write
1A2FDA72000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
E9E000
stack
page read and write
1A30608D000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A2FEC13000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
23F48489000
heap
page read and write
1A3006F3000
trusted library allocation
page read and write
1A3004BD000
trusted library allocation
page read and write
1A2F4E39000
heap
page read and write
1A3021C1000
heap
page read and write
1A30222A000
heap
page read and write
1A2F4E19000
heap
page read and write
24DE3F5D000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
23F47DB6000
heap
page read and write
1A2FDD5A000
trusted library allocation
page read and write
1A2FFAA2000
trusted library allocation
page read and write
1A300931000
trusted library allocation
page read and write
1A2FF98D000
trusted library allocation
page read and write
23F48409000
heap
page read and write
1A2FF9F5000
trusted library allocation
page read and write
187A3B00000
trusted library allocation
page read and write
1A30A027000
trusted library allocation
page read and write
1A305FFE000
trusted library allocation
page read and write
1A30A658000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
23F4840C000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FEC77000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FF0FB000
trusted library allocation
page read and write
1A2FAFDC000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A2F4E2A000
heap
page read and write
24DE3F70000
trusted library allocation
page read and write
1A2FAFED000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A2FFA8C000
trusted library allocation
page read and write
1A301463000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2FF9FC000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A2FFA23000
trusted library allocation
page read and write
1A2FBA62000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2FD6F8000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FF494000
trusted library allocation
page read and write
1A3079AD000
trusted library allocation
page read and write
1A2FF9FB000
trusted library allocation
page read and write
1A30220D000
heap
page read and write
1A300755000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4DF7000
heap
page read and write
1A30A665000
trusted library allocation
page read and write
266FDD9D000
heap
page read and write
1A30798B000
trusted library allocation
page read and write
1A3014A3000
trusted library allocation
page read and write
1A2FF30D000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FF4C3000
trusted library allocation
page read and write
1A2FAD56000
trusted library allocation
page read and write
1A2FDDB6000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E37000
heap
page read and write
1A2F9E9E000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E29000
heap
page read and write
1A3007FE000
trusted library allocation
page read and write
1A3009D8000
trusted library allocation
page read and write
1A2FFA8C000
trusted library allocation
page read and write
1A2FFA10000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A30A1AC000
trusted library allocation
page read and write
1A2FF3ED000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
23F4848E000
heap
page read and write
1A309886000
trusted library allocation
page read and write
1A302277000
heap
page read and write
1A3019D6000
trusted library allocation
page read and write
1A3005AB000
trusted library allocation
page read and write
1A2FEA4B000
trusted library allocation
page read and write
1A30A0B9000
trusted library allocation
page read and write
1A2FF933000
trusted library allocation
page read and write
1A2FFAAB000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E36000
heap
page read and write
1A2FAFDA000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A30A29A000
trusted library allocation
page read and write
266FDF40000
heap
page read and write
1A2FFDA7000
trusted library allocation
page read and write
1A3007C7000
trusted library allocation
page read and write
1A301D06000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A301C48000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A3008FB000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A2FC42F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FF9CA000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E33000
heap
page read and write
24DE3FC3000
trusted library allocation
page read and write
1A2FDA85000
trusted library allocation
page read and write
1A30A631000
trusted library allocation
page read and write
1A301C05000
trusted library allocation
page read and write
1A2FB0C7000
trusted library allocation
page read and write
1A3004A8000
trusted library allocation
page read and write
1A2FF9CC000
trusted library allocation
page read and write
1A2FF0C2000
trusted library allocation
page read and write
1A30054C000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FEA2C000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A3008E0000
trusted library allocation
page read and write
1A2F9F00000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A3019CD000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A2F4E14000
heap
page read and write
23F48400000
heap
page read and write
1A2FF999000
trusted library allocation
page read and write
24DE3F8E000
trusted library allocation
page read and write
1A309B05000
trusted library allocation
page read and write
1A30A0B0000
trusted library allocation
page read and write
1A2F4E15000
heap
page read and write
1A30056E000
trusted library allocation
page read and write
1A2FDDB2000
trusted library allocation
page read and write
1A3080F5000
trusted library allocation
page read and write
1A2FEC12000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FDDAD000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F47E10000
trusted library allocation
page read and write
1A308448000
trusted library allocation
page read and write
1A2FE9BA000
trusted library allocation
page read and write
1A30A0B9000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E24000
heap
page read and write
1A2F4E66000
heap
page read and write
1A2FBAD1000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A30085F000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A2F4E15000
heap
page read and write
1A3001EC000
trusted library allocation
page read and write
1A2FF24F000
trusted library allocation
page read and write
1A2FE1E8000
trusted library allocation
page read and write
1A2FF2D0000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A3007BA000
trusted library allocation
page read and write
266FC5E5000
heap
page read and write
23F47E23000
trusted library allocation
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
1A2FBA62000
trusted library allocation
page read and write
1A300596000
trusted library allocation
page read and write
1A7F8FB9000
heap
page read and write
1A2FFA23000
trusted library allocation
page read and write
7DB147E000
stack
page read and write
1A2F4E2B000
heap
page read and write
1A2FFBFC000
trusted library allocation
page read and write
1A2FF074000
trusted library allocation
page read and write
1A2FF0FB000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
1A3060F4000
trusted library allocation
page read and write
1A2FFCF0000
trusted library allocation
page read and write
1A30A2F5000
trusted library allocation
page read and write
1A2F9D23000
trusted library allocation
page read and write
1A30798B000
trusted library allocation
page read and write
1A2FF9EF000
trusted library allocation
page read and write
1A3060FA000
trusted library allocation
page read and write
1A300AD6000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E40000
heap
page read and write
1A7F9160000
heap
page read and write
1A30A194000
trusted library allocation
page read and write
1A2FE97E000
trusted library allocation
page read and write
1A2FF31F000
trusted library allocation
page read and write
1A2FDA1D000
trusted library allocation
page read and write
1A3007CE000
trusted library allocation
page read and write
1A2FFBA2000
trusted library allocation
page read and write
1A306083000
trusted library allocation
page read and write
1A30222A000
heap
page read and write
1A2FADE2000
trusted library allocation
page read and write
1A2FD729000
heap
page read and write
1A301D57000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FFA0D000
trusted library allocation
page read and write
1A2FE96F000
trusted library allocation
page read and write
1A308501000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
23F48400000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FFB62000
trusted library allocation
page read and write
9D1000
heap
page read and write
1A3001EC000
trusted library allocation
page read and write
1A309BAC000
trusted library allocation
page read and write
1A3007E6000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E29000
heap
page read and write
9D1000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2F4E20000
heap
page read and write
1A306043000
trusted library allocation
page read and write
1A2FF9CC000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FEC71000
trusted library allocation
page read and write
1A7F8E60000
heap
page read and write
1A2FEC30000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A2FF24B000
trusted library allocation
page read and write
1A2FF949000
trusted library allocation
page read and write
1A2FF259000
trusted library allocation
page read and write
1A2F97C1000
trusted library allocation
page read and write
23F48400000
heap
page read and write
1A2FDC7C000
trusted library allocation
page read and write
23F48409000
heap
page read and write
1A2FFDBE000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FF9D4000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A3005B5000
trusted library allocation
page read and write
1A300578000
trusted library allocation
page read and write
23F479E0000
heap
page read and write
23F4848E000
heap
page read and write
1A30A229000
trusted library allocation
page read and write
266FC23F000
heap
page read and write
1A2F4E70000
heap
page read and write
1A2F4E22000
heap
page read and write
1A305E52000
trusted library allocation
page read and write
1A2F4E36000
heap
page read and write
1A2FAF76000
trusted library allocation
page read and write
1A30601C000
trusted library allocation
page read and write
1A3019C6000
trusted library allocation
page read and write
1A2F4E65000
heap
page read and write
1A2F4E18000
heap
page read and write
1A2FF9CA000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30A229000
trusted library allocation
page read and write
1A2F97DF000
trusted library allocation
page read and write
1A2FE931000
trusted library allocation
page read and write
1A30A029000
trusted library allocation
page read and write
1A300945000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A300A3B000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FFA38000
trusted library allocation
page read and write
1A2FDDA7000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
1A2FE9BA000
trusted library allocation
page read and write
A63D1FF000
stack
page read and write
1A3007A4000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A300941000
trusted library allocation
page read and write
1A3060EA000
trusted library allocation
page read and write
1A2FF46F000
trusted library allocation
page read and write
1A2FEAB0000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
23F48488000
heap
page read and write
23F48400000
heap
page read and write
1A2FEA16000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A3006BB000
trusted library allocation
page read and write
1A30175D000
trusted library allocation
page read and write
1A2FAFD2000
trusted library allocation
page read and write
1A30A043000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2FEA63000
trusted library allocation
page read and write
1A30A64F000
trusted library allocation
page read and write
1A30031B000
trusted library allocation
page read and write
41103E000
stack
page read and write
1A2F4E0E000
heap
page read and write
1A3005DE000
trusted library allocation
page read and write
BE9BD3E000
stack
page read and write
1A2FB0EB000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A2FF1F3000
trusted library allocation
page read and write
1A30093E000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2FF066000
trusted library allocation
page read and write
1A30094E000
trusted library allocation
page read and write
1A2FDD83000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A305E68000
trusted library allocation
page read and write
1A2FF3F0000
trusted library allocation
page read and write
1A2FFCB5000
trusted library allocation
page read and write
1A3002FE000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FE11D000
trusted library allocation
page read and write
1A2FE1E7000
trusted library allocation
page read and write
1A305FF2000
trusted library allocation
page read and write
1A305F78000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FF442000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
23F483ED000
heap
page read and write
1A3079DE000
trusted library allocation
page read and write
1A2F979E000
trusted library allocation
page read and write
1A305EA8000
trusted library allocation
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A30A03B000
trusted library allocation
page read and write
1A30A22B000
trusted library allocation
page read and write
1A2F4E79000
heap
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FE98D000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E1F000
heap
page read and write
1A2FF31F000
trusted library allocation
page read and write
1A2F4E1E000
heap
page read and write
1A30794A000
trusted library allocation
page read and write
1A2FEC0F000
trusted library allocation
page read and write
1A30055A000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E14000
heap
page read and write
1A30A642000
trusted library allocation
page read and write
1A2FEAEF000
trusted library allocation
page read and write
1A300AD2000
trusted library allocation
page read and write
1A2F4E21000
heap
page read and write
1A3021CF000
heap
page read and write
1A2FDC68000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2F4E2F000
heap
page read and write
23F4842D000
heap
page read and write
1A300893000
trusted library allocation
page read and write
1A2FF224000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FAFAC000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FFCED000
trusted library allocation
page read and write
1A30A376000
trusted library allocation
page read and write
1A300372000
trusted library allocation
page read and write
1A301C63000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A3008FB000
trusted library allocation
page read and write
1A2FDC8E000
trusted library allocation
page read and write
1A2F4E80000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A306300000
trusted library allocation
page read and write
1A301495000
trusted library allocation
page read and write
1A2FDD61000
trusted library allocation
page read and write
1A30038C000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2F4E15000
heap
page read and write
1A3079A1000
trusted library allocation
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
BE9A47E000
stack
page read and write
1BBF000
stack
page read and write
1A2FE998000
trusted library allocation
page read and write
1A2F4E2E000
heap
page read and write
1A305E50000
trusted library allocation
page read and write
1A30A2C3000
trusted library allocation
page read and write
23F48409000
heap
page read and write
1A2FDD78000
trusted library allocation
page read and write
1A2FDA92000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2F4E36000
heap
page read and write
1A3007C2000
trusted library allocation
page read and write
187A3B16000
trusted library allocation
page read and write
1A300567000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A2FF2D8000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FAF24000
trusted library allocation
page read and write
1A3079F0000
trusted library allocation
page read and write
1A3017BC000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E22000
heap
page read and write
1A30A0AA000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
1A2F4E37000
heap
page read and write
1A2F4E70000
heap
page read and write
1A2FEC9D000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
1A3060E8000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
1A305EBA000
trusted library allocation
page read and write
1A30279E000
trusted library allocation
page read and write
1A2FC417000
trusted library allocation
page read and write
1A3007C7000
trusted library allocation
page read and write
1A2FEA3B000
trusted library allocation
page read and write
1A2FEC09000
trusted library allocation
page read and write
1A300752000
trusted library allocation
page read and write
1A2FDA9B000
trusted library allocation
page read and write
23F48400000
heap
page read and write
1A3008FD000
trusted library allocation
page read and write
1A305F1A000
trusted library allocation
page read and write
1A2FFCAE000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A3006EE000
trusted library allocation
page read and write
1A2FFB6C000
trusted library allocation
page read and write
1A2FFCB8000
trusted library allocation
page read and write
1A300523000
trusted library allocation
page read and write
1A3079B3000
trusted library allocation
page read and write
1A2FF2E7000
trusted library allocation
page read and write
1A3007AF000
trusted library allocation
page read and write
1A2FECD2000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FD741000
heap
page read and write
1A2FAD33000
trusted library allocation
page read and write
1A30A22B000
trusted library allocation
page read and write
1A2FB0DD000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
41077E000
stack
page read and write
24DE3ED0000
heap
page read and write
23F489AB000
heap
page read and write
1A2FEC5D000
trusted library allocation
page read and write
1A3022A1000
heap
page read and write
1A2FF9FE000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A7F920A000
trusted library allocation
page read and write
1A2FB0DD000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2FC4F4000
trusted library allocation
page read and write
1A30672E000
trusted library allocation
page read and write
1A2FF9CA000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E34000
heap
page read and write
1A2F4E31000
heap
page read and write
1A2FF9FC000
trusted library allocation
page read and write
1A2FEABA000
trusted library allocation
page read and write
1A2FFB7F000
trusted library allocation
page read and write
1A306030000
trusted library allocation
page read and write
1A2FDD9F000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E15000
heap
page read and write
1A3005CD000
trusted library allocation
page read and write
1A2FFA47000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A3007C0000
trusted library allocation
page read and write
1A2FF0F5000
trusted library allocation
page read and write
23F47D40000
trusted library section
page readonly
1A30A1FD000
trusted library allocation
page read and write
1A3007E6000
trusted library allocation
page read and write
1A2FF4CE000
trusted library allocation
page read and write
1A2FDC6C000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
82E000
stack
page read and write
1A2FF9DE000
trusted library allocation
page read and write
1A2FEA71000
trusted library allocation
page read and write
1A30A639000
trusted library allocation
page read and write
1A2F4E41000
heap
page read and write
1A300A85000
trusted library allocation
page read and write
1A30A2F5000
trusted library allocation
page read and write
1A3017E6000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FB122000
trusted library allocation
page read and write
1A2F9790000
trusted library allocation
page read and write
1A2FDC82000
trusted library allocation
page read and write
1A2FDDCC000
trusted library allocation
page read and write
1A2FFB62000
trusted library allocation
page read and write
1A30601C000
trusted library allocation
page read and write
1A2FF212000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
7DAF3D8000
stack
page read and write
1A2F4E22000
heap
page read and write
23F4841D000
heap
page read and write
1A2FEC0C000
trusted library allocation
page read and write
1A3008ED000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A2F4E29000
heap
page read and write
23F48290000
heap
page read and write
1A2FF275000
trusted library allocation
page read and write
1A30986F000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A3021F1000
heap
page read and write
1A30678E000
trusted library allocation
page read and write
1A30093B000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A2F4E40000
heap
page read and write
1A30A333000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FF999000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
1A300752000
trusted library allocation
page read and write
1A2FDDB4000
trusted library allocation
page read and write
1A3007F4000
trusted library allocation
page read and write
1A308533000
trusted library allocation
page read and write
1A302205000
heap
page read and write
1A2FFAF7000
trusted library allocation
page read and write
F9C000
unkown
page read and write
1A2F4E15000
heap
page read and write
1A2F4E1B000
heap
page read and write
1A2FF048000
trusted library allocation
page read and write
1A2FF976000
trusted library allocation
page read and write
1A2FF989000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2F4E41000
heap
page read and write
1A301452000
trusted library allocation
page read and write
1A2F4E2F000
heap
page read and write
1A2FD70C000
heap
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A2FDC64000
trusted library allocation
page read and write
23F48984000
heap
page read and write
266FDD9E000
heap
page read and write
1A2F4E36000
heap
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A301421000
trusted library allocation
page read and write
1A30A631000
trusted library allocation
page read and write
23F48491000
heap
page read and write
24DE3ED6000
heap
page read and write
1A2FBACD000
trusted library allocation
page read and write
187A3979000
trusted library allocation
page read and write
1A30A06F000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2FFBBC000
trusted library allocation
page read and write
1A2FDCCE000
trusted library allocation
page read and write
187A39CA000
trusted library allocation
page read and write
23F47EB2000
trusted library allocation
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A2FF4F8000
trusted library allocation
page read and write
1A309899000
trusted library allocation
page read and write
1A2FEAC1000
trusted library allocation
page read and write
71B61FF000
stack
page read and write
1A30A1EC000
trusted library allocation
page read and write
1A2FAF16000
trusted library allocation
page read and write
1A30A37E000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A30809C000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E65000
heap
page read and write
1A2F4E44000
heap
page read and write
1A2FF09B000
trusted library allocation
page read and write
1A30083B000
trusted library allocation
page read and write
1A2FE999000
trusted library allocation
page read and write
1A3005A5000
trusted library allocation
page read and write
1A2FE9A2000
trusted library allocation
page read and write
1A2FFCDE000
trusted library allocation
page read and write
BE9817B000
stack
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A2F4E7F000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FE110000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2F4E0F000
heap
page read and write
1A2FF4C5000
trusted library allocation
page read and write
1A30228D000
heap
page read and write
1A2F4E75000
heap
page read and write
7DB0BFE000
unkown
page readonly
1A2FEA7C000
trusted library allocation
page read and write
1A301479000
trusted library allocation
page read and write
1A2FDC1F000
trusted library allocation
page read and write
23F47DF0000
trusted library allocation
page read and write
187A3947000
trusted library allocation
page read and write
24DE3F5F000
trusted library allocation
page read and write
1A2FD74C000
heap
page read and write
1A2F4E24000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FAFD2000
trusted library allocation
page read and write
1A3084A7000
trusted library allocation
page read and write
1A2F4E05000
heap
page read and write
1A3007E6000
trusted library allocation
page read and write
24DE3E42000
unclassified section
page read and write
1A2FC46B000
trusted library allocation
page read and write
1A2FE9C3000
trusted library allocation
page read and write
24DE3F11000
trusted library allocation
page read and write
1A2FF069000
trusted library allocation
page read and write
1A3004AF000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A300954000
trusted library allocation
page read and write
1A3009B3000
trusted library allocation
page read and write
24DE4000000
heap
page read and write
187A3B13000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
1A2F4E37000
heap
page read and write
1A2FB0A1000
trusted library allocation
page read and write
1A2FEAA3000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2FF24F000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A301942000
trusted library allocation
page read and write
187A3923000
trusted library allocation
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E3D000
heap
page read and write
1A2FF96D000
trusted library allocation
page read and write
1A2FEA5B000
trusted library allocation
page read and write
1A30092A000
trusted library allocation
page read and write
1A2F4E27000
heap
page read and write
1A2F4E26000
heap
page read and write
1A30059B000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A301438000
trusted library allocation
page read and write
1A30A233000
trusted library allocation
page read and write
1A3006C3000
trusted library allocation
page read and write
1A2FF323000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A3002F3000
trusted library allocation
page read and write
1A305FD4000
trusted library allocation
page read and write
1A2FE131000
trusted library allocation
page read and write
1A2FC42F000
trusted library allocation
page read and write
41073E000
unkown
page readonly
1A30846D000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A2FDA24000
trusted library allocation
page read and write
1A30A1AC000
trusted library allocation
page read and write
1A3007B4000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FF9EA000
trusted library allocation
page read and write
1A2FF4E3000
trusted library allocation
page read and write
1A2FB0C7000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A30A372000
trusted library allocation
page read and write
1A3008BB000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
24DE3FF5000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FFA7A000
trusted library allocation
page read and write
1A3019D8000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A30173D000
trusted library allocation
page read and write
1A2FF242000
trusted library allocation
page read and write
1A2FADFD000
trusted library allocation
page read and write
1A2FDD7F000
trusted library allocation
page read and write
1A2FDDB6000
trusted library allocation
page read and write
1A2FF4C8000
trusted library allocation
page read and write
23F48491000
heap
page read and write
1A2FC4F5000
trusted library allocation
page read and write
1A2F4E41000
heap
page read and write
1A305FAC000
trusted library allocation
page read and write
1A2FFA4C000
trusted library allocation
page read and write
23F484C0000
heap
page read and write
1A2FAF16000
trusted library allocation
page read and write
1A305FE4000
trusted library allocation
page read and write
1A2FBADE000
trusted library allocation
page read and write
1A2F4E3B000
heap
page read and write
1A2FF30E000
trusted library allocation
page read and write
1A2FF9FE000
trusted library allocation
page read and write
1A2F4E71000
heap
page read and write
1A30A0FE000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A305EA8000
trusted library allocation
page read and write
23F48488000
heap
page read and write
1A2F4E29000
heap
page read and write
1A30A057000
trusted library allocation
page read and write
1A305E62000
trusted library allocation
page read and write
1A30074C000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A3007D0000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A30070A000
trusted library allocation
page read and write
1A2FF96B000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A2F4E2B000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A2FDA4C000
trusted library allocation
page read and write
1A3004B3000
trusted library allocation
page read and write
1A3017B5000
trusted library allocation
page read and write
1A2F4E77000
heap
page read and write
1A30A1F5000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A3007E3000
trusted library allocation
page read and write
7DAE8BE000
stack
page read and write
1A2FDA59000
trusted library allocation
page read and write
1A30A1BE000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
ED1000
unkown
page execute read
1A30A64F000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2FF038000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A309B50000
trusted library allocation
page read and write
1A3021F4000
heap
page read and write
1A2FDA8B000
trusted library allocation
page read and write
1A3022E7000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2FEA5A000
trusted library allocation
page read and write
1A2F4E6D000
heap
page read and write
1A305E5A000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2FE1B2000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FDA2B000
trusted library allocation
page read and write
1A2F4E1B000
heap
page read and write
1A30A374000
trusted library allocation
page read and write
40D3EC000
stack
page read and write
1A2FAD65000
trusted library allocation
page read and write
1A3014EA000
trusted library allocation
page read and write
1A2FF991000
trusted library allocation
page read and write
1A3079D0000
trusted library allocation
page read and write
1A3004B5000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A301765000
trusted library allocation
page read and write
1A3009AA000
trusted library allocation
page read and write
1A3080FD000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FF2AC000
trusted library allocation
page read and write
1A2FFCE1000
trusted library allocation
page read and write
1A2FF0BC000
trusted library allocation
page read and write
1A305FFC000
trusted library allocation
page read and write
1A2FDDCC000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FF24C000
trusted library allocation
page read and write
1A30600E000
trusted library allocation
page read and write
1A2F97A4000
trusted library allocation
page read and write
1A305FDC000
trusted library allocation
page read and write
1A300717000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A300A12000
trusted library allocation
page read and write
24DE3ED4000
heap
page read and write
1A30986F000
trusted library allocation
page read and write
1A30A235000
trusted library allocation
page read and write
1A2FF4EA000
trusted library allocation
page read and write
1A2FD702000
heap
page read and write
1A30A233000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FFC6C000
trusted library allocation
page read and write
1A30079E000
trusted library allocation
page read and write
23F4841D000
heap
page read and write
1A30093E000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A30A22D000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
41283E000
unkown
page readonly
1A305F2F000
trusted library allocation
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A3007C9000
trusted library allocation
page read and write
1A300328000
trusted library allocation
page read and write
1A2FEA63000
trusted library allocation
page read and write
1A2FAFE7000
trusted library allocation
page read and write
1A30A2F5000
trusted library allocation
page read and write
1A2FE970000
trusted library allocation
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A2FFC73000
trusted library allocation
page read and write
23F47EC4000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A30093E000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30A0E7000
trusted library allocation
page read and write
1A3080F7000
trusted library allocation
page read and write
1A301CE4000
trusted library allocation
page read and write
1A3007BA000
trusted library allocation
page read and write
1A305E47000
trusted library allocation
page read and write
1A30A3AB000
trusted library allocation
page read and write
1A30093E000
trusted library allocation
page read and write
1A3001E6000
trusted library allocation
page read and write
7DAE97E000
unkown
page readonly
1A305E3C000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2FEA2C000
trusted library allocation
page read and write
1A2FF059000
trusted library allocation
page read and write
1A2F4E4B000
heap
page read and write
1A2FFC5E000
trusted library allocation
page read and write
1A30098A000
trusted library allocation
page read and write
94E000
stack
page read and write
1A3017C0000
trusted library allocation
page read and write
1A2FE981000
trusted library allocation
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2FFCA8000
trusted library allocation
page read and write
1A30A3A8000
trusted library allocation
page read and write
1A308407000
trusted library allocation
page read and write
BE981FD000
stack
page read and write
1A3060F6000
trusted library allocation
page read and write
1A2FFB60000
trusted library allocation
page read and write
23F4848E000
heap
page read and write
ED0000
unkown
page readonly
23F48984000
heap
page read and write
1A2FDD4C000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FFA2B000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
40FF3E000
stack
page read and write
1A2FFB67000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A305F3F000
trusted library allocation
page read and write
17BF000
stack
page read and write
1A30798B000
trusted library allocation
page read and write
1A30679C000
trusted library allocation
page read and write
1A300813000
trusted library allocation
page read and write
24DE3FB0000
trusted library allocation
page read and write
1A2F4E1E000
heap
page read and write
1A2F4E24000
heap
page read and write
187A397E000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E16000
heap
page read and write
1A2F4E0F000
heap
page read and write
1A300AD8000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A3021F6000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A2F4E40000
heap
page read and write
1A3005E5000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A305E00000
trusted library allocation
page read and write
1A30A663000
trusted library allocation
page read and write
1A2FFA47000
trusted library allocation
page read and write
23F48486000
heap
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A30A3AB000
trusted library allocation
page read and write
F6C000
unkown
page readonly
23F48489000
heap
page read and write
1A2FE18B000
trusted library allocation
page read and write
1A2FEC13000
trusted library allocation
page read and write
1A2FDD7E000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A30A659000
trusted library allocation
page read and write
1A3080D0000
trusted library allocation
page read and write
1A305EA8000
trusted library allocation
page read and write
1A2FE9A2000
trusted library allocation
page read and write
1A2F4E75000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FAFD0000
trusted library allocation
page read and write
1A2FDC6C000
trusted library allocation
page read and write
A63E9FF000
stack
page read and write
1A2F4E33000
heap
page read and write
1A2F4E3E000
heap
page read and write
187A3B03000
trusted library allocation
page read and write
1A2FDA59000
trusted library allocation
page read and write
1A2FEC5D000
trusted library allocation
page read and write
1A301CA3000
trusted library allocation
page read and write
1A2FDD9A000
trusted library allocation
page read and write
1A30A2EE000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FDA72000
trusted library allocation
page read and write
1A302205000
heap
page read and write
9D1000
heap
page read and write
1A305ECA000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F97F9000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A301C0C000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FFCDB000
trusted library allocation
page read and write
1A3007AF000
trusted library allocation
page read and write
266FC210000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FF2CC000
trusted library allocation
page read and write
1A3003FE000
trusted library allocation
page read and write
1A2F4E78000
heap
page read and write
1A2F4E34000
heap
page read and write
1A3019C6000
trusted library allocation
page read and write
1A30A1D7000
trusted library allocation
page read and write
1A2F4E79000
heap
page read and write
1A2FAFCB000
trusted library allocation
page read and write
1A306732000
trusted library allocation
page read and write
1A305F56000
trusted library allocation
page read and write
1A305F24000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
39D1000
heap
page read and write
1A2FBA1E000
trusted library allocation
page read and write
1A302206000
heap
page read and write
24DE3E50000
heap
page read and write
1A300A1C000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2FDD59000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A2FF989000
trusted library allocation
page read and write
1A306748000
trusted library allocation
page read and write
1A3017C6000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A305F2D000
trusted library allocation
page read and write
1A3017F3000
trusted library allocation
page read and write
1A3060F2000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FF2E4000
trusted library allocation
page read and write
1A2FF167000
trusted library allocation
page read and write
1A2FEAAD000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FFA41000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2F4E13000
heap
page read and write
1A3080DA000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
1A2FEAEF000
trusted library allocation
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A30A19C000
trusted library allocation
page read and write
1A3019FC000
trusted library allocation
page read and write
1A30172D000
trusted library allocation
page read and write
1A2FDDB3000
trusted library allocation
page read and write
1A2FDACE000
trusted library allocation
page read and write
F92000
unkown
page readonly
1A2F4E15000
heap
page read and write
1A2FED67000
trusted library allocation
page read and write
1A30148F000
trusted library allocation
page read and write
1A3008BC000
trusted library allocation
page read and write
1A3084A3000
trusted library allocation
page read and write
1A30676F000
trusted library allocation
page read and write
1A3007B4000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FFCDB000
trusted library allocation
page read and write
1A3004B1000
trusted library allocation
page read and write
1A2FFCE1000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FECB3000
trusted library allocation
page read and write
1A2FDA29000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A305E62000
trusted library allocation
page read and write
1A3060F4000
trusted library allocation
page read and write
1A2FF9C1000
trusted library allocation
page read and write
1A3005C7000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A305FDB000
trusted library allocation
page read and write
1A3021ED000
heap
page read and write
1A2FEAEB000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2FF1E7000
trusted library allocation
page read and write
1A305EC3000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A305ED2000
trusted library allocation
page read and write
1A2FFC3B000
trusted library allocation
page read and write
1A2FF4F6000
trusted library allocation
page read and write
1A2FDD74000
trusted library allocation
page read and write
1A305F18000
trusted library allocation
page read and write
1A2FFB1F000
trusted library allocation
page read and write
1A2FEABA000
trusted library allocation
page read and write
1A2FEC66000
trusted library allocation
page read and write
1A300954000
trusted library allocation
page read and write
1A308405000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A2FBA62000
trusted library allocation
page read and write
266FDDA7000
heap
page read and write
1A3017F9000
trusted library allocation
page read and write
1A300700000
trusted library allocation
page read and write
3680000
heap
page read and write
1A3017F7000
trusted library allocation
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A30A0AA000
trusted library allocation
page read and write
1A309815000
trusted library allocation
page read and write
1A3083C8000
trusted library allocation
page read and write
1A3007CE000
trusted library allocation
page read and write
1A30A04D000
trusted library allocation
page read and write
1A30809A000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A305EEB000
trusted library allocation
page read and write
1A2FF9C1000
trusted library allocation
page read and write
24DE3BB0000
heap
page read and write
1A2FF9EF000
trusted library allocation
page read and write
1A2FF984000
trusted library allocation
page read and write
1A2F4EB6000
heap
page read and write
90E000
stack
page read and write
1A2F4E40000
heap
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A300263000
trusted library allocation
page read and write
1A2FDD7E000
trusted library allocation
page read and write
1A30A659000
trusted library allocation
page read and write
1A301495000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A2FF9CA000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2FF3AE000
trusted library allocation
page read and write
1A30090F000
trusted library allocation
page read and write
1A2FF30E000
trusted library allocation
page read and write
1A305F1E000
trusted library allocation
page read and write
1A2FF9D0000
trusted library allocation
page read and write
1A309841000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2F4E29000
heap
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2FFDA3000
trusted library allocation
page read and write
1A3007C0000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
1A2FBAC8000
trusted library allocation
page read and write
1A2FECB4000
trusted library allocation
page read and write
23F48483000
heap
page read and write
1A2FDDF8000
trusted library allocation
page read and write
187A3900000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A3005F3000
trusted library allocation
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A2FE115000
trusted library allocation
page read and write
23F4844A000
heap
page read and write
1A2F4E0D000
heap
page read and write
1A3079B3000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A30085B000
trusted library allocation
page read and write
1A3008E4000
trusted library allocation
page read and write
266FDD9B000
heap
page read and write
24DE3E40000
unclassified section
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A2F9EB7000
trusted library allocation
page read and write
15EEF401000
trusted library allocation
page execute read
1A2FFAA1000
trusted library allocation
page read and write
1A300739000
trusted library allocation
page read and write
1A2F4E41000
heap
page read and write
1A2F4E66000
heap
page read and write
1A30A057000
trusted library allocation
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A3019CF000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A301488000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A30A03B000
trusted library allocation
page read and write
1A2FF48D000
trusted library allocation
page read and write
1A2F4E3B000
heap
page read and write
1A2FF0A8000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2FEABD000
trusted library allocation
page read and write
1A3060B6000
trusted library allocation
page read and write
1A2FF4D2000
trusted library allocation
page read and write
23F47980000
unclassified section
page readonly
1A2F4E33000
heap
page read and write
1A305E16000
trusted library allocation
page read and write
23F48984000
heap
page read and write
1A2F97BF000
trusted library allocation
page read and write
1A2FFBB7000
trusted library allocation
page read and write
1A2FE973000
trusted library allocation
page read and write
23F48961000
heap
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2FD74C000
heap
page read and write
1A2F4E70000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FFA29000
trusted library allocation
page read and write
1A2FDDC1000
trusted library allocation
page read and write
1A3006F5000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A2F4E66000
heap
page read and write
1A2F4E15000
heap
page read and write
23F47D3F000
unclassified section
page read and write
1A300A6E000
trusted library allocation
page read and write
1A2F4E77000
heap
page read and write
1A3017DA000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E33000
heap
page read and write
1A2F4E40000
heap
page read and write
1A306791000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A30093E000
trusted library allocation
page read and write
1A2F4E1B000
heap
page read and write
1A300A46000
trusted library allocation
page read and write
1A2FFA98000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A2F4E32000
heap
page read and write
1A2F4E65000
heap
page read and write
8C0000
heap
page read and write
1A3008E4000
trusted library allocation
page read and write
1A301CAC000
trusted library allocation
page read and write
1A2FB09D000
trusted library allocation
page read and write
1A2FFBBE000
trusted library allocation
page read and write
1A3007DB000
trusted library allocation
page read and write
1A2F9E26000
trusted library allocation
page read and write
1A2FFECE000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FFCE1000
trusted library allocation
page read and write
1A30A631000
trusted library allocation
page read and write
1A3083E5000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E70000
heap
page read and write
1A2FDD59000
trusted library allocation
page read and write
1A30A1DB000
trusted library allocation
page read and write
1A2FFA47000
trusted library allocation
page read and write
1A2FADCA000
trusted library allocation
page read and write
1A2FFCB8000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FF9F5000
trusted library allocation
page read and write
1A2F4E1E000
heap
page read and write
1A305DFE000
trusted library allocation
page read and write
1A2F9ED2000
trusted library allocation
page read and write
1A2F4E25000
heap
page read and write
24DE3AD0000
unclassified section
page readonly
1A2F4E40000
heap
page read and write
1A2FBAF3000
trusted library allocation
page read and write
1A2FF442000
trusted library allocation
page read and write
1A3060EE000
trusted library allocation
page read and write
23F47E74000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E71000
heap
page read and write
1A2FF9FC000
trusted library allocation
page read and write
1A305EE5000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A2FFBC9000
trusted library allocation
page read and write
1A3006F3000
trusted library allocation
page read and write
1A300A34000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A305E50000
trusted library allocation
page read and write
1A2FF24F000
trusted library allocation
page read and write
1A3019C6000
trusted library allocation
page read and write
1A2F9EBC000
trusted library allocation
page read and write
41203E000
stack
page read and write
1A2FDD67000
trusted library allocation
page read and write
266FC250000
heap
page read and write
1A301769000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
1A30A3F2000
trusted library allocation
page read and write
23F47EBE000
trusted library allocation
page read and write
1A2FDAF4000
trusted library allocation
page read and write
1A2F9EB1000
trusted library allocation
page read and write
1A3017DF000
trusted library allocation
page read and write
1A2F4E2B000
heap
page read and write
1A3007DB000
trusted library allocation
page read and write
1A30A62A000
trusted library allocation
page read and write
1A2FF95A000
trusted library allocation
page read and write
1A3009E3000
trusted library allocation
page read and write
39D1000
heap
page read and write
1A305E5F000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A300755000
trusted library allocation
page read and write
1A301479000
trusted library allocation
page read and write
9C3000
heap
page read and write
1A2FDA7F000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A305E50000
trusted library allocation
page read and write
1A2FF9F3000
trusted library allocation
page read and write
1A30099C000
trusted library allocation
page read and write
1A305E66000
trusted library allocation
page read and write
1A305EDA000
trusted library allocation
page read and write
1A2FF20D000
trusted library allocation
page read and write
1A2FFB1C000
trusted library allocation
page read and write
1A2FFA17000
trusted library allocation
page read and write
1A2FC4F4000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A3014A5000
trusted library allocation
page read and write
23F47DDF000
unkown
page execute read
1A2FDC77000
trusted library allocation
page read and write
1A2FB0F4000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
23F47E12000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FAD5C000
trusted library allocation
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A2FE1F5000
trusted library allocation
page read and write
1A2FAF13000
trusted library allocation
page read and write
1A2FFA62000
trusted library allocation
page read and write
1A2FB0F4000
trusted library allocation
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A300567000
trusted library allocation
page read and write
1A2FFC8E000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2FFBBC000
trusted library allocation
page read and write
1A2FDA9B000
trusted library allocation
page read and write
1A3007A7000
trusted library allocation
page read and write
1A2FF9D6000
trusted library allocation
page read and write
1A2FF323000
trusted library allocation
page read and write
1A3007E8000
trusted library allocation
page read and write
1A3080BD000
trusted library allocation
page read and write
1A2FE99F000
trusted library allocation
page read and write
1A2F4E2E000
heap
page read and write
1A2FFCAB000
trusted library allocation
page read and write
23F489AB000
heap
page read and write
1A305DE1000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
23F4896D000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A3007A9000
trusted library allocation
page read and write
1A3007BC000
trusted library allocation
page read and write
1A2F4E27000
heap
page read and write
1A2FFC8D000
trusted library allocation
page read and write
1A2FF947000
trusted library allocation
page read and write
1A3079AD000
trusted library allocation
page read and write
1A3014A3000
trusted library allocation
page read and write
23F48962000
heap
page read and write
1A2FF28E000
trusted library allocation
page read and write
23F483A0000
heap
page read and write
1A3005BE000
trusted library allocation
page read and write
1A2FFA10000
trusted library allocation
page read and write
1A300755000
trusted library allocation
page read and write
24DE4107000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A3006DD000
trusted library allocation
page read and write
1A30079E000
trusted library allocation
page read and write
1A2FF96D000
trusted library allocation
page read and write
1A305F61000
trusted library allocation
page read and write
950000
heap
page read and write
1A2F4E3C000
heap
page read and write
1A300AA6000
trusted library allocation
page read and write
1A30024E000
trusted library allocation
page read and write
187A3972000
trusted library allocation
page read and write
1A301C86000
trusted library allocation
page read and write
1A305EEF000
trusted library allocation
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A2F4E15000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A2FF30B000
trusted library allocation
page read and write
1A2FEC71000
trusted library allocation
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2FF4E5000
trusted library allocation
page read and write
1A2FFA9B000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E15000
heap
page read and write
1A2FDA72000
trusted library allocation
page read and write
1A302B02000
trusted library allocation
page read and write
1A2FFC73000
trusted library allocation
page read and write
1A2FDD82000
trusted library allocation
page read and write
1A2FDDB0000
trusted library allocation
page read and write
1A2FDA5A000
trusted library allocation
page read and write
1A302205000
heap
page read and write
1A2FF0D9000
trusted library allocation
page read and write
1A300958000
trusted library allocation
page read and write
23F48400000
heap
page read and write
1A2FAF7C000
trusted library allocation
page read and write
1A2FFCE1000
trusted library allocation
page read and write
1A305EE8000
trusted library allocation
page read and write
1A3008E8000
trusted library allocation
page read and write
1A2FFCF0000
trusted library allocation
page read and write
1A2FDA60000
trusted library allocation
page read and write
1A305EE8000
trusted library allocation
page read and write
24DE3E70000
unclassified section
page readonly
1A2FEA16000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FFA7C000
trusted library allocation
page read and write
1A2FDD5E000
trusted library allocation
page read and write
23F4896A000
heap
page read and write
1A2F4E2A000
heap
page read and write
23F47DD5000
unkown
page execute read
23F48448000
heap
page read and write
1A2F4E1B000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FDA79000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FBAE8000
trusted library allocation
page read and write
1A2FADAA000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A30079C000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A300A1E000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E37000
heap
page read and write
1A306094000
trusted library allocation
page read and write
1A2FAFA6000
trusted library allocation
page read and write
1A301778000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A2FF064000
trusted library allocation
page read and write
1A2FFA14000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E33000
heap
page read and write
1A2F4E15000
heap
page read and write
1A2FAF13000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
23F4849C000
heap
page read and write
1A30147E000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2F9D76000
trusted library allocation
page read and write
1A2FFDCD000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A3060CB000
trusted library allocation
page read and write
1A2FFA15000
trusted library allocation
page read and write
187A3968000
trusted library allocation
page read and write
1A2F9798000
trusted library allocation
page read and write
1A3008EA000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A3017DC000
trusted library allocation
page read and write
1A3004AF000
trusted library allocation
page read and write
1A30147E000
trusted library allocation
page read and write
24DE3CD3000
heap
page read and write
1A3079F0000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A30798B000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A2FF4C3000
trusted library allocation
page read and write
1A30148F000
trusted library allocation
page read and write
1A2F4E47000
heap
page read and write
1A2F4E18000
heap
page read and write
1A2F4E26000
heap
page read and write
1A306032000
trusted library allocation
page read and write
23F47E03000
trusted library allocation
page read and write
1A2FF278000
trusted library allocation
page read and write
40F73E000
unkown
page readonly
1A301CA7000
trusted library allocation
page read and write
1A2F4E2E000
heap
page read and write
1A2FE9BA000
trusted library allocation
page read and write
1A30024E000
trusted library allocation
page read and write
1A2FB0EB000
trusted library allocation
page read and write
187A3800000
trusted library allocation
page read and write
23F4848E000
heap
page read and write
1A2FE9C3000
trusted library allocation
page read and write
1A300725000
trusted library allocation
page read and write
1A308443000
trusted library allocation
page read and write
1A2F4E35000
heap
page read and write
1A2FF976000
trusted library allocation
page read and write
1A3098A1000
trusted library allocation
page read and write
1A305FFC000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
187A3530000
unclassified section
page readonly
1A3007DB000
trusted library allocation
page read and write
1A30A1F0000
trusted library allocation
page read and write
1A30A653000
trusted library allocation
page read and write
1A301BE5000
trusted library allocation
page read and write
1A3004A8000
trusted library allocation
page read and write
1A300497000
trusted library allocation
page read and write
1A2FFA0F000
trusted library allocation
page read and write
1A2FAFE3000
trusted library allocation
page read and write
9BE000
heap
page read and write
187A3B0D000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2FFA07000
trusted library allocation
page read and write
1A300752000
trusted library allocation
page read and write
1A300931000
trusted library allocation
page read and write
1A3080D0000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A300958000
trusted library allocation
page read and write
1A2FEAB2000
trusted library allocation
page read and write
1A2FAFE7000
trusted library allocation
page read and write
1A30A3AB000
trusted library allocation
page read and write
1A3009DB000
trusted library allocation
page read and write
1A2F4E81000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A3021C7000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A2FF499000
trusted library allocation
page read and write
FA4000
unkown
page readonly
1A301747000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A2FFB90000
trusted library allocation
page read and write
1A2FD743000
heap
page read and write
1A2FE988000
trusted library allocation
page read and write
1A3084E4000
trusted library allocation
page read and write
23F47E66000
trusted library allocation
page read and write
1A2FEC33000
trusted library allocation
page read and write
187A37B2000
unclassified section
page read and write
1A3008EA000
trusted library allocation
page read and write
1A2F9E67000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
23F4896A000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2F9EF7000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FF074000
trusted library allocation
page read and write
1A3007EA000
trusted library allocation
page read and write
1A2FE9B5000
trusted library allocation
page read and write
1A308387000
trusted library allocation
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A2FFA85000
trusted library allocation
page read and write
1A2FFC39000
trusted library allocation
page read and write
1A305EF8000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
23F48940000
heap
page read and write
1A2FEA75000
trusted library allocation
page read and write
1A301753000
trusted library allocation
page read and write
1A2FFCEF000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F489AB000
heap
page read and write
1A2FF0F5000
trusted library allocation
page read and write
23F48491000
heap
page read and write
1A305F31000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FF30B000
trusted library allocation
page read and write
1A2FF9C1000
trusted library allocation
page read and write
1A30794A000
trusted library allocation
page read and write
1A2FDC5A000
trusted library allocation
page read and write
1A305EAC000
trusted library allocation
page read and write
1A2FAF24000
trusted library allocation
page read and write
187A39B7000
trusted library allocation
page read and write
1A3080D7000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E1E000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E21000
heap
page read and write
1A2FBAE7000
trusted library allocation
page read and write
20EF64C03000
trusted library allocation
page read and write
1A30033A000
trusted library allocation
page read and write
1A3004C6000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F9E76000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A2F4E85000
heap
page read and write
1A30A1EC000
trusted library allocation
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FE97B000
trusted library allocation
page read and write
1A2FF945000
trusted library allocation
page read and write
1A2FBAE8000
trusted library allocation
page read and write
7DAE9FE000
unkown
page readonly
1A2FF96B000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
24DE3F77000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A3060F2000
trusted library allocation
page read and write
1A3080F3000
trusted library allocation
page read and write
23F4848E000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FAF78000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E23000
heap
page read and write
1A3007BA000
trusted library allocation
page read and write
1A30A05B000
trusted library allocation
page read and write
71B51FC000
stack
page read and write
1A3007D0000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
1A301430000
trusted library allocation
page read and write
266FC40A000
trusted library allocation
page read and write
1A3007DB000
trusted library allocation
page read and write
1A3021CE000
heap
page read and write
1A2FE981000
trusted library allocation
page read and write
1A2FEAB8000
trusted library allocation
page read and write
1A305E37000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FC4AF000
trusted library allocation
page read and write
1A2F97EF000
trusted library allocation
page read and write
1A3017C6000
trusted library allocation
page read and write
1A3004B3000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
187A3710000
heap
page read and write
1A2F4E33000
heap
page read and write
A63E1FE000
stack
page read and write
1A2FDA48000
trusted library allocation
page read and write
1A301BA2000
trusted library allocation
page read and write
1A2FF9EF000
trusted library allocation
page read and write
9D1000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FEA5A000
trusted library allocation
page read and write
1A2FF9E9000
trusted library allocation
page read and write
1A2FF2E7000
trusted library allocation
page read and write
1A2FEAB2000
trusted library allocation
page read and write
1A2FFDB8000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A3017F7000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
23F47E2F000
trusted library allocation
page read and write
1A305F2B000
trusted library allocation
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E40000
heap
page read and write
1A30069C000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A300931000
trusted library allocation
page read and write
1A3021F5000
heap
page read and write
8A4000
heap
page read and write
1A3008DC000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
1A3060EA000
trusted library allocation
page read and write
1A30A22D000
trusted library allocation
page read and write
1A305E58000
trusted library allocation
page read and write
1A2F4E65000
heap
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FF99E000
trusted library allocation
page read and write
1A2FC4F5000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A2FDD67000
trusted library allocation
page read and write
1A2FADF0000
trusted library allocation
page read and write
1A3007C9000
trusted library allocation
page read and write
1A305DFE000
trusted library allocation
page read and write
1A2FC4C2000
trusted library allocation
page read and write
24DE3FDA000
trusted library allocation
page read and write
24DE4103000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2F4E24000
heap
page read and write
1A3007DB000
trusted library allocation
page read and write
40EDFE000
stack
page read and write
1A300362000
trusted library allocation
page read and write
9D1000
heap
page read and write
1A2F4E66000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E34000
heap
page read and write
1A3014FD000
trusted library allocation
page read and write
1A3004BF000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A305F75000
trusted library allocation
page read and write
1A2FF18B000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A3021C5000
heap
page read and write
1A2F4E74000
heap
page read and write
1A306744000
trusted library allocation
page read and write
23F489AB000
heap
page read and write
1A300823000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FFB69000
trusted library allocation
page read and write
1A30085F000
trusted library allocation
page read and write
187A39E9000
trusted library allocation
page read and write
1A2FF221000
trusted library allocation
page read and write
1A300911000
trusted library allocation
page read and write
24DE3F7B000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FDA7F000
trusted library allocation
page read and write
1A300958000
trusted library allocation
page read and write
1A3021EF000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A2FB0DD000
trusted library allocation
page read and write
1A309480000
trusted library allocation
page read and write
1A30A29A000
trusted library allocation
page read and write
1A2FFC3F000
trusted library allocation
page read and write
1A30A020000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
1A2FEA1C000
trusted library allocation
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A3008E4000
trusted library allocation
page read and write
1A301D2C000
trusted library allocation
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A3008E4000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A3014A5000
trusted library allocation
page read and write
1A2FFA7A000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
9BC000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A2FC465000
trusted library allocation
page read and write
1A2FE1E7000
trusted library allocation
page read and write
1A2FF4A8000
trusted library allocation
page read and write
1A30676A000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A300AD4000
trusted library allocation
page read and write
1A2FF2EC000
trusted library allocation
page read and write
1A3007C7000
trusted library allocation
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FF24C000
trusted library allocation
page read and write
1A300A9C000
trusted library allocation
page read and write
1A3008FB000
trusted library allocation
page read and write
1A30A23B000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E34000
heap
page read and write
1A30A1B5000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FD702000
heap
page read and write
1A30144D000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A2F4E44000
heap
page read and write
1A306060000
trusted library allocation
page read and write
1A3014E8000
trusted library allocation
page read and write
1A2FDDB0000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A2FE97B000
trusted library allocation
page read and write
1A2F9EAD000
trusted library allocation
page read and write
40F63E000
unkown
page readonly
1A2F4E15000
heap
page read and write
1A2F4E1F000
heap
page read and write
1A2FFC7B000
trusted library allocation
page read and write
1A305ECA000
trusted library allocation
page read and write
1A2FF9F5000
trusted library allocation
page read and write
1A30A6D5000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A3003E1000
trusted library allocation
page read and write
1A2FEAEF000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FE986000
trusted library allocation
page read and write
1A30A023000
trusted library allocation
page read and write
24DE3E30000
heap
page readonly
1A2FF0C0000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E26000
heap
page read and write
1A2FECB6000
trusted library allocation
page read and write
1A2FFC8D000
trusted library allocation
page read and write
1A300992000
trusted library allocation
page read and write
23F4842A000
heap
page read and write
1A2F4E20000
heap
page read and write
1A30A06D000
trusted library allocation
page read and write
23F47E76000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FF507000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
F9C000
unkown
page write copy
1A2FAFD2000
trusted library allocation
page read and write
1A30A03B000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A3009A5000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A3098EE000
trusted library allocation
page read and write
23F47DB4000
heap
page read and write
1A2F4E27000
heap
page read and write
1C60000
trusted library allocation
page read and write
1A300596000
trusted library allocation
page read and write
81F000
stack
page read and write
1A2F4E20000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2FD74C000
heap
page read and write
1A301798000
trusted library allocation
page read and write
1A2FE18E000
trusted library allocation
page read and write
1A2F9DFE000
trusted library allocation
page read and write
1A2F97C8000
trusted library allocation
page read and write
23F489AB000
heap
page read and write
1A3007EC000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F9E26000
trusted library allocation
page read and write
1A300AB2000
trusted library allocation
page read and write
1A30A1FD000
trusted library allocation
page read and write
1A2F4E2E000
heap
page read and write
1A300954000
trusted library allocation
page read and write
1A2FEA2F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FEA7E000
trusted library allocation
page read and write
1A2FF304000
trusted library allocation
page read and write
1A2F4E30000
heap
page read and write
1A2F4E7C000
heap
page read and write
1A30A05B000
trusted library allocation
page read and write
1A2F4E74000
heap
page read and write
1A2F4E18000
heap
page read and write
1A2F4E79000
heap
page read and write
1A2FC48B000
trusted library allocation
page read and write
1A3007F4000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A307934000
trusted library allocation
page read and write
990000
heap
page read and write
1A30A32A000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A3008E0000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A301761000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A2FF06B000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A305EEB000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FD726000
heap
page read and write
1A2F9EB7000
trusted library allocation
page read and write
24DE4200000
trusted library allocation
page read and write
23F4840C000
heap
page read and write
1A30A3AB000
trusted library allocation
page read and write
23F482B3000
heap
page read and write
1A3007CE000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A2FF239000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A3014D1000
trusted library allocation
page read and write
1A2FB0BE000
trusted library allocation
page read and write
1A2F4EAF000
heap
page read and write
1A3017AC000
trusted library allocation
page read and write
1A2FDA29000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2F4E24000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2F4E6E000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2F4E3D000
heap
page read and write
1A305E4C000
trusted library allocation
page read and write
1A30A33F000
trusted library allocation
page read and write
1A302207000
heap
page read and write
1A2F4E40000
heap
page read and write
1A2FDC82000
trusted library allocation
page read and write
1A2F9E17000
trusted library allocation
page read and write
1A3027CE000
trusted library allocation
page read and write
1A30A3AB000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FEAAD000
trusted library allocation
page read and write
1A2FD702000
heap
page read and write
1A2FB0DC000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FC4F4000
trusted library allocation
page read and write
1A3060F0000
trusted library allocation
page read and write
13BE000
stack
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A3079AD000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A2F4E18000
heap
page read and write
1A2FECFC000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
23F4849C000
heap
page read and write
40F5FE000
unkown
page readonly
1A2F4E23000
heap
page read and write
1A2F4E40000
heap
page read and write
23F47E81000
trusted library allocation
page read and write
1A3008A5000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A300497000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A2FECA7000
trusted library allocation
page read and write
1A30144F000
trusted library allocation
page read and write
23F484A0000
unkown
page execute read
1A2F4E22000
heap
page read and write
1A300356000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2FDD6C000
trusted library allocation
page read and write
1A2FD727000
heap
page read and write
187A3B20000
trusted library allocation
page read and write
1A309B1C000
trusted library allocation
page read and write
1A301463000
trusted library allocation
page read and write
1A3007B4000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
1A7F9000000
trusted library allocation
page read and write
1A2FE952000
trusted library allocation
page read and write
1A305E52000
trusted library allocation
page read and write
1A306068000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A306079000
trusted library allocation
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A3008E4000
trusted library allocation
page read and write
1A30983C000
trusted library allocation
page read and write
1A2FF2DD000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A30276D000
trusted library allocation
page read and write
1A305F48000
trusted library allocation
page read and write
1A2FE9BA000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A300992000
trusted library allocation
page read and write
1A2FE9C7000
trusted library allocation
page read and write
1A2FF44E000
trusted library allocation
page read and write
23F4897B000
heap
page read and write
187A376A000
heap
page read and write
1A2FAFD0000
trusted library allocation
page read and write
9BD000
heap
page read and write
1A2FEABA000
trusted library allocation
page read and write
1A2FF0E6000
trusted library allocation
page read and write
1A2F4E4B000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2FE1F7000
trusted library allocation
page read and write
1A3003D6000
trusted library allocation
page read and write
1A2FEC3C000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2FB0EB000
trusted library allocation
page read and write
1A3001DD000
trusted library allocation
page read and write
1A3021F5000
heap
page read and write
1A2F4E1D000
heap
page read and write
23F48500000
trusted library allocation
page read and write
1A2FC46C000
trusted library allocation
page read and write
1A301C07000
trusted library allocation
page read and write
1A30A378000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2F97CD000
trusted library allocation
page read and write
24DE4009000
heap
page read and write
1A306744000
trusted library allocation
page read and write
1A3007C0000
trusted library allocation
page read and write
1A2F9E82000
trusted library allocation
page read and write
1A300573000
trusted library allocation
page read and write
1A3005D1000
trusted library allocation
page read and write
1A30A016000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2FFDB5000
trusted library allocation
page read and write
1A2FF21B000
trusted library allocation
page read and write
1A2FF496000
trusted library allocation
page read and write
1A300722000
trusted library allocation
page read and write
1A3019FC000
trusted library allocation
page read and write
1A2F4E79000
heap
page read and write
9C6000
heap
page read and write
1A3008ED000
trusted library allocation
page read and write
1A2FFC75000
trusted library allocation
page read and write
1A301491000
trusted library allocation
page read and write
187A3B32000
trusted library allocation
page read and write
1A2FAD37000
trusted library allocation
page read and write
1A30144F000
trusted library allocation
page read and write
1A2F4E7F000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A30A23B000
trusted library allocation
page read and write
1A2FAD47000
trusted library allocation
page read and write
4107BE000
unkown
page readonly
1A2FF9F5000
trusted library allocation
page read and write
41183E000
unkown
page readonly
1A2FF9FC000
trusted library allocation
page read and write
1A2FF44E000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FF2BC000
trusted library allocation
page read and write
1A2FF95A000
trusted library allocation
page read and write
1A2F9E80000
trusted library allocation
page read and write
1A3005E3000
trusted library allocation
page read and write
1A2FF218000
trusted library allocation
page read and write
1A3007E6000
trusted library allocation
page read and write
1A305E62000
trusted library allocation
page read and write
266FC407000
trusted library allocation
page read and write
1A2FFB86000
trusted library allocation
page read and write
1A2FFA29000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A3060F6000
trusted library allocation
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A2FF9A1000
trusted library allocation
page read and write
1A2FF2A6000
trusted library allocation
page read and write
1A30672E000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2F4E2E000
heap
page read and write
1A2FC4A0000
trusted library allocation
page read and write
1A2FE96C000
trusted library allocation
page read and write
1A309819000
trusted library allocation
page read and write
1A30224F000
heap
page read and write
1A2F4E14000
heap
page read and write
187A3966000
trusted library allocation
page read and write
1A30225B000
heap
page read and write
1A3007B8000
trusted library allocation
page read and write
1A2FE9B6000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A30980D000
trusted library allocation
page read and write
1A2FEAAD000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2FE981000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A3017C6000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
40F6BB000
stack
page read and write
1A2FFBAA000
trusted library allocation
page read and write
1A2FFA29000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
187A36E3000
heap
page read and write
187A37C0000
heap
page read and write
23F48481000
heap
page read and write
1A301444000
trusted library allocation
page read and write
1A307989000
trusted library allocation
page read and write
1A3083A3000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
1A305DE7000
trusted library allocation
page read and write
BE9A3FE000
unkown
page readonly
23F47C40000
heap
page readonly
1A2F4E0E000
heap
page read and write
1A305F2B000
trusted library allocation
page read and write
1A2FDA53000
trusted library allocation
page read and write
1A30A37C000
trusted library allocation
page read and write
23F48491000
heap
page read and write
1A2FDCA5000
trusted library allocation
page read and write
83B000
stack
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FFB00000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
23F47EF5000
trusted library allocation
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A30221C000
heap
page read and write
1A2FF464000
trusted library allocation
page read and write
23F483A9000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2F4E3D000
heap
page read and write
1A2FC475000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F9D2F000
trusted library allocation
page read and write
1A302784000
trusted library allocation
page read and write
1A2F4E7F000
heap
page read and write
1A2F4E14000
heap
page read and write
1A3060FA000
trusted library allocation
page read and write
1A2FDA2B000
trusted library allocation
page read and write
1A2FFCE4000
trusted library allocation
page read and write
1A301433000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FDDD4000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A300752000
trusted library allocation
page read and write
1A30A05B000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A301452000
trusted library allocation
page read and write
1A300755000
trusted library allocation
page read and write
1A7F8F70000
heap
page read and write
187A3B38000
trusted library allocation
page read and write
1D10000
heap
page read and write
1A306500000
trusted library allocation
page read and write
1A2FD709000
heap
page read and write
1A2F4E84000
heap
page read and write
1A2FF0C2000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A2FDA00000
trusted library allocation
page read and write
1A309B93000
trusted library allocation
page read and write
1A2FF9E5000
trusted library allocation
page read and write
1A2F4E1C000
heap
page read and write
1A2F4E38000
heap
page read and write
1A2FF09F000
trusted library allocation
page read and write
1A2FDA8B000
trusted library allocation
page read and write
1A307700000
trusted library allocation
page read and write
23F48459000
heap
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A30A0B1000
trusted library allocation
page read and write
1A2F4E18000
heap
page read and write
1A2FFA0D000
trusted library allocation
page read and write
23F47AD0000
heap
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A7F8F50000
heap
page read and write
1A2FAF16000
trusted library allocation
page read and write
1A2FE1E8000
trusted library allocation
page read and write
1A2FDD7A000
trusted library allocation
page read and write
187A397B000
trusted library allocation
page read and write
1A2F4E79000
heap
page read and write
85E000
stack
page read and write
1A2F4E0F000
heap
page read and write
1A3007AF000
trusted library allocation
page read and write
1A2FDA91000
trusted library allocation
page read and write
1A3019D6000
trusted library allocation
page read and write
1A2FF96E000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FBA7A000
trusted library allocation
page read and write
1A301753000
trusted library allocation
page read and write
1A3009DB000
trusted library allocation
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A3008E0000
trusted library allocation
page read and write
1A305EC8000
trusted library allocation
page read and write
1A305F4F000
trusted library allocation
page read and write
1A2FEA41000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FAF24000
trusted library allocation
page read and write
1A300AFB000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2F4E23000
heap
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FDDEB000
trusted library allocation
page read and write
1A3008A5000
trusted library allocation
page read and write
1A307989000
trusted library allocation
page read and write
1A309899000
trusted library allocation
page read and write
1A30A235000
trusted library allocation
page read and write
1A2FE986000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2FDDF8000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FDD9F000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A306018000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A3006F8000
trusted library allocation
page read and write
1A2F4E75000
heap
page read and write
1A3021C1000
heap
page read and write
24DE3F00000
trusted library allocation
page read and write
1A2F9EBB000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A3014D1000
trusted library allocation
page read and write
1A3014E8000
trusted library allocation
page read and write
1A2F4E34000
heap
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A2FEA71000
trusted library allocation
page read and write
15EEF371000
trusted library allocation
page execute read
1A2F4E22000
heap
page read and write
1A2F4E26000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FDD8C000
trusted library allocation
page read and write
1A2FF4E3000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A30A029000
trusted library allocation
page read and write
1A2FF064000
trusted library allocation
page read and write
1A2FEA6A000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A2FFDE8000
trusted library allocation
page read and write
1A3080BD000
trusted library allocation
page read and write
1A30199F000
trusted library allocation
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A3005B5000
trusted library allocation
page read and write
1A2FF9D6000
trusted library allocation
page read and write
1A2F9E1E000
trusted library allocation
page read and write
1A2FDD95000
trusted library allocation
page read and write
1A301CC5000
trusted library allocation
page read and write
187A3756000
heap
page read and write
1A2FFCAE000
trusted library allocation
page read and write
1A308506000
trusted library allocation
page read and write
1A2FFECE000
trusted library allocation
page read and write
1A2FDD64000
trusted library allocation
page read and write
1A305E41000
trusted library allocation
page read and write
1A3019FC000
trusted library allocation
page read and write
1A2FFCB4000
trusted library allocation
page read and write
187A392E000
trusted library allocation
page read and write
187A3903000
trusted library allocation
page read and write
1A305EFC000
trusted library allocation
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A2FD702000
heap
page read and write
1A2FE98E000
trusted library allocation
page read and write
7DB1C7E000
unkown
page readonly
1A2FBABA000
trusted library allocation
page read and write
1A306077000
trusted library allocation
page read and write
23F489AB000
heap
page read and write
1A30A0FE000
trusted library allocation
page read and write
1A2FE96F000
trusted library allocation
page read and write
266FDD9C000
heap
page read and write
1A3008FD000
trusted library allocation
page read and write
187A35A0000
remote allocation
page read and write
1A30059B000
trusted library allocation
page read and write
9D1000
heap
page read and write
1A3079DE000
trusted library allocation
page read and write
41083E000
unkown
page readonly
1A2FB0AA000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E1B000
heap
page read and write
1A2FE958000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FC4CF000
trusted library allocation
page read and write
1A301759000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A2FF074000
trusted library allocation
page read and write
23F47E5C000
trusted library allocation
page read and write
1A309B8A000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
1A2FF996000
trusted library allocation
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A30A3E5000
trusted library allocation
page read and write
1A30050B000
trusted library allocation
page read and write
1A305FB0000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
23F48480000
heap
page read and write
1A2F4E1E000
heap
page read and write
1A2F4E14000
heap
page read and write
1A308441000
trusted library allocation
page read and write
1A2FDD95000
trusted library allocation
page read and write
1A2FF9D6000
trusted library allocation
page read and write
187A35BD000
remote allocation
page execute read
1A2F4E24000
heap
page read and write
1A3005BE000
trusted library allocation
page read and write
1A2FB0EB000
trusted library allocation
page read and write
1A305FF2000
trusted library allocation
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A2FF9DA000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A3060F0000
trusted library allocation
page read and write
1A2FDAC1000
trusted library allocation
page read and write
1A2FFCED000
trusted library allocation
page read and write
1A3080B1000
trusted library allocation
page read and write
1A2FF44E000
trusted library allocation
page read and write
1A2FFDE8000
trusted library allocation
page read and write
1A2FF984000
trusted library allocation
page read and write
1A300350000
trusted library allocation
page read and write
23F47E68000
trusted library allocation
page read and write
1A309845000
trusted library allocation
page read and write
1A2FC452000
trusted library allocation
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A3014F0000
trusted library allocation
page read and write
1A2F4E32000
heap
page read and write
1A30607B000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2FEA16000
trusted library allocation
page read and write
1A2FF98D000
trusted library allocation
page read and write
1A30A1DD000
trusted library allocation
page read and write
1A301491000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A30A1AE000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E66000
heap
page read and write
1A2FF2EC000
trusted library allocation
page read and write
1A300715000
trusted library allocation
page read and write
1A2FDDB6000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A2FB0F6000
trusted library allocation
page read and write
1A3006DD000
trusted library allocation
page read and write
1A2FF928000
trusted library allocation
page read and write
1A301B86000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
23F483FC000
heap
page read and write
1A2F9E1E000
trusted library allocation
page read and write
1A2FF986000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E33000
heap
page read and write
1A2F4E75000
heap
page read and write
1A2F4E40000
heap
page read and write
187A3C00000
heap
page read and write
1A2FF048000
trusted library allocation
page read and write
1A305EBA000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E20000
heap
page read and write
ED0000
unkown
page readonly
1A2FF0B3000
trusted library allocation
page read and write
1A2FFCE1000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A3002FB000
trusted library allocation
page read and write
1A30148A000
trusted library allocation
page read and write
1A3005FB000
trusted library allocation
page read and write
1A2FDC8E000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2FE115000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2FC475000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2FFA41000
trusted library allocation
page read and write
1A2FDAF8000
trusted library allocation
page read and write
1A2F4E76000
heap
page read and write
1A2FE98D000
trusted library allocation
page read and write
1A30A229000
trusted library allocation
page read and write
1A3009C5000
trusted library allocation
page read and write
1A305EED000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2F4E34000
heap
page read and write
1A2FF278000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2F4E3B000
heap
page read and write
1A2FF0A8000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A307940000
trusted library allocation
page read and write
1A301D33000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2FF4AC000
trusted library allocation
page read and write
1A3060E8000
trusted library allocation
page read and write
1A2FADC3000
trusted library allocation
page read and write
1A307994000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A2FECBE000
trusted library allocation
page read and write
1A3009DB000
trusted library allocation
page read and write
1A2F9EF7000
trusted library allocation
page read and write
1A2FF95E000
trusted library allocation
page read and write
1A30079E000
trusted library allocation
page read and write
1A3014EA000
trusted library allocation
page read and write
1A2FDA5E000
trusted library allocation
page read and write
1A30A3A8000
trusted library allocation
page read and write
23F47D80000
trusted library allocation
page read and write
1A2FDA38000
trusted library allocation
page read and write
1A30A3B6000
trusted library allocation
page read and write
1A302231000
heap
page read and write
1A3019D8000
trusted library allocation
page read and write
1A307940000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A2F4E24000
heap
page read and write
1A302805000
trusted library allocation
page read and write
1A2FF9D4000
trusted library allocation
page read and write
1A2FECA5000
trusted library allocation
page read and write
1A2FFAA1000
trusted library allocation
page read and write
1A2F9DFB000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2F4E31000
heap
page read and write
1A2F4E70000
heap
page read and write
1A3014F0000
trusted library allocation
page read and write
1A2FF066000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E33000
heap
page read and write
1A2FF059000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FF9FE000
trusted library allocation
page read and write
1A2FFA7E000
trusted library allocation
page read and write
1A2FECEB000
trusted library allocation
page read and write
1A3001C0000
trusted library allocation
page read and write
1A30176C000
trusted library allocation
page read and write
23F48404000
heap
page read and write
1A2F4E1E000
heap
page read and write
1A3005CD000
trusted library allocation
page read and write
1A2FDA4E000
trusted library allocation
page read and write
1A300954000
trusted library allocation
page read and write
1A3079A8000
trusted library allocation
page read and write
1A2FD70C000
heap
page read and write
1A3008F3000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FFCF0000
trusted library allocation
page read and write
1A3019CD000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A3014FD000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A30A04D000
trusted library allocation
page read and write
1A2F9EF7000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A300578000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A305EE0000
trusted library allocation
page read and write
1A2F4E1D000
heap
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A2FFB59000
trusted library allocation
page read and write
1A2FD74C000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FAFCB000
trusted library allocation
page read and write
1A3021C1000
heap
page read and write
1A2F4E40000
heap
page read and write
1A3019D0000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E22000
heap
page read and write
1A3008A3000
trusted library allocation
page read and write
1A2FE1FE000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A3008F3000
trusted library allocation
page read and write
1A2FF9F0000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
7DAE9BE000
stack
page read and write
1A3005DE000
trusted library allocation
page read and write
BE9A43E000
unkown
page readonly
1A2F4E18000
heap
page read and write
1A2FF9CC000
trusted library allocation
page read and write
1A2FFA7A000
trusted library allocation
page read and write
1A2FFC35000
trusted library allocation
page read and write
1A2FFB48000
trusted library allocation
page read and write
1A3007E6000
trusted library allocation
page read and write
1A2FDACF000
trusted library allocation
page read and write
1A3007C9000
trusted library allocation
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A305E54000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FFAA7000
trusted library allocation
page read and write
1A2FFB50000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A305E32000
trusted library allocation
page read and write
1A3001E6000
trusted library allocation
page read and write
1A301444000
trusted library allocation
page read and write
1A2FF981000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FFA91000
trusted library allocation
page read and write
1A2F4E3A000
heap
page read and write
1A30A19C000
trusted library allocation
page read and write
1A300707000
trusted library allocation
page read and write
1A3006E8000
trusted library allocation
page read and write
23F48998000
heap
page read and write
1A2FAFC3000
trusted library allocation
page read and write
1A7F8FBF000
heap
page read and write
1A2FF4BA000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
187A3963000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A300AF0000
trusted library allocation
page read and write
1A30094E000
trusted library allocation
page read and write
266FC22C000
heap
page read and write
1A2F4E24000
heap
page read and write
23F47E6F000
trusted library allocation
page read and write
1A30174E000
trusted library allocation
page read and write
1A3014E0000
trusted library allocation
page read and write
1A30A3F4000
trusted library allocation
page read and write
1A2FF313000
trusted library allocation
page read and write
23F4850D000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2FFCEF000
trusted library allocation
page read and write
1A2FFCDB000
trusted library allocation
page read and write
1A30A2C3000
trusted library allocation
page read and write
1A301497000
trusted library allocation
page read and write
1A3007F4000
trusted library allocation
page read and write
1A30793F000
trusted library allocation
page read and write
1A2FDDAB000
trusted library allocation
page read and write
1A2FC422000
trusted library allocation
page read and write
1A2FFCAE000
trusted library allocation
page read and write
1A2FFBDF000
trusted library allocation
page read and write
1A300AA1000
trusted library allocation
page read and write
1A30A0F1000
trusted library allocation
page read and write
1A2F4E24000
heap
page read and write
1A2F4E0F000
heap
page read and write
1A2FFB74000
trusted library allocation
page read and write
1A3001C0000
trusted library allocation
page read and write
1A2FE976000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
1A2FF173000
trusted library allocation
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2FDDB6000
trusted library allocation
page read and write
1A2FF02D000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E3A000
heap
page read and write
1A30A3EC000
trusted library allocation
page read and write
1A306075000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A2F4E6E000
heap
page read and write
1A2FF058000
trusted library allocation
page read and write
1A2F4E10000
heap
page read and write
1A2FF487000
trusted library allocation
page read and write
187A36E0000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A3001DD000
trusted library allocation
page read and write
1A2F4DF4000
heap
page read and write
1A2FDC7C000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
23F48984000
heap
page read and write
24DE3F03000
trusted library allocation
page read and write
1A2FE973000
trusted library allocation
page read and write
24DE3F30000
trusted library allocation
page read and write
1A2FBA63000
trusted library allocation
page read and write
1A2FDA6B000
trusted library allocation
page read and write
1A3001B8000
trusted library allocation
page read and write
1A306746000
trusted library allocation
page read and write
1A2FF9F5000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F483FC000
heap
page read and write
1A30099C000
trusted library allocation
page read and write
1A306032000
trusted library allocation
page read and write
1A2FAFC3000
trusted library allocation
page read and write
1A2FFCF8000
trusted library allocation
page read and write
1A2FE9C7000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A30149A000
trusted library allocation
page read and write
1A302837000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FD700000
heap
page read and write
1A309829000
trusted library allocation
page read and write
1A2FDDA5000
trusted library allocation
page read and write
1A30A642000
trusted library allocation
page read and write
1A2F4E2C000
heap
page read and write
1A2F4E3E000
heap
page read and write
1A30A639000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A305F48000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A3006E8000
trusted library allocation
page read and write
1A300752000
trusted library allocation
page read and write
1A2FBA62000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A2FD702000
heap
page read and write
1A2FFB88000
trusted library allocation
page read and write
1A3060EE000
trusted library allocation
page read and write
1A2FE9A2000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FF986000
trusted library allocation
page read and write
1A2F4E31000
heap
page read and write
1C60000
trusted library allocation
page read and write
40DDD8000
stack
page read and write
1A2FAF16000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2F4E20000
heap
page read and write
1A305ED6000
trusted library allocation
page read and write
1A3007B4000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A2F4E19000
heap
page read and write
1A2FDDBE000
trusted library allocation
page read and write
23F47DC0000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A30A0FE000
trusted library allocation
page read and write
1A2FE952000
trusted library allocation
page read and write
1A30A1DD000
trusted library allocation
page read and write
1A2FDCCE000
trusted library allocation
page read and write
F92000
unkown
page readonly
1A2FDA79000
trusted library allocation
page read and write
1A2FE99D000
trusted library allocation
page read and write
1A300386000
trusted library allocation
page read and write
1A2FDD64000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
23F47DE5000
unkown
page execute read
1A2F4E37000
heap
page read and write
1A2FDC55000
trusted library allocation
page read and write
1A2FDD88000
trusted library allocation
page read and write
1A2FDA79000
trusted library allocation
page read and write
1A7F9207000
trusted library allocation
page read and write
1A2FC41C000
trusted library allocation
page read and write
1A2FF15B000
trusted library allocation
page read and write
1A2FE97B000
trusted library allocation
page read and write
1A3008ED000
trusted library allocation
page read and write
1A2FC4F5000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
9C3000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E20000
heap
page read and write
1A2FE9B0000
trusted library allocation
page read and write
23F47990000
heap
page read and write
1A2F4E24000
heap
page read and write
1A2FF02F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A3008A9000
trusted library allocation
page read and write
1A2FFBD3000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2F4E33000
heap
page read and write
1A307994000
trusted library allocation
page read and write
23F47E78000
trusted library allocation
page read and write
1A30092F000
trusted library allocation
page read and write
1A2FDA9D000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2F4E29000
heap
page read and write
1A305EB1000
trusted library allocation
page read and write
1A3009BC000
trusted library allocation
page read and write
1A2FF9D9000
trusted library allocation
page read and write
1A30A016000
trusted library allocation
page read and write
187A3910000
trusted library allocation
page read and write
1A301C41000
trusted library allocation
page read and write
9B3000
heap
page read and write
1A2F4E3D000
heap
page read and write
1A2FEC37000
trusted library allocation
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A2FF214000
trusted library allocation
page read and write
1A2FFC75000
trusted library allocation
page read and write
1A30228D000
heap
page read and write
1A2FDC9E000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A3060CB000
trusted library allocation
page read and write
7DB03FE000
stack
page read and write
187A3B19000
trusted library allocation
page read and write
1A2FF2E9000
trusted library allocation
page read and write
23F48488000
heap
page read and write
1A2FAD47000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FDD5E000
trusted library allocation
page read and write
1A301473000
trusted library allocation
page read and write
1A2FF9FE000
trusted library allocation
page read and write
A63F9FF000
stack
page read and write
24DE3CD0000
heap
page read and write
1A30A22D000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A30A1F5000
trusted library allocation
page read and write
1A2FD74C000
heap
page read and write
1A308557000
trusted library allocation
page read and write
1A2FBABB000
trusted library allocation
page read and write
1A2FF4E7000
trusted library allocation
page read and write
1A300A66000
trusted library allocation
page read and write
9BB000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E0F000
heap
page read and write
1A2F4E7B000
heap
page read and write
1A301427000
trusted library allocation
page read and write
1A2F4E39000
heap
page read and write
1A2FF9FE000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
1A2F4E6D000
heap
page read and write
1A2FB087000
trusted library allocation
page read and write
1A2FFCB8000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FDA9B000
trusted library allocation
page read and write
1A2FC463000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A3079B3000
trusted library allocation
page read and write
1A30A19C000
trusted library allocation
page read and write
23F4849C000
heap
page read and write
1A30099A000
trusted library allocation
page read and write
1A30A043000
trusted library allocation
page read and write
1A2FC475000
trusted library allocation
page read and write
1A2F4E36000
heap
page read and write
1A30A3E7000
trusted library allocation
page read and write
1A2F4E75000
heap
page read and write
1A301765000
trusted library allocation
page read and write
187A3760000
heap
page read and write
1A2FEAB8000
trusted library allocation
page read and write
24DE3B40000
remote allocation
page read and write
1A3007B8000
trusted library allocation
page read and write
1A2FF9C1000
trusted library allocation
page read and write
1A2FECB4000
trusted library allocation
page read and write
23F47EBC000
trusted library allocation
page read and write
1A3021F1000
heap
page read and write
1A2F4E33000
heap
page read and write
266FC400000
trusted library allocation
page read and write
1A2FC4FE000
trusted library allocation
page read and write
1A2FFE0B000
trusted library allocation
page read and write
1A2FFE0B000
trusted library allocation
page read and write
1A30A3E9000
trusted library allocation
page read and write
9D1000
heap
page read and write
9D9000
heap
page read and write
1A2FE98A000
trusted library allocation
page read and write
1A2F4E3C000
heap
page read and write
1A2F4E79000
heap
page read and write
1A30798B000
trusted library allocation
page read and write
1A2F4E6E000
heap
page read and write
1A306746000
trusted library allocation
page read and write
1A30050E000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A307948000
trusted library allocation
page read and write
1A2FDA92000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FFA50000
trusted library allocation
page read and write
1A2F4E0D000
heap
page read and write
1A2F4E29000
heap
page read and write
1A2FF1D9000
trusted library allocation
page read and write
1A3008FB000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2FDD47000
trusted library allocation
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2F4E44000
heap
page read and write
1A2FBAB2000
trusted library allocation
page read and write
BE9AD3E000
stack
page read and write
1A2FF078000
trusted library allocation
page read and write
1A2F4E3D000
heap
page read and write
1A2FFC76000
trusted library allocation
page read and write
1A30A025000
trusted library allocation
page read and write
1A2FDD74000
trusted library allocation
page read and write
1A30A057000
trusted library allocation
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A306797000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FF2B5000
trusted library allocation
page read and write
1A3080E7000
trusted library allocation
page read and write
1A305F73000
trusted library allocation
page read and write
1A2FF9F5000
trusted library allocation
page read and write
1A2F4E38000
heap
page read and write
1A2F4E22000
heap
page read and write
1A30057C000
trusted library allocation
page read and write
1A3014E0000
trusted library allocation
page read and write
1A2FFC8D000
trusted library allocation
page read and write
1A2FF50A000
trusted library allocation
page read and write
1A2FEAA3000
trusted library allocation
page read and write
1A2FDD3D000
trusted library allocation
page read and write
1A30093B000
trusted library allocation
page read and write
1A3067F7000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A2FF253000
trusted library allocation
page read and write
1A2FDAF8000
trusted library allocation
page read and write
1A2FF0E2000
trusted library allocation
page read and write
1A30A2EE000
trusted library allocation
page read and write
1A3098AB000
trusted library allocation
page read and write
1A2FFCE4000
trusted library allocation
page read and write
1A305EB0000
trusted library allocation
page read and write
1A2F4E65000
heap
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A2FFCF0000
trusted library allocation
page read and write
1A2FF02D000
trusted library allocation
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A3007E3000
trusted library allocation
page read and write
23F48480000
heap
page read and write
1A2F4E6C000
heap
page read and write
1A30A639000
trusted library allocation
page read and write
1A2FF2D8000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A2FF9EC000
trusted library allocation
page read and write
1A301761000
trusted library allocation
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A2FFB91000
trusted library allocation
page read and write
1A2F4EBF000
heap
page read and write
1A302205000
heap
page read and write
187A3996000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E6C000
heap
page read and write
1A3007CB000
trusted library allocation
page read and write
1A30603A000
trusted library allocation
page read and write
24DE3F81000
trusted library allocation
page read and write
1A2FE949000
trusted library allocation
page read and write
1A2F4E4B000
heap
page read and write
1A2F4E0F000
heap
page read and write
1A2FEC70000
trusted library allocation
page read and write
1A2F4E10000
heap
page read and write
24DE3AE0000
unclassified section
page readonly
9C5000
heap
page read and write
1A302206000
heap
page read and write
1A2FFC31000
trusted library allocation
page read and write
1A2FEAAD000
trusted library allocation
page read and write
1A2FEC34000
trusted library allocation
page read and write
1A3007B8000
trusted library allocation
page read and write
1A3007D0000
trusted library allocation
page read and write
1A30175A000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2F4E23000
heap
page read and write
1A309000000
trusted library allocation
page read and write
1A2F4E36000
heap
page read and write
1A3007BA000
trusted library allocation
page read and write
1A2FFBE5000
trusted library allocation
page read and write
1A3017F7000
trusted library allocation
page read and write
1A2FFCAB000
trusted library allocation
page read and write
1A309893000
trusted library allocation
page read and write
45A000
stack
page read and write
1A300ADC000
trusted library allocation
page read and write
1A2FF3F0000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A3009F4000
trusted library allocation
page read and write
187A3754000
heap
page read and write
1A2FF979000
trusted library allocation
page read and write
1A30A3FE000
trusted library allocation
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A2FF9FC000
trusted library allocation
page read and write
1A2F4E0E000
heap
page read and write
1A2F4E22000
heap
page read and write
8A4000
heap
page read and write
1A2FDAF4000
trusted library allocation
page read and write
1A3008A5000
trusted library allocation
page read and write
1A2FF026000
trusted library allocation
page read and write
1A306077000
trusted library allocation
page read and write
1A30224A000
heap
page read and write
23F47E00000
trusted library allocation
page read and write
1A2FF29F000
trusted library allocation
page read and write
1A2FBA33000
trusted library allocation
page read and write
1A3080DA000
trusted library allocation
page read and write
1A30607B000
trusted library allocation
page read and write
266FC231000
heap
page read and write
23F48441000
heap
page read and write
1A2F4E29000
heap
page read and write
1A301473000
trusted library allocation
page read and write
1A2FEC97000
trusted library allocation
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A30A1F5000
trusted library allocation
page read and write
1A2FE1F9000
trusted library allocation
page read and write
1A302206000
heap
page read and write
1A2F4E2C000
heap
page read and write
1A2F4E77000
heap
page read and write
1A307FFE000
trusted library allocation
page read and write
1A300931000
trusted library allocation
page read and write
1A30A05F000
trusted library allocation
page read and write
1A305ED2000
trusted library allocation
page read and write
1A2F4E70000
heap
page read and write
1A2FF4F0000
trusted library allocation
page read and write
1A2FEA58000
trusted library allocation
page read and write
1A300A23000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FC41F000
trusted library allocation
page read and write
1A2FBAB2000
trusted library allocation
page read and write
1A2F4EB5000
heap
page read and write
1A300958000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A2FD703000
heap
page read and write
1A2F4E33000
heap
page read and write
1A30852E000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FFC40000
trusted library allocation
page read and write
1A309886000
trusted library allocation
page read and write
1A2FF3ED000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A2FE9C7000
trusted library allocation
page read and write
1A2FFA29000
trusted library allocation
page read and write
1A305FAC000
trusted library allocation
page read and write
1A3017E6000
trusted library allocation
page read and write
1A30A665000
trusted library allocation
page read and write
24DE3B80000
heap
page read and write
1A2FDC77000
trusted library allocation
page read and write
1A3007C0000
trusted library allocation
page read and write
1A3002A9000
trusted library allocation
page read and write
1A305EFC000
trusted library allocation
page read and write
23F48503000
trusted library allocation
page read and write
1A2F4E1B000
heap
page read and write
1A2F4E70000
heap
page read and write
23F48409000
heap
page read and write
1A300392000
trusted library allocation
page read and write
1A2FBA72000
trusted library allocation
page read and write
1A2FF9F5000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A2FF9E7000
trusted library allocation
page read and write
1A2F4E20000
heap
page read and write
1A2F4E2A000
heap
page read and write
1A2F4E1D000
heap
page read and write
1A2FC4F4000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E75000
heap
page read and write
1A2FDCCE000
trusted library allocation
page read and write
1A2FDD61000
trusted library allocation
page read and write
1A3004BD000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FEA78000
trusted library allocation
page read and write
23F47E0A000
trusted library allocation
page read and write
1A2F4E14000
heap
page read and write
1A305E4A000
trusted library allocation
page read and write
1A302850000
trusted library allocation
page read and write
BE9B53E000
unkown
page readonly
1A2FBABA000
trusted library allocation
page read and write
1A306011000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A3005C5000
trusted library allocation
page read and write
1A305F78000
trusted library allocation
page read and write
1A305FC1000
trusted library allocation
page read and write
1A2FF093000
trusted library allocation
page read and write
1A2FAF13000
trusted library allocation
page read and write
1A2FFA98000
trusted library allocation
page read and write
23F48483000
heap
page read and write
1A2F4E2A000
heap
page read and write
7DB0C7E000
unkown
page readonly
187A39A5000
trusted library allocation
page read and write
23F489B7000
heap
page read and write
1A3007CE000
trusted library allocation
page read and write
1A2F4E36000
heap
page read and write
1A2F4E22000
heap
page read and write
1A2F4E23000
heap
page read and write
1A2FFC73000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A30173A000
trusted library allocation
page read and write
23F48491000
heap
page read and write
1A2FDA95000
trusted library allocation
page read and write
1A3017E6000
trusted library allocation
page read and write
1A2FADD3000
trusted library allocation
page read and write
1A3079F0000
trusted library allocation
page read and write
1A307FE8000
trusted library allocation
page read and write
1A2FAF1E000
trusted library allocation
page read and write
1A308EA8000
trusted library allocation
page read and write
1A2F4E40000
heap
page read and write
1A2FDDBE000
trusted library allocation
page read and write
1A309869000
trusted library allocation
page read and write
266FDDAC000
heap
page read and write
1A302893000
trusted library allocation
page read and write
1A30A235000
trusted library allocation
page read and write
1A2FDA7D000
trusted library allocation
page read and write
187A36F0000
heap
page read and write
1A30A37A000
trusted library allocation
page read and write
1A2FEC93000
trusted library allocation
page read and write
1A30A3EE000
trusted library allocation
page read and write
1A30A1BE000
trusted library allocation
page read and write
1A2FB0EB000
trusted library allocation
page read and write
1A2FFCE4000
trusted library allocation
page read and write
3BD482A24000
trusted library allocation
page read and write
1A2FEABE000
trusted library allocation
page read and write
1A2F9E9E000
trusted library allocation
page read and write
1A2FFB8F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A305ED4000
trusted library allocation
page read and write
1A2FF3AA000
trusted library allocation
page read and write
1A2FF4BD000
trusted library allocation
page read and write
1A30054F000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E15000
heap
page read and write
1A2F4EB6000
heap
page read and write
998000
heap
page read and write
1A2FBABA000
trusted library allocation
page read and write
1A3005E5000
trusted library allocation
page read and write
1A2FF4AE000
trusted library allocation
page read and write
23F4841F000
heap
page read and write
1A2FDDF5000
trusted library allocation
page read and write
1A3021D3000
heap
page read and write
1A2F4E3D000
heap
page read and write
23F47900000
unclassified section
page readonly
1A2F4E3D000
heap
page read and write
1A2F4E79000
heap
page read and write
1A30A071000
trusted library allocation
page read and write
1A3008F3000
trusted library allocation
page read and write
1A2FF058000
trusted library allocation
page read and write
23F47E86000
trusted library allocation
page read and write
1A3005D1000
trusted library allocation
page read and write
1A2FFCFB000
trusted library allocation
page read and write
1A30A2F5000
trusted library allocation
page read and write
1A2F4E84000
heap
page read and write
1A2F4E0E000
heap
page read and write
1A306054000
trusted library allocation
page read and write
1A2FF02F000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
1A302206000
heap
page read and write
1A2FFC8A000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A3019FE000
trusted library allocation
page read and write
1A306075000
trusted library allocation
page read and write
1A30093A000
trusted library allocation
page read and write
1A2FE1ED000
trusted library allocation
page read and write
23F47E9E000
trusted library allocation
page read and write
1A3081E9000
trusted library allocation
page read and write
1A2FDDF5000
trusted library allocation
page read and write
1A305EF3000
trusted library allocation
page read and write
1A30A3F2000
trusted library allocation
page read and write
1A3007E6000
trusted library allocation
page read and write
1A301442000
trusted library allocation
page read and write
23F48530000
trusted library allocation
page read and write
24DE3F6B000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2FBA62000
trusted library allocation
page read and write
1A2FE1C0000
trusted library allocation
page read and write
1A305F2B000
trusted library allocation
page read and write
1A2FF9EA000
trusted library allocation
page read and write
24DE3D00000
trusted library allocation
page read and write
1A2F4E41000
heap
page read and write
1A2F4E14000
heap
page read and write
1A2F4E71000
heap
page read and write
1A300720000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A3004B8000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A2FF0C3000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
BE9C53E000
unkown
page readonly
1A30A3A8000
trusted library allocation
page read and write
1A2FFAA7000
trusted library allocation
page read and write
1A2FF078000
trusted library allocation
page read and write
1A2FE96F000
trusted library allocation
page read and write
187A37B0000
unclassified section
page read and write
23F48400000
heap
page read and write
1A2F4E23000
heap
page read and write
1A3017F3000
trusted library allocation
page read and write
1A2FE998000
trusted library allocation
page read and write
1A301761000
trusted library allocation
page read and write
1A2FDA85000
trusted library allocation
page read and write
1A2FBA33000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
24DE4100000
trusted library allocation
page read and write
7DAE8FE000
unkown
page readonly
24DE3FB7000
trusted library allocation
page read and write
1A30A1EC000
trusted library allocation
page read and write
1A3005DC000
trusted library allocation
page read and write
1A2F4E66000
heap
page read and write
1A301D01000
trusted library allocation
page read and write
1A2FF9CC000
trusted library allocation
page read and write
1A30A029000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2FC44D000
trusted library allocation
page read and write
1A2FF2BF000
trusted library allocation
page read and write
1A30144D000
trusted library allocation
page read and write
1A300717000
trusted library allocation
page read and write
1A2FEA6D000
trusted library allocation
page read and write
1A300958000
trusted library allocation
page read and write
187A3750000
heap
page read and write
1A2FF06B000
trusted library allocation
page read and write
1A2FE931000
trusted library allocation
page read and write
1A2FDC7E000
trusted library allocation
page read and write
1A2FF991000
trusted library allocation
page read and write
1A2FDACE000
trusted library allocation
page read and write
1A2F4E37000
heap
page read and write
1A305F56000
trusted library allocation
page read and write
1A2FEAF3000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
187A3912000
trusted library allocation
page read and write
24DE3BBA000
heap
page read and write
1A2FE9B2000
trusted library allocation
page read and write
1A2FECC5000
trusted library allocation
page read and write
1A2FEA7C000
trusted library allocation
page read and write
1A2FFB82000
trusted library allocation
page read and write
F6C000
unkown
page readonly
1A2FF468000
trusted library allocation
page read and write
1A2FEAEF000
trusted library allocation
page read and write
1A3009E3000
trusted library allocation
page read and write
1A2F4E16000
heap
page read and write
1A2FDACA000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
24DE3F13000
trusted library allocation
page read and write
1A30A653000
trusted library allocation
page read and write
1A2FEAB0000
trusted library allocation
page read and write
1A2FADFD000
trusted library allocation
page read and write
23F4897B000
heap
page read and write
1A305E4A000
trusted library allocation
page read and write
1A2FADD3000
trusted library allocation
page read and write
1A305E68000
trusted library allocation
page read and write
1A30A2EE000
trusted library allocation
page read and write
1A2FFDC6000
trusted library allocation
page read and write
1A305EED000
trusted library allocation
page read and write
1A2F4E2A000
heap
page read and write
23F4843C000
heap
page read and write
A63D9FF000
stack
page read and write
1A2F4E23000
heap
page read and write
1A30A3F0000
trusted library allocation
page read and write
1A2FB04E000
trusted library allocation
page read and write
1A2FF207000
trusted library allocation
page read and write
1A3019D8000
trusted library allocation
page read and write
1A2FF18F000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A306784000
trusted library allocation
page read and write
1A3019F4000
trusted library allocation
page read and write
1A2FFC6C000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A3008FE000
trusted library allocation
page read and write
1A2FF9E3000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FDCA5000
trusted library allocation
page read and write
1A305EE0000
trusted library allocation
page read and write
1A3021F1000
heap
page read and write
1A2FB0DC000
trusted library allocation
page read and write
1A3017E6000
trusted library allocation
page read and write
1A2F9E13000
trusted library allocation
page read and write
1A2FFCE9000
trusted library allocation
page read and write
1A3080BD000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
187A395B000
trusted library allocation
page read and write
1A2FEC70000
trusted library allocation
page read and write
1A2F4E3E000
heap
page read and write
1A2FEC74000
trusted library allocation
page read and write
1A2F4E33000
heap
page read and write
1A2F4E37000
heap
page read and write
1A2FC46B000
trusted library allocation
page read and write
1A2F4E6C000
heap
page read and write
23F47E48000
trusted library allocation
page read and write
1A3014C8000
trusted library allocation
page read and write
1A305F9F000
trusted library allocation
page read and write
1A2FF462000
trusted library allocation
page read and write
1A30A233000
trusted library allocation
page read and write
1A3098AF000
trusted library allocation
page read and write
1A30A3A4000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4DF4000
heap
page read and write
1A2FB0BC000
trusted library allocation
page read and write
1A2FD70D000
heap
page read and write
1A30A3E9000
trusted library allocation
page read and write
1A2F4E22000
heap
page read and write
1A2F4E84000
heap
page read and write
24DE3E4F000
unclassified section
page read and write
1A2F4E0E000
heap
page read and write
24DE3F65000
trusted library allocation
page read and write
1A2FF29D000
trusted library allocation
page read and write
1A2F4E23000
heap
page read and write
1A2FDA92000
trusted library allocation
page read and write
1A300755000
trusted library allocation
page read and write
1A2FECC5000
trusted library allocation
page read and write
1A2F4E0F000
heap
page read and write
1A2FF0E6000
trusted library allocation
page read and write
1A305FB4000
trusted library allocation
page read and write
1A300749000
trusted library allocation
page read and write
1A3080A8000
trusted library allocation
page read and write
1A2FAFD7000
trusted library allocation
page read and write
1A3005C7000
trusted library allocation
page read and write
1A3009B5000
trusted library allocation
page read and write
1A3007F3000
trusted library allocation
page read and write
1A301C43000
trusted library allocation
page read and write
1A30A3F4000
trusted library allocation
page read and write
187A3981000
trusted library allocation
page read and write
1A30057C000
trusted library allocation
page read and write
1A2FFCAE000
trusted library allocation
page read and write
1A30A29A000
trusted library allocation
page read and write
1A2FFCFD000
trusted library allocation
page read and write
1A305EED000
trusted library allocation
page read and write
1A3009ED000
trusted library allocation
page read and write
1A30098D000
trusted library allocation
page read and write
1A3007C0000
trusted library allocation
page read and write
24DE3F24000
trusted library allocation
page read and write
1A2FEAB2000
trusted library allocation
page read and write
187A395D000
trusted library allocation
page read and write
1A2F4E26000
heap
page read and write
1A2F4E7F000
heap
page read and write
1A306063000
trusted library allocation
page read and write
1A300705000
trusted library allocation
page read and write
1A3079D0000
trusted library allocation
page read and write
1A2F4E29000
heap
page read and write
1A2FC449000
trusted library allocation
page read and write
1A2FE1BB000
trusted library allocation
page read and write
1A2F4E4B000
heap
page read and write
1A3007C7000
trusted library allocation
page read and write
23F47DD2000
unkown
page execute read
There are 3632 hidden memdumps, click here to show them.