IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cd829015-d6a8-4cf4-b990-05013b599a5e.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cd829015-d6a8-4cf4-b990-05013b599a5e.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 26944 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 26944 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\cc98356d-39fa-47c0-a475-b7bbc1c84801 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\cc98356d-39fa-47c0-a475-b7bbc1c84801.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://www.facebook.com/video" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.facebook.com/video --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.facebook.com/video --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {229489d4-826a-4f96-a71a-4be4e9eb3af8} 760 "\\.\pipe\gecko-crash-server-pipe.760" 1afb646cb10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4136 -parentBuildID 20230927232528 -prefsHandle 4120 -prefMapHandle 4116 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b84a474f-afef-458f-8c5b-3129f3854e6d} 760 "\\.\pipe\gecko-crash-server-pipe.760" 1afc8a1c810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3036 -prefMapHandle 3048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1003c90-d201-4205-be3a-d720dcdb7632} 760 "\\.\pipe\gecko-crash-server-pipe.760" 1afd218f310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://spocs.getpocket.com/CN=The
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
star-mini.c10r.facebook.com
157.240.0.35
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
198.187.3.20.in-addr.arpa
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
157.240.0.35
star-mini.c10r.facebook.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1AFC5AFB000
heap
page read and write
1AFCE735000
trusted library allocation
page read and write
1AFC5B43000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFBD271000
heap
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC7FE0000
trusted library allocation
page read and write
1AFD220A000
trusted library allocation
page read and write
1AFC7BE1000
trusted library allocation
page read and write
1AFCEE42000
trusted library allocation
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC79D6000
trusted library allocation
page read and write
28D3ED11000
trusted library allocation
page read and write
1AFC79D1000
trusted library allocation
page read and write
1AFC9E5B000
trusted library allocation
page read and write
1AFC79C3000
trusted library allocation
page read and write
1AFCEA4C000
trusted library allocation
page read and write
1AFC7F8B000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFD1B8F000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
1AFBD284000
heap
page read and write
1AFC797B000
trusted library allocation
page read and write
1AFC7CF5000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC5FE6000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFC79CE000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCE7A4000
trusted library allocation
page read and write
1AFC7798000
trusted library allocation
page read and write
1AFCF6E2000
trusted library allocation
page read and write
1AFC5E82000
trusted library allocation
page read and write
1AFC79C1000
trusted library allocation
page read and write
1AFCEA7B000
trusted library allocation
page read and write
1AFC9EFE000
trusted library allocation
page read and write
1AFC5FF0000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7962000
trusted library allocation
page read and write
1AFBD258000
heap
page read and write
1AFBD285000
heap
page read and write
1AFC2223000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
28D3F4CF000
heap
page read and write
1AFC7D3E000
trusted library allocation
page read and write
1AFC23B5000
trusted library allocation
page read and write
1AFC7FDE000
trusted library allocation
page read and write
1AFC7FBF000
trusted library allocation
page read and write
1AFC7CA2000
trusted library allocation
page read and write
1AFD2197000
trusted library allocation
page read and write
1AFC7B2F000
trusted library allocation
page read and write
1AFC6F12000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC5ACA000
heap
page read and write
1AFC75C4000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFC5FE2000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFC8DC7000
trusted library allocation
page read and write
1AFCE615000
trusted library allocation
page read and write
1AFC7F11000
trusted library allocation
page read and write
1AFC8DCF000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCEAB1000
trusted library allocation
page read and write
1AFCE922000
trusted library allocation
page read and write
1AFC7F57000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFC7B55000
trusted library allocation
page read and write
1AFCF680000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1AFC79A9000
trusted library allocation
page read and write
1AFC7EA3000
trusted library allocation
page read and write
1AFCE3F0000
trusted library allocation
page read and write
30155FE000
stack
page read and write
1AFC69FB000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCE9CF000
trusted library allocation
page read and write
1AFC7B21000
trusted library allocation
page read and write
1AFC75CC000
trusted library allocation
page read and write
1AFCE3F6000
trusted library allocation
page read and write
1AFCE54E000
trusted library allocation
page read and write
22B5B9CA000
heap
page read and write
1AFCFF6C000
trusted library allocation
page read and write
1AFC6F71000
trusted library allocation
page read and write
1AFC8C5E000
trusted library allocation
page read and write
1AFCEA51000
trusted library allocation
page read and write
1AFC6395000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC7B34000
trusted library allocation
page read and write
1AFC22FE000
trusted library allocation
page read and write
1AFC7BBE000
trusted library allocation
page read and write
1AFCEEFE000
trusted library allocation
page read and write
1AFC8BBF000
trusted library allocation
page read and write
1AFC8DA3000
trusted library allocation
page read and write
A3E000
stack
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFCF6C3000
trusted library allocation
page read and write
1AFCE9E3000
trusted library allocation
page read and write
1AFCFCCA000
trusted library allocation
page read and write
1AFC6909000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFC6563000
trusted library allocation
page read and write
1054000
unkown
page readonly
1AFCF634000
trusted library allocation
page read and write
1AFCFA96000
trusted library allocation
page read and write
1AFCF6CB000
trusted library allocation
page read and write
1AFCF6C3000
trusted library allocation
page read and write
1AFCE4FC000
trusted library allocation
page read and write
1AFC7F91000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC693D000
trusted library allocation
page read and write
1AFC796A000
trusted library allocation
page read and write
1AFCE74C000
trusted library allocation
page read and write
54223D8000
stack
page read and write
1AFC7F51000
trusted library allocation
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFCE44F000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFCEA67000
trusted library allocation
page read and write
1AFCEEE2000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFBD28C000
heap
page read and write
28D3EB60000
heap
page readonly
1AFBD272000
heap
page read and write
1AFC86DC000
trusted library allocation
page read and write
1AFC569B000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC69FB000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD271000
heap
page read and write
1AFCFCF5000
trusted library allocation
page read and write
1AFBD284000
heap
page read and write
1AFCEE7F000
trusted library allocation
page read and write
28D3F620000
heap
page read and write
5423BFE000
unkown
page readonly
1AFCEE4D000
trusted library allocation
page read and write
1AFC65FB000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC7C9B000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
22B5BD12000
trusted library allocation
page read and write
1C35B903000
trusted library allocation
page read and write
1AFC5AFB000
heap
page read and write
1AFCE48A000
trusted library allocation
page read and write
1AFC7BE1000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
F81000
unkown
page execute read
28D3F53D000
heap
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFCE4AD000
trusted library allocation
page read and write
1AFC9DE9000
trusted library allocation
page read and write
1AFCF680000
trusted library allocation
page read and write
1AFC9D60000
trusted library allocation
page read and write
1AFCFFB4000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFCC3F8000
trusted library allocation
page read and write
1AFC8733000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFC34D4000
trusted library allocation
page read and write
1AFCF6FC000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFC6639000
trusted library allocation
page read and write
1AFC658F000
trusted library allocation
page read and write
3013B4E000
stack
page read and write
1AFCE7AA000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFCF634000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
1AFD2060000
trusted library allocation
page read and write
1AFC9EFC000
trusted library allocation
page read and write
1AFC77A9000
trusted library allocation
page read and write
1AFC6F82000
trusted library allocation
page read and write
1AFC6F49000
trusted library allocation
page read and write
1AFC5FA7000
trusted library allocation
page read and write
1AFCE6FC000
trusted library allocation
page read and write
1AFC8C84000
trusted library allocation
page read and write
1AFCFF88000
trusted library allocation
page read and write
1AFCE40E000
trusted library allocation
page read and write
1AFCF6E1000
trusted library allocation
page read and write
1AFC7931000
trusted library allocation
page read and write
5424C7E000
unkown
page readonly
1AFC5ACA000
heap
page read and write
28D3F4B9000
heap
page read and write
1AFC8B8D000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCE4E7000
trusted library allocation
page read and write
1AFCE7B8000
trusted library allocation
page read and write
1AFBD29A000
heap
page read and write
1AFCF622000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFCE91E000
trusted library allocation
page read and write
28D3EA00000
heap
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFCEE23000
trusted library allocation
page read and write
1AFCC3F8000
trusted library allocation
page read and write
1AFC8C73000
trusted library allocation
page read and write
1AFCC3E9000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFBD275000
heap
page read and write
1AFCE4DE000
trusted library allocation
page read and write
22B5BD5D000
trusted library allocation
page read and write
1AFC9DF0000
trusted library allocation
page read and write
1AFC62E1000
trusted library allocation
page read and write
1AFC86C0000
trusted library allocation
page read and write
1AFC69BA000
trusted library allocation
page read and write
1AFC665B000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCE9E1000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCF664000
trusted library allocation
page read and write
1AFC9E98000
trusted library allocation
page read and write
1AFC65CC000
trusted library allocation
page read and write
1AFC6673000
trusted library allocation
page read and write
1AFC7BF5000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFC7FA4000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCA501000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC871C000
trusted library allocation
page read and write
22B5BD8F000
trusted library allocation
page read and write
1AFBD26E000
heap
page read and write
1AFBD256000
heap
page read and write
1AFCEAB1000
trusted library allocation
page read and write
1AFCE922000
trusted library allocation
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFC7BA1000
trusted library allocation
page read and write
1AFCE9DB000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFCF6C3000
trusted library allocation
page read and write
2E7A9A01000
trusted library allocation
page execute read
1AFC5AD4000
heap
page read and write
1AFC795B000
trusted library allocation
page read and write
28D3F4B0000
heap
page read and write
1AFCF6A0000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC89F1000
trusted library allocation
page read and write
1AFC6945000
trusted library allocation
page read and write
1AFC89AE000
trusted library allocation
page read and write
1AFC8719000
trusted library allocation
page read and write
28D3EDC7000
trusted library allocation
page read and write
1AFCEA22000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC326C000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
1AFBD2CC000
heap
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFC5FAE000
trusted library allocation
page read and write
1AFC7B13000
trusted library allocation
page read and write
1AFC7CEA000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFCEECB000
trusted library allocation
page read and write
1AFC6685000
trusted library allocation
page read and write
1AFC6680000
trusted library allocation
page read and write
1AFCE4FC000
trusted library allocation
page read and write
1AFC7B3C000
trusted library allocation
page read and write
1AFC7B84000
trusted library allocation
page read and write
28D3FBB9000
heap
page read and write
1AFBD258000
heap
page read and write
1AFCEAB1000
trusted library allocation
page read and write
33A000
stack
page read and write
1AFBD24E000
heap
page read and write
1AFC776C000
trusted library allocation
page read and write
1AFC7F00000
trusted library allocation
page read and write
28D3F536000
heap
page read and write
1AFC7CC0000
trusted library allocation
page read and write
28D3F4BC000
heap
page read and write
1AFC6F8E000
trusted library allocation
page read and write
1AFCEEC9000
trusted library allocation
page read and write
1AFC5B68000
heap
page read and write
1AFC7BBA000
trusted library allocation
page read and write
1AFCE316000
trusted library allocation
page read and write
1AFBD28B000
heap
page read and write
1AFC6685000
trusted library allocation
page read and write
1AFCE8F5000
trusted library allocation
page read and write
241A54E0000
heap
page read and write
1AFC5B26000
heap
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC7B1B000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFC9EC0000
trusted library allocation
page read and write
1AFC9E6D000
trusted library allocation
page read and write
1AFC7B84000
trusted library allocation
page read and write
1AFC2326000
trusted library allocation
page read and write
1AFC66FB000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD26B000
heap
page read and write
1AFCA1A3000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFC6988000
trusted library allocation
page read and write
1AFCC3C9000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFCEEDE000
trusted library allocation
page read and write
28D3F536000
heap
page read and write
1AFC8C47000
trusted library allocation
page read and write
1AFC79C6000
trusted library allocation
page read and write
1AFD0A75000
trusted library allocation
page read and write
1AFCFF83000
trusted library allocation
page read and write
1AFCF62D000
trusted library allocation
page read and write
1AFC7D3A000
trusted library allocation
page read and write
1AFD0CC1000
trusted library allocation
page read and write
1AFC66AE000
trusted library allocation
page read and write
1AFCEAF0000
trusted library allocation
page read and write
1AFC77EF000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC696D000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC6F9C000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFC66AE000
trusted library allocation
page read and write
1AFCEECB000
trusted library allocation
page read and write
1AFCEEBA000
trusted library allocation
page read and write
1AFCA0B1000
trusted library allocation
page read and write
1AFC6685000
trusted library allocation
page read and write
1AFCEE42000
trusted library allocation
page read and write
1AFD2197000
trusted library allocation
page read and write
1AFC1C9E000
trusted library allocation
page read and write
1AFC7760000
trusted library allocation
page read and write
1AFCEE75000
trusted library allocation
page read and write
1AFC7F60000
trusted library allocation
page read and write
1AFCA58B000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC5B05000
heap
page read and write
1AFC9EB2000
trusted library allocation
page read and write
1AFBD252000
heap
page read and write
1AFC5E7F000
trusted library allocation
page read and write
1AFD2267000
trusted library allocation
page read and write
1AFC7BE5000
trusted library allocation
page read and write
1AFCEA57000
trusted library allocation
page read and write
1AFD22F4000
trusted library allocation
page read and write
1AFCE4F8000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFBD25A000
heap
page read and write
1AFC7798000
trusted library allocation
page read and write
1AFCEED5000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1AFC9E93000
trusted library allocation
page read and write
1AFCFF8F000
trusted library allocation
page read and write
1AFC5AFB000
heap
page read and write
1AFCEE43000
trusted library allocation
page read and write
1AFC9EAA000
trusted library allocation
page read and write
1AFC69AC000
trusted library allocation
page read and write
1AFCE6FC000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFBD266000
heap
page read and write
1AFCE558000
trusted library allocation
page read and write
1AFC7FFB000
trusted library allocation
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFCE9DF000
trusted library allocation
page read and write
1AFCE48C000
trusted library allocation
page read and write
1AFCC39E000
trusted library allocation
page read and write
241A71B7000
heap
page read and write
1AFC9D84000
trusted library allocation
page read and write
1AFCEA66000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
1AFC7CF0000
trusted library allocation
page read and write
1AFC349C000
trusted library allocation
page read and write
1AFC69E8000
trusted library allocation
page read and write
1AFBD28A000
heap
page read and write
1AFC63DE000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD26A000
heap
page read and write
1AFCE72C000
trusted library allocation
page read and write
1AFC698F000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFD1BBE000
trusted library allocation
page read and write
1AFCF6C0000
trusted library allocation
page read and write
1AFC5F3B000
trusted library allocation
page read and write
1AFCEE4D000
trusted library allocation
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFBD26E000
heap
page read and write
1AFC9D18000
trusted library allocation
page read and write
1AFC6F96000
trusted library allocation
page read and write
1AFC799C000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCEA3E000
trusted library allocation
page read and write
1AFC6574000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
22B5BD46000
trusted library allocation
page read and write
1AFC7D4C000
trusted library allocation
page read and write
1AFCE3FC000
trusted library allocation
page read and write
1AFC8BBF000
trusted library allocation
page read and write
1AFC2326000
trusted library allocation
page read and write
1C35B981000
trusted library allocation
page read and write
1AFBD265000
heap
page read and write
28D3EDBD000
trusted library allocation
page read and write
1AFCE4B8000
trusted library allocation
page read and write
1AFBD2C9000
heap
page read and write
1AFC7CC9000
trusted library allocation
page read and write
1AFC77B3000
trusted library allocation
page read and write
1AFC7FEE000
trusted library allocation
page read and write
1AFC7BA1000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCEA6A000
trusted library allocation
page read and write
1AFCA1F9000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1C35B972000
trusted library allocation
page read and write
28D3E930000
unclassified section
page readonly
1AFC8BFE000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFC5B68000
heap
page read and write
1AFC8B73000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1C35B4D0000
unclassified section
page readonly
1AFCE9E1000
trusted library allocation
page read and write
1AFC7B85000
trusted library allocation
page read and write
1AFC8C73000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFC7EE6000
trusted library allocation
page read and write
1AFC7BA6000
trusted library allocation
page read and write
28D3E920000
unclassified section
page readonly
1AFC69FB000
trusted library allocation
page read and write
1AFC6F2C000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFCE4B8000
trusted library allocation
page read and write
1AFC6FFA000
trusted library allocation
page read and write
1AFCE599000
trusted library allocation
page read and write
1AFCEA6B000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC863A000
trusted library allocation
page read and write
1AFCA589000
heap
page read and write
3510000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFC5ACA000
heap
page read and write
1AFC7AE8000
trusted library allocation
page read and write
22B5BA7F000
unclassified section
page read and write
1AFCE548000
trusted library allocation
page read and write
1AFC7754000
trusted library allocation
page read and write
1AFC6959000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1AFBD256000
heap
page read and write
1AFC694A000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFCEA71000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCE9D5000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
28D3EC00000
trusted library allocation
page read and write
1AFCC3DB000
trusted library allocation
page read and write
1C35BB00000
heap
page read and write
1AFC6574000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFD1B0B000
trusted library allocation
page read and write
1AFC9E53000
trusted library allocation
page read and write
1AFC89E7000
trusted library allocation
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFCC3F8000
trusted library allocation
page read and write
1AFC83F7000
trusted library allocation
page read and write
1AFCE985000
trusted library allocation
page read and write
1AFCA0AE000
trusted library allocation
page read and write
1AFBD2D5000
heap
page read and write
1AFBD26C000
heap
page read and write
1AFCE47B000
trusted library allocation
page read and write
1AFC9D1E000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFCE3D9000
trusted library allocation
page read and write
1AFCEA6C000
trusted library allocation
page read and write
1AFCE3C7000
trusted library allocation
page read and write
1AFD2145000
trusted library allocation
page read and write
1AFC7BF3000
trusted library allocation
page read and write
1AFCE7BA000
trusted library allocation
page read and write
1AFD0D89000
trusted library allocation
page read and write
1AFCA58C000
heap
page read and write
1AFCA5E1000
heap
page read and write
F80000
unkown
page readonly
28D3EE31000
unkown
page execute read
1AFBD250000
heap
page read and write
1AFBD250000
heap
page read and write
22B5BDA7000
trusted library allocation
page read and write
1AFC6E4D000
trusted library allocation
page read and write
1AFD226B000
trusted library allocation
page read and write
1AFCFCBD000
trusted library allocation
page read and write
1C35B550000
unclassified section
page readonly
1AFBD267000
heap
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFCEEB5000
trusted library allocation
page read and write
1AFC6348000
trusted library allocation
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFCC3F8000
trusted library allocation
page read and write
241A54A0000
heap
page read and write
1AFC5B33000
heap
page read and write
1AFC7CAC000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFBD26B000
heap
page read and write
28D3F54C000
heap
page read and write
1AFC5F62000
trusted library allocation
page read and write
1AFCE550000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFCE7E6000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
22B5BD76000
trusted library allocation
page read and write
1AFC6FEE000
trusted library allocation
page read and write
1AFC663B000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFC6F51000
trusted library allocation
page read and write
1AFC63B5000
trusted library allocation
page read and write
28D3ED03000
trusted library allocation
page read and write
5426D7E000
unkown
page readonly
1AFCEA5B000
trusted library allocation
page read and write
1AFCC396000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFD22A1000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
124F000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFCE631000
trusted library allocation
page read and write
1AFCE793000
trusted library allocation
page read and write
1AFC666A000
trusted library allocation
page read and write
1AFCEEDE000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC7B84000
trusted library allocation
page read and write
1AFC5FB8000
trusted library allocation
page read and write
1AFCFCE9000
trusted library allocation
page read and write
1AFD0965000
trusted library allocation
page read and write
1AFCF6C6000
trusted library allocation
page read and write
F6E000
stack
page read and write
1AFCE781000
trusted library allocation
page read and write
28D3F4B0000
heap
page read and write
1AFCE5FB000
trusted library allocation
page read and write
1AFC792C000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFC6265000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFD202B000
trusted library allocation
page read and write
1AFBD26F000
heap
page read and write
28D3F541000
heap
page read and write
1AFCA200000
trusted library allocation
page read and write
1AFCE5EA000
trusted library allocation
page read and write
1AFC7B1E000
trusted library allocation
page read and write
1AFCE470000
trusted library allocation
page read and write
1AFC69AB000
trusted library allocation
page read and write
1AFBD27D000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC5AD4000
heap
page read and write
1C35B994000
trusted library allocation
page read and write
1AFC7F13000
trusted library allocation
page read and write
1AFBD26C000
heap
page read and write
1AFC6F32000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFBD252000
heap
page read and write
1AFC5E8B000
trusted library allocation
page read and write
1AFC9C93000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFCFF67000
trusted library allocation
page read and write
1C35BA18000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCFFA2000
trusted library allocation
page read and write
1210000
heap
page read and write
1AFC9EB8000
trusted library allocation
page read and write
1AFC7982000
trusted library allocation
page read and write
1AFC5B49000
heap
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC6E17000
trusted library allocation
page read and write
28D3F53D000
heap
page read and write
1AFC7B5C000
trusted library allocation
page read and write
1AFC5638000
trusted library allocation
page read and write
1C35B530000
remote allocation
page read and write
1AFC8B84000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFCEED2000
trusted library allocation
page read and write
1AFBD277000
heap
page read and write
1AFCE69E000
trusted library allocation
page read and write
1AFC69B0000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFC86D1000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2BA000
heap
page read and write
1AFC5FAE000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFBD2C4000
heap
page read and write
1AFCEEF0000
trusted library allocation
page read and write
1AFCE447000
trusted library allocation
page read and write
1AFD1B28000
trusted library allocation
page read and write
28D3EB8F000
unclassified section
page read and write
1AFBD2C6000
heap
page read and write
1AFC1C98000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFD1BBE000
trusted library allocation
page read and write
1AFCA159000
trusted library allocation
page read and write
1AFBD277000
heap
page read and write
1AFC8633000
trusted library allocation
page read and write
1AFC6556000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD26B000
heap
page read and write
1AFC5B3B000
heap
page read and write
1AFC7988000
trusted library allocation
page read and write
1AFC7EE8000
trusted library allocation
page read and write
1AFCA501000
heap
page read and write
1AFD2128000
trusted library allocation
page read and write
1AFBD2CF000
heap
page read and write
3EE000
stack
page read and write
1AFCE447000
trusted library allocation
page read and write
1AFC9ED1000
trusted library allocation
page read and write
1AFC8BA8000
trusted library allocation
page read and write
1AFCE985000
trusted library allocation
page read and write
1AFC6368000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFD2172000
trusted library allocation
page read and write
1AFC797E000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC5FF1000
trusted library allocation
page read and write
241A54BD000
heap
page read and write
1AFCE7BA000
trusted library allocation
page read and write
1AFBD282000
heap
page read and write
1AFBD285000
heap
page read and write
1AFC5FC9000
trusted library allocation
page read and write
1AFD21FC000
trusted library allocation
page read and write
1AFC7CA5000
trusted library allocation
page read and write
1AFD0DA8000
trusted library allocation
page read and write
1AFC6F49000
trusted library allocation
page read and write
1AFC5AF7000
heap
page read and write
1AFC8B61000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
3013B8E000
unkown
page readonly
1AFCEEB8000
trusted library allocation
page read and write
1AFCE3F6000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC87EA000
trusted library allocation
page read and write
1AFC8C24000
trusted library allocation
page read and write
1AFCA1CA000
trusted library allocation
page read and write
1AFC8946000
trusted library allocation
page read and write
1AFC77B8000
trusted library allocation
page read and write
1AFC5FC9000
trusted library allocation
page read and write
1AFC6F83000
trusted library allocation
page read and write
1AFC66CD000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC5B26000
heap
page read and write
1AFC2393000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFC797B000
trusted library allocation
page read and write
1242000
heap
page read and write
1AFC6273000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1A0E000
stack
page read and write
54219DB000
stack
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFC666A000
trusted library allocation
page read and write
1AFC7FED000
trusted library allocation
page read and write
1AFC9DB9000
trusted library allocation
page read and write
1AFC6576000
trusted library allocation
page read and write
1AFC89E7000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
22B5BF07000
trusted library allocation
page read and write
1AFC694D000
trusted library allocation
page read and write
1AFCE4D7000
trusted library allocation
page read and write
1AFC7712000
trusted library allocation
page read and write
28D3ED5F000
trusted library allocation
page read and write
1AFCE5DC000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFC5B26000
heap
page read and write
1AFCEE3D000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC79AC000
trusted library allocation
page read and write
1AFCE9AA000
trusted library allocation
page read and write
28D3F4F1000
heap
page read and write
1AFC6EEC000
trusted library allocation
page read and write
1AFCEA83000
trusted library allocation
page read and write
1AFC65AA000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFD2168000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFC56A2000
trusted library allocation
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFC69A6000
trusted library allocation
page read and write
1AFC7C99000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFC9C96000
trusted library allocation
page read and write
1AFC7AE1000
trusted library allocation
page read and write
1AFCE6DB000
trusted library allocation
page read and write
1C35B702000
unclassified section
page read and write
1AFC8BC5000
trusted library allocation
page read and write
1AFCFFCA000
trusted library allocation
page read and write
28D3F4B3000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCEA64000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFC5B44000
heap
page read and write
1AFC7D73000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC695D000
trusted library allocation
page read and write
1AFCA123000
trusted library allocation
page read and write
1AFBD2B9000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFC828E000
trusted library allocation
page read and write
1AFC231E000
trusted library allocation
page read and write
1AFC9E30000
trusted library allocation
page read and write
1AFC5AF7000
heap
page read and write
1AFBD261000
heap
page read and write
1AFC663B000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFC6639000
trusted library allocation
page read and write
1AFBD2AE000
heap
page read and write
1AFCE6A5000
trusted library allocation
page read and write
1AFC6F7C000
trusted library allocation
page read and write
1AFC7721000
trusted library allocation
page read and write
1AFC6F39000
trusted library allocation
page read and write
1AFCF6A0000
trusted library allocation
page read and write
1AFC5E70000
trusted library allocation
page read and write
1AFC9EBD000
trusted library allocation
page read and write
28D3F4B9000
heap
page read and write
1AFC7744000
trusted library allocation
page read and write
1AFCEAD3000
trusted library allocation
page read and write
1AFC8DF8000
trusted library allocation
page read and write
1AFC9CB9000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFC5AAA000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC775B000
trusted library allocation
page read and write
1AFC5AEF000
heap
page read and write
1AFCA501000
heap
page read and write
1AFC7B1B000
trusted library allocation
page read and write
1AFD205D000
trusted library allocation
page read and write
1AFCE456000
trusted library allocation
page read and write
1AFCC3E9000
trusted library allocation
page read and write
1AFCE7DD000
trusted library allocation
page read and write
1AFBD282000
heap
page read and write
1AFC1CC9000
trusted library allocation
page read and write
9DB000
stack
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFC6E97000
trusted library allocation
page read and write
1AFBD260000
heap
page read and write
1AFC8C81000
trusted library allocation
page read and write
1AFCEE11000
trusted library allocation
page read and write
1AFC6F9E000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFCE4FC000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFCF6CE000
trusted library allocation
page read and write
1AFC9D13000
trusted library allocation
page read and write
1AFCA1B1000
trusted library allocation
page read and write
1AFCEEDB000
trusted library allocation
page read and write
1AFCEEB5000
trusted library allocation
page read and write
1AFC667E000
trusted library allocation
page read and write
28D3F538000
heap
page read and write
28D3F53D000
heap
page read and write
1AFBD250000
heap
page read and write
1AFC667A000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFC66C9000
trusted library allocation
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC9DDA000
trusted library allocation
page read and write
1AFC8C94000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC7B2F000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1FF65B00000
heap
page read and write
1AFCE54E000
trusted library allocation
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1218000
heap
page read and write
1AFCF6A9000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFC79B6000
trusted library allocation
page read and write
1AFBD2C4000
heap
page read and write
1AFC7FFB000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFC6969000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCEEE2000
trusted library allocation
page read and write
1AFC6ECF000
trusted library allocation
page read and write
1AFCA571000
heap
page read and write
1AFCE761000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFCE482000
trusted library allocation
page read and write
1AFC66AA000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1C35BA03000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCA501000
heap
page read and write
1AFBD2B3000
heap
page read and write
1AFD210B000
trusted library allocation
page read and write
1AFC6580000
trusted library allocation
page read and write
1AFCE49F000
trusted library allocation
page read and write
1AFCEEC2000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFC7EDE000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
28D3FBAC000
heap
page read and write
1AFC6F9E000
trusted library allocation
page read and write
1AFCE944000
trusted library allocation
page read and write
28D3FB6A000
heap
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFC7BFA000
trusted library allocation
page read and write
1AFC893F000
trusted library allocation
page read and write
28D3F4F8000
heap
page read and write
1AFCEA5B000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCE5BF000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFC7F91000
trusted library allocation
page read and write
1AFC9D43000
trusted library allocation
page read and write
1AFC7CC9000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
28D3FBAC000
heap
page read and write
1AFC5AFB000
heap
page read and write
1AFC602D000
trusted library allocation
page read and write
1AFCFFCA000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFBD256000
heap
page read and write
28D3F4AF000
heap
page read and write
1AFBD277000
heap
page read and write
28D3F4B9000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC5AE6000
heap
page read and write
1AFCEAF0000
trusted library allocation
page read and write
1AFCEE26000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC65A5000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC6639000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC8285000
trusted library allocation
page read and write
1AFC9D84000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFC7949000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFD1BAB000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFCEE42000
trusted library allocation
page read and write
1C35B947000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFC7BD5000
trusted library allocation
page read and write
1AFC626B000
trusted library allocation
page read and write
1AFC6F32000
trusted library allocation
page read and write
1AFC69DD000
trusted library allocation
page read and write
1AFCE8C1000
trusted library allocation
page read and write
1AFCEA85000
trusted library allocation
page read and write
1AFC6E32000
trusted library allocation
page read and write
1AFC7B6E000
trusted library allocation
page read and write
1AFC69F4000
trusted library allocation
page read and write
1AFD22C7000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC5B2B000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFBD256000
heap
page read and write
1AFCE9D7000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFCE6D8000
trusted library allocation
page read and write
1AFC7BBE000
trusted library allocation
page read and write
28D3FB61000
heap
page read and write
1AFC6F92000
trusted library allocation
page read and write
1AFC9EE4000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFC7CBF000
trusted library allocation
page read and write
1AFCEA71000
trusted library allocation
page read and write
1AFCEAD3000
trusted library allocation
page read and write
1AFD1BCF000
trusted library allocation
page read and write
1AFC79CA000
trusted library allocation
page read and write
3016EBE000
unkown
page readonly
1AFC797E000
trusted library allocation
page read and write
542195E000
unkown
page readonly
1AFC6948000
trusted library allocation
page read and write
1AFCE91E000
trusted library allocation
page read and write
1AFC63BC000
trusted library allocation
page read and write
1AFC5FBE000
trusted library allocation
page read and write
1AFCE556000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFCE8FE000
trusted library allocation
page read and write
1AFCF6E2000
trusted library allocation
page read and write
1AFC5E86000
trusted library allocation
page read and write
1AFCEEC1000
trusted library allocation
page read and write
1AFCFF95000
trusted library allocation
page read and write
1AFC56A2000
trusted library allocation
page read and write
1AFC5E63000
trusted library allocation
page read and write
542447E000
stack
page read and write
1AFD1BCF000
trusted library allocation
page read and write
1AFCE781000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC7BA1000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFC8DBF000
trusted library allocation
page read and write
1AFC34C2000
trusted library allocation
page read and write
1AFC5FA5000
trusted library allocation
page read and write
1AFC7F36000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC6F54000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFC7B56000
trusted library allocation
page read and write
1AFC6974000
trusted library allocation
page read and write
1AFCEE43000
trusted library allocation
page read and write
1AFCC3B6000
trusted library allocation
page read and write
1AFC6F1F000
trusted library allocation
page read and write
1AFC7B19000
trusted library allocation
page read and write
1AFCFF74000
trusted library allocation
page read and write
28D3EB10000
heap
page read and write
1C35B9A3000
trusted library allocation
page read and write
1AFD0CBA000
trusted library allocation
page read and write
1AFCEAF2000
trusted library allocation
page read and write
1AFCE4E1000
trusted library allocation
page read and write
1AFCE32F000
trusted library allocation
page read and write
1AFC65AF000
trusted library allocation
page read and write
28D3F72E000
trusted library allocation
page read and write
1AFC5FE6000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFCFFA2000
trusted library allocation
page read and write
1AFCE73D000
trusted library allocation
page read and write
1AFC799D000
trusted library allocation
page read and write
1AFC62B4000
trusted library allocation
page read and write
1AFC7995000
trusted library allocation
page read and write
22B5B9A0000
heap
page read and write
1C35BA0D000
trusted library allocation
page read and write
1AFD0DB1000
trusted library allocation
page read and write
1AFCE36B000
trusted library allocation
page read and write
1AFC5FC7000
trusted library allocation
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFC6635000
trusted library allocation
page read and write
1AFCEA5E000
trusted library allocation
page read and write
1AFC5660000
trusted library allocation
page read and write
1241000
heap
page read and write
1AFBD277000
heap
page read and write
1AFD2163000
trusted library allocation
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFC7B37000
trusted library allocation
page read and write
1AFC7BBA000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFC5B43000
heap
page read and write
1AFC8DFA000
trusted library allocation
page read and write
1AFCEA30000
trusted library allocation
page read and write
1AFC6362000
trusted library allocation
page read and write
1AFCE9D9000
trusted library allocation
page read and write
1AFBD272000
heap
page read and write
1AFCEEE3000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFCE9A5000
trusted library allocation
page read and write
1AFBD257000
heap
page read and write
1AFD1B30000
trusted library allocation
page read and write
1042000
unkown
page readonly
1AFC5FDE000
trusted library allocation
page read and write
1AFBD277000
heap
page read and write
1AFC5AAA000
heap
page read and write
1AFCA0FC000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFCEE7A000
trusted library allocation
page read and write
1AFC6F8E000
trusted library allocation
page read and write
1AFD0A7F000
trusted library allocation
page read and write
1AFCEAC2000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFC8DBA000
trusted library allocation
page read and write
1AFC5F93000
trusted library allocation
page read and write
1AFC8D96000
trusted library allocation
page read and write
B64A7FE000
unkown
page readonly
1AFC7CFA000
trusted library allocation
page read and write
1AFC79AC000
trusted library allocation
page read and write
1AFC5AFB000
heap
page read and write
1AFCE91B000
trusted library allocation
page read and write
1AFCEA57000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFCFFBE000
trusted library allocation
page read and write
1AFC7FE5000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCE793000
trusted library allocation
page read and write
1AFC5B44000
heap
page read and write
1AFBD2D5000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFCE78A000
trusted library allocation
page read and write
1AFC63B0000
trusted library allocation
page read and write
1AFCE558000
trusted library allocation
page read and write
28D3F53D000
heap
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFCEE61000
trusted library allocation
page read and write
1AFCEAD3000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC7F8B000
trusted library allocation
page read and write
1AFC5AFB000
heap
page read and write
1AFC6F9A000
trusted library allocation
page read and write
1AFC6973000
trusted library allocation
page read and write
1AFC7B9F000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
A94000
heap
page read and write
1AFCF6DF000
trusted library allocation
page read and write
1AFC7B28000
trusted library allocation
page read and write
1AFC6E2F000
trusted library allocation
page read and write
1AFBD25E000
heap
page read and write
1AFC7772000
trusted library allocation
page read and write
1AFC82D6000
trusted library allocation
page read and write
1AFC7CF5000
trusted library allocation
page read and write
5424D7E000
unkown
page readonly
1AFC9DAC000
trusted library allocation
page read and write
28D3FB98000
heap
page read and write
28D3F4B4000
heap
page read and write
542657E000
stack
page read and write
1AFD09BB000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFBD285000
heap
page read and write
1AFC7B74000
trusted library allocation
page read and write
1AFCC3DB000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
1AFCF6E4000
trusted library allocation
page read and write
1AFCE91E000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCE72A000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFC6E2F000
trusted library allocation
page read and write
1AFC6EEC000
trusted library allocation
page read and write
1AFCA1B4000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
22B5BE00000
heap
page read and write
1AFC6F17000
trusted library allocation
page read and write
1AFC7FBF000
trusted library allocation
page read and write
1AFCEECB000
trusted library allocation
page read and write
1AFCF6A9000
trusted library allocation
page read and write
1AFCEAA8000
trusted library allocation
page read and write
1AFD2232000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFCE5BB000
trusted library allocation
page read and write
1AFCE3D4000
trusted library allocation
page read and write
1AFCEAD3000
trusted library allocation
page read and write
1AFD2132000
trusted library allocation
page read and write
1AFD0D66000
trusted library allocation
page read and write
1AFC7E86000
trusted library allocation
page read and write
1AFD1BA3000
trusted library allocation
page read and write
1AFCE48A000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFCE4D7000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFBD28B000
heap
page read and write
1AFBD28C000
heap
page read and write
28D3F451000
heap
page read and write
1AFC9ECC000
trusted library allocation
page read and write
1AFCC3F1000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
241A71A0000
heap
page read and write
1AFBD277000
heap
page read and write
1AFBD27A000
heap
page read and write
1AFBD271000
heap
page read and write
1AFC7772000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC6EF3000
trusted library allocation
page read and write
1AFC7BD5000
trusted library allocation
page read and write
22B5C00C000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFC5FE2000
trusted library allocation
page read and write
1AFC5FCD000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1C35B6A4000
heap
page read and write
1AFC9D38000
trusted library allocation
page read and write
1AFC7BEB000
trusted library allocation
page read and write
1AFC7B85000
trusted library allocation
page read and write
1AFC65D1000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFBD2B0000
heap
page read and write
28D3E99C000
remote allocation
page execute read
123E000
heap
page read and write
1AFC5AAA000
heap
page read and write
1AFC23E1000
trusted library allocation
page read and write
1AFC69D1000
trusted library allocation
page read and write
1C35BA00000
trusted library allocation
page read and write
1AFCE9D9000
trusted library allocation
page read and write
1AFC9D4F000
trusted library allocation
page read and write
1AFC6229000
trusted library allocation
page read and write
1AFC8D99000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFC6FF7000
trusted library allocation
page read and write
1AFBD28A000
heap
page read and write
1AFCE6AD000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFC7F8B000
trusted library allocation
page read and write
1AFC9E93000
trusted library allocation
page read and write
1AFD099D000
trusted library allocation
page read and write
241A55D0000
heap
page read and write
1AFC5FE6000
trusted library allocation
page read and write
1AFC9D38000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
1AFCE9A5000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCE68D000
trusted library allocation
page read and write
1AFCE793000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC2313000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFC7FB2000
trusted library allocation
page read and write
8C5A1FF000
stack
page read and write
1AFBD277000
heap
page read and write
1AFC7C9B000
trusted library allocation
page read and write
1AFCE491000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC6EC0000
trusted library allocation
page read and write
1AFCEAF0000
trusted library allocation
page read and write
1AFC7CC5000
trusted library allocation
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFCEA6A000
trusted library allocation
page read and write
1AFBD2C6000
heap
page read and write
1AFBD2C6000
heap
page read and write
1AFC238C000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFCA501000
heap
page read and write
1AFCEE2C000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFCE49F000
trusted library allocation
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFC7B1E000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFC776E000
trusted library allocation
page read and write
1AFCE44A000
trusted library allocation
page read and write
1AFC8BCF000
trusted library allocation
page read and write
1AFC7B5C000
trusted library allocation
page read and write
1AFCE44F000
trusted library allocation
page read and write
1AFC346F000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFD20C2000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFC6EAD000
trusted library allocation
page read and write
1AFC7CEA000
trusted library allocation
page read and write
1AFC6F54000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC79E3000
trusted library allocation
page read and write
28D3FB7B000
heap
page read and write
1AFD2215000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFCEE88000
trusted library allocation
page read and write
8C579FA000
stack
page read and write
1AFCE332000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD24E000
heap
page read and write
1AFCA15C000
trusted library allocation
page read and write
1AFC7B6E000
trusted library allocation
page read and write
1AFC7F26000
trusted library allocation
page read and write
28D3F53D000
heap
page read and write
1AFC6961000
trusted library allocation
page read and write
22B5BE06000
heap
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFC5FC6000
trusted library allocation
page read and write
1AFC7BFA000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFC75F6000
trusted library allocation
page read and write
1AFCE4E7000
trusted library allocation
page read and write
28D3EAF0000
heap
page read and write
1AFCE4D7000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFC9D78000
trusted library allocation
page read and write
1AFCE697000
trusted library allocation
page read and write
1AFCEE2A000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFC5ACB000
heap
page read and write
1AFC69E8000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC7776000
trusted library allocation
page read and write
1AFC8BF1000
trusted library allocation
page read and write
28D3ED2F000
trusted library allocation
page read and write
2E7A9A01000
trusted library allocation
page execute read
1AFC7FAA000
trusted library allocation
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFCFF95000
trusted library allocation
page read and write
1AFCE910000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFCFF7F000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC69E7000
trusted library allocation
page read and write
1C35B680000
heap
page read and write
1AFC69D6000
trusted library allocation
page read and write
1AFC7EDE000
trusted library allocation
page read and write
1AFC7624000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFCE8C4000
trusted library allocation
page read and write
28D3F300000
heap
page read and write
1AFC5B3B000
heap
page read and write
1AFD1B98000
trusted library allocation
page read and write
1AFC663B000
trusted library allocation
page read and write
1AFC6988000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCE9DF000
trusted library allocation
page read and write
8C581FE000
stack
page read and write
1AFC9EB2000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
1AFC5B3F000
heap
page read and write
1AFD2062000
trusted library allocation
page read and write
1AFCF67E000
trusted library allocation
page read and write
1AFC639F000
trusted library allocation
page read and write
1AFC5FA7000
trusted library allocation
page read and write
1AFC8BFE000
trusted library allocation
page read and write
30166BE000
stack
page read and write
1AFC9D4F000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1AFBD274000
heap
page read and write
1AFC7772000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC236A000
trusted library allocation
page read and write
28D3F4EC000
heap
page read and write
1AFC7F0F000
trusted library allocation
page read and write
1AFBD2CC000
heap
page read and write
22B5BD78000
trusted library allocation
page read and write
1AFCFFF4000
trusted library allocation
page read and write
1AFC9E5B000
trusted library allocation
page read and write
1AFBD27A000
heap
page read and write
1AFCE7B6000
trusted library allocation
page read and write
1AFC7D6C000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1C35B570000
heap
page read and write
28D3FB84000
heap
page read and write
1AFC69A3000
trusted library allocation
page read and write
22B5BD49000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFCE79F000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFC5F69000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFCE6F6000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFC77CF000
trusted library allocation
page read and write
1AFC69DF000
trusted library allocation
page read and write
1AFCC3E3000
trusted library allocation
page read and write
1AFC6945000
trusted library allocation
page read and write
1AFC8739000
trusted library allocation
page read and write
1AFC7FEE000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD266000
heap
page read and write
1AFC7CC4000
trusted library allocation
page read and write
1AFC8B54000
trusted library allocation
page read and write
1AFC3460000
trusted library allocation
page read and write
1AFC5FC2000
trusted library allocation
page read and write
28D3ED67000
trusted library allocation
page read and write
1AFC6F7B000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFD0AE3000
trusted library allocation
page read and write
1AFCF6E2000
trusted library allocation
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFC775E000
trusted library allocation
page read and write
1AFBD26E000
heap
page read and write
1AFC5FA5000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC6225000
trusted library allocation
page read and write
1AFBD2B7000
heap
page read and write
1AFC69E2000
trusted library allocation
page read and write
1AFD1BEF000
trusted library allocation
page read and write
1AFCEE55000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC7CF5000
trusted library allocation
page read and write
1AFC692B000
trusted library allocation
page read and write
1AFC6960000
trusted library allocation
page read and write
1AFC7B8B000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC9D25000
trusted library allocation
page read and write
1AFC8DC5000
trusted library allocation
page read and write
1AFCE3BC000
trusted library allocation
page read and write
1AFC8C3B000
trusted library allocation
page read and write
1AFBD2B9000
heap
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFC9DA7000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFD0AD2000
trusted library allocation
page read and write
1AFC7CC9000
trusted library allocation
page read and write
1AFC6639000
trusted library allocation
page read and write
1AFC7FA4000
trusted library allocation
page read and write
1AFC6E0D000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD26F000
heap
page read and write
1AFC8BC6000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
1AFC5B43000
heap
page read and write
1AFD220C000
trusted library allocation
page read and write
22B5BD30000
trusted library allocation
page read and write
1AFCEED1000
trusted library allocation
page read and write
22B5BDC4000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC7D7C000
trusted library allocation
page read and write
1AFC6988000
trusted library allocation
page read and write
1AFBD263000
heap
page read and write
1AFC7B6E000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFCA0D4000
trusted library allocation
page read and write
1AFC9EED000
trusted library allocation
page read and write
1AFCC38E000
trusted library allocation
page read and write
22B5BA60000
heap
page readonly
1AFC62C2000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD267000
heap
page read and write
B64C1FE000
stack
page read and write
28D3F4BC000
heap
page read and write
1AFC7743000
trusted library allocation
page read and write
1AFD0AC7000
trusted library allocation
page read and write
28D3F703000
trusted library allocation
page read and write
1AFC9EF2000
trusted library allocation
page read and write
1AFCE7BF000
trusted library allocation
page read and write
1AFC5F10000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD2BC000
heap
page read and write
1AFCFF7F000
trusted library allocation
page read and write
1AFD2168000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFBD266000
heap
page read and write
1AFCEE6D000
trusted library allocation
page read and write
1AFC8C73000
trusted library allocation
page read and write
1AFC77B0000
trusted library allocation
page read and write
1AFCE4DE000
trusted library allocation
page read and write
1AFCFFCE000
trusted library allocation
page read and write
22B5B9C0000
heap
page read and write
1AFBD26C000
heap
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFC7742000
trusted library allocation
page read and write
1C35B97B000
trusted library allocation
page read and write
1AFC5F29000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFC7B5E000
trusted library allocation
page read and write
1AFC5F6F000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC6E35000
trusted library allocation
page read and write
22B5BD14000
trusted library allocation
page read and write
1AFC9DAC000
trusted library allocation
page read and write
1AFC87F2000
trusted library allocation
page read and write
1AFD09CF000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
28D3EB82000
unclassified section
page read and write
1AFCE793000
trusted library allocation
page read and write
28D3F450000
heap
page read and write
1AFBD2BC000
heap
page read and write
1AFCE434000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC8DFE000
trusted library allocation
page read and write
1AFC9D1E000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC5AD4000
heap
page read and write
1AFC7F60000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFCFCB8000
trusted library allocation
page read and write
1AFCE5FB000
trusted library allocation
page read and write
1AFC7B9E000
trusted library allocation
page read and write
1AFC6F9E000
trusted library allocation
page read and write
241A5800000
heap
page read and write
1AFCE73A000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFC698F000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC6922000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC7F6B000
trusted library allocation
page read and write
1AFC7972000
trusted library allocation
page read and write
1AFC8DCF000
trusted library allocation
page read and write
1AFCE49F000
trusted library allocation
page read and write
1AFC6F96000
trusted library allocation
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFBD279000
heap
page read and write
1AFC7CF7000
trusted library allocation
page read and write
1AFCEA2A000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD24F000
heap
page read and write
1AFC9EF8000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCE726000
trusted library allocation
page read and write
1AFC7736000
trusted library allocation
page read and write
1AFC8DE4000
trusted library allocation
page read and write
241A71AF000
heap
page read and write
1AFC9DA4000
trusted library allocation
page read and write
1AFC7B55000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFCF6CB000
trusted library allocation
page read and write
1AFC7BE5000
trusted library allocation
page read and write
1AFC7BD3000
trusted library allocation
page read and write
1AFC7BF5000
trusted library allocation
page read and write
1AFC6F71000
trusted library allocation
page read and write
1AFC9DB9000
trusted library allocation
page read and write
1AFCFC89000
trusted library allocation
page read and write
1AFCE9DD000
trusted library allocation
page read and write
1AFD22AA000
trusted library allocation
page read and write
1AFC7F57000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFCEAC5000
trusted library allocation
page read and write
1AFC79CE000
trusted library allocation
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFC6974000
trusted library allocation
page read and write
1AFCFD00000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD2C4000
heap
page read and write
1240000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFC69F9000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC222F000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFD213A000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFC69A6000
trusted library allocation
page read and write
1AFC69F4000
trusted library allocation
page read and write
B64A97E000
unkown
page readonly
1AFBD281000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFBD267000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFD2274000
trusted library allocation
page read and write
1AFCEA54000
trusted library allocation
page read and write
1AFD0D5C000
trusted library allocation
page read and write
1AFC7796000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC5B43000
heap
page read and write
28D3ED00000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD272000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC7B28000
trusted library allocation
page read and write
1AFCFFBE000
trusted library allocation
page read and write
1AFBD26C000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFCEA14000
trusted library allocation
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1AFCE9DD000
trusted library allocation
page read and write
1AFC9DBC000
trusted library allocation
page read and write
1AFC5FBE000
trusted library allocation
page read and write
1AFBD284000
heap
page read and write
1AFC82DE000
trusted library allocation
page read and write
1AFC7FB2000
trusted library allocation
page read and write
1AFC7922000
trusted library allocation
page read and write
1AFCEA70000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC5B44000
heap
page read and write
1AFC89FC000
trusted library allocation
page read and write
1AFCE59E000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFC9C5D000
trusted library allocation
page read and write
1AFC69AB000
trusted library allocation
page read and write
1AFC8B84000
trusted library allocation
page read and write
1AFC5FCD000
trusted library allocation
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFCF6C5000
trusted library allocation
page read and write
1AFCE411000
trusted library allocation
page read and write
1AFD2018000
trusted library allocation
page read and write
1AFC7F13000
trusted library allocation
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFC69FE000
trusted library allocation
page read and write
1AFC7FBF000
trusted library allocation
page read and write
1AFC7873000
trusted library allocation
page read and write
1AFD20D6000
trusted library allocation
page read and write
1AFC5E84000
trusted library allocation
page read and write
1AFC6675000
trusted library allocation
page read and write
1AFC5B43000
heap
page read and write
1AFC6F60000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFCFCBD000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCEEE3000
trusted library allocation
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFC7B1B000
trusted library allocation
page read and write
28D3F54C000
heap
page read and write
1AFC5B4C000
heap
page read and write
1AFCEE3D000
trusted library allocation
page read and write
1AFC8C7A000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFD2163000
trusted library allocation
page read and write
1AFCE7BF000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD25F000
heap
page read and write
1AFC75AA000
trusted library allocation
page read and write
1AFC34DA000
trusted library allocation
page read and write
1AFCE4E4000
trusted library allocation
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC5644000
trusted library allocation
page read and write
1AFCEA8F000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7FB2000
trusted library allocation
page read and write
1AFC1C90000
trusted library allocation
page read and write
1AFCC3A6000
trusted library allocation
page read and write
54233FE000
stack
page read and write
1AFBD28C000
heap
page read and write
1AFCEA4F000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFC79CA000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
3017EBE000
unkown
page readonly
241A54D4000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFCEA5E000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFC878E000
trusted library allocation
page read and write
1AFC7B9F000
trusted library allocation
page read and write
1AFC75C0000
trusted library allocation
page read and write
1AFBD272000
heap
page read and write
1AFC775B000
trusted library allocation
page read and write
1AFC6F8C000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFC8C8C000
trusted library allocation
page read and write
1AFC5E81000
trusted library allocation
page read and write
1AFCEE2A000
trusted library allocation
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFC7FAA000
trusted library allocation
page read and write
1AFC79F8000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1C35B9B7000
trusted library allocation
page read and write
1AFCF622000
trusted library allocation
page read and write
1AFCEEF7000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCEEDB000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFBD287000
heap
page read and write
1AFCE5E7000
trusted library allocation
page read and write
1AFBD27D000
heap
page read and write
1AFCF679000
trusted library allocation
page read and write
1AFC5AF6000
heap
page read and write
1AFCFFED000
trusted library allocation
page read and write
1AFC6998000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
9BF000
stack
page read and write
1AFD20E8000
trusted library allocation
page read and write
1AFCEEE2000
trusted library allocation
page read and write
1AFC7B2F000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC6EEC000
trusted library allocation
page read and write
1AFCEE4B000
trusted library allocation
page read and write
28D3F509000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFCEEDE000
trusted library allocation
page read and write
F80000
unkown
page readonly
1AFD2145000
trusted library allocation
page read and write
1AFC56D4000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC9E79000
trusted library allocation
page read and write
1AFCF634000
trusted library allocation
page read and write
1AFC7F6B000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFCE7AA000
trusted library allocation
page read and write
1AFC22F6000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFD20C2000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCE33C000
trusted library allocation
page read and write
1AFCEE5C000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC5AFB000
heap
page read and write
1AFC7B28000
trusted library allocation
page read and write
1AFC7F6B000
trusted library allocation
page read and write
1AFD210B000
trusted library allocation
page read and write
1AFCFCA8000
trusted library allocation
page read and write
1AFC771D000
trusted library allocation
page read and write
1AFC6F49000
trusted library allocation
page read and write
1AFCE62E000
trusted library allocation
page read and write
1AFC9D60000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFCE48C000
trusted library allocation
page read and write
1AFCEA1E000
trusted library allocation
page read and write
28D3EDBA000
trusted library allocation
page read and write
28D3E9AA000
heap
page read and write
1AFC8BC5000
trusted library allocation
page read and write
1AFC7FAA000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD26A000
heap
page read and write
1C35B800000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC8DEA000
trusted library allocation
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC7C13000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC9E4E000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
1AFCEA66000
trusted library allocation
page read and write
1AFBD288000
heap
page read and write
1AFC65C9000
trusted library allocation
page read and write
1AFC66A9000
trusted library allocation
page read and write
28D3F541000
heap
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFC7B9E000
trusted library allocation
page read and write
1AFD0DCA000
trusted library allocation
page read and write
1AFCEA3E000
trusted library allocation
page read and write
1AFCF636000
trusted library allocation
page read and write
1AFC6EC0000
trusted library allocation
page read and write
22B5BF05000
trusted library allocation
page read and write
1AFC8B36000
trusted library allocation
page read and write
1AFC7BBA000
trusted library allocation
page read and write
1AFCEE55000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC63C8000
trusted library allocation
page read and write
1AFCE78E000
trusted library allocation
page read and write
1AFC9DF0000
trusted library allocation
page read and write
241A54C2000
heap
page read and write
1AFCF677000
trusted library allocation
page read and write
1AFCE5B3000
trusted library allocation
page read and write
1AFC7FF6000
trusted library allocation
page read and write
28D3F541000
heap
page read and write
22B5BA50000
heap
page read and write
1AFC7C83000
trusted library allocation
page read and write
1AFCEE43000
trusted library allocation
page read and write
1C35B683000
heap
page read and write
1AFC7BBE000
trusted library allocation
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFC69E0000
trusted library allocation
page read and write
1AFCE41C000
trusted library allocation
page read and write
1AFC7D86000
trusted library allocation
page read and write
1AFC7CDD000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD275000
heap
page read and write
1AFCEA4F000
trusted library allocation
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFC7FA4000
trusted library allocation
page read and write
1AFC5FA7000
trusted library allocation
page read and write
1AFCE9BD000
trusted library allocation
page read and write
1AFBD25C000
heap
page read and write
1AFBD26B000
heap
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFCFFA2000
trusted library allocation
page read and write
1AFD215E000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD2BE000
heap
page read and write
1AFC6363000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC3271000
trusted library allocation
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFC8B8D000
trusted library allocation
page read and write
1AFC69F4000
trusted library allocation
page read and write
1AFC6F2C000
trusted library allocation
page read and write
1AFC7EDB000
trusted library allocation
page read and write
1AFCE5F5000
trusted library allocation
page read and write
1C35B911000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFBD256000
heap
page read and write
1AFCF6E2000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFCC361000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFC9D13000
trusted library allocation
page read and write
1AFCEAA8000
trusted library allocation
page read and write
1AFC8CBC000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFC6E8B000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFD0DFC000
trusted library allocation
page read and write
1AFCE4E7000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFBD274000
heap
page read and write
1AFC693E000
trusted library allocation
page read and write
1AFC82FD000
trusted library allocation
page read and write
1AFC56B6000
trusted library allocation
page read and write
28D3F531000
heap
page read and write
1AFCE556000
trusted library allocation
page read and write
1AFC69F1000
trusted library allocation
page read and write
1AFCEA4C000
trusted library allocation
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFCE5A5000
trusted library allocation
page read and write
1AFC5FB8000
trusted library allocation
page read and write
1AFCFFB7000
trusted library allocation
page read and write
1AFC7578000
trusted library allocation
page read and write
1AFCE7AD000
trusted library allocation
page read and write
1AFCF680000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFC6951000
trusted library allocation
page read and write
1AFC5644000
trusted library allocation
page read and write
1AFC795E000
trusted library allocation
page read and write
1AFBD277000
heap
page read and write
1AFCE6FC000
trusted library allocation
page read and write
28D3F4B9000
heap
page read and write
1C35B6A6000
heap
page read and write
4916FFF000
stack
page read and write
1AFBD256000
heap
page read and write
1AFC9C78000
trusted library allocation
page read and write
1AFC77A2000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC776E000
trusted library allocation
page read and write
1AFCEE2A000
trusted library allocation
page read and write
1AFC89E5000
trusted library allocation
page read and write
1AFC7984000
trusted library allocation
page read and write
1AFC7FB2000
trusted library allocation
page read and write
1AFCEEDB000
trusted library allocation
page read and write
1AFC34B2000
trusted library allocation
page read and write
1AFC667B000
trusted library allocation
page read and write
28D3FBAC000
heap
page read and write
1AFC7FBF000
trusted library allocation
page read and write
1AFD24F4000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFC7CDD000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
28D3F4BC000
heap
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFC6F62000
trusted library allocation
page read and write
1AFC6FEB000
trusted library allocation
page read and write
1AFD1B5E000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFC8C91000
trusted library allocation
page read and write
1AFCE985000
trusted library allocation
page read and write
28D3F4AF000
heap
page read and write
1AFC7B28000
trusted library allocation
page read and write
1AFCFCD4000
trusted library allocation
page read and write
1AFC8BF1000
trusted library allocation
page read and write
1FF65980000
heap
page read and write
1AFC6E9D000
trusted library allocation
page read and write
1AFC23AE000
trusted library allocation
page read and write
1AFCFCB8000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFBD25C000
heap
page read and write
1AFCE9D5000
trusted library allocation
page read and write
1AFC6FCF000
trusted library allocation
page read and write
1AFCF6C5000
trusted library allocation
page read and write
1AFC6F1C000
trusted library allocation
page read and write
1AFCF6CD000
trusted library allocation
page read and write
1AFBD260000
heap
page read and write
1AFCEE42000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFC8C6F000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1C35BA1F000
trusted library allocation
page read and write
1AFCE906000
trusted library allocation
page read and write
1AFC69E8000
trusted library allocation
page read and write
1AFC698F000
trusted library allocation
page read and write
1AFD1900000
trusted library allocation
page read and write
1AFCFCB8000
trusted library allocation
page read and write
1AFCAA58000
trusted library allocation
page read and write
1AFBD2B9000
heap
page read and write
1AFBD288000
heap
page read and write
1AFC69A1000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCEE4D000
trusted library allocation
page read and write
1AFBD29A000
heap
page read and write
1AFC6FBF000
trusted library allocation
page read and write
1AFC69F9000
trusted library allocation
page read and write
1AFC5FC9000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC5FB8000
trusted library allocation
page read and write
1AFCE8D2000
trusted library allocation
page read and write
1AFC7B48000
trusted library allocation
page read and write
1AFCE8F8000
trusted library allocation
page read and write
3015EBE000
unkown
page readonly
1AFC6639000
trusted library allocation
page read and write
1AFC34E2000
trusted library allocation
page read and write
1AFCE3ED000
trusted library allocation
page read and write
1AFCE77F000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFCEAB6000
trusted library allocation
page read and write
28D3F4CD000
heap
page read and write
1AFCEA3F000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCEA6A000
trusted library allocation
page read and write
3015DFE000
unkown
page readonly
1AFC7D63000
trusted library allocation
page read and write
241A5900000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC9D08000
trusted library allocation
page read and write
1AFCEAA8000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCE784000
trusted library allocation
page read and write
1AFD0A85000
trusted library allocation
page read and write
1AFBD278000
heap
page read and write
1245000
heap
page read and write
1AFC7D67000
trusted library allocation
page read and write
1AFCFF88000
trusted library allocation
page read and write
1AFC777E000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
28D3ED61000
trusted library allocation
page read and write
3015E7E000
stack
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC7F5C000
trusted library allocation
page read and write
1AFCEEC2000
trusted library allocation
page read and write
1AFC89B9000
trusted library allocation
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1AFC56D1000
trusted library allocation
page read and write
1AFCA223000
trusted library allocation
page read and write
1AFCE92C000
trusted library allocation
page read and write
30145D8000
stack
page read and write
28D3F533000
heap
page read and write
1AFBD2B4000
heap
page read and write
1AFC7CD6000
trusted library allocation
page read and write
1AFC9D93000
trusted library allocation
page read and write
1AFCEA6F000
trusted library allocation
page read and write
1AFC699B000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFC7B19000
trusted library allocation
page read and write
1AFC69F9000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC7B21000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFCE7D6000
trusted library allocation
page read and write
1AFC79C9000
trusted library allocation
page read and write
1AFCEECB000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFCEA5B000
trusted library allocation
page read and write
1AFC799C000
trusted library allocation
page read and write
1AFCEAB0000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1AFBD26C000
heap
page read and write
1AFC5F64000
trusted library allocation
page read and write
1AFCE4C0000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
8C579FF000
stack
page read and write
1AFC666A000
trusted library allocation
page read and write
1AFC8B53000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFD21C0000
trusted library allocation
page read and write
1AFCEE26000
trusted library allocation
page read and write
1AFC5F69000
trusted library allocation
page read and write
28D3F541000
heap
page read and write
1AFC8DDD000
trusted library allocation
page read and write
1AFC69AB000
trusted library allocation
page read and write
1AFC6FA9000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCFF93000
trusted library allocation
page read and write
28D3EB80000
unclassified section
page read and write
1AFBD2B0000
heap
page read and write
1AFC5ACA000
heap
page read and write
8C591FE000
stack
page read and write
1C35B700000
unclassified section
page read and write
1AFC7EDE000
trusted library allocation
page read and write
1AFCE459000
trusted library allocation
page read and write
1AFC7F60000
trusted library allocation
page read and write
1AFCF679000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD271000
heap
page read and write
28D3ED81000
trusted library allocation
page read and write
1AFC6F90000
trusted library allocation
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC79D2000
trusted library allocation
page read and write
1AFC5636000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFC75F6000
trusted library allocation
page read and write
1AFCEE4B000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFCF622000
trusted library allocation
page read and write
1AFCE4AB000
trusted library allocation
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFCA58B000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFBD267000
heap
page read and write
1AFCEEC2000
trusted library allocation
page read and write
1AFBD2CB000
heap
page read and write
1AFC63B5000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCE9A2000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
22B5BD70000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
49177FD000
stack
page read and write
1AFBD2B0000
heap
page read and write
1AFCF6CB000
trusted library allocation
page read and write
1AFCE949000
trusted library allocation
page read and write
1AFC7C9E000
trusted library allocation
page read and write
1AFC23BA000
trusted library allocation
page read and write
1AFC69F9000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC5B2F000
heap
page read and write
1AFC6FFC000
trusted library allocation
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFC7B56000
trusted library allocation
page read and write
22B5BA54000
heap
page read and write
1AFC5E5F000
trusted library allocation
page read and write
1AFC77F7000
trusted library allocation
page read and write
1AFC6F2C000
trusted library allocation
page read and write
1AFCEA51000
trusted library allocation
page read and write
1AFC7995000
trusted library allocation
page read and write
B64A93E000
stack
page read and write
1AFC6994000
trusted library allocation
page read and write
1AFCE9E3000
trusted library allocation
page read and write
1AFC7761000
trusted library allocation
page read and write
1AFC7BD5000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1054000
unkown
page readonly
1AFC7CFA000
trusted library allocation
page read and write
1AFC5FC7000
trusted library allocation
page read and write
1AFC89DF000
trusted library allocation
page read and write
1AFBD28A000
heap
page read and write
28D3FB6A000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC6666000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFCE7DD000
trusted library allocation
page read and write
1AFCEAA8000
trusted library allocation
page read and write
28D3F4AF000
heap
page read and write
1AFCC383000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD25C000
heap
page read and write
104C000
unkown
page write copy
1AFCF6CB000
trusted library allocation
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFCE836000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFCEA1E000
trusted library allocation
page read and write
1AFD0200000
trusted library allocation
page read and write
1AFBD2C6000
heap
page read and write
28D3F533000
heap
page read and write
1AFC6023000
trusted library allocation
page read and write
1AFC6650000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFC5E69000
trusted library allocation
page read and write
1AFC7BA6000
trusted library allocation
page read and write
1AFC6275000
trusted library allocation
page read and write
1AFC79DD000
trusted library allocation
page read and write
1AFC7F51000
trusted library allocation
page read and write
1C35B998000
trusted library allocation
page read and write
1AFC1CCE000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFBD271000
heap
page read and write
8C589FE000
stack
page read and write
1AFBD278000
heap
page read and write
1AFBD275000
heap
page read and write
1AFC5B68000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFC1CB3000
trusted library allocation
page read and write
1AFCE67B000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFCC3C9000
trusted library allocation
page read and write
22B5BDD7000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCE9A2000
trusted library allocation
page read and write
28D3F4B0000
heap
page read and write
1C35BA32000
trusted library allocation
page read and write
1AFC9ED6000
trusted library allocation
page read and write
1AFD2132000
trusted library allocation
page read and write
1AFC7F0F000
trusted library allocation
page read and write
1AFC6F18000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC7751000
trusted library allocation
page read and write
28D3EBD0000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFCEEC9000
trusted library allocation
page read and write
1AFC7CA2000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFCE459000
trusted library allocation
page read and write
1AFC75ED000
trusted library allocation
page read and write
1AFCE7B8000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFCE300000
trusted library allocation
page read and write
3013BCD000
stack
page read and write
1AFCF6A9000
trusted library allocation
page read and write
1AFC691C000
trusted library allocation
page read and write
1FF65A60000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC7F16000
trusted library allocation
page read and write
1AFC63AD000
trusted library allocation
page read and write
1AFC7BD3000
trusted library allocation
page read and write
B64A8FE000
unkown
page readonly
1AFBD267000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC79AB000
trusted library allocation
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFC9DBC000
trusted library allocation
page read and write
1AFC7B58000
trusted library allocation
page read and write
1C35B6A0000
heap
page read and write
1AFC7AA2000
trusted library allocation
page read and write
1AFCFCD4000
trusted library allocation
page read and write
28D3FB40000
heap
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFC635B000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCEAA8000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC8DB4000
trusted library allocation
page read and write
1AFC7FFB000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFBD2C1000
heap
page read and write
1AFBD270000
heap
page read and write
1AFC7CE8000
trusted library allocation
page read and write
22B5BA00000
heap
page read and write
1AFCA571000
heap
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFCC3DF000
trusted library allocation
page read and write
22B5BDB1000
trusted library allocation
page read and write
1AFC6F90000
trusted library allocation
page read and write
1AFCE482000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC77B3000
trusted library allocation
page read and write
1AFC8DE4000
trusted library allocation
page read and write
28D3ED76000
trusted library allocation
page read and write
1AFD1B98000
trusted library allocation
page read and write
1AFBD288000
heap
page read and write
1AFC7FE0000
trusted library allocation
page read and write
1AFCE5EA000
trusted library allocation
page read and write
1AFCC3B8000
trusted library allocation
page read and write
1AFC69F4000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1C35B969000
trusted library allocation
page read and write
1AFC6F96000
trusted library allocation
page read and write
1AFBD2CB000
heap
page read and write
1AFC7F91000
trusted library allocation
page read and write
1AFCE35D000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
28D3F539000
heap
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFCE9CF000
trusted library allocation
page read and write
1AFC79D1000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFCE985000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFC6400000
trusted library allocation
page read and write
1AFC7593000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFCE5FB000
trusted library allocation
page read and write
1AFCC3B6000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC666E000
trusted library allocation
page read and write
1AFC69AB000
trusted library allocation
page read and write
28D3ED13000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
1AFC6FC3000
trusted library allocation
page read and write
1AFCA56B000
heap
page read and write
1AFC9E2E000
trusted library allocation
page read and write
1AFCE39D000
trusted library allocation
page read and write
1AFD0E24000
trusted library allocation
page read and write
1AFCE553000
trusted library allocation
page read and write
1AFC6FF5000
trusted library allocation
page read and write
1AFCE8F3000
trusted library allocation
page read and write
1AFCEA6F000
trusted library allocation
page read and write
1AFCEED5000
trusted library allocation
page read and write
1AFC8C88000
trusted library allocation
page read and write
1AFC5FE2000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFC7CF8000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC65EC000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1C35B9A7000
trusted library allocation
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC7B58000
trusted library allocation
page read and write
8C599FF000
stack
page read and write
9EF000
stack
page read and write
28D3ED64000
trusted library allocation
page read and write
1AFBD273000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCEAC2000
trusted library allocation
page read and write
1AFC6515000
trusted library allocation
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD266000
heap
page read and write
28D3F530000
heap
page read and write
22B5BD66000
trusted library allocation
page read and write
1AFCE5B4000
trusted library allocation
page read and write
1AFCA501000
heap
page read and write
1AFC77BD000
trusted library allocation
page read and write
1AFCE4FC000
trusted library allocation
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1C35B740000
heap
page read and write
1AFC7EF0000
trusted library allocation
page read and write
1AFC6EF8000
trusted library allocation
page read and write
1AFC5638000
trusted library allocation
page read and write
1AFCC3DF000
trusted library allocation
page read and write
1AFD1BEF000
trusted library allocation
page read and write
1AFCEA1D000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFC5F33000
trusted library allocation
page read and write
1AFC1CDF000
trusted library allocation
page read and write
1AFC7F51000
trusted library allocation
page read and write
54219D8000
stack
page read and write
1AFC7EC5000
trusted library allocation
page read and write
28D3ED0D000
trusted library allocation
page read and write
1AFC7B39000
trusted library allocation
page read and write
22B5BD5F000
trusted library allocation
page read and write
1AFCE7E8000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFC893C000
trusted library allocation
page read and write
1AFD201B000
trusted library allocation
page read and write
1AFC7DA4000
trusted library allocation
page read and write
2E7A99A1000
trusted library allocation
page execute read
1AFCEE82000
trusted library allocation
page read and write
241A71A4000
heap
page read and write
1AFD214B000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCE9DB000
trusted library allocation
page read and write
1AFCF6C3000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
1AFC7FE5000
trusted library allocation
page read and write
1AFD2172000
trusted library allocation
page read and write
1AFC79CA000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFCE77D000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFC8B61000
trusted library allocation
page read and write
1AFC7B21000
trusted library allocation
page read and write
1AFCEA81000
trusted library allocation
page read and write
1AFD20C9000
trusted library allocation
page read and write
1AFCE9DD000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFCF679000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
22B5BB80000
unclassified section
page readonly
1AFBD2D6000
heap
page read and write
1AFBD2C6000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCA5B8000
heap
page read and write
1AFD09EE000
trusted library allocation
page read and write
1AFC63A3000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCA5E1000
heap
page read and write
1AFCE332000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFC9CCE000
trusted library allocation
page read and write
1AFC69D6000
trusted library allocation
page read and write
1AFC7F91000
trusted library allocation
page read and write
1AFCEEF4000
trusted library allocation
page read and write
1AFCE9D7000
trusted library allocation
page read and write
1AFC7BE1000
trusted library allocation
page read and write
1AFC5B49000
heap
page read and write
1AFCEA6A000
trusted library allocation
page read and write
1AFCE5D2000
trusted library allocation
page read and write
1AFC663B000
trusted library allocation
page read and write
1242000
heap
page read and write
1AFD1780000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2BA000
heap
page read and write
1AFC69D6000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC9DDC000
trusted library allocation
page read and write
1AFC62E7000
trusted library allocation
page read and write
1AFD228F000
trusted library allocation
page read and write
28D3F541000
heap
page read and write
1AFCEA71000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFD20DD000
trusted library allocation
page read and write
1AFCFFA9000
trusted library allocation
page read and write
1AFCE5B4000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFCEA83000
trusted library allocation
page read and write
1AFC5B2B000
heap
page read and write
1AFCC3E9000
trusted library allocation
page read and write
1AFC8CC2000
trusted library allocation
page read and write
1AFD2159000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCEEC9000
trusted library allocation
page read and write
1AFC79E0000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFC6FEB000
trusted library allocation
page read and write
1AFCE9D7000
trusted library allocation
page read and write
1AFCE3FE000
trusted library allocation
page read and write
1AFC77BD000
trusted library allocation
page read and write
1AFCC3B8000
trusted library allocation
page read and write
1AFCFF9D000
trusted library allocation
page read and write
1AFC7BBA000
trusted library allocation
page read and write
1AFCEEE2000
trusted library allocation
page read and write
1AFC659B000
trusted library allocation
page read and write
1AFC5FF1000
trusted library allocation
page read and write
1AFBD288000
heap
page read and write
1AFC7D34000
trusted library allocation
page read and write
1AFCC3E6000
trusted library allocation
page read and write
1C35BA14000
trusted library allocation
page read and write
1AFC75C0000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC23BA000
trusted library allocation
page read and write
1AFC79AC000
trusted library allocation
page read and write
1AFC9DE9000
trusted library allocation
page read and write
1AFCA183000
trusted library allocation
page read and write
28D3FB61000
heap
page read and write
1AFCEE53000
trusted library allocation
page read and write
28D3F4DA000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFC9E6D000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFC7F57000
trusted library allocation
page read and write
1AFC79FE000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
B64A87E000
unkown
page readonly
1AFD2286000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFC63F2000
trusted library allocation
page read and write
1AFC6650000
trusted library allocation
page read and write
1AFC5AAA000
heap
page read and write
1AFC7B85000
trusted library allocation
page read and write
1AFC6672000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCEE4B000
trusted library allocation
page read and write
1AFD1BD2000
trusted library allocation
page read and write
1AFCC3FC000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC8BB7000
trusted library allocation
page read and write
1AFCEAB1000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFCE493000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
1AFCE9D5000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC6675000
trusted library allocation
page read and write
1AFC773E000
trusted library allocation
page read and write
1AFCE42C000
trusted library allocation
page read and write
1AFCC3E3000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC8DBD000
trusted library allocation
page read and write
1AFC63C8000
trusted library allocation
page read and write
28D3F4CD000
heap
page read and write
1AFCEA17000
trusted library allocation
page read and write
1AFCFC8B000
trusted library allocation
page read and write
1AFC6F8C000
trusted library allocation
page read and write
1AFCA501000
heap
page read and write
1AFCFCCD000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
28D3F459000
heap
page read and write
1AFC66AE000
trusted library allocation
page read and write
1AFC8DC3000
trusted library allocation
page read and write
1AFC5AED000
heap
page read and write
1AFCE5F3000
trusted library allocation
page read and write
B64C9FE000
unkown
page readonly
1AFD21B7000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCE784000
trusted library allocation
page read and write
1AFC9E7F000
trusted library allocation
page read and write
22B5B980000
heap
page read and write
1AFC896D000
trusted library allocation
page read and write
1AFC8C31000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFC7C87000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC69BA000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFC7760000
trusted library allocation
page read and write
1FF65C00000
trusted library allocation
page read and write
1AFC9DB9000
trusted library allocation
page read and write
1C35B95D000
trusted library allocation
page read and write
1AFD222A000
trusted library allocation
page read and write
1AFC7982000
trusted library allocation
page read and write
1AFCEAF0000
trusted library allocation
page read and write
1AFC8DE4000
trusted library allocation
page read and write
1AFC9DA7000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC7B21000
trusted library allocation
page read and write
1AFD1B26000
trusted library allocation
page read and write
1AFC7F51000
trusted library allocation
page read and write
28D3F4AF000
heap
page read and write
1042000
unkown
page readonly
1AFC69D1000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFC7CC9000
trusted library allocation
page read and write
1AFCE4E4000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC9E4E000
trusted library allocation
page read and write
1AFD22F6000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD261000
heap
page read and write
1AFC9E65000
trusted library allocation
page read and write
1AFC7CB8000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFCEEDE000
trusted library allocation
page read and write
1AFC7749000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC89D6000
trusted library allocation
page read and write
28D3FB98000
heap
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFC5AEA000
heap
page read and write
22B5BDB7000
trusted library allocation
page read and write
1AFC7EB9000
trusted library allocation
page read and write
241A54D9000
heap
page read and write
1AFCFFAE000
trusted library allocation
page read and write
1AFC69EC000
trusted library allocation
page read and write
B64A83B000
stack
page read and write
1AFC8DC7000
trusted library allocation
page read and write
1AFCEA81000
trusted library allocation
page read and write
1AFC77FB000
trusted library allocation
page read and write
1AFCEA69000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFC5ACB000
heap
page read and write
1AFC8BBB000
trusted library allocation
page read and write
28D3F538000
heap
page read and write
1AFCEA7B000
trusted library allocation
page read and write
1AFC5B43000
heap
page read and write
1AFC7CC5000
trusted library allocation
page read and write
1AFCE8F5000
trusted library allocation
page read and write
1AFCFF9D000
trusted library allocation
page read and write
1AFC7BD5000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC5B2B000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFCE31F000
trusted library allocation
page read and write
1AFBD288000
heap
page read and write
1AFC5FB6000
trusted library allocation
page read and write
28D3FB84000
heap
page read and write
1AFBD26C000
heap
page read and write
1AFBD267000
heap
page read and write
1AFC1CC3000
trusted library allocation
page read and write
1AFD2269000
trusted library allocation
page read and write
1AFCE48C000
trusted library allocation
page read and write
1AFC7593000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC7F6B000
trusted library allocation
page read and write
1AFC5FE2000
trusted library allocation
page read and write
1AFC65B1000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD27D000
heap
page read and write
1AFC7EEA000
trusted library allocation
page read and write
1AFC7F60000
trusted library allocation
page read and write
1AFC6672000
trusted library allocation
page read and write
1AFC779B000
trusted library allocation
page read and write
1AFC7AF1000
trusted library allocation
page read and write
22B5B8D0000
unclassified section
page readonly
1AFC69E3000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC6E66000
trusted library allocation
page read and write
1AFC7AC9000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCE638000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC9D78000
trusted library allocation
page read and write
1AFC569B000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC6650000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCFFD8000
trusted library allocation
page read and write
1AFD0D61000
trusted library allocation
page read and write
1AFCEA44000
trusted library allocation
page read and write
1AFCE94A000
trusted library allocation
page read and write
22B5BD82000
trusted library allocation
page read and write
1AFC63A4000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC6E5B000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC9D4F000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFD2262000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFCF62F000
trusted library allocation
page read and write
1AFC69DD000
trusted library allocation
page read and write
1AFCE90B000
trusted library allocation
page read and write
1AFC89FC000
trusted library allocation
page read and write
1AFC7FE0000
trusted library allocation
page read and write
1AFCEE1F000
trusted library allocation
page read and write
1AFC8DD2000
trusted library allocation
page read and write
1AFBD273000
heap
page read and write
1AFC5FBE000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
B64A8BC000
stack
page read and write
1AFCEA67000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCEE33000
trusted library allocation
page read and write
1AFC9D89000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC89F1000
trusted library allocation
page read and write
1AFC7B9F000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFBD25C000
heap
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFC666E000
trusted library allocation
page read and write
1AFC8B9B000
trusted library allocation
page read and write
1AFCE9CF000
trusted library allocation
page read and write
1AFD0DB4000
trusted library allocation
page read and write
1AFCEA71000
trusted library allocation
page read and write
1AFBD26E000
heap
page read and write
1AFD21C0000
trusted library allocation
page read and write
1AFBD260000
heap
page read and write
1AFBD26A000
heap
page read and write
1AFC7F13000
trusted library allocation
page read and write
1C35B710000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFCF679000
trusted library allocation
page read and write
1AFCE9E3000
trusted library allocation
page read and write
1AFCA547000
heap
page read and write
1AFC69E7000
trusted library allocation
page read and write
1AFC7F51000
trusted library allocation
page read and write
1AFC6947000
trusted library allocation
page read and write
1AFCE7DA000
trusted library allocation
page read and write
1AFCE5A5000
trusted library allocation
page read and write
1C35B70F000
unclassified section
page read and write
1AFCE5AF000
trusted library allocation
page read and write
28D3F530000
heap
page read and write
1AFC8DFE000
trusted library allocation
page read and write
1AFBD276000
heap
page read and write
1AFCE4E4000
trusted library allocation
page read and write
1AFCEE65000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFC79A4000
trusted library allocation
page read and write
1AFCEEE3000
trusted library allocation
page read and write
1AFC7F8B000
trusted library allocation
page read and write
241A71BA000
heap
page read and write
1AFBD2C4000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFC6E27000
trusted library allocation
page read and write
1AFCE9DB000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFC8CD7000
trusted library allocation
page read and write
1232000
heap
page read and write
1AFBD24E000
heap
page read and write
1AFCE4E7000
trusted library allocation
page read and write
1AFC79B9000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFC799C000
trusted library allocation
page read and write
1AFCEA30000
trusted library allocation
page read and write
1C35B660000
heap
page read and write
1AFC63B0000
trusted library allocation
page read and write
1AFD222D000
trusted library allocation
page read and write
1AFC5E7E000
trusted library allocation
page read and write
1AFC772B000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFCEA51000
trusted library allocation
page read and write
28D3F542000
heap
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1FF65B07000
heap
page read and write
1AFCEE26000
trusted library allocation
page read and write
1AFBD298000
heap
page read and write
1C35B9E7000
trusted library allocation
page read and write
1AFBD2BC000
heap
page read and write
1AFCAAE1000
trusted library allocation
page read and write
1C35B74A000
heap
page read and write
1AFC8DFE000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC7751000
trusted library allocation
page read and write
1AFC774C000
trusted library allocation
page read and write
1AFCEA17000
trusted library allocation
page read and write
1AFCA536000
heap
page read and write
1AFCE4F8000
trusted library allocation
page read and write
28D3F49D000
heap
page read and write
1AFC7BD3000
trusted library allocation
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC9DB9000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC7F21000
trusted library allocation
page read and write
1AFC5FCB000
trusted library allocation
page read and write
1AFC79C6000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD26F000
heap
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC7FAA000
trusted library allocation
page read and write
1AFCEED5000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFCEA4F000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD25A000
heap
page read and write
1AFCA501000
heap
page read and write
1050000
unkown
page write copy
1AFBD2B0000
heap
page read and write
1AFCE5F7000
trusted library allocation
page read and write
1AFC77AE000
trusted library allocation
page read and write
1AFD0D02000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC5AAA000
heap
page read and write
1AFC6E78000
trusted library allocation
page read and write
1AFBD282000
heap
page read and write
A94000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC7D7F000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFC8D9B000
trusted library allocation
page read and write
1AFC6F32000
trusted library allocation
page read and write
1AFCEA96000
trusted library allocation
page read and write
1AFC7B32000
trusted library allocation
page read and write
1AFC5AA8000
heap
page read and write
1AFCFCA8000
trusted library allocation
page read and write
1AFCE9D5000
trusted library allocation
page read and write
1AFCC3E3000
trusted library allocation
page read and write
1AFB81C4000
heap
page read and write
1AFC5B3B000
heap
page read and write
1AFC6299000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC8B72000
trusted library allocation
page read and write
1AFBD26E000
heap
page read and write
1AFCEEF4000
trusted library allocation
page read and write
1AFCF623000
trusted library allocation
page read and write
1AFCFCF5000
trusted library allocation
page read and write
28D3F440000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCEE2A000
trusted library allocation
page read and write
1AFC7BA6000
trusted library allocation
page read and write
1AFC9D45000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFC34A8000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFC9E98000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC7F57000
trusted library allocation
page read and write
1AFC7E43000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFC6EEE000
trusted library allocation
page read and write
1C35B780000
unclassified section
page readonly
1AFC8DFA000
trusted library allocation
page read and write
1AFC5AED000
heap
page read and write
1AFCE53B000
trusted library allocation
page read and write
241A590A000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFC9DF8000
trusted library allocation
page read and write
1AFBD272000
heap
page read and write
1AFBD275000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFC9DE7000
trusted library allocation
page read and write
1AFC5B05000
heap
page read and write
1AFC5B68000
heap
page read and write
1AFC6ECF000
trusted library allocation
page read and write
1AFCF6FC000
trusted library allocation
page read and write
1AFBD27A000
heap
page read and write
1AFC5FAE000
trusted library allocation
page read and write
1AFC7F11000
trusted library allocation
page read and write
1AFC7B8B000
trusted library allocation
page read and write
1AFC7EB7000
trusted library allocation
page read and write
1AFC2276000
trusted library allocation
page read and write
1AFC69DD000
trusted library allocation
page read and write
1AFCEEF7000
trusted library allocation
page read and write
1AFC7BBE000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCE9A5000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFC79D1000
trusted library allocation
page read and write
1AFCE9D9000
trusted library allocation
page read and write
1AFCC396000
trusted library allocation
page read and write
1AFBD26C000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC5FE2000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFC69E7000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD2BC000
heap
page read and write
1AFC7D37000
trusted library allocation
page read and write
1AFC695B000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFCE748000
trusted library allocation
page read and write
1AFCF6C1000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCEA6F000
trusted library allocation
page read and write
1AFC9ED1000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
22B5B940000
remote allocation
page read and write
1AFC69E3000
trusted library allocation
page read and write
1AFCE9BA000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFC6EC0000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
28D3EE15000
unkown
page execute read
1AFBD28C000
heap
page read and write
1AFC3460000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCE493000
trusted library allocation
page read and write
1AFC69A6000
trusted library allocation
page read and write
1AFC5E3E000
trusted library allocation
page read and write
1AFCE4B1000
trusted library allocation
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFC8D9D000
trusted library allocation
page read and write
1AFD20CC000
trusted library allocation
page read and write
1AFBD2B3000
heap
page read and write
1AFC69EE000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD271000
heap
page read and write
1AFC7CFA000
trusted library allocation
page read and write
1AFC7BDA000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
28D3F4DA000
heap
page read and write
22B5BD00000
trusted library allocation
page read and write
1AFD0AB8000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFCA118000
trusted library allocation
page read and write
1AFCA55C000
heap
page read and write
1AFC6515000
trusted library allocation
page read and write
1AFC5B68000
heap
page read and write
1AFCC3FA000
trusted library allocation
page read and write
1AFCE693000
trusted library allocation
page read and write
1AFCC3E9000
trusted library allocation
page read and write
1AFD207C000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
A94000
heap
page read and write
1AFCE6FE000
trusted library allocation
page read and write
1AFC7ABC000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD27A000
heap
page read and write
1AFCC38E000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFBD24E000
heap
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFCE3C9000
trusted library allocation
page read and write
1AFC6E25000
trusted library allocation
page read and write
1AFBD2B7000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFCEE55000
trusted library allocation
page read and write
1AFC7D49000
trusted library allocation
page read and write
1AFC9D18000
trusted library allocation
page read and write
1AFCE793000
trusted library allocation
page read and write
1AFC624E000
trusted library allocation
page read and write
1AFD0AC3000
trusted library allocation
page read and write
1AFC9D89000
trusted library allocation
page read and write
1AFC5FBE000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
1AFBD28A000
heap
page read and write
1AFCEA95000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC6960000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC5AD4000
heap
page read and write
1AFCEE2A000
trusted library allocation
page read and write
1AFCEA6C000
trusted library allocation
page read and write
1AFCEEF7000
trusted library allocation
page read and write
28D3F538000
heap
page read and write
1AFC7FF3000
trusted library allocation
page read and write
1AFC7CC5000
trusted library allocation
page read and write
1AFB81CD000
heap
page read and write
1AFBD276000
heap
page read and write
1AFC5B26000
heap
page read and write
1AFC5FA7000
trusted library allocation
page read and write
1AFCEED0000
trusted library allocation
page read and write
122F000
heap
page read and write
1AFBD2D5000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFBD266000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFC56CE000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFCC3DF000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFC6F9C000
trusted library allocation
page read and write
1AFCEA64000
trusted library allocation
page read and write
1AFCE7D4000
trusted library allocation
page read and write
1AFCF680000
trusted library allocation
page read and write
1AFCA204000
trusted library allocation
page read and write
1AFC9ED6000
trusted library allocation
page read and write
1AFCE78E000
trusted library allocation
page read and write
1AFC2366000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC237E000
trusted library allocation
page read and write
28D3FB7B000
heap
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFC6FB6000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
3511000
heap
page read and write
1AFD2120000
trusted library allocation
page read and write
1FF65D00000
trusted library allocation
page read and write
241A5805000
heap
page read and write
1AFBD298000
heap
page read and write
1AFC69D6000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCE922000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFC6E95000
trusted library allocation
page read and write
1AFC9D08000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFCE4C0000
trusted library allocation
page read and write
1AFC7AF6000
trusted library allocation
page read and write
1AFC6F28000
trusted library allocation
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFCA54E000
heap
page read and write
1AFC8DEA000
trusted library allocation
page read and write
1AFC7AE8000
trusted library allocation
page read and write
1AFC773E000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
124F000
heap
page read and write
1AFC6594000
trusted library allocation
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1AFC7AED000
trusted library allocation
page read and write
104C000
unkown
page read and write
1AFCE834000
trusted library allocation
page read and write
28D3F539000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFCE599000
trusted library allocation
page read and write
1AFC8C09000
trusted library allocation
page read and write
1AFC5AED000
heap
page read and write
1AFC7B6E000
trusted library allocation
page read and write
1AFC5AF7000
heap
page read and write
1AFC7D2D000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
1AFBD2CC000
heap
page read and write
241A7330000
heap
page read and write
1AFBD2B7000
heap
page read and write
1AFC8C7D000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFCF6E4000
trusted library allocation
page read and write
1AFD0E04000
trusted library allocation
page read and write
1AFCEECB000
trusted library allocation
page read and write
1AFC5B2B000
heap
page read and write
1AFCE778000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFD2220000
trusted library allocation
page read and write
1AFC9DE1000
trusted library allocation
page read and write
22B5B951000
remote allocation
page execute read
1AFD21D8000
trusted library allocation
page read and write
1AFC6F8C000
trusted library allocation
page read and write
1AFC79CA000
trusted library allocation
page read and write
1AFCEA6F000
trusted library allocation
page read and write
1AFCE599000
trusted library allocation
page read and write
1AFBD26D000
heap
page read and write
1AFC79E0000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1AFC77EF000
trusted library allocation
page read and write
1AFCE491000
trusted library allocation
page read and write
22B5BD1B000
trusted library allocation
page read and write
1AFC5B4C000
heap
page read and write
241A5907000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFCEABF000
trusted library allocation
page read and write
1AFCE5A5000
trusted library allocation
page read and write
1AFCE482000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFD20C6000
trusted library allocation
page read and write
1AFBD29D000
heap
page read and write
B649FFE000
stack
page read and write
1AFD1BDC000
trusted library allocation
page read and write
1AFD0AF2000
trusted library allocation
page read and write
1AFD22F0000
trusted library allocation
page read and write
1AFC5E1D000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFC5E60000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD267000
heap
page read and write
1AFCEA43000
trusted library allocation
page read and write
1AFC5B2B000
heap
page read and write
1AFC7BE1000
trusted library allocation
page read and write
5424D3E000
stack
page read and write
1AFC8B61000
trusted library allocation
page read and write
1AFC799C000
trusted library allocation
page read and write
1AFC7BF5000
trusted library allocation
page read and write
1AFC9DDC000
trusted library allocation
page read and write
1AFCE8FE000
trusted library allocation
page read and write
28D3F530000
heap
page read and write
1AFC8743000
trusted library allocation
page read and write
22B5BF00000
trusted library allocation
page read and write
1AFC9E3E000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC7BA6000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCAAAD000
trusted library allocation
page read and write
1AFCEE62000
trusted library allocation
page read and write
1AFCE956000
trusted library allocation
page read and write
1AFC79B6000
trusted library allocation
page read and write
1AFC8C8A000
trusted library allocation
page read and write
1AFC7B28000
trusted library allocation
page read and write
1AFC77DC000
trusted library allocation
page read and write
1AFC6FE9000
trusted library allocation
page read and write
1AFC63C3000
trusted library allocation
page read and write
1AFCE7BA000
trusted library allocation
page read and write
1AFC77CA000
trusted library allocation
page read and write
1AFCE38B000
trusted library allocation
page read and write
1AFCE9DD000
trusted library allocation
page read and write
1AFC63C8000
trusted library allocation
page read and write
1AFBD277000
heap
page read and write
1AFCC386000
trusted library allocation
page read and write
1AFC7BCA000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC6385000
trusted library allocation
page read and write
1AFC7C7E000
trusted library allocation
page read and write
1AFC8B54000
trusted library allocation
page read and write
1AFC69D6000
trusted library allocation
page read and write
1AFC8DB4000
trusted library allocation
page read and write
1AFCA224000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC5E53000
trusted library allocation
page read and write
1AFC6E32000
trusted library allocation
page read and write
1AFCE9CF000
trusted library allocation
page read and write
1AFC6959000
trusted library allocation
page read and write
1AFC9EB8000
trusted library allocation
page read and write
1AFC69BA000
trusted library allocation
page read and write
1AFCE78E000
trusted library allocation
page read and write
1AFCE9E3000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFCEE23000
trusted library allocation
page read and write
1AFCE73D000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFD2255000
trusted library allocation
page read and write
1AFCE7FA000
trusted library allocation
page read and write
1AFC7F5C000
trusted library allocation
page read and write
22B5BA56000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC9EF8000
trusted library allocation
page read and write
1AFCEEE3000
trusted library allocation
page read and write
1AFC9EF2000
trusted library allocation
page read and write
1AFCE4B1000
trusted library allocation
page read and write
1AFBD272000
heap
page read and write
1AFC7FE5000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFC5F9B000
trusted library allocation
page read and write
1AFC7CA5000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC7F14000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFC63DE000
trusted library allocation
page read and write
1AFC2393000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCEE1B000
trusted library allocation
page read and write
1AFC63B5000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
28D3FB98000
heap
page read and write
1AFC3211000
trusted library allocation
page read and write
1AFC8DF8000
trusted library allocation
page read and write
1AFC79AC000
trusted library allocation
page read and write
1AFC69DD000
trusted library allocation
page read and write
1AFCFC87000
trusted library allocation
page read and write
1AFC7B4F000
trusted library allocation
page read and write
241A54AA000
heap
page read and write
5425D7E000
unkown
page readonly
1AFC7926000
trusted library allocation
page read and write
1AFC5E6C000
trusted library allocation
page read and write
1AFD24F4000
trusted library allocation
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFD20FA000
trusted library allocation
page read and write
1AFC23F0000
trusted library allocation
page read and write
1AFC5F69000
trusted library allocation
page read and write
1AFCEEF4000
trusted library allocation
page read and write
1AFCE7F3000
trusted library allocation
page read and write
1AFCE78E000
trusted library allocation
page read and write
1AFC5B48000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFC23B5000
trusted library allocation
page read and write
1AFC794D000
trusted library allocation
page read and write
1AFC79DB000
trusted library allocation
page read and write
1AFC7F5C000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCE4E4000
trusted library allocation
page read and write
1AFCE9BD000
trusted library allocation
page read and write
1AFCE5F3000
trusted library allocation
page read and write
1AFCE7B6000
trusted library allocation
page read and write
1AFC7CD1000
trusted library allocation
page read and write
1AFBD274000
heap
page read and write
28D3EE90000
heap
page read and write
1AFBD271000
heap
page read and write
1AFC658F000
trusted library allocation
page read and write
3020000
heap
page read and write
1AFBD288000
heap
page read and write
1AFC82AB000
trusted library allocation
page read and write
1AFC776C000
trusted library allocation
page read and write
1AFC5FA5000
trusted library allocation
page read and write
1AFC34F2000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCE4A3000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFC66A7000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFCE908000
trusted library allocation
page read and write
28D3F538000
heap
page read and write
1AFBD26A000
heap
page read and write
1AFC8DC4000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
28D3F700000
trusted library allocation
page read and write
1AFC69D1000
trusted library allocation
page read and write
1AFC77CF000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFC8DFA000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1C35BA1B000
trusted library allocation
page read and write
1AFD09B9000
trusted library allocation
page read and write
1AFCF6E0000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCEE73000
trusted library allocation
page read and write
22B5BD0C000
trusted library allocation
page read and write
F81000
unkown
page execute read
1AFBD2B0000
heap
page read and write
1AFBD263000
heap
page read and write
1C35B965000
trusted library allocation
page read and write
1AFC5F9D000
trusted library allocation
page read and write
1AFC8781000
trusted library allocation
page read and write
1AFC7D8C000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFC77A2000
trusted library allocation
page read and write
1AFBD2D0000
heap
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFC6E37000
trusted library allocation
page read and write
1AFC7BC2000
trusted library allocation
page read and write
1AFC7751000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFC79AC000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC624E000
trusted library allocation
page read and write
B64B1FE000
stack
page read and write
1AFD2210000
trusted library allocation
page read and write
1AFC63C8000
trusted library allocation
page read and write
1AFC6FE8000
trusted library allocation
page read and write
9CE000
stack
page read and write
1AFC7CC5000
trusted library allocation
page read and write
1AFC6958000
trusted library allocation
page read and write
1AFC5B44000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFC75AC000
trusted library allocation
page read and write
1AFC7C9E000
trusted library allocation
page read and write
1AFC7993000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFC3480000
trusted library allocation
page read and write
1AFC6F7E000
trusted library allocation
page read and write
28D3ED86000
trusted library allocation
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFC9C9B000
trusted library allocation
page read and write
1AFCE470000
trusted library allocation
page read and write
1AFC7FE0000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD250000
heap
page read and write
1AFC7770000
trusted library allocation
page read and write
4916FFC000
stack
page read and write
1AFBD2AC000
heap
page read and write
1AFCF62C000
trusted library allocation
page read and write
1AFC8C44000
trusted library allocation
page read and write
1AFC6F7E000
trusted library allocation
page read and write
1AFC7B28000
trusted library allocation
page read and write
1C35B99E000
trusted library allocation
page read and write
1AFCE3FC000
trusted library allocation
page read and write
1AFC7F5C000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFBD25E000
heap
page read and write
1AFC7BE2000
trusted library allocation
page read and write
1C35B4C0000
unclassified section
page readonly
1AFC5E66000
trusted library allocation
page read and write
1AFC77DC000
trusted library allocation
page read and write
1AFCFCCA000
trusted library allocation
page read and write
1AFC7BBE000
trusted library allocation
page read and write
1AFC667C000
trusted library allocation
page read and write
1AFC82B3000
trusted library allocation
page read and write
1AFC6996000
trusted library allocation
page read and write
1AFC3450000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC7950000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFBD276000
heap
page read and write
1AFCEE26000
trusted library allocation
page read and write
28D3FBB7000
heap
page read and write
1AFC6E7D000
trusted library allocation
page read and write
1AFC9D60000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
28D3FB7B000
heap
page read and write
1AFC7F30000
trusted library allocation
page read and write
1AFC7BA6000
trusted library allocation
page read and write
1AFC7B54000
trusted library allocation
page read and write
1AFC7CE8000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC659A000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD271000
heap
page read and write
22B5BD6A000
trusted library allocation
page read and write
1AFCE9A6000
trusted library allocation
page read and write
1AFC9C84000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCEA5B000
trusted library allocation
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFC5B4C000
heap
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFC6FFA000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFCFFA9000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC7EE1000
trusted library allocation
page read and write
542191D000
stack
page read and write
1AFC7982000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1AFC79E0000
trusted library allocation
page read and write
1AFCEEE7000
trusted library allocation
page read and write
1AFC69D9000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFC75ED000
trusted library allocation
page read and write
1AFCC3E3000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFCFCD4000
trusted library allocation
page read and write
1AFC6FFC000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFBD261000
heap
page read and write
1AFC6360000
trusted library allocation
page read and write
1AFCFCD4000
trusted library allocation
page read and write
1AFC7C87000
trusted library allocation
page read and write
1AFC6FE6000
trusted library allocation
page read and write
1AFC6661000
trusted library allocation
page read and write
1AFC5FE6000
trusted library allocation
page read and write
1AFC9DA4000
trusted library allocation
page read and write
1AFC6EF8000
trusted library allocation
page read and write
1AFC89D6000
trusted library allocation
page read and write
1AFC8C6F000
trusted library allocation
page read and write
1AFC7973000
trusted library allocation
page read and write
1AFC9EED000
trusted library allocation
page read and write
1AFC5E78000
trusted library allocation
page read and write
1AFC56B2000
trusted library allocation
page read and write
1AFC5AEA000
heap
page read and write
1AFC7BE5000
trusted library allocation
page read and write
22B5BD03000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
28D3F541000
heap
page read and write
1AFCFAAD000
trusted library allocation
page read and write
1AFD09EE000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFD1B98000
trusted library allocation
page read and write
1AFC6E25000
trusted library allocation
page read and write
1AFC7DD7000
trusted library allocation
page read and write
1AFCEAF0000
trusted library allocation
page read and write
28D3FB98000
heap
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
241A71AD000
heap
page read and write
1AFD0E01000
trusted library allocation
page read and write
1AFC633F000
trusted library allocation
page read and write
1AFC6F0E000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD256000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC7BE5000
trusted library allocation
page read and write
1FF65AC0000
heap
page read and write
1AFCFF8F000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC3456000
trusted library allocation
page read and write
1AFBD288000
heap
page read and write
1AFCE767000
trusted library allocation
page read and write
1AFC5B3B000
heap
page read and write
1AFC666E000
trusted library allocation
page read and write
1AFCEE42000
trusted library allocation
page read and write
1AFC7B5C000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFCE956000
trusted library allocation
page read and write
1AFCEA64000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFCE9DF000
trusted library allocation
page read and write
1AFC5FC7000
trusted library allocation
page read and write
1AFC82A5000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC779B000
trusted library allocation
page read and write
1AFD22F2000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCFCCA000
trusted library allocation
page read and write
1AFCEA1B000
trusted library allocation
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFD1B0B000
trusted library allocation
page read and write
1AFC5FB1000
trusted library allocation
page read and write
1AFC69F9000
trusted library allocation
page read and write
1AFC5F29000
trusted library allocation
page read and write
3050000
heap
page read and write
1AFBD250000
heap
page read and write
1AFC7958000
trusted library allocation
page read and write
1AFCA0D9000
trusted library allocation
page read and write
5424CBE000
stack
page read and write
1AFC5B3B000
heap
page read and write
1AFCEEDE000
trusted library allocation
page read and write
1AFC7BFE000
trusted library allocation
page read and write
1AFBD287000
heap
page read and write
1AFC6942000
trusted library allocation
page read and write
1AFCE624000
trusted library allocation
page read and write
1AFCAA96000
trusted library allocation
page read and write
1AFC777E000
trusted library allocation
page read and write
3511000
heap
page read and write
241A5600000
trusted library allocation
page read and write
1AFC69C6000
trusted library allocation
page read and write
28D3E9A0000
heap
page read and write
1AFC5FDE000
trusted library allocation
page read and write
28D3ED9F000
trusted library allocation
page read and write
1AFD0ADB000
trusted library allocation
page read and write
1AFC79E3000
trusted library allocation
page read and write
1AFBD2BD000
heap
page read and write
1AFC7BF5000
trusted library allocation
page read and write
1AFCEE7F000
trusted library allocation
page read and write
1AFC1CEF000
trusted library allocation
page read and write
1AFCEED0000
trusted library allocation
page read and write
1AFCE48A000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFC79DC000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFC772A000
trusted library allocation
page read and write
1AFC6265000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC5FF0000
trusted library allocation
page read and write
1AFD1B26000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC2317000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFBD28C000
heap
page read and write
28D3EE00000
trusted library allocation
page read and write
1AFC6F8C000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
28D3EE96000
heap
page read and write
241A71A3000
heap
page read and write
1AFC698D000
trusted library allocation
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC9EE4000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFCE8FB000
trusted library allocation
page read and write
5423C7E000
unkown
page readonly
1C35B6F0000
heap
page readonly
1AFCEE23000
trusted library allocation
page read and write
1AFC7FEE000
trusted library allocation
page read and write
1AFC8C91000
trusted library allocation
page read and write
1AFCF6C5000
trusted library allocation
page read and write
28D3ED6F000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFC5FB8000
trusted library allocation
page read and write
1AFC7BD3000
trusted library allocation
page read and write
1AFCEAC2000
trusted library allocation
page read and write
1AFCEA2A000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFC6EEC000
trusted library allocation
page read and write
1AFC7BD9000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFD09F9000
trusted library allocation
page read and write
1AFC797F000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFBD272000
heap
page read and write
1AFCA185000
trusted library allocation
page read and write
1AFC79B9000
trusted library allocation
page read and write
1AFC5FA0000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFCFCBD000
trusted library allocation
page read and write
1AFC78B7000
trusted library allocation
page read and write
1AFC5B43000
heap
page read and write
1AFCE7FB000
trusted library allocation
page read and write
1AFC9E53000
trusted library allocation
page read and write
1AFC9DF8000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFCEA7B000
trusted library allocation
page read and write
1AFC9DAC000
trusted library allocation
page read and write
22B5BD16000
trusted library allocation
page read and write
1AFCEA1B000
trusted library allocation
page read and write
1AFC5FA5000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC8BCF000
trusted library allocation
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFCE447000
trusted library allocation
page read and write
1AFC6FE9000
trusted library allocation
page read and write
1AFC79BE000
trusted library allocation
page read and write
1AFCE461000
trusted library allocation
page read and write
B648FD8000
stack
page read and write
1AFC8D8D000
trusted library allocation
page read and write
1AFC8280000
trusted library allocation
page read and write
22B5BAA0000
heap
page read and write
1AFBD250000
heap
page read and write
1AFC657D000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
1AFBD2B9000
heap
page read and write
1AFC5B43000
heap
page read and write
1AFBD26E000
heap
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFCE456000
trusted library allocation
page read and write
1AFC6E88000
trusted library allocation
page read and write
28D3FBAC000
heap
page read and write
1AFC79E0000
trusted library allocation
page read and write
1AFC79D1000
trusted library allocation
page read and write
1AFCFCF3000
trusted library allocation
page read and write
1AFC6ECF000
trusted library allocation
page read and write
1AFC561F000
trusted library allocation
page read and write
1AFC5ACA000
heap
page read and write
1AFBD272000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC69CC000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFC5B29000
heap
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFC7EFB000
trusted library allocation
page read and write
28D3F4FA000
heap
page read and write
1AFC8C4A000
trusted library allocation
page read and write
1AFC6E35000
trusted library allocation
page read and write
1AFC6389000
trusted library allocation
page read and write
28D3EE94000
heap
page read and write
1AFC797D000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC7BFA000
trusted library allocation
page read and write
1AFC694A000
trusted library allocation
page read and write
1AFC23E4000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
1AFC5AF6000
heap
page read and write
1AFBD261000
heap
page read and write
1AFC6959000
trusted library allocation
page read and write
1AFBD26C000
heap
page read and write
1AFC7763000
trusted library allocation
page read and write
1AFC69EA000
trusted library allocation
page read and write
1AFC7B34000
trusted library allocation
page read and write
1AFC7B48000
trusted library allocation
page read and write
1AFC7B2F000
trusted library allocation
page read and write
22B5BA80000
heap
page read and write
1AFC69F4000
trusted library allocation
page read and write
1AFBD29A000
heap
page read and write
1AFC8DBA000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCA166000
trusted library allocation
page read and write
28D3EE20000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCE47B000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFCE7AC000
trusted library allocation
page read and write
1238000
heap
page read and write
1AFC7CCC000
trusted library allocation
page read and write
1AFCE7D6000
trusted library allocation
page read and write
1AFCF623000
trusted library allocation
page read and write
1AFC5FE6000
trusted library allocation
page read and write
1AFC7B48000
trusted library allocation
page read and write
3054000
heap
page read and write
22B5B960000
unclassified section
page readonly
1AFBD27F000
heap
page read and write
1AFC7988000
trusted library allocation
page read and write
1AFC6ECF000
trusted library allocation
page read and write
1AFCE7B8000
trusted library allocation
page read and write
1AFD0D85000
trusted library allocation
page read and write
1AFCF667000
trusted library allocation
page read and write
1AFC1C81000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFC8BCF000
trusted library allocation
page read and write
1AFC78A3000
trusted library allocation
page read and write
1AFC8DC7000
trusted library allocation
page read and write
1AFCE77F000
trusted library allocation
page read and write
1AFC79BF000
trusted library allocation
page read and write
1AFD0AD2000
trusted library allocation
page read and write
1AFC2382000
trusted library allocation
page read and write
4917FFF000
stack
page read and write
1AFC663B000
trusted library allocation
page read and write
1AFC5F70000
trusted library allocation
page read and write
1FF65D07000
trusted library allocation
page read and write
1AFC5FB1000
trusted library allocation
page read and write
1AFCEA3F000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCC3DB000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
1AFC6F51000
trusted library allocation
page read and write
1AFCE9E1000
trusted library allocation
page read and write
1AFC63DE000
trusted library allocation
page read and write
1AFC6F39000
trusted library allocation
page read and write
1AFBD2CF000
heap
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFD2210000
trusted library allocation
page read and write
1AFCEED0000
trusted library allocation
page read and write
1AFCE7B7000
trusted library allocation
page read and write
1AFD1B98000
trusted library allocation
page read and write
542557E000
stack
page read and write
1AFBD274000
heap
page read and write
1AFC8C3F000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFCC3A6000
trusted library allocation
page read and write
1AFBD272000
heap
page read and write
1AFCEE6D000
trusted library allocation
page read and write
1AFC7578000
trusted library allocation
page read and write
1AFC7FBF000
trusted library allocation
page read and write
1AFC9DE7000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFCA501000
heap
page read and write
1AFC5F6F000
trusted library allocation
page read and write
1AFCFCBD000
trusted library allocation
page read and write
1AFC7C8D000
trusted library allocation
page read and write
1AFCE7BA000
trusted library allocation
page read and write
1AFC698A000
trusted library allocation
page read and write
1FF65D0A000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7C33000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
1AFC6FA7000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFD2165000
trusted library allocation
page read and write
1AFC7CC4000
trusted library allocation
page read and write
1AFC6F51000
trusted library allocation
page read and write
1AFCE3C4000
trusted library allocation
page read and write
28D3F4AF000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCC39E000
trusted library allocation
page read and write
1AFC5FDE000
trusted library allocation
page read and write
1AFC9DB0000
trusted library allocation
page read and write
1AFC7FE5000
trusted library allocation
page read and write
1AFC568A000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFCE5FB000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFC776C000
trusted library allocation
page read and write
1AFC7B1D000
trusted library allocation
page read and write
1AFC78E9000
trusted library allocation
page read and write
1AFC7F60000
trusted library allocation
page read and write
1AFBD279000
heap
page read and write
1AFC5E7E000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD27B000
heap
page read and write
22B5BA70000
unclassified section
page read and write
1AFC2375000
trusted library allocation
page read and write
1AFCE4AB000
trusted library allocation
page read and write
1AFCE470000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCE456000
trusted library allocation
page read and write
1AFC5AEF000
heap
page read and write
1AFC9D89000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC5695000
trusted library allocation
page read and write
A50000
heap
page read and write
1AFD2037000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC87F9000
trusted library allocation
page read and write
1AFCEA95000
trusted library allocation
page read and write
1AFC7EF0000
trusted library allocation
page read and write
1AFC7B5C000
trusted library allocation
page read and write
1AFCE81C000
trusted library allocation
page read and write
1AFCA189000
trusted library allocation
page read and write
1AFCEE42000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
1AFC7EEC000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFCFFFA000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFBD2BD000
heap
page read and write
1AFCEA57000
trusted library allocation
page read and write
1AFC6507000
trusted library allocation
page read and write
1AFC2319000
trusted library allocation
page read and write
1AFC8C71000
trusted library allocation
page read and write
1AFC7AAD000
trusted library allocation
page read and write
1AFC6E5F000
trusted library allocation
page read and write
1AFC5AE8000
heap
page read and write
1AFCEE3D000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFCEA83000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD266000
heap
page read and write
1AFC66AA000
trusted library allocation
page read and write
1AFC7BFC000
trusted library allocation
page read and write
1AFC9E3E000
trusted library allocation
page read and write
1AFC5B4A000
heap
page read and write
1AFD0A73000
trusted library allocation
page read and write
1AFD214B000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFBD260000
heap
page read and write
1AFCF62C000
trusted library allocation
page read and write
1AFCEEE7000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFCA501000
heap
page read and write
1AFC2400000
trusted library allocation
page read and write
1AFCE8C4000
trusted library allocation
page read and write
1AFC5AFB000
heap
page read and write
1AFC7FB2000
trusted library allocation
page read and write
1AFCEA5F000
trusted library allocation
page read and write
1AFBD260000
heap
page read and write
1AFC6E4C000
trusted library allocation
page read and write
1AFBD2BD000
heap
page read and write
1AFBD2B1000
heap
page read and write
1AFC657B000
trusted library allocation
page read and write
1AFC7736000
trusted library allocation
page read and write
1AFD1B30000
trusted library allocation
page read and write
1AFC9E79000
trusted library allocation
page read and write
241A54D9000
heap
page read and write
22B5BC00000
trusted library allocation
page read and write
1AFD213A000
trusted library allocation
page read and write
1AFCE5E4000
trusted library allocation
page read and write
1AFC69FC000
trusted library allocation
page read and write
1AFC77B4000
trusted library allocation
page read and write
1AFCE6EF000
trusted library allocation
page read and write
28D3FB98000
heap
page read and write
1AFCFF6C000
trusted library allocation
page read and write
28D3F53D000
heap
page read and write
1AFBD2B8000
heap
page read and write
1C35B913000
trusted library allocation
page read and write
1AFC7FFB000
trusted library allocation
page read and write
28D3FB6A000
heap
page read and write
1AFCA161000
trusted library allocation
page read and write
1AFCE9D9000
trusted library allocation
page read and write
1AFC7B1D000
trusted library allocation
page read and write
1AFC5B68000
heap
page read and write
1AFC7B9F000
trusted library allocation
page read and write
1AFD223A000
trusted library allocation
page read and write
1AFBD258000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFCE4DE000
trusted library allocation
page read and write
1AFC8DBF000
trusted library allocation
page read and write
1AFD0D18000
trusted library allocation
page read and write
1AFCA54C000
heap
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFCE6E3000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFC79D1000
trusted library allocation
page read and write
1AFC69E0000
trusted library allocation
page read and write
2E7A9A3B000
trusted library allocation
page execute read
1AFD0F00000
trusted library allocation
page read and write
1AFC7733000
trusted library allocation
page read and write
1AFCEA7B000
trusted library allocation
page read and write
1AFCE5BF000
trusted library allocation
page read and write
1AFC69AE000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFBD27F000
heap
page read and write
1AFBD2BC000
heap
page read and write
1AFC62F7000
trusted library allocation
page read and write
1AFC9D25000
trusted library allocation
page read and write
1AFC7CC5000
trusted library allocation
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFCC3AE000
trusted library allocation
page read and write
1AFC5B2F000
heap
page read and write
1AFCE72A000
trusted library allocation
page read and write
1AFCE9D7000
trusted library allocation
page read and write
1AFC65D1000
trusted library allocation
page read and write
1AFD0A7A000
trusted library allocation
page read and write
1AFC75BB000
trusted library allocation
page read and write
28D3F4DD000
heap
page read and write
1AFD0AFE000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFCFAE1000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7FED000
trusted library allocation
page read and write
1AFBD275000
heap
page read and write
1AFC23A0000
trusted library allocation
page read and write
1AFC34E8000
trusted library allocation
page read and write
1AFC7BF5000
trusted library allocation
page read and write
241A5700000
heap
page read and write
1AFC62BD000
trusted library allocation
page read and write
1AFC626B000
trusted library allocation
page read and write
22B5B8E0000
unclassified section
page readonly
1AFC9DA7000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
241A54D9000
heap
page read and write
1AFC79D8000
trusted library allocation
page read and write
1AFBD2C1000
heap
page read and write
1AFBD279000
heap
page read and write
1AFCEA6C000
trusted library allocation
page read and write
1AFC5F1C000
trusted library allocation
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFC6959000
trusted library allocation
page read and write
1AFCEA6C000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
3A0000
heap
page read and write
28D3FB99000
heap
page read and write
1AFCEE73000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFD21A5000
trusted library allocation
page read and write
1AFC5AF7000
heap
page read and write
1AFD09C5000
trusted library allocation
page read and write
1AFC5675000
trusted library allocation
page read and write
1AFC5ECB000
trusted library allocation
page read and write
1AFD09E5000
trusted library allocation
page read and write
1AFC5ACB000
heap
page read and write
1AFBD2B0000
heap
page read and write
1AFD0B00000
trusted library allocation
page read and write
1AFC7B72000
trusted library allocation
page read and write
1AFBD261000
heap
page read and write
123A000
heap
page read and write
1AFCE493000
trusted library allocation
page read and write
1AFC6650000
trusted library allocation
page read and write
101C000
unkown
page readonly
1AFBD2B8000
heap
page read and write
1AFCE7B6000
trusted library allocation
page read and write
241A54D2000
heap
page read and write
1AFBD28C000
heap
page read and write
1AFC693E000
trusted library allocation
page read and write
1C35B979000
trusted library allocation
page read and write
1AFC795E000
trusted library allocation
page read and write
1AFC7BE2000
trusted library allocation
page read and write
1AFBD2B9000
heap
page read and write
1AFCEE23000
trusted library allocation
page read and write
1AFCEE53000
trusted library allocation
page read and write
22B5BD7A000
trusted library allocation
page read and write
1AFC56CA000
trusted library allocation
page read and write
1AFC75AE000
trusted library allocation
page read and write
1AFC7BD3000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
5424CFE000
unkown
page readonly
1AFC7D70000
trusted library allocation
page read and write
1AFC7DE6000
trusted library allocation
page read and write
99DD4803000
trusted library allocation
page read and write
1FF65A90000
heap
page read and write
1AFBD2AE000
heap
page read and write
30176BE000
stack
page read and write
1AFBD2B0000
heap
page read and write
1AFC8D9B000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC5AFB000
heap
page read and write
1AFCFA58000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2B2000
heap
page read and write
1AFBD26A000
heap
page read and write
1AFCE47B000
trusted library allocation
page read and write
1AFC6FE3000
trusted library allocation
page read and write
1AFCC38C000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCE9A2000
trusted library allocation
page read and write
3511000
heap
page read and write
1AFC7BDD000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFCF6E4000
trusted library allocation
page read and write
1AFC5B43000
heap
page read and write
1AFC9E89000
trusted library allocation
page read and write
22B5BA72000
unclassified section
page read and write
1AFBD27B000
heap
page read and write
1AFC7BA5000
trusted library allocation
page read and write
1AFC5652000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFD1B22000
trusted library allocation
page read and write
3015E3E000
unkown
page readonly
1AFCEAD3000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC9EC0000
trusted library allocation
page read and write
1AFC7AC1000
trusted library allocation
page read and write
1AFCEEB5000
trusted library allocation
page read and write
1AFD2128000
trusted library allocation
page read and write
1AFC7B21000
trusted library allocation
page read and write
1AFCE491000
trusted library allocation
page read and write
1AFCF6A9000
trusted library allocation
page read and write
28D3EB90000
trusted library section
page readonly
1AFBD26E000
heap
page read and write
1AFC9DE1000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFC6F83000
trusted library allocation
page read and write
1AFCE9DF000
trusted library allocation
page read and write
1AFBD25C000
heap
page read and write
1AFBD2D6000
heap
page read and write
1AFC9D78000
trusted library allocation
page read and write
1AFCEA44000
trusted library allocation
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFCEEA8000
trusted library allocation
page read and write
1AFC657D000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
9EA1881E000
trusted library allocation
page read and write
1AFC6948000
trusted library allocation
page read and write
1AFC89CE000
trusted library allocation
page read and write
1AFC5ACB000
heap
page read and write
1C35B97E000
trusted library allocation
page read and write
1AFC66AA000
trusted library allocation
page read and write
1AFCEE79000
trusted library allocation
page read and write
1AFD2120000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFC5B43000
heap
page read and write
1AFCF622000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1AFCE7E4000
trusted library allocation
page read and write
28D3F54C000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC5FCD000
trusted library allocation
page read and write
1AFC56B7000
trusted library allocation
page read and write
1AFCEE61000
trusted library allocation
page read and write
28D3FB6D000
heap
page read and write
1AFC7F6B000
trusted library allocation
page read and write
1AFBD27E000
heap
page read and write
1AFCEA2D000
trusted library allocation
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
22B5BDF4000
trusted library allocation
page read and write
1AFCEE53000
trusted library allocation
page read and write
1AFC23F0000
trusted library allocation
page read and write
1AFCEA3B000
trusted library allocation
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFD22BC000
trusted library allocation
page read and write
1AFCEEC9000
trusted library allocation
page read and write
1AFC795A000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
9FE000
stack
page read and write
1AFCE459000
trusted library allocation
page read and write
1AFD1BEF000
trusted library allocation
page read and write
1AFC9E65000
trusted library allocation
page read and write
1AFC7C87000
trusted library allocation
page read and write
1C35BA37000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFCE5F4000
trusted library allocation
page read and write
28D3FBAC000
heap
page read and write
1AFC9EBD000
trusted library allocation
page read and write
1AFC6EFE000
trusted library allocation
page read and write
1AFBD25C000
heap
page read and write
1AFCA501000
heap
page read and write
1AFC5ACA000
heap
page read and write
1AFCC3AE000
trusted library allocation
page read and write
1AFC6F2C000
trusted library allocation
page read and write
1AFC8B84000
trusted library allocation
page read and write
1AFC5AF5000
heap
page read and write
1AFC6645000
trusted library allocation
page read and write
123B000
heap
page read and write
1AFC7BE1000
trusted library allocation
page read and write
1AFC8B73000
trusted library allocation
page read and write
1AFCE76A000
trusted library allocation
page read and write
1AFCF6CF000
trusted library allocation
page read and write
1AFCEED8000
trusted library allocation
page read and write
1AFC7763000
trusted library allocation
page read and write
1AFC7F8B000
trusted library allocation
page read and write
1AFD0000000
trusted library allocation
page read and write
1C35BA39000
trusted library allocation
page read and write
1AFC7CD5000
trusted library allocation
page read and write
28D3FB84000
heap
page read and write
1AFC7C81000
trusted library allocation
page read and write
1AFC63DE000
trusted library allocation
page read and write
1AFCE9DB000
trusted library allocation
page read and write
1AFBD270000
heap
page read and write
1AFCFF90000
trusted library allocation
page read and write
1AFC63BC000
trusted library allocation
page read and write
1AFCE3FE000
trusted library allocation
page read and write
1AFCF679000
trusted library allocation
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFC78F8000
trusted library allocation
page read and write
1C35B9C7000
trusted library allocation
page read and write
1AFC69DE000
trusted library allocation
page read and write
1AFCEEE0000
trusted library allocation
page read and write
A94000
heap
page read and write
1AFCFFFA000
trusted library allocation
page read and write
1AFC776E000
trusted library allocation
page read and write
28D3F321000
heap
page read and write
1AFC6E25000
trusted library allocation
page read and write
1AFD0CFC000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFCEEF4000
trusted library allocation
page read and write
1AFC82FB000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD271000
heap
page read and write
1AFBD256000
heap
page read and write
28D3E9B1000
heap
page read and write
1AFC9E89000
trusted library allocation
page read and write
1AFCE4B1000
trusted library allocation
page read and write
1AFC7C11000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFC7D42000
trusted library allocation
page read and write
1AFCEEDB000
trusted library allocation
page read and write
1AFCE956000
trusted library allocation
page read and write
22B5BD24000
trusted library allocation
page read and write
1AFCA501000
heap
page read and write
1AFC6265000
trusted library allocation
page read and write
1AFCEA17000
trusted library allocation
page read and write
1AFCEA66000
trusted library allocation
page read and write
1AFD22B7000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC5AEF000
heap
page read and write
1AFD20CC000
trusted library allocation
page read and write
B64B9FE000
unkown
page readonly
1AFC6F28000
trusted library allocation
page read and write
1AFC9D94000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCFFE5000
trusted library allocation
page read and write
1C35B95B000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFBD26A000
heap
page read and write
1AFC9CCB000
trusted library allocation
page read and write
1C35B92E000
trusted library allocation
page read and write
1AFC9DA4000
trusted library allocation
page read and write
1AFC6672000
trusted library allocation
page read and write
28D3ED48000
trusted library allocation
page read and write
1AFC5FDE000
trusted library allocation
page read and write
1AFC5B2B000
heap
page read and write
9EA18824000
trusted library allocation
page read and write
1AFCE9A2000
trusted library allocation
page read and write
1AFC231E000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFCEEE7000
trusted library allocation
page read and write
1AFCE7DF000
trusted library allocation
page read and write
28D3ED73000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCF613000
trusted library allocation
page read and write
1AFC8DBD000
trusted library allocation
page read and write
1AFCF6FE000
trusted library allocation
page read and write
28D3FB84000
heap
page read and write
1AFC9D93000
trusted library allocation
page read and write
1AFCE3C2000
trusted library allocation
page read and write
1AFC8BA8000
trusted library allocation
page read and write
1AFCE838000
trusted library allocation
page read and write
1AFC8B8D000
trusted library allocation
page read and write
1AFC6F8E000
trusted library allocation
page read and write
1AFC75AE000
trusted library allocation
page read and write
1AFC7763000
trusted library allocation
page read and write
1AFCEE26000
trusted library allocation
page read and write
1AFBD250000
heap
page read and write
1AFC7BA5000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
22B5C000000
trusted library allocation
page read and write
1AFC5B05000
heap
page read and write
1AFBD274000
heap
page read and write
1AFC7995000
trusted library allocation
page read and write
1AFC7FFB000
trusted library allocation
page read and write
1AFCEA43000
trusted library allocation
page read and write
1AFC7BBA000
trusted library allocation
page read and write
1AFC79E7000
trusted library allocation
page read and write
1AFC9D43000
trusted library allocation
page read and write
1AFCE78E000
trusted library allocation
page read and write
1AFCE97A000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
1AFC2271000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCE6FC000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC5B26000
heap
page read and write
1AFCE9E1000
trusted library allocation
page read and write
1AFC83C3000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFC6666000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFC7CD5000
trusted library allocation
page read and write
1AFCE8C1000
trusted library allocation
page read and write
1AFC69FB000
trusted library allocation
page read and write
1AFC5688000
trusted library allocation
page read and write
1C35B6B0000
heap
page read and write
1AFC69DD000
trusted library allocation
page read and write
1AFD21B7000
trusted library allocation
page read and write
1AFC9100000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFCE7C2000
trusted library allocation
page read and write
1AFD21D6000
trusted library allocation
page read and write
1AFBD268000
heap
page read and write
1AFC5B2B000
heap
page read and write
1AFC86DA000
trusted library allocation
page read and write
1AFC6942000
trusted library allocation
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFCEEB0000
trusted library allocation
page read and write
1AFC7F1E000
trusted library allocation
page read and write
1AFCEAC2000
trusted library allocation
page read and write
1AFC8294000
trusted library allocation
page read and write
1AFCEEF7000
trusted library allocation
page read and write
1AFBD282000
heap
page read and write
1AFD21F0000
trusted library allocation
page read and write
1AFCEAB1000
trusted library allocation
page read and write
28D3ED5C000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFD09E2000
trusted library allocation
page read and write
1244000
heap
page read and write
1AFBD266000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFC7C9E000
trusted library allocation
page read and write
1AFBD2CF000
heap
page read and write
1AFCE775000
trusted library allocation
page read and write
1AFBD276000
heap
page read and write
1AFC8DCA000
trusted library allocation
page read and write
1AFC7FA4000
trusted library allocation
page read and write
1AFBD26B000
heap
page read and write
A90000
heap
page read and write
1AFCEE86000
trusted library allocation
page read and write
28D3FB98000
heap
page read and write
1AFC8DCF000
trusted library allocation
page read and write
1AFBD27B000
heap
page read and write
1AFBD27D000
heap
page read and write
1AFCEED1000
trusted library allocation
page read and write
1AFCF6CB000
trusted library allocation
page read and write
1AFC6EC3000
trusted library allocation
page read and write
1AFCE5CD000
trusted library allocation
page read and write
1AFD2159000
trusted library allocation
page read and write
1AFC7FAA000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFBD279000
heap
page read and write
1AFCFF74000
trusted library allocation
page read and write
1AFC5FF1000
trusted library allocation
page read and write
1AFCEA5E000
trusted library allocation
page read and write
1AFC5E7E000
trusted library allocation
page read and write
1AFC5B04000
heap
page read and write
1AFCFF9D000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFC7FF8000
trusted library allocation
page read and write
1AFC6F49000
trusted library allocation
page read and write
1AFC898D000
trusted library allocation
page read and write
1AFC7DF5000
trusted library allocation
page read and write
1AFCE5D9000
trusted library allocation
page read and write
1AFC9D84000
trusted library allocation
page read and write
1AFC7723000
trusted library allocation
page read and write
1AFC7EB3000
trusted library allocation
page read and write
1AFCEED8000
trusted library allocation
page read and write
1AFC6E71000
trusted library allocation
page read and write
28D3EDC4000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFBD27F000
heap
page read and write
22B5BDEF000
trusted library allocation
page read and write
28D3EDEF000
trusted library allocation
page read and write
1AFD0D59000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
28D3ED79000
trusted library allocation
page read and write
1AFCEE2C000
trusted library allocation
page read and write
1AFC82F6000
trusted library allocation
page read and write
1AFC6F60000
trusted library allocation
page read and write
1AFC69BF000
trusted library allocation
page read and write
1AFC699D000
trusted library allocation
page read and write
1AFC6F51000
trusted library allocation
page read and write
1C35B543000
remote allocation
page execute read
1AFCE3D0000
trusted library allocation
page read and write
1AFCEAC2000
trusted library allocation
page read and write
1AFCE7C3000
trusted library allocation
page read and write
1AFBD2BA000
heap
page read and write
1AFCEEFB000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
28D3EDE9000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC5F62000
trusted library allocation
page read and write
1AFBD24E000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFBD2B8000
heap
page read and write
1AFC8B9B000
trusted library allocation
page read and write
28D3FBAC000
heap
page read and write
1AFC6F53000
trusted library allocation
page read and write
1AFBD2B1000
heap
page read and write
1AFC7AE0000
trusted library allocation
page read and write
1AFCEE5D000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFCF680000
trusted library allocation
page read and write
1AFC7F1B000
trusted library allocation
page read and write
1AFC9EAA000
trusted library allocation
page read and write
1AFC7CF5000
trusted library allocation
page read and write
1AFC63AD000
trusted library allocation
page read and write
1AFCE4B8000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCEE58000
trusted library allocation
page read and write
1AFC7EC9000
trusted library allocation
page read and write
1AFBD256000
heap
page read and write
1AFBD266000
heap
page read and write
1AFCEA7B000
trusted library allocation
page read and write
1AFC9EFC000
trusted library allocation
page read and write
1AFC5F4A000
trusted library allocation
page read and write
1AFCE81A000
trusted library allocation
page read and write
1AFC7CBE000
trusted library allocation
page read and write
1AFC7772000
trusted library allocation
page read and write
22B5BD64000
trusted library allocation
page read and write
1AFCE7D8000
trusted library allocation
page read and write
1AFCEAB8000
trusted library allocation
page read and write
1AFCE9BA000
trusted library allocation
page read and write
1AFC7B48000
trusted library allocation
page read and write
1AFC7BE1000
trusted library allocation
page read and write
1AFC7FE0000
trusted library allocation
page read and write
1AFC7CE9000
trusted library allocation
page read and write
1AFBD266000
heap
page read and write
1AFC7F0F000
trusted library allocation
page read and write
1AFC7F91000
trusted library allocation
page read and write
1AFC78DC000
trusted library allocation
page read and write
28D3E9E0000
unclassified section
page readonly
1AFC79D6000
trusted library allocation
page read and write
1AFC7BC1000
trusted library allocation
page read and write
1AFBD2B0000
heap
page read and write
1AFC5657000
trusted library allocation
page read and write
1AFC5B26000
heap
page read and write
1AFCE7EC000
trusted library allocation
page read and write
1AFC6562000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC79EC000
trusted library allocation
page read and write
3F0000
heap
page read and write
1AFC7ABF000
trusted library allocation
page read and write
1236000
heap
page read and write
1AFCEE5F000
trusted library allocation
page read and write
1AFBD2B2000
heap
page read and write
1C35B923000
trusted library allocation
page read and write
1AFC7EF0000
trusted library allocation
page read and write
1AFCEA58000
trusted library allocation
page read and write
1AFC69B7000
trusted library allocation
page read and write
1AFCF62C000
trusted library allocation
page read and write
1AFBD2AC000
heap
page read and write
1AFC7FFB000
trusted library allocation
page read and write
1AFCEEFE000
trusted library allocation
page read and write
1AFC776E000
trusted library allocation
page read and write
1AFCB002000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFCEEF7000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFBD2AC000
heap
page read and write
1AFC7F5C000
trusted library allocation
page read and write
1AFCF6A0000
trusted library allocation
page read and write
1AFC22FB000
trusted library allocation
page read and write
1AFBD2D6000
heap
page read and write
1AFCE7D6000
trusted library allocation
page read and write
1AFD1B9B000
trusted library allocation
page read and write
1AFC5F98000
trusted library allocation
page read and write
1AFC8CB5000
trusted library allocation
page read and write
1AFBD25C000
heap
page read and write
1AFC5B04000
heap
page read and write
1AFC5FAE000
trusted library allocation
page read and write
1AFBD28C000
heap
page read and write
1AFBD27B000
heap
page read and write
1AFD1B28000
trusted library allocation
page read and write
1AFC6F96000
trusted library allocation
page read and write
1AFC7FA4000
trusted library allocation
page read and write
1AFC7869000
trusted library allocation
page read and write
1AFC5669000
trusted library allocation
page read and write
101C000
unkown
page readonly
1AFCFF83000
trusted library allocation
page read and write
1C35B900000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFCEA95000
trusted library allocation
page read and write
1AFC79FE000
trusted library allocation
page read and write
1AFCEA95000
trusted library allocation
page read and write
1AFC5F1F000
trusted library allocation
page read and write
1AFC79E0000
trusted library allocation
page read and write
1AFC79FE000
trusted library allocation
page read and write
1AFC8DEA000
trusted library allocation
page read and write
1AFCEA95000
trusted library allocation
page read and write
1AFC79CC000
trusted library allocation
page read and write
124F000
heap
page read and write
1AFC5F33000
trusted library allocation
page read and write
1AFD0DF9000
trusted library allocation
page read and write
1AFCF639000
trusted library allocation
page read and write
1AFBD25F000
heap
page read and write
1AFBD25C000
heap
page read and write
1AFC5F64000
trusted library allocation
page read and write
1AFC77CA000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFBD2D2000
heap
page read and write
1AFC8BFE000
trusted library allocation
page read and write
1AFBD267000
heap
page read and write
22B5BAA3000
heap
page read and write
1AFCEEF4000
trusted library allocation
page read and write
1AFBD285000
heap
page read and write
1AFC7BFA000
trusted library allocation
page read and write
1AFCE673000
trusted library allocation
page read and write
1AFC7A7F000
trusted library allocation
page read and write
1AFD2066000
trusted library allocation
page read and write
1AFCEEE7000
trusted library allocation
page read and write
1AFC7BD9000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
1AFCA0B6000
trusted library allocation
page read and write
1AFC7D89000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1AFC7CDC000
trusted library allocation
page read and write
1AFC5B33000
heap
page read and write
1AFBD2B1000
heap
page read and write
1AFC6E66000
trusted library allocation
page read and write
2E7A99E1000
trusted library allocation
page execute read
1AFC7FE5000
trusted library allocation
page read and write
1AFC7F57000
trusted library allocation
page read and write
1AFCA1FC000
trusted library allocation
page read and write
1AFC5FB1000
trusted library allocation
page read and write
1AFC5AD4000
heap
page read and write
1AFC6F62000
trusted library allocation
page read and write
1AFCE7DF000
trusted library allocation
page read and write
1AFBD282000
heap
page read and write
1AFC86B6000
trusted library allocation
page read and write
1AFBD281000
heap
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC89DF000
trusted library allocation
page read and write
1AFC69C6000
trusted library allocation
page read and write
1AFC5AF1000
heap
page read and write
1AFC23E4000
trusted library allocation
page read and write
1AFCF6C5000
trusted library allocation
page read and write
1AFCEE86000
trusted library allocation
page read and write
1C35B96E000
trusted library allocation
page read and write
1AFC5F06000
trusted library allocation
page read and write
1AFC79D6000
trusted library allocation
page read and write
1AFC7BA1000
trusted library allocation
page read and write
1AFCC3DB000
trusted library allocation
page read and write
1AFC7BD5000
trusted library allocation
page read and write
1AFCE54B000
trusted library allocation
page read and write
1AFBD27F000
heap
page read and write
A94000
heap
page read and write
1AFD0AFE000
trusted library allocation
page read and write
1AFC7996000
trusted library allocation
page read and write
1AFC7FD7000
trusted library allocation
page read and write
1AFD220E000
trusted library allocation
page read and write
28D3ED23000
trusted library allocation
page read and write
1AFC9E7F000
trusted library allocation
page read and write
1AFC6F8E000
trusted library allocation
page read and write
1AFC63B5000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
28D3FB62000
heap
page read and write
1AFC7BD9000
trusted library allocation
page read and write
1AFCFFDF000
trusted library allocation
page read and write
1AFC79D2000
trusted library allocation
page read and write
1AFCFFD8000
trusted library allocation
page read and write
1AFC7BE5000
trusted library allocation
page read and write
1AFCC3DF000
trusted library allocation
page read and write
1AFC5EA2000
trusted library allocation
page read and write
1AFC69A3000
trusted library allocation
page read and write
1AFCF619000
trusted library allocation
page read and write
1AFBD271000
heap
page read and write
1AFC5E9C000
trusted library allocation
page read and write
1AFCEE82000
trusted library allocation
page read and write
1AFC6960000
trusted library allocation
page read and write
1AFBD2B8000
heap
page read and write
1AFC9DDA000
trusted library allocation
page read and write
1C35B992000
trusted library allocation
page read and write
1AFC7749000
trusted library allocation
page read and write
1AFC7B8B000
trusted library allocation
page read and write
1AFCA201000
trusted library allocation
page read and write
There are 4033 hidden memdumps, click here to show them.