IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_13868cec-1278-4b1a-879e-6a9b97737aed.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_13868cec-1278-4b1a-879e-6a9b97737aed.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\61d93283-859d-4dbf-a966-e2b01a81e37e (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\61d93283-859d-4dbf-a966-e2b01a81e37e.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2196 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebce3b20-7255-42e7-81d5-9d5ad72c4935} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5e3f6f510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20230927232528 -prefsHandle 2904 -prefMapHandle 3840 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {807ce9ee-a414-40a2-9002-cf302937fc8c} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5f6144b10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5072 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4832 -prefMapHandle 4816 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2540bd53-f2b7-4fe8-9c11-d991b082dd32} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5ff819510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://spocs.getpocket.com/users
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1D5EADAF000
heap
page read and write
1D5EFEAF000
trusted library allocation
page read and write
1D5EADE4000
heap
page read and write
1D5FF89A000
trusted library allocation
page read and write
1D5F4091000
trusted library allocation
page read and write
3B179FE000
stack
page read and write
1D5FC248000
trusted library allocation
page read and write
F3BB03E000
stack
page read and write
1D5F7619000
trusted library allocation
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADAF000
heap
page read and write
1D5F35CB000
trusted library allocation
page read and write
1D5F4CB4000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1563000
heap
page read and write
F3B96BB000
stack
page read and write
1D5F474C000
trusted library allocation
page read and write
1D600199000
trusted library allocation
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5EAE0B000
heap
page read and write
1D5EADAD000
heap
page read and write
1C949810000
heap
page read and write
1D5F76E6000
trusted library allocation
page read and write
1364000
heap
page read and write
21F2BB12000
trusted library allocation
page read and write
1D5F66C6000
trusted library allocation
page read and write
1D5FC293000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1C947D20000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5FF46B000
trusted library allocation
page read and write
1D5F40AD000
trusted library allocation
page read and write
1D5FE3CD000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5FC25A000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5F4A53000
trusted library allocation
page read and write
3B181FE000
unkown
page readonly
1D5F3832000
heap
page read and write
1D5FF5A6000
trusted library allocation
page read and write
1D5F56DD000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F5CA6000
trusted library allocation
page read and write
1D5FF860000
trusted library allocation
page read and write
21F2BB15000
trusted library allocation
page read and write
1D5F56DD000
trusted library allocation
page read and write
2885E4C4000
heap
page read and write
1D5F4C5E000
trusted library allocation
page read and write
1D5F47A1000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
2885E300000
trusted library allocation
page read and write
1D5FBCC7000
trusted library allocation
page read and write
1D5F72D9000
trusted library allocation
page read and write
1D5F563E000
trusted library allocation
page read and write
1D5FE704000
trusted library allocation
page read and write
21F2B860000
unclassified section
page readonly
1D5F73B3000
trusted library allocation
page read and write
1D5FBCBF000
trusted library allocation
page read and write
1D5F431F000
trusted library allocation
page read and write
21F2B780000
heap
page read and write
1D5EAD8F000
heap
page read and write
15B3F800000
heap
page read and write
1D5FF8ED000
trusted library allocation
page read and write
1D5EADDB000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FBF32000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F55AB000
trusted library allocation
page read and write
1D5EFF00000
trusted library allocation
page read and write
1D5FF9C4000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5F5C5C000
trusted library allocation
page read and write
1D5FC1E8000
trusted library allocation
page read and write
1D5F518F000
trusted library allocation
page read and write
1C947D60000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F3C3B000
trusted library allocation
page read and write
1D5FD922000
trusted library allocation
page read and write
1D5F7834000
trusted library allocation
page read and write
1D5EAD8D000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5EADDC000
heap
page read and write
1D5EADB7000
heap
page read and write
1D5F51D7000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5FC4E1000
trusted library allocation
page read and write
1D5FBD70000
trusted library allocation
page read and write
1D5EAD81000
heap
page read and write
1D5FF898000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F76AC000
trusted library allocation
page read and write
1D5EADB7000
heap
page read and write
1D5FC2B9000
trusted library allocation
page read and write
1D5FBEC2000
trusted library allocation
page read and write
1D5F6765000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAE13000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F56EB000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5FC07B000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F5EDD000
trusted library allocation
page read and write
2885E369000
trusted library allocation
page read and write
1D5F5C68000
trusted library allocation
page read and write
1D5EADB3000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5F454C000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F67B8000
trusted library allocation
page read and write
1D5EFEB5000
trusted library allocation
page read and write
1D5F35CF000
trusted library allocation
page read and write
1D5F55E1000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5FC2E9000
trusted library allocation
page read and write
1D5F0FEC000
trusted library allocation
page read and write
1D60012C000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F679B000
trusted library allocation
page read and write
1D5FE3D9000
trusted library allocation
page read and write
1D5F6671000
trusted library allocation
page read and write
1D5F45F4000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5FF47C000
trusted library allocation
page read and write
1D5F0D85000
trusted library allocation
page read and write
1D5EAD89000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5EADA6000
heap
page read and write
1D600B7F000
heap
page read and write
1D5F679B000
trusted library allocation
page read and write
1D5F40AA000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F477C000
trusted library allocation
page read and write
15B3F860000
heap
page read and write
1D5F75CB000
trusted library allocation
page read and write
1D5FC1B1000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F10A6000
trusted library allocation
page read and write
21F2BAB9000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5FBC8D000
trusted library allocation
page read and write
1D5FF474000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F5CF0000
trusted library allocation
page read and write
1D5FC082000
trusted library allocation
page read and write
1D5F5332000
trusted library allocation
page read and write
1D5F3CF7000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F45B8000
trusted library allocation
page read and write
155F000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5F4CBD000
trusted library allocation
page read and write
1D5F47AA000
trusted library allocation
page read and write
1D5F475C000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F5EA3000
trusted library allocation
page read and write
1D5F5673000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5F40F8000
trusted library allocation
page read and write
1D5FBD74000
trusted library allocation
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5EADB7000
heap
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5FC2C3000
trusted library allocation
page read and write
1D5FC1C2000
trusted library allocation
page read and write
1D5FE659000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5EAE13000
heap
page read and write
1D5F1663000
trusted library allocation
page read and write
1D5F0DAD000
trusted library allocation
page read and write
1D5F45B7000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EADFE000
heap
page read and write
1D5F5CFA000
trusted library allocation
page read and write
1D5F354E000
trusted library allocation
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5EAD8D000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5FD860000
trusted library allocation
page read and write
1D5FE659000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F1662000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D600171000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F51E1000
trusted library allocation
page read and write
1D5F67AE000
trusted library allocation
page read and write
1D80003F000
trusted library allocation
page read and write
1D6001F2000
trusted library allocation
page read and write
1D5F3B7D000
trusted library allocation
page read and write
1D5F459E000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1364000
heap
page read and write
1D5EADA9000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5FF88E000
trusted library allocation
page read and write
1D5FC082000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5FD887000
trusted library allocation
page read and write
21F2BA00000
trusted library allocation
page read and write
15B3F1D0000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EADAA000
heap
page read and write
1D5FC0EF000
trusted library allocation
page read and write
1D5F68C8000
trusted library allocation
page read and write
1D5FBE5B000
trusted library allocation
page read and write
1D5FF96D000
trusted library allocation
page read and write
15B3F860000
heap
page read and write
1D5F6369000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD93000
heap
page read and write
15B3EB00000
trusted library allocation
page read and write
1D5FBFDE000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
15B3F864000
heap
page read and write
1D5FF9A9000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FF954000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F7627000
trusted library allocation
page read and write
1D5F568F000
trusted library allocation
page read and write
1D5F432F000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
1D5F4C6F000
trusted library allocation
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5F5318000
trusted library allocation
page read and write
1D5F5744000
trusted library allocation
page read and write
1D5F5FD6000
trusted library allocation
page read and write
1D5F5FE6000
trusted library allocation
page read and write
3B1713E000
stack
page read and write
1D5EFEFE000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F557C000
trusted library allocation
page read and write
1D5FF852000
trusted library allocation
page read and write
1D5F4CDB000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5FC2BF000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F73AB000
trusted library allocation
page read and write
1D5F0D5E000
trusted library allocation
page read and write
15B3E9BE000
heap
page read and write
1D5FF930000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
15B3F869000
heap
page read and write
1D5FC1F5000
trusted library allocation
page read and write
1D5F56C5000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5EADE9000
heap
page read and write
1D5F5EC4000
trusted library allocation
page read and write
1D5F3847000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5F5FFA000
trusted library allocation
page read and write
1D5FC1E8000
trusted library allocation
page read and write
1D6001ED000
trusted library allocation
page read and write
1D5F5727000
trusted library allocation
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5F56DF000
trusted library allocation
page read and write
1D5F4CA6000
trusted library allocation
page read and write
1D5F0DB7000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F5CB1000
trusted library allocation
page read and write
1D5FC289000
trusted library allocation
page read and write
1D5FE724000
trusted library allocation
page read and write
1D5EAD8D000
heap
page read and write
1D5FF5F2000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5EADDC000
heap
page read and write
1D5F76EC000
trusted library allocation
page read and write
1D5FF81E000
trusted library allocation
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5F73D7000
trusted library allocation
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5F61E6000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5FE5D6000
trusted library allocation
page read and write
1D6001FB000
trusted library allocation
page read and write
21F2BA64000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5EFE93000
trusted library allocation
page read and write
1D5EF7A9000
trusted library allocation
page read and write
1D600183000
trusted library allocation
page read and write
1D5F40FE000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F606C000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EADD6000
heap
page read and write
15B3EB5C000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F4CB3000
trusted library allocation
page read and write
1D5FF5C9000
trusted library allocation
page read and write
1D5FE5FC000
trusted library allocation
page read and write
1D5F5F51000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F5320000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
3B157D8000
stack
page read and write
1D600177000
trusted library allocation
page read and write
1D5F5502000
trusted library allocation
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5FC1D5000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1C949829000
heap
page read and write
1D5F3C8A000
trusted library allocation
page read and write
1D5F7340000
trusted library allocation
page read and write
1D5F5C87000
trusted library allocation
page read and write
F699D3E000
unkown
page readonly
1D5F351B000
trusted library allocation
page read and write
15B3E790000
unclassified section
page readonly
1D5F3CD7000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F10EB000
trusted library allocation
page read and write
2885E318000
trusted library allocation
page read and write
1D5F56DD000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FFC99000
trusted library allocation
page read and write
1D5EAD9C000
heap
page read and write
1D5FBD30000
trusted library allocation
page read and write
1D5F56D1000
trusted library allocation
page read and write
1D5F4750000
trusted library allocation
page read and write
1D5F51AC000
trusted library allocation
page read and write
1D5F3840000
heap
page read and write
1D5FD853000
trusted library allocation
page read and write
1D5F0DC8000
trusted library allocation
page read and write
1D5F6113000
trusted library allocation
page read and write
1D5F5F5B000
trusted library allocation
page read and write
1D5FF42C000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5FF963000
trusted library allocation
page read and write
1D5FC268000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F3823000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F73B3000
trusted library allocation
page read and write
1D5FF5FB000
trusted library allocation
page read and write
15B3F977000
heap
page read and write
1D5F0D53000
trusted library allocation
page read and write
1D5F6789000
trusted library allocation
page read and write
1D5F67B3000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5FF85A000
trusted library allocation
page read and write
1D5F0FD8000
trusted library allocation
page read and write
2885E349000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5FBCC7000
trusted library allocation
page read and write
1D5FF8D6000
trusted library allocation
page read and write
1D5F4ADA000
trusted library allocation
page read and write
1D5FF963000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5F5315000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5F1033000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F57DE000
trusted library allocation
page read and write
1D5EAD9C000
heap
page read and write
1D5FC2BF000
trusted library allocation
page read and write
1D5F736C000
trusted library allocation
page read and write
1D5F5E23000
trusted library allocation
page read and write
1D5EF784000
trusted library allocation
page read and write
1D5F5AE9000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F5EC2000
trusted library allocation
page read and write
1D5F5CF6000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F351E000
trusted library allocation
page read and write
1D5F63C8000
trusted library allocation
page read and write
1D5EF7EF000
trusted library allocation
page read and write
1D5F5744000
trusted library allocation
page read and write
1D5F51E7000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F63E0000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5FBFF7000
trusted library allocation
page read and write
1D5F35F4000
trusted library allocation
page read and write
1D5FBEE6000
trusted library allocation
page read and write
1D5F4C7B000
trusted library allocation
page read and write
1D5F45F4000
trusted library allocation
page read and write
15B3EC00000
trusted library section
page readonly
1D5EAD7D000
heap
page read and write
1D5FBDC4000
trusted library allocation
page read and write
1D5F47F3000
trusted library allocation
page read and write
1D5FD8CD000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5FC0A7000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5FC496000
trusted library allocation
page read and write
1D5F5EA3000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
F697D3E000
unkown
page readonly
1D5FF5C9000
trusted library allocation
page read and write
1D5FF8E6000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5F0D53000
trusted library allocation
page read and write
1D5EADF4000
heap
page read and write
1D5EADD6000
heap
page read and write
1C949800000
heap
page read and write
3D01000
heap
page read and write
1D5FF839000
trusted library allocation
page read and write
1D5EAD64000
heap
page read and write
1D5F56C8000
trusted library allocation
page read and write
1D5FBFB2000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F5794000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F40DA000
trusted library allocation
page read and write
1D5F5380000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADAA000
heap
page read and write
1D5F47F3000
trusted library allocation
page read and write
1D5FBFA6000
trusted library allocation
page read and write
1D5F76B9000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADD9000
heap
page read and write
1D5F4C74000
trusted library allocation
page read and write
1D5F4C36000
trusted library allocation
page read and write
1D5F72D5000
trusted library allocation
page read and write
15B3F959000
heap
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5FC0BF000
trusted library allocation
page read and write
1D5FE618000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5FF9BB000
trusted library allocation
page read and write
1D5F565C000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F5A38000
trusted library allocation
page read and write
F697BFE000
unkown
page readonly
1D5FE701000
trusted library allocation
page read and write
1D5F6614000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5FD6000
trusted library allocation
page read and write
1D5F49A5000
trusted library allocation
page read and write
1D5F67D6000
trusted library allocation
page read and write
1D600B9C000
heap
page read and write
1D5EADDF000
heap
page read and write
1D5F76E2000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56D0000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5F397B000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
3B1717E000
unkown
page readonly
1D5EF798000
trusted library allocation
page read and write
1D5F3B7D000
trusted library allocation
page read and write
1D5FC2EB000
trusted library allocation
page read and write
15B3EB0A000
trusted library allocation
page read and write
1D5F47E5000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F5CD0000
trusted library allocation
page read and write
1D5F56C3000
trusted library allocation
page read and write
1D5EADF0000
heap
page read and write
1D5F5AEF000
trusted library allocation
page read and write
1D5FC0B8000
trusted library allocation
page read and write
1D5FF8CD000
trusted library allocation
page read and write
1D5FBD36000
trusted library allocation
page read and write
1D5FBF9C000
trusted library allocation
page read and write
2885DF30000
heap
page read and write
2885E30C000
trusted library allocation
page read and write
1D5F4CD3000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F60BA000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5FFCA0000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1C949816000
heap
page read and write
1D5F4C22000
trusted library allocation
page read and write
1D5F539F000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F78FE000
trusted library allocation
page read and write
1D5F73B0000
trusted library allocation
page read and write
1D5FF898000
trusted library allocation
page read and write
1D6001EF000
trusted library allocation
page read and write
1D5F67EA000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F55F6000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F3969000
trusted library allocation
page read and write
1D5F5EDD000
trusted library allocation
page read and write
1D5F537F000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D5FC2A5000
trusted library allocation
page read and write
21F2B5C3000
heap
page read and write
1D5F6176000
trusted library allocation
page read and write
1D6001E9000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F76E2000
trusted library allocation
page read and write
1D5F560C000
trusted library allocation
page read and write
15B3F85C000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F40D2000
trusted library allocation
page read and write
1D5F399D000
trusted library allocation
page read and write
1D5EAD8B000
heap
page read and write
1D5EADAE000
heap
page read and write
1D5EAD7E000
heap
page read and write
1D5F10BE000
trusted library allocation
page read and write
1D5EADAC000
heap
page read and write
1D5F5AE1000
trusted library allocation
page read and write
1D5F6365000
trusted library allocation
page read and write
1D5F47A1000
trusted library allocation
page read and write
1D5F4C5E000
trusted library allocation
page read and write
1D5F4C17000
trusted library allocation
page read and write
21F2B640000
unclassified section
page readonly
1D5F63AC000
trusted library allocation
page read and write
1D5FF855000
trusted library allocation
page read and write
1D5FF9D2000
trusted library allocation
page read and write
1D5F16FE000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F4C74000
trusted library allocation
page read and write
14B0000
heap
page read and write
1D5F667C000
trusted library allocation
page read and write
1D5FBF76000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5FBEB3000
trusted library allocation
page read and write
1D5F109A000
trusted library allocation
page read and write
1D5EAE13000
heap
page read and write
1D5F534A000
trusted library allocation
page read and write
1D5F67B8000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F68FA000
trusted library allocation
page read and write
1D5F63AE000
trusted library allocation
page read and write
1D5F76BB000
trusted library allocation
page read and write
1D5F0D53000
trusted library allocation
page read and write
1D5F4917000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5EAE0A000
heap
page read and write
2885E370000
trusted library allocation
page read and write
1D5F76EC000
trusted library allocation
page read and write
1D5EADE6000
heap
page read and write
1D5F5A7A000
trusted library allocation
page read and write
1D5FC113000
trusted library allocation
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5F73B9000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5F5643000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F5FFA000
trusted library allocation
page read and write
1D5F5CD8000
trusted library allocation
page read and write
1D5FF846000
trusted library allocation
page read and write
1D5F5FD6000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
1D6001ED000
trusted library allocation
page read and write
1D5FD86E000
trusted library allocation
page read and write
1D5FC0B8000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5F5587000
trusted library allocation
page read and write
1D5FD9F6000
trusted library allocation
page read and write
2885E313000
trusted library allocation
page read and write
1D5F56B1000
trusted library allocation
page read and write
2E8C9FF000
stack
page read and write
1D5FC2FA000
trusted library allocation
page read and write
1D5F431B000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F10F6000
trusted library allocation
page read and write
1D5F67C2000
trusted library allocation
page read and write
21F2BA10000
trusted library allocation
page read and write
1D5F4CA6000
trusted library allocation
page read and write
1D5F47BB000
trusted library allocation
page read and write
21F2B633000
remote allocation
page execute read
1D5F8A02000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
F3B973E000
unkown
page readonly
1D5F3CBA000
trusted library allocation
page read and write
1D5F4C24000
trusted library allocation
page read and write
15B3E930000
heap
page read and write
1D5EAE0A000
heap
page read and write
1D5FBCE3000
trusted library allocation
page read and write
1D5F6400000
trusted library allocation
page read and write
1D6001BA000
trusted library allocation
page read and write
1D5FF963000
trusted library allocation
page read and write
1D5F750B000
trusted library allocation
page read and write
1D5F5CF2000
trusted library allocation
page read and write
1D60054A000
trusted library allocation
page read and write
1D5F40AA000
trusted library allocation
page read and write
1D5FC082000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5FD8B8000
trusted library allocation
page read and write
1D5FD883000
trusted library allocation
page read and write
1D5F161E000
trusted library allocation
page read and write
1D5F39D1000
trusted library allocation
page read and write
1D5F0DE1000
trusted library allocation
page read and write
1D5FC1F5000
trusted library allocation
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5F78FE000
trusted library allocation
page read and write
1D5F6789000
trusted library allocation
page read and write
21F2B5C0000
heap
page read and write
15B3F977000
heap
page read and write
1D5F3B77000
trusted library allocation
page read and write
A91000
unkown
page execute read
1D5F4583000
trusted library allocation
page read and write
1D5FD8C2000
trusted library allocation
page read and write
1D5F3840000
heap
page read and write
1D5F75B9000
trusted library allocation
page read and write
1D5EAD65000
heap
page read and write
1D5F56DD000
trusted library allocation
page read and write
1558000
heap
page read and write
1D5F3CAE000
trusted library allocation
page read and write
1D5FC1D1000
trusted library allocation
page read and write
1D5F63AC000
trusted library allocation
page read and write
1D5FC1E8000
trusted library allocation
page read and write
BF0000
heap
page read and write
1D5EADAB000
heap
page read and write
1D5FF89A000
trusted library allocation
page read and write
1D5FC08B000
trusted library allocation
page read and write
1D5EFD2F000
trusted library allocation
page read and write
1D5F0DFA000
trusted library allocation
page read and write
1D5F3B55000
trusted library allocation
page read and write
1D5F3545000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EADDA000
heap
page read and write
1D5F5F4B000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FD9EF000
trusted library allocation
page read and write
1D5FBECC000
trusted library allocation
page read and write
1D5FD8E9000
trusted library allocation
page read and write
1D5F10A8000
trusted library allocation
page read and write
1D5FBC9D000
trusted library allocation
page read and write
1D5F438F000
trusted library allocation
page read and write
1D5FD88B000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D600171000
trusted library allocation
page read and write
1D5F571B000
trusted library allocation
page read and write
2885E600000
trusted library allocation
page read and write
1D5F40CA000
trusted library allocation
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5F678B000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F5A57000
trusted library allocation
page read and write
1D5F63BC000
trusted library allocation
page read and write
1D5FF5E8000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5724000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5EAD76000
heap
page read and write
1D5F3828000
heap
page read and write
1D5FBF5D000
trusted library allocation
page read and write
1D5FC248000
trusted library allocation
page read and write
1D5F56DF000
trusted library allocation
page read and write
1D5F7854000
trusted library allocation
page read and write
1D5FBCD1000
trusted library allocation
page read and write
21F2BA47000
trusted library allocation
page read and write
1D5F574A000
trusted library allocation
page read and write
1D5FBEC2000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5F5AE8000
trusted library allocation
page read and write
1D5FBFF7000
trusted library allocation
page read and write
1D5F1098000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FF89A000
trusted library allocation
page read and write
15B3F8E0000
heap
page read and write
1D5FD8E0000
trusted library allocation
page read and write
1D5F765C000
trusted library allocation
page read and write
1D5FC1E1000
trusted library allocation
page read and write
2885E346000
trusted library allocation
page read and write
1D5F5CEE000
trusted library allocation
page read and write
1D5F67FE000
trusted library allocation
page read and write
1D5EADB0000
heap
page read and write
1D5F162F000
trusted library allocation
page read and write
1D5F4391000
trusted library allocation
page read and write
1D5F4CCF000
trusted library allocation
page read and write
1D5F6363000
trusted library allocation
page read and write
1D5F5AEF000
trusted library allocation
page read and write
1D5F4790000
trusted library allocation
page read and write
15B3F88A000
heap
page read and write
1D5FF5FB000
trusted library allocation
page read and write
1D5FC0BF000
trusted library allocation
page read and write
1D5EF7DF000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F1139000
trusted library allocation
page read and write
1D5FE6B4000
trusted library allocation
page read and write
1D5F3CE8000
trusted library allocation
page read and write
2885E0D0000
unclassified section
page readonly
1D5F5AED000
trusted library allocation
page read and write
1D5F62D3000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
21F2B7FF000
unclassified section
page read and write
1D5F764F000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EAD92000
heap
page read and write
1C947D30000
heap
page read and write
1D5F61D5000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F63EE000
trusted library allocation
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D600546000
trusted library allocation
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1D5FF5C0000
trusted library allocation
page read and write
1D5FFC9C000
trusted library allocation
page read and write
1D5FC296000
trusted library allocation
page read and write
1D5F4544000
trusted library allocation
page read and write
1D5FE3D1000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5FC089000
trusted library allocation
page read and write
1D5F40CA000
trusted library allocation
page read and write
1D5EF79E000
trusted library allocation
page read and write
1D5FC09E000
trusted library allocation
page read and write
1D5EFDF6000
trusted library allocation
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5F73B3000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
24326371E000
trusted library allocation
page read and write
1D5F394E000
trusted library allocation
page read and write
15B3F96B000
heap
page read and write
1D60026A000
trusted library allocation
page read and write
1D5F3841000
heap
page read and write
1D5F57EA000
trusted library allocation
page read and write
1D5F3828000
heap
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5FC0AB000
trusted library allocation
page read and write
1D5F49ED000
trusted library allocation
page read and write
21F2BACB000
trusted library allocation
page read and write
1D5F382A000
heap
page read and write
1D5F383F000
heap
page read and write
15B3EC92000
unkown
page execute read
1D5EADDB000
heap
page read and write
1D5EADE6000
heap
page read and write
1D5EAD9B000
heap
page read and write
2885E3DB000
trusted library allocation
page read and write
1D5FF9BB000
trusted library allocation
page read and write
1D5F1063000
trusted library allocation
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5F736A000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
15B3F8A1000
heap
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1D5F386A000
heap
page read and write
1D5F5EAF000
trusted library allocation
page read and write
1D5F5354000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F57E8000
trusted library allocation
page read and write
1D5F5720000
trusted library allocation
page read and write
1D5FC079000
trusted library allocation
page read and write
1D5FC1FC000
trusted library allocation
page read and write
1D5F4C36000
trusted library allocation
page read and write
1D5FBEB2000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
2885E0A0000
unclassified section
page read and write
1D5EAD92000
heap
page read and write
15B3E9C0000
heap
page readonly
1D5FBF5D000
trusted library allocation
page read and write
1D5F474F000
trusted library allocation
page read and write
1D5F0DCE000
trusted library allocation
page read and write
F3BC83E000
unkown
page readonly
1D5FF99F000
trusted library allocation
page read and write
1D5FF4E9000
trusted library allocation
page read and write
1D5EADE0000
heap
page read and write
1D5EADD9000
heap
page read and write
1D600B66000
heap
page read and write
94357FF000
stack
page read and write
1D5EAD9B000
heap
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
21F2BA96000
trusted library allocation
page read and write
1D5F3936000
trusted library allocation
page read and write
1D5F57ED000
trusted library allocation
page read and write
1D5F5CD0000
trusted library allocation
page read and write
1D5FBDAA000
trusted library allocation
page read and write
1D5F571E000
trusted library allocation
page read and write
2885DE50000
unclassified section
page readonly
21F2BB32000
trusted library allocation
page read and write
1D5F56D6000
trusted library allocation
page read and write
1D6001C3000
trusted library allocation
page read and write
1D5FFC55000
trusted library allocation
page read and write
1D5F4391000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5F5744000
trusted library allocation
page read and write
134E000
stack
page read and write
1D5F10BC000
trusted library allocation
page read and write
1D5F56D0000
trusted library allocation
page read and write
1D5F3CF7000
trusted library allocation
page read and write
1D5FF5F2000
trusted library allocation
page read and write
1D5FF486000
trusted library allocation
page read and write
1D5FC031000
trusted library allocation
page read and write
1D5F3856000
heap
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5F56D0000
trusted library allocation
page read and write
21F2BA72000
trusted library allocation
page read and write
1D600B8D000
heap
page read and write
1D5F5CFC000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EFEFE000
trusted library allocation
page read and write
1D60058C000
trusted library allocation
page read and write
1D5F3CBF000
trusted library allocation
page read and write
1D5F3C3B000
trusted library allocation
page read and write
1D5F4CBD000
trusted library allocation
page read and write
1D5F4AEC000
trusted library allocation
page read and write
1D5F5F5B000
trusted library allocation
page read and write
1D5F5CC2000
trusted library allocation
page read and write
1D5F574D000
trusted library allocation
page read and write
1D5FBFDE000
trusted library allocation
page read and write
1D5F4C7D000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EADB7000
heap
page read and write
1D5F5A6F000
trusted library allocation
page read and write
1D5F5FC0000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F4579000
trusted library allocation
page read and write
1D5F75CB000
trusted library allocation
page read and write
1D5F56BE000
trusted library allocation
page read and write
1D600227000
trusted library allocation
page read and write
1D5F51F9000
trusted library allocation
page read and write
1D5FE6FC000
trusted library allocation
page read and write
1D5FBD72000
trusted library allocation
page read and write
1D5F67E4000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5F6393000
trusted library allocation
page read and write
1D5FFCA0000
trusted library allocation
page read and write
1D5F56F9000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FBCCD000
trusted library allocation
page read and write
1D5FC0D6000
trusted library allocation
page read and write
1D5F7399000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
1D5F56EA000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EAD96000
heap
page read and write
1D5F4A13000
trusted library allocation
page read and write
1D5FF99F000
trusted library allocation
page read and write
1D5FF5F2000
trusted library allocation
page read and write
1D5F7657000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5F6400000
trusted library allocation
page read and write
1D5FF5B7000
trusted library allocation
page read and write
1D5F5752000
trusted library allocation
page read and write
1D5FBCC7000
trusted library allocation
page read and write
1D5F7348000
trusted library allocation
page read and write
1D5F4C2F000
trusted library allocation
page read and write
1D5EADF4000
heap
page read and write
15B3EB79000
trusted library allocation
page read and write
15B3F8F0000
heap
page read and write
1D5F45F8000
trusted library allocation
page read and write
1D5FC092000
trusted library allocation
page read and write
2885DED0000
unclassified section
page readonly
1494000
heap
page read and write
1D5F45AC000
trusted library allocation
page read and write
1D5F5692000
trusted library allocation
page read and write
222C6AC0000
heap
page read and write
1D5FF465000
trusted library allocation
page read and write
1D5FC2D0000
trusted library allocation
page read and write
1D5F4A6B000
trusted library allocation
page read and write
1D5F4CCF000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F7657000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F5CF2000
trusted library allocation
page read and write
1D5F3CF7000
trusted library allocation
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D600128000
trusted library allocation
page read and write
1D5F3CE8000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F5720000
trusted library allocation
page read and write
1D5F40AD000
trusted library allocation
page read and write
1D5F67E2000
trusted library allocation
page read and write
1D5FF4B8000
trusted library allocation
page read and write
1D5FF491000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F4099000
trusted library allocation
page read and write
1D5F4A91000
trusted library allocation
page read and write
1D5F1079000
trusted library allocation
page read and write
15B3F869000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F5CFA000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5F45F8000
trusted library allocation
page read and write
1D5FC1FB000
trusted library allocation
page read and write
1D5F571E000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5FC29F000
trusted library allocation
page read and write
1D5FBEE6000
trusted library allocation
page read and write
1D5F78FE000
trusted library allocation
page read and write
1D5F3C47000
trusted library allocation
page read and write
1D5FC096000
trusted library allocation
page read and write
1D5FBED9000
trusted library allocation
page read and write
1D5F55BC000
trusted library allocation
page read and write
1D5F0FC3000
trusted library allocation
page read and write
F3B73DE000
stack
page read and write
1D5F674B000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F454B000
trusted library allocation
page read and write
1D5FD600000
trusted library allocation
page read and write
1D5FBFE3000
trusted library allocation
page read and write
1D5F6789000
trusted library allocation
page read and write
1D5F572E000
trusted library allocation
page read and write
1D5FBE45000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5F4322000
trusted library allocation
page read and write
1D5FC1F0000
trusted library allocation
page read and write
1557000
heap
page read and write
1D5FC0AB000
trusted library allocation
page read and write
1D5FBF2B000
trusted library allocation
page read and write
2885E3B1000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5FBCDB000
trusted library allocation
page read and write
1D5FC0AB000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EAD7D000
heap
page read and write
1D5F16FE000
trusted library allocation
page read and write
1D5F3832000
heap
page read and write
1D5EAD64000
heap
page read and write
1D5F56D0000
trusted library allocation
page read and write
1D5F1672000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F384B000
heap
page read and write
1D5FC0D6000
trusted library allocation
page read and write
1D5FF953000
trusted library allocation
page read and write
1D5EAD91000
heap
page read and write
1D5FC25A000
trusted library allocation
page read and write
1D5FC072000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5ADA000
trusted library allocation
page read and write
1D5F5EC2000
trusted library allocation
page read and write
1D5F4C45000
trusted library allocation
page read and write
1D5F471A000
trusted library allocation
page read and write
1D5F47E5000
trusted library allocation
page read and write
1D5FBEB2000
trusted library allocation
page read and write
15B3F8E1000
heap
page read and write
1D5EADE2000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5F10BE000
trusted library allocation
page read and write
1D5F571E000
trusted library allocation
page read and write
15B3EB81000
trusted library allocation
page read and write
1D5EAD6A000
heap
page read and write
1D5FE6B1000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D5F5AED000
trusted library allocation
page read and write
1D5F40AD000
trusted library allocation
page read and write
1D5EADE0000
heap
page read and write
1D5FF81E000
trusted library allocation
page read and write
1D5FF963000
trusted library allocation
page read and write
1D5F7634000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5F60B8000
trusted library allocation
page read and write
1D5F5681000
trusted library allocation
page read and write
1D5F3CBE000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F3C9A000
trusted library allocation
page read and write
1D5F7339000
trusted library allocation
page read and write
1D5FF86B000
trusted library allocation
page read and write
1D5FC267000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F437C000
trusted library allocation
page read and write
1D5F45C3000
trusted library allocation
page read and write
1D5FF8ED000
trusted library allocation
page read and write
1D5FC0D6000
trusted library allocation
page read and write
1D5F5C83000
trusted library allocation
page read and write
1D5F4313000
trusted library allocation
page read and write
1D5F5722000
trusted library allocation
page read and write
1D5FFC44000
trusted library allocation
page read and write
1D5EAD6E000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F5DF7000
trusted library allocation
page read and write
1D5EFEE4000
trusted library allocation
page read and write
1D5F67B8000
trusted library allocation
page read and write
1D5EADE8000
heap
page read and write
1D5F538F000
trusted library allocation
page read and write
1D5F40F6000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5F5DF7000
trusted library allocation
page read and write
1D5F0DC5000
trusted library allocation
page read and write
1D5EADE0000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD7E000
heap
page read and write
1D600C23000
heap
page read and write
1D5FC0AF000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F6085000
trusted library allocation
page read and write
1D5FBDAA000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FD8D4000
trusted library allocation
page read and write
1D5F3B64000
trusted library allocation
page read and write
1D5F40E0000
trusted library allocation
page read and write
1D5FFC5B000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EAD8D000
heap
page read and write
1D5F475C000
trusted library allocation
page read and write
1D5F453E000
trusted library allocation
page read and write
1D5F5669000
trusted library allocation
page read and write
1D5F4C3E000
trusted library allocation
page read and write
1D5FC0E7000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5F56D0000
trusted library allocation
page read and write
1D5EADB7000
heap
page read and write
1D5F56EA000
trusted library allocation
page read and write
15B3F863000
heap
page read and write
1D5F0D5B000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EAD91000
heap
page read and write
1D5F76E6000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
2885E70C000
trusted library allocation
page read and write
1D5F6363000
trusted library allocation
page read and write
1D5EFD71000
trusted library allocation
page read and write
15B3F719000
trusted library allocation
page read and write
1D5F782D000
trusted library allocation
page read and write
1D5F432E000
trusted library allocation
page read and write
1D5F68D9000
trusted library allocation
page read and write
1D60054E000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5FC06A000
trusted library allocation
page read and write
2885DEF0000
heap
page read and write
1D5F764F000
trusted library allocation
page read and write
2885E324000
trusted library allocation
page read and write
1D5F6791000
trusted library allocation
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F552B000
trusted library allocation
page read and write
1D5FD928000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F761E000
trusted library allocation
page read and write
15B3ECB0000
heap
page read and write
1D5F76E6000
trusted library allocation
page read and write
1D5FBEF0000
trusted library allocation
page read and write
1D5F6269000
trusted library allocation
page read and write
21F2BB17000
trusted library allocation
page read and write
222C6D07000
trusted library allocation
page read and write
1D5F76DD000
trusted library allocation
page read and write
1D60017A000
trusted library allocation
page read and write
1D5FBEE6000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F73B0000
trusted library allocation
page read and write
1D5F76AC000
trusted library allocation
page read and write
1D5F53F7000
trusted library allocation
page read and write
1D5F4CB0000
trusted library allocation
page read and write
1D5F56C1000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5FBCDF000
trusted library allocation
page read and write
15B3F958000
heap
page read and write
1D600B41000
heap
page read and write
1D5FBC8F000
trusted library allocation
page read and write
1D5F569F000
trusted library allocation
page read and write
1D5FBD46000
trusted library allocation
page read and write
1D5F4585000
trusted library allocation
page read and write
1D5F5395000
trusted library allocation
page read and write
1D5F0DA9000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EAD8D000
heap
page read and write
1D6001B6000
trusted library allocation
page read and write
1D5FF9D2000
trusted library allocation
page read and write
1D5F3969000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
2885E3C4000
trusted library allocation
page read and write
1C947D53000
heap
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5F76B7000
trusted library allocation
page read and write
1D5F47AD000
trusted library allocation
page read and write
1D5FC25F000
trusted library allocation
page read and write
1D5FC0D6000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5F4A70000
trusted library allocation
page read and write
1D5F0FE8000
trusted library allocation
page read and write
1D5F476B000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FBCAA000
trusted library allocation
page read and write
1D5F3CDE000
trusted library allocation
page read and write
1D5FBEC9000
trusted library allocation
page read and write
2885E3AA000
trusted library allocation
page read and write
1D5FD8E0000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F666E000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5EAD7D000
heap
page read and write
1D5EADE5000
heap
page read and write
1D6005A7000
trusted library allocation
page read and write
1D5F4C36000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5F5DF7000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
15B3F93B000
heap
page read and write
1D6001AB000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
F3B95FE000
unkown
page readonly
1D5EADDA000
heap
page read and write
1D5EADAC000
heap
page read and write
1D5F73B6000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5F5578000
trusted library allocation
page read and write
2885E140000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5FC2A4000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5FBECC000
trusted library allocation
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5FD8AE000
trusted library allocation
page read and write
1D5F5ADA000
trusted library allocation
page read and write
1D5FC2FA000
trusted library allocation
page read and write
21F2B5B0000
unclassified section
page readonly
1D5F4CA7000
trusted library allocation
page read and write
1D5FE689000
trusted library allocation
page read and write
1D6001B6000
trusted library allocation
page read and write
1D5F57DE000
trusted library allocation
page read and write
1D5F0FC3000
trusted library allocation
page read and write
1D5F47E1000
trusted library allocation
page read and write
1D5F533D000
trusted library allocation
page read and write
1D5F5A1F000
trusted library allocation
page read and write
1D5EAD94000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FC289000
trusted library allocation
page read and write
1D5F3CE8000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADB3000
heap
page read and write
1D600BCD000
heap
page read and write
1D5F10C7000
trusted library allocation
page read and write
B2C000
unkown
page readonly
1D5FC2CD000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
3B189FE000
stack
page read and write
2885E4C0000
heap
page read and write
1D5F382A000
heap
page read and write
1D5FBE60000
trusted library allocation
page read and write
1D5F763A000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F7335000
trusted library allocation
page read and write
1D5F5C91000
trusted library allocation
page read and write
1D5F3C5B000
trusted library allocation
page read and write
15B3F96B000
heap
page read and write
1D5EAD76000
heap
page read and write
1C947F00000
trusted library allocation
page read and write
F3B977E000
stack
page read and write
1D5EADA0000
heap
page read and write
1D5F4CCF000
trusted library allocation
page read and write
1D5F43BE000
trusted library allocation
page read and write
1D5F56B1000
trusted library allocation
page read and write
1D5F552F000
trusted library allocation
page read and write
1D5FF5FB000
trusted library allocation
page read and write
15B3E9E0000
unclassified section
page read and write
1D5EAD95000
heap
page read and write
2885DECA000
remote allocation
page execute read
1D5F5724000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D2E000
stack
page read and write
1D5F68FA000
trusted library allocation
page read and write
1D5F4750000
trusted library allocation
page read and write
1D5F4C74000
trusted library allocation
page read and write
1D5FBFDC000
trusted library allocation
page read and write
1D5F4C18000
trusted library allocation
page read and write
1D5F611B000
trusted library allocation
page read and write
15B3E7FD000
remote allocation
page execute read
1D5FF5B7000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F61D5000
trusted library allocation
page read and write
1D5F16FE000
trusted library allocation
page read and write
1D5F3C92000
trusted library allocation
page read and write
15B3F8E8000
heap
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5EAE0B000
heap
page read and write
2885E200000
trusted library allocation
page read and write
1D5F5476000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5FE661000
trusted library allocation
page read and write
1D5F76FB000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F5341000
trusted library allocation
page read and write
1D5FF5D1000
trusted library allocation
page read and write
1D5F35C8000
trusted library allocation
page read and write
1D5F72DF000
trusted library allocation
page read and write
1D5F4C9A000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
1D5F383F000
heap
page read and write
1D5F76D6000
trusted library allocation
page read and write
1D5FC289000
trusted library allocation
page read and write
1D5FE685000
trusted library allocation
page read and write
1D5F5F54000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F5A6A000
trusted library allocation
page read and write
1D5F3CF4000
trusted library allocation
page read and write
1D5F60FB000
trusted library allocation
page read and write
1D5EFEB4000
trusted library allocation
page read and write
1D5FBF4C000
trusted library allocation
page read and write
1D5F67C2000
trusted library allocation
page read and write
1D5FC12C000
trusted library allocation
page read and write
1D5F5F1E000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F62CD000
trusted library allocation
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5FBEC9000
trusted library allocation
page read and write
1D5FF96D000
trusted library allocation
page read and write
1D5F39FE000
trusted library allocation
page read and write
1D5F3975000
trusted library allocation
page read and write
15B3F958000
heap
page read and write
1D5F5675000
trusted library allocation
page read and write
15B3F8FD000
heap
page read and write
1D5F5FE6000
trusted library allocation
page read and write
1D5FBEC2000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5FF5E5000
trusted library allocation
page read and write
1D5F67AA000
trusted library allocation
page read and write
1D5F3CCD000
trusted library allocation
page read and write
1D5FBECC000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FF9A9000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5EAD95000
heap
page read and write
15B3F809000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F68C7000
trusted library allocation
page read and write
1D5FC047000
trusted library allocation
page read and write
1D5F5F48000
trusted library allocation
page read and write
1D5F3963000
trusted library allocation
page read and write
1D5F3CAE000
trusted library allocation
page read and write
1D5FBEEB000
trusted library allocation
page read and write
1D6005A9000
trusted library allocation
page read and write
1D5FC1F8000
trusted library allocation
page read and write
1D6001EB000
trusted library allocation
page read and write
3B1707E000
unkown
page readonly
1D5F5A70000
trusted library allocation
page read and write
2885E303000
trusted library allocation
page read and write
1D5F47BB000
trusted library allocation
page read and write
1D5F7653000
trusted library allocation
page read and write
1D5FC2A8000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F51F0000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F3828000
heap
page read and write
F3B9FBE000
stack
page read and write
1D5FBCBA000
trusted library allocation
page read and write
1D5F0D3A000
trusted library allocation
page read and write
1D5F76E6000
trusted library allocation
page read and write
1D5FBCD5000
trusted library allocation
page read and write
15B3F958000
heap
page read and write
222C6D0A000
trusted library allocation
page read and write
1D5F4CCE000
trusted library allocation
page read and write
1D5F56D6000
trusted library allocation
page read and write
1D5F7632000
trusted library allocation
page read and write
1D5EADB7000
heap
page read and write
1D5F3B87000
trusted library allocation
page read and write
1D5F535D000
trusted library allocation
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F625F000
trusted library allocation
page read and write
1D5FC1F9000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EAD9B000
heap
page read and write
1560000
heap
page read and write
1D5F56F1000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
F3B963E000
unkown
page readonly
1D5EAD7E000
heap
page read and write
1D5F4C3F000
trusted library allocation
page read and write
1D5EADDB000
heap
page read and write
1D5F3B75000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FF5DB000
trusted library allocation
page read and write
1D5F5C97000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F3975000
trusted library allocation
page read and write
1D5FF5D1000
trusted library allocation
page read and write
1D5F4C2F000
trusted library allocation
page read and write
1D5FF45D000
trusted library allocation
page read and write
1D5F5341000
trusted library allocation
page read and write
1D5F6361000
trusted library allocation
page read and write
1D5FBD11000
trusted library allocation
page read and write
1D5F5C57000
trusted library allocation
page read and write
1D5F47ED000
trusted library allocation
page read and write
1D5F5A6D000
trusted library allocation
page read and write
1D5FD8CD000
trusted library allocation
page read and write
2885E378000
trusted library allocation
page read and write
1D5F5CFA000
trusted library allocation
page read and write
1D5F6693000
trusted library allocation
page read and write
1D5F4C2F000
trusted library allocation
page read and write
1D5F16F8000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F4313000
trusted library allocation
page read and write
15B3F85C000
heap
page read and write
1D5F4C6F000
trusted library allocation
page read and write
1D5F3C8A000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
15B3E780000
unclassified section
page readonly
21F2B7D6000
heap
page read and write
1D5FE393000
trusted library allocation
page read and write
1D5F478D000
trusted library allocation
page read and write
15B3F8E0000
heap
page read and write
1D5EFD71000
trusted library allocation
page read and write
1D5F76DD000
trusted library allocation
page read and write
222C6A40000
heap
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1D5F5F79000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5F675A000
trusted library allocation
page read and write
1D5FD9D9000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F4C24000
trusted library allocation
page read and write
1D5FD8F8000
trusted library allocation
page read and write
1D5F6760000
trusted library allocation
page read and write
1D5F4C3E000
trusted library allocation
page read and write
1C947D54000
heap
page read and write
1D5F5C7F000
trusted library allocation
page read and write
1D5F3B72000
trusted library allocation
page read and write
1D5F40CA000
trusted library allocation
page read and write
1D5F73DA000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5FC0E7000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FC1F0000
trusted library allocation
page read and write
1D5F4A84000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F0DCB000
trusted library allocation
page read and write
1D5F4C86000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F73B9000
trusted library allocation
page read and write
1D6001C3000
trusted library allocation
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5F4536000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5666000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F0D81000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F476B000
trusted library allocation
page read and write
1570000
heap
page read and write
1D5FC1BC000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F162C000
trusted library allocation
page read and write
1D5F6138000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5EAE0A000
heap
page read and write
1D5F4754000
trusted library allocation
page read and write
A90000
unkown
page readonly
1D5F4C7D000
trusted library allocation
page read and write
1D5F6747000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
BBA000
stack
page read and write
2885E35F000
trusted library allocation
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5FF8E6000
trusted library allocation
page read and write
1D5FE38E000
trusted library allocation
page read and write
1D5F5A77000
trusted library allocation
page read and write
1D5FBCDB000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F3CB5000
trusted library allocation
page read and write
1D5F3CAE000
trusted library allocation
page read and write
1D5F67BD000
trusted library allocation
page read and write
2885E374000
trusted library allocation
page read and write
1D5FDA02000
trusted library allocation
page read and write
1D5F382A000
heap
page read and write
1D5F3824000
heap
page read and write
1D5EAD93000
heap
page read and write
15B3F87D000
heap
page read and write
1D5F5CF0000
trusted library allocation
page read and write
F3BB83E000
unkown
page readonly
1D600169000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5F3CE9000
trusted library allocation
page read and write
1D5FBD30000
trusted library allocation
page read and write
1D6001B6000
trusted library allocation
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5FBFE4000
trusted library allocation
page read and write
1D5FC2D0000
trusted library allocation
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5FC1F0000
trusted library allocation
page read and write
1D5EAD89000
heap
page read and write
1D5EAD76000
heap
page read and write
1D5EAD7E000
heap
page read and write
1D5EADDB000
heap
page read and write
1D5F3991000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
B5C000
unkown
page read and write
1D5EAD92000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5FC0CB000
trusted library allocation
page read and write
1D5F3B6C000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F4C85000
trusted library allocation
page read and write
1D5F40D4000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FE685000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5FF4B1000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5F4541000
trusted library allocation
page read and write
1D5EF7CC000
trusted library allocation
page read and write
21F2BA5D000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F57F1000
trusted library allocation
page read and write
1D5EAD83000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5F51AF000
trusted library allocation
page read and write
1D5F4CD7000
trusted library allocation
page read and write
1D5FC0B3000
trusted library allocation
page read and write
3B16FFE000
unkown
page readonly
1D5F67EE000
trusted library allocation
page read and write
1D5F5CB1000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D6001E6000
trusted library allocation
page read and write
1D5F4C85000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F3828000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F571B000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
15B3F860000
heap
page read and write
1D5F5354000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5F76EC000
trusted library allocation
page read and write
1D5FF96D000
trusted library allocation
page read and write
1D5F67EA000
trusted library allocation
page read and write
2885E376000
trusted library allocation
page read and write
1D5F635F000
trusted library allocation
page read and write
1D5EADA9000
heap
page read and write
1D5F3CE6000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F6367000
trusted library allocation
page read and write
1D5FFC6F000
trusted library allocation
page read and write
1D5F6253000
trusted library allocation
page read and write
1D5FBD55000
trusted library allocation
page read and write
1D5EADE4000
heap
page read and write
1D5F4391000
trusted library allocation
page read and write
1D5FBD53000
trusted library allocation
page read and write
1D5F5AB7000
trusted library allocation
page read and write
1D5F3995000
trusted library allocation
page read and write
1D5F408E000
trusted library allocation
page read and write
1D5F10BC000
trusted library allocation
page read and write
1D5F106C000
trusted library allocation
page read and write
1D5F557A000
trusted library allocation
page read and write
1D5F4790000
trusted library allocation
page read and write
1D5FBD98000
trusted library allocation
page read and write
1D60057B000
trusted library allocation
page read and write
11BF000
stack
page read and write
1D5F73CF000
trusted library allocation
page read and write
1D5F457D000
trusted library allocation
page read and write
1D5F57EB000
trusted library allocation
page read and write
1D5EAD8D000
heap
page read and write
1D5F0D87000
trusted library allocation
page read and write
1D6001ED000
trusted library allocation
page read and write
1D5F1623000
trusted library allocation
page read and write
1D5F63FC000
trusted library allocation
page read and write
1D5F4AA0000
trusted library allocation
page read and write
1D5F4721000
trusted library allocation
page read and write
1D60052D000
trusted library allocation
page read and write
F3B96B8000
stack
page read and write
1D5F5CF8000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
15B3F708000
trusted library allocation
page read and write
1D5F63FA000
trusted library allocation
page read and write
1D5FF818000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
B52000
unkown
page readonly
1D5FF5E8000
trusted library allocation
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5F57FE000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5FC28A000
trusted library allocation
page read and write
1D5F472A000
trusted library allocation
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56EA000
trusted library allocation
page read and write
1D6001AB000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F3B82000
trusted library allocation
page read and write
1D5F67EA000
trusted library allocation
page read and write
1D5FF968000
trusted library allocation
page read and write
1D5F55EB000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F477D000
trusted library allocation
page read and write
1D5FBCCD000
trusted library allocation
page read and write
15B3E9EF000
unclassified section
page read and write
1D5F76D6000
trusted library allocation
page read and write
1D5EADE6000
heap
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5F3CCD000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5F497B000
trusted library allocation
page read and write
1D5F6356000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
222C6A60000
heap
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5FF5C0000
trusted library allocation
page read and write
1D5F3847000
heap
page read and write
1D5EADB6000
heap
page read and write
1D5EAD7D000
heap
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F782F000
trusted library allocation
page read and write
1D5F492F000
trusted library allocation
page read and write
1D5FF4AA000
trusted library allocation
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5FC0AF000
trusted library allocation
page read and write
1D5F4CE3000
trusted library allocation
page read and write
1D5F40F6000
trusted library allocation
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5F7606000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FF924000
trusted library allocation
page read and write
1D600199000
trusted library allocation
page read and write
1D5FBCD5000
trusted library allocation
page read and write
1D5EAD67000
heap
page read and write
1D5F631B000
trusted library allocation
page read and write
1D5F4C67000
trusted library allocation
page read and write
1D5F4C3E000
trusted library allocation
page read and write
1D5F7693000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FBD9E000
trusted library allocation
page read and write
1D5EADAE000
heap
page read and write
1D5EFE82000
trusted library allocation
page read and write
1D5FF92A000
trusted library allocation
page read and write
1D5FC2DD000
trusted library allocation
page read and write
1D5F40D4000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F4796000
trusted library allocation
page read and write
1D5F72EA000
trusted library allocation
page read and write
1D5FF88E000
trusted library allocation
page read and write
1D5EAD80000
heap
page read and write
15B3F944000
heap
page read and write
1D5FBF9B000
trusted library allocation
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5F73CF000
trusted library allocation
page read and write
1D5FBCC3000
trusted library allocation
page read and write
1D5FC262000
trusted library allocation
page read and write
1D5F67B3000
trusted library allocation
page read and write
1D5FC01F000
trusted library allocation
page read and write
1D5FC2CD000
trusted library allocation
page read and write
1D5F35F4000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F5484000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
15B3F93B000
heap
page read and write
1D5F7666000
trusted library allocation
page read and write
1D600183000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5FF9A9000
trusted library allocation
page read and write
1D5FBDE5000
trusted library allocation
page read and write
1D5F7F00000
trusted library allocation
page read and write
1D5F3529000
trusted library allocation
page read and write
15B3F700000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F4327000
trusted library allocation
page read and write
1D5F47E6000
trusted library allocation
page read and write
1D5FF953000
trusted library allocation
page read and write
1D5F478D000
trusted library allocation
page read and write
1D5F47AD000
trusted library allocation
page read and write
15B3F8E3000
heap
page read and write
1D5F47C3000
trusted library allocation
page read and write
1D5F459E000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5EADE6000
heap
page read and write
1D5F0D6A000
trusted library allocation
page read and write
1D5F67C2000
trusted library allocation
page read and write
1D5F5C6B000
trusted library allocation
page read and write
1D5F4377000
trusted library allocation
page read and write
1D5F3857000
heap
page read and write
21F2BAC8000
trusted library allocation
page read and write
1D5F664C000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5F608C000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5FC2EB000
trusted library allocation
page read and write
1D5FF870000
trusted library allocation
page read and write
1D5FBDFB000
trusted library allocation
page read and write
1D5F531E000
trusted library allocation
page read and write
1D5EAD8D000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F4C3F000
trusted library allocation
page read and write
F3B8DFE000
stack
page read and write
1D5F4C70000
trusted library allocation
page read and write
15B3F977000
heap
page read and write
1D5FD8C9000
trusted library allocation
page read and write
1D5EAE13000
heap
page read and write
15B3F96B000
heap
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D6001CA000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5F5EAF000
trusted library allocation
page read and write
1D5FE3E0000
trusted library allocation
page read and write
1D5F72EF000
trusted library allocation
page read and write
15B3F860000
heap
page read and write
1D600592000
trusted library allocation
page read and write
1D5F45C3000
trusted library allocation
page read and write
1D5F76F4000
trusted library allocation
page read and write
1D5F3545000
trusted library allocation
page read and write
1D5F5CB5000
trusted library allocation
page read and write
1D5FF5B0000
trusted library allocation
page read and write
1D5F0D37000
trusted library allocation
page read and write
1D5F4A56000
trusted library allocation
page read and write
1D5FC2DD000
trusted library allocation
page read and write
1D5F43AE000
trusted library allocation
page read and write
1D5EFEFE000
trusted library allocation
page read and write
21F2BA81000
trusted library allocation
page read and write
1D5FC1B1000
trusted library allocation
page read and write
1D5FF4F0000
trusted library allocation
page read and write
1D5F7894000
trusted library allocation
page read and write
1D5FBCDF000
trusted library allocation
page read and write
1D5F5537000
trusted library allocation
page read and write
1D5EAD8E000
heap
page read and write
1D5F62B7000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5EADD9000
heap
page read and write
1D5EF7C3000
trusted library allocation
page read and write
1450000
heap
page read and write
1D5F67E4000
trusted library allocation
page read and write
1D5FF5FE000
trusted library allocation
page read and write
1D5FC0D0000
trusted library allocation
page read and write
1D5F4C3C000
trusted library allocation
page read and write
1D5F3CE4000
trusted library allocation
page read and write
1D5F382A000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EADDE000
heap
page read and write
1D5F3569000
trusted library allocation
page read and write
1D5F63F6000
trusted library allocation
page read and write
1D5F7389000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5FBD96000
trusted library allocation
page read and write
1D5F45B1000
trusted library allocation
page read and write
1D5FBD40000
trusted library allocation
page read and write
1D60023B000
trusted library allocation
page read and write
1D5F4AAE000
trusted library allocation
page read and write
15B3F8F0000
heap
page read and write
1565000
heap
page read and write
1D5F6077000
trusted library allocation
page read and write
1D5FC2DD000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5EF7BF000
trusted library allocation
page read and write
1D5F6158000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5EADB0000
heap
page read and write
1D5F4980000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
15B3ECB6000
heap
page read and write
1D5FBF59000
trusted library allocation
page read and write
1D5F45DC000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
9435FFE000
stack
page read and write
1D6001C3000
trusted library allocation
page read and write
1C947C10000
heap
page read and write
1D5F5CB1000
trusted library allocation
page read and write
1D5F408E000
trusted library allocation
page read and write
1D5F5752000
trusted library allocation
page read and write
1D5FC2E9000
trusted library allocation
page read and write
21F2B900000
trusted library allocation
page read and write
1D5F4374000
trusted library allocation
page read and write
1D5F4A25000
trusted library allocation
page read and write
1D5F4AC0000
trusted library allocation
page read and write
1D5EADA7000
heap
page read and write
1D5F6391000
trusted library allocation
page read and write
1D5F6297000
trusted library allocation
page read and write
1D5F4099000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FC1E8000
trusted library allocation
page read and write
1D5F51F0000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
15B3F85F000
heap
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5F636B000
trusted library allocation
page read and write
1D5F73B9000
trusted library allocation
page read and write
1D5F4AA2000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F574A000
trusted library allocation
page read and write
1D5FBC93000
trusted library allocation
page read and write
1D5FBD72000
trusted library allocation
page read and write
1C949825000
heap
page read and write
1D5F382A000
heap
page read and write
1D5F4789000
trusted library allocation
page read and write
1D5FF963000
trusted library allocation
page read and write
1D5F6848000
trusted library allocation
page read and write
1D5FD8C9000
trusted library allocation
page read and write
1D5F3CDB000
trusted library allocation
page read and write
1D5FF99F000
trusted library allocation
page read and write
1D5F4C6F000
trusted library allocation
page read and write
1D5F3B73000
trusted library allocation
page read and write
1D5F5C64000
trusted library allocation
page read and write
1530000
heap
page read and write
1D5F10BC000
trusted library allocation
page read and write
1D5F5E43000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5F477D000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5FF4CF000
trusted library allocation
page read and write
1D5F75DA000
trusted library allocation
page read and write
1D5F73FA000
trusted library allocation
page read and write
1D5F57F3000
trusted library allocation
page read and write
1D5F73DA000
trusted library allocation
page read and write
1D5FBFD5000
trusted library allocation
page read and write
1D5F7849000
trusted library allocation
page read and write
1D5F3828000
heap
page read and write
1D5F431E000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
15B3F869000
heap
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5FBD74000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
F3B97BE000
unkown
page readonly
1D5F3CC5000
trusted library allocation
page read and write
1D5F76C2000
trusted library allocation
page read and write
1D5F4716000
trusted library allocation
page read and write
1D5FC082000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F76C0000
trusted library allocation
page read and write
15B3E980000
heap
page read and write
1D5F3B7B000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5F47F9000
trusted library allocation
page read and write
1D5EFD23000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADBB000
heap
page read and write
1D5F5AB9000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F5FB0000
trusted library allocation
page read and write
1D5F5576000
trusted library allocation
page read and write
1D5F4A40000
trusted library allocation
page read and write
1D5F73DA000
trusted library allocation
page read and write
1D5FBD76000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F66B0000
trusted library allocation
page read and write
1D5F5FAD000
trusted library allocation
page read and write
1D5F5338000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F0D8F000
trusted library allocation
page read and write
1D5F3B82000
trusted library allocation
page read and write
1D5EFDFB000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F3C8C000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5FE397000
trusted library allocation
page read and write
1D5F7653000
trusted library allocation
page read and write
1D5F16FE000
trusted library allocation
page read and write
1D5FBCDF000
trusted library allocation
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5F4C49000
trusted library allocation
page read and write
1D5EADC1000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5EAD7D000
heap
page read and write
B5C000
unkown
page write copy
1D5EADA0000
heap
page read and write
1D5FF4B1000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F67AE000
trusted library allocation
page read and write
1D5FC1FB000
trusted library allocation
page read and write
1D5F3856000
heap
page read and write
1D5FC0EF000
trusted library allocation
page read and write
1D5EADA7000
heap
page read and write
1D5FBED6000
trusted library allocation
page read and write
15B3F8E8000
heap
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5F5352000
trusted library allocation
page read and write
15B3F944000
heap
page read and write
1D5FE666000
trusted library allocation
page read and write
1D5FBD5F000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5FC261000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F3B8B000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FF92A000
trusted library allocation
page read and write
1D5F789D000
trusted library allocation
page read and write
1D5F0D5E000
trusted library allocation
page read and write
1D5FBCC3000
trusted library allocation
page read and write
1D5FF5D1000
trusted library allocation
page read and write
1D5F75F4000
trusted library allocation
page read and write
2885E3F6000
trusted library allocation
page read and write
1D5EADDD000
heap
page read and write
1D5F5D00000
trusted library allocation
page read and write
1D5F789B000
trusted library allocation
page read and write
1D5F56DF000
trusted library allocation
page read and write
1D5F3828000
heap
page read and write
1D5F56DD000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D6001C3000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5FF9C4000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EAD9F000
heap
page read and write
15B3EB0C000
trusted library allocation
page read and write
1D5F4CCF000
trusted library allocation
page read and write
1D5EADF0000
heap
page read and write
1D5F1075000
trusted library allocation
page read and write
1D5FE38C000
trusted library allocation
page read and write
1D5F40A5000
trusted library allocation
page read and write
1D5F5FBA000
trusted library allocation
page read and write
1D5F7399000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5F66EF000
trusted library allocation
page read and write
15B3EB03000
trusted library allocation
page read and write
15B3F869000
heap
page read and write
1D5F10DD000
trusted library allocation
page read and write
1D5FD9F3000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F669E000
trusted library allocation
page read and write
3B170BD000
stack
page read and write
1D5F452F000
trusted library allocation
page read and write
2885E366000
trusted library allocation
page read and write
1D5EFEFE000
trusted library allocation
page read and write
1D5F3856000
heap
page read and write
1D5EADD6000
heap
page read and write
15B3F1C0000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5EADA8000
heap
page read and write
1D5FF96D000
trusted library allocation
page read and write
1D5F1075000
trusted library allocation
page read and write
1D5FF5A8000
trusted library allocation
page read and write
1D5F5336000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5EAD8F000
heap
page read and write
21F2BA03000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5FD8C6000
trusted library allocation
page read and write
1D5FBE4E000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F0D37000
trusted library allocation
page read and write
15B3EB6F000
trusted library allocation
page read and write
1D5FBFD5000
trusted library allocation
page read and write
1D5F3B7B000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5FD8A7000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5FF8FD000
trusted library allocation
page read and write
1D5F106E000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F3B7D000
trusted library allocation
page read and write
1D5F54D3000
trusted library allocation
page read and write
1D5F3CCD000
trusted library allocation
page read and write
1D5FBE16000
trusted library allocation
page read and write
1D5F53C1000
trusted library allocation
page read and write
1D5F1122000
trusted library allocation
page read and write
1D5FBE36000
trusted library allocation
page read and write
1D5FF5D1000
trusted library allocation
page read and write
1D6001AB000
trusted library allocation
page read and write
21F2B7F0000
unclassified section
page read and write
1D5FF992000
trusted library allocation
page read and write
15B3EC81000
unkown
page execute read
1D5F73DF000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F7394000
trusted library allocation
page read and write
15B3F86C000
heap
page read and write
1D6001E2000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F4511000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F4C8E000
trusted library allocation
page read and write
222C6A20000
heap
page read and write
1D5F6330000
trusted library allocation
page read and write
1D5F56B1000
trusted library allocation
page read and write
1D5F5F4B000
trusted library allocation
page read and write
15B3F977000
heap
page read and write
1D5EADF5000
heap
page read and write
1D600171000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADAC000
heap
page read and write
1D5EADD9000
heap
page read and write
1D5EF781000
trusted library allocation
page read and write
1D5F49A5000
trusted library allocation
page read and write
1D5FC0DA000
trusted library allocation
page read and write
1D5F477A000
trusted library allocation
page read and write
1D5F73CA000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F54E0000
trusted library allocation
page read and write
1D600BF8000
heap
page read and write
15B3F944000
heap
page read and write
1D5FF5C0000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F433B000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F56EB000
trusted library allocation
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FF8BB000
trusted library allocation
page read and write
1D5F6356000
trusted library allocation
page read and write
1D5FF4C9000
trusted library allocation
page read and write
1D5F5A4A000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
1D5FF8D6000
trusted library allocation
page read and write
1D5F47A1000
trusted library allocation
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5EADAF000
heap
page read and write
A90000
unkown
page readonly
1D6001E2000
trusted library allocation
page read and write
1D5F40F2000
trusted library allocation
page read and write
1D5FBEF1000
trusted library allocation
page read and write
1D5F57DE000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F4C3C000
trusted library allocation
page read and write
1D5EAD89000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5FBE38000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
1D5EFEAC000
trusted library allocation
page read and write
15B3F8FD000
heap
page read and write
1D5F76BD000
trusted library allocation
page read and write
1D5F0D3A000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F5224000
trusted library allocation
page read and write
1D5FBCDB000
trusted library allocation
page read and write
1D5F103C000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
B64000
unkown
page readonly
1D5F472A000
trusted library allocation
page read and write
1D5FF968000
trusted library allocation
page read and write
1D5F6771000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5F73B0000
trusted library allocation
page read and write
1D5FF99F000
trusted library allocation
page read and write
1D5F4C46000
trusted library allocation
page read and write
1D6001AC000
trusted library allocation
page read and write
1D5F7391000
trusted library allocation
page read and write
1D5F63F8000
trusted library allocation
page read and write
1D5F552D000
trusted library allocation
page read and write
1D5F3840000
heap
page read and write
1D5F606F000
trusted library allocation
page read and write
1D5F55C1000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F55D6000
trusted library allocation
page read and write
1D5F475C000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5FFC98000
trusted library allocation
page read and write
15B3F89C000
heap
page read and write
1D5F763A000
trusted library allocation
page read and write
1D5F47F3000
trusted library allocation
page read and write
1D5F4748000
trusted library allocation
page read and write
1D5F40FB000
trusted library allocation
page read and write
1D5EADE2000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5FC0D6000
trusted library allocation
page read and write
1D5F54BA000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1570000
heap
page read and write
15B3F900000
heap
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5EAD64000
heap
page read and write
1D5F3C9A000
trusted library allocation
page read and write
1D5F4ACA000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F4C86000
trusted library allocation
page read and write
15B3F8AA000
heap
page read and write
1D5F56C1000
trusted library allocation
page read and write
1D5F51BE000
trusted library allocation
page read and write
1D5F4313000
trusted library allocation
page read and write
1D5F54CE000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADFE000
heap
page read and write
1D5FE65C000
trusted library allocation
page read and write
1D5F10A5000
trusted library allocation
page read and write
1D5F5FBA000
trusted library allocation
page read and write
1D5FF5AD000
trusted library allocation
page read and write
1D5FC0BF000
trusted library allocation
page read and write
1D5F47E5000
trusted library allocation
page read and write
1D5F76C2000
trusted library allocation
page read and write
15B3EB15000
trusted library allocation
page read and write
1D5F40E2000
trusted library allocation
page read and write
1D5F57DE000
trusted library allocation
page read and write
1D5F4CE2000
trusted library allocation
page read and write
1D5F1075000
trusted library allocation
page read and write
1D5FC2A4000
trusted library allocation
page read and write
1D5F4CDB000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5FBDAF000
trusted library allocation
page read and write
15B3F92A000
heap
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5F4A10000
trusted library allocation
page read and write
1D5F5CB8000
trusted library allocation
page read and write
1D5F5386000
trusted library allocation
page read and write
1D5FF9A9000
trusted library allocation
page read and write
1D5F76EC000
trusted library allocation
page read and write
1D5F5C7C000
trusted library allocation
page read and write
1D5FBDCA000
trusted library allocation
page read and write
1D5F5CF2000
trusted library allocation
page read and write
1D5FD8DE000
trusted library allocation
page read and write
1D5F7395000
trusted library allocation
page read and write
1D5FF810000
trusted library allocation
page read and write
1D5F67B3000
trusted library allocation
page read and write
F3BC03E000
stack
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5FBD2A000
trusted library allocation
page read and write
1D5F0FC7000
trusted library allocation
page read and write
1D5F0D53000
trusted library allocation
page read and write
1D5F5773000
trusted library allocation
page read and write
1D5EAD76000
heap
page read and write
1D5EADAF000
heap
page read and write
15B3F944000
heap
page read and write
1D5F535C000
trusted library allocation
page read and write
1D5F5FFA000
trusted library allocation
page read and write
1D5FBDA0000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5EADA9000
heap
page read and write
1D5F477D000
trusted library allocation
page read and write
1D5FBCF7000
trusted library allocation
page read and write
1D5FE65C000
trusted library allocation
page read and write
1D5F67CC000
trusted library allocation
page read and write
1D5FBE34000
trusted library allocation
page read and write
1D5F678B000
trusted library allocation
page read and write
1D5F5A7A000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EAD7D000
heap
page read and write
1D5F3B9E000
trusted library allocation
page read and write
11FE000
stack
page read and write
1D5F67CC000
trusted library allocation
page read and write
1D60058C000
trusted library allocation
page read and write
1D5F62AC000
trusted library allocation
page read and write
1D5F67D6000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5F5F1C000
trusted library allocation
page read and write
1D5F3CCD000
trusted library allocation
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5FE6CA000
trusted library allocation
page read and write
1D5F76B9000
trusted library allocation
page read and write
1D5FF5D1000
trusted library allocation
page read and write
1D5FC0C1000
trusted library allocation
page read and write
1D5F476B000
trusted library allocation
page read and write
1D5FDC00000
trusted library allocation
page read and write
1D5EAD99000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F5DF3000
trusted library allocation
page read and write
1D5F73DF000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EAD8B000
heap
page read and write
1D5F5624000
trusted library allocation
page read and write
1D5F10DB000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D6001D3000
trusted library allocation
page read and write
21F2BA79000
trusted library allocation
page read and write
1D5F6851000
trusted library allocation
page read and write
1D5EAE0A000
heap
page read and write
1D5F76D6000
trusted library allocation
page read and write
1D5FF84D000
trusted library allocation
page read and write
1D5FBEF0000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
15B3F977000
heap
page read and write
21F2B620000
remote allocation
page read and write
1D600BD9000
heap
page read and write
1D5F6071000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5EADE6000
heap
page read and write
1D5F3532000
trusted library allocation
page read and write
1D5F43BE000
trusted library allocation
page read and write
1D5F47E5000
trusted library allocation
page read and write
1D5EADF4000
heap
page read and write
1D5EADD9000
heap
page read and write
1D5F5796000
trusted library allocation
page read and write
1D5F1042000
trusted library allocation
page read and write
B60000
unkown
page write copy
1D5FC07E000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5EAD65000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5F3857000
heap
page read and write
1D5EAE0D000
heap
page read and write
1D5F570C000
trusted library allocation
page read and write
1D5F6351000
trusted library allocation
page read and write
1D5F550A000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
15B3F87D000
heap
page read and write
1D5F4CDB000
trusted library allocation
page read and write
1D5F56D6000
trusted library allocation
page read and write
1D5FFC7A000
trusted library allocation
page read and write
1D5EAD83000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5FD8E9000
trusted library allocation
page read and write
1D5F45DC000
trusted library allocation
page read and write
1D5F47A6000
trusted library allocation
page read and write
1C947D2A000
heap
page read and write
1D6001BA000
trusted library allocation
page read and write
1D5F39D8000
trusted library allocation
page read and write
2885E330000
trusted library allocation
page read and write
1D5FF45B000
trusted library allocation
page read and write
1D6005A9000
trusted library allocation
page read and write
1D5F43B2000
trusted library allocation
page read and write
1D5F75B3000
trusted library allocation
page read and write
1D5F43A3000
trusted library allocation
page read and write
1D5EAE13000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F4992000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F4CBD000
trusted library allocation
page read and write
1D5F3CB5000
trusted library allocation
page read and write
1D600283000
trusted library allocation
page read and write
1D5F4C9E000
trusted library allocation
page read and write
1D5F571E000
trusted library allocation
page read and write
1D5FF839000
trusted library allocation
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5FE3DD000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
15B3EC87000
unkown
page execute read
1D5FE704000
trusted library allocation
page read and write
1D5F10F6000
trusted library allocation
page read and write
1D5F533A000
trusted library allocation
page read and write
243263724000
trusted library allocation
page read and write
1D5EFD71000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
1D5F6882000
trusted library allocation
page read and write
1D5F1062000
trusted library allocation
page read and write
1D5EFD71000
trusted library allocation
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F47F9000
trusted library allocation
page read and write
1D5FE618000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5EAE0A000
heap
page read and write
1D5FE724000
trusted library allocation
page read and write
1D5FC0EF000
trusted library allocation
page read and write
1D5FF9D2000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F49ED000
trusted library allocation
page read and write
1D5F4541000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
21F2B7D4000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5F10AA000
trusted library allocation
page read and write
2E8D1FF000
stack
page read and write
1D5F7373000
trusted library allocation
page read and write
1D5EAD91000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5EAD65000
heap
page read and write
1D5FC0BF000
trusted library allocation
page read and write
2885E35D000
trusted library allocation
page read and write
1D5F53E6000
trusted library allocation
page read and write
1D5F51D3000
trusted library allocation
page read and write
1D5FF5C9000
trusted library allocation
page read and write
1D5F5AFA000
trusted library allocation
page read and write
1D5F3B7B000
trusted library allocation
page read and write
1D5FBFD5000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EAD7D000
heap
page read and write
15B3F801000
heap
page read and write
222C6C00000
trusted library allocation
page read and write
15B3EB5F000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5FBCB1000
trusted library allocation
page read and write
1D5FF88E000
trusted library allocation
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5F3847000
heap
page read and write
1D5F479F000
trusted library allocation
page read and write
1D5FBE39000
trusted library allocation
page read and write
1D5F3CCD000
trusted library allocation
page read and write
1D5EADAE000
heap
page read and write
1D5EADE1000
heap
page read and write
1D5EAD95000
heap
page read and write
15B3F8F0000
heap
page read and write
1D5EAD7E000
heap
page read and write
1D5FBEE6000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD92000
heap
page read and write
1C947D42000
heap
page read and write
1D5EADE1000
heap
page read and write
1D5F5724000
trusted library allocation
page read and write
1D5F396F000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FF898000
trusted library allocation
page read and write
1C947D70000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5F4A58000
trusted library allocation
page read and write
1D5FC068000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
21F2BB0C000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F4AEA000
trusted library allocation
page read and write
1D5F3C8C000
trusted library allocation
page read and write
1D5F430E000
trusted library allocation
page read and write
1D5FBD09000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F102C000
trusted library allocation
page read and write
1D5F53FB000
trusted library allocation
page read and write
1C947F0A000
trusted library allocation
page read and write
1D5F51BC000
trusted library allocation
page read and write
1D5F1620000
trusted library allocation
page read and write
1D5FF5DB000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5FF9BB000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5FBFAD000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5FF5E8000
trusted library allocation
page read and write
1D5FC21D000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5EADAA000
heap
page read and write
1D5F6367000
trusted library allocation
page read and write
1D5FD9E9000
trusted library allocation
page read and write
1D5FE5C1000
trusted library allocation
page read and write
1D5F5F87000
trusted library allocation
page read and write
1D5F73CA000
trusted library allocation
page read and write
1D5F4CC2000
trusted library allocation
page read and write
1D5EAD8B000
heap
page read and write
1D5EAD95000
heap
page read and write
3D00000
heap
page read and write
1D5F490B000
trusted library allocation
page read and write
1D5F53FB000
trusted library allocation
page read and write
222C6AB0000
heap
page read and write
1D5F76F4000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADEA000
heap
page read and write
1D5FBD98000
trusted library allocation
page read and write
1D5FDAA8000
trusted library allocation
page read and write
222C6D00000
trusted library allocation
page read and write
1D5FF4CF000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F431B000
trusted library allocation
page read and write
2885DE40000
unclassified section
page readonly
1D5EADAB000
heap
page read and write
1D5F66D1000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5FBD9C000
trusted library allocation
page read and write
1D5FBCC7000
trusted library allocation
page read and write
1D5F4C22000
trusted library allocation
page read and write
1D5F56F2000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F167A000
trusted library allocation
page read and write
1D5F3C92000
trusted library allocation
page read and write
1D5F73B6000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
21F2BAB4000
trusted library allocation
page read and write
1D5FF9C4000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5F533A000
trusted library allocation
page read and write
1D5F4CC2000
trusted library allocation
page read and write
1D5F4796000
trusted library allocation
page read and write
1D5FF5FB000
trusted library allocation
page read and write
1D5F56B1000
trusted library allocation
page read and write
1D5F5F4E000
trusted library allocation
page read and write
1D5F45A2000
trusted library allocation
page read and write
1D5F668C000
trusted library allocation
page read and write
1D5F5AFA000
trusted library allocation
page read and write
1D5EFEF0000
trusted library allocation
page read and write
1D5F47AD000
trusted library allocation
page read and write
1D5F5C86000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F5CF0000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5FBF32000
trusted library allocation
page read and write
1D5F3B7D000
trusted library allocation
page read and write
1D5F40D4000
trusted library allocation
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5F3B75000
trusted library allocation
page read and write
1D5F684C000
trusted library allocation
page read and write
1D5F54C3000
trusted library allocation
page read and write
1D5FBEB2000
trusted library allocation
page read and write
1D5FF4D5000
trusted library allocation
page read and write
1D5F0DA9000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5F3C6C000
trusted library allocation
page read and write
1D5F574D000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5F1662000
trusted library allocation
page read and write
1D5FC096000
trusted library allocation
page read and write
1D600BB1000
heap
page read and write
1D5F56C5000
trusted library allocation
page read and write
1350000
heap
page read and write
1D5F0D53000
trusted library allocation
page read and write
1566000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5F3CF7000
trusted library allocation
page read and write
1D5F55A1000
trusted library allocation
page read and write
1D5F3C90000
trusted library allocation
page read and write
1D5F3856000
heap
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D6001BA000
trusted library allocation
page read and write
1D5F5A54000
trusted library allocation
page read and write
1D5F5DF7000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EAD7E000
heap
page read and write
1D5EAD64000
heap
page read and write
1D5FF8E6000
trusted library allocation
page read and write
1D5EFD2F000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EFDFE000
trusted library allocation
page read and write
1D600169000
trusted library allocation
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5F56F1000
trusted library allocation
page read and write
1D5F5CFC000
trusted library allocation
page read and write
1D5EADDD000
heap
page read and write
1D5F5CB5000
trusted library allocation
page read and write
1D5F5753000
trusted library allocation
page read and write
1D5EFD76000
trusted library allocation
page read and write
1D5F73EC000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F537C000
trusted library allocation
page read and write
1D5EAD91000
heap
page read and write
1D5F51EC000
trusted library allocation
page read and write
1D5F573D000
trusted library allocation
page read and write
1D5F382A000
heap
page read and write
1D5FF5C9000
trusted library allocation
page read and write
1D5F479F000
trusted library allocation
page read and write
1D5FF4A4000
trusted library allocation
page read and write
15B3EC8A000
unkown
page execute read
1D5EAD92000
heap
page read and write
1D5EAD92000
heap
page read and write
1364000
heap
page read and write
1D5F5612000
trusted library allocation
page read and write
1D5FD855000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F60E0000
trusted library allocation
page read and write
1D5F68F8000
trusted library allocation
page read and write
1D5F43A6000
trusted library allocation
page read and write
1D5F5537000
trusted library allocation
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5F51B9000
trusted library allocation
page read and write
1D5FBD65000
trusted library allocation
page read and write
1C949822000
heap
page read and write
1D5EAE13000
heap
page read and write
1D5FD8E9000
trusted library allocation
page read and write
1D5F5C91000
trusted library allocation
page read and write
1D5F431B000
trusted library allocation
page read and write
1D5F5723000
trusted library allocation
page read and write
1D5F5CD0000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
3DDF5B51000
trusted library allocation
page execute read
1D5EAD92000
heap
page read and write
1D5F10F6000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5EAD8D000
heap
page read and write
1D5EADE5000
heap
page read and write
1D5F5A2D000
trusted library allocation
page read and write
1D5FBCD1000
trusted library allocation
page read and write
1D5EADE4000
heap
page read and write
1D5F4C42000
trusted library allocation
page read and write
1D5FF5B6000
trusted library allocation
page read and write
F3BA7BE000
unkown
page readonly
2885DF10000
heap
page read and write
1D60012C000
trusted library allocation
page read and write
1360000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5F67EE000
trusted library allocation
page read and write
1D5F67CC000
trusted library allocation
page read and write
1D5FC294000
trusted library allocation
page read and write
1D5FC2E9000
trusted library allocation
page read and write
1D5F535C000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F51C8000
trusted library allocation
page read and write
1D5F4C70000
trusted library allocation
page read and write
1D5F5332000
trusted library allocation
page read and write
15B3F1F0000
heap
page read and write
1D5FBF9B000
trusted library allocation
page read and write
1D5F76B7000
trusted library allocation
page read and write
15B3EB62000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
2E8C9FC000
stack
page read and write
1D5EAD9B000
heap
page read and write
1D5F4992000
trusted library allocation
page read and write
1D5FD887000
trusted library allocation
page read and write
1D5F3985000
trusted library allocation
page read and write
1D5FBEBD000
trusted library allocation
page read and write
2885E38F000
trusted library allocation
page read and write
1D5FF57A000
trusted library allocation
page read and write
1D5F4C17000
trusted library allocation
page read and write
1D5EF790000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
15B3EB86000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5FBFE3000
trusted library allocation
page read and write
1D5F67E2000
trusted library allocation
page read and write
1D5FC29F000
trusted library allocation
page read and write
1D5F56E7000
trusted library allocation
page read and write
21F2BA23000
trusted library allocation
page read and write
1D5F4310000
trusted library allocation
page read and write
1D5F3B75000
trusted library allocation
page read and write
1D5F531E000
trusted library allocation
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5F51DA000
trusted library allocation
page read and write
1D5F5C87000
trusted library allocation
page read and write
1D5F107E000
trusted library allocation
page read and write
1D5EAD91000
heap
page read and write
21F2BF40000
heap
page read and write
1D5F0DAD000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5EAD7D000
heap
page read and write
1D5FBEC8000
trusted library allocation
page read and write
1D5F10A8000
trusted library allocation
page read and write
1D5EADE6000
heap
page read and write
F697CFE000
stack
page read and write
1D5EAE13000
heap
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5FFC98000
trusted library allocation
page read and write
1D5FC12E000
trusted library allocation
page read and write
1D5FF45D000
trusted library allocation
page read and write
1D5EAD80000
heap
page read and write
F697CBE000
unkown
page readonly
1D5F383F000
heap
page read and write
1D5FF846000
trusted library allocation
page read and write
1551000
heap
page read and write
1D5FC1F9000
trusted library allocation
page read and write
155B000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F40E0000
trusted library allocation
page read and write
1D5FE6B1000
trusted library allocation
page read and write
1D5F5341000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5F51E7000
trusted library allocation
page read and write
1D5FBD53000
trusted library allocation
page read and write
1D5FE3AD000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5FC1ED000
trusted library allocation
page read and write
1D5FC0E7000
trusted library allocation
page read and write
1D5FC0B8000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5FE6000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5FF884000
trusted library allocation
page read and write
1D5F100E000
trusted library allocation
page read and write
1D5F63E0000
trusted library allocation
page read and write
1D5F63F8000
trusted library allocation
page read and write
1D5EFE17000
trusted library allocation
page read and write
1D5FBD8C000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5F631E000
trusted library allocation
page read and write
1D5FF8FD000
trusted library allocation
page read and write
1D5EADE9000
heap
page read and write
3B1703B000
stack
page read and write
15B3F8FD000
heap
page read and write
1D5EAD7E000
heap
page read and write
15B3E910000
heap
page read and write
1D5F43B3000
trusted library allocation
page read and write
1D5F5CF0000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5C97000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FD8DE000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1D5F5FB2000
trusted library allocation
page read and write
1D5F56DF000
trusted library allocation
page read and write
1D5F4C06000
trusted library allocation
page read and write
1D5EADEF000
heap
page read and write
1D5F45A4000
trusted library allocation
page read and write
1D5F399B000
trusted library allocation
page read and write
1D5F5546000
trusted library allocation
page read and write
1D5EADDE000
heap
page read and write
1D5FC0AB000
trusted library allocation
page read and write
1D5F16CC000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F161E000
trusted library allocation
page read and write
1D5F3CDE000
trusted library allocation
page read and write
2885DF6E000
heap
page read and write
1D5EADAF000
heap
page read and write
1D5F73EC000
trusted library allocation
page read and write
1D5FC1E3000
trusted library allocation
page read and write
1D5F737A000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5F3B7F000
trusted library allocation
page read and write
1D5F477D000
trusted library allocation
page read and write
1D5F76D6000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F43BA000
trusted library allocation
page read and write
15B3E820000
heap
page read and write
1D5F1623000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F62A3000
trusted library allocation
page read and write
1D5F635F000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
21F2B820000
heap
page read and write
1D5EAD92000
heap
page read and write
1D600127000
trusted library allocation
page read and write
1D5F67BD000
trusted library allocation
page read and write
1D5FE3EC000
trusted library allocation
page read and write
1D5F56F1000
trusted library allocation
page read and write
1D5FBFDE000
trusted library allocation
page read and write
15B3F8E9000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5EADD9000
heap
page read and write
1D5F0D37000
trusted library allocation
page read and write
1D5F4324000
trusted library allocation
page read and write
1D5FF9D2000
trusted library allocation
page read and write
1D5F6351000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F6361000
trusted library allocation
page read and write
1D5FBEB2000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F0DA9000
trusted library allocation
page read and write
1D5EADB3000
heap
page read and write
1D5FE3EE000
trusted library allocation
page read and write
1D5FE3DA000
trusted library allocation
page read and write
1D5FBF59000
trusted library allocation
page read and write
1D5FF5FE000
trusted library allocation
page read and write
1D5F10A1000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5EFE26000
trusted library allocation
page read and write
1D5FF9BB000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5EAD7F000
heap
page read and write
1D5EADB4000
heap
page read and write
1D6001E6000
trusted library allocation
page read and write
1D5F6757000
trusted library allocation
page read and write
1D5F10E6000
trusted library allocation
page read and write
1D5F56F9000
trusted library allocation
page read and write
1D5EFE1B000
trusted library allocation
page read and write
1D5F5FA3000
trusted library allocation
page read and write
1D5F0FC3000
trusted library allocation
page read and write
1D5F4C9E000
trusted library allocation
page read and write
1D5FBF39000
trusted library allocation
page read and write
1D60014C000
trusted library allocation
page read and write
1D5FC2FD000
trusted library allocation
page read and write
1D5F1011000
trusted library allocation
page read and write
1D5F47AA000
trusted library allocation
page read and write
1D5FC0BB000
trusted library allocation
page read and write
1D5F43BE000
trusted library allocation
page read and write
21F2B7F2000
unclassified section
page read and write
1D5F3CEA000
trusted library allocation
page read and write
1D5F5C97000
trusted library allocation
page read and write
1D5F5796000
trusted library allocation
page read and write
1D5F63D4000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5F3B1F000
trusted library allocation
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1570000
heap
page read and write
1D5F6369000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F5336000
trusted library allocation
page read and write
1D5FC2A0000
trusted library allocation
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5F76DD000
trusted library allocation
page read and write
1D5F56C5000
trusted library allocation
page read and write
B52000
unkown
page readonly
1D5F56A1000
trusted library allocation
page read and write
1D5F5C72000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
15B3F96B000
heap
page read and write
1D5F5F11000
trusted library allocation
page read and write
1D5F51A0000
trusted library allocation
page read and write
1D5F67C0000
trusted library allocation
page read and write
1D5F5499000
trusted library allocation
page read and write
1D5F53C5000
trusted library allocation
page read and write
1D5F3B8E000
trusted library allocation
page read and write
1D5FD9F1000
trusted library allocation
page read and write
1D5F47F9000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FF8D6000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D5EADDD000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5EADE0000
heap
page read and write
1D5F4CB0000
trusted library allocation
page read and write
1D5F4CBD000
trusted library allocation
page read and write
15B3EB23000
trusted library allocation
page read and write
1D5F635D000
trusted library allocation
page read and write
9434FFE000
stack
page read and write
1D5EAD92000
heap
page read and write
1D600183000
trusted library allocation
page read and write
222C6E60000
heap
page read and write
1D5F45F8000
trusted library allocation
page read and write
15B3F86C000
heap
page read and write
1D5F4C7D000
trusted library allocation
page read and write
1D5FE5FC000
trusted library allocation
page read and write
1D5F66F7000
trusted library allocation
page read and write
1D5FBCDB000
trusted library allocation
page read and write
1D5F6151000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F5F16000
trusted library allocation
page read and write
3B191FE000
unkown
page readonly
1D5F76B7000
trusted library allocation
page read and write
1D5FF4E9000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EADD9000
heap
page read and write
2885E700000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F5A75000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F7691000
trusted library allocation
page read and write
1D5EAD7E000
heap
page read and write
1561000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5FBFDC000
trusted library allocation
page read and write
1D5F56B9000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1578000
heap
page read and write
1364000
heap
page read and write
1D5F392F000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F57EF000
trusted library allocation
page read and write
1D5FD877000
trusted library allocation
page read and write
1D5F75DD000
trusted library allocation
page read and write
1D5F67E2000
trusted library allocation
page read and write
1D5FF99F000
trusted library allocation
page read and write
1D5F76E2000
trusted library allocation
page read and write
1D5F3543000
trusted library allocation
page read and write
1D5F47A6000
trusted library allocation
page read and write
1D5FBCD1000
trusted library allocation
page read and write
1D5FC1BC000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
15B3F8F2000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5FC2C2000
trusted library allocation
page read and write
1D5F574B000
trusted library allocation
page read and write
1D5FBED6000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F5CB5000
trusted library allocation
page read and write
1D5F663B000
trusted library allocation
page read and write
15B3F958000
heap
page read and write
1D5F3CFE000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F63D7000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5FD8A4000
trusted library allocation
page read and write
1D5F5E63000
trusted library allocation
page read and write
1D5F399B000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FBEF1000
trusted library allocation
page read and write
1D5F73CF000
trusted library allocation
page read and write
1D5FE6B4000
trusted library allocation
page read and write
1D5FC2BF000
trusted library allocation
page read and write
1D600261000
trusted library allocation
page read and write
1D5FF953000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56F9000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FF8BF000
trusted library allocation
page read and write
15B3EBE9000
trusted library allocation
page read and write
1D5F4CB7000
trusted library allocation
page read and write
15B3F8F0000
heap
page read and write
1D5F56E6000
trusted library allocation
page read and write
1D5F476B000
trusted library allocation
page read and write
1D5FBD70000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADB4000
heap
page read and write
1D60054C000
trusted library allocation
page read and write
1D5FC0DB000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5FC2C2000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5F675E000
trusted library allocation
page read and write
1D5F5FB3000
trusted library allocation
page read and write
1D5F67BD000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F459E000
trusted library allocation
page read and write
21F2B82A000
heap
page read and write
1D5EAD99000
heap
page read and write
1D5FBF99000
trusted library allocation
page read and write
15B3F921000
heap
page read and write
1D5F3563000
trusted library allocation
page read and write
1D5FF8BF000
trusted library allocation
page read and write
1D5F5AE8000
trusted library allocation
page read and write
1D600548000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FF5E8000
trusted library allocation
page read and write
1D5F5CF6000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5EAD8F000
heap
page read and write
15B3F8E6000
heap
page read and write
1D5F5CD8000
trusted library allocation
page read and write
1D5F1064000
trusted library allocation
page read and write
15B3F977000
heap
page read and write
1D5F4334000
trusted library allocation
page read and write
1D5FBE2C000
trusted library allocation
page read and write
2885E0AF000
unclassified section
page read and write
15B3F96B000
heap
page read and write
1D5EADA6000
heap
page read and write
1490000
heap
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F5752000
trusted library allocation
page read and write
1D5F3CE4000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F5722000
trusted library allocation
page read and write
15B3F8E6000
heap
page read and write
1D5F459E000
trusted library allocation
page read and write
1D5EAD99000
heap
page read and write
15B3F8E9000
heap
page read and write
1D5F5C8B000
trusted library allocation
page read and write
1D5F7653000
trusted library allocation
page read and write
15B3F8F0000
heap
page read and write
1D5F10C7000
trusted library allocation
page read and write
1D5F397B000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5FD924000
trusted library allocation
page read and write
1D5F635D000
trusted library allocation
page read and write
1D5F5341000
trusted library allocation
page read and write
3D01000
heap
page read and write
1D5EAD70000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F4C88000
trusted library allocation
page read and write
1D5EADAC000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F5A2D000
trusted library allocation
page read and write
1D5FC241000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FE3ED000
trusted library allocation
page read and write
1D5F39D5000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5F76B9000
trusted library allocation
page read and write
1D5F5AFE000
trusted library allocation
page read and write
1D5FBEF1000
trusted library allocation
page read and write
1D5F162A000
trusted library allocation
page read and write
1D600183000
trusted library allocation
page read and write
1D5F61CE000
trusted library allocation
page read and write
1D5FF4FE000
trusted library allocation
page read and write
1D5F57FE000
trusted library allocation
page read and write
1D6005C4000
trusted library allocation
page read and write
1D5F5662000
trusted library allocation
page read and write
1D5F0FD8000
trusted library allocation
page read and write
1D5F577B000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F10DD000
trusted library allocation
page read and write
11EF000
stack
page read and write
1D5EAD8D000
heap
page read and write
15B3EC8D000
unkown
page execute read
1D5EAD92000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5F5C3D000
trusted library allocation
page read and write
1D5FD933000
trusted library allocation
page read and write
1D5F627F000
trusted library allocation
page read and write
1D5F574D000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F10C7000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5FC2CD000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EADF5000
heap
page read and write
15B3F958000
heap
page read and write
1D5FF5E5000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F5505000
trusted library allocation
page read and write
1D5FF810000
trusted library allocation
page read and write
1D5FD8BE000
trusted library allocation
page read and write
1D5F0DE1000
trusted library allocation
page read and write
1D5F5352000
trusted library allocation
page read and write
1D5F60C0000
trusted library allocation
page read and write
1D5F5F2C000
trusted library allocation
page read and write
1D5F5752000
trusted library allocation
page read and write
1D5F401A000
trusted library allocation
page read and write
1D5F78F5000
trusted library allocation
page read and write
1D5F545F000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5F6868000
trusted library allocation
page read and write
1D5FBED3000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FC1ED000
trusted library allocation
page read and write
1D5F5180000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5F5C3D000
trusted library allocation
page read and write
1D5FBD96000
trusted library allocation
page read and write
1D5EAD9E000
heap
page read and write
1D5FF9C4000
trusted library allocation
page read and write
1D5F734D000
trusted library allocation
page read and write
1C947D3D000
heap
page read and write
1D5EADB2000
heap
page read and write
1D5FD88E000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5FBE32000
trusted library allocation
page read and write
1D5F73F8000
trusted library allocation
page read and write
1D5F76C5000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FBE60000
trusted library allocation
page read and write
21F2B7D0000
heap
page read and write
1D5F5F0B000
trusted library allocation
page read and write
15B3F977000
heap
page read and write
1D600121000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5F5CB0000
trusted library allocation
page read and write
1D5FBCBD000
trusted library allocation
page read and write
1D5F40E0000
trusted library allocation
page read and write
3B167FE000
stack
page read and write
1D5F782B000
trusted library allocation
page read and write
1D5F68A2000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5F574D000
trusted library allocation
page read and write
1D5FBCBF000
trusted library allocation
page read and write
1D5EADE4000
heap
page read and write
1D5F3827000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F10EB000
trusted library allocation
page read and write
1D5EADDF000
heap
page read and write
1D5EADB4000
heap
page read and write
1D5EADB4000
heap
page read and write
15B3EB17000
trusted library allocation
page read and write
1D5EAD89000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD76000
heap
page read and write
1D5F4CBE000
trusted library allocation
page read and write
1D5FF8CD000
trusted library allocation
page read and write
15B3EB2F000
trusted library allocation
page read and write
1D5F63C8000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56EA000
trusted library allocation
page read and write
1D5F68D9000
trusted library allocation
page read and write
1D5F55C7000
trusted library allocation
page read and write
B64000
unkown
page readonly
1D5EFEF0000
trusted library allocation
page read and write
1D5FF080000
trusted library allocation
page read and write
1D5F72E3000
trusted library allocation
page read and write
1D5FF833000
trusted library allocation
page read and write
1D5F4CB0000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5F5F84000
trusted library allocation
page read and write
1D5F5CB0000
trusted library allocation
page read and write
1D5FD89F000
trusted library allocation
page read and write
1D5FC03F000
trusted library allocation
page read and write
1D5F61C1000
trusted library allocation
page read and write
1D5F3B72000
trusted library allocation
page read and write
3B170FE000
unkown
page readonly
1D600BB1000
heap
page read and write
15B3EB66000
trusted library allocation
page read and write
1D5F76F4000
trusted library allocation
page read and write
130D000
stack
page read and write
1D5F56E7000
trusted library allocation
page read and write
1D5F106E000
trusted library allocation
page read and write
1D5FBF21000
trusted library allocation
page read and write
2885E090000
heap
page readonly
1D5F3552000
trusted library allocation
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1C947E00000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F53A2000
trusted library allocation
page read and write
11CF000
stack
page read and write
1D5FBE19000
trusted library allocation
page read and write
1D5F5FE6000
trusted library allocation
page read and write
1D5F567D000
trusted library allocation
page read and write
2885E382000
trusted library allocation
page read and write
1D5F10C1000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5F382A000
heap
page read and write
1D5F5A4D000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
212E000
stack
page read and write
1D5F56EB000
trusted library allocation
page read and write
1C949824000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F735E000
trusted library allocation
page read and write
1D5F533D000
trusted library allocation
page read and write
15B3F8E3000
heap
page read and write
94367FE000
stack
page read and write
1D5F56CA000
trusted library allocation
page read and write
1D5F5A27000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5FF46F000
trusted library allocation
page read and write
1D5F5ED3000
trusted library allocation
page read and write
1D5F4C2F000
trusted library allocation
page read and write
1D5FC25F000
trusted library allocation
page read and write
1D5F76B3000
trusted library allocation
page read and write
1D5F62E5000
trusted library allocation
page read and write
1D5F5F5B000
trusted library allocation
page read and write
1D5F5F44000
trusted library allocation
page read and write
1D5F473D000
trusted library allocation
page read and write
1D5EFE1E000
trusted library allocation
page read and write
1C947D65000
heap
page read and write
1D5FBCCD000
trusted library allocation
page read and write
1D5F55B8000
trusted library allocation
page read and write
15B3F92A000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F53CE000
trusted library allocation
page read and write
1D600B41000
heap
page read and write
1D5FD87E000
trusted library allocation
page read and write
1D5FF81E000
trusted library allocation
page read and write
1D5F101A000
trusted library allocation
page read and write
1D6001E2000
trusted library allocation
page read and write
1D5FF8BF000
trusted library allocation
page read and write
15B3EA00000
trusted library allocation
page read and write
2885E040000
heap
page read and write
1D5EADE6000
heap
page read and write
1D5F10C7000
trusted library allocation
page read and write
1D5F67AA000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FF862000
trusted library allocation
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5F5356000
trusted library allocation
page read and write
1D5F0D20000
trusted library allocation
page read and write
1D6001EF000
trusted library allocation
page read and write
1D5F49F0000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1538000
heap
page read and write
1D5EADA0000
heap
page read and write
1D5F67D6000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F430C000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D600873000
trusted library allocation
page read and write
1D5EADAC000
heap
page read and write
1D600540000
trusted library allocation
page read and write
1D5FBCAA000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F5A54000
trusted library allocation
page read and write
15B3F86C000
heap
page read and write
1D5F3CA6000
trusted library allocation
page read and write
1D5F5CF6000
trusted library allocation
page read and write
1D5F5AED000
trusted library allocation
page read and write
1D5F76F4000
trusted library allocation
page read and write
1D5F4586000
trusted library allocation
page read and write
15B3EB48000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EADAF000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F106C000
trusted library allocation
page read and write
1D5F5320000
trusted library allocation
page read and write
1D5F76E6000
trusted library allocation
page read and write
1D5FBD16000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5FBD00000
trusted library allocation
page read and write
1D5F4C86000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D6001E2000
trusted library allocation
page read and write
1D5F4CF4000
trusted library allocation
page read and write
1D5F5FFA000
trusted library allocation
page read and write
1D5FBF39000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F4C3D000
trusted library allocation
page read and write
1D5FFC75000
trusted library allocation
page read and write
1D5EFEBC000
trusted library allocation
page read and write
1D5F6844000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5F10EB000
trusted library allocation
page read and write
1D5F3840000
heap
page read and write
15B3EBBA000
trusted library allocation
page read and write
1D5FC096000
trusted library allocation
page read and write
1D5FBEC2000
trusted library allocation
page read and write
1D5F5C8A000
trusted library allocation
page read and write
1D5EAD9F000
heap
page read and write
1D5F6242000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5FC037000
trusted library allocation
page read and write
1D5FF833000
trusted library allocation
page read and write
21F2BB00000
trusted library allocation
page read and write
1D5F3847000
heap
page read and write
1D5FBDEA000
trusted library allocation
page read and write
1D5FE661000
trusted library allocation
page read and write
1D5FD8CD000
trusted library allocation
page read and write
1D5F3B63000
trusted library allocation
page read and write
1D5F61B9000
trusted library allocation
page read and write
1D5F56EA000
trusted library allocation
page read and write
1D5F4C70000
trusted library allocation
page read and write
1570000
heap
page read and write
1D5F571B000
trusted library allocation
page read and write
1D5F5CF6000
trusted library allocation
page read and write
1D5F16D9000
trusted library allocation
page read and write
1D5FE3E5000
trusted library allocation
page read and write
1D5F5FA5000
trusted library allocation
page read and write
1D60058C000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F109D000
trusted library allocation
page read and write
15B3F8E0000
heap
page read and write
15B3ECB4000
heap
page read and write
1D5FE5BA000
trusted library allocation
page read and write
1D5F477D000
trusted library allocation
page read and write
94337FA000
stack
page read and write
1D5F76C5000
trusted library allocation
page read and write
1D5F4CD5000
trusted library allocation
page read and write
1D5FBFA6000
trusted library allocation
page read and write
1D600199000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5FD9F9000
trusted library allocation
page read and write
1D5F66F7000
trusted library allocation
page read and write
1D5F66EA000
trusted library allocation
page read and write
1D5FC261000
trusted library allocation
page read and write
1D600169000
trusted library allocation
page read and write
1D5FBDEF000
trusted library allocation
page read and write
2885DEB0000
remote allocation
page read and write
1D5FC1B7000
trusted library allocation
page read and write
1D5F3832000
heap
page read and write
1D5F5692000
trusted library allocation
page read and write
2DB877503000
trusted library allocation
page read and write
1D5EAD99000
heap
page read and write
1D5F54E9000
trusted library allocation
page read and write
1D5FBCF7000
trusted library allocation
page read and write
1D5FF924000
trusted library allocation
page read and write
1D5FF96D000
trusted library allocation
page read and write
1D5F5CFA000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5EADB9000
heap
page read and write
1563000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F67AE000
trusted library allocation
page read and write
1D5FBD5C000
trusted library allocation
page read and write
1D5EAD75000
heap
page read and write
1D5FBFE4000
trusted library allocation
page read and write
1D5F3832000
heap
page read and write
1D5F6876000
trusted library allocation
page read and write
1D5F4C36000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1D5F5334000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F56F1000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5FD8C2000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EADD6000
heap
page read and write
1C947D00000
heap
page read and write
1D5F56E9000
trusted library allocation
page read and write
F6973FE000
stack
page read and write
1D5F55B0000
trusted library allocation
page read and write
1D5EAD80000
heap
page read and write
1D5F5344000
trusted library allocation
page read and write
1D5F4CC8000
trusted library allocation
page read and write
1D5FC121000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5FC2A4000
trusted library allocation
page read and write
1D5F106C000
trusted library allocation
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D5F7355000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5F0D9C000
trusted library allocation
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5F47F9000
trusted library allocation
page read and write
1D5FBCE3000
trusted library allocation
page read and write
1D5FC283000
trusted library allocation
page read and write
1D5F5CFA000
trusted library allocation
page read and write
1D5FC0AB000
trusted library allocation
page read and write
1D5F565E000
trusted library allocation
page read and write
1D5F532F000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5F5664000
trusted library allocation
page read and write
1D5FC1ED000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F4C7B000
trusted library allocation
page read and write
1D5F572B000
trusted library allocation
page read and write
1D5FBD55000
trusted library allocation
page read and write
15B3EB12000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F5766000
trusted library allocation
page read and write
1D5F73CA000
trusted library allocation
page read and write
1D5FBED9000
trusted library allocation
page read and write
15B3F922000
heap
page read and write
1D5F4CED000
trusted library allocation
page read and write
1D5F533D000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5F5E2C000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F452B000
trusted library allocation
page read and write
1D5F765F000
trusted library allocation
page read and write
1D600893000
trusted library allocation
page read and write
1D5F47BD000
trusted library allocation
page read and write
1D5EAD9C000
heap
page read and write
15B3EBC7000
trusted library allocation
page read and write
1D5F574A000
trusted library allocation
page read and write
1D600580000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F5684000
trusted library allocation
page read and write
1D5EFD69000
trusted library allocation
page read and write
1D5FBEB6000
trusted library allocation
page read and write
1D5F6117000
trusted library allocation
page read and write
1570000
heap
page read and write
1D5FBD36000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5FE3E4000
trusted library allocation
page read and write
2885E0A2000
unclassified section
page read and write
1D5F5A73000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5EADC1000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5FBEAA000
trusted library allocation
page read and write
21F2BA61000
trusted library allocation
page read and write
1D5F5507000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D600171000
trusted library allocation
page read and write
1D5F5489000
trusted library allocation
page read and write
1D5FC24B000
trusted library allocation
page read and write
1D5F0D5B000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FFCA3000
trusted library allocation
page read and write
1D5FF968000
trusted library allocation
page read and write
1D5FF8BB000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5FE6CA000
trusted library allocation
page read and write
1D5FBF44000
trusted library allocation
page read and write
F69953E000
stack
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5F4325000
trusted library allocation
page read and write
1D5EFE66000
trusted library allocation
page read and write
1D5FE3E8000
trusted library allocation
page read and write
1D5F736C000
trusted library allocation
page read and write
3DDF5BE1000
trusted library allocation
page execute read
1D5EAD84000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5FC096000
trusted library allocation
page read and write
1D600542000
trusted library allocation
page read and write
1D5F0DC0000
trusted library allocation
page read and write
1D5F5D33000
trusted library allocation
page read and write
1D600B87000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5F68F8000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
2885E311000
trusted library allocation
page read and write
1D5F6330000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADA6000
heap
page read and write
1D5EADB7000
heap
page read and write
1D5F5F56000
trusted library allocation
page read and write
21F2BB06000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EFEE4000
trusted library allocation
page read and write
15B3F88D000
heap
page read and write
1D5EAE0A000
heap
page read and write
F697C3E000
unkown
page readonly
1D5EAD9B000
heap
page read and write
1D5F533A000
trusted library allocation
page read and write
1D5FBECC000
trusted library allocation
page read and write
15B3EC84000
unkown
page execute read
1D5F63FA000
trusted library allocation
page read and write
1563000
heap
page read and write
1D5FF9BB000
trusted library allocation
page read and write
1D5F3CE4000
trusted library allocation
page read and write
1D5FC0EA000
trusted library allocation
page read and write
1D5F537C000
trusted library allocation
page read and write
1D5F3C58000
trusted library allocation
page read and write
1D5FBE60000
trusted library allocation
page read and write
1D5FF924000
trusted library allocation
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5F759D000
trusted library allocation
page read and write
1D5F4798000
trusted library allocation
page read and write
2885E607000
trusted library allocation
page read and write
21F2BAEB000
trusted library allocation
page read and write
1D5EFD23000
trusted library allocation
page read and write
15B3F92A000
heap
page read and write
1D5F3856000
heap
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5F459B000
trusted library allocation
page read and write
1D5FC29C000
trusted library allocation
page read and write
1D5EADA9000
heap
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5F4C7B000
trusted library allocation
page read and write
1D5FBF44000
trusted library allocation
page read and write
1D5EADAA000
heap
page read and write
1D5F45A0000
trusted library allocation
page read and write
1D5F53E4000
trusted library allocation
page read and write
21F2BB1B000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FD8FD000
trusted library allocation
page read and write
1D5F3CDE000
trusted library allocation
page read and write
1D5FBEBA000
trusted library allocation
page read and write
1D5F40AA000
trusted library allocation
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1D5FBCD1000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EADE6000
heap
page read and write
1D5FF5E8000
trusted library allocation
page read and write
1D5F3C3D000
trusted library allocation
page read and write
2885E30E000
trusted library allocation
page read and write
F3B7DD8000
stack
page read and write
1D5F4C24000
trusted library allocation
page read and write
1D5F10C1000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD9C000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5FBEDE000
trusted library allocation
page read and write
1D5EADE2000
heap
page read and write
2E8D9FF000
stack
page read and write
1D5FE6F9000
trusted library allocation
page read and write
21F2B760000
heap
page read and write
1D5FC1FB000
trusted library allocation
page read and write
15B3E9F0000
trusted library allocation
page read and write
1D5F45AF000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5FF5F2000
trusted library allocation
page read and write
15B3F88A000
heap
page read and write
1D5FBFF7000
trusted library allocation
page read and write
1D5F72E6000
trusted library allocation
page read and write
1D5FF955000
trusted library allocation
page read and write
1D5FBDED000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F43BE000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADB3000
heap
page read and write
1D5F687D000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F459E000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5EAD93000
heap
page read and write
1D5F10E6000
trusted library allocation
page read and write
1562000
heap
page read and write
1D5FF862000
trusted library allocation
page read and write
1D5FC0B3000
trusted library allocation
page read and write
1D5FE3DC000
trusted library allocation
page read and write
1D5F4AA6000
trusted library allocation
page read and write
1D5FC29E000
trusted library allocation
page read and write
1D5F532F000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
1D5F5AB5000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FBCE3000
trusted library allocation
page read and write
1D5FFCD3000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
1D5F56D6000
trusted library allocation
page read and write
1D5EAD63000
heap
page read and write
1D5F5794000
trusted library allocation
page read and write
15B3F860000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F67EE000
trusted library allocation
page read and write
1D5F4A5B000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
1D5F6180000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
21F2BA68000
trusted library allocation
page read and write
1D5F5FD6000
trusted library allocation
page read and write
15B3EB75000
trusted library allocation
page read and write
1D5F5CB8000
trusted library allocation
page read and write
1D60053D000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D6001EF000
trusted library allocation
page read and write
1D5FBD40000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5EAD9A000
heap
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1558000
heap
page read and write
1D5F664F000
trusted library allocation
page read and write
1D5F5ECF000
trusted library allocation
page read and write
1D5F5744000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5EAD8F000
heap
page read and write
1D5EADB0000
heap
page read and write
1D5FBCBF000
trusted library allocation
page read and write
1D5F55E5000
trusted library allocation
page read and write
1D5F4C24000
trusted library allocation
page read and write
222C6AB9000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5FF992000
trusted library allocation
page read and write
1D5F5CF6000
trusted library allocation
page read and write
1D5F40F6000
trusted library allocation
page read and write
1D5FF992000
trusted library allocation
page read and write
1D5F5CB8000
trusted library allocation
page read and write
1D5FF9A9000
trusted library allocation
page read and write
15B3EB6A000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
15B3F92D000
heap
page read and write
1D5F1079000
trusted library allocation
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5FD885000
trusted library allocation
page read and write
1D5F35FE000
trusted library allocation
page read and write
1D5FF5DB000
trusted library allocation
page read and write
1D5F383F000
heap
page read and write
1D5FBF5D000
trusted library allocation
page read and write
1D5EADAB000
heap
page read and write
1D5F4790000
trusted library allocation
page read and write
1D5F5CC0000
trusted library allocation
page read and write
1D5F6161000
trusted library allocation
page read and write
1D6001B6000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F533D000
trusted library allocation
page read and write
1D5F4A17000
trusted library allocation
page read and write
1D5F4CB4000
trusted library allocation
page read and write
1D5FFCA0000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5F5FAD000
trusted library allocation
page read and write
1D5FF833000
trusted library allocation
page read and write
15B3F979000
heap
page read and write
1D5F3CFC000
trusted library allocation
page read and write
1D5F73DF000
trusted library allocation
page read and write
1D5F4C88000
trusted library allocation
page read and write
1D600BBE000
heap
page read and write
15B3F8B9000
heap
page read and write
1D5F5720000
trusted library allocation
page read and write
15B3F8A8000
heap
page read and write
1D5F452F000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5FD8E9000
trusted library allocation
page read and write
1D5F6679000
trusted library allocation
page read and write
1D5FF479000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5F638F000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5FBEDE000
trusted library allocation
page read and write
2885E605000
trusted library allocation
page read and write
1D5F112B000
trusted library allocation
page read and write
1D6001E6000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5FBFF7000
trusted library allocation
page read and write
1D5FF9D2000
trusted library allocation
page read and write
1D5FBECA000
trusted library allocation
page read and write
1D5F4923000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FBCD5000
trusted library allocation
page read and write
F69853E000
stack
page read and write
1D5F0D53000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1553000
heap
page read and write
1D5F45BB000
trusted library allocation
page read and write
1D5F4328000
trusted library allocation
page read and write
1D5FBCCD000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D600B41000
heap
page read and write
1D5F3823000
heap
page read and write
1D5F3847000
heap
page read and write
1D5F3B85000
trusted library allocation
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5F0D2A000
trusted library allocation
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F5565000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5F537C000
trusted library allocation
page read and write
1D5F5F6D000
trusted library allocation
page read and write
1D60014C000
trusted library allocation
page read and write
1D5FE6FC000
trusted library allocation
page read and write
1D5F4CE3000
trusted library allocation
page read and write
15B3F85C000
heap
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F3844000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5FBCC3000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F3900000
trusted library allocation
page read and write
1D5EADEF000
heap
page read and write
1D5FF839000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
2885DF3A000
heap
page read and write
1D5EAD83000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F73F8000
trusted library allocation
page read and write
1D5F76D6000
trusted library allocation
page read and write
1D5F55D2000
trusted library allocation
page read and write
1D5F3B63000
trusted library allocation
page read and write
1D5F688F000
trusted library allocation
page read and write
1D5EAE0D000
heap
page read and write
1D5F4CD8000
trusted library allocation
page read and write
1D5F1079000
trusted library allocation
page read and write
1D5F5786000
trusted library allocation
page read and write
15B3E98A000
heap
page read and write
1D5FC500000
trusted library allocation
page read and write
1D5F40E0000
trusted library allocation
page read and write
1D600580000
trusted library allocation
page read and write
1D600C21000
heap
page read and write
1D5F54A7000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F7857000
trusted library allocation
page read and write
1D5EADDB000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5EADDA000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D600155000
trusted library allocation
page read and write
1D5F56EE000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5FE701000
trusted library allocation
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5EFE13000
trusted library allocation
page read and write
1D5EADA9000
heap
page read and write
1D5FF968000
trusted library allocation
page read and write
1D5F4C3E000
trusted library allocation
page read and write
1D5FD8DE000
trusted library allocation
page read and write
1D5EADDC000
heap
page read and write
3D01000
heap
page read and write
1D5F563B000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F439E000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5EAD85000
heap
page read and write
1D5F567A000
trusted library allocation
page read and write
1D5F76EF000
trusted library allocation
page read and write
1D5F76E2000
trusted library allocation
page read and write
1D5F6855000
trusted library allocation
page read and write
1D5F4CCE000
trusted library allocation
page read and write
1D5FF810000
trusted library allocation
page read and write
1D5EADE6000
heap
page read and write
1D5F492F000
trusted library allocation
page read and write
1D5FBEAA000
trusted library allocation
page read and write
1D5FF968000
trusted library allocation
page read and write
15B3ECA0000
trusted library allocation
page read and write
1D5F5F4B000
trusted library allocation
page read and write
1D5F40A9000
trusted library allocation
page read and write
1D5F6133000
trusted library allocation
page read and write
9433FFE000
stack
page read and write
1D5FFCA0000
trusted library allocation
page read and write
1D5F783F000
trusted library allocation
page read and write
1D5F56F2000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F56F9000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F56E1000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
15B3F8E8000
heap
page read and write
21F2BA12000
trusted library allocation
page read and write
1D5F49DD000
trusted library allocation
page read and write
1D5F10F6000
trusted library allocation
page read and write
1D5F3B66000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5F763B000
trusted library allocation
page read and write
1D5FC289000
trusted library allocation
page read and write
1D5FE6F9000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5FF992000
trusted library allocation
page read and write
1D5F5CC0000
trusted library allocation
page read and write
1D5FFC8F000
trusted library allocation
page read and write
1D5F5AFA000
trusted library allocation
page read and write
1D5F5CA6000
trusted library allocation
page read and write
1D5EADE1000
heap
page read and write
1D5F53C9000
trusted library allocation
page read and write
1D5F4CC4000
trusted library allocation
page read and write
1D5F456D000
trusted library allocation
page read and write
1D5FC4AD000
trusted library allocation
page read and write
1D5F5CB0000
trusted library allocation
page read and write
1D5F76C2000
trusted library allocation
page read and write
1D5FBD78000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D5EFD69000
trusted library allocation
page read and write
1D5EADAB000
heap
page read and write
1D5F571B000
trusted library allocation
page read and write
1D5F538F000
trusted library allocation
page read and write
1D5F7691000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F5F0F000
trusted library allocation
page read and write
2885E143000
heap
page read and write
1D5F1017000
trusted library allocation
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5F63EE000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5FC2F6000
trusted library allocation
page read and write
15B3EB9E000
trusted library allocation
page read and write
1D5F4CCB000
trusted library allocation
page read and write
1D5F73D7000
trusted library allocation
page read and write
15B3EBF3000
trusted library allocation
page read and write
1D5EADE4000
heap
page read and write
1D5F62C6000
trusted library allocation
page read and write
1D5F4C6B000
trusted library allocation
page read and write
1D5F5372000
trusted library allocation
page read and write
1D5FC29F000
trusted library allocation
page read and write
1D5F6791000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADB3000
heap
page read and write
1D5F5320000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
21F2B7E0000
heap
page readonly
1D5F686C000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5F0DAD000
trusted library allocation
page read and write
15B3EB10000
trusted library allocation
page read and write
1D5FF44B000
trusted library allocation
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5FF5E5000
trusted library allocation
page read and write
1D5FFC80000
trusted library allocation
page read and write
1D5F5D13000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F4790000
trusted library allocation
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5FC0BB000
trusted library allocation
page read and write
15B3F958000
heap
page read and write
1D5F1034000
trusted library allocation
page read and write
1D5FF992000
trusted library allocation
page read and write
1D5F3C6A000
trusted library allocation
page read and write
1D5F4CFE000
trusted library allocation
page read and write
21F2BA7B000
trusted library allocation
page read and write
1D5F6791000
trusted library allocation
page read and write
1D5FBCD5000
trusted library allocation
page read and write
1D5F16C6000
trusted library allocation
page read and write
1D5EAD8A000
heap
page read and write
1D5F76DD000
trusted library allocation
page read and write
1D5F4C9E000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FF9C4000
trusted library allocation
page read and write
1D5F3B89000
trusted library allocation
page read and write
1D5F569F000
trusted library allocation
page read and write
1D5EADAF000
heap
page read and write
1D5FE666000
trusted library allocation
page read and write
1D5FF5E5000
trusted library allocation
page read and write
1D5EFE7D000
trusted library allocation
page read and write
1D5F5AEF000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EFE75000
trusted library allocation
page read and write
15B3E9E2000
unclassified section
page read and write
1D5FBF59000
trusted library allocation
page read and write
1D5FC2B9000
trusted library allocation
page read and write
1D5F5334000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5EADDB000
heap
page read and write
1D5F3C5A000
trusted library allocation
page read and write
1D5FFC89000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5FD8E0000
trusted library allocation
page read and write
1D5F5598000
trusted library allocation
page read and write
1D5F537F000
trusted library allocation
page read and write
1D5F5678000
trusted library allocation
page read and write
1D5F6630000
trusted library allocation
page read and write
1D5F4C3E000
trusted library allocation
page read and write
1D5F572E000
trusted library allocation
page read and write
1D5FC458000
trusted library allocation
page read and write
F3BA83E000
unkown
page readonly
1D5F56A1000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5EADAA000
heap
page read and write
1D5FFCDA000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FF5DB000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EF7B3000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5EADB4000
heap
page read and write
1D600B41000
heap
page read and write
1D5F636B000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F3BA5000
trusted library allocation
page read and write
1D5EAD85000
heap
page read and write
1D5EAD87000
heap
page read and write
1D5F4593000
trusted library allocation
page read and write
1D5F572E000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F4C8E000
trusted library allocation
page read and write
1D5F61E6000
trusted library allocation
page read and write
1D5FD8D7000
trusted library allocation
page read and write
1D5F685A000
trusted library allocation
page read and write
21F2BA2E000
trusted library allocation
page read and write
1D5F1096000
trusted library allocation
page read and write
1D5F10A6000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F5F3F000
trusted library allocation
page read and write
1D5F4C65000
trusted library allocation
page read and write
1D5F7296000
trusted library allocation
page read and write
1D5F40D6000
trusted library allocation
page read and write
1D5F45A9000
trusted library allocation
page read and write
1D5F1098000
trusted library allocation
page read and write
1D5FFCA0000
trusted library allocation
page read and write
1D5F5EA5000
trusted library allocation
page read and write
1D5F3857000
heap
page read and write
1D5F3C3D000
trusted library allocation
page read and write
1D5FBE2E000
trusted library allocation
page read and write
1D5F3856000
heap
page read and write
21F2BB37000
trusted library allocation
page read and write
1D5F5A2B000
trusted library allocation
page read and write
1D5F4CD5000
trusted library allocation
page read and write
B2C000
unkown
page readonly
21F2BB1E000
trusted library allocation
page read and write
1D5EFEE1000
trusted library allocation
page read and write
1D5EFEE1000
trusted library allocation
page read and write
1D5F61E6000
trusted library allocation
page read and write
15B3F84D000
heap
page read and write
15B3F921000
heap
page read and write
1D5F3CEE000
trusted library allocation
page read and write
1D5FF940000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5FBCC3000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5FC1D3000
trusted library allocation
page read and write
1D5F5D73000
trusted library allocation
page read and write
1D6005A2000
trusted library allocation
page read and write
1D5F3858000
heap
page read and write
1D5F7551000
trusted library allocation
page read and write
1D5F0DE1000
trusted library allocation
page read and write
2885E4C6000
heap
page read and write
1D5EADB7000
heap
page read and write
1D5EADD9000
heap
page read and write
1D6001BA000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5FBCF7000
trusted library allocation
page read and write
1D5EADEA000
heap
page read and write
1D6001EB000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
21F2BA43000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5FC0F2000
trusted library allocation
page read and write
1D5F16DA000
trusted library allocation
page read and write
1D5F1135000
trusted library allocation
page read and write
1D5FF5A1000
trusted library allocation
page read and write
1D600204000
trusted library allocation
page read and write
1D5F5CAC000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
1D5F16D5000
trusted library allocation
page read and write
1D5F3842000
heap
page read and write
1D5F76DD000
trusted library allocation
page read and write
1D5F43BE000
trusted library allocation
page read and write
1D5F40A5000
trusted library allocation
page read and write
1D600544000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5EAD84000
heap
page read and write
1D5F5AAA000
trusted library allocation
page read and write
1D5EAD93000
heap
page read and write
1D5EAD95000
heap
page read and write
1D5F45AF000
trusted library allocation
page read and write
1D5F51F6000
trusted library allocation
page read and write
1D5FE689000
trusted library allocation
page read and write
1D5F452B000
trusted library allocation
page read and write
1D5F5A2A000
trusted library allocation
page read and write
1D5F5C61000
trusted library allocation
page read and write
1D5EADBB000
heap
page read and write
1D5F3856000
heap
page read and write
1D5F40EE000
trusted library allocation
page read and write
F3BA7FE000
stack
page read and write
1D5EAD99000
heap
page read and write
1D5F383F000
heap
page read and write
1D5EADA8000
heap
page read and write
1D5F61C3000
trusted library allocation
page read and write
1D5F56EB000
trusted library allocation
page read and write
1D5EAD7D000
heap
page read and write
1558000
heap
page read and write
1D5F76CA000
trusted library allocation
page read and write
1D5FF5E5000
trusted library allocation
page read and write
1D5F1017000
trusted library allocation
page read and write
1D5F3518000
trusted library allocation
page read and write
1D5F76EC000
trusted library allocation
page read and write
1D5F5681000
trusted library allocation
page read and write
1D5F56DF000
trusted library allocation
page read and write
1D5FD8E0000
trusted library allocation
page read and write
21F2BA5B000
trusted library allocation
page read and write
1D5F4CEB000
trusted library allocation
page read and write
1D5FC1EA000
trusted library allocation
page read and write
1D5F40D4000
trusted library allocation
page read and write
1D5EADF5000
heap
page read and write
1D5F76C2000
trusted library allocation
page read and write
1D5EAD84000
heap
page read and write
1D5F5CA6000
trusted library allocation
page read and write
1D5F57DE000
trusted library allocation
page read and write
1D5F66CC000
trusted library allocation
page read and write
1D5EADF0000
heap
page read and write
1D5F45AC000
trusted library allocation
page read and write
1D5F3C94000
trusted library allocation
page read and write
1D5FBCDF000
trusted library allocation
page read and write
2885E4D0000
heap
page read and write
1D5F63D7000
trusted library allocation
page read and write
1D5FBFDC000
trusted library allocation
page read and write
1D5FC1F0000
trusted library allocation
page read and write
1D5FC130000
trusted library allocation
page read and write
1D5F76BB000
trusted library allocation
page read and write
1D5F51EC000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5EADF5000
heap
page read and write
1D5F4748000
trusted library allocation
page read and write
1D5F43E5000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F5F22000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
94347FE000
stack
page read and write
1D5EADA6000
heap
page read and write
1D5EAE13000
heap
page read and write
1D5F6753000
trusted library allocation
page read and write
15B3EC70000
trusted library allocation
page read and write
1D5FC1F8000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1C94981E000
heap
page read and write
21F2B670000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F40A5000
trusted library allocation
page read and write
1D5F40E0000
trusted library allocation
page read and write
1D5FD9FC000
trusted library allocation
page read and write
1C94982B000
heap
page read and write
1D5FC123000
trusted library allocation
page read and write
94337FF000
stack
page read and write
1D5FBCBF000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5FBF26000
trusted library allocation
page read and write
15B3EB71000
trusted library allocation
page read and write
1D5FC0CB000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F10BE000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
15B3F96B000
heap
page read and write
1D5EAD92000
heap
page read and write
1D5F10BE000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
15B3F8F0000
heap
page read and write
1D5F382A000
heap
page read and write
1D5FC300000
trusted library allocation
page read and write
1D5F4CFE000
trusted library allocation
page read and write
1D5F63B5000
trusted library allocation
page read and write
1D5EAD91000
heap
page read and write
1D5F383F000
heap
page read and write
1D5F4313000
trusted library allocation
page read and write
1D5F679B000
trusted library allocation
page read and write
1D5F4CA6000
trusted library allocation
page read and write
15B3EC40000
heap
page read and write
1D5F10EB000
trusted library allocation
page read and write
1D5F76F4000
trusted library allocation
page read and write
1D5FF41A000
trusted library allocation
page read and write
1D5F0DAD000
trusted library allocation
page read and write
1D5FD859000
trusted library allocation
page read and write
1D5F4367000
trusted library allocation
page read and write
1D5FF5DB000
trusted library allocation
page read and write
1D5F4CCF000
trusted library allocation
page read and write
1C947F07000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5EADE0000
heap
page read and write
2885E0B0000
heap
page read and write
1D5EAD84000
heap
page read and write
1C949815000
heap
page read and write
15B3F860000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5F674F000
trusted library allocation
page read and write
21F2BA6E000
trusted library allocation
page read and write
1D5F4C24000
trusted library allocation
page read and write
1D5F382A000
heap
page read and write
1D5F4C87000
trusted library allocation
page read and write
1D600169000
trusted library allocation
page read and write
1D5FC0BF000
trusted library allocation
page read and write
1D5F3CE9000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F72FD000
trusted library allocation
page read and write
1D5F54F6000
trusted library allocation
page read and write
1D5FC077000
trusted library allocation
page read and write
1D5F5F53000
trusted library allocation
page read and write
1D5EADDA000
heap
page read and write
1D5F73D7000
trusted library allocation
page read and write
1D5EADA9000
heap
page read and write
1D5F51DD000
trusted library allocation
page read and write
1D5F78F8000
trusted library allocation
page read and write
15B3F87F000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F570C000
trusted library allocation
page read and write
1D5F5692000
trusted library allocation
page read and write
1D5F5338000
trusted library allocation
page read and write
1D5FE5BA000
trusted library allocation
page read and write
1D5F5F71000
trusted library allocation
page read and write
1D5F40E0000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
21F2B650000
unclassified section
page readonly
1D5F0FF5000
trusted library allocation
page read and write
1D5F5736000
trusted library allocation
page read and write
1D5FF4C9000
trusted library allocation
page read and write
1D5F73EC000
trusted library allocation
page read and write
1D5EADB4000
heap
page read and write
1D5F4CA3000
trusted library allocation
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5F1633000
trusted library allocation
page read and write
1D5F78B1000
trusted library allocation
page read and write
1D5F3B3C000
trusted library allocation
page read and write
15B3E800000
unclassified section
page readonly
1D5F6747000
trusted library allocation
page read and write
1D5F66B8000
trusted library allocation
page read and write
1D5F759A000
trusted library allocation
page read and write
1D5F5729000
trusted library allocation
page read and write
1D5F67FE000
trusted library allocation
page read and write
1D5EADAB000
heap
page read and write
1D5F4A19000
trusted library allocation
page read and write
1D5FF5C0000
trusted library allocation
page read and write
1D5F7399000
trusted library allocation
page read and write
F697C7D000
stack
page read and write
1D5EADE0000
heap
page read and write
1D6001E6000
trusted library allocation
page read and write
1D5FC1DF000
trusted library allocation
page read and write
1D5EADD9000
heap
page read and write
1D5F5EC4000
trusted library allocation
page read and write
1D5FFC98000
trusted library allocation
page read and write
1D5F4389000
trusted library allocation
page read and write
1D5F109D000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F109D000
trusted library allocation
page read and write
1D5F4C6A000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
1D6001E2000
trusted library allocation
page read and write
1D5F5F9F000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5F40F4000
trusted library allocation
page read and write
21F2B800000
heap
page read and write
1D5F72DC000
trusted library allocation
page read and write
1D5F574A000
trusted library allocation
page read and write
1D5F76C0000
trusted library allocation
page read and write
1D5F47F3000
trusted library allocation
page read and write
1D6005BE000
trusted library allocation
page read and write
1D5FBD9C000
trusted library allocation
page read and write
1D5F4324000
trusted library allocation
page read and write
1D5F3CE8000
trusted library allocation
page read and write
1D5F4C64000
trusted library allocation
page read and write
1D5FBFD5000
trusted library allocation
page read and write
1D5F3B5A000
trusted library allocation
page read and write
1D5F0F4A000
trusted library allocation
page read and write
1D5FF49C000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F67AA000
trusted library allocation
page read and write
1D5FBCE3000
trusted library allocation
page read and write
1D5F4593000
trusted library allocation
page read and write
1364000
heap
page read and write
1D5F6365000
trusted library allocation
page read and write
1D5F3BCE000
trusted library allocation
page read and write
F6963D8000
stack
page read and write
1D5FF200000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5FBD4E000
trusted library allocation
page read and write
1D5F7296000
trusted library allocation
page read and write
1D5F5EA5000
trusted library allocation
page read and write
1D5F4346000
trusted library allocation
page read and write
1D5F674D000
trusted library allocation
page read and write
1D5F40E7000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5FBECC000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5EADB9000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F5F56000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5FC2B9000
trusted library allocation
page read and write
1D5EAD8F000
heap
page read and write
1D5F0FC3000
trusted library allocation
page read and write
1D5F40AD000
trusted library allocation
page read and write
1D5F3823000
heap
page read and write
1D5F0D40000
trusted library allocation
page read and write
1D5F39D8000
trusted library allocation
page read and write
15B3F860000
heap
page read and write
1D5F534F000
trusted library allocation
page read and write
1D5EAD92000
heap
page read and write
1D5F63AC000
trusted library allocation
page read and write
1D5F63F6000
trusted library allocation
page read and write
1D5F0DE1000
trusted library allocation
page read and write
1D5EADA6000
heap
page read and write
1D5F55D8000
trusted library allocation
page read and write
1D5F67C0000
trusted library allocation
page read and write
1D5FBD3C000
trusted library allocation
page read and write
1D600576000
trusted library allocation
page read and write
1D5F5FFA000
trusted library allocation
page read and write
1D5FBCAA000
trusted library allocation
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5EADA0000
heap
page read and write
1D5FF8CD000
trusted library allocation
page read and write
1D5F0FE9000
trusted library allocation
page read and write
1D5F67E4000
trusted library allocation
page read and write
1D5FBCF7000
trusted library allocation
page read and write
1D5F76E2000
trusted library allocation
page read and write
1D5F16BA000
trusted library allocation
page read and write
1D5F57E8000
trusted library allocation
page read and write
15B3F8E8000
heap
page read and write
1D5FC2A2000
trusted library allocation
page read and write
1D5F0DA9000
trusted library allocation
page read and write
1D5EADB9000
heap
page read and write
1D5EAE13000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F3B9E000
trusted library allocation
page read and write
1D5FC1ED000
trusted library allocation
page read and write
1D5F76DD000
trusted library allocation
page read and write
1D5EADD6000
heap
page read and write
1D5FC1B7000
trusted library allocation
page read and write
1D5FC0B8000
trusted library allocation
page read and write
1D5FF5FB000
trusted library allocation
page read and write
1D5F3847000
heap
page read and write
1D5F5651000
trusted library allocation
page read and write
1D5FF5C9000
trusted library allocation
page read and write
1D5FBD76000
trusted library allocation
page read and write
1D5F51E3000
trusted library allocation
page read and write
1D5F6860000
trusted library allocation
page read and write
1D5FBD32000
trusted library allocation
page read and write
1D5F533A000
trusted library allocation
page read and write
1D5F39CB000
trusted library allocation
page read and write
1D5F387A000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F56D6000
trusted library allocation
page read and write
1D5EAD7F000
heap
page read and write
1D5F5CA7000
trusted library allocation
page read and write
1D5F7832000
trusted library allocation
page read and write
1D5F6894000
trusted library allocation
page read and write
11DB000
stack
page read and write
1D5F78AB000
trusted library allocation
page read and write
1D5EFE26000
trusted library allocation
page read and write
1D5EFEA2000
trusted library allocation
page read and write
1D5F76C0000
trusted library allocation
page read and write
1D5F384B000
heap
page read and write
1D5EAD9B000
heap
page read and write
1D5F73B6000
trusted library allocation
page read and write
F698D3E000
unkown
page readonly
1D5FF8FD000
trusted library allocation
page read and write
1D5F5327000
trusted library allocation
page read and write
1D5F55BD000
trusted library allocation
page read and write
1D5F5F5B000
trusted library allocation
page read and write
F6959DE000
stack
page read and write
1D5EAD9B000
heap
page read and write
1D600155000
trusted library allocation
page read and write
1D5FF47F000
trusted library allocation
page read and write
1D5F67C0000
trusted library allocation
page read and write
1D5EAD95000
heap
page read and write
1D5EADD6000
heap
page read and write
1D5F3842000
heap
page read and write
A91000
unkown
page execute read
1D5FBD18000
trusted library allocation
page read and write
1D5FC2D0000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F5CB8000
trusted library allocation
page read and write
1D5F5671000
trusted library allocation
page read and write
1D5FBD78000
trusted library allocation
page read and write
1D5F10DB000
trusted library allocation
page read and write
1D5F49DD000
trusted library allocation
page read and write
1D5F0D3A000
trusted library allocation
page read and write
1D5FF8ED000
trusted library allocation
page read and write
1D5EAD9B000
heap
page read and write
1D5F0FC3000
trusted library allocation
page read and write
1D5F6185000
trusted library allocation
page read and write
1D5FF5F2000
trusted library allocation
page read and write
15B3F93B000
heap
page read and write
There are 3945 hidden memdumps, click here to show them.