IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0cc711e2-b902-445a-b40a-cdeae78a6349.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0cc711e2-b902-445a-b40a-cdeae78a6349.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 26944 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 26944 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2220 -prefMapHandle 2216 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c3f1fe9-29b5-44a7-92d0-ccc1cf2e6846} 4540 "\\.\pipe\gecko-crash-server-pipe.4540" 1f2b926f310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3424 -parentBuildID 20230927232528 -prefsHandle 3656 -prefMapHandle 3416 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1945997-5213-478c-a830-2cea8a37ed43} 4540 "\\.\pipe\gecko-crash-server-pipe.4540" 1f2cb764f10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5080 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5072 -prefMapHandle 5068 -prefsLen 33076 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {526b2fdc-0c3a-45ce-a3ce-77acb2c614cf} 4540 "\\.\pipe\gecko-crash-server-pipe.4540" 1f2d1852510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://youtube.com/account?=https://ac
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://support.mozilla.org/
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.184.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.184.238
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1F2CA88F000
trusted library allocation
page read and write
1F2D345E000
trusted library allocation
page read and write
1F2CBDF5000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2D628A000
trusted library allocation
page read and write
1F2D639E000
trusted library allocation
page read and write
1F2CB133000
trusted library allocation
page read and write
1F2CAB6F000
trusted library allocation
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2C97F3000
trusted library allocation
page read and write
1F2C00B6000
heap
page read and write
1F2C94F7000
trusted library allocation
page read and write
1F2CBE4D000
trusted library allocation
page read and write
1F2D5AE8000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
250B8A21000
trusted library allocation
page read and write
1F2CB4A9000
trusted library allocation
page read and write
1F2CBAE0000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D20D3000
trusted library allocation
page read and write
1F2C99A0000
trusted library allocation
page read and write
1F2C99B0000
trusted library allocation
page read and write
FB6857E000
unkown
page readonly
1F2CAAE9000
trusted library allocation
page read and write
1F2D34EC000
trusted library allocation
page read and write
1F2CAEAD000
trusted library allocation
page read and write
1F2C013F000
heap
page read and write
1F2C936E000
trusted library allocation
page read and write
1F2CAC4E000
trusted library allocation
page read and write
1F2C9ECE000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2CB030000
trusted library allocation
page read and write
1F2CCC7E000
trusted library allocation
page read and write
1F2CA8DD000
trusted library allocation
page read and write
1F20EE6C000
heap
page read and write
1F2D1C94000
trusted library allocation
page read and write
1F2C99B9000
trusted library allocation
page read and write
1F2CB4A9000
trusted library allocation
page read and write
1F2CB447000
trusted library allocation
page read and write
1F2D340A000
trusted library allocation
page read and write
1F2CB48E000
trusted library allocation
page read and write
17A286B1000
trusted library allocation
page read and write
1F2D63F1000
trusted library allocation
page read and write
1F2D4C97000
trusted library allocation
page read and write
1F2C6A9D000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2D349A000
trusted library allocation
page read and write
1F2D34E2000
trusted library allocation
page read and write
FB674BE000
stack
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2D5B72000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CA6C9000
trusted library allocation
page read and write
1F2C00B6000
heap
page read and write
1F2CD45E000
trusted library allocation
page read and write
1F2C68EF000
trusted library allocation
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C68DE000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2C68C7000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2C94F7000
trusted library allocation
page read and write
1F2D3E43000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2CB485000
trusted library allocation
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2D1AC2000
trusted library allocation
page read and write
1F2C97E6000
trusted library allocation
page read and write
1F2CBB00000
trusted library allocation
page read and write
1F2CAD2A000
trusted library allocation
page read and write
1F2CAEAB000
trusted library allocation
page read and write
1F2D1E46000
trusted library allocation
page read and write
1F2C6847000
trusted library allocation
page read and write
1F2D20D3000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2C00A9000
heap
page read and write
1F2CAAA8000
trusted library allocation
page read and write
1F2D5E84000
heap
page read and write
1F2CC869000
trusted library allocation
page read and write
1F2D3411000
trusted library allocation
page read and write
1F2CB496000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2D3DA3000
trusted library allocation
page read and write
1F2CAEE3000
trusted library allocation
page read and write
1F2CCC86000
trusted library allocation
page read and write
1F20E07B000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C00B4000
heap
page read and write
1F2D4600000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C9ED1000
trusted library allocation
page read and write
1F2C5551000
trusted library allocation
page read and write
1F2D1EF2000
trusted library allocation
page read and write
1F2C946E000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2D5EA6000
heap
page read and write
1F2C68A8000
trusted library allocation
page read and write
1F2D5F0A000
heap
page read and write
1F2CB821000
trusted library allocation
page read and write
1F2CA7FC000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2C0100000
heap
page read and write
1034000
heap
page read and write
1F2CABE0000
trusted library allocation
page read and write
250B8883000
trusted library allocation
page read and write
1F2CCBDF000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2C99B0000
trusted library allocation
page read and write
1F2CAC95000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C8FC8000
trusted library allocation
page read and write
1F2CBE45000
trusted library allocation
page read and write
1F2CB0FB000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2D34D4000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CA82F000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2C0122000
heap
page read and write
1F2CAEF5000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F20EEE9000
heap
page read and write
1F2D3468000
trusted library allocation
page read and write
1F2CAD90000
trusted library allocation
page read and write
1F2C9100000
trusted library allocation
page read and write
24F3C70A000
trusted library allocation
page read and write
1F2CA7B7000
trusted library allocation
page read and write
7ED8BFF000
stack
page read and write
A4B31FC000
stack
page read and write
1F2CAD8A000
trusted library allocation
page read and write
1F2CB455000
trusted library allocation
page read and write
1F2CCCB9000
trusted library allocation
page read and write
1F20E045000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D59E0000
trusted library allocation
page read and write
1F2CC948000
trusted library allocation
page read and write
1F2CA7EB000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D5493000
trusted library allocation
page read and write
1F20EF45000
heap
page read and write
1F2D344D000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2CA7FA000
trusted library allocation
page read and write
250B89D6000
heap
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2CACCF000
trusted library allocation
page read and write
1F20E0BD000
trusted library allocation
page read and write
1F2CD460000
trusted library allocation
page read and write
1F2D1BB8000
trusted library allocation
page read and write
1F2D3E86000
trusted library allocation
page read and write
1F2C6567000
trusted library allocation
page read and write
1F2C9B70000
trusted library allocation
page read and write
17A28310000
heap
page read and write
1F2C0135000
heap
page read and write
1F20E086000
trusted library allocation
page read and write
1F2D5E77000
heap
page read and write
5A603FE000
unkown
page readonly
1F2D20C4000
trusted library allocation
page read and write
1F2CA821000
trusted library allocation
page read and write
1F20EF22000
heap
page read and write
1F2CAA88000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
250B886E000
trusted library allocation
page read and write
1F2CA821000
trusted library allocation
page read and write
1F2C9BFA000
trusted library allocation
page read and write
1F2D1BD0000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2D5E7A000
heap
page read and write
1F20EEA1000
heap
page read and write
1F2C4A98000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D1F8C000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C00B2000
heap
page read and write
1F2CA812000
trusted library allocation
page read and write
1F2C8FCB000
trusted library allocation
page read and write
1F2C97FB000
trusted library allocation
page read and write
1F2CAEBF000
trusted library allocation
page read and write
1F2C0125000
heap
page read and write
1F2C97E0000
trusted library allocation
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2CD4FE000
trusted library allocation
page read and write
11B4000
heap
page read and write
1F2C00BA000
heap
page read and write
1F2CC98E000
trusted library allocation
page read and write
17A2860E000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
24F3DFC0000
heap
page read and write
1F2CA828000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C013F000
heap
page read and write
1F2CAC99000
trusted library allocation
page read and write
1F2CAD67000
trusted library allocation
page read and write
1F2C99F7000
trusted library allocation
page read and write
1F2CA7C8000
trusted library allocation
page read and write
1F2D3453000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D2045000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2D1EA3000
trusted library allocation
page read and write
1F2CB15A000
trusted library allocation
page read and write
1F2CAD5A000
trusted library allocation
page read and write
1F2CB89B000
trusted library allocation
page read and write
1F2CD456000
trusted library allocation
page read and write
1F2D1899000
trusted library allocation
page read and write
1F2CB419000
trusted library allocation
page read and write
1F2C9033000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
250B8B04000
heap
page read and write
1F2CA824000
trusted library allocation
page read and write
1F2C0126000
heap
page read and write
1F2D2026000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
11B7000
heap
page read and write
1F2D4F7C000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2C99AE000
trusted library allocation
page read and write
1F2D1BE6000
trusted library allocation
page read and write
1F2C0131000
heap
page read and write
1F2D208D000
trusted library allocation
page read and write
1F2D54FD000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CADF3000
trusted library allocation
page read and write
1F2D5E78000
heap
page read and write
1F2D660D000
trusted library allocation
page read and write
1F2C8FC8000
trusted library allocation
page read and write
1F2CA812000
trusted library allocation
page read and write
1F2C991B000
trusted library allocation
page read and write
1F2CA9DB000
trusted library allocation
page read and write
1F2CAEE2000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CA724000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F20EF79000
heap
page read and write
754000
unkown
page readonly
1F2CB4B6000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CAD57000
trusted library allocation
page read and write
1F2CB9BA000
trusted library allocation
page read and write
1F20EE5F000
heap
page read and write
1F2D5A6C000
trusted library allocation
page read and write
1F20EF6D000
heap
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2C68FA000
trusted library allocation
page read and write
1F20E066000
trusted library allocation
page read and write
7F169B000
stack
page read and write
1F2C00D6000
heap
page read and write
1F2C0140000
heap
page read and write
1F2CABF0000
trusted library allocation
page read and write
1F2D34B5000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
350ED6D1000
trusted library allocation
page execute read
1F2CACCF000
trusted library allocation
page read and write
1F20EE5C000
heap
page read and write
1F2CB8BD000
trusted library allocation
page read and write
1F20EE01000
heap
page read and write
1F2D5E71000
heap
page read and write
71C000
unkown
page readonly
1F2CD44E000
trusted library allocation
page read and write
24F3C700000
trusted library allocation
page read and write
1F2CAC0B000
trusted library allocation
page read and write
1F2C012D000
heap
page read and write
1F2CB999000
trusted library allocation
page read and write
1F2CB43E000
trusted library allocation
page read and write
1F2CACC7000
trusted library allocation
page read and write
1F2CADDA000
trusted library allocation
page read and write
1F2CA7A5000
trusted library allocation
page read and write
1F2C94FA000
trusted library allocation
page read and write
1F20EE60000
heap
page read and write
1F2CD45A000
trusted library allocation
page read and write
1F2D5EA3000
heap
page read and write
1F2C6672000
trusted library allocation
page read and write
1F2D59B6000
trusted library allocation
page read and write
1F2C65F3000
trusted library allocation
page read and write
1F2C012F000
heap
page read and write
1F2CBDCD000
trusted library allocation
page read and write
1F2CAC43000
trusted library allocation
page read and write
1F2D19EA000
trusted library allocation
page read and write
1F2C940D000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C00B6000
heap
page read and write
1F20DE70000
heap
page readonly
1F2D4CB6000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D3E1C000
trusted library allocation
page read and write
1F2D3405000
trusted library allocation
page read and write
1F2CB490000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2C011B000
heap
page read and write
1F2C00DD000
heap
page read and write
1F2D1ECA000
trusted library allocation
page read and write
1F2C99B9000
trusted library allocation
page read and write
1F2CADFE000
trusted library allocation
page read and write
7F39FE000
unkown
page readonly
1F2D1BDF000
trusted library allocation
page read and write
1F2D2026000
trusted library allocation
page read and write
1F20EF45000
heap
page read and write
1F2CBE59000
trusted library allocation
page read and write
24F3C695000
heap
page read and write
1F2C9A3E000
trusted library allocation
page read and write
1F2CB4A2000
trusted library allocation
page read and write
1F2CAEAF000
trusted library allocation
page read and write
1F20EEAA000
heap
page read and write
27D6A00A000
trusted library allocation
page read and write
1F2C8FFE000
trusted library allocation
page read and write
1F2D59A7000
trusted library allocation
page read and write
1F2C00C0000
heap
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2C8FF5000
trusted library allocation
page read and write
1F2D202B000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C99EA000
trusted library allocation
page read and write
11C0000
heap
page read and write
1F2C94F3000
trusted library allocation
page read and write
1F2CCA79000
trusted library allocation
page read and write
1F2CB999000
trusted library allocation
page read and write
1F2CAD54000
trusted library allocation
page read and write
1F2CAA61000
trusted library allocation
page read and write
1F2C55BB000
trusted library allocation
page read and write
1F2C011E000
heap
page read and write
1F2D1E81000
trusted library allocation
page read and write
1F2D20EC000
trusted library allocation
page read and write
1F2CA6EB000
trusted library allocation
page read and write
1F2D44A8000
trusted library allocation
page read and write
1F2C0121000
heap
page read and write
1F2CB8C3000
trusted library allocation
page read and write
370456104000
trusted library allocation
page read and write
1F2C8FFE000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2C6AD0000
trusted library allocation
page read and write
1F2D5E7A000
heap
page read and write
1F2C0127000
heap
page read and write
1F2D1E24000
trusted library allocation
page read and write
1F2CB449000
trusted library allocation
page read and write
1F2C8F96000
trusted library allocation
page read and write
1F2D1CD8000
trusted library allocation
page read and write
1F2CB45A000
trusted library allocation
page read and write
1F2D1BD0000
trusted library allocation
page read and write
1F2D1BB1000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2C99FD000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2CB4A2000
trusted library allocation
page read and write
11CC000
heap
page read and write
27D69F00000
heap
page read and write
1F2C55C2000
trusted library allocation
page read and write
1F2C9551000
trusted library allocation
page read and write
1F2C9484000
trusted library allocation
page read and write
1F2CD4C3000
trusted library allocation
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2C9461000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2C0129000
heap
page read and write
1F2D4F5A000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
27D69DE0000
heap
page read and write
1F2C99E0000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
17A28350000
heap
page read and write
1F2CA64E000
trusted library allocation
page read and write
1F2C6AEC000
trusted library allocation
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2D3E8A000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2C9CD2000
trusted library allocation
page read and write
1F2C5580000
trusted library allocation
page read and write
1F2C6A58000
trusted library allocation
page read and write
1F2CBAB1000
trusted library allocation
page read and write
1F2CB15F000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2D5E26000
heap
page read and write
1F2C946E000
trusted library allocation
page read and write
1F2C954D000
trusted library allocation
page read and write
1F2D3432000
trusted library allocation
page read and write
1F2CBEC6000
trusted library allocation
page read and write
1F2CB9BC000
trusted library allocation
page read and write
1F2D1F5D000
trusted library allocation
page read and write
1F2CD495000
trusted library allocation
page read and write
1F2CA6EB000
trusted library allocation
page read and write
1F2D5499000
trusted library allocation
page read and write
1F2D205A000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CB9BA000
trusted library allocation
page read and write
1F2D209F000
trusted library allocation
page read and write
1F2CAC4E000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2CACDD000
trusted library allocation
page read and write
1F2D4A80000
trusted library allocation
page read and write
1F2D56B2000
trusted library allocation
page read and write
1F2CB147000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2CAAC3000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CAD9B000
trusted library allocation
page read and write
1F2C9A6C000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2C9E94000
trusted library allocation
page read and write
1F2CACFC000
trusted library allocation
page read and write
1F2CC9FA000
trusted library allocation
page read and write
1F2CAEAB000
trusted library allocation
page read and write
1F2D1E81000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2C6596000
trusted library allocation
page read and write
250B86C2000
unclassified section
page read and write
1F2D5E9D000
heap
page read and write
1F2CAA78000
trusted library allocation
page read and write
1F2CA8FB000
trusted library allocation
page read and write
1F2D3411000
trusted library allocation
page read and write
1F2D1AB6000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D1ED5000
trusted library allocation
page read and write
1F2CA83B000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2CC8B9000
trusted library allocation
page read and write
1F20EE6C000
heap
page read and write
1F2CB967000
trusted library allocation
page read and write
1F2C9040000
trusted library allocation
page read and write
1F20EE69000
heap
page read and write
1F2C682C000
trusted library allocation
page read and write
1F2C940B000
trusted library allocation
page read and write
1F2D3415000
trusted library allocation
page read and write
1F2C936E000
trusted library allocation
page read and write
1F2C54F6000
trusted library allocation
page read and write
1F2C9965000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2CB9C1000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D1A20000
trusted library allocation
page read and write
1F2D54E5000
trusted library allocation
page read and write
1F2D34AA000
trusted library allocation
page read and write
1F2C5517000
trusted library allocation
page read and write
11C1000
heap
page read and write
1F2C652A000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2CB90E000
trusted library allocation
page read and write
1F2CC97B000
trusted library allocation
page read and write
1F2D3EC5000
trusted library allocation
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2D3E48000
trusted library allocation
page read and write
1F2C9993000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2CAEAD000
trusted library allocation
page read and write
1F2D208D000
trusted library allocation
page read and write
1F20E000000
trusted library allocation
page read and write
1F2C00A9000
heap
page read and write
1F2C5423000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2C55E4000
trusted library allocation
page read and write
1F2CA87E000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D5E01000
heap
page read and write
1F2D3445000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D1BAB000
trusted library allocation
page read and write
1F2CADE9000
trusted library allocation
page read and write
1F2CA868000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1034000
heap
page read and write
1F20EE00000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2CAEE0000
trusted library allocation
page read and write
1F2C9576000
trusted library allocation
page read and write
1F2D341A000
trusted library allocation
page read and write
1F2D1973000
trusted library allocation
page read and write
1F2CAD2A000
trusted library allocation
page read and write
1F2CB923000
trusted library allocation
page read and write
1F2C6AC4000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2D1BD7000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2CAD77000
trusted library allocation
page read and write
1F2D1E66000
trusted library allocation
page read and write
1F2D347B000
trusted library allocation
page read and write
1F2CAB53000
trusted library allocation
page read and write
1F2D1E4B000
trusted library allocation
page read and write
7F175E000
unkown
page readonly
1F2D1C24000
trusted library allocation
page read and write
1F2CACD1000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C011A000
heap
page read and write
1F2D5E7A000
heap
page read and write
1F2C0134000
heap
page read and write
1F2C0107000
heap
page read and write
1F2CAD9F000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C6C98000
heap
page read and write
1F2C0100000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2C00BD000
heap
page read and write
1F2CB9D6000
trusted library allocation
page read and write
1F2CA634000
trusted library allocation
page read and write
1F20EF22000
heap
page read and write
250B8A3D000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2C99BB000
trusted library allocation
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2C9BD9000
trusted library allocation
page read and write
1F2D20FC000
trusted library allocation
page read and write
1F2D5B45000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CAA3C000
trusted library allocation
page read and write
1F2D3AB1000
trusted library allocation
page read and write
1F2CB43C000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2CABE3000
trusted library allocation
page read and write
1F2CAEC3000
trusted library allocation
page read and write
1F2CA7AD000
trusted library allocation
page read and write
1F2D1E35000
trusted library allocation
page read and write
1F2CAACE000
trusted library allocation
page read and write
1F2C5600000
trusted library allocation
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2CAD60000
trusted library allocation
page read and write
1F20EF2B000
heap
page read and write
1F2C00B1000
heap
page read and write
1F2C935A000
trusted library allocation
page read and write
1F2C9332000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CAADC000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2C00BF000
heap
page read and write
1F2CB015000
trusted library allocation
page read and write
1F2D6622000
trusted library allocation
page read and write
1F2D20E0000
trusted library allocation
page read and write
1F2D3EA7000
trusted library allocation
page read and write
1F2CCB62000
trusted library allocation
page read and write
1F2D343D000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CBBB3000
trusted library allocation
page read and write
1F2C68C7000
trusted library allocation
page read and write
1F2CAD9B000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2C00CE000
heap
page read and write
11B8000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2C6870000
trusted library allocation
page read and write
2EA1391E000
trusted library allocation
page read and write
17A28A00000
trusted library allocation
page read and write
1F2D205A000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C9961000
trusted library allocation
page read and write
1F2D34BD000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CBEC2000
trusted library allocation
page read and write
1F2D1E68000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2CB496000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CCC77000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C9453000
trusted library allocation
page read and write
1F2D344A000
trusted library allocation
page read and write
1F2CAA61000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2C0140000
heap
page read and write
1F2C6AC4000
trusted library allocation
page read and write
11D9000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2D62AC000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2D56B2000
trusted library allocation
page read and write
1F2D2045000
trusted library allocation
page read and write
1F2C9463000
trusted library allocation
page read and write
1F20ED1F000
trusted library allocation
page read and write
1F2D1CBD000
trusted library allocation
page read and write
1F2CB0D2000
trusted library allocation
page read and write
1F2D5ADF000
trusted library allocation
page read and write
1F2D349C000
trusted library allocation
page read and write
1F2D1872000
trusted library allocation
page read and write
3A81000
heap
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2CAB2E000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2D5EA0000
heap
page read and write
1F2C99E0000
trusted library allocation
page read and write
1F2CAC2B000
trusted library allocation
page read and write
1F2D3DCE000
trusted library allocation
page read and write
1F2C6C68000
heap
page read and write
1F2CB15F000
trusted library allocation
page read and write
1F2CAD82000
trusted library allocation
page read and write
1F2D1CFA000
trusted library allocation
page read and write
11C1000
heap
page read and write
1F2D5E57000
heap
page read and write
27D69CB0000
heap
page read and write
1F2C9435000
trusted library allocation
page read and write
1F2CA81E000
trusted library allocation
page read and write
1F2D1CA4000
trusted library allocation
page read and write
1F2CCCE6000
trusted library allocation
page read and write
1F2CAAC8000
trusted library allocation
page read and write
1F2CA7E5000
trusted library allocation
page read and write
1F2D34FB000
trusted library allocation
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2CAA13000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2D4CF5000
trusted library allocation
page read and write
1F2CBAED000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2D1AC6000
trusted library allocation
page read and write
1F2C6883000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D1933000
trusted library allocation
page read and write
1F2C659C000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2D6624000
trusted library allocation
page read and write
27D69E00000
trusted library allocation
page read and write
1F2CB972000
trusted library allocation
page read and write
1F2D343D000
trusted library allocation
page read and write
1F2D5B7F000
trusted library allocation
page read and write
1F2CAC63000
trusted library allocation
page read and write
1F2C00D3000
heap
page read and write
1F2D5BDA000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2D342D000
trusted library allocation
page read and write
1F2C6A1D000
trusted library allocation
page read and write
1F2CBE76000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F2C6AD3000
trusted library allocation
page read and write
1F2CB187000
trusted library allocation
page read and write
1F2D1CF4000
trusted library allocation
page read and write
1F2C9EFE000
trusted library allocation
page read and write
11B3000
heap
page read and write
1F2CABFA000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
250B8560000
heap
page read and write
1F2CA6FE000
trusted library allocation
page read and write
1F2D54CA000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D20D3000
trusted library allocation
page read and write
11B9000
heap
page read and write
17A28682000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2D19F0000
trusted library allocation
page read and write
1F2C97FB000
trusted library allocation
page read and write
1F2C8FFE000
trusted library allocation
page read and write
1F2CB443000
trusted library allocation
page read and write
1F2CB9C1000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2CB98D000
trusted library allocation
page read and write
1F2C6898000
trusted library allocation
page read and write
1F2D1BCB000
trusted library allocation
page read and write
1F2CB9A9000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2CADA9000
trusted library allocation
page read and write
1F2CAD76000
trusted library allocation
page read and write
1F2C6C7E000
heap
page read and write
1F2CAD6F000
trusted library allocation
page read and write
1F2CAE68000
trusted library allocation
page read and write
1F2C689D000
trusted library allocation
page read and write
17A28678000
trusted library allocation
page read and write
1F2D19E0000
trusted library allocation
page read and write
1F20EE69000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2D2053000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F20E02F000
trusted library allocation
page read and write
1F2C9965000
trusted library allocation
page read and write
5A5C11D000
stack
page read and write
1F2C00D4000
heap
page read and write
5A5EBFE000
stack
page read and write
1F2CAC2D000
trusted library allocation
page read and write
1F2C97E9000
trusted library allocation
page read and write
1F2D3421000
trusted library allocation
page read and write
1F2C00DD000
heap
page read and write
1F2D19C1000
trusted library allocation
page read and write
1F2D3421000
trusted library allocation
page read and write
1F2CAA21000
trusted library allocation
page read and write
1F2C68A6000
trusted library allocation
page read and write
1F2CAB7F000
trusted library allocation
page read and write
1F2C97F3000
trusted library allocation
page read and write
5A5CBD8000
stack
page read and write
1F2CAB41000
trusted library allocation
page read and write
1F2C9460000
trusted library allocation
page read and write
1F2C99F7000
trusted library allocation
page read and write
1F2CB948000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CAB45000
trusted library allocation
page read and write
1F2CAD57000
trusted library allocation
page read and write
1F20EF59000
heap
page read and write
1F2C9CEF000
trusted library allocation
page read and write
1F2C6ADF000
trusted library allocation
page read and write
1F2D1916000
trusted library allocation
page read and write
1F2CAD5F000
trusted library allocation
page read and write
1F2D3460000
trusted library allocation
page read and write
1F2D1CE7000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2D1F8C000
trusted library allocation
page read and write
1F2C0131000
heap
page read and write
1F2D5B87000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C0107000
heap
page read and write
1F2CA7C8000
trusted library allocation
page read and write
1F2CAA02000
trusted library allocation
page read and write
1F20EEB9000
heap
page read and write
1F2D5AF5000
trusted library allocation
page read and write
1F2D54CA000
trusted library allocation
page read and write
1F2CAA40000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F20DED2000
unclassified section
page read and write
1F2C011D000
heap
page read and write
1F2CACE5000
trusted library allocation
page read and write
1F20ED00000
trusted library allocation
page read and write
1F2C4A90000
trusted library allocation
page read and write
1F2CC912000
trusted library allocation
page read and write
1F20E09F000
trusted library allocation
page read and write
1F2D347B000
trusted library allocation
page read and write
1F2C6AEB000
trusted library allocation
page read and write
1F2CB93C000
trusted library allocation
page read and write
1F2C954D000
trusted library allocation
page read and write
1F2D3E0C000
trusted library allocation
page read and write
1F2C9040000
trusted library allocation
page read and write
1F2D5AF5000
trusted library allocation
page read and write
1F2C95FC000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
17A28600000
trusted library allocation
page read and write
1F20EEE0000
heap
page read and write
7ED93FE000
stack
page read and write
71C000
unkown
page readonly
1F2C99BB000
trusted library allocation
page read and write
1F2C4AEF000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CB405000
trusted library allocation
page read and write
1F2CAC73000
trusted library allocation
page read and write
1F2C00BE000
heap
page read and write
1F2CD47F000
trusted library allocation
page read and write
1F2C66A0000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CAEC2000
trusted library allocation
page read and write
250B85A0000
heap
page read and write
1F2CB144000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D59D4000
trusted library allocation
page read and write
1F2C9751000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F2C00BA000
heap
page read and write
1110000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2D1FEA000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2C0100000
heap
page read and write
1F2C99F0000
trusted library allocation
page read and write
1F2D54BB000
trusted library allocation
page read and write
1F2D59B6000
trusted library allocation
page read and write
1F2D18CC000
trusted library allocation
page read and write
1F2C995D000
trusted library allocation
page read and write
1F2C00C2000
heap
page read and write
1F2CAC4C000
trusted library allocation
page read and write
1F2C9481000
trusted library allocation
page read and write
1F2D34EE000
trusted library allocation
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
1F2D18E3000
trusted library allocation
page read and write
1F20EEE9000
heap
page read and write
11C1000
heap
page read and write
1F2CBAC9000
trusted library allocation
page read and write
1F2D1C80000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2C55B9000
trusted library allocation
page read and write
1F2D6624000
trusted library allocation
page read and write
1F2C669A000
trusted library allocation
page read and write
1F2CABF5000
trusted library allocation
page read and write
1F2CC8B4000
trusted library allocation
page read and write
1F2C6923000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0135000
heap
page read and write
1F2CABCA000
trusted library allocation
page read and write
1F2C6C68000
heap
page read and write
7F171D000
stack
page read and write
1F2C00A0000
heap
page read and write
1F2C00B6000
heap
page read and write
1F2D1C70000
trusted library allocation
page read and write
1F2CAE63000
trusted library allocation
page read and write
1F2C011E000
heap
page read and write
1F2CAD72000
trusted library allocation
page read and write
1F2C00C3000
heap
page read and write
1F20E0F3000
trusted library allocation
page read and write
1F2CA6D3000
trusted library allocation
page read and write
1F2CA85C000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D1E0B000
trusted library allocation
page read and write
1F2CAD6D000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2CB4AD000
trusted library allocation
page read and write
1F2CAC4E000
trusted library allocation
page read and write
1F20EF45000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2D1CF0000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
1F2C9991000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CB438000
trusted library allocation
page read and write
1F2CAEEF000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
17A28613000
trusted library allocation
page read and write
1F2D1ED5000
trusted library allocation
page read and write
11D2000
heap
page read and write
1F2C99EA000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2CD4A9000
trusted library allocation
page read and write
1F2D34D8000
trusted library allocation
page read and write
1F2C99E0000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2C9456000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2C97E6000
trusted library allocation
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2CC916000
trusted library allocation
page read and write
1180000
heap
page read and write
1F20EEE0000
heap
page read and write
1F2CAED5000
trusted library allocation
page read and write
1F2D1F50000
trusted library allocation
page read and write
1F2CB485000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C9EE8000
trusted library allocation
page read and write
1F20EEA8000
heap
page read and write
1F2C99B9000
trusted library allocation
page read and write
1F2D6338000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2CB482000
trusted library allocation
page read and write
250B84EA000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2CB0D0000
trusted library allocation
page read and write
1F2D4CAE000
trusted library allocation
page read and write
1F2CAEEF000
trusted library allocation
page read and write
1F2C99F0000
trusted library allocation
page read and write
7EDA3FF000
stack
page read and write
17A286DB000
trusted library allocation
page read and write
17A28674000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
1F2C9907000
trusted library allocation
page read and write
1F2C0134000
heap
page read and write
1F2CCBDF000
trusted library allocation
page read and write
1F2D5BA5000
trusted library allocation
page read and write
1F2D18E0000
trusted library allocation
page read and write
1F20EF18000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2C0116000
heap
page read and write
1F2CB0E2000
trusted library allocation
page read and write
1F20EEE8000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2D19E6000
trusted library allocation
page read and write
1F20E16C000
unkown
page execute read
1F2C9542000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C9433000
trusted library allocation
page read and write
1F2C996D000
trusted library allocation
page read and write
1F2C94FC000
trusted library allocation
page read and write
1F2CB487000
trusted library allocation
page read and write
11B4000
heap
page read and write
1F2C993E000
trusted library allocation
page read and write
1F2C9EFB000
trusted library allocation
page read and write
1F2CB49E000
trusted library allocation
page read and write
1F2CAADC000
trusted library allocation
page read and write
1F2C992B000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2C00D3000
heap
page read and write
1F2C0131000
heap
page read and write
17A28666000
trusted library allocation
page read and write
11A9000
heap
page read and write
1F2CAD5A000
trusted library allocation
page read and write
1F2D1E27000
trusted library allocation
page read and write
1F2D20A9000
trusted library allocation
page read and write
1F2CA653000
trusted library allocation
page read and write
1F2C9A6E000
trusted library allocation
page read and write
1F2CAAA7000
trusted library allocation
page read and write
1F20EF3C000
heap
page read and write
1F2C00BB000
heap
page read and write
17A28668000
trusted library allocation
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2CC8DA000
trusted library allocation
page read and write
1F2CAFA3000
trusted library allocation
page read and write
1F2C68BE000
trusted library allocation
page read and write
1F2C944F000
trusted library allocation
page read and write
1F2CA6B6000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2D5E82000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2C00C3000
heap
page read and write
1F2D349C000
trusted library allocation
page read and write
FB6757E000
unkown
page readonly
1F2C012B000
heap
page read and write
1F2CACE3000
trusted library allocation
page read and write
1F2C0125000
heap
page read and write
1F2CA7DA000
trusted library allocation
page read and write
250B8A0B000
trusted library allocation
page read and write
1F2C954A000
trusted library allocation
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2CB0FB000
trusted library allocation
page read and write
250B8812000
trusted library allocation
page read and write
1F2D345E000
trusted library allocation
page read and write
1F2D4CB6000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2D63CE000
trusted library allocation
page read and write
1F2C6AFE000
trusted library allocation
page read and write
1F2CB498000
trusted library allocation
page read and write
17A28649000
trusted library allocation
page read and write
1F2CA6F2000
trusted library allocation
page read and write
1F2D4F89000
trusted library allocation
page read and write
1F2CB0C8000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2D5F12000
heap
page read and write
1F2CAAA7000
trusted library allocation
page read and write
1F2C682C000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D1EDC000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0116000
heap
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C689D000
trusted library allocation
page read and write
1F2CAD2A000
trusted library allocation
page read and write
1F2CAECE000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
250B8A00000
trusted library allocation
page read and write
1F2CBDC5000
trusted library allocation
page read and write
1F20E1B0000
heap
page read and write
1F2C00A9000
heap
page read and write
1F2D1E4B000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F20EF5A000
heap
page read and write
1F2D5E8D000
heap
page read and write
1F2CACD7000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2C97DC000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
24F3C468000
heap
page read and write
250B882E000
trusted library allocation
page read and write
1F2D1E3E000
trusted library allocation
page read and write
1F2D4800000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D1BCB000
trusted library allocation
page read and write
1F2C5513000
trusted library allocation
page read and write
1F2C65D9000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2C9BCB000
trusted library allocation
page read and write
1F20EE60000
heap
page read and write
1F2C9C12000
trusted library allocation
page read and write
1F2CAB98000
trusted library allocation
page read and write
1F2D546A000
trusted library allocation
page read and write
1F2CAB82000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
5A5C1DE000
unkown
page readonly
1F2D5EA3000
heap
page read and write
1F2CADFE000
trusted library allocation
page read and write
1F2C8FFE000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2CB423000
trusted library allocation
page read and write
1F2CAC73000
trusted library allocation
page read and write
1F2C0124000
heap
page read and write
1F2C551A000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2D1FA7000
trusted library allocation
page read and write
1F20DE90000
heap
page read and write
1F2D19D7000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CAED5000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
1F2D1BB5000
trusted library allocation
page read and write
1F2CA648000
trusted library allocation
page read and write
1F2D205E000
trusted library allocation
page read and write
1F2D1E6A000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2C9473000
trusted library allocation
page read and write
1F2C9CC0000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2C00B1000
heap
page read and write
1F2C00E7000
heap
page read and write
1F2CAEC2000
trusted library allocation
page read and write
1F20DE00000
heap
page read and write
1F2C8F14000
trusted library allocation
page read and write
1F2C683A000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C9779000
trusted library allocation
page read and write
1F2D5E87000
heap
page read and write
1F2C00B2000
heap
page read and write
1F2CAEB2000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D5E71000
heap
page read and write
1F2D1E8A000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CAD30000
trusted library allocation
page read and write
1F2CB9C1000
trusted library allocation
page read and write
250B84D1000
remote allocation
page execute read
1F2CAAC7000
trusted library allocation
page read and write
1F2C97EF000
trusted library allocation
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2CA8FB000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D19BD000
trusted library allocation
page read and write
1F2C9B85000
trusted library allocation
page read and write
1F2D19E2000
trusted library allocation
page read and write
1F20EF78000
heap
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2D3421000
trusted library allocation
page read and write
1F2D2024000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2C8FAC000
trusted library allocation
page read and write
1F2CACC7000
trusted library allocation
page read and write
1F2C68BE000
trusted library allocation
page read and write
1F2D1E9C000
trusted library allocation
page read and write
1F2C99B0000
trusted library allocation
page read and write
1F2D2045000
trusted library allocation
page read and write
1F2C6C96000
heap
page read and write
1F2D3491000
trusted library allocation
page read and write
17A28483000
heap
page read and write
1F2C687A000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C00B4000
heap
page read and write
1F2D20A9000
trusted library allocation
page read and write
1F20EF59000
heap
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2CAFFE000
trusted library allocation
page read and write
1F2CB449000
trusted library allocation
page read and write
1F2CA860000
trusted library allocation
page read and write
FB6416E000
unkown
page readonly
5A5F3FE000
unkown
page readonly
1F2CCA9E000
trusted library allocation
page read and write
1F2CB42E000
trusted library allocation
page read and write
1F2C00A7000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2C00B3000
heap
page read and write
1F2C4AEF000
trusted library allocation
page read and write
1F2CAEE0000
trusted library allocation
page read and write
1F2CCC84000
trusted library allocation
page read and write
1F2D19BB000
trusted library allocation
page read and write
1F2C009F000
heap
page read and write
1F2CC8EF000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2CB822000
trusted library allocation
page read and write
FB674FE000
unkown
page readonly
1F2C6870000
trusted library allocation
page read and write
1F2C9353000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D5B72000
trusted library allocation
page read and write
1F2C9AE7000
trusted library allocation
page read and write
1F2CB0F6000
trusted library allocation
page read and write
1F2D4CB6000
trusted library allocation
page read and write
1F2D19F7000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2C00B4000
heap
page read and write
1F2CAC61000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2D1CB8000
trusted library allocation
page read and write
1F2D341E000
trusted library allocation
page read and write
1F2CA8A7000
trusted library allocation
page read and write
17A28603000
trusted library allocation
page read and write
1F20EE8A000
heap
page read and write
1F2C8FCB000
trusted library allocation
page read and write
1F2CB935000
trusted library allocation
page read and write
1F2C5544000
trusted library allocation
page read and write
1F2C99F3000
trusted library allocation
page read and write
1F2CB967000
trusted library allocation
page read and write
24F3C46B000
heap
page read and write
1F2C8FC8000
trusted library allocation
page read and write
1F2D3AC0000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
681000
unkown
page execute read
250B86CF000
unclassified section
page read and write
1F2D5E9D000
heap
page read and write
1F2CAE43000
trusted library allocation
page read and write
1F2D1BCE000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2D20C4000
trusted library allocation
page read and write
17A28676000
trusted library allocation
page read and write
1F2C8FB6000
trusted library allocation
page read and write
1F2D1AC4000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0122000
heap
page read and write
250B885B000
trusted library allocation
page read and write
1F2D1E91000
trusted library allocation
page read and write
1F2C6869000
trusted library allocation
page read and write
1F2CBAD5000
trusted library allocation
page read and write
1F2C8FCD000
trusted library allocation
page read and write
1F20E100000
trusted library section
page readonly
1F2C00AA000
heap
page read and write
1F2CAC2B000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C0140000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2D1885000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CAAE2000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2D3478000
trusted library allocation
page read and write
1F2D56E5000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2C00CB000
heap
page read and write
1F2C011B000
heap
page read and write
1F2CB133000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2CA6D3000
trusted library allocation
page read and write
1F2D20EC000
trusted library allocation
page read and write
11D5000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2CB147000
trusted library allocation
page read and write
1F2C99B0000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2C99A0000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2CAEAF000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
17A284B0000
unclassified section
page read and write
1F2CAD5D000
trusted library allocation
page read and write
1F20EEE0000
heap
page read and write
1F2C0116000
heap
page read and write
FB6753E000
stack
page read and write
1F2C97DD000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C9551000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CA8E3000
trusted library allocation
page read and write
1F20E081000
trusted library allocation
page read and write
1F2D34E2000
trusted library allocation
page read and write
1F2D4C9A000
trusted library allocation
page read and write
1F2CA7F2000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2C0100000
heap
page read and write
1F2D3462000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2CAE98000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CB48E000
trusted library allocation
page read and write
1F2C68A5000
trusted library allocation
page read and write
11CF000
heap
page read and write
1F2C011D000
heap
page read and write
1F2CA64E000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C00D4000
heap
page read and write
17A284B2000
unclassified section
page read and write
1F2D5B4D000
trusted library allocation
page read and write
1F2D205E000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2CAEF3000
trusted library allocation
page read and write
1F2C94EE000
trusted library allocation
page read and write
1F2C9477000
trusted library allocation
page read and write
1F2CAC37000
trusted library allocation
page read and write
1F2D54BD000
trusted library allocation
page read and write
1F2CC982000
trusted library allocation
page read and write
1F2D1A71000
trusted library allocation
page read and write
1F2D4CAE000
trusted library allocation
page read and write
1F2C66FB000
trusted library allocation
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2CB0D0000
trusted library allocation
page read and write
1F2D3EAC000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2CAE7F000
trusted library allocation
page read and write
1F2D5EA3000
heap
page read and write
1F2C9452000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CADF8000
trusted library allocation
page read and write
FB66C7E000
stack
page read and write
1F2CC87A000
trusted library allocation
page read and write
1F2D1EF0000
trusted library allocation
page read and write
17A284A0000
heap
page readonly
17A28624000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2C9AC9000
trusted library allocation
page read and write
3A81000
heap
page read and write
1F2CA810000
trusted library allocation
page read and write
1F2C7B1A000
trusted library allocation
page read and write
1F2CA8E7000
trusted library allocation
page read and write
1F2D1F77000
trusted library allocation
page read and write
1F2D5E78000
heap
page read and write
7F427E000
stack
page read and write
1F2CADAE000
trusted library allocation
page read and write
1F2D3E67000
trusted library allocation
page read and write
1F2CB49E000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2D1AED000
trusted library allocation
page read and write
1F2CB980000
trusted library allocation
page read and write
17A28903000
trusted library allocation
page read and write
1F2C8FA9000
trusted library allocation
page read and write
1F2C8FDE000
trusted library allocation
page read and write
1F2D1964000
trusted library allocation
page read and write
1F2D5E87000
heap
page read and write
1F2D59C2000
trusted library allocation
page read and write
1F2C9A56000
trusted library allocation
page read and write
1F2C68C7000
trusted library allocation
page read and write
1F20EF2E000
heap
page read and write
1F2C00D3000
heap
page read and write
1F2C996D000
trusted library allocation
page read and write
1F2D4C96000
trusted library allocation
page read and write
1F2CA712000
trusted library allocation
page read and write
1F2CC9AA000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D1F23000
trusted library allocation
page read and write
250B8896000
trusted library allocation
page read and write
1F2CAEBF000
trusted library allocation
page read and write
1F2D340A000
trusted library allocation
page read and write
1F2D1E7E000
trusted library allocation
page read and write
1F2D5EA3000
heap
page read and write
1F2C97FD000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2D3476000
trusted library allocation
page read and write
1F20E170000
unkown
page execute read
1F2CAD57000
trusted library allocation
page read and write
1F2D189D000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F20E079000
trusted library allocation
page read and write
1F2D1CEC000
trusted library allocation
page read and write
1F2CACFC000
trusted library allocation
page read and write
1F20EEFC000
heap
page read and write
1F2D5EA0000
heap
page read and write
1F2D5E01000
heap
page read and write
1F2D1ED5000
trusted library allocation
page read and write
1F2CA81D000
trusted library allocation
page read and write
1F2D5485000
trusted library allocation
page read and write
1F2C692D000
trusted library allocation
page read and write
1F2C68F6000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2D1AC2000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CAAAF000
trusted library allocation
page read and write
1F2CAEAD000
trusted library allocation
page read and write
1F2CA715000
trusted library allocation
page read and write
1F2D1EE3000
trusted library allocation
page read and write
1F2CC897000
trusted library allocation
page read and write
A4B39FE000
stack
page read and write
1F2CC9FC000
trusted library allocation
page read and write
11B7000
heap
page read and write
DFE000
stack
page read and write
1F2C4ADF000
trusted library allocation
page read and write
1F2C9487000
trusted library allocation
page read and write
FAE000
stack
page read and write
1F2C68BC000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2CAAAF000
trusted library allocation
page read and write
1F2C9967000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C6A1F000
trusted library allocation
page read and write
1F2CD49D000
trusted library allocation
page read and write
1F2CB89B000
trusted library allocation
page read and write
1F2CA864000
trusted library allocation
page read and write
1F2C94EC000
trusted library allocation
page read and write
24F3C452000
heap
page read and write
1F2D1E46000
trusted library allocation
page read and write
1F2CAE77000
trusted library allocation
page read and write
1F2CC87C000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2CAC9C000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D59D9000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2D190D000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C0127000
heap
page read and write
1F2CA8E1000
trusted library allocation
page read and write
250B89D4000
heap
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2CAD8A000
trusted library allocation
page read and write
1F2C00B3000
heap
page read and write
1F2D1E86000
trusted library allocation
page read and write
1F2C995B000
trusted library allocation
page read and write
1F2CAD90000
trusted library allocation
page read and write
1F2CA6D4000
trusted library allocation
page read and write
1F2CD476000
trusted library allocation
page read and write
1F2D341E000
trusted library allocation
page read and write
1F2CB4AA000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D1E4B000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2C00AA000
heap
page read and write
1F2C55AE000
trusted library allocation
page read and write
1F2C94FC000
trusted library allocation
page read and write
1F2C971A000
trusted library allocation
page read and write
1F2D1AF1000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
1F2CCAF9000
trusted library allocation
page read and write
1F2CB866000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F20EF59000
heap
page read and write
1F2C9468000
trusted library allocation
page read and write
1F20E720000
heap
page read and write
1F2CAA2B000
trusted library allocation
page read and write
1F2D1E76000
trusted library allocation
page read and write
1F2CAACC000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2D2057000
trusted library allocation
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2CAA47000
trusted library allocation
page read and write
11AA000
heap
page read and write
1F2D3428000
trusted library allocation
page read and write
1F2CA7F6000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2D2062000
trusted library allocation
page read and write
1F2C013C000
heap
page read and write
1F2CA84F000
trusted library allocation
page read and write
1F2C00D5000
heap
page read and write
1F2CAD76000
trusted library allocation
page read and write
1F2C0131000
heap
page read and write
250B89D0000
heap
page read and write
1F2D54BF000
trusted library allocation
page read and write
1F2C013F000
heap
page read and write
1F2D1E8F000
trusted library allocation
page read and write
1F2CB49E000
trusted library allocation
page read and write
1F20EF78000
heap
page read and write
1F2CB830000
trusted library allocation
page read and write
1F2D19E2000
trusted library allocation
page read and write
1F2D1E52000
trusted library allocation
page read and write
17A28790000
heap
page read and write
1F2D54EB000
trusted library allocation
page read and write
1F2C00A2000
heap
page read and write
1F2CA812000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C0107000
heap
page read and write
7F17DE000
unkown
page readonly
1F2CAC31000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CD49D000
trusted library allocation
page read and write
1F2C7B5D000
trusted library allocation
page read and write
1F2CB932000
trusted library allocation
page read and write
1F2C9492000
trusted library allocation
page read and write
1F2CB1F8000
trusted library allocation
page read and write
1F2C0125000
heap
page read and write
1F2D34E2000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D349A000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2CAD96000
trusted library allocation
page read and write
24F3DFA0000
heap
page read and write
1F2CA864000
trusted library allocation
page read and write
1F2CD490000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C97F4000
trusted library allocation
page read and write
1F2CD467000
trusted library allocation
page read and write
E90000
heap
page read and write
1F2C8FF5000
trusted library allocation
page read and write
1F2CBE51000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
1F2C0140000
heap
page read and write
1F2CAEAF000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
250B85A3000
heap
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2CAEE2000
trusted library allocation
page read and write
1F2D6205000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CD464000
trusted library allocation
page read and write
1F2CA6A0000
trusted library allocation
page read and write
1F2CADD8000
trusted library allocation
page read and write
1F2D1E97000
trusted library allocation
page read and write
1F2CA8E3000
trusted library allocation
page read and write
1F2CA7FD000
trusted library allocation
page read and write
1F2C5526000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2D5E71000
heap
page read and write
1F2C0140000
heap
page read and write
1F2D1E73000
trusted library allocation
page read and write
1F2D345E000
trusted library allocation
page read and write
1F2C9CCE000
trusted library allocation
page read and write
17A28611000
trusted library allocation
page read and write
1F2D5A96000
trusted library allocation
page read and write
1F2CAE77000
trusted library allocation
page read and write
1F2CAD6F000
trusted library allocation
page read and write
24F3DFB6000
heap
page read and write
1F2D5ADF000
trusted library allocation
page read and write
1F2D5E0E000
heap
page read and write
1F2D20CF000
trusted library allocation
page read and write
1F2CAEAA000
trusted library allocation
page read and write
1F2CB0E2000
trusted library allocation
page read and write
1F2CADE7000
trusted library allocation
page read and write
1F2C99C3000
trusted library allocation
page read and write
11A1000
heap
page read and write
1F2D1AFC000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2C97EF000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CB935000
trusted library allocation
page read and write
27D6A000000
trusted library allocation
page read and write
1F20E061000
trusted library allocation
page read and write
1F2CACFC000
trusted library allocation
page read and write
1F2CAD4F000
trusted library allocation
page read and write
1F2D341A000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C00C0000
heap
page read and write
1F2C0107000
heap
page read and write
1F2C7B30000
trusted library allocation
page read and write
1F2CD4A9000
trusted library allocation
page read and write
1F2CB4B6000
trusted library allocation
page read and write
250B8A1F000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2D1891000
trusted library allocation
page read and write
1F2CA706000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2CAA28000
trusted library allocation
page read and write
1F2CAC95000
trusted library allocation
page read and write
1F2CB4A6000
trusted library allocation
page read and write
1F2D6611000
trusted library allocation
page read and write
1F2C9325000
trusted library allocation
page read and write
1F2CD450000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
1F2CA7AD000
trusted library allocation
page read and write
1F2CB47F000
trusted library allocation
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2CBAEB000
trusted library allocation
page read and write
1F2C99EA000
trusted library allocation
page read and write
1F2D5E7A000
heap
page read and write
1F2CA8B6000
trusted library allocation
page read and write
1F2C8FF5000
trusted library allocation
page read and write
1F2CB4A5000
trusted library allocation
page read and write
1F2C9EA4000
trusted library allocation
page read and write
1F20EEE1000
heap
page read and write
1F2C6863000
trusted library allocation
page read and write
1F2C6649000
trusted library allocation
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2C011F000
heap
page read and write
1F2CAD9B000
trusted library allocation
page read and write
1F2D209F000
trusted library allocation
page read and write
1F2D3435000
trusted library allocation
page read and write
1F2D1EC4000
trusted library allocation
page read and write
1F2D3E93000
trusted library allocation
page read and write
1F2CB4B6000
trusted library allocation
page read and write
1F20EE09000
heap
page read and write
1F2CABEB000
trusted library allocation
page read and write
1F2CAD6D000
trusted library allocation
page read and write
1F20ED15000
trusted library allocation
page read and write
1F2C6CCE000
heap
page read and write
7EDABFE000
stack
page read and write
1F2D1EF3000
trusted library allocation
page read and write
1F2D1AB4000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
5A5DBFE000
stack
page read and write
1F2CAA5D000
trusted library allocation
page read and write
1F2CAD5D000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CB15A000
trusted library allocation
page read and write
1F2C9558000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2C00D3000
heap
page read and write
1F2C0100000
heap
page read and write
1F2D342B000
trusted library allocation
page read and write
1F2CA80F000
trusted library allocation
page read and write
1F2C990C000
trusted library allocation
page read and write
1F2D3EA3000
trusted library allocation
page read and write
1F2C66A0000
trusted library allocation
page read and write
1F2D20FC000
trusted library allocation
page read and write
1F2D1A7F000
trusted library allocation
page read and write
1F2D19DC000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2C99BB000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2D1FDF000
trusted library allocation
page read and write
1F2CAE98000
trusted library allocation
page read and write
1F2C6898000
trusted library allocation
page read and write
1F2C9950000
trusted library allocation
page read and write
17A28780000
heap
page read and write
1F2C6CDB000
heap
page read and write
1F2C9475000
trusted library allocation
page read and write
1F2CB8E4000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2D208D000
trusted library allocation
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2D3478000
trusted library allocation
page read and write
1F2CADBE000
trusted library allocation
page read and write
1F2C9497000
trusted library allocation
page read and write
1F2D3476000
trusted library allocation
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F2CAA40000
trusted library allocation
page read and write
350ED601000
trusted library allocation
page execute read
1F2CAEFC000
trusted library allocation
page read and write
1F2C66FB000
trusted library allocation
page read and write
1F2C996D000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C946E000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CAA18000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CB4A2000
trusted library allocation
page read and write
1F2CC93A000
trusted library allocation
page read and write
1F2CBD74000
trusted library allocation
page read and write
1F2CBB00000
trusted library allocation
page read and write
250B84E0000
heap
page read and write
1F2C6877000
trusted library allocation
page read and write
1F2D54EB000
trusted library allocation
page read and write
1F2D344A000
trusted library allocation
page read and write
1F20E710000
heap
page read and write
1F2CAA28000
trusted library allocation
page read and write
1F2D3EE4000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CAD6F000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2C9CC5000
trusted library allocation
page read and write
1F2D208D000
trusted library allocation
page read and write
17A28480000
heap
page read and write
1F2CADAE000
trusted library allocation
page read and write
1F2D1899000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D1E60000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C6870000
trusted library allocation
page read and write
1F2CAC37000
trusted library allocation
page read and write
1F2CCC96000
trusted library allocation
page read and write
1F2CADA1000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F20DED0000
unclassified section
page read and write
17A282D0000
unclassified section
page readonly
1F2C011D000
heap
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2D3421000
trusted library allocation
page read and write
1F2C9498000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C687A000
trusted library allocation
page read and write
1F2CD460000
trusted library allocation
page read and write
1F2CAD0A000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
7F16DE000
unkown
page readonly
1F2CAD67000
trusted library allocation
page read and write
1F2C953F000
trusted library allocation
page read and write
1F2D3453000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D1EC4000
trusted library allocation
page read and write
1F2CAA1F000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C68E5000
trusted library allocation
page read and write
1F2D349E000
trusted library allocation
page read and write
1F2D1CA7000
trusted library allocation
page read and write
1F20EEE3000
heap
page read and write
1F2D1EED000
trusted library allocation
page read and write
1F2CAD9E000
trusted library allocation
page read and write
1F2C6567000
trusted library allocation
page read and write
1F2C945A000
trusted library allocation
page read and write
1F2CB1D7000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D19EC000
trusted library allocation
page read and write
1F2D1AFC000
trusted library allocation
page read and write
1F2CB87A000
trusted library allocation
page read and write
1F2D205A000
trusted library allocation
page read and write
1F2D5E35000
heap
page read and write
1F2D1EDB000
trusted library allocation
page read and write
17A28240000
unclassified section
page readonly
1F2C00BB000
heap
page read and write
11AA000
heap
page read and write
11B3000
heap
page read and write
1F2CA7C6000
trusted library allocation
page read and write
7F31FE000
stack
page read and write
1F2C68C1000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2D1E35000
trusted library allocation
page read and write
1F2D349A000
trusted library allocation
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2D1ED5000
trusted library allocation
page read and write
1F2CAD77000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2C9465000
trusted library allocation
page read and write
1F2CB4B1000
trusted library allocation
page read and write
1F2CAE23000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2D1A29000
trusted library allocation
page read and write
1F2CAD67000
trusted library allocation
page read and write
1F2C95C1000
trusted library allocation
page read and write
1F2CB95B000
trusted library allocation
page read and write
1F2CCCA1000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2CA7ED000
trusted library allocation
page read and write
1F2C55B1000
trusted library allocation
page read and write
1F20E0C7000
trusted library allocation
page read and write
1F2C68C1000
trusted library allocation
page read and write
1F2D636D000
trusted library allocation
page read and write
250B8A15000
trusted library allocation
page read and write
1F2C99FD000
trusted library allocation
page read and write
1F2CADFE000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2D1EB2000
trusted library allocation
page read and write
1F2CA653000
trusted library allocation
page read and write
1F20EE7D000
heap
page read and write
1F2CD4E9000
trusted library allocation
page read and write
1F2C946E000
trusted library allocation
page read and write
1F2D342D000
trusted library allocation
page read and write
1F2CB91B000
trusted library allocation
page read and write
1F2C940B000
trusted library allocation
page read and write
1F2CAD6F000
trusted library allocation
page read and write
1F2CC8CF000
trusted library allocation
page read and write
1F2CB951000
trusted library allocation
page read and write
1F2CAFFA000
trusted library allocation
page read and write
1F2CB4C8000
trusted library allocation
page read and write
1F2CAA4A000
trusted library allocation
page read and write
1F2D59C2000
trusted library allocation
page read and write
1F2D1A4D000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CBE1C000
trusted library allocation
page read and write
1F2CA6E8000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2CB44C000
trusted library allocation
page read and write
1F2C682E000
trusted library allocation
page read and write
1F2D1A1C000
trusted library allocation
page read and write
1F2D342B000
trusted library allocation
page read and write
1F2CAA3C000
trusted library allocation
page read and write
1F2CBDF5000
trusted library allocation
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F40000
heap
page read and write
1F2C99F0000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
1F2D1885000
trusted library allocation
page read and write
1F2D3EE4000
trusted library allocation
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2CD454000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2C6869000
trusted library allocation
page read and write
1F2CAFFE000
trusted library allocation
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2CAF23000
trusted library allocation
page read and write
1F2CAEB2000
trusted library allocation
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2D1ABA000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C00A9000
heap
page read and write
1F2CAC11000
trusted library allocation
page read and write
1F2C6AFE000
trusted library allocation
page read and write
1F2D34DB000
trusted library allocation
page read and write
1F2C6AD3000
trusted library allocation
page read and write
1F2C9961000
trusted library allocation
page read and write
1F2CB948000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2CBE7F000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2C6C68000
heap
page read and write
1F2CC8C7000
trusted library allocation
page read and write
1F2C68BC000
trusted library allocation
page read and write
1F2D1C6D000
trusted library allocation
page read and write
1F2D20CF000
trusted library allocation
page read and write
1F2D5E84000
heap
page read and write
1F2C8FE4000
trusted library allocation
page read and write
1F2C012A000
heap
page read and write
1F2CACD3000
trusted library allocation
page read and write
1F2D5EEE000
heap
page read and write
1F2D549E000
trusted library allocation
page read and write
1F20EF2B000
heap
page read and write
1F2CB8C3000
trusted library allocation
page read and write
1F2D19E6000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C011A000
heap
page read and write
1F20DF00000
trusted library allocation
page read and write
1F2C0127000
heap
page read and write
250B880D000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2D5E71000
heap
page read and write
1F2C9797000
trusted library allocation
page read and write
1F2CB45A000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2CA864000
trusted library allocation
page read and write
1F2D4CF5000
trusted library allocation
page read and write
1F2D2018000
trusted library allocation
page read and write
1F2D1BC6000
trusted library allocation
page read and write
1F2CCBF3000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2C00B4000
heap
page read and write
1F2CB13C000
trusted library allocation
page read and write
1F2CAD88000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
250B8898000
trusted library allocation
page read and write
FB641E8000
stack
page read and write
1F2C00C2000
heap
page read and write
1F2C011A000
heap
page read and write
1F2C00B5000
heap
page read and write
1F2CB487000
trusted library allocation
page read and write
1F20EE60000
heap
page read and write
1F2CB44C000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2D1E29000
trusted library allocation
page read and write
1F2C55C2000
trusted library allocation
page read and write
1F2CBEB4000
trusted library allocation
page read and write
1F2D4F89000
trusted library allocation
page read and write
1F2D202B000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CAD0C000
trusted library allocation
page read and write
1F2CABBF000
trusted library allocation
page read and write
1F2C0128000
heap
page read and write
1F2D3D6D000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C9926000
trusted library allocation
page read and write
1F2CD4D3000
trusted library allocation
page read and write
24F3C3D0000
heap
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C680B000
trusted library allocation
page read and write
1F2D20CF000
trusted library allocation
page read and write
1F2C00D3000
heap
page read and write
1F20DC80000
unclassified section
page readonly
1F2CADBE000
trusted library allocation
page read and write
1F2C9732000
trusted library allocation
page read and write
1F2CAD5A000
trusted library allocation
page read and write
1F2C00E2000
heap
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2D3479000
trusted library allocation
page read and write
1F2CB9D6000
trusted library allocation
page read and write
1F2CB151000
trusted library allocation
page read and write
1F2D4F48000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2CAD67000
trusted library allocation
page read and write
1F20EEE6000
heap
page read and write
1F2CAE68000
trusted library allocation
page read and write
1F2D1E76000
trusted library allocation
page read and write
1F2CA7C6000
trusted library allocation
page read and write
1F2D6618000
trusted library allocation
page read and write
1F2CB88C000
trusted library allocation
page read and write
1F2CCC79000
trusted library allocation
page read and write
1F2C6C68000
heap
page read and write
1F2CAC31000
trusted library allocation
page read and write
1F2D1C25000
trusted library allocation
page read and write
1F2C990C000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2CB4B1000
trusted library allocation
page read and write
FB6747E000
unkown
page readonly
1F20EE63000
heap
page read and write
17A2860C000
trusted library allocation
page read and write
1F2D56EC000
trusted library allocation
page read and write
1F2C904F000
trusted library allocation
page read and write
1F2C00A7000
heap
page read and write
1F2D54FD000
trusted library allocation
page read and write
1F2CCB68000
trusted library allocation
page read and write
1F20E076000
trusted library allocation
page read and write
74C000
unkown
page read and write
11B4000
heap
page read and write
1F2C00CB000
heap
page read and write
1F2C94FA000
trusted library allocation
page read and write
1F2C6896000
trusted library allocation
page read and write
1F2D18B5000
trusted library allocation
page read and write
1F2C689A000
trusted library allocation
page read and write
1F20DE9A000
heap
page read and write
1F2D545F000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CAD52000
trusted library allocation
page read and write
1F2C94F7000
trusted library allocation
page read and write
1F2D3476000
trusted library allocation
page read and write
1F2CAEB2000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2CA8F8000
trusted library allocation
page read and write
1F2C00B3000
heap
page read and write
1F2C011D000
heap
page read and write
1F2C66F9000
trusted library allocation
page read and write
1F2CB95B000
trusted library allocation
page read and write
1F2C8F96000
trusted library allocation
page read and write
1F2C686E000
trusted library allocation
page read and write
1F20E05F000
trusted library allocation
page read and write
1F20EE60000
heap
page read and write
1F2C00BA000
heap
page read and write
1F2CAFFE000
trusted library allocation
page read and write
1F2CA6BF000
trusted library allocation
page read and write
17A284BF000
unclassified section
page read and write
24F3DFB5000
heap
page read and write
1F2CAD67000
trusted library allocation
page read and write
1F2C0129000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2CBBD3000
trusted library allocation
page read and write
1F2CD45E000
trusted library allocation
page read and write
250B88E7000
trusted library allocation
page read and write
1F20DCF0000
unclassified section
page readonly
1F2CA810000
trusted library allocation
page read and write
17A282F0000
heap
page read and write
1F2CB01F000
trusted library allocation
page read and write
1F2CA9E6000
trusted library allocation
page read and write
1F2CA8D6000
trusted library allocation
page read and write
1F2C8F96000
trusted library allocation
page read and write
1F2CAA24000
trusted library allocation
page read and write
1F2C6864000
trusted library allocation
page read and write
1F2CC855000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CA8D9000
trusted library allocation
page read and write
1F2CB866000
trusted library allocation
page read and write
11A3000
heap
page read and write
1F2C0107000
heap
page read and write
1F2C97DC000
trusted library allocation
page read and write
1F2CAD6F000
trusted library allocation
page read and write
1F2CCCD0000
trusted library allocation
page read and write
1F2D1E0F000
trusted library allocation
page read and write
1F2CB96B000
trusted library allocation
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C00E7000
heap
page read and write
5A5C15E000
unkown
page readonly
1F2C6A79000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D1EDF000
trusted library allocation
page read and write
1F2D1A14000
trusted library allocation
page read and write
1F2CBEF0000
trusted library allocation
page read and write
1F2CB0F6000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2C00B3000
heap
page read and write
1F2D6620000
trusted library allocation
page read and write
1F2CAEF8000
trusted library allocation
page read and write
1F2CA66D000
trusted library allocation
page read and write
1F2C012F000
heap
page read and write
250B8800000
trusted library allocation
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2D3F33000
trusted library allocation
page read and write
1F2D1992000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2D59B6000
trusted library allocation
page read and write
1F2CCCE6000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
750000
unkown
page write copy
1F2CB13C000
trusted library allocation
page read and write
1F2CADD6000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2CAD87000
trusted library allocation
page read and write
1F2C00A9000
heap
page read and write
24F3DFBB000
heap
page read and write
1F2C0116000
heap
page read and write
1F2CB92D000
trusted library allocation
page read and write
1F2CAD9E000
trusted library allocation
page read and write
1F2CAEAB000
trusted library allocation
page read and write
17A2868F000
trusted library allocation
page read and write
1F2CBDC5000
trusted library allocation
page read and write
1F2C9461000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CADAE000
trusted library allocation
page read and write
1F2D1E63000
trusted library allocation
page read and write
1F2CB191000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2C9794000
trusted library allocation
page read and write
1F2CADBE000
trusted library allocation
page read and write
1F2C9910000
trusted library allocation
page read and write
1F2CB1EE000
trusted library allocation
page read and write
1F2CB44C000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F20E0E9000
trusted library allocation
page read and write
1F2D1891000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F2CAB3F000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2C97A7000
trusted library allocation
page read and write
1F2C99BB000
trusted library allocation
page read and write
1F2CD432000
trusted library allocation
page read and write
1F2CCCFD000
trusted library allocation
page read and write
1F2CAAC8000
trusted library allocation
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2D199E000
trusted library allocation
page read and write
1F2CACC9000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2CB967000
trusted library allocation
page read and write
1F2D20BB000
trusted library allocation
page read and write
1F2CB377000
trusted library allocation
page read and write
1F2CAD9B000
trusted library allocation
page read and write
1F2C99EA000
trusted library allocation
page read and write
1F2C68A6000
trusted library allocation
page read and write
1F2CAC9C000
trusted library allocation
page read and write
1F2C00C3000
heap
page read and write
1F2D34D4000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CD47F000
trusted library allocation
page read and write
17A28250000
unclassified section
page readonly
1F2C0116000
heap
page read and write
1F2CADF3000
trusted library allocation
page read and write
1F20E010000
trusted library allocation
page read and write
1F2CAD57000
trusted library allocation
page read and write
17A28700000
unclassified section
page readonly
1F2C00C8000
heap
page read and write
27D69D9A000
heap
page read and write
1F2CBD96000
trusted library allocation
page read and write
1F2CAD88000
trusted library allocation
page read and write
1F2C97CB000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C945A000
trusted library allocation
page read and write
1F2C99AE000
trusted library allocation
page read and write
1F2D5B87000
trusted library allocation
page read and write
1F2C55A9000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
250B86C0000
unclassified section
page read and write
1F2C7B42000
trusted library allocation
page read and write
5A5C0DE000
unkown
page readonly
1F2CB1A7000
trusted library allocation
page read and write
1F2D6267000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0124000
heap
page read and write
1F2D1C65000
trusted library allocation
page read and write
1F2C55E4000
trusted library allocation
page read and write
1F2C00D1000
heap
page read and write
1F2D342D000
trusted library allocation
page read and write
1F2CB455000
trusted library allocation
page read and write
1F2C542F000
trusted library allocation
page read and write
1F2C9583000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2C6ADA000
trusted library allocation
page read and write
1F2C9CA6000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F20EF6D000
heap
page read and write
1F2D5B8C000
trusted library allocation
page read and write
1F2D1F93000
trusted library allocation
page read and write
1F20EE6C000
heap
page read and write
1F2C0116000
heap
page read and write
1F2C66D2000
trusted library allocation
page read and write
1F2D59D1000
trusted library allocation
page read and write
1F2C9564000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
FB64BD8000
stack
page read and write
1F2D341E000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D3E4D000
trusted library allocation
page read and write
1F2D1E83000
trusted library allocation
page read and write
1F2CA8EC000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2CBECA000
trusted library allocation
page read and write
1F2CAA4F000
trusted library allocation
page read and write
1F2D1980000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C943A000
trusted library allocation
page read and write
17A2865F000
trusted library allocation
page read and write
1F2D1AFC000
trusted library allocation
page read and write
1F2D34FD000
trusted library allocation
page read and write
1F2CB498000
trusted library allocation
page read and write
1F2CADAB000
trusted library allocation
page read and write
1F2CD44E000
trusted library allocation
page read and write
1F2CD45E000
trusted library allocation
page read and write
1F2C6817000
trusted library allocation
page read and write
1F2C9BD0000
trusted library allocation
page read and write
1F2C6CC2000
heap
page read and write
1F2CB4CF000
trusted library allocation
page read and write
1F2CB482000
trusted library allocation
page read and write
1F2C97F3000
trusted library allocation
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2D5AB8000
trusted library allocation
page read and write
1F2C6A08000
trusted library allocation
page read and write
1F2CD48C000
trusted library allocation
page read and write
1F2CAC9C000
trusted library allocation
page read and write
1F2CAAAA000
trusted library allocation
page read and write
1F2D3AA7000
trusted library allocation
page read and write
1F2CA8EC000
trusted library allocation
page read and write
1F2D5E78000
heap
page read and write
1F2D349E000
trusted library allocation
page read and write
1F2CB95B000
trusted library allocation
page read and write
1F2C99E0000
trusted library allocation
page read and write
10F0000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2D59A7000
trusted library allocation
page read and write
1F2C9A72000
trusted library allocation
page read and write
1F2CB47B000
trusted library allocation
page read and write
1F2C8FA6000
trusted library allocation
page read and write
1F20EEE3000
heap
page read and write
1F2CB476000
trusted library allocation
page read and write
1F2D1CEC000
trusted library allocation
page read and write
1F2CAD89000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CB9BA000
trusted library allocation
page read and write
1F2CC943000
trusted library allocation
page read and write
1F2D1E52000
trusted library allocation
page read and write
1F2C8FF9000
trusted library allocation
page read and write
1F2CB411000
trusted library allocation
page read and write
1F2CABFD000
trusted library allocation
page read and write
1F2D340A000
trusted library allocation
page read and write
1F2D1FE4000
trusted library allocation
page read and write
1F2CA7E3000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
FB65BFE000
stack
page read and write
1F2D4C88000
trusted library allocation
page read and write
1F2CBEFE000
trusted library allocation
page read and write
1F2CAD9E000
trusted library allocation
page read and write
1F20EEFC000
heap
page read and write
1F2CA7A5000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2D5EA3000
heap
page read and write
1F2D347B000
trusted library allocation
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2D56C6000
trusted library allocation
page read and write
1F2D3E43000
trusted library allocation
page read and write
1F2C8F13000
trusted library allocation
page read and write
1F2D20FC000
trusted library allocation
page read and write
1F2C8FCB000
trusted library allocation
page read and write
1F2C00B3000
heap
page read and write
1F2C7B16000
trusted library allocation
page read and write
1F2C999E000
trusted library allocation
page read and write
1F2D1C95000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2CAB67000
trusted library allocation
page read and write
1F2D5B52000
trusted library allocation
page read and write
1F2C9707000
trusted library allocation
page read and write
250B88A9000
trusted library allocation
page read and write
1F2D5B87000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
FB6412C000
stack
page read and write
1F2D4CC8000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F2C00B3000
heap
page read and write
1F2D34FD000
trusted library allocation
page read and write
3730000
heap
page read and write
1F2C00A5000
heap
page read and write
1F2C68BE000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CD4B1000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C011B000
heap
page read and write
24F3C707000
trusted library allocation
page read and write
1F2CB860000
trusted library allocation
page read and write
1F2C686E000
trusted library allocation
page read and write
1F20EF6D000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2C00D3000
heap
page read and write
24F3C461000
heap
page read and write
27D69F10000
heap
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2CBDCD000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2D3E07000
trusted library allocation
page read and write
1F2C99F9000
trusted library allocation
page read and write
1F2CB4FA000
trusted library allocation
page read and write
E0E000
stack
page read and write
3A81000
heap
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2C68C1000
trusted library allocation
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F20EE60000
heap
page read and write
1F2CADDB000
trusted library allocation
page read and write
1F2D5E7B000
heap
page read and write
1F2D3E37000
trusted library allocation
page read and write
1F2D2055000
trusted library allocation
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2C9AD0000
trusted library allocation
page read and write
1F2D5E77000
heap
page read and write
1F2D56BD000
trusted library allocation
page read and write
1F2D3E05000
trusted library allocation
page read and write
1F2CAC95000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CB4A6000
trusted library allocation
page read and write
1F2C68F6000
trusted library allocation
page read and write
1F2CB86F000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F20EEEC000
heap
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2D205F000
trusted library allocation
page read and write
7F4A7E000
unkown
page readonly
1F2CA8F8000
trusted library allocation
page read and write
1F2CAD82000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2CAA39000
trusted library allocation
page read and write
1F2CB18F000
trusted library allocation
page read and write
1F2D59F2000
trusted library allocation
page read and write
1F2CABC3000
trusted library allocation
page read and write
1F2CB47C000
trusted library allocation
page read and write
7ED9BFE000
stack
page read and write
1F2C8F1D000
trusted library allocation
page read and write
1F2D3AB4000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2CAF93000
trusted library allocation
page read and write
1F2D5E71000
heap
page read and write
1F2CBD79000
trusted library allocation
page read and write
1F2D5E78000
heap
page read and write
1F2C8F65000
trusted library allocation
page read and write
1F2CAD6D000
trusted library allocation
page read and write
1F2C66D4000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2D3E48000
trusted library allocation
page read and write
1F2CACCF000
trusted library allocation
page read and write
250B8A11000
trusted library allocation
page read and write
1F2C953C000
trusted library allocation
page read and write
1F2C68C7000
trusted library allocation
page read and write
1F2C66A4000
trusted library allocation
page read and write
350ED6E1000
trusted library allocation
page execute read
1F2C00CB000
heap
page read and write
1F2C9310000
trusted library allocation
page read and write
1F2D1AC6000
trusted library allocation
page read and write
1F2C99BB000
trusted library allocation
page read and write
1F20EE7D000
heap
page read and write
1F2C9A48000
trusted library allocation
page read and write
5A5FBFE000
stack
page read and write
1F2CAA36000
trusted library allocation
page read and write
1F2D3DE5000
trusted library allocation
page read and write
1F2CAD54000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2D343D000
trusted library allocation
page read and write
24F3E150000
heap
page read and write
1F2C8FDD000
trusted library allocation
page read and write
1F2D1B98000
trusted library allocation
page read and write
1F2D5E72000
heap
page read and write
1F2CAA76000
trusted library allocation
page read and write
1F2C9477000
trusted library allocation
page read and write
1F2D189D000
trusted library allocation
page read and write
1F2CBAE0000
trusted library allocation
page read and write
1F2CAEE5000
trusted library allocation
page read and write
1F2C9EBF000
trusted library allocation
page read and write
1F2CA84F000
trusted library allocation
page read and write
1F2D20FC000
trusted library allocation
page read and write
1F2C0126000
heap
page read and write
1F2CAD6F000
trusted library allocation
page read and write
FB641EB000
stack
page read and write
1F2D3AA4000
trusted library allocation
page read and write
1F2CA7ED000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2D348B000
trusted library allocation
page read and write
1F2CB0D2000
trusted library allocation
page read and write
1F2C8F9A000
trusted library allocation
page read and write
1F2D341A000
trusted library allocation
page read and write
1F2C97EF000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D3479000
trusted library allocation
page read and write
1F2D1BAB000
trusted library allocation
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2D1E97000
trusted library allocation
page read and write
1F2CB0F3000
trusted library allocation
page read and write
1F20E003000
trusted library allocation
page read and write
1F2CAD2A000
trusted library allocation
page read and write
1F2CA8A7000
trusted library allocation
page read and write
1F2CA7C8000
trusted library allocation
page read and write
1F2C97EE000
trusted library allocation
page read and write
1F2C65FE000
trusted library allocation
page read and write
1F2D5E82000
heap
page read and write
250B8580000
heap
page read and write
1F2D1E66000
trusted library allocation
page read and write
1F2CD4FB000
trusted library allocation
page read and write
1F2C00C3000
heap
page read and write
1F2D188D000
trusted library allocation
page read and write
1F2D1B85000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2CAE98000
trusted library allocation
page read and write
1F2D349A000
trusted library allocation
page read and write
1F2CB080000
trusted library allocation
page read and write
1F2CCBDA000
trusted library allocation
page read and write
1F2C9B7B000
trusted library allocation
page read and write
1F2CACEF000
trusted library allocation
page read and write
1F2D19A5000
trusted library allocation
page read and write
1F2D5BBD000
trusted library allocation
page read and write
E3E000
stack
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C0100000
heap
page read and write
1F2C6C68000
heap
page read and write
1F2C011A000
heap
page read and write
11CC000
heap
page read and write
1F2D34DA000
trusted library allocation
page read and write
1F2D19FD000
trusted library allocation
page read and write
1F2D3F01000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D3E41000
trusted library allocation
page read and write
1F2CADBE000
trusted library allocation
page read and write
1F2D59E1000
trusted library allocation
page read and write
1F20EF00000
heap
page read and write
1F2C936E000
trusted library allocation
page read and write
1F2C0120000
heap
page read and write
1F2D5B35000
trusted library allocation
page read and write
1F2D2045000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C0129000
heap
page read and write
1F2C00AC000
heap
page read and write
27D6A007000
trusted library allocation
page read and write
1F2D1E76000
trusted library allocation
page read and write
1F2CA6E8000
trusted library allocation
page read and write
1F2CA6D8000
trusted library allocation
page read and write
1F2D3E50000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D5B66000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2CAD6D000
trusted library allocation
page read and write
1F2CC8C2000
trusted library allocation
page read and write
1F2CAEED000
trusted library allocation
page read and write
1F2C9961000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D20EC000
trusted library allocation
page read and write
1F2C99EE000
trusted library allocation
page read and write
1F2C0125000
heap
page read and write
1F2C00D2000
heap
page read and write
1F2CA8D9000
trusted library allocation
page read and write
1F2D3F2E000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0122000
heap
page read and write
1F2CB48E000
trusted library allocation
page read and write
1F2C55BB000
trusted library allocation
page read and write
1F2CBE88000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2CC8A2000
trusted library allocation
page read and write
1F2C6AF4000
trusted library allocation
page read and write
1F2C99E0000
trusted library allocation
page read and write
1F2D56D3000
trusted library allocation
page read and write
1F2CB487000
trusted library allocation
page read and write
1F2D1BB3000
trusted library allocation
page read and write
1F2CD483000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C00C8000
heap
page read and write
1F20EF78000
heap
page read and write
1F2CB860000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2CC86F000
trusted library allocation
page read and write
1F2D346A000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2C97E6000
trusted library allocation
page read and write
1F2C8F31000
trusted library allocation
page read and write
1F2CAD8A000
trusted library allocation
page read and write
1F2CCC51000
trusted library allocation
page read and write
1F2D1F29000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CAD71000
trusted library allocation
page read and write
1F2CB8A9000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C012D000
heap
page read and write
1F2CB8B6000
trusted library allocation
page read and write
1F2C68BC000
trusted library allocation
page read and write
1F2D1ED5000
trusted library allocation
page read and write
1F2D1B87000
trusted library allocation
page read and write
1F2C012F000
heap
page read and write
1F2C00B3000
heap
page read and write
1F20EF78000
heap
page read and write
1F2C97D5000
trusted library allocation
page read and write
1F2C00D3000
heap
page read and write
1F2D5AE8000
trusted library allocation
page read and write
1F2CA6D3000
trusted library allocation
page read and write
1F2C99F6000
trusted library allocation
page read and write
1F2C99B0000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2CC9B5000
trusted library allocation
page read and write
1F2C68DE000
trusted library allocation
page read and write
1F2D1EA3000
trusted library allocation
page read and write
1F2D1E97000
trusted library allocation
page read and write
1F2D1ECA000
trusted library allocation
page read and write
1F2CADF3000
trusted library allocation
page read and write
1F2D661E000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CAD9B000
trusted library allocation
page read and write
1F2D20A9000
trusted library allocation
page read and write
E1B000
stack
page read and write
74C000
unkown
page write copy
7F5A7E000
unkown
page readonly
1F2CC887000
trusted library allocation
page read and write
1F2CA715000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
11C1000
heap
page read and write
1F2C6A6F000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
250B8803000
trusted library allocation
page read and write
1F2D19E0000
trusted library allocation
page read and write
1F2C9581000
trusted library allocation
page read and write
1F2C6AD0000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F2CAAD5000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2CAE7F000
trusted library allocation
page read and write
1F2C9984000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2D5EA3000
heap
page read and write
1F2D634E000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C0121000
heap
page read and write
1F2CCCC2000
trusted library allocation
page read and write
1F2C65DE000
trusted library allocation
page read and write
1F2C955E000
trusted library allocation
page read and write
1F2CA8D9000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2D1E6A000
trusted library allocation
page read and write
1F2CADFE000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
250B86D0000
heap
page read and write
1F2CB0F3000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2D19EC000
trusted library allocation
page read and write
1F2C68A8000
trusted library allocation
page read and write
1F2CB439000
trusted library allocation
page read and write
1F2C947C000
trusted library allocation
page read and write
1F2CCCC2000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2D34DD000
trusted library allocation
page read and write
1F2D348B000
trusted library allocation
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2D661E000
trusted library allocation
page read and write
1F2C8FFE000
trusted library allocation
page read and write
1F2CD45A000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
1F2C00B2000
heap
page read and write
680000
unkown
page readonly
1F2C011A000
heap
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2D56B9000
trusted library allocation
page read and write
1F20EF78000
heap
page read and write
1F2CB4B6000
trusted library allocation
page read and write
1F2CB0CE000
trusted library allocation
page read and write
1F2C0126000
heap
page read and write
1F2CADD4000
trusted library allocation
page read and write
1F2CD46D000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2C6869000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
250B88C8000
trusted library allocation
page read and write
1F2D1EA3000
trusted library allocation
page read and write
1F2CD4F8000
trusted library allocation
page read and write
1F2C00A6000
heap
page read and write
1F2C9BC3000
trusted library allocation
page read and write
1F2CD46D000
trusted library allocation
page read and write
2EA13924000
trusted library allocation
page read and write
1F2C9572000
trusted library allocation
page read and write
1F2C00D3000
heap
page read and write
1F2CAC35000
trusted library allocation
page read and write
1F2C6A6F000
trusted library allocation
page read and write
17A282C6000
remote allocation
page execute read
1F2CBDA8000
trusted library allocation
page read and write
1F2D3D87000
trusted library allocation
page read and write
1F2CAA78000
trusted library allocation
page read and write
1F2CB4C3000
trusted library allocation
page read and write
1F2CB0F0000
trusted library allocation
page read and write
17A28A0C000
trusted library allocation
page read and write
1F2CAEEF000
trusted library allocation
page read and write
1F2C00BF000
heap
page read and write
1F2D3EC5000
trusted library allocation
page read and write
1F2C0123000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2C0121000
heap
page read and write
1F2CB935000
trusted library allocation
page read and write
1F2CAA69000
trusted library allocation
page read and write
1F2C994D000
trusted library allocation
page read and write
1F2CAEE2000
trusted library allocation
page read and write
1F2D342B000
trusted library allocation
page read and write
1F2CB151000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CB42D000
trusted library allocation
page read and write
1F2C0123000
heap
page read and write
1F2C0100000
heap
page read and write
1F2C984A000
trusted library allocation
page read and write
1F2CB1BB000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2C00C2000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2C0116000
heap
page read and write
1F2C0130000
heap
page read and write
1F2CD48C000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2CADAC000
trusted library allocation
page read and write
1F2C0127000
heap
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C0124000
heap
page read and write
1F2CAD9F000
trusted library allocation
page read and write
1F2D1A17000
trusted library allocation
page read and write
1F2C9828000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2CB9D6000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2C956A000
trusted library allocation
page read and write
24F3C44D000
heap
page read and write
1F20ED03000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2CB0C5000
trusted library allocation
page read and write
1F2CAD13000
trusted library allocation
page read and write
1F20EF6D000
heap
page read and write
1F2C0116000
heap
page read and write
1F2D1E22000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2C9B73000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F2C011A000
heap
page read and write
1F2D1ED8000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C0116000
heap
page read and write
1F2CACDA000
trusted library allocation
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2CACF1000
trusted library allocation
page read and write
1F2CA832000
trusted library allocation
page read and write
1F2CB455000
trusted library allocation
page read and write
1F2C99A0000
trusted library allocation
page read and write
1F2CA814000
trusted library allocation
page read and write
1F2CB498000
trusted library allocation
page read and write
1F2CC92B000
trusted library allocation
page read and write
17A28662000
trusted library allocation
page read and write
1F2C0137000
heap
page read and write
1F2D1F96000
trusted library allocation
page read and write
1F2D3460000
trusted library allocation
page read and write
1F2C00A9000
heap
page read and write
1F2C9468000
trusted library allocation
page read and write
1F2CCCA1000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2CD490000
trusted library allocation
page read and write
17A28670000
trusted library allocation
page read and write
1F2CB93C000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F20DE20000
heap
page read and write
1F2D20BB000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2D3E4D000
trusted library allocation
page read and write
1F2C012E000
heap
page read and write
1F2CAEB2000
trusted library allocation
page read and write
1F2CA7AD000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C97FB000
trusted library allocation
page read and write
1F2CAACB000
trusted library allocation
page read and write
1F2C65CF000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2C6898000
trusted library allocation
page read and write
1F2C8F31000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C6C96000
heap
page read and write
1F2CCBEA000
trusted library allocation
page read and write
1F2D4C8E000
trusted library allocation
page read and write
1F20E012000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2C0107000
heap
page read and write
1F2CA85C000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
11D8000
heap
page read and write
1F2D3E07000
trusted library allocation
page read and write
1F2C00B6000
heap
page read and write
FB67D7E000
stack
page read and write
1F2CAD57000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F20EE69000
heap
page read and write
1F2D3493000
trusted library allocation
page read and write
1F2C9999000
trusted library allocation
page read and write
1F2D1E6A000
trusted library allocation
page read and write
1F2C935B000
trusted library allocation
page read and write
1F2C00A5000
heap
page read and write
1F2C00B1000
heap
page read and write
1F2C00B5000
heap
page read and write
1F2C00AA000
heap
page read and write
1F2C66A4000
trusted library allocation
page read and write
1F2C953C000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2CB87A000
trusted library allocation
page read and write
A39000
stack
page read and write
1F2CABFD000
trusted library allocation
page read and write
1F2D1FF4000
trusted library allocation
page read and write
1F2CAD74000
trusted library allocation
page read and write
1F2D1881000
trusted library allocation
page read and write
1F20EEF2000
heap
page read and write
1F2CAC31000
trusted library allocation
page read and write
1F2C54FB000
trusted library allocation
page read and write
1F2D19B9000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2CC8F5000
trusted library allocation
page read and write
1F2C00BF000
heap
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2D3D86000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2D3AFD000
trusted library allocation
page read and write
1F2D193C000
trusted library allocation
page read and write
250B8450000
unclassified section
page readonly
1F2C00CB000
heap
page read and write
1F2C00B5000
heap
page read and write
11AF000
heap
page read and write
250B8879000
trusted library allocation
page read and write
1F2C68E0000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CC972000
trusted library allocation
page read and write
1F2C97DD000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2CD483000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2C011D000
heap
page read and write
24F3DFB0000
heap
page read and write
1F2CB8A9000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2CA621000
trusted library allocation
page read and write
1F2C00D3000
heap
page read and write
1F2CA8E1000
trusted library allocation
page read and write
1F2D1A54000
trusted library allocation
page read and write
1F2C6688000
trusted library allocation
page read and write
1F2C8F7C000
trusted library allocation
page read and write
1F2CAC5B000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2C0107000
heap
page read and write
1F2D5EA3000
heap
page read and write
1F2D19F0000
trusted library allocation
page read and write
1F2C68E0000
trusted library allocation
page read and write
1F2CA880000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C012C000
heap
page read and write
1F2CB9B4000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2CA6A0000
trusted library allocation
page read and write
17A2865D000
trusted library allocation
page read and write
11D5000
heap
page read and write
1F2D4200000
trusted library allocation
page read and write
1F2C0134000
heap
page read and write
1F2C00CB000
heap
page read and write
1F2D34DA000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
1F2D59C2000
trusted library allocation
page read and write
1F2D5EA7000
heap
page read and write
1F2D3EAC000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C97EF000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
5A5E3FE000
unkown
page readonly
1F20DC70000
unclassified section
page readonly
1F2C00B6000
heap
page read and write
1F2D4F7A000
trusted library allocation
page read and write
1F2CACE3000
trusted library allocation
page read and write
1F2CAB85000
trusted library allocation
page read and write
1F2D1B65000
trusted library allocation
page read and write
1F2CAA05000
trusted library allocation
page read and write
17A28900000
trusted library allocation
page read and write
1F2CADDB000
trusted library allocation
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2C6535000
trusted library allocation
page read and write
1F20EE69000
heap
page read and write
1F2D20CF000
trusted library allocation
page read and write
1F2D3443000
trusted library allocation
page read and write
1F2C4AC4000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2CA825000
trusted library allocation
page read and write
1F2C940D000
trusted library allocation
page read and write
1F2C0121000
heap
page read and write
1F2C0116000
heap
page read and write
1F2C8F3A000
trusted library allocation
page read and write
1F2CB4AF000
trusted library allocation
page read and write
1F2CC8F7000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2D1E07000
trusted library allocation
page read and write
1F2C009F000
heap
page read and write
1F2C00B5000
heap
page read and write
1F2C684A000
trusted library allocation
page read and write
1F2D4CF5000
trusted library allocation
page read and write
1F2D6622000
trusted library allocation
page read and write
1F2D5E54000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2CD47A000
trusted library allocation
page read and write
742000
unkown
page readonly
1F2D1BCD000
trusted library allocation
page read and write
1F2CE602000
trusted library allocation
page read and write
1F2C551E000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
FB663FE000
unkown
page readonly
1F2D1ED5000
trusted library allocation
page read and write
1F2C6A6C000
trusted library allocation
page read and write
1F2CAD90000
trusted library allocation
page read and write
1F2CAAB5000
trusted library allocation
page read and write
1F2CAA0A000
trusted library allocation
page read and write
1F2D1F77000
trusted library allocation
page read and write
1F2D1C9A000
trusted library allocation
page read and write
3A80000
heap
page read and write
1F20EEE8000
heap
page read and write
1F2C6869000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2CAA74000
trusted library allocation
page read and write
1F2D3482000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CABAC000
trusted library allocation
page read and write
1F2C8FB7000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2D20C4000
trusted library allocation
page read and write
1F2CB951000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CCBBE000
trusted library allocation
page read and write
1F2C971D000
trusted library allocation
page read and write
1F2CA8E1000
trusted library allocation
page read and write
1F2D3460000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2CC91A000
trusted library allocation
page read and write
1F2C97FE000
trusted library allocation
page read and write
1F2CC88E000
trusted library allocation
page read and write
1F2C54FE000
trusted library allocation
page read and write
1F2C0126000
heap
page read and write
7F527E000
stack
page read and write
1F2D1CDB000
trusted library allocation
page read and write
1F2C4A9E000
trusted library allocation
page read and write
197E000
stack
page read and write
1F20E0B2000
trusted library allocation
page read and write
1F20ED17000
trusted library allocation
page read and write
1F2CAD71000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C991B000
trusted library allocation
page read and write
383F3503000
trusted library allocation
page read and write
1F2CAB64000
trusted library allocation
page read and write
1F2CC8AE000
trusted library allocation
page read and write
1F2C9417000
trusted library allocation
page read and write
1F2D54A1000
trusted library allocation
page read and write
1F2C687A000
trusted library allocation
page read and write
1F2C013A000
heap
page read and write
1F2D34BF000
trusted library allocation
page read and write
250B8872000
trusted library allocation
page read and write
1F2D209F000
trusted library allocation
page read and write
1F2D5E83000
heap
page read and write
1F2C9558000
trusted library allocation
page read and write
1F2CB999000
trusted library allocation
page read and write
1F2CB000000
trusted library allocation
page read and write
1F2D3E6D000
trusted library allocation
page read and write
1F2CA7EB000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2CAEAB000
trusted library allocation
page read and write
1F2C00C5000
heap
page read and write
1F2C686E000
trusted library allocation
page read and write
1F2D5EA6000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2D4CF5000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
24F3C43A000
heap
page read and write
1F2D2055000
trusted library allocation
page read and write
1F2CAD76000
trusted library allocation
page read and write
742000
unkown
page readonly
1F20E048000
trusted library allocation
page read and write
1F2C6CAA000
heap
page read and write
1F2C0140000
heap
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2C936E000
trusted library allocation
page read and write
1F2C94A8000
trusted library allocation
page read and write
1F2CAD82000
trusted library allocation
page read and write
1F2CB47A000
trusted library allocation
page read and write
1F2C68A1000
trusted library allocation
page read and write
1F2CC88E000
trusted library allocation
page read and write
1F2CA824000
trusted library allocation
page read and write
1F2C4AB3000
trusted library allocation
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2C9958000
trusted library allocation
page read and write
1F2CACD7000
trusted library allocation
page read and write
1F2D1A47000
trusted library allocation
page read and write
1F2D197B000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2C00CB000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2D349A000
trusted library allocation
page read and write
1F2C8F33000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C00D9000
heap
page read and write
1F2C5553000
trusted library allocation
page read and write
1F2CAD6F000
trusted library allocation
page read and write
24F3C690000
heap
page read and write
1F2D1BFC000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2D6293000
trusted library allocation
page read and write
1F20EE9C000
heap
page read and write
1F2CC9A2000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C00C8000
heap
page read and write
17A28784000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2C00CD000
heap
page read and write
17A28786000
heap
page read and write
1F2C9570000
trusted library allocation
page read and write
1F2CADBE000
trusted library allocation
page read and write
1F2D2026000
trusted library allocation
page read and write
1F2C98E6000
trusted library allocation
page read and write
1F2D3DC8000
trusted library allocation
page read and write
1F2D1889000
trusted library allocation
page read and write
1F2CBEDF000
trusted library allocation
page read and write
1F2D3E05000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2C0140000
heap
page read and write
1F2CAB8E000
trusted library allocation
page read and write
24F3C46B000
heap
page read and write
1F2CCCD2000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2C0116000
heap
page read and write
1F2C00C8000
heap
page read and write
1F20E741000
heap
page read and write
17A28330000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2CD450000
trusted library allocation
page read and write
1F2D1E8F000
trusted library allocation
page read and write
1F2CAAC0000
trusted library allocation
page read and write
1F2C8FDD000
trusted library allocation
page read and write
1F2D34EE000
trusted library allocation
page read and write
1F2CAEA7000
trusted library allocation
page read and write
1F2D54E5000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2CC95D000
trusted library allocation
page read and write
1F2C00C0000
heap
page read and write
1F2C6C68000
heap
page read and write
1F2C0107000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2C0107000
heap
page read and write
1F2CB4A9000
trusted library allocation
page read and write
1F20EEE8000
heap
page read and write
1034000
heap
page read and write
1F20EEEC000
heap
page read and write
1F2CB893000
trusted library allocation
page read and write
1F2C66FC000
trusted library allocation
page read and write
1F2D342D000
trusted library allocation
page read and write
1F20E900000
heap
page read and write
1F2CAEE0000
trusted library allocation
page read and write
1F2D18E6000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2C9CA1000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2D5EA6000
heap
page read and write
1F20EE60000
heap
page read and write
1F2D342B000
trusted library allocation
page read and write
1F2D190A000
trusted library allocation
page read and write
1F20EF2B000
heap
page read and write
1F2C011A000
heap
page read and write
1F20DD10000
heap
page read and write
1F2D205A000
trusted library allocation
page read and write
1F2D1E1C000
trusted library allocation
page read and write
1F2D34D4000
trusted library allocation
page read and write
1F2CAEE5000
trusted library allocation
page read and write
1F2C9AD4000
trusted library allocation
page read and write
1F2CB893000
trusted library allocation
page read and write
1F2C68BE000
trusted library allocation
page read and write
1030000
heap
page read and write
1F20EE64000
heap
page read and write
1F2D548A000
trusted library allocation
page read and write
1F2CA70E000
trusted library allocation
page read and write
1F2D1932000
trusted library allocation
page read and write
1F2D341A000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CA710000
trusted library allocation
page read and write
1F2CAA86000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2CD476000
trusted library allocation
page read and write
250B887B000
trusted library allocation
page read and write
1F2D1BC6000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2C0122000
heap
page read and write
1F2D347E000
trusted library allocation
page read and write
1F2C957A000
trusted library allocation
page read and write
1F2C946E000
trusted library allocation
page read and write
1F2D4F7A000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2CA648000
trusted library allocation
page read and write
1F2C6C68000
heap
page read and write
1F2CAFA3000
trusted library allocation
page read and write
1F2CB155000
trusted library allocation
page read and write
1F2C9B8D000
trusted library allocation
page read and write
1F20EE4D000
heap
page read and write
1F2D3F06000
trusted library allocation
page read and write
1F2CAECC000
trusted library allocation
page read and write
1F2CA8EC000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2D19BF000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2C0116000
heap
page read and write
1F20EE5C000
heap
page read and write
1F2C9B83000
trusted library allocation
page read and write
1F2CA7EF000
trusted library allocation
page read and write
1F2CA81D000
trusted library allocation
page read and write
1F2D3F2E000
trusted library allocation
page read and write
1F2D1E9C000
trusted library allocation
page read and write
1F2C5471000
trusted library allocation
page read and write
1F2D3405000
trusted library allocation
page read and write
1F2CA860000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CAAF8000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
1F2D5E84000
heap
page read and write
1F2CAEF6000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F20E1B4000
heap
page read and write
5A5C19E000
stack
page read and write
1F2C97F3000
trusted library allocation
page read and write
1F20E0BA000
trusted library allocation
page read and write
1F2C55B9000
trusted library allocation
page read and write
1F2D5E7A000
heap
page read and write
1F2CA7E3000
trusted library allocation
page read and write
1F2C94FA000
trusted library allocation
page read and write
1F2CB999000
trusted library allocation
page read and write
1F2CAE23000
trusted library allocation
page read and write
1F2C4AC0000
trusted library allocation
page read and write
1F2CBD96000
trusted library allocation
page read and write
1F2CAD4F000
trusted library allocation
page read and write
1F2C5582000
trusted library allocation
page read and write
1F2C55FE000
trusted library allocation
page read and write
1F2D3EA7000
trusted library allocation
page read and write
1F2C0129000
heap
page read and write
1F2D1ED5000
trusted library allocation
page read and write
1F2CB4E0000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2D5EA2000
heap
page read and write
FB68D7E000
stack
page read and write
250B84C0000
remote allocation
page read and write
250B8823000
trusted library allocation
page read and write
1F2CADD9000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D1F96000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C99E0000
trusted library allocation
page read and write
1F2CA6FE000
trusted library allocation
page read and write
1F2CA82F000
trusted library allocation
page read and write
1F2D5AC1000
trusted library allocation
page read and write
1F2CAD4F000
trusted library allocation
page read and write
1F2CAD30000
trusted library allocation
page read and write
1F2CC9BA000
trusted library allocation
page read and write
1F2CC936000
trusted library allocation
page read and write
1F2CA7C6000
trusted library allocation
page read and write
1F2C0121000
heap
page read and write
1F2C974A000
trusted library allocation
page read and write
1F2CAC99000
trusted library allocation
page read and write
1F2D54CA000
trusted library allocation
page read and write
1F2C6C98000
heap
page read and write
1F2CA665000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C011D000
heap
page read and write
1F2C68E0000
trusted library allocation
page read and write
1F2CB445000
trusted library allocation
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2D59F2000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F2C00D5000
heap
page read and write
1F2CC892000
trusted library allocation
page read and write
1F2D1F5A000
trusted library allocation
page read and write
17A28500000
trusted library allocation
page read and write
1F2CAEB2000
trusted library allocation
page read and write
1F20E05C000
trusted library allocation
page read and write
1F2C012C000
heap
page read and write
1F20E09D000
trusted library allocation
page read and write
1F2D3460000
trusted library allocation
page read and write
1F2C99B5000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2D1B61000
trusted library allocation
page read and write
1F2D3DE5000
trusted library allocation
page read and write
1F2CADE8000
trusted library allocation
page read and write
1F2CD447000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2C945A000
trusted library allocation
page read and write
1F2D3E41000
trusted library allocation
page read and write
1F2D1ADC000
trusted library allocation
page read and write
1F20E150000
trusted library allocation
page read and write
1F2CA8B6000
trusted library allocation
page read and write
1F2C5526000
trusted library allocation
page read and write
1F2CAD82000
trusted library allocation
page read and write
1F2C9AC7000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CAE93000
trusted library allocation
page read and write
1F2D3AC8000
trusted library allocation
page read and write
1F20E017000
trusted library allocation
page read and write
1F20EE7F000
heap
page read and write
1F2CACE3000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2CAC35000
trusted library allocation
page read and write
1F20DCEE000
remote allocation
page execute read
1F2CADEB000
trusted library allocation
page read and write
1F2CACD1000
trusted library allocation
page read and write
1F2CB4B6000
trusted library allocation
page read and write
1F2D5EA6000
heap
page read and write
1F2D1BCD000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
350ED641000
trusted library allocation
page execute read
1F2C00B4000
heap
page read and write
1F2C936E000
trusted library allocation
page read and write
1F2D3491000
trusted library allocation
page read and write
1F2C904F000
trusted library allocation
page read and write
1F2C99EE000
trusted library allocation
page read and write
1F2CA7EB000
trusted library allocation
page read and write
17A282B0000
remote allocation
page read and write
1F2CB47C000
trusted library allocation
page read and write
1F2C4A81000
trusted library allocation
page read and write
1F2CA81B000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2D19EA000
trusted library allocation
page read and write
1F2D3D84000
trusted library allocation
page read and write
1F2D3411000
trusted library allocation
page read and write
1F2C9EEF000
trusted library allocation
page read and write
1F2CAC4C000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2D4CAE000
trusted library allocation
page read and write
1F2D19DC000
trusted library allocation
page read and write
1F2D3EA3000
trusted library allocation
page read and write
1F2D5E9C000
heap
page read and write
1F2CADD9000
trusted library allocation
page read and write
1F2D5B90000
trusted library allocation
page read and write
1F2C9CF6000
trusted library allocation
page read and write
250B8460000
unclassified section
page readonly
1F2D1EC7000
trusted library allocation
page read and write
1F20EF78000
heap
page read and write
1F2CADF3000
trusted library allocation
page read and write
27D69D9F000
heap
page read and write
1F2CB0C9000
trusted library allocation
page read and write
1F2C97C8000
trusted library allocation
page read and write
1F2C9984000
trusted library allocation
page read and write
1F2CCB7D000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2CB485000
trusted library allocation
page read and write
1F2C012F000
heap
page read and write
1F2CAEAF000
trusted library allocation
page read and write
1F2D1E9E000
trusted library allocation
page read and write
1F2D1E9C000
trusted library allocation
page read and write
5A5C09E000
stack
page read and write
1F2D5E7A000
heap
page read and write
1F2CA6FE000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2C6694000
trusted library allocation
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2CB0CE000
trusted library allocation
page read and write
1F2CA7D1000
trusted library allocation
page read and write
1F2CAA67000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C00AA000
heap
page read and write
1F2C012C000
heap
page read and write
1F2C011D000
heap
page read and write
1F20EF3C000
heap
page read and write
1F2D1976000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CADDB000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2D3DC8000
trusted library allocation
page read and write
1F2D34E4000
trusted library allocation
page read and write
1F2CAD13000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F2CB165000
trusted library allocation
page read and write
1F2D1E66000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
FB6957E000
unkown
page readonly
1F2C012B000
heap
page read and write
1F2CB4C5000
trusted library allocation
page read and write
250B8A32000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CADAB000
trusted library allocation
page read and write
1F2C00A9000
heap
page read and write
1F20EF59000
heap
page read and write
1F2CB4B1000
trusted library allocation
page read and write
1F2C9718000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D1A35000
trusted library allocation
page read and write
24F3DFC1000
heap
page read and write
1F2CABAE000
trusted library allocation
page read and write
1F2D1EB1000
trusted library allocation
page read and write
1F2C6936000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2D34EC000
trusted library allocation
page read and write
1F2D188D000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
7ED8BFA000
stack
page read and write
1F2D54FD000
trusted library allocation
page read and write
1F2C686C000
trusted library allocation
page read and write
1F2CC96E000
trusted library allocation
page read and write
1F2D1895000
trusted library allocation
page read and write
1F2D3AFC000
trusted library allocation
page read and write
1F2C6685000
trusted library allocation
page read and write
1F20E180000
trusted library allocation
page read and write
1F2C00B5000
heap
page read and write
1F2C00A5000
heap
page read and write
1F20EEEC000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2C00BB000
heap
page read and write
1F2C00A7000
heap
page read and write
1F20EEE8000
heap
page read and write
1F2D661B000
trusted library allocation
page read and write
1F2C6524000
trusted library allocation
page read and write
1F2C8FF5000
trusted library allocation
page read and write
350ED62C000
trusted library allocation
page execute read
1F2CBABD000
trusted library allocation
page read and write
1F2D59CC000
trusted library allocation
page read and write
1F2CA84F000
trusted library allocation
page read and write
1F2CA7D1000
trusted library allocation
page read and write
1F2C0125000
heap
page read and write
1F2CA7B7000
trusted library allocation
page read and write
1F2D6622000
trusted library allocation
page read and write
1F2D598F000
trusted library allocation
page read and write
1F2CAD60000
trusted library allocation
page read and write
1F2D3F2C000
trusted library allocation
page read and write
1F2CA8EC000
trusted library allocation
page read and write
1F2CAC63000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C683E000
trusted library allocation
page read and write
1F2D34E4000
trusted library allocation
page read and write
1F2C957C000
trusted library allocation
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2C991B000
trusted library allocation
page read and write
250B8864000
trusted library allocation
page read and write
1F2C68F6000
trusted library allocation
page read and write
1F2CD460000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2D1CC0000
trusted library allocation
page read and write
1F2D34E4000
trusted library allocation
page read and write
11AD000
heap
page read and write
1F2C6CDB000
heap
page read and write
1F2C5961000
trusted library allocation
page read and write
1F2CAEBF000
trusted library allocation
page read and write
1F2CADEB000
trusted library allocation
page read and write
1F2CC921000
trusted library allocation
page read and write
1F2CB070000
trusted library allocation
page read and write
1F2D342B000
trusted library allocation
page read and write
1F2C00B2000
heap
page read and write
1F2D1E76000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2C5476000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C68E0000
trusted library allocation
page read and write
1F2D6237000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
1F2D20C4000
trusted library allocation
page read and write
1F2D621C000
trusted library allocation
page read and write
24F3DFBE000
heap
page read and write
1F2CAE6A000
trusted library allocation
page read and write
1F2D1FCB000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2C00BA000
heap
page read and write
1F2C6CDB000
heap
page read and write
1F2D3407000
trusted library allocation
page read and write
FF0000
heap
page read and write
1F2C0107000
heap
page read and write
1F2D19F7000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2D6250000
trusted library allocation
page read and write
1F2CBD74000
trusted library allocation
page read and write
1F2C6A65000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2C97FB000
trusted library allocation
page read and write
1F2CAAED000
trusted library allocation
page read and write
1F2D5E04000
heap
page read and write
1F2CADFE000
trusted library allocation
page read and write
17A286C4000
trusted library allocation
page read and write
1F2CB48E000
trusted library allocation
page read and write
1F2C00A2000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2CC9B2000
trusted library allocation
page read and write
1F2C68BE000
trusted library allocation
page read and write
24F3C45F000
heap
page read and write
1F2C8F17000
trusted library allocation
page read and write
1F2CAC35000
trusted library allocation
page read and write
1F2C9026000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2C8FF5000
trusted library allocation
page read and write
E2F000
stack
page read and write
1F20EF6D000
heap
page read and write
1F2C97E0000
trusted library allocation
page read and write
1F2CAD25000
trusted library allocation
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2D343E000
trusted library allocation
page read and write
24F3C468000
heap
page read and write
1F2D3415000
trusted library allocation
page read and write
1F2CD47A000
trusted library allocation
page read and write
1F2C00A2000
heap
page read and write
1F2C011B000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2C011E000
heap
page read and write
1F2D20BB000
trusted library allocation
page read and write
1F2C99F9000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C9461000
trusted library allocation
page read and write
1F2C99AE000
trusted library allocation
page read and write
1F2D34B5000
trusted library allocation
page read and write
1F2C936E000
trusted library allocation
page read and write
A4B41FE000
stack
page read and write
1F2CA6E8000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2C00CB000
heap
page read and write
1F2C00D4000
heap
page read and write
1F2CABF2000
trusted library allocation
page read and write
1F2CADFC000
trusted library allocation
page read and write
1F2CBDCA000
trusted library allocation
page read and write
1F2D5A89000
trusted library allocation
page read and write
1F2CD495000
trusted library allocation
page read and write
1F2C680E000
trusted library allocation
page read and write
1F2C0129000
heap
page read and write
1F2CAC4C000
trusted library allocation
page read and write
27D69D90000
heap
page read and write
1F2C00A4000
heap
page read and write
1F2D1EED000
trusted library allocation
page read and write
7F21D8000
stack
page read and write
1F2D4F36000
trusted library allocation
page read and write
1F2CB830000
trusted library allocation
page read and write
1F2CBD79000
trusted library allocation
page read and write
A4B31FF000
stack
page read and write
1F2D5E7A000
heap
page read and write
1F2C66C2000
trusted library allocation
page read and write
1F2D1EDC000
trusted library allocation
page read and write
1F2D1E27000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2CAA88000
trusted library allocation
page read and write
1F2CAD30000
trusted library allocation
page read and write
1F2CB951000
trusted library allocation
page read and write
1F2D1CEC000
trusted library allocation
page read and write
1F2C00BA000
heap
page read and write
1F20E16A000
unkown
page execute read
1F2D1E9E000
trusted library allocation
page read and write
1F2D1881000
trusted library allocation
page read and write
1F2C00CB000
heap
page read and write
1F2CADF8000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2C0127000
heap
page read and write
1F2C9CFE000
trusted library allocation
page read and write
1F2D34BF000
trusted library allocation
page read and write
1F2CABF2000
trusted library allocation
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2C4ACC000
trusted library allocation
page read and write
1F2CAA34000
trusted library allocation
page read and write
1F2CADF3000
trusted library allocation
page read and write
250B8900000
unclassified section
page readonly
17A2861C000
trusted library allocation
page read and write
1F2CC8A2000
trusted library allocation
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2CB8B6000
trusted library allocation
page read and write
1F2CABC5000
trusted library allocation
page read and write
1F2CA6D8000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CAC37000
trusted library allocation
page read and write
1F2C977D000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2C68F6000
trusted library allocation
page read and write
1F2C9ECA000
trusted library allocation
page read and write
1F2D4F7C000
trusted library allocation
page read and write
1F2CC89D000
trusted library allocation
page read and write
1F2CCBE1000
trusted library allocation
page read and write
1F2CCBEA000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CB9B2000
trusted library allocation
page read and write
1F2D4C9F000
trusted library allocation
page read and write
1F2D5AA6000
trusted library allocation
page read and write
1F2C8F2B000
trusted library allocation
page read and write
1F2D18B5000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2CAEAD000
trusted library allocation
page read and write
1F20EEFC000
heap
page read and write
1F20EE60000
heap
page read and write
7F179E000
stack
page read and write
1F2D1900000
trusted library allocation
page read and write
1F2D3E6D000
trusted library allocation
page read and write
1F2CAEF5000
trusted library allocation
page read and write
1F2CAA42000
trusted library allocation
page read and write
1F2D34AA000
trusted library allocation
page read and write
1F2D59F2000
trusted library allocation
page read and write
1F2C9486000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F20EE8D000
heap
page read and write
1F2D5EA2000
heap
page read and write
1F2CA8CB000
trusted library allocation
page read and write
1F2CAD82000
trusted library allocation
page read and write
1F2CAEC2000
trusted library allocation
page read and write
1F2C8F74000
trusted library allocation
page read and write
1F2C00B1000
heap
page read and write
1F2C011A000
heap
page read and write
1F2C0126000
heap
page read and write
1F2D34DA000
trusted library allocation
page read and write
1F2CADF3000
trusted library allocation
page read and write
1F2D54E5000
trusted library allocation
page read and write
1F2CB8E4000
trusted library allocation
page read and write
11D7000
heap
page read and write
1F2CB4B6000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
24F3DFB3000
heap
page read and write
1F2C00E7000
heap
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C68E0000
trusted library allocation
page read and write
1F2CAC93000
trusted library allocation
page read and write
1F2C00C8000
heap
page read and write
1F2D1A41000
trusted library allocation
page read and write
1F2D5E9C000
heap
page read and write
24F3C43E000
heap
page read and write
1F2CAC5C000
trusted library allocation
page read and write
1F2CACDA000
trusted library allocation
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2D1E81000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CB449000
trusted library allocation
page read and write
1F2C0124000
heap
page read and write
1F2D20BB000
trusted library allocation
page read and write
1F2D1BD0000
trusted library allocation
page read and write
1F2D5EA3000
heap
page read and write
1F2CAD7B000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2D209F000
trusted library allocation
page read and write
1F2D34E9000
trusted library allocation
page read and write
1F2CB436000
trusted library allocation
page read and write
1F2C97EF000
trusted library allocation
page read and write
1F2C66F4000
trusted library allocation
page read and write
1F2D4F2F000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2CB473000
trusted library allocation
page read and write
1F20EF23000
heap
page read and write
17A2835A000
heap
page read and write
1F2CB487000
trusted library allocation
page read and write
1F2C55FE000
trusted library allocation
page read and write
1F2D1AC4000
trusted library allocation
page read and write
1F2CADFD000
trusted library allocation
page read and write
1F20EF18000
heap
page read and write
1F2C686E000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
11B9000
heap
page read and write
1F2D1ECA000
trusted library allocation
page read and write
1F2CAC1F000
trusted library allocation
page read and write
1F2CCBCF000
trusted library allocation
page read and write
1F2C68C7000
trusted library allocation
page read and write
1F2C97F3000
trusted library allocation
page read and write
1F2D1AEB000
trusted library allocation
page read and write
24F3C468000
heap
page read and write
1F2C99B3000
trusted library allocation
page read and write
1F2C554A000
trusted library allocation
page read and write
1F2CADE4000
trusted library allocation
page read and write
1F2C99E6000
trusted library allocation
page read and write
1F2CACE1000
trusted library allocation
page read and write
1F2C99AE000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2C68C1000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2D1AF1000
trusted library allocation
page read and write
1F2D34A0000
trusted library allocation
page read and write
1F2C99EA000
trusted library allocation
page read and write
1F2CB0F0000
trusted library allocation
page read and write
1F2D5EA6000
heap
page read and write
1F2D19C3000
trusted library allocation
page read and write
1F2C011F000
heap
page read and write
17A284C0000
heap
page read and write
1F20EE8A000
heap
page read and write
1F20E023000
trusted library allocation
page read and write
1F2CAC66000
trusted library allocation
page read and write
1F2D3E05000
trusted library allocation
page read and write
1F2C945A000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2C8F5C000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CCCCC000
trusted library allocation
page read and write
1F2D6384000
trusted library allocation
page read and write
1F2D6622000
trusted library allocation
page read and write
1F2D3421000
trusted library allocation
page read and write
1188000
heap
page read and write
1F2CAD57000
trusted library allocation
page read and write
1F2D1889000
trusted library allocation
page read and write
1F2D1E6D000
trusted library allocation
page read and write
1F2CA8E7000
trusted library allocation
page read and write
1F2CB496000
trusted library allocation
page read and write
350ED601000
trusted library allocation
page execute read
1F2CAEAD000
trusted library allocation
page read and write
1F2C97C8000
trusted library allocation
page read and write
1F2CAAD5000
trusted library allocation
page read and write
1F2CA82B000
trusted library allocation
page read and write
17A286F6000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CBE9E000
trusted library allocation
page read and write
1F2C9A53000
trusted library allocation
page read and write
1F2C5575000
trusted library allocation
page read and write
1F2CB155000
trusted library allocation
page read and write
1F2C00BE000
heap
page read and write
1F2C00AC000
heap
page read and write
1F2C689D000
trusted library allocation
page read and write
1F2D4402000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F2D1E46000
trusted library allocation
page read and write
1F2C97E8000
trusted library allocation
page read and write
1F2C5575000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2CB45A000
trusted library allocation
page read and write
1F2CA7B7000
trusted library allocation
page read and write
1F2C013A000
heap
page read and write
1F2D5E9D000
heap
page read and write
1F2C902F000
trusted library allocation
page read and write
1F2CB165000
trusted library allocation
page read and write
1F2D1895000
trusted library allocation
page read and write
1F2C970E000
trusted library allocation
page read and write
1F2C9754000
trusted library allocation
page read and write
1F2CA66F000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2CACD3000
trusted library allocation
page read and write
1F2D3E0C000
trusted library allocation
page read and write
1F2C011E000
heap
page read and write
250B8894000
trusted library allocation
page read and write
3734000
heap
page read and write
1F2C013F000
heap
page read and write
1F2D2026000
trusted library allocation
page read and write
1F2C00A8000
heap
page read and write
1F2C950C000
trusted library allocation
page read and write
1F2C00AA000
heap
page read and write
1F2CAECC000
trusted library allocation
page read and write
1F2D3F06000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CCB60000
trusted library allocation
page read and write
1F2D3200000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2C011F000
heap
page read and write
1F2C943A000
trusted library allocation
page read and write
1F2D3405000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2CB420000
trusted library allocation
page read and write
1F2D5AD8000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CA8E3000
trusted library allocation
page read and write
1F2D34AA000
trusted library allocation
page read and write
1F2CB93C000
trusted library allocation
page read and write
1F2C99C3000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2D4F5F000
trusted library allocation
page read and write
1F2D19D9000
trusted library allocation
page read and write
250B885D000
trusted library allocation
page read and write
1F2C6833000
trusted library allocation
page read and write
1F2CA821000
trusted library allocation
page read and write
1F2CB9BF000
trusted library allocation
page read and write
1F2CB43E000
trusted library allocation
page read and write
1F2CBEBA000
trusted library allocation
page read and write
1F2CAC2B000
trusted library allocation
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CB4B1000
trusted library allocation
page read and write
1F2C9CD0000
trusted library allocation
page read and write
1F2C68A8000
trusted library allocation
page read and write
1F2D2016000
trusted library allocation
page read and write
1F2CACE1000
trusted library allocation
page read and write
1F2CB40F000
trusted library allocation
page read and write
1F2CAD5A000
trusted library allocation
page read and write
1F2D20EC000
trusted library allocation
page read and write
1F2D1A9F000
trusted library allocation
page read and write
1F2D3F33000
trusted library allocation
page read and write
1F2C0131000
heap
page read and write
1F2D2100000
trusted library allocation
page read and write
1F2CA7A5000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2D1A3B000
trusted library allocation
page read and write
1F2CAAFE000
trusted library allocation
page read and write
1F2CADAE000
trusted library allocation
page read and write
1F2D1BD7000
trusted library allocation
page read and write
1F2CAD60000
trusted library allocation
page read and write
1F2C6C68000
heap
page read and write
250B88B7000
trusted library allocation
page read and write
1F2CB496000
trusted library allocation
page read and write
1F2C013A000
heap
page read and write
1F2D1CD0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
11B4000
heap
page read and write
1F2D3489000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
754000
unkown
page readonly
1F2CAE93000
trusted library allocation
page read and write
1F2C952E000
trusted library allocation
page read and write
1F2C99B3000
trusted library allocation
page read and write
1F2CACF3000
trusted library allocation
page read and write
1F2D20E0000
trusted library allocation
page read and write
1F2C00E7000
heap
page read and write
1F2CAAA7000
trusted library allocation
page read and write
1F2CBEB6000
trusted library allocation
page read and write
1F2C93FA000
trusted library allocation
page read and write
1F2D1870000
trusted library allocation
page read and write
1F2C6CD8000
heap
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2D6624000
trusted library allocation
page read and write
1F2C00CD000
heap
page read and write
24F3C46B000
heap
page read and write
1F2C655A000
trusted library allocation
page read and write
1F2CAD2A000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CA7CA000
trusted library allocation
page read and write
1F2D5E9D000
heap
page read and write
1F2C0126000
heap
page read and write
1F2C0100000
heap
page read and write
1F2CB1A4000
trusted library allocation
page read and write
1F2CACD3000
trusted library allocation
page read and write
1F2CBE55000
trusted library allocation
page read and write
1F2C9BCD000
trusted library allocation
page read and write
1F2D59A7000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2C0129000
heap
page read and write
1F2D5E04000
heap
page read and write
1F20EF59000
heap
page read and write
1F20E06F000
trusted library allocation
page read and write
1F2D1F93000
trusted library allocation
page read and write
1F2CAD60000
trusted library allocation
page read and write
1F2C0136000
heap
page read and write
1F2C9532000
trusted library allocation
page read and write
1F2C976F000
trusted library allocation
page read and write
1F2CBDA4000
trusted library allocation
page read and write
1F2D18CC000
trusted library allocation
page read and write
1F2D3497000
trusted library allocation
page read and write
1F2D3F01000
trusted library allocation
page read and write
1F2C65F6000
trusted library allocation
page read and write
250B889F000
trusted library allocation
page read and write
1F2D18C5000
trusted library allocation
page read and write
1F2D1B82000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
250B8847000
trusted library allocation
page read and write
1F2CC881000
trusted library allocation
page read and write
1F2CA6D8000
trusted library allocation
page read and write
1F2D5478000
trusted library allocation
page read and write
1F2D3F57000
trusted library allocation
page read and write
1F2CACEF000
trusted library allocation
page read and write
1F2C55EE000
trusted library allocation
page read and write
1F2D3427000
trusted library allocation
page read and write
1F2CAAA7000
trusted library allocation
page read and write
1F2C94FC000
trusted library allocation
page read and write
7EDB3FF000
stack
page read and write
1F2C0140000
heap
page read and write
1F2C009F000
heap
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2CB948000
trusted library allocation
page read and write
1F2C935E000
trusted library allocation
page read and write
17A28907000
trusted library allocation
page read and write
1F2C9473000
trusted library allocation
page read and write
1F2D5E01000
heap
page read and write
1F2CA8D3000
trusted library allocation
page read and write
1F2CA6FE000
trusted library allocation
page read and write
1F2D5F16000
heap
page read and write
1F2D3F57000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
24F3C2C0000
heap
page read and write
1F2C939B000
trusted library allocation
page read and write
1F2C68BC000
trusted library allocation
page read and write
1F2CA7E5000
trusted library allocation
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2CA8CB000
trusted library allocation
page read and write
1F20E1B6000
heap
page read and write
1F2CAB3C000
trusted library allocation
page read and write
1F2C9714000
trusted library allocation
page read and write
1F2D20E0000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2C99B9000
trusted library allocation
page read and write
1F2CACDA000
trusted library allocation
page read and write
24F3C500000
trusted library allocation
page read and write
1F2C9028000
trusted library allocation
page read and write
1F2D3F2C000
trusted library allocation
page read and write
1F2D5B13000
trusted library allocation
page read and write
1F2C0140000
heap
page read and write
1F2D34DA000
trusted library allocation
page read and write
1F2CAD8D000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2C943A000
trusted library allocation
page read and write
24F3C430000
heap
page read and write
1F2C00BA000
heap
page read and write
1F2C0125000
heap
page read and write
1F2C0127000
heap
page read and write
1F2C00D3000
heap
page read and write
1F2C011D000
heap
page read and write
1F2D1B8A000
trusted library allocation
page read and write
1F2CCC96000
trusted library allocation
page read and write
1F2C99F0000
trusted library allocation
page read and write
11BF000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
250B86B0000
heap
page readonly
1F20EEEC000
heap
page read and write
1F2CAD99000
trusted library allocation
page read and write
1F2CC8AE000
trusted library allocation
page read and write
1F2C9B7F000
trusted library allocation
page read and write
1F2C689D000
trusted library allocation
page read and write
1F2D1E89000
trusted library allocation
page read and write
1F2C009F000
heap
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2C011F000
heap
page read and write
1F2C0127000
heap
page read and write
1F2D5B82000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
1F2D4C9A000
trusted library allocation
page read and write
1F2CADFE000
trusted library allocation
page read and write
FEE000
stack
page read and write
1F2C688F000
trusted library allocation
page read and write
1F2CAEAF000
trusted library allocation
page read and write
1F2D34DD000
trusted library allocation
page read and write
1F2CAE98000
trusted library allocation
page read and write
1F2C00A2000
heap
page read and write
1F2CAC99000
trusted library allocation
page read and write
1F2D1E5E000
trusted library allocation
page read and write
1F2D342D000
trusted library allocation
page read and write
1F20EEF1000
heap
page read and write
1F2D20A9000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2CA859000
trusted library allocation
page read and write
1F2D5EA6000
heap
page read and write
1F2CA7CA000
trusted library allocation
page read and write
1F2CAAED000
trusted library allocation
page read and write
1F2C99B3000
trusted library allocation
page read and write
1F2C00D6000
heap
page read and write
250B8866000
trusted library allocation
page read and write
1F20DEDF000
unclassified section
page read and write
1F2C00D3000
heap
page read and write
1F2D5A77000
trusted library allocation
page read and write
1F20EF3C000
heap
page read and write
1F2CAA07000
trusted library allocation
page read and write
1F2D56EF000
trusted library allocation
page read and write
1034000
heap
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2CADBB000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2CAAF6000
trusted library allocation
page read and write
1F2CAECC000
trusted library allocation
page read and write
1F2D1CEC000
trusted library allocation
page read and write
1F2CAD5A000
trusted library allocation
page read and write
1F2CACEC000
trusted library allocation
page read and write
1F2C94E8000
trusted library allocation
page read and write
1F2CAB50000
trusted library allocation
page read and write
1F2C011D000
heap
page read and write
1F2D5E35000
heap
page read and write
1F2D3491000
trusted library allocation
page read and write
1F2CD4B1000
trusted library allocation
page read and write
1F2CA7CA000
trusted library allocation
page read and write
1F2CADAC000
trusted library allocation
page read and write
1F2D54A9000
trusted library allocation
page read and write
1F2D1970000
trusted library allocation
page read and write
1F2CB4B1000
trusted library allocation
page read and write
1F2CC9AC000
trusted library allocation
page read and write
1F2CB485000
trusted library allocation
page read and write
1F2C68E5000
trusted library allocation
page read and write
1F2D1EC7000
trusted library allocation
page read and write
1F2C6AEC000
trusted library allocation
page read and write
1F2CACD1000
trusted library allocation
page read and write
1F2C0100000
heap
page read and write
1F2CAEF3000
trusted library allocation
page read and write
1F2CA8DB000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2CC99D000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2C00CE000
heap
page read and write
1F2D1E7E000
trusted library allocation
page read and write
1F2CACD7000
trusted library allocation
page read and write
1F2CCBBC000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2CCC66000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CAED5000
trusted library allocation
page read and write
11BA000
heap
page read and write
1F2CAEC3000
trusted library allocation
page read and write
1F2C68A6000
trusted library allocation
page read and write
1F20EEEC000
heap
page read and write
1F2D1E7E000
trusted library allocation
page read and write
1F20EF6D000
heap
page read and write
1F2CB4B1000
trusted library allocation
page read and write
1F2D1AF1000
trusted library allocation
page read and write
1F2C013C000
heap
page read and write
1F2CADE7000
trusted library allocation
page read and write
1F2CAEE5000
trusted library allocation
page read and write
1F2C68EF000
trusted library allocation
page read and write
1F2D6615000
trusted library allocation
page read and write
1F2CB19B000
trusted library allocation
page read and write
1F2CB377000
trusted library allocation
page read and write
1F2D6624000
trusted library allocation
page read and write
1F2C00A6000
heap
page read and write
1F2D1B8A000
trusted library allocation
page read and write
1F2CB44E000
trusted library allocation
page read and write
1F2C013F000
heap
page read and write
1F2C976C000
trusted library allocation
page read and write
1F2CC9F2000
trusted library allocation
page read and write
1F2C00AC000
heap
page read and write
1F20DEE0000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C00C8000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2D20E0000
trusted library allocation
page read and write
1F2CC96A000
trusted library allocation
page read and write
1F2CAD71000
trusted library allocation
page read and write
1F2C013A000
heap
page read and write
1F2C6A9F000
trusted library allocation
page read and write
1F2C5566000
trusted library allocation
page read and write
1F2C655A000
trusted library allocation
page read and write
1F2D3427000
trusted library allocation
page read and write
1F2C9A7C000
trusted library allocation
page read and write
1F2CAB96000
trusted library allocation
page read and write
1F2C8F91000
trusted library allocation
page read and write
1F2CAD06000
trusted library allocation
page read and write
250B8B00000
heap
page read and write
1F2C0116000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CB86F000
trusted library allocation
page read and write
1F2D54B3000
trusted library allocation
page read and write
1F2CAD84000
trusted library allocation
page read and write
1F2D3411000
trusted library allocation
page read and write
1F2CAD4C000
trusted library allocation
page read and write
1F2CB144000
trusted library allocation
page read and write
1F2CC98A000
trusted library allocation
page read and write
1F2CCCB9000
trusted library allocation
page read and write
1F2D3DA2000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C0140000
heap
page read and write
1F2D1CF2000
trusted library allocation
page read and write
1F2C9A6A000
trusted library allocation
page read and write
1F2D18C5000
trusted library allocation
page read and write
1F2CA814000
trusted library allocation
page read and write
1F2D5E04000
heap
page read and write
1F2CAC61000
trusted library allocation
page read and write
1F2C012B000
heap
page read and write
1F2D3D9E000
trusted library allocation
page read and write
1F2D340A000
trusted library allocation
page read and write
1F2CA6ED000
trusted library allocation
page read and write
1F2C0135000
heap
page read and write
1F2C012C000
heap
page read and write
1F2CC892000
trusted library allocation
page read and write
1F2D34D4000
trusted library allocation
page read and write
1F2CB8BD000
trusted library allocation
page read and write
1F20EF59000
heap
page read and write
1F2C9459000
trusted library allocation
page read and write
1F2D4C70000
trusted library allocation
page read and write
1F2C65F6000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2CBAEB000
trusted library allocation
page read and write
1F2CACC7000
trusted library allocation
page read and write
1F2C97D5000
trusted library allocation
page read and write
17A28630000
trusted library allocation
page read and write
1F2D20D3000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C9483000
trusted library allocation
page read and write
1F2D5EA0000
heap
page read and write
1F2C949F000
trusted library allocation
page read and write
1F2C0122000
heap
page read and write
1F2CA6BF000
trusted library allocation
page read and write
1F2CA8E7000
trusted library allocation
page read and write
1F2CBDCA000
trusted library allocation
page read and write
1F20EEE6000
heap
page read and write
1F2D1EE3000
trusted library allocation
page read and write
1F2C00A2000
heap
page read and write
FB6647E000
unkown
page readonly
1F2CCB8A000
trusted library allocation
page read and write
1F2CAD52000
trusted library allocation
page read and write
1F2C557D000
trusted library allocation
page read and write
1F2CBE41000
trusted library allocation
page read and write
1F2CA6C3000
trusted library allocation
page read and write
1F2C9EF2000
trusted library allocation
page read and write
1F2D3E86000
trusted library allocation
page read and write
1F2C00B4000
heap
page read and write
1F2C00B2000
heap
page read and write
1F2CD45A000
trusted library allocation
page read and write
1F2CAC41000
trusted library allocation
page read and write
1F2CAEFC000
trusted library allocation
page read and write
1F2C00AB000
heap
page read and write
1F2C00CB000
heap
page read and write
680000
unkown
page readonly
250B8700000
trusted library allocation
page read and write
1F2C00BB000
heap
page read and write
1F2C011A000
heap
page read and write
1F2CADE0000
trusted library allocation
page read and write
1F2C687A000
trusted library allocation
page read and write
1F2C0120000
heap
page read and write
1F2C00BA000
heap
page read and write
1F2CAA86000
trusted library allocation
page read and write
17A286B6000
trusted library allocation
page read and write
1F20EF78000
heap
page read and write
1F2D1CC3000
trusted library allocation
page read and write
1F2C00BE000
heap
page read and write
250B8810000
trusted library allocation
page read and write
1F2C9376000
trusted library allocation
page read and write
1F2D1ABB000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2CAD87000
trusted library allocation
page read and write
1F2D196D000
trusted library allocation
page read and write
1F20EE5C000
heap
page read and write
1F2C99F9000
trusted library allocation
page read and write
1F2D341A000
trusted library allocation
page read and write
1F2C959E000
trusted library allocation
page read and write
1D7E000
stack
page read and write
1F2D1E9E000
trusted library allocation
page read and write
1F2C948C000
trusted library allocation
page read and write
1F2C011A000
heap
page read and write
1F2CB904000
trusted library allocation
page read and write
1F20EEEC000
heap
page read and write
1F2D340A000
trusted library allocation
page read and write
250B8540000
heap
page read and write
1F2C68AA000
trusted library allocation
page read and write
1F2C00D4000
heap
page read and write
1F2CAA5B000
trusted library allocation
page read and write
1F2C00BD000
heap
page read and write
1F2C012C000
heap
page read and write
1F2CBDA4000
trusted library allocation
page read and write
681000
unkown
page execute read
1F2C011B000
heap
page read and write
1F2D3DF1000
trusted library allocation
page read and write
1F2C0130000
heap
page read and write
1F2CB485000
trusted library allocation
page read and write
1F2C68C1000
trusted library allocation
page read and write
1F2D3D2F000
trusted library allocation
page read and write
1F2C99B3000
trusted library allocation
page read and write
1F2CAB90000
trusted library allocation
page read and write
1F2D3462000
trusted library allocation
page read and write
1F2CA9FB000
trusted library allocation
page read and write
1F2CAD96000
trusted library allocation
page read and write
1F2C972E000
trusted library allocation
page read and write
1F2CACE1000
trusted library allocation
page read and write
1F2D5EA2000
heap
page read and write
1F2CB912000
trusted library allocation
page read and write
24F3C3B0000
heap
page read and write
1F2CABEB000
trusted library allocation
page read and write
1F2C65AB000
trusted library allocation
page read and write
1F2CADB9000
trusted library allocation
page read and write
1F2C68F6000
trusted library allocation
page read and write
250B8869000
trusted library allocation
page read and write
1F2C9BD2000
trusted library allocation
page read and write
1F2C011B000
heap
page read and write
1F2C00CD000
heap
page read and write
1F2CAA76000
trusted library allocation
page read and write
1F2C013A000
heap
page read and write
1F2CA8E3000
trusted library allocation
page read and write
1F2D1FE4000
trusted library allocation
page read and write
1F2C0116000
heap
page read and write
1F2CC889000
trusted library allocation
page read and write
1F2C998E000
trusted library allocation
page read and write
1F2D1ADC000
trusted library allocation
page read and write
1F2CA7D1000
trusted library allocation
page read and write
1F2C684A000
trusted library allocation
page read and write
1F2D56DE000
trusted library allocation
page read and write
1F2C681A000
trusted library allocation
page read and write
1F2CAD80000
trusted library allocation
page read and write
1F2D3EAC000
trusted library allocation
page read and write
1F2C65EE000
trusted library allocation
page read and write
1F2C99EA000
trusted library allocation
page read and write
1F2C97DD000
trusted library allocation
page read and write
1F2C97F3000
trusted library allocation
page read and write
1F20E160000
unkown
page execute read
1F2C9789000
trusted library allocation
page read and write
1F2CA8E1000
trusted library allocation
page read and write
1F2C6CDB000
heap
page read and write
1F2CAD71000
trusted library allocation
page read and write
1F2CAE6A000
trusted library allocation
page read and write
1F2CA724000
trusted library allocation
page read and write
1F2C6869000
trusted library allocation
page read and write
1F2C00CE000
heap
page read and write
1F2C00E7000
heap
page read and write
1F2C0107000
heap
page read and write
1F2C94EC000
trusted library allocation
page read and write
1F20EF45000
heap
page read and write
1F2CB9BA000
trusted library allocation
page read and write
1F2D4CA3000
trusted library allocation
page read and write
11CC000
heap
page read and write
1F2D1E7E000
trusted library allocation
page read and write
1F2CAA34000
trusted library allocation
page read and write
250B8520000
unclassified section
page readonly
1F2CBAE0000
trusted library allocation
page read and write
1F2D3491000
trusted library allocation
page read and write
1F2D1E52000
trusted library allocation
page read and write
1F2D3463000
trusted library allocation
page read and write
1F2C682C000
trusted library allocation
page read and write
1F2C0107000
heap
page read and write
1F2C0100000
heap
page read and write
1F2D3411000
trusted library allocation
page read and write
1F2CCBE1000
trusted library allocation
page read and write
1F2C68E5000
trusted library allocation
page read and write
1F2CA7F2000
trusted library allocation
page read and write
There are 3746 hidden memdumps, click here to show them.