IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0de9d24c-8ea2-4a51-a453-93613bb92202.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0de9d24c-8ea2-4a51-a453-93613bb92202.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ee1dab7-f32b-4025-b591-a5b59c3dd1bf} 3620 "\\.\pipe\gecko-crash-server-pipe.3620" 1a93e66f310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4292 -parentBuildID 20230927232528 -prefsHandle 4284 -prefMapHandle 1812 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4de74356-ab29-421f-accc-57ed584a4147} 3620 "\\.\pipe\gecko-crash-server-pipe.3620" 1a94decfd10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5044 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3288 -prefMapHandle 5040 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c3e6a35-4447-4030-865b-29b5ac416484} 3620 "\\.\pipe\gecko-crash-server-pipe.3620" 1a950216310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://mozilla.org/0S
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.185.206
youtube.com
United States
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1A94543E000
heap
page read and write
1A95A34E000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94E600000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95658C000
trusted library allocation
page read and write
1A94FB6A000
trusted library allocation
page read and write
1A94FCDB000
trusted library allocation
page read and write
1A95A789000
trusted library allocation
page read and write
21C14D00000
trusted library allocation
page read and write
1A956557000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A956553000
trusted library allocation
page read and write
1A95A696000
trusted library allocation
page read and write
1A94FC67000
trusted library allocation
page read and write
1A94E7E2000
trusted library allocation
page read and write
1A94E952000
trusted library allocation
page read and write
1A95A6FE000
trusted library allocation
page read and write
1A9566AC000
trusted library allocation
page read and write
1A94EC66000
trusted library allocation
page read and write
1A94FD9D000
trusted library allocation
page read and write
1A950C7A000
trusted library allocation
page read and write
1A94FCB1000
trusted library allocation
page read and write
1A956577000
trusted library allocation
page read and write
1A957A9C000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
146D4403000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94E1B1000
trusted library allocation
page read and write
1EB30FA9000
heap
page read and write
1A95630C000
trusted library allocation
page read and write
1A956172000
trusted library allocation
page read and write
1A95655F000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
1C4A4671000
trusted library allocation
page execute read
1A94EC36000
trusted library allocation
page read and write
1A94BFB8000
trusted library allocation
page read and write
1A9565A8000
trusted library allocation
page read and write
1A95A837000
trusted library allocation
page read and write
1A94ECD4000
trusted library allocation
page read and write
1A95018B000
trusted library allocation
page read and write
1A94DDDB000
trusted library allocation
page read and write
1A94F92B000
trusted library allocation
page read and write
1A950155000
trusted library allocation
page read and write
1A950123000
trusted library allocation
page read and write
1A94FDBF000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A95022E000
trusted library allocation
page read and write
1A94EDD3000
trusted library allocation
page read and write
1A94E11B000
trusted library allocation
page read and write
1A956644000
trusted library allocation
page read and write
1A94E1C7000
trusted library allocation
page read and write
1A956572000
trusted library allocation
page read and write
E0BCC7E000
unkown
page readonly
1EB310B7000
heap
page read and write
1A95A5CA000
trusted library allocation
page read and write
1A95AB54000
heap
page read and write
1EB30FA9000
heap
page read and write
1A9564EF000
trusted library allocation
page read and write
1A94E74A000
trusted library allocation
page read and write
1A94B49A000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94E16F000
trusted library allocation
page read and write
1A94E797000
trusted library allocation
page read and write
1A94FD97000
trusted library allocation
page read and write
1A94EE12000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94DD47000
trusted library allocation
page read and write
1A94FB7E000
trusted library allocation
page read and write
1EB308A0000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94FD8C000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A945445000
heap
page read and write
1A945440000
heap
page read and write
1A945464000
heap
page read and write
1A950A5A000
trusted library allocation
page read and write
1A950AFC000
trusted library allocation
page read and write
1A94F99F000
trusted library allocation
page read and write
1EB31031000
heap
page read and write
146D4110000
heap
page read and write
1A9454B1000
heap
page read and write
1A945451000
heap
page read and write
1A94F9A2000
trusted library allocation
page read and write
1A950C32000
trusted library allocation
page read and write
1A953601000
trusted library allocation
page read and write
1A94A3FB000
trusted library allocation
page read and write
1A94FDBF000
trusted library allocation
page read and write
1A94F8E0000
trusted library allocation
page read and write
1A94E74E000
trusted library allocation
page read and write
1A95A6AB000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94FCE5000
trusted library allocation
page read and write
1A94E0F4000
trusted library allocation
page read and write
1A95A5D4000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A950BD9000
trusted library allocation
page read and write
1EB30373000
trusted library allocation
page read and write
1A95A46D000
trusted library allocation
page read and write
1A94BFE2000
trusted library allocation
page read and write
1A95A472000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94BFE2000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94FFA0000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945487000
heap
page read and write
1A956570000
trusted library allocation
page read and write
1A94F9EF000
trusted library allocation
page read and write
1A94EA2F000
trusted library allocation
page read and write
1A94F8E0000
trusted library allocation
page read and write
1A957AAA000
trusted library allocation
page read and write
1A956147000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A95A6F8000
trusted library allocation
page read and write
1EB30144000
heap
page read and write
1EB30FA0000
heap
page read and write
1A94E173000
trusted library allocation
page read and write
25FA67B0000
heap
page read and write
1A956481000
trusted library allocation
page read and write
146D4465000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94DDDB000
trusted library allocation
page read and write
1A956740000
trusted library allocation
page read and write
1A952F38000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94543E000
heap
page read and write
1A94FC7B000
trusted library allocation
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A94BFA5000
trusted library allocation
page read and write
1A958843000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A9506B2000
trusted library allocation
page read and write
1A959EAB000
trusted library allocation
page read and write
1A957ADA000
trusted library allocation
page read and write
1A9501BB000
trusted library allocation
page read and write
1A95A6E1000
trusted library allocation
page read and write
1A9564DA000
trusted library allocation
page read and write
1A94F9FC000
trusted library allocation
page read and write
1A94FA4A000
trusted library allocation
page read and write
1A94BF3B000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A94FC05000
trusted library allocation
page read and write
1A95A69D000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A950C83000
trusted library allocation
page read and write
E0BD53E000
stack
page read and write
146D4400000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94FC76000
trusted library allocation
page read and write
1A94E054000
trusted library allocation
page read and write
1A9519E1000
trusted library allocation
page read and write
1A94FCB3000
trusted library allocation
page read and write
FCA000
heap
page read and write
1A957A6C000
trusted library allocation
page read and write
1A95AA92000
trusted library allocation
page read and write
146D44F6000
trusted library allocation
page read and write
1A950CCC000
trusted library allocation
page read and write
1A94E0F5000
trusted library allocation
page read and write
1C4A4586000
trusted library allocation
page execute read
1A95AB11000
heap
page read and write
1EB31031000
heap
page read and write
1A94FAA4000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A9500CF000
trusted library allocation
page read and write
1A94BFCD000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A9566AC000
trusted library allocation
page read and write
1A950C5E000
trusted library allocation
page read and write
1A9564A6000
trusted library allocation
page read and write
1A9500EB000
trusted library allocation
page read and write
1A95AA92000
trusted library allocation
page read and write
1A9502F0000
trusted library allocation
page read and write
1A94EDE5000
trusted library allocation
page read and write
1A959ED2000
trusted library allocation
page read and write
1A951931000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945491000
heap
page read and write
1A949DF8000
trusted library allocation
page read and write
1A956672000
trusted library allocation
page read and write
1A959ED2000
trusted library allocation
page read and write
C66C1FE000
stack
page read and write
1A9454B1000
heap
page read and write
1A94548D000
heap
page read and write
1A94FCB3000
trusted library allocation
page read and write
1A9564F3000
trusted library allocation
page read and write
1A94FCFB000
trusted library allocation
page read and write
E0B992E000
unkown
page readonly
1A94548D000
heap
page read and write
1A94545E000
heap
page read and write
146D411A000
heap
page read and write
1A945463000
heap
page read and write
1A959EF1000
trusted library allocation
page read and write
1A94FF5F000
trusted library allocation
page read and write
1A94E7FE000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
FB0000
heap
page read and write
1A95657D000
trusted library allocation
page read and write
1A94EC3C000
trusted library allocation
page read and write
1EB30FCD000
heap
page read and write
1A959FDD000
trusted library allocation
page read and write
1A95A6F3000
trusted library allocation
page read and write
21C14A60000
heap
page read and write
1A949DCB000
trusted library allocation
page read and write
1A951881000
trusted library allocation
page read and write
1A9565D0000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A94E0F4000
trusted library allocation
page read and write
1A95A25A000
trusted library allocation
page read and write
EB0000
heap
page read and write
1A945464000
heap
page read and write
1A94FDBF000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94544E000
heap
page read and write
1A945445000
heap
page read and write
1A957AAA000
trusted library allocation
page read and write
1A95651D000
trusted library allocation
page read and write
1A950766000
trusted library allocation
page read and write
1A95A67D000
trusted library allocation
page read and write
1A94FC78000
trusted library allocation
page read and write
1A95AB0E000
heap
page read and write
1A959602000
trusted library allocation
page read and write
25FA6899000
heap
page read and write
1A94E161000
trusted library allocation
page read and write
1A94A460000
trusted library allocation
page read and write
C66B9FE000
stack
page read and write
1A9567FB000
trusted library allocation
page read and write
1A94E1A0000
trusted library allocation
page read and write
1A95A816000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1EB310A9000
heap
page read and write
1A956614000
trusted library allocation
page read and write
1A94FFED000
trusted library allocation
page read and write
1A94ECED000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94BFC9000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A956328000
trusted library allocation
page read and write
1A94E991000
trusted library allocation
page read and write
1A950192000
trusted library allocation
page read and write
1A957AAA000
trusted library allocation
page read and write
1A94B4C7000
trusted library allocation
page read and write
1A956553000
trusted library allocation
page read and write
1A950241000
trusted library allocation
page read and write
1A95A6A8000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94543E000
heap
page read and write
1A95649C000
trusted library allocation
page read and write
1A95679B000
trusted library allocation
page read and write
1A94FDDC000
trusted library allocation
page read and write
1A956175000
trusted library allocation
page read and write
1A94E838000
trusted library allocation
page read and write
1A94EC8E000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A94FF77000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94ECFE000
trusted library allocation
page read and write
1A9506EE000
trusted library allocation
page read and write
1A94EC43000
trusted library allocation
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A94F81B000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A945484000
heap
page read and write
1EB30315000
trusted library allocation
page read and write
1A94C870000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1EB310B7000
heap
page read and write
1A9564D1000
trusted library allocation
page read and write
1A94DD54000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A951A93000
trusted library allocation
page read and write
1A94F888000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94FCA6000
trusted library allocation
page read and write
21C14F32000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94544F000
heap
page read and write
1A94543E000
heap
page read and write
1A95A6B2000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1EB3106A000
heap
page read and write
1A945435000
heap
page read and write
1A9518F3000
trusted library allocation
page read and write
1A94F8E6000
trusted library allocation
page read and write
1A94E0E1000
trusted library allocation
page read and write
1A95196C000
trusted library allocation
page read and write
1A950181000
trusted library allocation
page read and write
1EB31028000
heap
page read and write
1A945484000
heap
page read and write
1A950AA0000
trusted library allocation
page read and write
9FE000
stack
page read and write
1A956515000
trusted library allocation
page read and write
21C14D2E000
trusted library allocation
page read and write
1A94ECFE000
trusted library allocation
page read and write
1A959A00000
trusted library allocation
page read and write
1A95617C000
trusted library allocation
page read and write
1EB310B7000
heap
page read and write
1A9563F3000
trusted library allocation
page read and write
1A95A82A000
trusted library allocation
page read and write
1A945497000
heap
page read and write
1A94545E000
heap
page read and write
1A949DEF000
trusted library allocation
page read and write
1A95A7DE000
trusted library allocation
page read and write
1A94ECE0000
trusted library allocation
page read and write
1A95AB10000
heap
page read and write
A3E000
stack
page read and write
1A94E881000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1A95193F000
trusted library allocation
page read and write
1EB301A2000
unclassified section
page read and write
1A94549A000
heap
page read and write
1A95AB0E000
heap
page read and write
1A95A6B0000
trusted library allocation
page read and write
1A94EC9E000
trusted library allocation
page read and write
1EB30323000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A94FC58000
trusted library allocation
page read and write
1A94ECEB000
trusted library allocation
page read and write
1A95A4BE000
trusted library allocation
page read and write
1A95017D000
trusted library allocation
page read and write
1A95A6A4000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
21C14B70000
heap
page readonly
1A94FD30000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A95197D000
trusted library allocation
page read and write
1A9506D2000
trusted library allocation
page read and write
1A94ECB3000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A94E845000
trusted library allocation
page read and write
1A9565A8000
trusted library allocation
page read and write
1A9507D3000
trusted library allocation
page read and write
1A953486000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
208D03E000
unkown
page readonly
21C14920000
unclassified section
page readonly
1A945484000
heap
page read and write
1A94F928000
trusted library allocation
page read and write
146D440E000
trusted library allocation
page read and write
1A94BF07000
trusted library allocation
page read and write
1A956646000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A95020C000
trusted library allocation
page read and write
1A95A6A2000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
256A1B0A000
trusted library allocation
page read and write
1A94A466000
trusted library allocation
page read and write
1A95A2ED000
trusted library allocation
page read and write
1A957AA6000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A95A82C000
trusted library allocation
page read and write
1A950BD2000
trusted library allocation
page read and write
1A9534C8000
trusted library allocation
page read and write
1A94FC7D000
trusted library allocation
page read and write
1A95012C000
trusted library allocation
page read and write
1A959F90000
trusted library allocation
page read and write
146D4220000
heap
page read and write
1A94542E000
heap
page read and write
21C14D81000
trusted library allocation
page read and write
1A9565F4000
trusted library allocation
page read and write
1EB310B7000
heap
page read and write
1A945494000
heap
page read and write
1A94549A000
heap
page read and write
146D4800000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A952F6D000
trusted library allocation
page read and write
1A95A487000
trusted library allocation
page read and write
1A94FC73000
trusted library allocation
page read and write
1A9587A3000
trusted library allocation
page read and write
1A95658D000
trusted library allocation
page read and write
1A94FB8C000
trusted library allocation
page read and write
1A957A32000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A9454AE000
heap
page read and write
1A94548D000
heap
page read and write
1A94E065000
trusted library allocation
page read and write
1A94ECFE000
trusted library allocation
page read and write
1A94EE2A000
trusted library allocation
page read and write
1EB30345000
trusted library allocation
page read and write
1A95675C000
trusted library allocation
page read and write
1A9519BF000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94E016000
trusted library allocation
page read and write
1A957A3C000
trusted library allocation
page read and write
1A958CC3000
trusted library allocation
page read and write
1A9501FB000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A9564F3000
trusted library allocation
page read and write
FCC000
heap
page read and write
1A94E84E000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A9454A4000
heap
page read and write
1A94F8E0000
trusted library allocation
page read and write
1A9518E2000
trusted library allocation
page read and write
1A94FDF8000
trusted library allocation
page read and write
1A94E386000
heap
page read and write
1A945484000
heap
page read and write
1A95AAAA000
trusted library allocation
page read and write
1A95198A000
trusted library allocation
page read and write
1A95A2E0000
trusted library allocation
page read and write
1A9500D3000
trusted library allocation
page read and write
1A95193F000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94E84B000
trusted library allocation
page read and write
1A94EC5F000
trusted library allocation
page read and write
1A957AE5000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1EB30F41000
heap
page read and write
1A957A49000
trusted library allocation
page read and write
1A9567E8000
trusted library allocation
page read and write
1A94F85D000
trusted library allocation
page read and write
1D30000
heap
page read and write
146D4482000
trusted library allocation
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A9566C4000
trusted library allocation
page read and write
1A9563D0000
trusted library allocation
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A94EDD0000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A95A494000
trusted library allocation
page read and write
1A95AB36000
heap
page read and write
1A959EE7000
trusted library allocation
page read and write
1A95A46D000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A94F8B3000
trusted library allocation
page read and write
1A95632C000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A94FDF7000
trusted library allocation
page read and write
1A94ECFC000
trusted library allocation
page read and write
1A957F00000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A9454A3000
heap
page read and write
1A94544C000
heap
page read and write
1A95652E000
trusted library allocation
page read and write
1A95A67A000
trusted library allocation
page read and write
1A94F99F000
trusted library allocation
page read and write
1A95674F000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A94EC63000
trusted library allocation
page read and write
1A956294000
trusted library allocation
page read and write
1A9593C8000
trusted library allocation
page read and write
1A94F859000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A956612000
trusted library allocation
page read and write
F98000
heap
page read and write
1A950BD2000
trusted library allocation
page read and write
1A94F8FA000
trusted library allocation
page read and write
1A94E3A2000
heap
page read and write
1A94FD93000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A94BF6F000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94C87C000
trusted library allocation
page read and write
1A94FCE7000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94F8EB000
trusted library allocation
page read and write
1A945455000
heap
page read and write
1A945494000
heap
page read and write
1A950B6B000
trusted library allocation
page read and write
1A95932F000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1EB30363000
trusted library allocation
page read and write
1A95A2F5000
trusted library allocation
page read and write
1A950645000
trusted library allocation
page read and write
146D401A000
remote allocation
page execute read
21C14B82000
unclassified section
page read and write
1A956172000
trusted library allocation
page read and write
1A94F888000
trusted library allocation
page read and write
1A94BFBE000
trusted library allocation
page read and write
1A94EDF9000
trusted library allocation
page read and write
1A94EDE5000
trusted library allocation
page read and write
1A9566DE000
trusted library allocation
page read and write
1A95A47F000
trusted library allocation
page read and write
1A94FD22000
trusted library allocation
page read and write
1A956570000
trusted library allocation
page read and write
1A94FDA4000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94BFAE000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A945497000
heap
page read and write
1A956527000
trusted library allocation
page read and write
1A94EC8D000
trusted library allocation
page read and write
1EB30F40000
heap
page read and write
1A95A666000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
32F55FE000
unkown
page readonly
1A957A98000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95198F000
trusted library allocation
page read and write
FB9000
heap
page read and write
1A95A5BA000
trusted library allocation
page read and write
1A94A4D0000
trusted library allocation
page read and write
1A94FD9F000
trusted library allocation
page read and write
1A94FD8B000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95AB10000
heap
page read and write
1A94FBD4000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A945485000
heap
page read and write
1A95A691000
trusted library allocation
page read and write
1A94FD16000
trusted library allocation
page read and write
1A952F9E000
trusted library allocation
page read and write
1A95677F000
trusted library allocation
page read and write
1A94FC6F000
trusted library allocation
page read and write
1A959EF9000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A951975000
trusted library allocation
page read and write
1A9567FD000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
C7C000
unkown
page readonly
1A94FDB6000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
146D4470000
trusted library allocation
page read and write
1A951958000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
1EB310B7000
heap
page read and write
1EB3102D000
heap
page read and write
1A945464000
heap
page read and write
FB3000
heap
page read and write
1EB2FF40000
unclassified section
page readonly
146D480C000
trusted library allocation
page read and write
1A95654A000
trusted library allocation
page read and write
1A950BD6000
trusted library allocation
page read and write
25FA84AC000
heap
page read and write
1A94ECDC000
trusted library allocation
page read and write
1EB31031000
heap
page read and write
1A94C86E000
trusted library allocation
page read and write
208C7FE000
stack
page read and write
1A94E7AA000
trusted library allocation
page read and write
208ADCE000
stack
page read and write
1A958886000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94B49A000
trusted library allocation
page read and write
1A9566FE000
trusted library allocation
page read and write
1A956583000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A957AEE000
trusted library allocation
page read and write
21C149C0000
heap
page read and write
1A9565FE000
trusted library allocation
page read and write
1A945467000
heap
page read and write
1A945484000
heap
page read and write
256A1909000
heap
page read and write
1A9454A8000
heap
page read and write
1A95AB45000
heap
page read and write
1D00000
heap
page read and write
1A94FF81000
trusted library allocation
page read and write
1A94FDCB000
trusted library allocation
page read and write
1A95AA34000
trusted library allocation
page read and write
1A94FDE4000
trusted library allocation
page read and write
1A956511000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94E093000
trusted library allocation
page read and write
1A95A83A000
trusted library allocation
page read and write
1A94EC48000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94BFE6000
trusted library allocation
page read and write
1A957AAA000
trusted library allocation
page read and write
1A95A3F5000
trusted library allocation
page read and write
1A94EE38000
trusted library allocation
page read and write
1A95A698000
trusted library allocation
page read and write
1A94FDED000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A94FC6D000
trusted library allocation
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A9564C1000
trusted library allocation
page read and write
1A95A75F000
trusted library allocation
page read and write
1A956115000
trusted library allocation
page read and write
1A94BFF0000
trusted library allocation
page read and write
1A94FD45000
trusted library allocation
page read and write
1A94DD94000
trusted library allocation
page read and write
1A94F8EB000
trusted library allocation
page read and write
1A952FF1000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
1A945488000
heap
page read and write
1A94EC1F000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
1A94F9EF000
trusted library allocation
page read and write
1A94F95D000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
25FA6C07000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1EB31031000
heap
page read and write
146D445F000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A94EE06000
trusted library allocation
page read and write
1A945446000
heap
page read and write
146D4430000
trusted library allocation
page read and write
1A94EEFA000
trusted library allocation
page read and write
1EB3035F000
trusted library allocation
page read and write
1A94EC3A000
trusted library allocation
page read and write
1A95A7E7000
trusted library allocation
page read and write
1A94B46F000
trusted library allocation
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A95A4AC000
trusted library allocation
page read and write
1A9518AB000
trusted library allocation
page read and write
1A957A3A000
trusted library allocation
page read and write
1A959FE1000
trusted library allocation
page read and write
1A957A4D000
trusted library allocation
page read and write
1A94EC7A000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94FFAD000
trusted library allocation
page read and write
1A95016F000
trusted library allocation
page read and write
1A94E150000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94E075000
trusted library allocation
page read and write
25FA6899000
heap
page read and write
1A94FFAD000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A95A68D000
trusted library allocation
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A945464000
heap
page read and write
1A95AB54000
heap
page read and write
1A9563D8000
trusted library allocation
page read and write
1A950ADF000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A957AA0000
trusted library allocation
page read and write
1A9564FE000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94FD2C000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FCD9000
trusted library allocation
page read and write
1A95AB0D000
heap
page read and write
1A94FD8C000
trusted library allocation
page read and write
1A950C36000
trusted library allocation
page read and write
1A950871000
trusted library allocation
page read and write
208ACCE000
stack
page read and write
1A957A34000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A94A4A4000
trusted library allocation
page read and write
1A94E0ED000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A95AC62000
heap
page read and write
1A95A242000
trusted library allocation
page read and write
FC7000
heap
page read and write
1A9454AD000
heap
page read and write
1A956564000
trusted library allocation
page read and write
1A95A6F1000
trusted library allocation
page read and write
1A94E93B000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A950AB6000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A95A5B2000
trusted library allocation
page read and write
1A950CA6000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A94542F000
heap
page read and write
1A95AA36000
trusted library allocation
page read and write
1A958CC7000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A950C7A000
trusted library allocation
page read and write
1EB31061000
heap
page read and write
1A95A691000
trusted library allocation
page read and write
1A95664E000
trusted library allocation
page read and write
1A94FC7B000
trusted library allocation
page read and write
1A95A6F5000
trusted library allocation
page read and write
1A95AC62000
heap
page read and write
1A95A685000
trusted library allocation
page read and write
1A95679E000
trusted library allocation
page read and write
1A951A41000
trusted library allocation
page read and write
1EB310B7000
heap
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A94E38A000
heap
page read and write
25FA6899000
heap
page read and write
1A958933000
trusted library allocation
page read and write
1A945442000
heap
page read and write
1A9454A8000
heap
page read and write
1A94FDBF000
trusted library allocation
page read and write
1A9564BD000
trusted library allocation
page read and write
1A950AB0000
trusted library allocation
page read and write
1EB30376000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A95A6F1000
trusted library allocation
page read and write
1A95A6F1000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1A94E0C0000
trusted library allocation
page read and write
1A95A3C4000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94548D000
heap
page read and write
1A9504CC000
trusted library allocation
page read and write
1A94F8FD000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A949D81000
trusted library allocation
page read and write
1A94C8F7000
trusted library allocation
page read and write
1A94ECE6000
trusted library allocation
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A94FDED000
trusted library allocation
page read and write
1A945463000
heap
page read and write
E0BCCFE000
stack
page read and write
1A94545C000
heap
page read and write
1A94E3CA000
heap
page read and write
1EB3103D000
heap
page read and write
1A95A2EB000
trusted library allocation
page read and write
1A94ECE3000
trusted library allocation
page read and write
1A950173000
trusted library allocation
page read and write
1A95A66E000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A945463000
heap
page read and write
1A95A691000
trusted library allocation
page read and write
1A94F8A0000
trusted library allocation
page read and write
1A95AAB2000
trusted library allocation
page read and write
1A95354D000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A95A55A000
trusted library allocation
page read and write
1A94549B000
heap
page read and write
1A94FD23000
trusted library allocation
page read and write
1A9566F6000
trusted library allocation
page read and write
1EB31031000
heap
page read and write
1A94FB3A000
trusted library allocation
page read and write
1A94EE23000
trusted library allocation
page read and write
1A94E1FD000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A9562B4000
trusted library allocation
page read and write
146D4053000
heap
page read and write
1A951917000
trusted library allocation
page read and write
1A95AB6C000
heap
page read and write
1A95A671000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94544C000
heap
page read and write
1C90000
trusted library allocation
page read and write
1A94ECEB000
trusted library allocation
page read and write
1A950232000
trusted library allocation
page read and write
1A9564B3000
trusted library allocation
page read and write
1A956128000
trusted library allocation
page read and write
1A9519BA000
trusted library allocation
page read and write
1A95AB0E000
heap
page read and write
1A95629C000
trusted library allocation
page read and write
1A94E0A0000
trusted library allocation
page read and write
1A94E386000
heap
page read and write
1A95A468000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A94F8FE000
trusted library allocation
page read and write
1A94FDEB000
trusted library allocation
page read and write
1A94E7D0000
trusted library allocation
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A94F9BA000
trusted library allocation
page read and write
F90000
heap
page read and write
1A956555000
trusted library allocation
page read and write
1A95017D000
trusted library allocation
page read and write
146D4040000
heap
page read and write
1A94E0D4000
trusted library allocation
page read and write
1A94E0DC000
trusted library allocation
page read and write
1A95627C000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A95A250000
trusted library allocation
page read and write
1A94F8E0000
trusted library allocation
page read and write
1A95A25A000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94F852000
trusted library allocation
page read and write
1A95A2E7000
trusted library allocation
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A957AAE000
trusted library allocation
page read and write
1A950C68000
trusted library allocation
page read and write
1A94E7B0000
trusted library allocation
page read and write
1A95655F000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A94C892000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95A4C3000
trusted library allocation
page read and write
1EB30200000
trusted library allocation
page read and write
1A95018B000
trusted library allocation
page read and write
1A94EBB5000
trusted library allocation
page read and write
1A94F9E4000
trusted library allocation
page read and write
1A94DD90000
trusted library allocation
page read and write
1A95085F000
trusted library allocation
page read and write
21C14DA7000
trusted library allocation
page read and write
1A949DDF000
trusted library allocation
page read and write
1A94A462000
trusted library allocation
page read and write
1A956786000
trusted library allocation
page read and write
1A950184000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A95A66C000
trusted library allocation
page read and write
1A94FDE4000
trusted library allocation
page read and write
1A95651F000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94A4E4000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A9564E4000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A956564000
trusted library allocation
page read and write
1A95ABF1000
heap
page read and write
1A945491000
heap
page read and write
21C14B8F000
unclassified section
page read and write
1A95AB81000
heap
page read and write
1A94FD13000
trusted library allocation
page read and write
1A9565EE000
trusted library allocation
page read and write
1A94F5D8000
trusted library allocation
page read and write
1A95A741000
trusted library allocation
page read and write
1A9563F6000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FC29000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94ECD9000
trusted library allocation
page read and write
1A94F965000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94BFA5000
trusted library allocation
page read and write
1A959FC6000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A950184000
trusted library allocation
page read and write
1A950BD9000
trusted library allocation
page read and write
CB0000
unkown
page write copy
1A94E08F000
trusted library allocation
page read and write
1A94A494000
trusted library allocation
page read and write
1A94E787000
trusted library allocation
page read and write
1A94E360000
heap
page read and write
1A94E74A000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A95677D000
trusted library allocation
page read and write
1A957A4B000
trusted library allocation
page read and write
1A94B486000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945496000
heap
page read and write
21C14D6E000
trusted library allocation
page read and write
1A94EDF4000
trusted library allocation
page read and write
1A94ECA9000
trusted library allocation
page read and write
1A950866000
trusted library allocation
page read and write
1A94FFD9000
trusted library allocation
page read and write
1A956339000
trusted library allocation
page read and write
1A94F9A7000
trusted library allocation
page read and write
1A956786000
trusted library allocation
page read and write
1A959F7B000
trusted library allocation
page read and write
1A945436000
heap
page read and write
1A94F888000
trusted library allocation
page read and write
1A94EC57000
trusted library allocation
page read and write
1A95A7FC000
trusted library allocation
page read and write
1A957A84000
trusted library allocation
page read and write
1A9504E9000
trusted library allocation
page read and write
1A9506BF000
trusted library allocation
page read and write
1A95AC63000
heap
page read and write
1A945451000
heap
page read and write
1A950196000
trusted library allocation
page read and write
1A95651D000
trusted library allocation
page read and write
1A94F955000
trusted library allocation
page read and write
1A950CAD000
trusted library allocation
page read and write
1A94FDD2000
trusted library allocation
page read and write
1A94E188000
trusted library allocation
page read and write
1A956116000
trusted library allocation
page read and write
1A952F9E000
trusted library allocation
page read and write
1A95199E000
trusted library allocation
page read and write
146D45C0000
heap
page read and write
1A945485000
heap
page read and write
1A9564A6000
trusted library allocation
page read and write
1A94E881000
trusted library allocation
page read and write
1A9561EE000
trusted library allocation
page read and write
1A956557000
trusted library allocation
page read and write
1A9519CB000
trusted library allocation
page read and write
1A94FCE8000
trusted library allocation
page read and write
1EB3039F000
trusted library allocation
page read and write
1A94FD18000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94FDBF000
trusted library allocation
page read and write
1A94FD23000
trusted library allocation
page read and write
1A94E36F000
heap
page read and write
1A945451000
heap
page read and write
1A9566E0000
trusted library allocation
page read and write
1A957A38000
trusted library allocation
page read and write
1A94A475000
trusted library allocation
page read and write
1A94E1AD000
trusted library allocation
page read and write
1A957AB2000
trusted library allocation
page read and write
1A95A6F3000
trusted library allocation
page read and write
1EB31021000
heap
page read and write
21C14D66000
trusted library allocation
page read and write
1A957A94000
trusted library allocation
page read and write
1EB3107B000
heap
page read and write
1A94EC9E000
trusted library allocation
page read and write
1A94EE0A000
trusted library allocation
page read and write
1A949D98000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
FC3000
heap
page read and write
1A94BFB8000
trusted library allocation
page read and write
1A94E9CF000
trusted library allocation
page read and write
1A95A80E000
trusted library allocation
page read and write
1A94E860000
trusted library allocation
page read and write
1A94DD89000
trusted library allocation
page read and write
1A94E0F4000
trusted library allocation
page read and write
1A94BF04000
trusted library allocation
page read and write
1A956564000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A95625E000
trusted library allocation
page read and write
1A95AB10000
heap
page read and write
1A945495000
heap
page read and write
3690000
heap
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A950809000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A94ECFE000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94ECDC000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A94FDC3000
trusted library allocation
page read and write
208AD0E000
unkown
page readonly
1A956577000
trusted library allocation
page read and write
1A95192F000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
21C14E76000
heap
page read and write
1A9566F6000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94BFE2000
trusted library allocation
page read and write
1A950483000
trusted library allocation
page read and write
1A94BFB8000
trusted library allocation
page read and write
BE1000
unkown
page execute read
E0BCD3E000
unkown
page readonly
25FA6870000
heap
page read and write
1A9563F6000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A94F98B000
trusted library allocation
page read and write
1A95A47F000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A94FBC9000
trusted library allocation
page read and write
1A95655F000
trusted library allocation
page read and write
1A950CB6000
trusted library allocation
page read and write
1A945440000
heap
page read and write
1A945464000
heap
page read and write
1A945464000
heap
page read and write
146D45C6000
heap
page read and write
1A94E1D9000
trusted library allocation
page read and write
32F563E000
unkown
page readonly
146D4449000
trusted library allocation
page read and write
1A950B8D000
trusted library allocation
page read and write
1A95A2F3000
trusted library allocation
page read and write
1A94EDBA000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A94EE1A000
trusted library allocation
page read and write
1A95A6B7000
trusted library allocation
page read and write
1A9502F0000
trusted library allocation
page read and write
21C14D72000
trusted library allocation
page read and write
1A95655A000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A94E131000
trusted library allocation
page read and write
1A94FD2E000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A945464000
heap
page read and write
1A95654A000
trusted library allocation
page read and write
1A957A9C000
trusted library allocation
page read and write
FB9000
heap
page read and write
1A94E196000
trusted library allocation
page read and write
1A94ECE2000
trusted library allocation
page read and write
1A956570000
trusted library allocation
page read and write
1A95A6B0000
trusted library allocation
page read and write
21C14B80000
unclassified section
page read and write
1A94FD9F000
trusted library allocation
page read and write
E0BED3E000
unkown
page readonly
1A9507D0000
trusted library allocation
page read and write
1A950126000
trusted library allocation
page read and write
1A94542F000
heap
page read and write
1A95017F000
trusted library allocation
page read and write
1A956733000
trusted library allocation
page read and write
1A957A90000
trusted library allocation
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A95A2B7000
trusted library allocation
page read and write
1A950823000
trusted library allocation
page read and write
1A94E94D000
trusted library allocation
page read and write
1A95A820000
trusted library allocation
page read and write
1A9565D0000
trusted library allocation
page read and write
1A94FD81000
trusted library allocation
page read and write
1A94E093000
trusted library allocation
page read and write
1A95938F000
trusted library allocation
page read and write
1A94EDFB000
trusted library allocation
page read and write
1A956542000
trusted library allocation
page read and write
1A945451000
heap
page read and write
1A94FCDB000
trusted library allocation
page read and write
1A94A4A9000
trusted library allocation
page read and write
FDF000
heap
page read and write
1A956353000
trusted library allocation
page read and write
1A94A47D000
trusted library allocation
page read and write
1A95A34C000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A9565EE000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A94F9B5000
trusted library allocation
page read and write
1A94E95E000
trusted library allocation
page read and write
1A94FA27000
trusted library allocation
page read and write
1A95A4D5000
trusted library allocation
page read and write
1A94F9F6000
trusted library allocation
page read and write
1A94543A000
heap
page read and write
1A95061A000
trusted library allocation
page read and write
1A94C8A8000
trusted library allocation
page read and write
1A94542F000
heap
page read and write
1A9454A4000
heap
page read and write
1A9500EB000
trusted library allocation
page read and write
1A95A26A000
trusted library allocation
page read and write
1A95A6F8000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A959EE7000
trusted library allocation
page read and write
1A95618F000
trusted library allocation
page read and write
1A94ECD4000
trusted library allocation
page read and write
1EB30FA3000
heap
page read and write
1A94545C000
heap
page read and write
1A950C70000
trusted library allocation
page read and write
1A956778000
trusted library allocation
page read and write
1A94EC7A000
trusted library allocation
page read and write
1EB31031000
heap
page read and write
1A94EDBA000
trusted library allocation
page read and write
1A950CB6000
trusted library allocation
page read and write
1A94B4C7000
trusted library allocation
page read and write
1A950AB9000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94F952000
trusted library allocation
page read and write
1A956692000
trusted library allocation
page read and write
1A94BF1D000
trusted library allocation
page read and write
1A94BFF1000
trusted library allocation
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
BE1000
unkown
page execute read
1EB3106A000
heap
page read and write
BC0000
heap
page read and write
1A9519E1000
trusted library allocation
page read and write
1A95A6B0000
trusted library allocation
page read and write
1A94BF2B000
trusted library allocation
page read and write
1A94FD81000
trusted library allocation
page read and write
1A94ED85000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A950177000
trusted library allocation
page read and write
1A950191000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A9561EE000
trusted library allocation
page read and write
146D4000000
remote allocation
page read and write
1A9564C8000
trusted library allocation
page read and write
1A94E165000
trusted library allocation
page read and write
1A957A23000
trusted library allocation
page read and write
1A957AA6000
trusted library allocation
page read and write
1A94A48A000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95A243000
trusted library allocation
page read and write
1A94FD9F000
trusted library allocation
page read and write
1A94F9C3000
trusted library allocation
page read and write
1A94E7D0000
trusted library allocation
page read and write
287C60F03000
trusted library allocation
page read and write
1A94E16D000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A956644000
trusted library allocation
page read and write
1EB31023000
heap
page read and write
1A94E996000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A951955000
trusted library allocation
page read and write
1A95892E000
trusted library allocation
page read and write
1A94E3CA000
heap
page read and write
1A95612F000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A95A2E9000
trusted library allocation
page read and write
1A95A823000
trusted library allocation
page read and write
208AD4D000
stack
page read and write
1A95A5A0000
trusted library allocation
page read and write
1A9563F3000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A945445000
heap
page read and write
1A945446000
heap
page read and write
1A945484000
heap
page read and write
1A95AA3D000
trusted library allocation
page read and write
1A94F8E9000
trusted library allocation
page read and write
1A95678F000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A9564F3000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95192F000
trusted library allocation
page read and write
1A950A8B000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
1A95A528000
trusted library allocation
page read and write
1A94EDE5000
trusted library allocation
page read and write
208CFFE000
unkown
page readonly
1A94C229000
trusted library allocation
page read and write
1A950B87000
trusted library allocation
page read and write
1A950AEF000
trusted library allocation
page read and write
1A94C86B000
trusted library allocation
page read and write
1A94FC67000
trusted library allocation
page read and write
1A95A835000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FDF7000
trusted library allocation
page read and write
1A94A49D000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A9566F8000
trusted library allocation
page read and write
1A94E1B1000
trusted library allocation
page read and write
1A94FCD9000
trusted library allocation
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A94F842000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94E1C7000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A94FF4C000
trusted library allocation
page read and write
1A94FD97000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1EB3106D000
heap
page read and write
32F5EBE000
stack
page read and write
1EB31023000
heap
page read and write
1A945456000
heap
page read and write
1A952F6D000
trusted library allocation
page read and write
FC6000
heap
page read and write
1A94F5DA000
trusted library allocation
page read and write
1A950192000
trusted library allocation
page read and write
1A94FDC3000
trusted library allocation
page read and write
1A959FEC000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A95AAFA000
trusted library allocation
page read and write
1A94FF40000
trusted library allocation
page read and write
1A9587C8000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94F9E4000
trusted library allocation
page read and write
1A94EC67000
trusted library allocation
page read and write
21C14D96000
trusted library allocation
page read and write
1A94EDBD000
trusted library allocation
page read and write
1A95A352000
trusted library allocation
page read and write
1A94FCE5000
trusted library allocation
page read and write
1EB30F9C000
heap
page read and write
1A9502EE000
trusted library allocation
page read and write
1A94A4FE000
trusted library allocation
page read and write
1EB30FAC000
heap
page read and write
1A94FF93000
trusted library allocation
page read and write
1A95A4D0000
trusted library allocation
page read and write
1A958CD3000
trusted library allocation
page read and write
1A957A4B000
trusted library allocation
page read and write
1A9564ED000
trusted library allocation
page read and write
1A95A6FA000
trusted library allocation
page read and write
1A950823000
trusted library allocation
page read and write
1A94F91E000
trusted library allocation
page read and write
1A950492000
trusted library allocation
page read and write
1A94E784000
trusted library allocation
page read and write
1A957A84000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A94FF50000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
1A94EE2C000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A949D9E000
trusted library allocation
page read and write
1A94E3CC000
heap
page read and write
1A94EDDA000
trusted library allocation
page read and write
1A9564E4000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A9566A6000
trusted library allocation
page read and write
1A94BF64000
trusted library allocation
page read and write
1A94DDDB000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
1EB30378000
trusted library allocation
page read and write
1A957A5A000
trusted library allocation
page read and write
1A95936B000
trusted library allocation
page read and write
1A9500E5000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
32F3DD8000
stack
page read and write
1A95A823000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A95652E000
trusted library allocation
page read and write
1A95A825000
trusted library allocation
page read and write
1A957ADA000
trusted library allocation
page read and write
1A950207000
trusted library allocation
page read and write
1A95A2A9000
trusted library allocation
page read and write
1A94FD30000
trusted library allocation
page read and write
1A95A354000
trusted library allocation
page read and write
1A95892C000
trusted library allocation
page read and write
21C14F1B000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A95081C000
trusted library allocation
page read and write
1A95018B000
trusted library allocation
page read and write
1A95088F000
trusted library allocation
page read and write
1A94A49D000
trusted library allocation
page read and write
1A94E77B000
trusted library allocation
page read and write
1A94E7F6000
trusted library allocation
page read and write
1A94E104000
trusted library allocation
page read and write
1A95A7C5000
trusted library allocation
page read and write
1A94BFAE000
trusted library allocation
page read and write
1A95658C000
trusted library allocation
page read and write
1A956553000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
146D40E0000
heap
page readonly
1A95A2F3000
trusted library allocation
page read and write
1A94ECD9000
trusted library allocation
page read and write
1A95016F000
trusted library allocation
page read and write
1A95886D000
trusted library allocation
page read and write
1A94EEEE000
trusted library allocation
page read and write
FC6000
heap
page read and write
1A953193000
trusted library allocation
page read and write
1A94E955000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94F9C0000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94FBFD000
trusted library allocation
page read and write
1A95A6D2000
trusted library allocation
page read and write
1A94FBDA000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A9500EB000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A9566FE000
trusted library allocation
page read and write
1A95AB03000
heap
page read and write
1A94A4A4000
trusted library allocation
page read and write
1A950C9F000
trusted library allocation
page read and write
208F03E000
unkown
page readonly
1A94A4AA000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A95A6DD000
trusted library allocation
page read and write
1A95647D000
trusted library allocation
page read and write
1A94542F000
heap
page read and write
1A95654A000
trusted library allocation
page read and write
1A9564D4000
trusted library allocation
page read and write
1A94EC66000
trusted library allocation
page read and write
1A94EEE0000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A956641000
trusted library allocation
page read and write
1A94C84E000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94E862000
trusted library allocation
page read and write
1EB30FA4000
heap
page read and write
1A9500E5000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A951898000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945484000
heap
page read and write
1A94548D000
heap
page read and write
1A950C66000
trusted library allocation
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A94DD9D000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94C829000
trusted library allocation
page read and write
1A950C72000
trusted library allocation
page read and write
1A9566AF000
trusted library allocation
page read and write
1A94F8FB000
trusted library allocation
page read and write
1A950BD6000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94542E000
heap
page read and write
1EB30310000
trusted library allocation
page read and write
1A957AEE000
trusted library allocation
page read and write
1A95A691000
trusted library allocation
page read and write
1A9564B6000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94F9F3000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94FD87000
trusted library allocation
page read and write
1EB303EB000
trusted library allocation
page read and write
1A94F9F3000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A9563F3000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95AB07000
heap
page read and write
1EB310B7000
heap
page read and write
1A950C5A000
trusted library allocation
page read and write
1A94F971000
trusted library allocation
page read and write
1A94E1EA000
trusted library allocation
page read and write
1A95678F000
trusted library allocation
page read and write
146D44A2000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94F8E0000
trusted library allocation
page read and write
1A95880C000
trusted library allocation
page read and write
1A95617A000
trusted library allocation
page read and write
1A957A84000
trusted library allocation
page read and write
1EB301AF000
unclassified section
page read and write
1A94FCB9000
trusted library allocation
page read and write
1A95675E000
trusted library allocation
page read and write
1A9564E1000
trusted library allocation
page read and write
FBA000
heap
page read and write
EB4000
heap
page read and write
1A94EDBE000
trusted library allocation
page read and write
1A94EDE2000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1EB30F9F000
heap
page read and write
1A9500E4000
trusted library allocation
page read and write
1A9567F0000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1EB3036A000
trusted library allocation
page read and write
1A957A98000
trusted library allocation
page read and write
1A95A46B000
trusted library allocation
page read and write
1A9565FE000
trusted library allocation
page read and write
1A94BF13000
trusted library allocation
page read and write
1A95631F000
trusted library allocation
page read and write
1A950C45000
trusted library allocation
page read and write
1A94FCCD000
trusted library allocation
page read and write
1A94BF17000
trusted library allocation
page read and write
1EB301B0000
trusted library section
page readonly
1A94549A000
heap
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A9519BF000
trusted library allocation
page read and write
1A95A69D000
trusted library allocation
page read and write
1A94F888000
trusted library allocation
page read and write
1A94FDF7000
trusted library allocation
page read and write
1EB2FFE0000
heap
page read and write
1A94548D000
heap
page read and write
1A95A69D000
trusted library allocation
page read and write
1A94F9EF000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94E88B000
trusted library allocation
page read and write
1EB30F9C000
heap
page read and write
1A94BFC7000
trusted library allocation
page read and write
1A953505000
trusted library allocation
page read and write
1A95088A000
trusted library allocation
page read and write
1A945444000
heap
page read and write
1A945491000
heap
page read and write
1EB30317000
trusted library allocation
page read and write
1A94E841000
trusted library allocation
page read and write
1A94E1D4000
trusted library allocation
page read and write
1A94ECFA000
trusted library allocation
page read and write
25FA67D0000
heap
page read and write
1A94FDF1000
trusted library allocation
page read and write
1A95194F000
trusted library allocation
page read and write
1EB30FBD000
heap
page read and write
1A945464000
heap
page read and write
1A94EDB8000
trusted library allocation
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A95AB10000
heap
page read and write
1A945487000
heap
page read and write
1A957AAA000
trusted library allocation
page read and write
1A94EC50000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94548D000
heap
page read and write
1A945487000
heap
page read and write
1A94DD9D000
trusted library allocation
page read and write
1A94DDC8000
trusted library allocation
page read and write
1A95A772000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94E054000
trusted library allocation
page read and write
1A94FA48000
trusted library allocation
page read and write
1A95A6B8000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94F9F6000
trusted library allocation
page read and write
1A956555000
trusted library allocation
page read and write
FDB000
heap
page read and write
21C14F00000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94FD97000
trusted library allocation
page read and write
1A94F97E000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
256A1A00000
trusted library allocation
page read and write
1C90000
trusted library allocation
page read and write
1A949DBF000
trusted library allocation
page read and write
1A9561EB000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A95A6E7000
trusted library allocation
page read and write
1A959FDD000
trusted library allocation
page read and write
1A950153000
trusted library allocation
page read and write
1A956132000
trusted library allocation
page read and write
1A950AB9000
trusted library allocation
page read and write
1A9566A6000
trusted library allocation
page read and write
1A9518DA000
trusted library allocation
page read and write
1A9534A2000
trusted library allocation
page read and write
1A945488000
heap
page read and write
1A956264000
trusted library allocation
page read and write
1A94E016000
trusted library allocation
page read and write
1A95A691000
trusted library allocation
page read and write
1A94E037000
trusted library allocation
page read and write
1A95A83A000
trusted library allocation
page read and write
1A95A832000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94EC2F000
trusted library allocation
page read and write
146D440C000
trusted library allocation
page read and write
1A94FF3C000
trusted library allocation
page read and write
1A9564EF000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A94ECFC000
trusted library allocation
page read and write
21C14980000
remote allocation
page read and write
1A95A6F6000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A9502A2000
trusted library allocation
page read and write
1A959FDB000
trusted library allocation
page read and write
1EB30303000
trusted library allocation
page read and write
146D45D0000
heap
page read and write
1A945464000
heap
page read and write
1A957AE5000
trusted library allocation
page read and write
1A94FCF7000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94548D000
heap
page read and write
1A95A691000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
1A94FD35000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94EBB8000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A94DBD8000
trusted library allocation
page read and write
FD0000
heap
page read and write
1A959FE1000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A94F593000
trusted library allocation
page read and write
1A95A825000
trusted library allocation
page read and write
1A957A5A000
trusted library allocation
page read and write
32F336C000
stack
page read and write
1A94EDE4000
trusted library allocation
page read and write
1A94C873000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A956577000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A94FD9F000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945492000
heap
page read and write
1A95A6FE000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A95A69D000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A9567DE000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1EB3102D000
heap
page read and write
1A94C865000
trusted library allocation
page read and write
1A9564E6000
trusted library allocation
page read and write
1A957A56000
trusted library allocation
page read and write
1A95AB0E000
heap
page read and write
1A94E95D000
trusted library allocation
page read and write
1EB31026000
heap
page read and write
1A9508D0000
trusted library allocation
page read and write
1A9562D8000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1EB30180000
heap
page readonly
1A959FDB000
trusted library allocation
page read and write
1A94EDF1000
trusted library allocation
page read and write
1EB31029000
heap
page read and write
1A950C8A000
trusted library allocation
page read and write
1EB30348000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A945464000
heap
page read and write
1A9454A4000
heap
page read and write
1A950C72000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A945484000
heap
page read and write
1A945434000
heap
page read and write
25FA687C000
heap
page read and write
1A94E95B000
trusted library allocation
page read and write
1A95001F000
trusted library allocation
page read and write
1A94E0EB000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94EE52000
trusted library allocation
page read and write
1A94FD8B000
trusted library allocation
page read and write
1A94543D000
heap
page read and write
1A956370000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A95198F000
trusted library allocation
page read and write
1A94EC9E000
trusted library allocation
page read and write
1A957A51000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94F8E0000
trusted library allocation
page read and write
C66B1FC000
stack
page read and write
1A945445000
heap
page read and write
1A95AA40000
trusted library allocation
page read and write
1A9567A3000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A94F9C0000
trusted library allocation
page read and write
1A950192000
trusted library allocation
page read and write
1A94E360000
heap
page read and write
1A94FD87000
trusted library allocation
page read and write
1A94ECAF000
trusted library allocation
page read and write
1A94E36F000
heap
page read and write
1A950BF0000
trusted library allocation
page read and write
1A94FB62000
trusted library allocation
page read and write
1A94E08F000
trusted library allocation
page read and write
1A957AA0000
trusted library allocation
page read and write
1A94BFAE000
trusted library allocation
page read and write
1A959FD2000
trusted library allocation
page read and write
1A94FF44000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A951931000
trusted library allocation
page read and write
1A94BF69000
trusted library allocation
page read and write
1A951994000
trusted library allocation
page read and write
1A94FCFE000
trusted library allocation
page read and write
FE0000
heap
page read and write
1A95937A000
trusted library allocation
page read and write
1A957AAE000
trusted library allocation
page read and write
1A949D90000
trusted library allocation
page read and write
1A956553000
trusted library allocation
page read and write
1A94E19C000
trusted library allocation
page read and write
1A94F9A9000
trusted library allocation
page read and write
1EB3030C000
trusted library allocation
page read and write
1A9518E2000
trusted library allocation
page read and write
1A94ECE1000
trusted library allocation
page read and write
1A9566F2000
trusted library allocation
page read and write
1A9454AF000
heap
page read and write
1A94FA3E000
trusted library allocation
page read and write
1A956675000
trusted library allocation
page read and write
1A9563E9000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A959ED9000
trusted library allocation
page read and write
1A95654A000
trusted library allocation
page read and write
1A94F8C3000
trusted library allocation
page read and write
1A94DDA3000
trusted library allocation
page read and write
1A957A53000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A945434000
heap
page read and write
1A94BFBE000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A945496000
heap
page read and write
1A945495000
heap
page read and write
1A94EC4A000
trusted library allocation
page read and write
1EB31020000
heap
page read and write
1A95003B000
trusted library allocation
page read and write
1A94B4B2000
trusted library allocation
page read and write
1A94E1A1000
trusted library allocation
page read and write
1A956313000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95A832000
trusted library allocation
page read and write
1A959FDD000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A959F54000
trusted library allocation
page read and write
1A94FFC6000
trusted library allocation
page read and write
1A9564C1000
trusted library allocation
page read and write
1A94BFDE000
trusted library allocation
page read and write
1A94F8FE000
trusted library allocation
page read and write
1A94F805000
trusted library allocation
page read and write
1A95A698000
trusted library allocation
page read and write
21C14B90000
heap
page read and write
1A945464000
heap
page read and write
1A957B00000
trusted library allocation
page read and write
1A9504D1000
trusted library allocation
page read and write
1A95630C000
trusted library allocation
page read and write
1A95AA40000
trusted library allocation
page read and write
1A94BFA7000
trusted library allocation
page read and write
1A94E38B000
heap
page read and write
1A950C83000
trusted library allocation
page read and write
1A95A816000
trusted library allocation
page read and write
1A95013F000
trusted library allocation
page read and write
1A94E0DB000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A945491000
heap
page read and write
E0BDD3E000
unkown
page readonly
1A9454A8000
heap
page read and write
1A94EDFB000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94E355000
heap
page read and write
1A94BFAE000
trusted library allocation
page read and write
1A94E399000
heap
page read and write
1A9564EF000
trusted library allocation
page read and write
1A957A90000
trusted library allocation
page read and write
1A94E7D4000
trusted library allocation
page read and write
1A94DDE4000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A95A6EF000
trusted library allocation
page read and write
1A953633000
trusted library allocation
page read and write
1A94E39F000
heap
page read and write
1A94546E000
heap
page read and write
1A94545E000
heap
page read and write
1A94C223000
trusted library allocation
page read and write
1A94F9F6000
trusted library allocation
page read and write
1A95A6F8000
trusted library allocation
page read and write
1A958CC9000
trusted library allocation
page read and write
1A959800000
trusted library allocation
page read and write
21C14F12000
trusted library allocation
page read and write
1A94EBA1000
trusted library allocation
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A94E98B000
trusted library allocation
page read and write
1A94FC07000
trusted library allocation
page read and write
1A95018D000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A945488000
heap
page read and write
21C14D7A000
trusted library allocation
page read and write
1A94B4B1000
trusted library allocation
page read and write
1A9562CD000
trusted library allocation
page read and write
256A1B00000
trusted library allocation
page read and write
1A9519B5000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A94FD87000
trusted library allocation
page read and write
1A94DD7C000
trusted library allocation
page read and write
1A94FF37000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94FD49000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A95659B000
trusted library allocation
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A9565EA000
trusted library allocation
page read and write
1A94FC73000
trusted library allocation
page read and write
1EB31026000
heap
page read and write
1A94EDFD000
trusted library allocation
page read and write
BBE000
stack
page read and write
1A94C873000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A95668B000
trusted library allocation
page read and write
1EB30FA0000
heap
page read and write
1A945434000
heap
page read and write
1A950091000
trusted library allocation
page read and write
146D3F90000
unclassified section
page readonly
1A94FF7B000
trusted library allocation
page read and write
1A94F5D1000
trusted library allocation
page read and write
1A94FC59000
trusted library allocation
page read and write
1A95A462000
trusted library allocation
page read and write
1A94EDCA000
trusted library allocation
page read and write
1A94FF8B000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A95AC60000
heap
page read and write
1A959F73000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
32F33AE000
unkown
page readonly
1A94A494000
trusted library allocation
page read and write
1A957AEE000
trusted library allocation
page read and write
1A94EC3C000
trusted library allocation
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A94DBC2000
trusted library allocation
page read and write
1A94FDAB000
trusted library allocation
page read and write
1A95A4BE000
trusted library allocation
page read and write
1A95A2F3000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A95A2F3000
trusted library allocation
page read and write
1A950239000
trusted library allocation
page read and write
1A94ECEA000
trusted library allocation
page read and write
1A94FD49000
trusted library allocation
page read and write
1A94F8A2000
trusted library allocation
page read and write
25FA6881000
heap
page read and write
1A945491000
heap
page read and write
21C14D47000
trusted library allocation
page read and write
1A950833000
trusted library allocation
page read and write
1A945436000
heap
page read and write
1A957A6C000
trusted library allocation
page read and write
1A950209000
trusted library allocation
page read and write
1A951923000
trusted library allocation
page read and write
25FA6891000
heap
page read and write
1A94FDDA000
trusted library allocation
page read and write
1A95A572000
trusted library allocation
page read and write
1EB301A0000
unclassified section
page read and write
1A94B460000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A957A98000
trusted library allocation
page read and write
1A94ED9C000
trusted library allocation
page read and write
1A951939000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A950234000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1EB30F9C000
heap
page read and write
1A94E12A000
trusted library allocation
page read and write
1A94546E000
heap
page read and write
1A94E0CC000
trusted library allocation
page read and write
FDB000
heap
page read and write
1A956763000
trusted library allocation
page read and write
1A9566DE000
trusted library allocation
page read and write
1A949DB3000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95A2E9000
trusted library allocation
page read and write
1A94ECD9000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A945484000
heap
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94EC36000
trusted library allocation
page read and write
1A9519BA000
trusted library allocation
page read and write
1A9565EE000
trusted library allocation
page read and write
CA2000
unkown
page readonly
1A9564EA000
trusted library allocation
page read and write
1A94DDDB000
trusted library allocation
page read and write
FE6000
heap
page read and write
1A94E08B000
trusted library allocation
page read and write
1A95935B000
trusted library allocation
page read and write
1A956255000
trusted library allocation
page read and write
1A95AC60000
heap
page read and write
1A950229000
trusted library allocation
page read and write
1A94BF6F000
trusted library allocation
page read and write
1A951955000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A956100000
trusted library allocation
page read and write
1A956564000
trusted library allocation
page read and write
CB4000
unkown
page readonly
1A94F983000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A957A25000
trusted library allocation
page read and write
1A94E1BD000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A94EE20000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94E0FB000
trusted library allocation
page read and write
1A94FBDA000
trusted library allocation
page read and write
1A9566F2000
trusted library allocation
page read and write
1A95A2ED000
trusted library allocation
page read and write
1A949DCD000
trusted library allocation
page read and write
1A956487000
trusted library allocation
page read and write
1A94BFCB000
trusted library allocation
page read and write
1A95651B000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A94ECC9000
trusted library allocation
page read and write
FE6000
heap
page read and write
1A950CBC000
trusted library allocation
page read and write
1A95616F000
trusted library allocation
page read and write
1A950CB6000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94FCA9000
trusted library allocation
page read and write
1A95011D000
trusted library allocation
page read and write
1A951981000
trusted library allocation
page read and write
1A95A494000
trusted library allocation
page read and write
1A94FDD2000
trusted library allocation
page read and write
1A94FD8C000
trusted library allocation
page read and write
1A95A82A000
trusted library allocation
page read and write
1A95628D000
trusted library allocation
page read and write
1A95A789000
trusted library allocation
page read and write
1A94F9EC000
trusted library allocation
page read and write
1A94FCC4000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94E395000
heap
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A9500E4000
trusted library allocation
page read and write
1A959FDF000
trusted library allocation
page read and write
1A95A31E000
trusted library allocation
page read and write
1A95A7D8000
trusted library allocation
page read and write
146D4473000
trusted library allocation
page read and write
1A94F99D000
trusted library allocation
page read and write
1EB30FCA000
heap
page read and write
1A94A376000
trusted library allocation
page read and write
1A94EDD5000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A950695000
trusted library allocation
page read and write
1A94FB6D000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
1A94F9A9000
trusted library allocation
page read and write
1A945467000
heap
page read and write
1A9500FA000
trusted library allocation
page read and write
1A94E742000
trusted library allocation
page read and write
1A94FCC7000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A945440000
heap
page read and write
1A95617A000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94FFDD000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A945463000
heap
page read and write
1A9567E8000
trusted library allocation
page read and write
FB3000
heap
page read and write
1A95AB07000
heap
page read and write
1A951A7D000
trusted library allocation
page read and write
1A95AA39000
trusted library allocation
page read and write
1A94FDF1000
trusted library allocation
page read and write
1A95612F000
trusted library allocation
page read and write
1A94E390000
heap
page read and write
1A94EC57000
trusted library allocation
page read and write
1A94FD93000
trusted library allocation
page read and write
1A95658C000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A94544C000
heap
page read and write
1A94BFA7000
trusted library allocation
page read and write
1A95A6EF000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A957A94000
trusted library allocation
page read and write
1A94FDFB000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A945484000
heap
page read and write
1A9564FC000
trusted library allocation
page read and write
1A94FDB6000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1EB303BC000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945487000
heap
page read and write
25FA6A00000
trusted library allocation
page read and write
1A94EDF9000
trusted library allocation
page read and write
1A94ECF4000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
208D83E000
stack
page read and write
1A94548D000
heap
page read and write
1A94549A000
heap
page read and write
1A950789000
trusted library allocation
page read and write
1A94E399000
heap
page read and write
EB4000
heap
page read and write
1A94EA95000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94ECFC000
trusted library allocation
page read and write
1A958787000
trusted library allocation
page read and write
1A956597000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A956291000
trusted library allocation
page read and write
1A94ED92000
trusted library allocation
page read and write
1A94EE11000
trusted library allocation
page read and write
1A94B4DC000
trusted library allocation
page read and write
CB4000
unkown
page readonly
1A94549A000
heap
page read and write
1A95362C000
trusted library allocation
page read and write
1A958CFA000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A950BC3000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A945464000
heap
page read and write
1A956486000
trusted library allocation
page read and write
1A94E1EA000
trusted library allocation
page read and write
1A956577000
trusted library allocation
page read and write
1A94FCA9000
trusted library allocation
page read and write
1A95A2EB000
trusted library allocation
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A94FD53000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1EB2FFD0000
heap
page read and write
1A9504CE000
trusted library allocation
page read and write
1A945464000
heap
page read and write
BE0000
unkown
page readonly
1A945491000
heap
page read and write
1A945487000
heap
page read and write
1A94DBD4000
trusted library allocation
page read and write
1A94ECE0000
trusted library allocation
page read and write
1A94FDCB000
trusted library allocation
page read and write
FBA000
heap
page read and write
1A959334000
trusted library allocation
page read and write
1A94EC48000
trusted library allocation
page read and write
1A94DD8C000
trusted library allocation
page read and write
1A94FCC7000
trusted library allocation
page read and write
1A9567E8000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A95A356000
trusted library allocation
page read and write
1A9564D6000
trusted library allocation
page read and write
E0BE53E000
stack
page read and write
1A945494000
heap
page read and write
1A94E945000
trusted library allocation
page read and write
1A95A389000
trusted library allocation
page read and write
25FA6BB5000
heap
page read and write
1A950192000
trusted library allocation
page read and write
1A94FF96000
trusted library allocation
page read and write
1A956128000
trusted library allocation
page read and write
A0FCA41E000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94FC7B000
trusted library allocation
page read and write
1A95A663000
trusted library allocation
page read and write
1A94E784000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94F8E6000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94FDA4000
trusted library allocation
page read and write
1A949DC9000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A951870000
trusted library allocation
page read and write
1A94A413000
trusted library allocation
page read and write
1A950CB0000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
E0BBBFE000
unkown
page readonly
1A94B49C000
trusted library allocation
page read and write
1A94F970000
trusted library allocation
page read and write
1A94EDAE000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1EB31099000
heap
page read and write
1A94545E000
heap
page read and write
1A94545C000
heap
page read and write
1A94FC4A000
trusted library allocation
page read and write
146D4417000
trusted library allocation
page read and write
1A95A77F000
trusted library allocation
page read and write
1A956564000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A94E939000
trusted library allocation
page read and write
1A94FFB1000
trusted library allocation
page read and write
1A9564E4000
trusted library allocation
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A94542D000
heap
page read and write
1A95A54F000
trusted library allocation
page read and write
1A94ECFC000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A9500D3000
trusted library allocation
page read and write
1A94FDD2000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94ECA9000
trusted library allocation
page read and write
1A9507BD000
trusted library allocation
page read and write
1A9562DD000
trusted library allocation
page read and write
1A94FDDA000
trusted library allocation
page read and write
1A94E7D4000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94DD8C000
trusted library allocation
page read and write
1A94E797000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
E0BB3FE000
stack
page read and write
1A94EE0C000
trusted library allocation
page read and write
1A9566BB000
trusted library allocation
page read and write
1A95A5F3000
trusted library allocation
page read and write
1A94C86B000
trusted library allocation
page read and write
1A94E1F9000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
1A94F9EF000
trusted library allocation
page read and write
1A94E107000
trusted library allocation
page read and write
1A95A2F5000
trusted library allocation
page read and write
1A94EC19000
trusted library allocation
page read and write
1A95A5F3000
trusted library allocation
page read and write
EB4000
heap
page read and write
146D40F0000
unclassified section
page read and write
1EB303F5000
trusted library allocation
page read and write
1A94F8E6000
trusted library allocation
page read and write
1A95616F000
trusted library allocation
page read and write
1A950CB6000
trusted library allocation
page read and write
1A94E765000
trusted library allocation
page read and write
1A94ECBD000
trusted library allocation
page read and write
1A94E0DC000
trusted library allocation
page read and write
1A94E3CC000
heap
page read and write
1A945446000
heap
page read and write
1A956583000
trusted library allocation
page read and write
1A94A4B3000
trusted library allocation
page read and write
1A94F9EC000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A951961000
trusted library allocation
page read and write
1A95A3B8000
trusted library allocation
page read and write
1A95A6EF000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A950492000
trusted library allocation
page read and write
1A94FC32000
trusted library allocation
page read and write
1A945484000
heap
page read and write
BE0000
unkown
page readonly
1A94FDFE000
trusted library allocation
page read and write
1A9564E7000
trusted library allocation
page read and write
1A949DAA000
trusted library allocation
page read and write
FDB000
heap
page read and write
1A94F9E4000
trusted library allocation
page read and write
1A94F852000
trusted library allocation
page read and write
1A94EE8D000
trusted library allocation
page read and write
1A9565F2000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A95A2E0000
trusted library allocation
page read and write
1A95199E000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A95A682000
trusted library allocation
page read and write
1A9565D0000
trusted library allocation
page read and write
1A945495000
heap
page read and write
1A956282000
trusted library allocation
page read and write
1A95A6E6000
trusted library allocation
page read and write
1A95A2F1000
trusted library allocation
page read and write
1A94E399000
heap
page read and write
1A94E7D4000
trusted library allocation
page read and write
1A9567FD000
trusted library allocation
page read and write
256A18A0000
heap
page read and write
1A94EDC2000
trusted library allocation
page read and write
1A945471000
heap
page read and write
1A94FD95000
trusted library allocation
page read and write
1A9566C0000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A950192000
trusted library allocation
page read and write
1A95AA82000
trusted library allocation
page read and write
1A94B456000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A953507000
trusted library allocation
page read and write
1A9563F6000
trusted library allocation
page read and write
1A94ECDC000
trusted library allocation
page read and write
1D04000
heap
page read and write
1A94A460000
trusted library allocation
page read and write
1A95A350000
trusted library allocation
page read and write
1A9564FE000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A9565EE000
trusted library allocation
page read and write
1A94E07F000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94EE4C000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A95AA90000
trusted library allocation
page read and write
1A9563D2000
trusted library allocation
page read and write
1A945485000
heap
page read and write
146D4704000
trusted library allocation
page read and write
1A950177000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A95A7D4000
trusted library allocation
page read and write
1A95AB81000
heap
page read and write
1A9564EA000
trusted library allocation
page read and write
1A94C85E000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94FF9C000
trusted library allocation
page read and write
FC3000
heap
page read and write
1A95A288000
trusted library allocation
page read and write
1A953586000
trusted library allocation
page read and write
1A94EDEE000
trusted library allocation
page read and write
32F4DFE000
stack
page read and write
1A94EA88000
trusted library allocation
page read and write
1A94A482000
trusted library allocation
page read and write
FCF000
heap
page read and write
1A94E1A4000
trusted library allocation
page read and write
146D4020000
unclassified section
page readonly
1A949DA5000
trusted library allocation
page read and write
1A950BD5000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A950018000
trusted library allocation
page read and write
1A9500EB000
trusted library allocation
page read and write
1A950841000
trusted library allocation
page read and write
1A950871000
trusted library allocation
page read and write
1A94E158000
trusted library allocation
page read and write
1A950153000
trusted library allocation
page read and write
21C14D61000
trusted library allocation
page read and write
1A958CF8000
trusted library allocation
page read and write
1A9500FA000
trusted library allocation
page read and write
1A945439000
heap
page read and write
1A945487000
heap
page read and write
EB4000
heap
page read and write
1A9502F3000
trusted library allocation
page read and write
1A94E769000
trusted library allocation
page read and write
1A9502E8000
trusted library allocation
page read and write
1A95A4DB000
trusted library allocation
page read and write
1A94E1C7000
trusted library allocation
page read and write
1A956555000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94FD63000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A94545E000
heap
page read and write
1A94545E000
heap
page read and write
1A95A4C3000
trusted library allocation
page read and write
1A95A818000
trusted library allocation
page read and write
1A95A2EF000
trusted library allocation
page read and write
1A950173000
trusted library allocation
page read and write
1A94FD2E000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94545B000
heap
page read and write
1A945488000
heap
page read and write
1A95A2F1000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A950C68000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A94BF33000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1EB30FAC000
heap
page read and write
1A945484000
heap
page read and write
1A94543F000
heap
page read and write
1A945491000
heap
page read and write
1A9561EB000
trusted library allocation
page read and write
1A945451000
heap
page read and write
146D45C4000
heap
page read and write
1A950856000
trusted library allocation
page read and write
1A95A79F000
trusted library allocation
page read and write
1A956587000
trusted library allocation
page read and write
1EB30FDC000
heap
page read and write
1A9500EB000
trusted library allocation
page read and write
1A94FC0A000
trusted library allocation
page read and write
FE6000
heap
page read and write
1A950196000
trusted library allocation
page read and write
208B7D8000
stack
page read and write
1A94E866000
trusted library allocation
page read and write
1A94E163000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1EB308B1000
unkown
page execute read
D0E000
stack
page read and write
1A94545F000
heap
page read and write
1A95A654000
trusted library allocation
page read and write
25FA6860000
heap
page read and write
E0BCCBE000
unkown
page readonly
1A94E88B000
trusted library allocation
page read and write
1A945484000
heap
page read and write
25FA6BB0000
heap
page read and write
1A9454A3000
heap
page read and write
1A94FDF8000
trusted library allocation
page read and write
1A94EDB8000
trusted library allocation
page read and write
1A956115000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94545E000
heap
page read and write
256A18C0000
heap
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A94A4AD000
trusted library allocation
page read and write
1A94BFA0000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1EB303C7000
trusted library allocation
page read and write
1A94E19A000
trusted library allocation
page read and write
1A956548000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A94548C000
heap
page read and write
1A94C84E000
trusted library allocation
page read and write
1A95A7B7000
trusted library allocation
page read and write
1A94DDCE000
trusted library allocation
page read and write
1A95A6B2000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1C4A45B1000
trusted library allocation
page execute read
1A94DD98000
trusted library allocation
page read and write
1A9561EB000
trusted library allocation
page read and write
1A94EC6F000
trusted library allocation
page read and write
1A94ECBD000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A956570000
trusted library allocation
page read and write
1A951970000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A94FDED000
trusted library allocation
page read and write
1A94FDA7000
trusted library allocation
page read and write
1A94FDB6000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A945484000
heap
page read and write
1A945446000
heap
page read and write
1A94F8EF000
trusted library allocation
page read and write
1A959EA9000
trusted library allocation
page read and write
21C14910000
unclassified section
page readonly
1A94544C000
heap
page read and write
1A9454A4000
heap
page read and write
1A95A3EA000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A950C66000
trusted library allocation
page read and write
1A945440000
heap
page read and write
1A94ECD9000
trusted library allocation
page read and write
1A94FDE4000
trusted library allocation
page read and write
1A9500C8000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A9454A3000
heap
page read and write
1A94F842000
trusted library allocation
page read and write
1A959FDF000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A94E3CC000
heap
page read and write
1A94A32F000
trusted library allocation
page read and write
1A94E86F000
trusted library allocation
page read and write
1A94E939000
trusted library allocation
page read and write
1A94E72D000
trusted library allocation
page read and write
1A94DD7F000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A957AA6000
trusted library allocation
page read and write
FE6000
heap
page read and write
1A9518E2000
trusted library allocation
page read and write
1A9535A3000
trusted library allocation
page read and write
1A953543000
trusted library allocation
page read and write
1A950CA6000
trusted library allocation
page read and write
1A95048A000
trusted library allocation
page read and write
1A94FDC3000
trusted library allocation
page read and write
1A950CCC000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A94E888000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A9566C0000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A950200000
trusted library allocation
page read and write
1A95003B000
trusted library allocation
page read and write
1A94FD68000
trusted library allocation
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A94E39D000
heap
page read and write
1A957A40000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
1A95A823000
trusted library allocation
page read and write
1A959363000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A956583000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94B4C0000
trusted library allocation
page read and write
1A953548000
trusted library allocation
page read and write
1A940037000
heap
page read and write
1A950BD6000
trusted library allocation
page read and write
1A9565F2000
trusted library allocation
page read and write
1A94F5CC000
trusted library allocation
page read and write
1A9563F6000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94549D000
heap
page read and write
1A950CB8000
trusted library allocation
page read and write
1A94FFC9000
trusted library allocation
page read and write
1A94E116000
trusted library allocation
page read and write
1A94EDCA000
trusted library allocation
page read and write
1A95A329000
trusted library allocation
page read and write
1A94A47D000
trusted library allocation
page read and write
1A95AB4E000
heap
page read and write
1A94E84C000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A94DD86000
trusted library allocation
page read and write
1A95048A000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A940040000
heap
page read and write
1A94FD8C000
trusted library allocation
page read and write
1A94E93B000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94548D000
heap
page read and write
1A94E763000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A945431000
heap
page read and write
1A94F99D000
trusted library allocation
page read and write
1A95A4D0000
trusted library allocation
page read and write
1A95668A000
trusted library allocation
page read and write
1A95A6F1000
trusted library allocation
page read and write
1A94DD34000
trusted library allocation
page read and write
1A9454A6000
heap
page read and write
1A94E137000
trusted library allocation
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A95AA82000
trusted library allocation
page read and write
1A959ED2000
trusted library allocation
page read and write
1A958901000
trusted library allocation
page read and write
1A94C86E000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A945471000
heap
page read and write
1A94FCE8000
trusted library allocation
page read and write
1A9564E7000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
1EB30F49000
heap
page read and write
1A94EDA7000
trusted library allocation
page read and write
1A95A655000
trusted library allocation
page read and write
1A945464000
heap
page read and write
CA2000
unkown
page readonly
1A94F8EB000
trusted library allocation
page read and write
1A957AB2000
trusted library allocation
page read and write
1EB30FE8000
heap
page read and write
21C149F0000
heap
page read and write
1A94E85D000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945485000
heap
page read and write
1A958957000
trusted library allocation
page read and write
1A95A6FE000
trusted library allocation
page read and write
1A950492000
trusted library allocation
page read and write
1A94FD28000
trusted library allocation
page read and write
178F000
stack
page read and write
1A95939D000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A950207000
trusted library allocation
page read and write
1A95A6F8000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A9506AC000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A957AB2000
trusted library allocation
page read and write
1A94549B000
heap
page read and write
1A95676A000
trusted library allocation
page read and write
1A950841000
trusted library allocation
page read and write
1A9518F0000
trusted library allocation
page read and write
1A951869000
trusted library allocation
page read and write
1A95A2E0000
trusted library allocation
page read and write
1A94F8E6000
trusted library allocation
page read and write
FC3000
heap
page read and write
1A959F90000
trusted library allocation
page read and write
1A94FDE4000
trusted library allocation
page read and write
1A94ECFE000
trusted library allocation
page read and write
146D4413000
trusted library allocation
page read and write
21C149D0000
heap
page read and write
1A9564D3000
trusted library allocation
page read and write
1A94F923000
trusted library allocation
page read and write
FE6000
heap
page read and write
1EB31084000
heap
page read and write
1A951984000
trusted library allocation
page read and write
1A94BFC2000
trusted library allocation
page read and write
1A94E0EB000
trusted library allocation
page read and write
1A958CFD000
trusted library allocation
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A9563E2000
trusted library allocation
page read and write
1A9519B5000
trusted library allocation
page read and write
1A95A6B8000
trusted library allocation
page read and write
FCD000
heap
page read and write
1A95674F000
trusted library allocation
page read and write
1A958CC5000
trusted library allocation
page read and write
1A94FCFB000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945492000
heap
page read and write
1A94F9C3000
trusted library allocation
page read and write
1A95A598000
trusted library allocation
page read and write
1A94F9FC000
trusted library allocation
page read and write
1A95198D000
trusted library allocation
page read and write
1A950AC9000
trusted library allocation
page read and write
1A94EDC5000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A94EDC2000
trusted library allocation
page read and write
1A9561EE000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A95A3C0000
trusted library allocation
page read and write
1A95A756000
trusted library allocation
page read and write
1A956555000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A94C8E7000
trusted library allocation
page read and write
1A94FC2F000
trusted library allocation
page read and write
1C4A462F000
trusted library allocation
page execute read
1A945456000
heap
page read and write
1A94542E000
heap
page read and write
1A95A2E7000
trusted library allocation
page read and write
1A94FCD7000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A951A88000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94548D000
heap
page read and write
1A945485000
heap
page read and write
1A94A371000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A957ADA000
trusted library allocation
page read and write
1A94E71B000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94EDDE000
trusted library allocation
page read and write
1A94EBBA000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A950B43000
trusted library allocation
page read and write
1A94F859000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A9504D3000
trusted library allocation
page read and write
1A94ECEB000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
21C14996000
remote allocation
page execute read
1A956648000
trusted library allocation
page read and write
1A950184000
trusted library allocation
page read and write
1A94EDDE000
trusted library allocation
page read and write
1A95A7A7000
trusted library allocation
page read and write
1A950AEF000
trusted library allocation
page read and write
1EB3107B000
heap
page read and write
1A94FD25000
trusted library allocation
page read and write
1A94E7AD000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A957A4E000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A950192000
trusted library allocation
page read and write
1A95A4D5000
trusted library allocation
page read and write
1A94BF98000
trusted library allocation
page read and write
1A959F7B000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945484000
heap
page read and write
1A956900000
trusted library allocation
page read and write
1A95A813000
trusted library allocation
page read and write
AA0000
heap
page read and write
1A94F9F6000
trusted library allocation
page read and write
1EB2FFB0000
unclassified section
page readonly
1A95AA31000
trusted library allocation
page read and write
25FA84B6000
heap
page read and write
1A94544E000
heap
page read and write
1A94A500000
trusted library allocation
page read and write
1A95AA39000
trusted library allocation
page read and write
146D448F000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
E0B99A8000
stack
page read and write
1A94E7B4000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94ED94000
trusted library allocation
page read and write
1A94FC6D000
trusted library allocation
page read and write
1A95A6F9000
trusted library allocation
page read and write
1A94E1C7000
trusted library allocation
page read and write
1A95A2A9000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A95A2B7000
trusted library allocation
page read and write
1A94F88E000
trusted library allocation
page read and write
1A94E88A000
trusted library allocation
page read and write
256A1B07000
trusted library allocation
page read and write
1A956557000
trusted library allocation
page read and write
1A9564C6000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A95A5BA000
trusted library allocation
page read and write
1A94EE52000
trusted library allocation
page read and write
1A957A51000
trusted library allocation
page read and write
1A94EDD8000
trusted library allocation
page read and write
1A9500EE000
trusted library allocation
page read and write
1A957A4E000
trusted library allocation
page read and write
1EB30140000
heap
page read and write
146D40F2000
unclassified section
page read and write
146D4424000
trusted library allocation
page read and write
1C4A4586000
trusted library allocation
page execute read
1A94E75E000
trusted library allocation
page read and write
1A95679E000
trusted library allocation
page read and write
1A94E163000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A9565EE000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94EC66000
trusted library allocation
page read and write
1A94BFA7000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A95A572000
trusted library allocation
page read and write
1A95651F000
trusted library allocation
page read and write
1A94E355000
heap
page read and write
1A94545B000
heap
page read and write
1A956778000
trusted library allocation
page read and write
1A95A6FE000
trusted library allocation
page read and write
1A9564D6000
trusted library allocation
page read and write
1A94EDBD000
trusted library allocation
page read and write
1A94FB66000
trusted library allocation
page read and write
1A94BFBE000
trusted library allocation
page read and write
1A95ABA9000
heap
page read and write
FC0000
heap
page read and write
1A945484000
heap
page read and write
1A945485000
heap
page read and write
1A957A9C000
trusted library allocation
page read and write
1A95657D000
trusted library allocation
page read and write
1A9565FE000
trusted library allocation
page read and write
1A95196C000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A950CC3000
trusted library allocation
page read and write
1A95A6F5000
trusted library allocation
page read and write
1A956564000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945463000
heap
page read and write
1A9567DE000
trusted library allocation
page read and write
1A94EDA9000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A95A823000
trusted library allocation
page read and write
FF4A3FB000
stack
page read and write
1A9500E5000
trusted library allocation
page read and write
1A9565FE000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1C4A4661000
trusted library allocation
page execute read
32F332E000
unkown
page readonly
1A945484000
heap
page read and write
1EB30146000
heap
page read and write
1A94ECAE000
trusted library allocation
page read and write
1A94BFA5000
trusted library allocation
page read and write
146D4050000
heap
page read and write
1A945484000
heap
page read and write
1A958906000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A951860000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A94ECAE000
trusted library allocation
page read and write
1A95A7DE000
trusted library allocation
page read and write
1A94ECF1000
trusted library allocation
page read and write
1A94ECBD000
trusted library allocation
page read and write
1A94EDF9000
trusted library allocation
page read and write
1A94FD8B000
trusted library allocation
page read and write
1A94EDCA000
trusted library allocation
page read and write
1A945488000
heap
page read and write
1A9519F8000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
21C15340000
heap
page read and write
1A950191000
trusted library allocation
page read and write
1A94FD81000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94E38B000
heap
page read and write
208E83E000
stack
page read and write
1A94FFB6000
trusted library allocation
page read and write
1A95A6B2000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A945463000
heap
page read and write
1EB31028000
heap
page read and write
1A945487000
heap
page read and write
1A94BFA7000
trusted library allocation
page read and write
1A95AB10000
heap
page read and write
1A94F8F1000
trusted library allocation
page read and write
1A95652F000
trusted library allocation
page read and write
25FA6790000
heap
page read and write
1A94EDAB000
trusted library allocation
page read and write
1A95A2E0000
trusted library allocation
page read and write
1A959F73000
trusted library allocation
page read and write
1A95A5A0000
trusted library allocation
page read and write
1A956542000
trusted library allocation
page read and write
1A94FCA4000
trusted library allocation
page read and write
1EB2FF30000
unclassified section
page readonly
1A94FCE7000
trusted library allocation
page read and write
1A95A698000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945473000
heap
page read and write
1A9564C8000
trusted library allocation
page read and write
1A94ECAE000
trusted library allocation
page read and write
1A94EE04000
trusted library allocation
page read and write
1A94E886000
trusted library allocation
page read and write
1A95A2E7000
trusted library allocation
page read and write
1A94548F000
heap
page read and write
1EB30FA9000
heap
page read and write
1A95A813000
trusted library allocation
page read and write
1A950C45000
trusted library allocation
page read and write
1A95658C000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A945463000
heap
page read and write
1A94E358000
heap
page read and write
1A950091000
trusted library allocation
page read and write
1A95658C000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A950622000
trusted library allocation
page read and write
1A956147000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1EB30890000
unkown
page execute read
1A94F85D000
trusted library allocation
page read and write
1A950C04000
trusted library allocation
page read and write
1A94FCDF000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945473000
heap
page read and write
1A95A6F9000
trusted library allocation
page read and write
1A95617C000
trusted library allocation
page read and write
1A95016D000
trusted library allocation
page read and write
21C14D5B000
trusted library allocation
page read and write
1A94FFC2000
trusted library allocation
page read and write
1A94FD65000
trusted library allocation
page read and write
1A95616F000
trusted library allocation
page read and write
1A95A80E000
trusted library allocation
page read and write
1A9508D0000
trusted library allocation
page read and write
1A957A30000
trusted library allocation
page read and write
1A94A47E000
trusted library allocation
page read and write
1A957A56000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A94B468000
trusted library allocation
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A945452000
heap
page read and write
1A95A819000
trusted library allocation
page read and write
1A945440000
heap
page read and write
1A95884D000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A94544E000
heap
page read and write
1A945484000
heap
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A950118000
trusted library allocation
page read and write
1A95192D000
trusted library allocation
page read and write
1A9518A1000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94ECA9000
trusted library allocation
page read and write
1A945491000
heap
page read and write
32F6EBE000
stack
page read and write
1A94548D000
heap
page read and write
1A94A475000
trusted library allocation
page read and write
1A945440000
heap
page read and write
1A94EBBE000
trusted library allocation
page read and write
1A94B486000
trusted library allocation
page read and write
E0B99AB000
stack
page read and write
A1B000
stack
page read and write
1A95A679000
trusted library allocation
page read and write
1A94E88C000
trusted library allocation
page read and write
1EB30FCA000
heap
page read and write
1A95655F000
trusted library allocation
page read and write
1A94FDCB000
trusted library allocation
page read and write
1A95654A000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
1EB310B9000
heap
page read and write
1A94BF33000
trusted library allocation
page read and write
1A94E85D000
trusted library allocation
page read and write
1EB30381000
trusted library allocation
page read and write
1A95016F000
trusted library allocation
page read and write
1A95A686000
trusted library allocation
page read and write
1EB31084000
heap
page read and write
1A950BD9000
trusted library allocation
page read and write
1A94E13F000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A95A666000
trusted library allocation
page read and write
1A94DD9D000
trusted library allocation
page read and write
1A94FD93000
trusted library allocation
page read and write
1A94FDAB000
trusted library allocation
page read and write
1A94FFEF000
trusted library allocation
page read and write
1A9502E4000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
1A9508E8000
trusted library allocation
page read and write
1A94EC7A000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
146D44B2000
trusted library allocation
page read and write
1A94E0E9000
trusted library allocation
page read and write
1A950151000
trusted library allocation
page read and write
21C14F0C000
trusted library allocation
page read and write
1A950C0D000
trusted library allocation
page read and write
1EB30FEA000
heap
page read and write
1A94F852000
trusted library allocation
page read and write
1A95A775000
trusted library allocation
page read and write
1A95A6FA000
trusted library allocation
page read and write
1A94EE0A000
trusted library allocation
page read and write
1A959F1D000
trusted library allocation
page read and write
1A95AB0C000
heap
page read and write
1A94BFB6000
trusted library allocation
page read and write
1A94F9A7000
trusted library allocation
page read and write
1A94F9C3000
trusted library allocation
page read and write
1EB3102D000
heap
page read and write
1A956294000
trusted library allocation
page read and write
1A957AA0000
trusted library allocation
page read and write
1A95081A000
trusted library allocation
page read and write
1A95014E000
trusted library allocation
page read and write
1A94E1C7000
trusted library allocation
page read and write
1A951961000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A94FD61000
trusted library allocation
page read and write
1A94F82B000
trusted library allocation
page read and write
21C14D98000
trusted library allocation
page read and write
1A94E360000
heap
page read and write
1A95A83A000
trusted library allocation
page read and write
1A957ADA000
trusted library allocation
page read and write
1A94ECD4000
trusted library allocation
page read and write
1A94FCD0000
trusted library allocation
page read and write
1A94ECE0000
trusted library allocation
page read and write
1EB31032000
heap
page read and write
1A94ECA0000
trusted library allocation
page read and write
1A94ECD4000
trusted library allocation
page read and write
1A94E98D000
trusted library allocation
page read and write
1A94FFAD000
trusted library allocation
page read and write
1A94545B000
heap
page read and write
1A94543F000
heap
page read and write
1A951994000
trusted library allocation
page read and write
1A945445000
heap
page read and write
146D4090000
heap
page read and write
1A94548D000
heap
page read and write
1A94E762000
trusted library allocation
page read and write
FE2000
heap
page read and write
1A95A6B2000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A956553000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A956555000
trusted library allocation
page read and write
1A95A25A000
trusted library allocation
page read and write
1A94E7FE000
trusted library allocation
page read and write
1A9508E8000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A952F2F000
trusted library allocation
page read and write
1A95016D000
trusted library allocation
page read and write
1A95198D000
trusted library allocation
page read and write
1A957A51000
trusted library allocation
page read and write
C66B1FF000
stack
page read and write
1A94F9AF000
trusted library allocation
page read and write
1A959EE7000
trusted library allocation
page read and write
25FA6890000
heap
page read and write
1A953606000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
EB4000
heap
page read and write
146D4240000
unclassified section
page readonly
1A950BB3000
trusted library allocation
page read and write
1A94EAD5000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A956557000
trusted library allocation
page read and write
1A94E125000
trusted library allocation
page read and write
1A9564C6000
trusted library allocation
page read and write
1A94FD97000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94F8BF000
trusted library allocation
page read and write
1A94E85D000
trusted library allocation
page read and write
1A94A4AD000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94FDD2000
trusted library allocation
page read and write
1A94F9C0000
trusted library allocation
page read and write
1A95A582000
trusted library allocation
page read and write
1A94B497000
trusted library allocation
page read and write
1A94549B000
heap
page read and write
1A95A2B7000
trusted library allocation
page read and write
1A94E043000
trusted library allocation
page read and write
1A94BFCD000
trusted library allocation
page read and write
1A951A75000
trusted library allocation
page read and write
1EB30FBF000
heap
page read and write
1A9565EE000
trusted library allocation
page read and write
1A950631000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945487000
heap
page read and write
1A94BFE6000
trusted library allocation
page read and write
1A95A2EB000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94EDF9000
trusted library allocation
page read and write
1A9534E5000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
1A945487000
heap
page read and write
1A94A4F0000
trusted library allocation
page read and write
1A94E099000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94FC56000
trusted library allocation
page read and write
1A950BF0000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A95003B000
trusted library allocation
page read and write
1A95629D000
trusted library allocation
page read and write
1A950192000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
3691000
heap
page read and write
1A94EDB5000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A950B91000
trusted library allocation
page read and write
1A94FC52000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A9567FB000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A957AA6000
trusted library allocation
page read and write
1A94E149000
trusted library allocation
page read and write
1A94E047000
trusted library allocation
page read and write
1A94E3CB000
heap
page read and write
1A94543E000
heap
page read and write
1A9519F8000
trusted library allocation
page read and write
21C14F38000
trusted library allocation
page read and write
1A95A23D000
trusted library allocation
page read and write
1A9518F0000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A945491000
heap
page read and write
1A95A5CA000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94FBC4000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945463000
heap
page read and write
1A94E1A1000
trusted library allocation
page read and write
1A94BF90000
trusted library allocation
page read and write
1A94E38F000
heap
page read and write
1A95A4AC000
trusted library allocation
page read and write
1A94E0B5000
trusted library allocation
page read and write
1A95ABC8000
heap
page read and write
1A94ECFE000
trusted library allocation
page read and write
1A94BE2B000
trusted library allocation
page read and write
1A95AA62000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1EB30FA0000
heap
page read and write
1A94ECD4000
trusted library allocation
page read and write
1A956313000
trusted library allocation
page read and write
1A956646000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A956648000
trusted library allocation
page read and write
21C14A10000
heap
page read and write
1A94EC8E000
trusted library allocation
page read and write
1A94F985000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945485000
heap
page read and write
1A94E10C000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A945451000
heap
page read and write
1A94F882000
trusted library allocation
page read and write
1A94EDDA000
trusted library allocation
page read and write
1EB31098000
heap
page read and write
1A959337000
trusted library allocation
page read and write
1A94E163000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A95A472000
trusted library allocation
page read and write
1A950C83000
trusted library allocation
page read and write
1A95A4D5000
trusted library allocation
page read and write
1A94BF6F000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A95085F000
trusted library allocation
page read and write
1A950B64000
trusted library allocation
page read and write
1A959F25000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94A475000
trusted library allocation
page read and write
1A95A3FE000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945463000
heap
page read and write
1A95A6E3000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A950BC8000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94542F000
heap
page read and write
1A94545E000
heap
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A950AC9000
trusted library allocation
page read and write
1A94EC4B000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94542F000
heap
page read and write
1A95A676000
trusted library allocation
page read and write
1A94BF69000
trusted library allocation
page read and write
1A95A2EF000
trusted library allocation
page read and write
1A9564D1000
trusted library allocation
page read and write
1A956638000
trusted library allocation
page read and write
1A957A98000
trusted library allocation
page read and write
1A94BFA7000
trusted library allocation
page read and write
CAC000
unkown
page write copy
1A94EDD3000
trusted library allocation
page read and write
1EB303BA000
trusted library allocation
page read and write
1A95A6F9000
trusted library allocation
page read and write
1A94EA7B000
trusted library allocation
page read and write
1A9535A7000
trusted library allocation
page read and write
1A94E199000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A950C7A000
trusted library allocation
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
25FA84AA000
heap
page read and write
1A94545E000
heap
page read and write
1A95A35A000
trusted library allocation
page read and write
146D4468000
trusted library allocation
page read and write
1A94E393000
heap
page read and write
1A94DDB0000
trusted library allocation
page read and write
1A94F8F1000
trusted library allocation
page read and write
1A945487000
heap
page read and write
21C14D0D000
trusted library allocation
page read and write
1A956179000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94B480000
trusted library allocation
page read and write
1A94EE0C000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94BFCD000
trusted library allocation
page read and write
1A958805000
trusted library allocation
page read and write
1A950A93000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A9564BC000
trusted library allocation
page read and write
1A9566F4000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94E0DC000
trusted library allocation
page read and write
1A94FDEB000
trusted library allocation
page read and write
1A950192000
trusted library allocation
page read and write
1A94DD79000
trusted library allocation
page read and write
21C14D5D000
trusted library allocation
page read and write
1A95A464000
trusted library allocation
page read and write
1A952F84000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94F965000
trusted library allocation
page read and write
1A95A825000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A956174000
trusted library allocation
page read and write
1A94E1C3000
trusted library allocation
page read and write
1A94FCC9000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94544E000
heap
page read and write
1A957A3E000
trusted library allocation
page read and write
1A9588A3000
trusted library allocation
page read and write
1A94EDDA000
trusted library allocation
page read and write
1A95655A000
trusted library allocation
page read and write
1A950856000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
1A9518F0000
trusted library allocation
page read and write
1A956577000
trusted library allocation
page read and write
1A94E0FD000
trusted library allocation
page read and write
1A95A250000
trusted library allocation
page read and write
1A957A4E000
trusted library allocation
page read and write
1A95016F000
trusted library allocation
page read and write
1A95678F000
trusted library allocation
page read and write
1A94E782000
trusted library allocation
page read and write
1A94EDA7000
trusted library allocation
page read and write
1A94EEE0000
trusted library allocation
page read and write
1A95A2EF000
trusted library allocation
page read and write
29BB87704000
trusted library allocation
page read and write
1A94E7AD000
trusted library allocation
page read and write
21C14F1D000
trusted library allocation
page read and write
1A95631F000
trusted library allocation
page read and write
1A95AA34000
trusted library allocation
page read and write
25FA6C0A000
trusted library allocation
page read and write
1A94E987000
trusted library allocation
page read and write
1A9518F3000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A9566BB000
trusted library allocation
page read and write
1A94E881000
trusted library allocation
page read and write
1A95A693000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94E0F4000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A950040000
trusted library allocation
page read and write
1A94BFE6000
trusted library allocation
page read and write
1A958C72000
trusted library allocation
page read and write
1A957A47000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94543E000
heap
page read and write
1A95A6CA000
trusted library allocation
page read and write
1A94F9A3000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A959F3A000
trusted library allocation
page read and write
1A95A68E000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A94E0EB000
trusted library allocation
page read and write
1A9500E5000
trusted library allocation
page read and write
1A94E88B000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A945445000
heap
page read and write
1A95A835000
trusted library allocation
page read and write
1A95AC60000
heap
page read and write
1A95A751000
trusted library allocation
page read and write
1A94E862000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94B4A8000
trusted library allocation
page read and write
1A94EC7A000
trusted library allocation
page read and write
1A957A43000
trusted library allocation
page read and write
1A95654A000
trusted library allocation
page read and write
1A951AD9000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94FC8F000
trusted library allocation
page read and write
1A959FEC000
trusted library allocation
page read and write
1A95655F000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94548D000
heap
page read and write
1A94EDDA000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A9519D9000
trusted library allocation
page read and write
1EB30FA0000
heap
page read and write
1A94FD87000
trusted library allocation
page read and write
146D4300000
trusted library allocation
page read and write
1A94E1BD000
trusted library allocation
page read and write
1A94E1BD000
trusted library allocation
page read and write
1A9563F3000
trusted library allocation
page read and write
1A950CC2000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
1A950BC2000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A945494000
heap
page read and write
1A95A6D4000
trusted library allocation
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A94E0E1000
trusted library allocation
page read and write
1A95AB07000
heap
page read and write
1A95A2EF000
trusted library allocation
page read and write
1A94F5DE000
trusted library allocation
page read and write
1A94FC7D000
trusted library allocation
page read and write
1A94ECF0000
trusted library allocation
page read and write
1A95A5FC000
trusted library allocation
page read and write
1B8F000
stack
page read and write
1A94FC54000
trusted library allocation
page read and write
1A94F859000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A956557000
trusted library allocation
page read and write
1A94FF55000
trusted library allocation
page read and write
A0E000
stack
page read and write
1A945445000
heap
page read and write
1A95A82F000
trusted library allocation
page read and write
1A956349000
trusted library allocation
page read and write
1A956192000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94543A000
heap
page read and write
1A945446000
heap
page read and write
1A94FD97000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A95A659000
trusted library allocation
page read and write
FCE000
heap
page read and write
1A959FC6000
trusted library allocation
page read and write
1A94E0C3000
trusted library allocation
page read and write
1A952F84000
trusted library allocation
page read and write
1EB30120000
heap
page read and write
1A9587E5000
trusted library allocation
page read and write
1A950126000
trusted library allocation
page read and write
1A950BD5000
trusted library allocation
page read and write
1A957AA0000
trusted library allocation
page read and write
1A95A6D2000
trusted library allocation
page read and write
1A94FF57000
trusted library allocation
page read and write
1A9506EE000
trusted library allocation
page read and write
1A94E84E000
trusted library allocation
page read and write
1A94EC3A000
trusted library allocation
page read and write
1A959388000
trusted library allocation
page read and write
1A959FA6000
trusted library allocation
page read and write
1A94FDCB000
trusted library allocation
page read and write
1A94EC5E000
trusted library allocation
page read and write
1A94B4A3000
trusted library allocation
page read and write
1A94546E000
heap
page read and write
1A94F94B000
trusted library allocation
page read and write
1A957A84000
trusted library allocation
page read and write
1A94F97F000
trusted library allocation
page read and write
1A94B4F2000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94E1F9000
trusted library allocation
page read and write
1A951A85000
trusted library allocation
page read and write
1A9500BD000
trusted library allocation
page read and write
1A94F9A7000
trusted library allocation
page read and write
1A94E75E000
trusted library allocation
page read and write
1A957AB2000
trusted library allocation
page read and write
1A951A7D000
trusted library allocation
page read and write
1A9500F4000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
1A950091000
trusted library allocation
page read and write
1A94DBFC000
trusted library allocation
page read and write
1A94FDA4000
trusted library allocation
page read and write
1A951970000
trusted library allocation
page read and write
1A94FDF8000
trusted library allocation
page read and write
1A94FCD7000
trusted library allocation
page read and write
1EB30100000
heap
page read and write
1A9454CE000
heap
page read and write
1A95A4AC000
trusted library allocation
page read and write
1A956646000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
1A94EC9E000
trusted library allocation
page read and write
1A94E06A000
trusted library allocation
page read and write
1A9562AD000
trusted library allocation
page read and write
1A95AADA000
trusted library allocation
page read and write
1A95A6B9000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A94C86D000
trusted library allocation
page read and write
1A957A27000
trusted library allocation
page read and write
1EB30386000
trusted library allocation
page read and write
1A950207000
trusted library allocation
page read and write
25FA84A0000
heap
page read and write
1A94E881000
trusted library allocation
page read and write
1A9518F0000
trusted library allocation
page read and write
1A956542000
trusted library allocation
page read and write
1A95020E000
trusted library allocation
page read and write
1A94FC6A000
trusted library allocation
page read and write
1A95618D000
trusted library allocation
page read and write
21C14E70000
heap
page read and write
146D44DB000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A95A358000
trusted library allocation
page read and write
1A95A4BE000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
3691000
heap
page read and write
1A94ECBA000
trusted library allocation
page read and write
1EB2FFEA000
heap
page read and write
21C149A0000
unclassified section
page readonly
1A95935E000
trusted library allocation
page read and write
1A9500EB000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1A945491000
heap
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A9566F8000
trusted library allocation
page read and write
1A95A83A000
trusted library allocation
page read and write
1A94F9EC000
trusted library allocation
page read and write
1A94BFC9000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A953541000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94EDAE000
trusted library allocation
page read and write
1A94A419000
trusted library allocation
page read and write
1A94B497000
trusted library allocation
page read and write
1A95A80E000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94ECAC000
trusted library allocation
page read and write
1EB31040000
heap
page read and write
1A945464000
heap
page read and write
1A94BF98000
trusted library allocation
page read and write
1A950B97000
trusted library allocation
page read and write
1A94FDC3000
trusted library allocation
page read and write
1A94E847000
trusted library allocation
page read and write
1A956691000
trusted library allocation
page read and write
1A95A2EB000
trusted library allocation
page read and write
1A94E7F0000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A94FCFE000
trusted library allocation
page read and write
1A95AB7B000
heap
page read and write
1A950192000
trusted library allocation
page read and write
1A95A4ED000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945463000
heap
page read and write
1A94ECFC000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A957E00000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A95A661000
trusted library allocation
page read and write
1A94FDFE000
trusted library allocation
page read and write
1A953657000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
1A956294000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
1A94BFA5000
trusted library allocation
page read and write
1A9565EA000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A957A51000
trusted library allocation
page read and write
C7C000
unkown
page readonly
1A94E18B000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A95AA92000
trusted library allocation
page read and write
1EB30B04000
trusted library allocation
page read and write
1A94BF2B000
trusted library allocation
page read and write
1A94FDED000
trusted library allocation
page read and write
1A94C860000
trusted library allocation
page read and write
1A956555000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FDA4000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A94FC71000
trusted library allocation
page read and write
1A959341000
trusted library allocation
page read and write
1A950C4C000
trusted library allocation
page read and write
1A9507A9000
trusted library allocation
page read and write
1A94ED24000
trusted library allocation
page read and write
1A9500FA000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A95A7A9000
trusted library allocation
page read and write
146D4070000
heap
page read and write
1A94ED96000
trusted library allocation
page read and write
1A95AB0B000
heap
page read and write
208E03E000
unkown
page readonly
1A959354000
trusted library allocation
page read and write
1EB30FE1000
heap
page read and write
1A95AA31000
trusted library allocation
page read and write
1A94C236000
trusted library allocation
page read and write
1A94BFA5000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A95A69D000
trusted library allocation
page read and write
EB4000
heap
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A94F9B3000
trusted library allocation
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A94E0F0000
trusted library allocation
page read and write
1A94ECE6000
trusted library allocation
page read and write
21C14DE7000
trusted library allocation
page read and write
1A94EC50000
trusted library allocation
page read and write
1A94E1E3000
trusted library allocation
page read and write
1A94F842000
trusted library allocation
page read and write
1A94A48A000
trusted library allocation
page read and write
1A94BFF1000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A94E184000
trusted library allocation
page read and write
1A950CCC000
trusted library allocation
page read and write
1A95AB0F000
heap
page read and write
1A94E7FE000
trusted library allocation
page read and write
1A950BC3000
trusted library allocation
page read and write
1EB31029000
heap
page read and write
1A94ECDC000
trusted library allocation
page read and write
1EB30FBD000
heap
page read and write
1A94548D000
heap
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A95A7BE000
trusted library allocation
page read and write
1A94BF69000
trusted library allocation
page read and write
1A9565FE000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1EB3089D000
unkown
page execute read
1A959EAE000
trusted library allocation
page read and write
1A94ECBA000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94548D000
heap
page read and write
1A94E960000
trusted library allocation
page read and write
1A94E95B000
trusted library allocation
page read and write
1EB30F8D000
heap
page read and write
1A94FDB6000
trusted library allocation
page read and write
1A94F9A9000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94E1D4000
trusted library allocation
page read and write
1A94E81D000
trusted library allocation
page read and write
1A9500EF000
trusted library allocation
page read and write
1A95197D000
trusted library allocation
page read and write
1A95613C000
trusted library allocation
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A95A6F3000
trusted library allocation
page read and write
1A94EE11000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A956553000
trusted library allocation
page read and write
1A95A6E6000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A9518F3000
trusted library allocation
page read and write
1A95A5D4000
trusted library allocation
page read and write
1A94E1EA000
trusted library allocation
page read and write
1A9588AC000
trusted library allocation
page read and write
1A950BA7000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94FFB1000
trusted library allocation
page read and write
1A94DDCE000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1EB3035C000
trusted library allocation
page read and write
1A9454DF000
heap
page read and write
FF4ABFD000
stack
page read and write
1A950173000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A95A2F5000
trusted library allocation
page read and write
1A94E166000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A94EC4B000
trusted library allocation
page read and write
1A959ED9000
trusted library allocation
page read and write
1A949DBF000
trusted library allocation
page read and write
1A95A6FB000
trusted library allocation
page read and write
1A9564DA000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A95A6A8000
trusted library allocation
page read and write
1EB310A9000
heap
page read and write
1A945440000
heap
page read and write
1A95A280000
trusted library allocation
page read and write
1A950BD9000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95A6FE000
trusted library allocation
page read and write
1A9565D9000
trusted library allocation
page read and write
1A956583000
trusted library allocation
page read and write
1A94FC3D000
trusted library allocation
page read and write
1A9564FE000
trusted library allocation
page read and write
1A957A64000
trusted library allocation
page read and write
1A95A7AA000
trusted library allocation
page read and write
1A94B4DC000
trusted library allocation
page read and write
1A95A3BE000
trusted library allocation
page read and write
1A950A97000
trusted library allocation
page read and write
1A945448000
heap
page read and write
FDB000
heap
page read and write
1A95AAFA000
trusted library allocation
page read and write
1A95A37E000
trusted library allocation
page read and write
1A9588A7000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A95658C000
trusted library allocation
page read and write
1A94E1D4000
trusted library allocation
page read and write
1A945497000
heap
page read and write
1A951923000
trusted library allocation
page read and write
21C149D3000
heap
page read and write
1A94EDE2000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A94FB60000
trusted library allocation
page read and write
1A95AC5F000
heap
page read and write
1A94543B000
heap
page read and write
1A94EC45000
trusted library allocation
page read and write
1A95AB11000
heap
page read and write
1A9508BC000
trusted library allocation
page read and write
1A951982000
trusted library allocation
page read and write
1A94EE8D000
trusted library allocation
page read and write
E0BBC7E000
unkown
page readonly
1A95A487000
trusted library allocation
page read and write
1A956648000
trusted library allocation
page read and write
1A94FF92000
trusted library allocation
page read and write
1A94C873000
trusted library allocation
page read and write
1A959337000
trusted library allocation
page read and write
1A94DD2F000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A95A7D8000
trusted library allocation
page read and write
1A95A693000
trusted library allocation
page read and write
1A95065A000
trusted library allocation
page read and write
1A957A42000
trusted library allocation
page read and write
1A956584000
trusted library allocation
page read and write
1A9564DD000
trusted library allocation
page read and write
1A958848000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A95A3BC000
trusted library allocation
page read and write
1A950C78000
trusted library allocation
page read and write
1A94E79C000
trusted library allocation
page read and write
1EB3102D000
heap
page read and write
1A94543E000
heap
page read and write
FBF000
heap
page read and write
1A94FB1E000
trusted library allocation
page read and write
1A94BFF0000
trusted library allocation
page read and write
1A950CA7000
trusted library allocation
page read and write
1A95A3BA000
trusted library allocation
page read and write
1A94E3A7000
heap
page read and write
1A94FCA1000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945460000
heap
page read and write
FC4000
heap
page read and write
1A945492000
heap
page read and write
1A94548D000
heap
page read and write
1A94545E000
heap
page read and write
1A957A84000
trusted library allocation
page read and write
1A945491000
heap
page read and write
21C14F20000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
1EB3102D000
heap
page read and write
1A950487000
trusted library allocation
page read and write
1A94FC7B000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A950C61000
trusted library allocation
page read and write
1A94FBDA000
trusted library allocation
page read and write
1A94BFAB000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94FDCB000
trusted library allocation
page read and write
1A94F8F7000
trusted library allocation
page read and write
1A94F912000
trusted library allocation
page read and write
1A950C36000
trusted library allocation
page read and write
1A94FC58000
trusted library allocation
page read and write
1EB310A9000
heap
page read and write
1A956644000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A957A9C000
trusted library allocation
page read and write
1EB301F0000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A945491000
heap
page read and write
1A945434000
heap
page read and write
1A95A2F5000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A95A2ED000
trusted library allocation
page read and write
1A950191000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A95356D000
trusted library allocation
page read and write
21C14DB7000
trusted library allocation
page read and write
1A945491000
heap
page read and write
3691000
heap
page read and write
1A9567F0000
trusted library allocation
page read and write
1A945446000
heap
page read and write
1A94548D000
heap
page read and write
1A956111000
trusted library allocation
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A94EC4E000
trusted library allocation
page read and write
1A958841000
trusted library allocation
page read and write
1A95A76C000
trusted library allocation
page read and write
FE6000
heap
page read and write
1A950AB2000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A957A94000
trusted library allocation
page read and write
1A958807000
trusted library allocation
page read and write
1A94DDA3000
trusted library allocation
page read and write
1A95A682000
trusted library allocation
page read and write
1A957A6C000
trusted library allocation
page read and write
1A94E7AA000
trusted library allocation
page read and write
1A94F9E4000
trusted library allocation
page read and write
1A94FBFD000
trusted library allocation
page read and write
1A95625E000
trusted library allocation
page read and write
1A95AA62000
trusted library allocation
page read and write
1A956570000
trusted library allocation
page read and write
1A94EDF0000
trusted library allocation
page read and write
1A9504D1000
trusted library allocation
page read and write
1EB31061000
heap
page read and write
1A956255000
trusted library allocation
page read and write
21C14D03000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A950175000
trusted library allocation
page read and write
1A95A2E9000
trusted library allocation
page read and write
1A9508BC000
trusted library allocation
page read and write
1A94FB4F000
trusted library allocation
page read and write
1A952FCE000
trusted library allocation
page read and write
1A95A6B8000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94FC62000
trusted library allocation
page read and write
1A945456000
heap
page read and write
1A94E7B0000
trusted library allocation
page read and write
1A94F809000
trusted library allocation
page read and write
208AD8E000
unkown
page readonly
1A9518CB000
trusted library allocation
page read and write
1A95001C000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94E389000
heap
page read and write
1A957A9C000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A95A66E000
trusted library allocation
page read and write
1A95647C000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A95014E000
trusted library allocation
page read and write
1A950CB0000
trusted library allocation
page read and write
146D445D000
trusted library allocation
page read and write
1A951915000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94EC4B000
trusted library allocation
page read and write
1A957A36000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A959FD2000
trusted library allocation
page read and write
21C14D64000
trusted library allocation
page read and write
1A94EC5F000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94FD81000
trusted library allocation
page read and write
1A945451000
heap
page read and write
1A94E1AD000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A94E199000
trusted library allocation
page read and write
1A94F9B7000
trusted library allocation
page read and write
1A94E36F000
heap
page read and write
1A95A6EF000
trusted library allocation
page read and write
FDB000
heap
page read and write
1A94FF76000
trusted library allocation
page read and write
1A9502E4000
trusted library allocation
page read and write
1A9567A3000
trusted library allocation
page read and write
1A95679B000
trusted library allocation
page read and write
1A95611B000
trusted library allocation
page read and write
1A94DDC8000
trusted library allocation
page read and write
1A95629A000
trusted library allocation
page read and write
1A950BC2000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A958CCD000
trusted library allocation
page read and write
1A94ECAE000
trusted library allocation
page read and write
1A959FA6000
trusted library allocation
page read and write
1A94F9F8000
trusted library allocation
page read and write
1A950123000
trusted library allocation
page read and write
21C14BB0000
unclassified section
page readonly
1A9567F2000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A945492000
heap
page read and write
1A94FA4C000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A956782000
trusted library allocation
page read and write
1A94545F000
heap
page read and write
1A94E95E000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A959FD2000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A9504CC000
trusted library allocation
page read and write
1A94BF62000
trusted library allocation
page read and write
1A94EDF6000
trusted library allocation
page read and write
146D4411000
trusted library allocation
page read and write
1A959FDF000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A950139000
trusted library allocation
page read and write
1A956476000
trusted library allocation
page read and write
1A950BF0000
trusted library allocation
page read and write
1A94ECBD000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A94548D000
heap
page read and write
1A94EDF0000
trusted library allocation
page read and write
1A95A3C2000
trusted library allocation
page read and write
1A951A3D000
trusted library allocation
page read and write
1A9565C2000
trusted library allocation
page read and write
1A95AA36000
trusted library allocation
page read and write
1A94EC17000
trusted library allocation
page read and write
1A9566AF000
trusted library allocation
page read and write
1A94E853000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94F59D000
trusted library allocation
page read and write
1A94F9AC000
trusted library allocation
page read and write
1EB31028000
heap
page read and write
1A94FD81000
trusted library allocation
page read and write
1EB3107B000
heap
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A94F95D000
trusted library allocation
page read and write
1A95617C000
trusted library allocation
page read and write
1A95A819000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94544C000
heap
page read and write
A0FCA424000
trusted library allocation
page read and write
1A95AB0E000
heap
page read and write
1A95A66E000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A958CE5000
trusted library allocation
page read and write
1A95655F000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FCD0000
trusted library allocation
page read and write
1A957A90000
trusted library allocation
page read and write
1EB3032F000
trusted library allocation
page read and write
1A9454AE000
heap
page read and write
1A94E3CC000
heap
page read and write
1A956473000
trusted library allocation
page read and write
1A94DD7C000
trusted library allocation
page read and write
1EB3036F000
trusted library allocation
page read and write
1A94E357000
heap
page read and write
1A950CB0000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A95651B000
trusted library allocation
page read and write
1A94BFB8000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1EB310A9000
heap
page read and write
1A945492000
heap
page read and write
1A949DEF000
trusted library allocation
page read and write
1A95A2E7000
trusted library allocation
page read and write
1A95088F000
trusted library allocation
page read and write
1A94F95A000
trusted library allocation
page read and write
1A94DDC8000
trusted library allocation
page read and write
1A94FD95000
trusted library allocation
page read and write
1A94F809000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A9519E1000
trusted library allocation
page read and write
1A957AAE000
trusted library allocation
page read and write
1A94FB59000
trusted library allocation
page read and write
1A95A242000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94F8F1000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94A41B000
trusted library allocation
page read and write
1A94E0E1000
trusted library allocation
page read and write
1A957A94000
trusted library allocation
page read and write
1EB3103D000
heap
page read and write
1A95A23D000
trusted library allocation
page read and write
1A9519D9000
trusted library allocation
page read and write
1A957D00000
trusted library allocation
page read and write
1A94F95A000
trusted library allocation
page read and write
1A945484000
heap
page read and write
1A94ECD4000
trusted library allocation
page read and write
1A95A487000
trusted library allocation
page read and write
1A94E9CB000
trusted library allocation
page read and write
1A94C865000
trusted library allocation
page read and write
1A94FA95000
trusted library allocation
page read and write
1A94ECFC000
trusted library allocation
page read and write
1A951975000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A950C83000
trusted library allocation
page read and write
1A94BF57000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
1A9563D8000
trusted library allocation
page read and write
1A95618D000
trusted library allocation
page read and write
1A94FD4B000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94FCC4000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A945484000
heap
page read and write
21C14D23000
trusted library allocation
page read and write
1EB308D0000
heap
page read and write
1A94F9A2000
trusted library allocation
page read and write
1A94E744000
trusted library allocation
page read and write
1A94E862000
trusted library allocation
page read and write
1A94C875000
trusted library allocation
page read and write
1A959ED9000
trusted library allocation
page read and write
1A94FDDC000
trusted library allocation
page read and write
1A94FDD2000
trusted library allocation
page read and write
1A950ADF000
trusted library allocation
page read and write
FDB000
heap
page read and write
1A94544E000
heap
page read and write
1A94DD9B000
trusted library allocation
page read and write
1A95657D000
trusted library allocation
page read and write
1A94E1F9000
trusted library allocation
page read and write
1A950CC0000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94FDDA000
trusted library allocation
page read and write
1A956172000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A945445000
heap
page read and write
1A957AB2000
trusted library allocation
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A95618F000
trusted library allocation
page read and write
1A94F5B6000
trusted library allocation
page read and write
1A95A6E6000
trusted library allocation
page read and write
1A9500F8000
trusted library allocation
page read and write
1A95A6A8000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94BFAE000
trusted library allocation
page read and write
1A95A2A9000
trusted library allocation
page read and write
1EB30B0B000
trusted library allocation
page read and write
1EB30FF9000
heap
page read and write
1A958CCC000
trusted library allocation
page read and write
1A950B84000
trusted library allocation
page read and write
1A94C87A000
trusted library allocation
page read and write
1A952F4E000
trusted library allocation
page read and write
1A950C78000
trusted library allocation
page read and write
1A94A41E000
trusted library allocation
page read and write
1A95AB0B000
heap
page read and write
1A94543F000
heap
page read and write
1A950196000
trusted library allocation
page read and write
1A94E1A0000
trusted library allocation
page read and write
1A950A76000
trusted library allocation
page read and write
1A94A4D0000
trusted library allocation
page read and write
1EB31020000
heap
page read and write
1A959F3B000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94E07C000
trusted library allocation
page read and write
1EB30880000
trusted library allocation
page read and write
1A956496000
trusted library allocation
page read and write
1A957A49000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A945484000
heap
page read and write
1A94FCBA000
trusted library allocation
page read and write
1A95A698000
trusted library allocation
page read and write
1A951958000
trusted library allocation
page read and write
1A950BD2000
trusted library allocation
page read and write
1A959FE1000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A945434000
heap
page read and write
1A95657D000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A945484000
heap
page read and write
1EB31028000
heap
page read and write
1A945492000
heap
page read and write
1A9596A8000
trusted library allocation
page read and write
1A95A582000
trusted library allocation
page read and write
CAC000
unkown
page read and write
1A9564DD000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94E0F4000
trusted library allocation
page read and write
1A9565F6000
trusted library allocation
page read and write
1A94EDD3000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A9454A6000
heap
page read and write
1A94FDB6000
trusted library allocation
page read and write
1A95A825000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A95A775000
trusted library allocation
page read and write
1A94E84C000
trusted library allocation
page read and write
1A94FD87000
trusted library allocation
page read and write
1A94543B000
heap
page read and write
1A94FB64000
trusted library allocation
page read and write
FBC000
heap
page read and write
1A94FCDF000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94BF49000
trusted library allocation
page read and write
1A94E399000
heap
page read and write
1A94ECFC000
trusted library allocation
page read and write
1EB3103D000
heap
page read and write
1A959FA6000
trusted library allocation
page read and write
1A94FDC3000
trusted library allocation
page read and write
146D4463000
trusted library allocation
page read and write
1A94DDC8000
trusted library allocation
page read and write
1A959FDB000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A95A2B7000
trusted library allocation
page read and write
1A95A835000
trusted library allocation
page read and write
1A94545B000
heap
page read and write
1A9563D2000
trusted library allocation
page read and write
1A945464000
heap
page read and write
34471FB03000
trusted library allocation
page read and write
1A950C21000
trusted library allocation
page read and write
1A956787000
trusted library allocation
page read and write
1A95088A000
trusted library allocation
page read and write
1A95A827000
trusted library allocation
page read and write
1A957AAE000
trusted library allocation
page read and write
1A94ECD4000
trusted library allocation
page read and write
25FA8650000
heap
page read and write
1A95652E000
trusted library allocation
page read and write
1A957AA0000
trusted library allocation
page read and write
1A945495000
heap
page read and write
A2F000
stack
page read and write
1A94EC48000
trusted library allocation
page read and write
1A9504D1000
trusted library allocation
page read and write
1EB30312000
trusted library allocation
page read and write
1A95668E000
trusted library allocation
page read and write
1A94FCCD000
trusted library allocation
page read and write
1A94EE0C000
trusted library allocation
page read and write
1A94E399000
heap
page read and write
FC4000
heap
page read and write
E0B99EE000
stack
page read and write
1A94E949000
trusted library allocation
page read and write
1A94FDDA000
trusted library allocation
page read and write
1A956311000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A95637C000
trusted library allocation
page read and write
1A94F8E6000
trusted library allocation
page read and write
1A9567DE000
trusted library allocation
page read and write
1A95A2ED000
trusted library allocation
page read and write
1A94BFDE000
trusted library allocation
page read and write
1A94EC0C000
trusted library allocation
page read and write
1A9500FA000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A9588C5000
trusted library allocation
page read and write
1A945445000
heap
page read and write
1A94C88B000
trusted library allocation
page read and write
25FA84BB000
heap
page read and write
1A94A45D000
trusted library allocation
page read and write
1A956311000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A94A4FE000
trusted library allocation
page read and write
1A95AB46000
heap
page read and write
1A94FB20000
trusted library allocation
page read and write
1A94EE38000
trusted library allocation
page read and write
1A94ECFA000
trusted library allocation
page read and write
1A950866000
trusted library allocation
page read and write
1A94FD9F000
trusted library allocation
page read and write
1A950021000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A94EDD0000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A951D02000
trusted library allocation
page read and write
1A95A832000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94E049000
trusted library allocation
page read and write
1A94DD9B000
trusted library allocation
page read and write
1A956482000
trusted library allocation
page read and write
1A94FD68000
trusted library allocation
page read and write
1A94F8E6000
trusted library allocation
page read and write
1A94ECF0000
trusted library allocation
page read and write
1EB30910000
heap
page read and write
1A94FB80000
trusted library allocation
page read and write
1A94E843000
trusted library allocation
page read and write
1A94DBB0000
trusted library allocation
page read and write
1A9506D2000
trusted library allocation
page read and write
1A950BCA000
trusted library allocation
page read and write
1A94549D000
heap
page read and write
1A952FF1000
trusted library allocation
page read and write
1A9535C5000
trusted library allocation
page read and write
1A95192D000
trusted library allocation
page read and write
1A94BFE6000
trusted library allocation
page read and write
1A9518F3000
trusted library allocation
page read and write
1A94E0B5000
trusted library allocation
page read and write
1A951984000
trusted library allocation
page read and write
1A957A90000
trusted library allocation
page read and write
1A957A90000
trusted library allocation
page read and write
1A950CCC000
trusted library allocation
page read and write
1A957A40000
trusted library allocation
page read and write
1A94A4A9000
trusted library allocation
page read and write
1A94A426000
trusted library allocation
page read and write
1A950196000
trusted library allocation
page read and write
1A94FCBA000
trusted library allocation
page read and write
1A957AEE000
trusted library allocation
page read and write
1A94FD6B000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A950123000
trusted library allocation
page read and write
1A9535AC000
trusted library allocation
page read and write
1A94BF1D000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A945487000
heap
page read and write
1A94FD93000
trusted library allocation
page read and write
146D4700000
trusted library allocation
page read and write
1A959F7B000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A94FC02000
trusted library allocation
page read and write
1A94E039000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94E119000
trusted library allocation
page read and write
1A95A6B2000
trusted library allocation
page read and write
1A94549A000
heap
page read and write
1A9564AE000
trusted library allocation
page read and write
1A950237000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94545E000
heap
page read and write
1A945485000
heap
page read and write
1A956182000
trusted library allocation
page read and write
1A945487000
heap
page read and write
FF4BBFE000
stack
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A957AAE000
trusted library allocation
page read and write
1A95194F000
trusted library allocation
page read and write
1A94E1EA000
trusted library allocation
page read and write
1A94F965000
trusted library allocation
page read and write
1A959EF1000
trusted library allocation
page read and write
1A94FDAA000
trusted library allocation
page read and write
1A94E886000
trusted library allocation
page read and write
1A94548C000
heap
page read and write
EB4000
heap
page read and write
1A94A323000
trusted library allocation
page read and write
1A94EC9E000
trusted library allocation
page read and write
1AC0003F000
trusted library allocation
page read and write
1A94FDF8000
trusted library allocation
page read and write
1A94F82B000
trusted library allocation
page read and write
1A94EC8E000
trusted library allocation
page read and write
1A94BFDE000
trusted library allocation
page read and write
1A9518E2000
trusted library allocation
page read and write
1A9564DD000
trusted library allocation
page read and write
1A945434000
heap
page read and write
FF4C3FF000
stack
page read and write
1A94FFFE000
trusted library allocation
page read and write
1A94E853000
trusted library allocation
page read and write
1A945473000
heap
page read and write
1A94ECA6000
trusted library allocation
page read and write
1A9506C7000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94FA4E000
trusted library allocation
page read and write
1A950BD2000
trusted library allocation
page read and write
1A945464000
heap
page read and write
E0B98EC000
stack
page read and write
1A94BFE6000
trusted library allocation
page read and write
1A94E00C000
trusted library allocation
page read and write
32F32EB000
stack
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A94E79C000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94FD95000
trusted library allocation
page read and write
1A950B6F000
trusted library allocation
page read and write
1A94E94B000
trusted library allocation
page read and write
25FA84B2000
heap
page read and write
1A945460000
heap
page read and write
1A945464000
heap
page read and write
21C14A6A000
heap
page read and write
1A95629A000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A94E960000
trusted library allocation
page read and write
1A95A68D000
trusted library allocation
page read and write
1A95611B000
trusted library allocation
page read and write
1A9566F4000
trusted library allocation
page read and write
1A94DD94000
trusted library allocation
page read and write
1A95AA3D000
trusted library allocation
page read and write
1A95350C000
trusted library allocation
page read and write
1A957AA6000
trusted library allocation
page read and write
1A9563D2000
trusted library allocation
page read and write
1A94FC62000
trusted library allocation
page read and write
1A9519D9000
trusted library allocation
page read and write
1A957A94000
trusted library allocation
page read and write
1A94E194000
trusted library allocation
page read and write
21C14DA2000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
1A9506C1000
trusted library allocation
page read and write
1A956486000
trusted library allocation
page read and write
1A95016F000
trusted library allocation
page read and write
1A94FB7A000
trusted library allocation
page read and write
1A9562E6000
trusted library allocation
page read and write
1A94544F000
heap
page read and write
1A95634E000
trusted library allocation
page read and write
1A95068A000
trusted library allocation
page read and write
1A94FD61000
trusted library allocation
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A94FC8A000
trusted library allocation
page read and write
1A9565FE000
trusted library allocation
page read and write
1EB31020000
heap
page read and write
1A94FB80000
trusted library allocation
page read and write
1A9565F2000
trusted library allocation
page read and write
1EB31062000
heap
page read and write
1A95A68D000
trusted library allocation
page read and write
1A94F8F3000
trusted library allocation
page read and write
1A945451000
heap
page read and write
FDB000
heap
page read and write
1A94E14E000
trusted library allocation
page read and write
1EB310A9000
heap
page read and write
1A956778000
trusted library allocation
page read and write
1A94FBFD000
trusted library allocation
page read and write
1A9454A8000
heap
page read and write
1A957A23000
trusted library allocation
page read and write
1A94A4F0000
trusted library allocation
page read and write
32F66BE000
unkown
page readonly
1A94F9C3000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A945487000
heap
page read and write
1A94EE32000
trusted library allocation
page read and write
1A950A95000
trusted library allocation
page read and write
1A94FD34000
trusted library allocation
page read and write
1A95657D000
trusted library allocation
page read and write
1A959FC6000
trusted library allocation
page read and write
1A95A81F000
trusted library allocation
page read and write
1A945450000
heap
page read and write
1A94E843000
trusted library allocation
page read and write
25FA686A000
heap
page read and write
1A94E3CC000
heap
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A94DD8C000
trusted library allocation
page read and write
1A94543F000
heap
page read and write
1A94FD95000
trusted library allocation
page read and write
FF4B3FF000
stack
page read and write
1A952FCE000
trusted library allocation
page read and write
1A94E0CA000
trusted library allocation
page read and write
1A94DD85000
trusted library allocation
page read and write
1A94EC5F000
trusted library allocation
page read and write
1A94FD95000
trusted library allocation
page read and write
FF4A3FF000
stack
page read and write
1A94BF64000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A94FDA4000
trusted library allocation
page read and write
1A94FF81000
trusted library allocation
page read and write
1EB30920000
heap
page read and write
1A945434000
heap
page read and write
1A945487000
heap
page read and write
1A94EC25000
trusted library allocation
page read and write
1A945440000
heap
page read and write
1A951888000
trusted library allocation
page read and write
1A94A3FE000
trusted library allocation
page read and write
1A95A5B2000
trusted library allocation
page read and write
1A94DD54000
trusted library allocation
page read and write
1A95AC62000
heap
page read and write
1EB303B8000
trusted library allocation
page read and write
1A94ECDC000
trusted library allocation
page read and write
1A945463000
heap
page read and write
1A945463000
heap
page read and write
1A94F5DC000
trusted library allocation
page read and write
1A95A661000
trusted library allocation
page read and write
1A950627000
trusted library allocation
page read and write
1A959480000
trusted library allocation
page read and write
1A94F9C3000
trusted library allocation
page read and write
1EB30940000
heap
page read and write
1A95A4FE000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A959EF9000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A94A462000
trusted library allocation
page read and write
1A9564AE000
trusted library allocation
page read and write
1A95A6F5000
trusted library allocation
page read and write
1A94EDD0000
trusted library allocation
page read and write
1EB30B00000
trusted library allocation
page read and write
1A94E95B000
trusted library allocation
page read and write
1A95A6B0000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94548D000
heap
page read and write
1A94549A000
heap
page read and write
1A945491000
heap
page read and write
1A94E0F0000
trusted library allocation
page read and write
1A9535E4000
trusted library allocation
page read and write
1A94E3CC000
heap
page read and write
1A94FA40000
trusted library allocation
page read and write
1A95650D000
trusted library allocation
page read and write
1A9564DB000
trusted library allocation
page read and write
1A94FC6F000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A95016F000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A945487000
heap
page read and write
21C14D12000
trusted library allocation
page read and write
1A95023E000
trusted library allocation
page read and write
1A94FCB1000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A957A46000
trusted library allocation
page read and write
256A19E0000
heap
page read and write
1A94BFBE000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A9504AD000
trusted library allocation
page read and write
1A94EE1F000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94FC6A000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A94ECCF000
trusted library allocation
page read and write
F1A5D103000
trusted library allocation
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A94BFF1000
trusted library allocation
page read and write
1A94542E000
heap
page read and write
1A95A494000
trusted library allocation
page read and write
1A950B93000
trusted library allocation
page read and write
146D4477000
trusted library allocation
page read and write
1A94FFB0000
trusted library allocation
page read and write
1EB3102D000
heap
page read and write
FE6000
heap
page read and write
1A94ECE0000
trusted library allocation
page read and write
1A94FDF1000
trusted library allocation
page read and write
1EB30300000
trusted library allocation
page read and write
1EB30FA9000
heap
page read and write
1A9565F2000
trusted library allocation
page read and write
1A950CA6000
trusted library allocation
page read and write
1A94FD9F000
trusted library allocation
page read and write
1A95190C000
trusted library allocation
page read and write
1A94EC8E000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A957A42000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A94FCCD000
trusted library allocation
page read and write
1A95A747000
trusted library allocation
page read and write
1EB310A9000
heap
page read and write
1A95A682000
trusted library allocation
page read and write
1A951A85000
trusted library allocation
page read and write
1A94F85D000
trusted library allocation
page read and write
1A95A4F7000
trusted library allocation
page read and write
1A950BF0000
trusted library allocation
page read and write
1A94545B000
heap
page read and write
1A9565EA000
trusted library allocation
page read and write
1A95A7C5000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94ECCF000
trusted library allocation
page read and write
1A9502F3000
trusted library allocation
page read and write
1A94549B000
heap
page read and write
1A956331000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A956577000
trusted library allocation
page read and write
1A9565FB000
trusted library allocation
page read and write
256A1900000
heap
page read and write
1A94C23A000
trusted library allocation
page read and write
1A951919000
trusted library allocation
page read and write
1A94544C000
heap
page read and write
1A94E399000
heap
page read and write
1A94A426000
trusted library allocation
page read and write
1A94EC43000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945445000
heap
page read and write
1A94ECC3000
trusted library allocation
page read and write
1A94EDFD000
trusted library allocation
page read and write
1A94EDEE000
trusted library allocation
page read and write
1A945485000
heap
page read and write
1A94ECA4000
trusted library allocation
page read and write
1A94FCB1000
trusted library allocation
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A94A3F6000
trusted library allocation
page read and write
1A9500FE000
trusted library allocation
page read and write
146D3FA0000
unclassified section
page readonly
1A956176000
trusted library allocation
page read and write
25FA6C00000
trusted library allocation
page read and write
1A950040000
trusted library allocation
page read and write
1A951939000
trusted library allocation
page read and write
1A94E088000
trusted library allocation
page read and write
1A94BFC9000
trusted library allocation
page read and write
1A945488000
heap
page read and write
1A95A6BB000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94FF4A000
trusted library allocation
page read and write
1A959F73000
trusted library allocation
page read and write
1A945491000
heap
page read and write
1A94FD28000
trusted library allocation
page read and write
1A945437000
heap
page read and write
1A945485000
heap
page read and write
1A95A673000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94545F000
heap
page read and write
1A945491000
heap
page read and write
1A94E0DC000
trusted library allocation
page read and write
1A956291000
trusted library allocation
page read and write
146D44C4000
trusted library allocation
page read and write
1EB30FA0000
heap
page read and write
1EB30B14000
trusted library allocation
page read and write
1A95676D000
trusted library allocation
page read and write
1A956463000
trusted library allocation
page read and write
1A9566E0000
trusted library allocation
page read and write
1A951AF9000
trusted library allocation
page read and write
146D4707000
trusted library allocation
page read and write
1A94ECE0000
trusted library allocation
page read and write
1A94545E000
heap
page read and write
1A95A698000
trusted library allocation
page read and write
1A94FC56000
trusted library allocation
page read and write
1A950040000
trusted library allocation
page read and write
1A94EC70000
trusted library allocation
page read and write
32F33EE000
stack
page read and write
1A945446000
heap
page read and write
1A94FDE6000
trusted library allocation
page read and write
1A95A2E9000
trusted library allocation
page read and write
1A94ECDC000
trusted library allocation
page read and write
1A9567AA000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A945451000
heap
page read and write
1A9519F8000
trusted library allocation
page read and write
1A9565D5000
trusted library allocation
page read and write
1A950CCC000
trusted library allocation
page read and write
1A94FF44000
trusted library allocation
page read and write
1A94FD93000
trusted library allocation
page read and write
1A9518B0000
trusted library allocation
page read and write
1A94E89C000
trusted library allocation
page read and write
1A94F989000
trusted library allocation
page read and write
1A94E841000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
1A959F90000
trusted library allocation
page read and write
1A94F9EC000
trusted library allocation
page read and write
1A9564AE000
trusted library allocation
page read and write
1A9500DD000
trusted library allocation
page read and write
1A94FB7C000
trusted library allocation
page read and write
1A95A2A9000
trusted library allocation
page read and write
1A956748000
trusted library allocation
page read and write
1A94543E000
heap
page read and write
1A945473000
heap
page read and write
1A950C4A000
trusted library allocation
page read and write
E0BA3D8000
stack
page read and write
1A94542E000
heap
page read and write
1A959EF9000
trusted library allocation
page read and write
1A94ECC9000
trusted library allocation
page read and write
1A957ADA000
trusted library allocation
page read and write
32F76BE000
unkown
page readonly
F80000
heap
page read and write
1A94FB74000
trusted library allocation
page read and write
1A94ECB1000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A9506C7000
trusted library allocation
page read and write
1A94E175000
trusted library allocation
page read and write
146D40FF000
unclassified section
page read and write
1A94544C000
heap
page read and write
1A95A663000
trusted library allocation
page read and write
1A9454AD000
heap
page read and write
1A9564FC000
trusted library allocation
page read and write
1A94A4FE000
trusted library allocation
page read and write
256A17B0000
heap
page read and write
1A95A6EF000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A945463000
heap
page read and write
1A94E782000
trusted library allocation
page read and write
1A9502EE000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A956542000
trusted library allocation
page read and write
1A956557000
trusted library allocation
page read and write
1A9506B7000
trusted library allocation
page read and write
1A950798000
trusted library allocation
page read and write
1A94FD65000
trusted library allocation
page read and write
1A94E0B7000
trusted library allocation
page read and write
1A956633000
trusted library allocation
page read and write
1A94F9E4000
trusted library allocation
page read and write
1A95A2F1000
trusted library allocation
page read and write
1A94FDE4000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A94DDD9000
trusted library allocation
page read and write
1A9565D2000
trusted library allocation
page read and write
1A9500E5000
trusted library allocation
page read and write
1A94FC3A000
trusted library allocation
page read and write
1A956542000
trusted library allocation
page read and write
1EB3106A000
heap
page read and write
1A957A98000
trusted library allocation
page read and write
21C14DC8000
trusted library allocation
page read and write
1A94E031000
trusted library allocation
page read and write
1A945464000
heap
page read and write
1A95A6F3000
trusted library allocation
page read and write
1EB2FFA3000
remote allocation
page execute read
1EB30FA0000
heap
page read and write
1A94FD8C000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A945485000
heap
page read and write
1A94DD2D000
trusted library allocation
page read and write
1A94FCCD000
trusted library allocation
page read and write
1A94DD29000
trusted library allocation
page read and write
1A94E386000
heap
page read and write
1A959EF1000
trusted library allocation
page read and write
1A945494000
heap
page read and write
1A94549D000
heap
page read and write
1A94BF94000
trusted library allocation
page read and write
1A94FDD3000
trusted library allocation
page read and write
1EB31084000
heap
page read and write
1A9588E4000
trusted library allocation
page read and write
1A957AEE000
trusted library allocation
page read and write
1A950AFC000
trusted library allocation
page read and write
21C14F03000
trusted library allocation
page read and write
1A94FDAD000
trusted library allocation
page read and write
1A956791000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A94ECDC000
trusted library allocation
page read and write
1A95AC22000
heap
page read and write
1A95A693000
trusted library allocation
page read and write
1A94EDCF000
trusted library allocation
page read and write
1A956782000
trusted library allocation
page read and write
1EB30FAC000
heap
page read and write
1A94E8A2000
trusted library allocation
page read and write
1A95A79F000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A95A5F3000
trusted library allocation
page read and write
1A95A4C3000
trusted library allocation
page read and write
1EB31084000
heap
page read and write
1A94DD98000
trusted library allocation
page read and write
1A94544E000
heap
page read and write
1A95AB5D000
heap
page read and write
1A94FB57000
trusted library allocation
page read and write
1A95A5D7000
trusted library allocation
page read and write
1A959F6B000
trusted library allocation
page read and write
639000
stack
page read and write
1A94542E000
heap
page read and write
1A94B4A8000
trusted library allocation
page read and write
1A95A6FA000
trusted library allocation
page read and write
1A95652F000
trusted library allocation
page read and write
FF4CBFF000
stack
page read and write
1A94E13A000
trusted library allocation
page read and write
1A95A2F1000
trusted library allocation
page read and write
1A945491000
heap
page read and write
39B9F2803000
trusted library allocation
page read and write
1A95A250000
trusted library allocation
page read and write
1A95362E000
trusted library allocation
page read and write
1A94FDE9000
trusted library allocation
page read and write
1A94B4E2000
trusted library allocation
page read and write
1A95A4D0000
trusted library allocation
page read and write
1A945434000
heap
page read and write
1A94DDED000
trusted library allocation
page read and write
1A94E020000
trusted library allocation
page read and write
1A94FDF9000
trusted library allocation
page read and write
1A95A69D000
trusted library allocation
page read and write
1A94545C000
heap
page read and write
1A9564DD000
trusted library allocation
page read and write
1A957A56000
trusted library allocation
page read and write
1A950C83000
trusted library allocation
page read and write
1A94E742000
trusted library allocation
page read and write
1A94FB70000
trusted library allocation
page read and write
1A95676A000
trusted library allocation
page read and write
E0BC47E000
stack
page read and write
1A945491000
heap
page read and write
1A94EDF4000
trusted library allocation
page read and write
1A94ECC2000
trusted library allocation
page read and write
21C14C00000
trusted library allocation
page read and write
21C14D10000
trusted library allocation
page read and write
1A94DD77000
trusted library allocation
page read and write
1A95610B000
trusted library allocation
page read and write
1A94FC76000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1A950177000
trusted library allocation
page read and write
1A94BFDE000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A94E0AE000
trusted library allocation
page read and write
1A945464000
heap
page read and write
21C14E74000
heap
page read and write
1A9454A6000
heap
page read and write
1A95A3C6000
trusted library allocation
page read and write
1A94542D000
heap
page read and write
1A945491000
heap
page read and write
1A945451000
heap
page read and write
1A95A561000
trusted library allocation
page read and write
1A94EC53000
trusted library allocation
page read and write
1A945487000
heap
page read and write
1EB30FA0000
heap
page read and write
1A945492000
heap
page read and write
FDB000
heap
page read and write
1A94549D000
heap
page read and write
1EB30389000
trusted library allocation
page read and write
1A95A598000
trusted library allocation
page read and write
1A94FD4B000
trusted library allocation
page read and write
1A94548D000
heap
page read and write
1A950C7C000
trusted library allocation
page read and write
1A950091000
trusted library allocation
page read and write
1A950163000
trusted library allocation
page read and write
1A9454A4000
heap
page read and write
1A94E77B000
trusted library allocation
page read and write
1A94FF63000
trusted library allocation
page read and write
1A95A83A000
trusted library allocation
page read and write
1A95A659000
trusted library allocation
page read and write
1A94E39D000
heap
page read and write
1A94FF7E000
trusted library allocation
page read and write
1A94BF62000
trusted library allocation
page read and write
1A94E8CB000
trusted library allocation
page read and write
1A9454A3000
heap
page read and write
1A94EDBA000
trusted library allocation
page read and write
1A945492000
heap
page read and write
1A95A6FA000
trusted library allocation
page read and write
1A94ECF7000
trusted library allocation
page read and write
1A95647D000
trusted library allocation
page read and write
1A95657D000
trusted library allocation
page read and write
There are 4036 hidden memdumps, click here to show them.