IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b0bd22ac-4b5a-46d3-bae1-657a8d7542cc.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b0bd22ac-4b5a-46d3-bae1-657a8d7542cc.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LZ2YW1XSG67FDESNELJ2.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MIIY1IP2EH99CYG5A62Z.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\d3868cce-c653-4977-a030-57a2f263a244 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\d3868cce-c653-4977-a030-57a2f263a244.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d30234f-83dc-4616-963d-c840c8c3c565} 2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd4126ff10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1568 -parentBuildID 20230927232528 -prefsHandle 4036 -prefMapHandle 2860 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aae5212-1d50-4102-9b86-67ab97c1cbe9} 2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd533ba410 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5028 -prefMapHandle 2628 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48db7f1c-968e-4dc6-9876-b2cfd4458117} 2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd5aacfd10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comW
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://www.google.com/complete/searchf458e78b-9128-4027-b344-538f5661c148fa42b23a-30c5-46f3-8997-4a
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.174
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.78
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
CDF000
heap
page read and write
malicious
1FD52D33000
trusted library allocation
page read and write
1FD539FD000
trusted library allocation
page read and write
1FD53940000
trusted library allocation
page read and write
1FD5ABEA000
trusted library allocation
page read and write
1FD5D406000
trusted library allocation
page read and write
1FD51A7B000
trusted library allocation
page read and write
256D908A000
heap
page read and write
1FD5D5DB000
trusted library allocation
page read and write
1FD51E9F000
trusted library allocation
page read and write
1FD524C4000
trusted library allocation
page read and write
256D912A000
heap
page read and write
1FD48091000
heap
page read and write
1FD52E52000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD523DC000
trusted library allocation
page read and write
1FD4E425000
trusted library allocation
page read and write
1FD52DBD000
trusted library allocation
page read and write
1FD532E8000
trusted library allocation
page read and write
1FD50CE3000
heap
page read and write
1FD592F4000
trusted library allocation
page read and write
1FD52E75000
trusted library allocation
page read and write
166BC71F000
unclassified section
page read and write
166BC710000
unclassified section
page read and write
1FD4E3DF000
trusted library allocation
page read and write
19B90B00000
trusted library allocation
page read and write
1FD592FC000
trusted library allocation
page read and write
1FD5D418000
trusted library allocation
page read and write
1FD52D91000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD5255D000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52D0B000
trusted library allocation
page read and write
1FD52E4E000
trusted library allocation
page read and write
1FD52E71000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD5D442000
trusted library allocation
page read and write
1FD52C39000
trusted library allocation
page read and write
1FD5D268000
trusted library allocation
page read and write
1FD5459D000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD52DC5000
trusted library allocation
page read and write
256D9000000
heap
page read and write
1FD480D1000
heap
page read and write
1FD480B0000
heap
page read and write
1FD5B7A7000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD53982000
trusted library allocation
page read and write
1FD5263F000
trusted library allocation
page read and write
1FD4805D000
heap
page read and write
1FD5267A000
trusted library allocation
page read and write
1FD590BC000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD58ECD000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD59038000
trusted library allocation
page read and write
1FD526AD000
trusted library allocation
page read and write
1FD51EAF000
trusted library allocation
page read and write
1FD5D5F0000
trusted library allocation
page read and write
1FD51A75000
trusted library allocation
page read and write
1FD545E6000
trusted library allocation
page read and write
1FD58FE3000
trusted library allocation
page read and write
1FD5315C000
trusted library allocation
page read and write
AFE000
stack
page read and write
1FD50D01000
heap
page read and write
1FD480B8000
heap
page read and write
1FD4806F000
heap
page read and write
1FD48070000
heap
page read and write
1FD548CB000
trusted library allocation
page read and write
166BC7A4000
heap
page read and write
1FD480C5000
heap
page read and write
1FD52E4E000
trusted library allocation
page read and write
19B90830000
heap
page read and write
1FD48062000
heap
page read and write
1141FAC4000
trusted library allocation
page read and write
256D84F3000
trusted library allocation
page read and write
1FD51A8F000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD5B6A2000
trusted library allocation
page read and write
1FD5D48F000
trusted library allocation
page read and write
1FD539FB000
trusted library allocation
page read and write
1FD51E58000
trusted library allocation
page read and write
1FD5D194000
trusted library allocation
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD48093000
heap
page read and write
1FD528B0000
trusted library allocation
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD52D39000
trusted library allocation
page read and write
1FD5AA73000
trusted library allocation
page read and write
1FD50D02000
heap
page read and write
256D9177000
heap
page read and write
1FD591CB000
trusted library allocation
page read and write
1FD52469000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD5D1A4000
trusted library allocation
page read and write
1FD52E5D000
trusted library allocation
page read and write
1FD4FA7F000
trusted library allocation
page read and write
1FD5DDBC000
trusted library allocation
page read and write
1FD52E73000
trusted library allocation
page read and write
1FD5B76D000
trusted library allocation
page read and write
1FD512EF000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD53965000
trusted library allocation
page read and write
1FD52DB2000
trusted library allocation
page read and write
1FD51AD2000
trusted library allocation
page read and write
1FD52D73000
trusted library allocation
page read and write
1023FE000
unkown
page readonly
1FD48068000
heap
page read and write
1FD539FE000
trusted library allocation
page read and write
1FD5AAAF000
trusted library allocation
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD48057000
heap
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD51AEF000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD5260B000
trusted library allocation
page read and write
1FD51EA4000
trusted library allocation
page read and write
1FD5440B000
trusted library allocation
page read and write
1FD50D24000
heap
page read and write
1FD5959B000
trusted library allocation
page read and write
1FD52E67000
trusted library allocation
page read and write
1FD52EF8000
trusted library allocation
page read and write
1FD4FAEC000
trusted library allocation
page read and write
1141FB46000
heap
page read and write
1FD51AC7000
trusted library allocation
page read and write
1FD52D91000
trusted library allocation
page read and write
1FD4809C000
heap
page read and write
1FD52436000
trusted library allocation
page read and write
1FD53123000
trusted library allocation
page read and write
1FD5B7C5000
trusted library allocation
page read and write
1FD52A73000
trusted library allocation
page read and write
1FD52452000
trusted library allocation
page read and write
1FD4E22A000
trusted library allocation
page read and write
1FD5912B000
trusted library allocation
page read and write
1FD592CA000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1141FA6B000
trusted library allocation
page read and write
1FD54893000
trusted library allocation
page read and write
1FD523FD000
trusted library allocation
page read and write
1FD592A1000
trusted library allocation
page read and write
1FD52E06000
trusted library allocation
page read and write
1FD5ABDC000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD5AF1A000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD4E2E9000
trusted library allocation
page read and write
1FD5C700000
trusted library allocation
page read and write
1FD53295000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD52A50000
trusted library allocation
page read and write
1FD52469000
trusted library allocation
page read and write
1FD590F3000
trusted library allocation
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD52DBD000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD52AE8000
trusted library allocation
page read and write
1FD547CA000
trusted library allocation
page read and write
1FD52867000
trusted library allocation
page read and write
1FD52436000
trusted library allocation
page read and write
1FD590ED000
trusted library allocation
page read and write
1FD5D1D1000
trusted library allocation
page read and write
1FD5AAF9000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD58EB8000
trusted library allocation
page read and write
1FD480E1000
heap
page read and write
1FD4FACB000
trusted library allocation
page read and write
1FD594A6000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5909F000
trusted library allocation
page read and write
CF2000
heap
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD526E5000
trusted library allocation
page read and write
1FD5D5D5000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD53491000
trusted library allocation
page read and write
256D8E50000
trusted library allocation
page read and write
1FD4FA56000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD48062000
heap
page read and write
256D8423000
trusted library allocation
page read and write
1FD593BC000
trusted library allocation
page read and write
1FD539F2000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
19B90C95000
heap
page read and write
1FD48062000
heap
page read and write
1FD480E1000
heap
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD58EE3000
trusted library allocation
page read and write
1FD48034000
heap
page read and write
1FD52D91000
trusted library allocation
page read and write
1FD5D45C000
trusted library allocation
page read and write
1FD5D66A000
heap
page read and write
1FD52ADD000
trusted library allocation
page read and write
1FD59593000
trusted library allocation
page read and write
1FD55106000
trusted library allocation
page read and write
CC8000
heap
page read and write
1FD480DA000
heap
page read and write
1FD480CE000
heap
page read and write
1FD48062000
heap
page read and write
1FD52D73000
trusted library allocation
page read and write
1FD52A73000
trusted library allocation
page read and write
1FD51AB2000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD52D39000
trusted library allocation
page read and write
1FD53017000
trusted library allocation
page read and write
1FD48091000
heap
page read and write
1FD544A2000
trusted library allocation
page read and write
1FD52DC7000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD4806A000
heap
page read and write
1FD480A7000
heap
page read and write
1FD48054000
heap
page read and write
256D9009000
heap
page read and write
1FD58F28000
trusted library allocation
page read and write
1FD53287000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD480A2000
heap
page read and write
1FD58F16000
trusted library allocation
page read and write
1FD52EFC000
trusted library allocation
page read and write
1FD59261000
trusted library allocation
page read and write
DEFDD81000
trusted library allocation
page execute read
1FD51AD2000
trusted library allocation
page read and write
166BC712000
unclassified section
page read and write
1FD48069000
heap
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD52436000
trusted library allocation
page read and write
1FD4FAF6000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DF4000
trusted library allocation
page read and write
1FD5D595000
trusted library allocation
page read and write
1FD52D2B000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5242B000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD58ED1000
trusted library allocation
page read and write
1FD51A52000
trusted library allocation
page read and write
1FD52C3B000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD526FA000
trusted library allocation
page read and write
1FD48065000
heap
page read and write
1FD4805C000
heap
page read and write
1FD512A1000
trusted library allocation
page read and write
1FD52A50000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5D593000
trusted library allocation
page read and write
1FD5AAA9000
trusted library allocation
page read and write
1FD59198000
trusted library allocation
page read and write
3E839D424000
trusted library allocation
page read and write
256D913B000
heap
page read and write
1FD512BD000
trusted library allocation
page read and write
1FD52FCA000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD52E90000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
166BC661000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD52D8B000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4806F000
heap
page read and write
1FD48085000
heap
page read and write
1FD5D1FE000
trusted library allocation
page read and write
166BC67E000
trusted library allocation
page read and write
1FD52CEE000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD5121A000
trusted library allocation
page read and write
1FD5D5D5000
trusted library allocation
page read and write
256D8E46000
unkown
page execute read
1FD5DD32000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD51AB2000
trusted library allocation
page read and write
1FD51E6A000
trusted library allocation
page read and write
1FD523CD000
trusted library allocation
page read and write
1FD58F6B000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD51A95000
trusted library allocation
page read and write
1FD51EDC000
trusted library allocation
page read and write
C8795BB000
stack
page read and write
1FD48063000
heap
page read and write
1FD4808B000
heap
page read and write
1FD52E73000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD480E1000
heap
page read and write
256D84C4000
trusted library allocation
page read and write
1FD52C3B000
trusted library allocation
page read and write
1FD52DB6000
trusted library allocation
page read and write
1FD535DC000
trusted library allocation
page read and write
6AC000
unkown
page readonly
19B90B0A000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD595F3000
trusted library allocation
page read and write
1FD58EB3000
trusted library allocation
page read and write
1FD52ADB000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD52AAB000
trusted library allocation
page read and write
1FD51580000
trusted library allocation
page read and write
1FD480BE000
heap
page read and write
1FD58E9D000
trusted library allocation
page read and write
1FD48072000
heap
page read and write
1FD5248C000
trusted library allocation
page read and write
1FD59525000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52C39000
trusted library allocation
page read and write
1FD4FA56000
trusted library allocation
page read and write
1FD539F0000
trusted library allocation
page read and write
1FD53360000
trusted library allocation
page read and write
1FD5B748000
trusted library allocation
page read and write
1FD51AD2000
trusted library allocation
page read and write
1FD532E8000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD480D7000
heap
page read and write
1FD5D635000
heap
page read and write
1FD48062000
heap
page read and write
1FD48062000
heap
page read and write
1FD5924C000
trusted library allocation
page read and write
1FD595F5000
trusted library allocation
page read and write
1FD512C4000
trusted library allocation
page read and write
1FD593B8000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD48062000
heap
page read and write
1FD52A32000
trusted library allocation
page read and write
1FD5D49F000
trusted library allocation
page read and write
1FD4E29D000
trusted library allocation
page read and write
6E4000
unkown
page readonly
1FD5DD9C000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD48062000
heap
page read and write
166BC67A000
trusted library allocation
page read and write
1FD59558000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD58F51000
trusted library allocation
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD590AD000
trusted library allocation
page read and write
166BC665000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD5D584000
trusted library allocation
page read and write
CFE000
heap
page read and write
1FD48058000
heap
page read and write
1FD4D1A3000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD58F8C000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD526E5000
trusted library allocation
page read and write
1FD52D0F000
trusted library allocation
page read and write
1FD52637000
trusted library allocation
page read and write
256D9169000
heap
page read and write
1FD5D5A3000
trusted library allocation
page read and write
1FD4CAC6000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD54C9E000
trusted library allocation
page read and write
1FD51538000
trusted library allocation
page read and write
256D90F1000
heap
page read and write
1FD5E111000
trusted library allocation
page read and write
1FD5153C000
trusted library allocation
page read and write
1FD52F63000
trusted library allocation
page read and write
1FD52473000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD51577000
trusted library allocation
page read and write
1FD51E6D000
trusted library allocation
page read and write
1FD53949000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD48062000
heap
page read and write
1FD539FD000
trusted library allocation
page read and write
256D9063000
heap
page read and write
1FD525AB000
trusted library allocation
page read and write
1FD529E1000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD58F51000
trusted library allocation
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD4D1AB000
trusted library allocation
page read and write
1FD5D4BD000
trusted library allocation
page read and write
1FD548E3000
trusted library allocation
page read and write
1FD5AA58000
trusted library allocation
page read and write
1FD5486A000
trusted library allocation
page read and write
1FD4E8D6000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD5D5AF000
trusted library allocation
page read and write
1FD4D1D7000
trusted library allocation
page read and write
1FD5909B000
trusted library allocation
page read and write
1FD524EC000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD52E67000
trusted library allocation
page read and write
1FD4E363000
trusted library allocation
page read and write
1FD50E22000
trusted library allocation
page read and write
1FD4D1B0000
trusted library allocation
page read and write
10347E000
unkown
page readonly
1FD51A95000
trusted library allocation
page read and write
256D90A1000
heap
page read and write
1FD5D56C000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD4D0F6000
trusted library allocation
page read and write
1FD48057000
heap
page read and write
1FD545FA000
trusted library allocation
page read and write
1FD548D8000
trusted library allocation
page read and write
1FD5CFF8000
trusted library allocation
page read and write
1FD48098000
heap
page read and write
1FD547FD000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD48068000
heap
page read and write
1FD51EBE000
trusted library allocation
page read and write
1FD52A8B000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD592E1000
trusted library allocation
page read and write
1FD5D50E000
trusted library allocation
page read and write
1FD52FC4000
trusted library allocation
page read and write
1FD52D71000
trusted library allocation
page read and write
1FD539DA000
trusted library allocation
page read and write
1FD4E98E000
trusted library allocation
page read and write
1FD54450000
trusted library allocation
page read and write
1FD52E44000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD526B8000
trusted library allocation
page read and write
1FD53952000
trusted library allocation
page read and write
1FD5B741000
trusted library allocation
page read and write
1FD52533000
trusted library allocation
page read and write
1FD58EF7000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
256D913B000
heap
page read and write
1FD52EB0000
trusted library allocation
page read and write
1FD52469000
trusted library allocation
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD58EF7000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
ADB000
stack
page read and write
1FD53183000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD52637000
trusted library allocation
page read and write
1FD5B70C000
trusted library allocation
page read and write
1FD593BC000
trusted library allocation
page read and write
1FD52A22000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD545D5000
trusted library allocation
page read and write
256D8F0E000
trusted library allocation
page read and write
1FD58F39000
trusted library allocation
page read and write
1FD51A92000
trusted library allocation
page read and write
1FD4FA9F000
trusted library allocation
page read and write
1FD48084000
heap
page read and write
1FD545DA000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD50D09000
heap
page read and write
1FD52461000
trusted library allocation
page read and write
1FD524F9000
trusted library allocation
page read and write
1FD51EB7000
trusted library allocation
page read and write
1FD58FDC000
trusted library allocation
page read and write
1FD52A20000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD545E2000
trusted library allocation
page read and write
1FD544CC000
trusted library allocation
page read and write
1FD58F43000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD5D522000
trusted library allocation
page read and write
1FD5B7E4000
trusted library allocation
page read and write
1FD595F3000
trusted library allocation
page read and write
1FD51889000
trusted library allocation
page read and write
1FD51E55000
trusted library allocation
page read and write
10017E000
unkown
page readonly
166BC612000
trusted library allocation
page read and write
1FD52E5D000
trusted library allocation
page read and write
1FD5DFF1000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
132671E000
stack
page read and write
1FD5C100000
trusted library allocation
page read and write
1FD594AC000
trusted library allocation
page read and write
1FD51AC7000
trusted library allocation
page read and write
1FD5245B000
trusted library allocation
page read and write
1FD4D200000
trusted library allocation
page read and write
1FD51E42000
trusted library allocation
page read and write
1FD535D2000
trusted library allocation
page read and write
1FD52AFD000
trusted library allocation
page read and write
256D8410000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD48090000
heap
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD52A32000
trusted library allocation
page read and write
1FD5E141000
trusted library allocation
page read and write
1FD480D9000
heap
page read and write
1FD52E8A000
trusted library allocation
page read and write
1FD5B705000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD515B4000
trusted library allocation
page read and write
1FD548F8000
trusted library allocation
page read and write
1FD545D5000
trusted library allocation
page read and write
1FD52569000
trusted library allocation
page read and write
1FD592EB000
trusted library allocation
page read and write
1FD5D11E000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD4FA9F000
trusted library allocation
page read and write
256D905C000
heap
page read and write
1FD535CA000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD5955E000
trusted library allocation
page read and write
1000FB000
stack
page read and write
1FD52E75000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD480A7000
heap
page read and write
1FD5243B000
trusted library allocation
page read and write
1FD52A98000
trusted library allocation
page read and write
1FD59316000
trusted library allocation
page read and write
1FD526BB000
trusted library allocation
page read and write
D07000
heap
page read and write
1FD48054000
heap
page read and write
1FD545CF000
trusted library allocation
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD51A59000
trusted library allocation
page read and write
1FD4E948000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD5DD34000
trusted library allocation
page read and write
256D8477000
trusted library allocation
page read and write
1FD58EF3000
trusted library allocation
page read and write
CE6000
heap
page read and write
1FD52D91000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD51575000
trusted library allocation
page read and write
1FD4CAC4000
trusted library allocation
page read and write
1FD534AD000
trusted library allocation
page read and write
1FD52D91000
trusted library allocation
page read and write
1FD523F0000
trusted library allocation
page read and write
1FD54ACF000
trusted library allocation
page read and write
1FD4FA68000
trusted library allocation
page read and write
1FD4E2DC000
trusted library allocation
page read and write
1FD5D598000
trusted library allocation
page read and write
1FD5D1E2000
trusted library allocation
page read and write
1FD4D19C000
trusted library allocation
page read and write
1FD51A64000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
256D9060000
heap
page read and write
1FD5AA4B000
trusted library allocation
page read and write
1FD50D11000
heap
page read and write
1FD5243A000
trusted library allocation
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD5302C000
trusted library allocation
page read and write
1FD530E6000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD480A8000
heap
page read and write
19B9245A000
heap
page read and write
1FD5D26A000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD52D8B000
trusted library allocation
page read and write
1FD59031000
trusted library allocation
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
256D90B9000
heap
page read and write
1FD48065000
heap
page read and write
1FD48098000
heap
page read and write
1FD55041000
trusted library allocation
page read and write
1FD5B82E000
trusted library allocation
page read and write
1FD48096000
heap
page read and write
1FD5B6E5000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5D646000
heap
page read and write
1FD594E9000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD52FAE000
trusted library allocation
page read and write
1FD4FA84000
trusted library allocation
page read and write
1FD590F7000
trusted library allocation
page read and write
1FD59083000
trusted library allocation
page read and write
1FD535DA000
trusted library allocation
page read and write
1FD5919C000
trusted library allocation
page read and write
256D90E1000
heap
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD5D462000
trusted library allocation
page read and write
1FD48099000
heap
page read and write
1FD52FD4000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD4CA90000
trusted library allocation
page read and write
1FD52EF8000
trusted library allocation
page read and write
1FD48084000
heap
page read and write
1FD51AB2000
trusted library allocation
page read and write
1FD4E862000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD48091000
heap
page read and write
1FD5D52E000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD480E1000
heap
page read and write
1FD4809A000
heap
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD480E2000
heap
page read and write
1FD5ABF5000
trusted library allocation
page read and write
1FD5D264000
trusted library allocation
page read and write
13289FE000
unkown
page readonly
1FD48063000
heap
page read and write
1FD48062000
heap
page read and write
1FD53374000
trusted library allocation
page read and write
3960000
heap
page read and write
1FD51E58000
trusted library allocation
page read and write
1FD52FB6000
trusted library allocation
page read and write
1FD59160000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD55086000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
256D82B6000
heap
page read and write
256D9158000
heap
page read and write
1FD52EDA000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
19B9085F000
heap
page read and write
1FD4FA99000
trusted library allocation
page read and write
1FD5DD32000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
28113FE000
stack
page read and write
1FD51AC4000
trusted library allocation
page read and write
1FD5268D000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD5D6E1000
heap
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD54ACF000
trusted library allocation
page read and write
1FD51EA6000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD4806F000
heap
page read and write
1FD529F1000
trusted library allocation
page read and write
1FD524DA000
trusted library allocation
page read and write
1FD51ACD000
trusted library allocation
page read and write
1FD54484000
trusted library allocation
page read and write
1FD50CE6000
heap
page read and write
CF4000
heap
page read and write
1FD5DF38000
trusted library allocation
page read and write
1141FD00000
trusted library allocation
page read and write
166BC65D000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD5D462000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD480D0000
heap
page read and write
1FD51A82000
trusted library allocation
page read and write
1FD52D39000
trusted library allocation
page read and write
1FD52FFB000
trusted library allocation
page read and write
1FD539B4000
trusted library allocation
page read and write
1FD52484000
trusted library allocation
page read and write
1FD50CE6000
heap
page read and write
1FD480B2000
heap
page read and write
1FD52FB6000
trusted library allocation
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD535EA000
trusted library allocation
page read and write
1FD5D49F000
trusted library allocation
page read and write
256D9060000
heap
page read and write
1FD48062000
heap
page read and write
1FD48094000
heap
page read and write
1FD5D601000
heap
page read and write
1FD5D595000
trusted library allocation
page read and write
1FD5D462000
trusted library allocation
page read and write
1FD4D076000
trusted library allocation
page read and write
1FD51EEF000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD51564000
trusted library allocation
page read and write
1FD5953F000
trusted library allocation
page read and write
1FD512F1000
trusted library allocation
page read and write
256D9069000
heap
page read and write
1FD52623000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD4FAFD000
trusted library allocation
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD480B9000
heap
page read and write
1FD48062000
heap
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD525E7000
trusted library allocation
page read and write
1FD5B7AC000
trusted library allocation
page read and write
1FD523EA000
trusted library allocation
page read and write
1FD51AC5000
trusted library allocation
page read and write
1FD543F2000
trusted library allocation
page read and write
1FD5346A000
trusted library allocation
page read and write
256D90E8000
heap
page read and write
1FD5B707000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD53256000
trusted library allocation
page read and write
1FD58F73000
trusted library allocation
page read and write
1FD4D1C6000
trusted library allocation
page read and write
1FD4E3B3000
trusted library allocation
page read and write
1FD5D1A4000
trusted library allocation
page read and write
1FD48091000
heap
page read and write
1FD480A7000
heap
page read and write
1FD5D17C000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD48061000
heap
page read and write
1FD5DD21000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD547A0000
trusted library allocation
page read and write
166BC610000
trusted library allocation
page read and write
1FD4E830000
trusted library allocation
page read and write
1FD52A9E000
trusted library allocation
page read and write
256D912D000
heap
page read and write
1FD594A8000
trusted library allocation
page read and write
1FD51A75000
trusted library allocation
page read and write
1FD52DE7000
trusted library allocation
page read and write
1FD58EB8000
trusted library allocation
page read and write
1FD58FFA000
trusted library allocation
page read and write
1FD592EB000
trusted library allocation
page read and write
1FD4E290000
trusted library allocation
page read and write
3614000
heap
page read and write
1FD52DD0000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD50D5C000
heap
page read and write
1FD55048000
trusted library allocation
page read and write
1141FD06000
trusted library allocation
page read and write
1FD4CA9E000
trusted library allocation
page read and write
1FD50D2A000
heap
page read and write
1FD52DC0000
trusted library allocation
page read and write
1FD54ACD000
trusted library allocation
page read and write
1FD5AFFB000
trusted library allocation
page read and write
1FD531DB000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD58ECD000
trusted library allocation
page read and write
1FD48065000
heap
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD5DD19000
trusted library allocation
page read and write
1FD51824000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD526E5000
trusted library allocation
page read and write
1FD52D58000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD480CE000
heap
page read and write
1FD4FA94000
trusted library allocation
page read and write
1FD4809F000
heap
page read and write
1FD480C5000
heap
page read and write
1FD51AC2000
trusted library allocation
page read and write
1FD5955E000
trusted library allocation
page read and write
1FD5159B000
trusted library allocation
page read and write
1FD52463000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD48063000
heap
page read and write
3961000
heap
page read and write
1FD52873000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4FABF000
trusted library allocation
page read and write
1FD480EA000
heap
page read and write
1FD48084000
heap
page read and write
1FD523F9000
trusted library allocation
page read and write
1FD595F5000
trusted library allocation
page read and write
1FD4805D000
heap
page read and write
1FD50D00000
heap
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD54C2F000
trusted library allocation
page read and write
1FD54895000
trusted library allocation
page read and write
611000
unkown
page execute read
1FD4805C000
heap
page read and write
6D2000
unkown
page readonly
1FD52D94000
trusted library allocation
page read and write
1FD480E4000
heap
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
C87B8BE000
stack
page read and write
1FD51AC7000
trusted library allocation
page read and write
1FD51EB8000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
256D84C7000
trusted library allocation
page read and write
1FD58FFE000
trusted library allocation
page read and write
1FD4FA9F000
trusted library allocation
page read and write
1FD59129000
trusted library allocation
page read and write
1FD4E0C5000
trusted library allocation
page read and write
1FD5241B000
trusted library allocation
page read and write
1FD50E24000
trusted library allocation
page read and write
1FD58EBC000
trusted library allocation
page read and write
1FD53028000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD5D2C7000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD4D182000
trusted library allocation
page read and write
1FD4E8CD000
trusted library allocation
page read and write
1FD52433000
trusted library allocation
page read and write
1FD480BA000
heap
page read and write
1FD51A30000
trusted library allocation
page read and write
1FD4E232000
trusted library allocation
page read and write
C87C0FE000
unkown
page read and write
1FD5D584000
trusted library allocation
page read and write
1FD592AB000
trusted library allocation
page read and write
1FD5B74D000
trusted library allocation
page read and write
1FD5301E000
trusted library allocation
page read and write
1FD52456000
trusted library allocation
page read and write
1FD54847000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD5240A000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD544EF000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480B0000
heap
page read and write
1FD52E67000
trusted library allocation
page read and write
1FD4E379000
trusted library allocation
page read and write
1FD550A3000
trusted library allocation
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD52266000
trusted library allocation
page read and write
1FD52A55000
trusted library allocation
page read and write
256D9122000
heap
page read and write
1FD54879000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD54AD7000
trusted library allocation
page read and write
1FD515A4000
trusted library allocation
page read and write
1FD48052000
heap
page read and write
1FD51EC0000
trusted library allocation
page read and write
1141F6B0000
unclassified section
page readonly
1FD52C74000
trusted library allocation
page read and write
1FD5B684000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD5D418000
trusted library allocation
page read and write
1FD52473000
trusted library allocation
page read and write
1FD4FAD6000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD5486D000
trusted library allocation
page read and write
1FD5AF4A000
trusted library allocation
page read and write
1FD5D42C000
trusted library allocation
page read and write
1FD4E92B000
trusted library allocation
page read and write
1FD52CFD000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4807B000
heap
page read and write
1FD480A7000
heap
page read and write
256D90E8000
heap
page read and write
1FD52D39000
trusted library allocation
page read and write
1FD535DF000
trusted library allocation
page read and write
1141FB22000
unclassified section
page read and write
1FD51EF1000
trusted library allocation
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD51EDC000
trusted library allocation
page read and write
1FD548EE000
trusted library allocation
page read and write
1FD51AEF000
trusted library allocation
page read and write
1FD5D2C9000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD48070000
heap
page read and write
1FD545A7000
trusted library allocation
page read and write
1FD48099000
heap
page read and write
1FD52DE7000
trusted library allocation
page read and write
1FD5D6BC000
heap
page read and write
1FD59225000
trusted library allocation
page read and write
1FD529D4000
trusted library allocation
page read and write
256D90AA000
heap
page read and write
1FD52E6C000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD480CE000
heap
page read and write
1FD590E4000
trusted library allocation
page read and write
1FD5DFCE000
trusted library allocation
page read and write
1FD52DE2000
trusted library allocation
page read and write
1FD52DD4000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD48090000
heap
page read and write
1FD52D1C000
trusted library allocation
page read and write
1FD52AF4000
trusted library allocation
page read and write
1FD4FA86000
trusted library allocation
page read and write
1033FE000
unkown
page readonly
1FD48099000
heap
page read and write
1FD480CE000
heap
page read and write
1FD59329000
trusted library allocation
page read and write
1FD48085000
heap
page read and write
1FD4D1B0000
trusted library allocation
page read and write
256D90E8000
heap
page read and write
1FD51264000
trusted library allocation
page read and write
1FD5B833000
trusted library allocation
page read and write
1FD51EC0000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD51E7C000
trusted library allocation
page read and write
1FD52CE6000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
256D9100000
heap
page read and write
1FD5DF4E000
trusted library allocation
page read and write
1FD52470000
trusted library allocation
page read and write
1FD4CABF000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4E34D000
trusted library allocation
page read and write
1FD5D16C000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD480B1000
heap
page read and write
1FD48070000
heap
page read and write
1141FA62000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
256D9158000
heap
page read and write
256D9169000
heap
page read and write
1FD48093000
heap
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD529F1000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4E2A7000
trusted library allocation
page read and write
1FD53028000
trusted library allocation
page read and write
1FD54AF0000
trusted library allocation
page read and write
1141F7B0000
heap
page read and write
14BD000
stack
page read and write
1FD48090000
heap
page read and write
1FD5D699000
heap
page read and write
1FD535CA000
trusted library allocation
page read and write
1FD52EBC000
trusted library allocation
page read and write
1FD5ABE8000
trusted library allocation
page read and write
1FD52D90000
trusted library allocation
page read and write
1FD4809C000
heap
page read and write
1FD51A6D000
trusted library allocation
page read and write
1FD53979000
trusted library allocation
page read and write
1FD54AD2000
trusted library allocation
page read and write
1FD533D3000
trusted library allocation
page read and write
1FD5159B000
trusted library allocation
page read and write
CE8000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD4FA69000
trusted library allocation
page read and write
1FD548EE000
trusted library allocation
page read and write
1FD526BF000
trusted library allocation
page read and write
1FD4E293000
trusted library allocation
page read and write
1FD54468000
trusted library allocation
page read and write
1FD5B70C000
trusted library allocation
page read and write
1FD58FAC000
trusted library allocation
page read and write
1FD4F37F000
trusted library allocation
page read and write
1FD594DF000
trusted library allocation
page read and write
1FD5D45E000
trusted library allocation
page read and write
1FD59198000
trusted library allocation
page read and write
6E4000
unkown
page readonly
1FD4CA98000
trusted library allocation
page read and write
1FD51A4B000
trusted library allocation
page read and write
256D9060000
heap
page read and write
1FD48090000
heap
page read and write
1141F720000
remote allocation
page read and write
1FD58EB3000
trusted library allocation
page read and write
1FD5D49F000
trusted library allocation
page read and write
1FD52E65000
trusted library allocation
page read and write
1FD590DF000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD526AA000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD48051000
heap
page read and write
1FD480C5000
heap
page read and write
1FD524EC000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD51A75000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD52A65000
trusted library allocation
page read and write
1FD525D8000
trusted library allocation
page read and write
CEA000
heap
page read and write
1FD527EB000
trusted library allocation
page read and write
1FD5D45C000
trusted library allocation
page read and write
1FD5B801000
trusted library allocation
page read and write
166BC681000
trusted library allocation
page read and write
1FD54897000
trusted library allocation
page read and write
1FD51AEE000
trusted library allocation
page read and write
1FD4E82C000
trusted library allocation
page read and write
1FD590FB000
trusted library allocation
page read and write
1FD545C5000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD59230000
trusted library allocation
page read and write
256D89D1000
heap
page read and write
1FD51840000
trusted library allocation
page read and write
1FD5182D000
trusted library allocation
page read and write
1FD52A34000
trusted library allocation
page read and write
1FD50D02000
heap
page read and write
1FD52FC8000
trusted library allocation
page read and write
1FD50D14000
heap
page read and write
1FD518C0000
trusted library allocation
page read and write
1FD4E969000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD52459000
trusted library allocation
page read and write
1FD52D52000
trusted library allocation
page read and write
1FD5264F000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5B786000
trusted library allocation
page read and write
1FD52DEA000
trusted library allocation
page read and write
256D907D000
heap
page read and write
1FD5930C000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
1FD53908000
trusted library allocation
page read and write
1FD5B801000
trusted library allocation
page read and write
1FD515E6000
trusted library allocation
page read and write
1FD5D5DB000
trusted library allocation
page read and write
1FD480B2000
heap
page read and write
1FD48051000
heap
page read and write
1FD5932C000
trusted library allocation
page read and write
1FD52C74000
trusted library allocation
page read and write
1FD524A7000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD480A2000
heap
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD5D439000
trusted library allocation
page read and write
1FD5D48F000
trusted library allocation
page read and write
1FD48091000
heap
page read and write
1FD52EF8000
trusted library allocation
page read and write
1FD51A82000
trusted library allocation
page read and write
256D90EB000
heap
page read and write
1FD4FADA000
trusted library allocation
page read and write
1FD51A64000
trusted library allocation
page read and write
1FD48045000
heap
page read and write
1FD5CFF8000
trusted library allocation
page read and write
1FD54AF4000
trusted library allocation
page read and write
1FD52DF6000
trusted library allocation
page read and write
166BC740000
unclassified section
page readonly
1FD50D0F000
heap
page read and write
1FD5453E000
trusted library allocation
page read and write
1FD4E2E6000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD48054000
heap
page read and write
1FD53497000
trusted library allocation
page read and write
6D2000
unkown
page readonly
1FD4E8F2000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD4FA72000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD5B67F000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD5954D000
trusted library allocation
page read and write
1FD52476000
trusted library allocation
page read and write
1FD5241B000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD48070000
heap
page read and write
1FD48070000
heap
page read and write
19B90852000
heap
page read and write
256D8403000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD52D2B000
trusted library allocation
page read and write
1FD54A57000
trusted library allocation
page read and write
1FD51AEC000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD51AD2000
trusted library allocation
page read and write
1FD58EC1000
trusted library allocation
page read and write
1FD5AF85000
trusted library allocation
page read and write
C8795FE000
unkown
page readonly
1FD51E6D000
trusted library allocation
page read and write
1FD5457F000
trusted library allocation
page read and write
1FD526FA000
trusted library allocation
page read and write
1FD535DF000
trusted library allocation
page read and write
1FD5253F000
trusted library allocation
page read and write
1FD592E9000
trusted library allocation
page read and write
1FD524A7000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
1FD54AD2000
trusted library allocation
page read and write
256D9144000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
4E715FF000
stack
page read and write
1FD526E1000
trusted library allocation
page read and write
1FD52C12000
trusted library allocation
page read and write
1FD5D19F000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD54A59000
trusted library allocation
page read and write
1FD53952000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD550C5000
trusted library allocation
page read and write
166BC65B000
trusted library allocation
page read and write
1141F7BA000
heap
page read and write
1FD4E0FD000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD59040000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4E22A000
trusted library allocation
page read and write
21DD0639000
heap
page read and write
1FD4805B000
heap
page read and write
1FD4E38F000
trusted library allocation
page read and write
1FD48098000
heap
page read and write
1FD48058000
heap
page read and write
256D9069000
heap
page read and write
1FD51530000
trusted library allocation
page read and write
1FD592BC000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD53974000
trusted library allocation
page read and write
1FD5D438000
trusted library allocation
page read and write
1FD4E381000
trusted library allocation
page read and write
1FD5B707000
trusted library allocation
page read and write
1FD51EBE000
trusted library allocation
page read and write
1FD5DF6D000
trusted library allocation
page read and write
1FD5246C000
trusted library allocation
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD50D09000
heap
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD52E78000
trusted library allocation
page read and write
166BC4B0000
heap
page read and write
1FD590F7000
trusted library allocation
page read and write
1FD54859000
trusted library allocation
page read and write
1FD4F356000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD5B6C8000
trusted library allocation
page read and write
1FD52436000
trusted library allocation
page read and write
1FD58EE3000
trusted library allocation
page read and write
1FD51EB5000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
1FD50E9B000
trusted library allocation
page read and write
1FD5AFBC000
trusted library allocation
page read and write
1FD5486D000
trusted library allocation
page read and write
1FD52A8B000
trusted library allocation
page read and write
256D8464000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5D606000
heap
page read and write
1FD480DB000
heap
page read and write
1FD4FA84000
trusted library allocation
page read and write
CEB000
heap
page read and write
1141F740000
unclassified section
page readonly
1FD48070000
heap
page read and write
1FD5240C000
trusted library allocation
page read and write
1FD51AD2000
trusted library allocation
page read and write
166BC908000
heap
page read and write
1FD545D9000
trusted library allocation
page read and write
1FD52E78000
trusted library allocation
page read and write
1FD592B6000
trusted library allocation
page read and write
ABF000
stack
page read and write
1FD5187B000
trusted library allocation
page read and write
1141FE0C000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD480D1000
heap
page read and write
1FD480A2000
heap
page read and write
1FD58EB8000
trusted library allocation
page read and write
1FD595AE000
trusted library allocation
page read and write
1FD51E89000
trusted library allocation
page read and write
256D8412000
trusted library allocation
page read and write
1FD535C4000
trusted library allocation
page read and write
1FD594D5000
trusted library allocation
page read and write
1FD5D18C000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD48063000
heap
page read and write
1FD5DDE5000
trusted library allocation
page read and write
1FD535B2000
trusted library allocation
page read and write
1FD52A65000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1141FA1B000
trusted library allocation
page read and write
1FD5AB9B000
trusted library allocation
page read and write
1FD54891000
trusted library allocation
page read and write
1FD52EFA000
trusted library allocation
page read and write
1FD52C05000
trusted library allocation
page read and write
1FD51893000
trusted library allocation
page read and write
1FD52FC5000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD5CFDF000
trusted library allocation
page read and write
1FD528B0000
trusted library allocation
page read and write
256D84C2000
trusted library allocation
page read and write
166BC330000
unclassified section
page readonly
1FD4E2AF000
trusted library allocation
page read and write
1FD594A4000
trusted library allocation
page read and write
1FD5390E000
trusted library allocation
page read and write
1FD52416000
trusted library allocation
page read and write
1FD4807E000
heap
page read and write
1FD4E946000
trusted library allocation
page read and write
256D906C000
heap
page read and write
1FD4804D000
heap
page read and write
1FD4806A000
heap
page read and write
1FD544F4000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD480D1000
heap
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD5AA8B000
trusted library allocation
page read and write
1FD5B748000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD529D5000
trusted library allocation
page read and write
1FD51EB5000
trusted library allocation
page read and write
1FD55157000
trusted library allocation
page read and write
1FD590BC000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD51ABE000
trusted library allocation
page read and write
1141F8D0000
heap
page read and write
1FD52EF4000
trusted library allocation
page read and write
256D904D000
heap
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD512BA000
trusted library allocation
page read and write
1141FA0C000
trusted library allocation
page read and write
1FD48077000
heap
page read and write
1FD54599000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD4FA74000
trusted library allocation
page read and write
1FD58EC7000
trusted library allocation
page read and write
1FD52E57000
trusted library allocation
page read and write
1FD5D16D000
trusted library allocation
page read and write
1141F73B000
remote allocation
page execute read
1FD4FACB000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD50D14000
heap
page read and write
1FD48090000
heap
page read and write
1FD480B1000
heap
page read and write
1FD480B8000
heap
page read and write
1FD480B0000
heap
page read and write
1FD51EB9000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD51AEC000
trusted library allocation
page read and write
1141FAA2000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD48090000
heap
page read and write
1FD58ED1000
trusted library allocation
page read and write
1FD50D09000
heap
page read and write
1FD51AC7000
trusted library allocation
page read and write
19B92455000
heap
page read and write
1FD4805D000
heap
page read and write
1FD4806A000
heap
page read and write
19B9086A000
heap
page read and write
1FD4807E000
heap
page read and write
1FD4E933000
trusted library allocation
page read and write
1FD535D0000
trusted library allocation
page read and write
256D90E3000
heap
page read and write
1FD531EB000
trusted library allocation
page read and write
1FD52EFC000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD526C3000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1141FC70000
unclassified section
page readonly
1141FAB2000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD52FBD000
trusted library allocation
page read and write
1FD52ECB000
trusted library allocation
page read and write
1FD51895000
trusted library allocation
page read and write
1FD58F16000
trusted library allocation
page read and write
1FD5B74D000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480B8000
heap
page read and write
1FD52633000
trusted library allocation
page read and write
1FD5D45C000
trusted library allocation
page read and write
1FD52A20000
trusted library allocation
page read and write
1FD526AD000
trusted library allocation
page read and write
1FD59255000
trusted library allocation
page read and write
1FD48051000
heap
page read and write
1FD52EC8000
trusted library allocation
page read and write
1FD5D49F000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD480BC000
heap
page read and write
1FD594EF000
trusted library allocation
page read and write
1FD51AEA000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD51578000
trusted library allocation
page read and write
1FD52D1F000
trusted library allocation
page read and write
1FD50D08000
heap
page read and write
1FD4E36E000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD5243A000
trusted library allocation
page read and write
256D90E0000
heap
page read and write
1FD48062000
heap
page read and write
1FD5512C000
trusted library allocation
page read and write
1FD51A98000
trusted library allocation
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD548DD000
trusted library allocation
page read and write
1FD54A69000
trusted library allocation
page read and write
1FD48053000
heap
page read and write
1FD52D90000
trusted library allocation
page read and write
1FD52E73000
trusted library allocation
page read and write
1FD4E08C000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD52D90000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD480D7000
heap
page read and write
1141FA76000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD524B9000
trusted library allocation
page read and write
1FD4F38C000
trusted library allocation
page read and write
1FD515A4000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1141FB20000
unclassified section
page read and write
1FD5261F000
trusted library allocation
page read and write
1FD52CFD000
trusted library allocation
page read and write
1FD5512E000
trusted library allocation
page read and write
166BC832000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD50D0F000
heap
page read and write
1FD4FAC0000
trusted library allocation
page read and write
1FD59160000
trusted library allocation
page read and write
1001FE000
unkown
page readonly
1FD52586000
trusted library allocation
page read and write
1FD52416000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD48050000
heap
page read and write
1FD48051000
heap
page read and write
1FD48069000
heap
page read and write
1FD51AD2000
trusted library allocation
page read and write
6DC000
unkown
page read and write
1FD48062000
heap
page read and write
1FD544C3000
trusted library allocation
page read and write
1FD50CE6000
heap
page read and write
1FD4FA7F000
trusted library allocation
page read and write
1FD480E4000
heap
page read and write
1FD5AA34000
trusted library allocation
page read and write
1FD591B3000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD52EFC000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD51532000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD52E44000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD480E1000
heap
page read and write
1FD48068000
heap
page read and write
1FD5D460000
trusted library allocation
page read and write
1FD5922E000
trusted library allocation
page read and write
1FD526B2000
trusted library allocation
page read and write
256D8E60000
unkown
page execute read
1FD523BE000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5AA9B000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD48090000
heap
page read and write
1FD48079000
heap
page read and write
1FD52D8E000
trusted library allocation
page read and write
1FD530CB000
trusted library allocation
page read and write
1FD526BB000
trusted library allocation
page read and write
1FD533A4000
trusted library allocation
page read and write
1FD59433000
trusted library allocation
page read and write
1FD5D1C4000
trusted library allocation
page read and write
1FD535CA000
trusted library allocation
page read and write
1FD51EB7000
trusted library allocation
page read and write
1FD535B4000
trusted library allocation
page read and write
CFE000
heap
page read and write
CC0000
heap
page read and write
1FD48062000
heap
page read and write
1FD4FAE2000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
490000
heap
page read and write
1FD4804E000
heap
page read and write
1FD4E872000
trusted library allocation
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD51A6B000
trusted library allocation
page read and write
1FD548A2000
trusted library allocation
page read and write
1FD52EFC000
trusted library allocation
page read and write
1FD58FDC000
trusted library allocation
page read and write
166BC350000
heap
page read and write
1FD52DF6000
trusted library allocation
page read and write
1FD5931C000
trusted library allocation
page read and write
1FD5240A000
trusted library allocation
page read and write
1FD59569000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5AAAF000
trusted library allocation
page read and write
19B92457000
heap
page read and write
1FD48092000
heap
page read and write
1FD4804D000
heap
page read and write
1FD52476000
trusted library allocation
page read and write
256D9001000
heap
page read and write
1FD52CF2000
trusted library allocation
page read and write
1FD5B833000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD48090000
heap
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD4D126000
trusted library allocation
page read and write
1FD480C2000
heap
page read and write
1FD52D2B000
trusted library allocation
page read and write
1FD4FA70000
trusted library allocation
page read and write
1FD5D42C000
trusted library allocation
page read and write
1FD595AD000
trusted library allocation
page read and write
1FD5265F000
trusted library allocation
page read and write
1FD4807E000
heap
page read and write
1FD4806F000
heap
page read and write
1FD5ABCF000
trusted library allocation
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD48057000
heap
page read and write
1FD59160000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD53982000
trusted library allocation
page read and write
1FD58E9C000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD52C7A000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD48070000
heap
page read and write
1FD4805C000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD52A0D000
trusted library allocation
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD527F1000
trusted library allocation
page read and write
1FD52D78000
trusted library allocation
page read and write
1FD48099000
heap
page read and write
256D906C000
heap
page read and write
1FD50D0A000
heap
page read and write
1FD54C6D000
trusted library allocation
page read and write
1FD59177000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD58FA4000
trusted library allocation
page read and write
1FD50D24000
heap
page read and write
1FD5261F000
trusted library allocation
page read and write
1FD5D1FA000
trusted library allocation
page read and write
4A0000
heap
page read and write
1FD52DC3000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD52672000
trusted library allocation
page read and write
1FD5243A000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD51558000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD52EFA000
trusted library allocation
page read and write
1FD543DC000
trusted library allocation
page read and write
1FD59167000
trusted library allocation
page read and write
1FD523FB000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD54FA2000
trusted library allocation
page read and write
1FD52DF8000
trusted library allocation
page read and write
1FD52E73000
trusted library allocation
page read and write
1FD51AB8000
trusted library allocation
page read and write
1FD58EC1000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD48054000
heap
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD59145000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD5AF39000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD51E6D000
trusted library allocation
page read and write
1FD5B806000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4FAD1000
trusted library allocation
page read and write
1FD4FA3C000
trusted library allocation
page read and write
1FD592B9000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD525B3000
trusted library allocation
page read and write
1141FA13000
trusted library allocation
page read and write
1FD4807F000
heap
page read and write
1FD48054000
heap
page read and write
1FD48038000
heap
page read and write
19B92447000
heap
page read and write
1FD48062000
heap
page read and write
1FD52463000
trusted library allocation
page read and write
1FD52A92000
trusted library allocation
page read and write
1FD4E21A000
trusted library allocation
page read and write
1FD52433000
trusted library allocation
page read and write
256D89A0000
heap
page read and write
1FD5484C000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4806F000
heap
page read and write
1FD55043000
trusted library allocation
page read and write
1FD54AF4000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD4806A000
heap
page read and write
4B4000
heap
page read and write
1FD5D4B4000
trusted library allocation
page read and write
1FD52A92000
trusted library allocation
page read and write
1FD51E58000
trusted library allocation
page read and write
1FD4FABF000
trusted library allocation
page read and write
1FD51556000
trusted library allocation
page read and write
1FD5152D000
trusted library allocation
page read and write
256D8474000
trusted library allocation
page read and write
256D90A8000
heap
page read and write
1FD48070000
heap
page read and write
1FD58F3C000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48062000
heap
page read and write
256D90E9000
heap
page read and write
1FD48062000
heap
page read and write
1FD50CE6000
heap
page read and write
1FD59505000
trusted library allocation
page read and write
1FD5D460000
trusted library allocation
page read and write
1FD593F5000
trusted library allocation
page read and write
1FD4FAF6000
trusted library allocation
page read and write
1FD5AAD5000
trusted library allocation
page read and write
1FD58EC1000
trusted library allocation
page read and write
1FD51ABE000
trusted library allocation
page read and write
1FD4E0F0000
trusted library allocation
page read and write
1FD5B857000
trusted library allocation
page read and write
256D9169000
heap
page read and write
1FD52C4B000
trusted library allocation
page read and write
13267DE000
unkown
page readonly
1FD4F37D000
trusted library allocation
page read and write
1FD5AAF4000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD52EF4000
trusted library allocation
page read and write
256D90E0000
heap
page read and write
1FD58F82000
trusted library allocation
page read and write
1FD50D02000
heap
page read and write
1FD54AD4000
trusted library allocation
page read and write
1FD52DB6000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD53281000
trusted library allocation
page read and write
166BC66E000
trusted library allocation
page read and write
1FD4D1FA000
trusted library allocation
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD545FA000
trusted library allocation
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD5262B000
trusted library allocation
page read and write
1141FAF6000
trusted library allocation
page read and write
166BC805000
trusted library allocation
page read and write
256D9169000
heap
page read and write
1FD523F0000
trusted library allocation
page read and write
1FD528CD000
trusted library allocation
page read and write
1FD51833000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD52EFC000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD48062000
heap
page read and write
1FD54AEB000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD50E69000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52E63000
trusted library allocation
page read and write
1FD52E6A000
trusted library allocation
page read and write
1FD52C4B000
trusted library allocation
page read and write
1FD52C74000
trusted library allocation
page read and write
1FD58EE3000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD4804E000
heap
page read and write
1FD539AA000
trusted library allocation
page read and write
1FD59334000
trusted library allocation
page read and write
1FD51528000
trusted library allocation
page read and write
1FD4D071000
trusted library allocation
page read and write
1FD50ECD000
trusted library allocation
page read and write
1FD5D5F6000
trusted library allocation
page read and write
1FD50D12000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD51EB5000
trusted library allocation
page read and write
1FD52EE2000
trusted library allocation
page read and write
256D9158000
heap
page read and write
1FD58EC7000
trusted library allocation
page read and write
1FD5D1ED000
trusted library allocation
page read and write
1FD58EB8000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD5D4F4000
trusted library allocation
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD590CF000
trusted library allocation
page read and write
1FD593B8000
trusted library allocation
page read and write
1FD5918B000
trusted library allocation
page read and write
1FD52C33000
trusted library allocation
page read and write
1FD51A5D000
trusted library allocation
page read and write
1FD58F5F000
trusted library allocation
page read and write
1FD4E03C000
trusted library allocation
page read and write
1FD539D3000
trusted library allocation
page read and write
1FD52EEA000
trusted library allocation
page read and write
1FD54838000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD48062000
heap
page read and write
1FD4E3F6000
trusted library allocation
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD51A90000
trusted library allocation
page read and write
256D912A000
heap
page read and write
1FD54443000
trusted library allocation
page read and write
1FD532AE000
trusted library allocation
page read and write
1FD51A27000
trusted library allocation
page read and write
1FD51E53000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD5303D000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD51A68000
trusted library allocation
page read and write
1FD5500C000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD50D02000
heap
page read and write
1FD547A8000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
256D907F000
heap
page read and write
1FD58F55000
trusted library allocation
page read and write
1FD52469000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD52DEA000
trusted library allocation
page read and write
1FD51EDC000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD5D421000
trusted library allocation
page read and write
ACF000
stack
page read and write
1FD52569000
trusted library allocation
page read and write
1FD545CF000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
1FD58FCF000
trusted library allocation
page read and write
C87AFFE000
stack
page read and write
1FD52E22000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD535D0000
trusted library allocation
page read and write
1FD4E3B0000
trusted library allocation
page read and write
1FD52ECB000
trusted library allocation
page read and write
1FD5AA59000
trusted library allocation
page read and write
1FD5D48F000
trusted library allocation
page read and write
1FD5D626000
heap
page read and write
256D90F2000
heap
page read and write
21DD080A000
trusted library allocation
page read and write
1FD51ACD000
trusted library allocation
page read and write
1FD52DBA000
trusted library allocation
page read and write
1FD4E96B000
trusted library allocation
page read and write
1FD5D671000
heap
page read and write
1FD50D03000
heap
page read and write
1FD535B0000
trusted library allocation
page read and write
1FD52D51000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD544FB000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD4D1A3000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD591B1000
trusted library allocation
page read and write
1FD5910E000
trusted library allocation
page read and write
256D82B0000
heap
page read and write
1FD5CFB6000
trusted library allocation
page read and write
1FD48051000
heap
page read and write
1FD5D1E2000
trusted library allocation
page read and write
1FD534BD000
trusted library allocation
page read and write
1FD51E7C000
trusted library allocation
page read and write
1FD535F1000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD59265000
trusted library allocation
page read and write
1FD48061000
heap
page read and write
256D80FD000
remote allocation
page execute read
1FD52D23000
trusted library allocation
page read and write
1FD4E3F8000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1141F780000
heap
page read and write
1FD5D18C000
trusted library allocation
page read and write
1FD58FB0000
trusted library allocation
page read and write
1FD4808B000
heap
page read and write
1FD4FAD6000
trusted library allocation
page read and write
1FD59336000
trusted library allocation
page read and write
256D9179000
heap
page read and write
1FD5B7A3000
trusted library allocation
page read and write
1FD48051000
heap
page read and write
1FD48090000
heap
page read and write
1FD58F32000
trusted library allocation
page read and write
1FD51AC7000
trusted library allocation
page read and write
256D8486000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD5D460000
trusted library allocation
page read and write
1FD52C7A000
trusted library allocation
page read and write
1FD524C4000
trusted library allocation
page read and write
1FD48045000
heap
page read and write
256D9177000
heap
page read and write
1FD52E1A000
trusted library allocation
page read and write
1FD5B6E5000
trusted library allocation
page read and write
1FD52A67000
trusted library allocation
page read and write
1FD5128B000
trusted library allocation
page read and write
1FD594E3000
trusted library allocation
page read and write
1FD5DD2E000
trusted library allocation
page read and write
1FD526A9000
trusted library allocation
page read and write
1FD51288000
trusted library allocation
page read and write
1FD58E9C000
trusted library allocation
page read and write
1FD5D250000
trusted library allocation
page read and write
1FD524A7000
trusted library allocation
page read and write
1FD528FD000
trusted library allocation
page read and write
1FD5D67E000
heap
page read and write
1FD4D1BE000
trusted library allocation
page read and write
CF2000
heap
page read and write
1FD4809A000
heap
page read and write
1FD50D09000
heap
page read and write
1FD58FFE000
trusted library allocation
page read and write
1FD4E962000
trusted library allocation
page read and write
1FD534CA000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD5ABEA000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD480A7000
heap
page read and write
1FD54433000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48062000
heap
page read and write
1FD50D09000
heap
page read and write
256D9159000
heap
page read and write
1FD480CE000
heap
page read and write
1FD4FA79000
trusted library allocation
page read and write
1FD530FE000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD5D506000
trusted library allocation
page read and write
1FD48050000
heap
page read and write
1FD55C02000
trusted library allocation
page read and write
1FD51AB3000
trusted library allocation
page read and write
166BC6E7000
trusted library allocation
page read and write
1FD594E9000
trusted library allocation
page read and write
1FD54599000
trusted library allocation
page read and write
1FD529C9000
trusted library allocation
page read and write
1FD58ED1000
trusted library allocation
page read and write
166BC6A8000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD54AC7000
trusted library allocation
page read and write
1FD5AF05000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5506D000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD51A82000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1141FA82000
trusted library allocation
page read and write
256D9121000
heap
page read and write
1FD5D406000
trusted library allocation
page read and write
1FD539FD000
trusted library allocation
page read and write
1FD52871000
trusted library allocation
page read and write
1FD54F84000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD51AF6000
trusted library allocation
page read and write
1141F760000
heap
page read and write
3610000
heap
page read and write
1FD5154D000
trusted library allocation
page read and write
1FD595A6000
trusted library allocation
page read and write
1FD52473000
trusted library allocation
page read and write
19B90800000
heap
page read and write
1FD54A75000
trusted library allocation
page read and write
1FD59135000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD5D133000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD58EBC000
trusted library allocation
page read and write
1FD590D2000
trusted library allocation
page read and write
1FD52A8B000
trusted library allocation
page read and write
1FD51ACD000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD539F0000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD4807A000
heap
page read and write
1FD59080000
trusted library allocation
page read and write
1FD595F5000
trusted library allocation
page read and write
1FD592E0000
trusted library allocation
page read and write
1FD5DF2F000
trusted library allocation
page read and write
1FD5D1BC000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD58E9C000
trusted library allocation
page read and write
1FD52DD6000
trusted library allocation
page read and write
1FD52D19000
trusted library allocation
page read and write
1FD4D1FA000
trusted library allocation
page read and write
1FD5949E000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
166BC7A6000
heap
page read and write
1FD52633000
trusted library allocation
page read and write
1FD5B743000
trusted library allocation
page read and write
1FD52C7A000
trusted library allocation
page read and write
256D908A000
heap
page read and write
1FD48099000
heap
page read and write
1FD4E2AC000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD59198000
trusted library allocation
page read and write
1FD52EFA000
trusted library allocation
page read and write
256D912A000
heap
page read and write
1FD5DD1E000
trusted library allocation
page read and write
1FD4E98E000
trusted library allocation
page read and write
1FD590CF000
trusted library allocation
page read and write
1FD534C4000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52EF8000
trusted library allocation
page read and write
1FD52EF7000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD52459000
trusted library allocation
page read and write
1FD52FF6000
trusted library allocation
page read and write
21DD0700000
trusted library allocation
page read and write
1FD4E9F5000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480C5000
heap
page read and write
1FD5DD34000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD5AFE6000
trusted library allocation
page read and write
1141FA5D000
trusted library allocation
page read and write
1FD51EF1000
trusted library allocation
page read and write
256D82FF000
unclassified section
page read and write
1FD4CAEF000
trusted library allocation
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD50D03000
heap
page read and write
1FD5CFC8000
trusted library allocation
page read and write
1FD52A55000
trusted library allocation
page read and write
1FD550A7000
trusted library allocation
page read and write
1FD533C9000
trusted library allocation
page read and write
1FD512AD000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
10007E000
unkown
page readonly
1FD4805C000
heap
page read and write
256D90E6000
heap
page read and write
1FD4E8C8000
trusted library allocation
page read and write
1FD58F8C000
trusted library allocation
page read and write
1FD5D1FE000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD51EA6000
trusted library allocation
page read and write
1FD4FAF9000
trusted library allocation
page read and write
1FD52E52000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD480A2000
heap
page read and write
1FD5D192000
trusted library allocation
page read and write
1FD52C53000
trusted library allocation
page read and write
1FD5245B000
trusted library allocation
page read and write
1FD5B833000
trusted library allocation
page read and write
1328A7E000
unkown
page readonly
256D908D000
heap
page read and write
1FD52EB0000
trusted library allocation
page read and write
1FD50D2A000
heap
page read and write
1FD5D292000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD48062000
heap
page read and write
1FD51EF8000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD524C4000
trusted library allocation
page read and write
1FD5ABE8000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD534F1000
trusted library allocation
page read and write
DEFDCF1000
trusted library allocation
page execute read
1141FA0E000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD523F9000
trusted library allocation
page read and write
C87B8FE000
unkown
page readonly
1FD4805B000
heap
page read and write
19B92610000
heap
page read and write
1FD480B8000
heap
page read and write
1FD52CF9000
trusted library allocation
page read and write
1FD590B1000
trusted library allocation
page read and write
1FD54AFB000
trusted library allocation
page read and write
1FD4E862000
trusted library allocation
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD524C3000
trusted library allocation
page read and write
1141F8E0000
heap
page read and write
1FD48069000
heap
page read and write
1FD5AA80000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD4805D000
heap
page read and write
1FD4FA7A000
trusted library allocation
page read and write
B3E000
stack
page read and write
1FD51EDC000
trusted library allocation
page read and write
1FD52CA8000
trusted library allocation
page read and write
1FD5243A000
trusted library allocation
page read and write
1FD5B7AC000
trusted library allocation
page read and write
1FD548F5000
trusted library allocation
page read and write
1FD5B82C000
trusted library allocation
page read and write
256D9177000
heap
page read and write
1FD50E95000
trusted library allocation
page read and write
1FD5AF31000
trusted library allocation
page read and write
1FD51A68000
trusted library allocation
page read and write
1FD58F3D000
trusted library allocation
page read and write
1FD535B4000
trusted library allocation
page read and write
1FD50E75000
trusted library allocation
page read and write
21DD0670000
heap
page read and write
1FD52DFE000
trusted library allocation
page read and write
1FD52452000
trusted library allocation
page read and write
1FD50EB8000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4E91B000
trusted library allocation
page read and write
1FD51AB2000
trusted library allocation
page read and write
1141FA00000
trusted library allocation
page read and write
256D82F0000
unclassified section
page read and write
1FD5AA52000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD480B0000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD5AAED000
trusted library allocation
page read and write
1FD51A82000
trusted library allocation
page read and write
1FD52EFA000
trusted library allocation
page read and write
1FD55007000
trusted library allocation
page read and write
1FD48075000
heap
page read and write
1FD58FB7000
trusted library allocation
page read and write
1FD51EB5000
trusted library allocation
page read and write
1FD58EF7000
trusted library allocation
page read and write
166BC603000
trusted library allocation
page read and write
1FD528CD000
trusted library allocation
page read and write
1FD592A4000
trusted library allocation
page read and write
1FD54427000
trusted library allocation
page read and write
1FD595A6000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD5239D000
trusted library allocation
page read and write
256D84E9000
trusted library allocation
page read and write
1FD480D5000
heap
page read and write
1FD48050000
heap
page read and write
1FD4E8FE000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48063000
heap
page read and write
1FD4F33D000
trusted library allocation
page read and write
1FD524A5000
trusted library allocation
page read and write
1FD52E4C000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD480A2000
heap
page read and write
1FD48094000
heap
page read and write
1FD51562000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
166BC81C000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD52A73000
trusted library allocation
page read and write
1FD5DF9E000
trusted library allocation
page read and write
1FD5B743000
trusted library allocation
page read and write
1FD4FA9F000
trusted library allocation
page read and write
1FD50ED9000
trusted library allocation
page read and write
1FD5B7A7000
trusted library allocation
page read and write
1FD51881000
trusted library allocation
page read and write
256D845F000
trusted library allocation
page read and write
256D82F2000
unclassified section
page read and write
1FD480A7000
heap
page read and write
1FD545FA000
trusted library allocation
page read and write
1FD59510000
trusted library allocation
page read and write
256D90EB000
heap
page read and write
1FD52DCA000
trusted library allocation
page read and write
1FD52442000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD591B3000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4804D000
heap
page read and write
1FD480C5000
heap
page read and write
1FD5268C000
trusted library allocation
page read and write
1FD51EB5000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD593F3000
trusted library allocation
page read and write
166BC321000
remote allocation
page execute read
1FD480A7000
heap
page read and write
1FD48090000
heap
page read and write
1FD48054000
heap
page read and write
1FD4804E000
heap
page read and write
1FD480E4000
heap
page read and write
1FD4805C000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD51E54000
trusted library allocation
page read and write
1FD529E1000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD590F9000
trusted library allocation
page read and write
1FD4FA48000
trusted library allocation
page read and write
1FD52D80000
trusted library allocation
page read and write
1FD535AE000
trusted library allocation
page read and write
1FD54F7F000
trusted library allocation
page read and write
256D90E6000
heap
page read and write
1FD58F5F000
trusted library allocation
page read and write
1141FB40000
heap
page read and write
1FD5ABCF000
trusted library allocation
page read and write
256D90FD000
heap
page read and write
1FD5918B000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD480BD000
heap
page read and write
1FD4D1B6000
trusted library allocation
page read and write
1FD480EA000
heap
page read and write
1FD5D180000
trusted library allocation
page read and write
1FD5D40F000
trusted library allocation
page read and write
1FD58EBC000
trusted library allocation
page read and write
1141FA66000
trusted library allocation
page read and write
610000
unkown
page readonly
1FD5D636000
heap
page read and write
1FD48098000
heap
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD54555000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD480C5000
heap
page read and write
1FD480B2000
heap
page read and write
1FD59541000
trusted library allocation
page read and write
1000F8000
stack
page read and write
1FD545A7000
trusted library allocation
page read and write
21DD0630000
heap
page read and write
1FD548DD000
trusted library allocation
page read and write
1FD52D15000
trusted library allocation
page read and write
1FD535DA000
trusted library allocation
page read and write
1FD4FABB000
trusted library allocation
page read and write
1FD48050000
heap
page read and write
1FD51E7C000
trusted library allocation
page read and write
1FD592E1000
trusted library allocation
page read and write
1FD5E12E000
trusted library allocation
page read and write
1FD51A64000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4F37F000
trusted library allocation
page read and write
1FD4FADA000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
166BC6C8000
trusted library allocation
page read and write
1FD5B7C5000
trusted library allocation
page read and write
1FD4E28B000
trusted library allocation
page read and write
1FD5923B000
trusted library allocation
page read and write
1FD53278000
trusted library allocation
page read and write
1FD54405000
trusted library allocation
page read and write
1FD4E33E000
trusted library allocation
page read and write
1FD4E30F000
trusted library allocation
page read and write
1FD5926C000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
256D90EB000
heap
page read and write
1FD5D4C9000
trusted library allocation
page read and write
1FD480D1000
heap
page read and write
1FD480A7000
heap
page read and write
1FD5249C000
trusted library allocation
page read and write
1FD5AA12000
trusted library allocation
page read and write
1FD52484000
trusted library allocation
page read and write
1FD5CFDF000
trusted library allocation
page read and write
1FD52572000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
19B90C90000
heap
page read and write
1FD48090000
heap
page read and write
1FD48062000
heap
page read and write
1FD51A66000
trusted library allocation
page read and write
1FD52AF4000
trusted library allocation
page read and write
1FD5D111000
trusted library allocation
page read and write
1FD59262000
trusted library allocation
page read and write
1FD51A6B000
trusted library allocation
page read and write
1FD512AE000
trusted library allocation
page read and write
1FD4F35D000
trusted library allocation
page read and write
1FD5D53B000
trusted library allocation
page read and write
1FD5926A000
trusted library allocation
page read and write
1FD51EDC000
trusted library allocation
page read and write
1FD50E91000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
100BD8000
stack
page read and write
1FD5B806000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD4804E000
heap
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480D0000
heap
page read and write
1FD5267A000
trusted library allocation
page read and write
1FD52DE8000
trusted library allocation
page read and write
1FD4FA3E000
trusted library allocation
page read and write
1FD51865000
trusted library allocation
page read and write
1FD5954D000
trusted library allocation
page read and write
1FD535F6000
trusted library allocation
page read and write
1FD535DF000
trusted library allocation
page read and write
1FD52FF6000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD52D23000
trusted library allocation
page read and write
1FD5B741000
trusted library allocation
page read and write
1FD51EF1000
trusted library allocation
page read and write
256D907D000
heap
page read and write
1FD52C68000
trusted library allocation
page read and write
1FD544C7000
trusted library allocation
page read and write
1FD51207000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD5153C000
trusted library allocation
page read and write
1FD58FE3000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD51E67000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD480CE000
heap
page read and write
1FD5913E000
trusted library allocation
page read and write
1FD4F35E000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD4F38D000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD5182D000
trusted library allocation
page read and write
1FD52E16000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD53478000
trusted library allocation
page read and write
18BE000
stack
page read and write
1FD4E27E000
trusted library allocation
page read and write
1FD4E27B000
trusted library allocation
page read and write
C87B87E000
unkown
page readonly
1FD48099000
heap
page read and write
1FD594E9000
trusted library allocation
page read and write
1FD58F12000
trusted library allocation
page read and write
1FD5AFEC000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD5184D000
trusted library allocation
page read and write
256D905C000
heap
page read and write
256D9121000
heap
page read and write
1FD480E1000
heap
page read and write
1001BE000
stack
page read and write
1FD50ED3000
trusted library allocation
page read and write
1FD51EC0000
trusted library allocation
page read and write
1FD5B705000
trusted library allocation
page read and write
1FD526FE000
trusted library allocation
page read and write
1FD51E72000
trusted library allocation
page read and write
1FD532E5000
trusted library allocation
page read and write
1FD592DC000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD539F2000
trusted library allocation
page read and write
1FD4E935000
trusted library allocation
page read and write
1FD52D2E000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD5D407000
trusted library allocation
page read and write
1FD52CEA000
trusted library allocation
page read and write
1FD48072000
heap
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD544D9000
trusted library allocation
page read and write
1FD52471000
trusted library allocation
page read and write
1FD52DCA000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD48090000
heap
page read and write
1FD52CA8000
trusted library allocation
page read and write
1FD52EDA000
trusted library allocation
page read and write
1FD4D023000
trusted library allocation
page read and write
1FD4D0FE000
trusted library allocation
page read and write
1FD4E959000
trusted library allocation
page read and write
1FD5927B000
trusted library allocation
page read and write
1FD52A22000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD52DBD000
trusted library allocation
page read and write
1FD52FA3000
trusted library allocation
page read and write
1FD53297000
trusted library allocation
page read and write
1FD52471000
trusted library allocation
page read and write
1141FA30000
trusted library allocation
page read and write
1FD539A4000
trusted library allocation
page read and write
1FD592A1000
trusted library allocation
page read and write
256D8100000
unclassified section
page readonly
1FD5D45E000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
CE2000
heap
page read and write
1FD51EC4000
trusted library allocation
page read and write
4E6FDFD000
stack
page read and write
1FD550AC000
trusted library allocation
page read and write
1FD4D18D000
trusted library allocation
page read and write
1FD52D9A000
trusted library allocation
page read and write
256D90F1000
heap
page read and write
1FD544BC000
trusted library allocation
page read and write
1FD548CB000
trusted library allocation
page read and write
1FD58F1A000
trusted library allocation
page read and write
1FD59261000
trusted library allocation
page read and write
1FD5B7A3000
trusted library allocation
page read and write
1FD52E5F000
trusted library allocation
page read and write
1FD5ABEF000
trusted library allocation
page read and write
3FBDA8003000
trusted library allocation
page read and write
1FD4E0FD000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD593CF000
trusted library allocation
page read and write
1FD50D13000
heap
page read and write
4B4000
heap
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD590A6000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD4E990000
trusted library allocation
page read and write
1FD52FBD000
trusted library allocation
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
256D842F000
trusted library allocation
page read and write
1FD529DD000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD545E2000
trusted library allocation
page read and write
1FD592BE000
trusted library allocation
page read and write
1FD4FA88000
trusted library allocation
page read and write
1FD5CFB6000
trusted library allocation
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5445B000
trusted library allocation
page read and write
1FD51E26000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD5D601000
heap
page read and write
1FD4D1C6000
trusted library allocation
page read and write
1FD5D21F000
trusted library allocation
page read and write
1FD4E863000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD591CB000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD52AF1000
trusted library allocation
page read and write
1FD4D1B6000
trusted library allocation
page read and write
1FD4E384000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD480A2000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD50EFE000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD48098000
heap
page read and write
1FD52D1F000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
166BC905000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD5240F000
trusted library allocation
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD4E2BD000
trusted library allocation
page read and write
1FD51E62000
trusted library allocation
page read and write
1FD51EAB000
trusted library allocation
page read and write
1FD5313B000
trusted library allocation
page read and write
1FD52DCA000
trusted library allocation
page read and write
1FD590DA000
trusted library allocation
page read and write
1FD480BE000
heap
page read and write
4B4000
heap
page read and write
1FD480CE000
heap
page read and write
1FD59593000
trusted library allocation
page read and write
1FD5B6A3000
trusted library allocation
page read and write
1FD5ABE8000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4E862000
trusted library allocation
page read and write
1FD4E316000
trusted library allocation
page read and write
1FD51AAA000
trusted library allocation
page read and write
1FD51875000
trusted library allocation
page read and write
1FD59436000
trusted library allocation
page read and write
256D8448000
trusted library allocation
page read and write
1FD4E3C7000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD480BD000
heap
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD4807E000
heap
page read and write
1FD51AC7000
trusted library allocation
page read and write
1FD50CE6000
heap
page read and write
1FD5D462000
trusted library allocation
page read and write
1FD4CAEF000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5959B000
trusted library allocation
page read and write
1FD4FA54000
trusted library allocation
page read and write
1FD52458000
trusted library allocation
page read and write
1FD527DF000
trusted library allocation
page read and write
1FD52452000
trusted library allocation
page read and write
1FD5D43C000
trusted library allocation
page read and write
1FD4FADA000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD590B1000
trusted library allocation
page read and write
166BC813000
trusted library allocation
page read and write
256D90E8000
heap
page read and write
1FD58FBF000
trusted library allocation
page read and write
3961000
heap
page read and write
1FD4807A000
heap
page read and write
1FD51E58000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD4805C000
heap
page read and write
1FD52FAE000
trusted library allocation
page read and write
1FD5D4B6000
trusted library allocation
page read and write
1FD4CAB3000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5B76D000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD5955E000
trusted library allocation
page read and write
1FD52E52000
trusted library allocation
page read and write
1FD52458000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
1FD5D421000
trusted library allocation
page read and write
1FD594A0000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD5488E000
trusted library allocation
page read and write
1FD52A08000
trusted library allocation
page read and write
1FD52E57000
trusted library allocation
page read and write
1FD52A09000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4806B000
heap
page read and write
1FD52E71000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD48054000
heap
page read and write
1FD4E8DA000
trusted library allocation
page read and write
1FD5255D000
trusted library allocation
page read and write
1FD480B9000
heap
page read and write
1FD545B4000
trusted library allocation
page read and write
1FD52D9C000
trusted library allocation
page read and write
256D89B0000
heap
page read and write
1FD4E8C8000
trusted library allocation
page read and write
1FD52A50000
trusted library allocation
page read and write
1FD544A4000
trusted library allocation
page read and write
1FD52DF4000
trusted library allocation
page read and write
1FD545EE000
trusted library allocation
page read and write
1FD52E78000
trusted library allocation
page read and write
1FD52E78000
trusted library allocation
page read and write
1FD53961000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD51AD7000
trusted library allocation
page read and write
1FD544E2000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD4805C000
heap
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD4809F000
heap
page read and write
1FD52A92000
trusted library allocation
page read and write
1FD58F30000
trusted library allocation
page read and write
1FD59255000
trusted library allocation
page read and write
1FD539A4000
trusted library allocation
page read and write
1FD51E89000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD51AE7000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD480C5000
heap
page read and write
1FD48045000
heap
page read and write
1FD5952E000
trusted library allocation
page read and write
2000003F000
trusted library allocation
page read and write
256D8468000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD4806D000
heap
page read and write
1FD4805B000
heap
page read and write
1FD52DF4000
trusted library allocation
page read and write
1FD4D1BE000
trusted library allocation
page read and write
1FD51EC0000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4E3F6000
trusted library allocation
page read and write
1FD52456000
trusted library allocation
page read and write
1FD545FD000
trusted library allocation
page read and write
1FD480E1000
heap
page read and write
1FD48069000
heap
page read and write
1FD48068000
heap
page read and write
1FD5B82E000
trusted library allocation
page read and write
1141FA11000
trusted library allocation
page read and write
1FD5DD16000
trusted library allocation
page read and write
1FD548F3000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480D1000
heap
page read and write
1FD50D5D000
heap
page read and write
1FD53949000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4FA9F000
trusted library allocation
page read and write
1FD52E5D000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
256D9060000
heap
page read and write
1FD51E81000
trusted library allocation
page read and write
1FD5959B000
trusted library allocation
page read and write
1FD5264F000
trusted library allocation
page read and write
1FD54FE5000
trusted library allocation
page read and write
1FD5946C000
trusted library allocation
page read and write
1FD4FA72000
trusted library allocation
page read and write
1FD5911D000
trusted library allocation
page read and write
1FD52E32000
trusted library allocation
page read and write
1FD48050000
heap
page read and write
1FD591CB000
trusted library allocation
page read and write
1FD4E389000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD4E8CD000
trusted library allocation
page read and write
1FD5B7AC000
trusted library allocation
page read and write
1FD4D196000
trusted library allocation
page read and write
1FD4FABF000
trusted library allocation
page read and write
1FD52ECA000
trusted library allocation
page read and write
1FD535DF000
trusted library allocation
page read and write
256D82D0000
heap
page readonly
1FD4FAD6000
trusted library allocation
page read and write
1FD53000000
trusted library allocation
page read and write
1FD52D73000
trusted library allocation
page read and write
1FD52A32000
trusted library allocation
page read and write
1FD52873000
trusted library allocation
page read and write
1FD5DD25000
trusted library allocation
page read and write
1FD4FAB3000
trusted library allocation
page read and write
1FD523FD000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD480B8000
heap
page read and write
1FD590A6000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD48054000
heap
page read and write
1FD4805C000
heap
page read and write
1FD48062000
heap
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD54AD6000
trusted library allocation
page read and write
1FD53271000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD50D5B000
heap
page read and write
1FD4FA74000
trusted library allocation
page read and write
1FD52DB6000
trusted library allocation
page read and write
1141FB10000
heap
page readonly
1FD50D24000
heap
page read and write
1FD48091000
heap
page read and write
1FD480B3000
heap
page read and write
1FD535B0000
trusted library allocation
page read and write
1FD515B3000
trusted library allocation
page read and write
1FD5B7E4000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD531F2000
trusted library allocation
page read and write
1FD5911E000
trusted library allocation
page read and write
1FD480B7000
heap
page read and write
1FD512E3000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD51AC7000
trusted library allocation
page read and write
1FD5AA5D000
trusted library allocation
page read and write
1FD59338000
trusted library allocation
page read and write
1FD52A55000
trusted library allocation
page read and write
1FD595F3000
trusted library allocation
page read and write
1FD5240C000
trusted library allocation
page read and write
1FD4D113000
trusted library allocation
page read and write
1FD4E375000
trusted library allocation
page read and write
1FD524C4000
trusted library allocation
page read and write
1FD5CFD3000
trusted library allocation
page read and write
1FD52E1A000
trusted library allocation
page read and write
1FD5D421000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
5CE000
stack
page read and write
1FD51EB5000
trusted library allocation
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD54AD2000
trusted library allocation
page read and write
1FD52DF6000
trusted library allocation
page read and write
C50000
heap
page read and write
1FD480C5000
heap
page read and write
1FD524DA000
trusted library allocation
page read and write
166BC393000
heap
page read and write
19B9086A000
heap
page read and write
1FD48090000
heap
page read and write
1FD5D601000
heap
page read and write
1FD480E1000
heap
page read and write
1FD52DDB000
trusted library allocation
page read and write
1FD512C2000
trusted library allocation
page read and write
1FD4FA68000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD54415000
trusted library allocation
page read and write
1FD5D579000
trusted library allocation
page read and write
256D8400000
trusted library allocation
page read and write
1FD59263000
trusted library allocation
page read and write
1FD51AAF000
trusted library allocation
page read and write
166BC6CB000
trusted library allocation
page read and write
1FD532FA000
trusted library allocation
page read and write
1FD52AB3000
trusted library allocation
page read and write
1FD5183B000
trusted library allocation
page read and write
1FD4E3EB000
trusted library allocation
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD48062000
heap
page read and write
1FD51A66000
trusted library allocation
page read and write
1FD539AA000
trusted library allocation
page read and write
1FD52ACF000
trusted library allocation
page read and write
1FD594DF000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD595A6000
trusted library allocation
page read and write
1FD535EB000
trusted library allocation
page read and write
AEF000
stack
page read and write
1FD5ABFB000
trusted library allocation
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD59567000
trusted library allocation
page read and write
256D90FD000
heap
page read and write
1FD5D5FD000
trusted library allocation
page read and write
1FD5326E000
trusted library allocation
page read and write
1FD4E07C000
trusted library allocation
page read and write
1FD52D8B000
trusted library allocation
page read and write
1FD592CA000
trusted library allocation
page read and write
1FD539FD000
trusted library allocation
page read and write
1FD59019000
trusted library allocation
page read and write
1FD52A22000
trusted library allocation
page read and write
1FD52DED000
trusted library allocation
page read and write
1FD544D2000
trusted library allocation
page read and write
1FD51EAB000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD48090000
heap
page read and write
21DD0610000
heap
page read and write
1FD480D8000
heap
page read and write
1FD4FA79000
trusted library allocation
page read and write
1FD51250000
trusted library allocation
page read and write
1FD5B786000
trusted library allocation
page read and write
1FD4E969000
trusted library allocation
page read and write
1FD5AA79000
trusted library allocation
page read and write
1FD51A7B000
trusted library allocation
page read and write
1FD480DA000
heap
page read and write
1FD52A8B000
trusted library allocation
page read and write
1FD51A7F000
trusted library allocation
page read and write
1FD548AE000
trusted library allocation
page read and write
1FD51A92000
trusted library allocation
page read and write
1FD590AD000
trusted library allocation
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD5242B000
trusted library allocation
page read and write
1FD535CD000
trusted library allocation
page read and write
1FD5DFCE000
trusted library allocation
page read and write
1FD4E9F5000
trusted library allocation
page read and write
256D9169000
heap
page read and write
1FD52DA3000
trusted library allocation
page read and write
1FD590D8000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD58EB3000
trusted library allocation
page read and write
1FD4FA3C000
trusted library allocation
page read and write
1FD5CFAC000
trusted library allocation
page read and write
1FD4E038000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD59567000
trusted library allocation
page read and write
1FD52625000
trusted library allocation
page read and write
1FD4E435000
trusted library allocation
page read and write
1FD5D1C8000
trusted library allocation
page read and write
1FD5929C000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD480C5000
heap
page read and write
1FD58F00000
trusted library allocation
page read and write
1FD480D0000
heap
page read and write
1FD4E0C0000
trusted library allocation
page read and write
1FD5264F000
trusted library allocation
page read and write
1FD4F3A6000
trusted library allocation
page read and write
10003D000
stack
page read and write
1FD4FA7C000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5D190000
trusted library allocation
page read and write
1FD5488E000
trusted library allocation
page read and write
1FD50E3E000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD5D1D1000
trusted library allocation
page read and write
1FD526E5000
trusted library allocation
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD523AA000
trusted library allocation
page read and write
1FD5D42C000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD48071000
heap
page read and write
1FD52469000
trusted library allocation
page read and write
1FD480B2000
heap
page read and write
1FD4D1BE000
trusted library allocation
page read and write
1FD52DC3000
trusted library allocation
page read and write
1FD5454B000
trusted library allocation
page read and write
1FD5E13F000
trusted library allocation
page read and write
1FD4F35A000
trusted library allocation
page read and write
1FD52D9C000
trusted library allocation
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD4E3EB000
trusted library allocation
page read and write
1FD5B687000
trusted library allocation
page read and write
1FD52EDA000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD4805C000
heap
page read and write
1FD51531000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD52EB8000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD5D5AF000
trusted library allocation
page read and write
1FD52DD4000
trusted library allocation
page read and write
1FD52407000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD5B707000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD58EF3000
trusted library allocation
page read and write
1FD526A7000
trusted library allocation
page read and write
1FD53343000
trusted library allocation
page read and write
CEE000
heap
page read and write
1FD5D48F000
trusted library allocation
page read and write
1FD4D11E000
trusted library allocation
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD5B7A3000
trusted library allocation
page read and write
CFE000
heap
page read and write
1FD54A75000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD594E7000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5D173000
trusted library allocation
page read and write
1FD518FB000
trusted library allocation
page read and write
256D815A000
heap
page read and write
1FD52460000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD480D9000
heap
page read and write
1FD51EC0000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD48090000
heap
page read and write
1FD524F9000
trusted library allocation
page read and write
1FD48079000
heap
page read and write
1FD52490000
trusted library allocation
page read and write
1141FB44000
heap
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD52DF6000
trusted library allocation
page read and write
1FD4E9F5000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD4E8D5000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD52A42000
trusted library allocation
page read and write
1FD51AC2000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD5D118000
trusted library allocation
page read and write
1FD5909F000
trusted library allocation
page read and write
1FD524EC000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DD6000
trusted library allocation
page read and write
C87B83C000
stack
page read and write
1FD52AD1000
trusted library allocation
page read and write
1FD51E7F000
trusted library allocation
page read and write
1FD590F9000
trusted library allocation
page read and write
1FD4E34B000
trusted library allocation
page read and write
1FD52D91000
trusted library allocation
page read and write
1FD5DF6D000
trusted library allocation
page read and write
1329A7E000
unkown
page readonly
256D8AB0000
trusted library allocation
page read and write
10447E000
unkown
page readonly
1FD51E6A000
trusted library allocation
page read and write
1FD5485E000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
166BC900000
heap
page read and write
1FD5B6E5000
trusted library allocation
page read and write
1FD4F37B000
trusted library allocation
page read and write
1FD5455B000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5ABED000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
4E705FE000
stack
page read and write
1FD52E3A000
trusted library allocation
page read and write
1FD5926A000
trusted library allocation
page read and write
1FD480D1000
heap
page read and write
1FD593CD000
trusted library allocation
page read and write
1FD52D71000
trusted library allocation
page read and write
1FD524DA000
trusted library allocation
page read and write
1FD52DBD000
trusted library allocation
page read and write
2810BFF000
stack
page read and write
256D9060000
heap
page read and write
1FD5459D000
trusted library allocation
page read and write
166BC600000
trusted library allocation
page read and write
1FD4FAAA000
trusted library allocation
page read and write
1FD4E3DF000
trusted library allocation
page read and write
1FD5B743000
trusted library allocation
page read and write
1FD51AC2000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4806F000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
1FD4807C000
heap
page read and write
1FD5D5E2000
trusted library allocation
page read and write
256D8481000
trusted library allocation
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD480A7000
heap
page read and write
1FD4F38C000
trusted library allocation
page read and write
1FD591B1000
trusted library allocation
page read and write
1FD51EB7000
trusted library allocation
page read and write
1FD5E13F000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480A2000
heap
page read and write
1FD48045000
heap
page read and write
1141FAB6000
trusted library allocation
page read and write
19B92440000
heap
page read and write
1FD48090000
heap
page read and write
1FD5D287000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD5959B000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD51EDE000
trusted library allocation
page read and write
1FD52FA3000
trusted library allocation
page read and write
1FD54AD2000
trusted library allocation
page read and write
1FD52D2D000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD4806A000
heap
page read and write
1FD52DF4000
trusted library allocation
page read and write
1FD545FD000
trusted library allocation
page read and write
1FD51A52000
trusted library allocation
page read and write
256D8461000
trusted library allocation
page read and write
1FD548D1000
trusted library allocation
page read and write
1FD52DDC000
trusted library allocation
page read and write
1FD59567000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD48062000
heap
page read and write
1FD5DD84000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
166BC815000
trusted library allocation
page read and write
1FD4D11B000
trusted library allocation
page read and write
1FD48034000
heap
page read and write
1FD52A6A000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD532E5000
trusted library allocation
page read and write
1FD5D5F6000
trusted library allocation
page read and write
1FD52EEA000
trusted library allocation
page read and write
1FD535F1000
trusted library allocation
page read and write
1FD51898000
trusted library allocation
page read and write
1FD58FD1000
trusted library allocation
page read and write
1FD59024000
trusted library allocation
page read and write
1FD53366000
trusted library allocation
page read and write
1FD51C16000
trusted library allocation
page read and write
1FD5254C000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD525D5000
trusted library allocation
page read and write
1FD4E8CA000
trusted library allocation
page read and write
1FD5B82C000
trusted library allocation
page read and write
1FD53256000
trusted library allocation
page read and write
1FD5DD9C000
trusted library allocation
page read and write
256D8150000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD59267000
trusted library allocation
page read and write
1FD52D42000
trusted library allocation
page read and write
256D8E30000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD5DFF1000
trusted library allocation
page read and write
1FD5D1F3000
trusted library allocation
page read and write
1FD544E7000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
13271D8000
stack
page read and write
1FD48062000
heap
page read and write
1FD518A0000
trusted library allocation
page read and write
1FD50D03000
heap
page read and write
256D84BC000
trusted library allocation
page read and write
1FD51E2A000
trusted library allocation
page read and write
19B90868000
heap
page read and write
1FD4805C000
heap
page read and write
1FD50E2A000
trusted library allocation
page read and write
1FD5267A000
trusted library allocation
page read and write
1FD4E0E0000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5AAC9000
trusted library allocation
page read and write
1FD5245B000
trusted library allocation
page read and write
1CBE000
stack
page read and write
1FD48069000
heap
page read and write
1FD5B6C8000
trusted library allocation
page read and write
1FD58F77000
trusted library allocation
page read and write
1FD5ABEA000
trusted library allocation
page read and write
1FD591B3000
trusted library allocation
page read and write
1FD51EDE000
trusted library allocation
page read and write
1141FA70000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD52597000
trusted library allocation
page read and write
1FD548D1000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52408000
trusted library allocation
page read and write
1FD52E44000
trusted library allocation
page read and write
1FD59125000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD48062000
heap
page read and write
1FD52494000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD50E38000
trusted library allocation
page read and write
1FD5D435000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD5D26E000
trusted library allocation
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD548A1000
trusted library allocation
page read and write
166BC800000
trusted library allocation
page read and write
1FD53457000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD51AB2000
trusted library allocation
page read and write
1FD51A7D000
trusted library allocation
page read and write
1FD50D02000
heap
page read and write
1FD4D17E000
trusted library allocation
page read and write
4E6F5FA000
stack
page read and write
1FD51AEF000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD5B74D000
trusted library allocation
page read and write
1FD52D96000
trusted library allocation
page read and write
1FD4E99D000
trusted library allocation
page read and write
1FD4E064000
trusted library allocation
page read and write
1FD4E39D000
trusted library allocation
page read and write
1FD5D435000
trusted library allocation
page read and write
1FD4E3B3000
trusted library allocation
page read and write
1FD52CA8000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD4FADA000
trusted library allocation
page read and write
1FD58F39000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD4807F000
heap
page read and write
1FD480A2000
heap
page read and write
1FD54CF1000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
1FD52CF9000
trusted library allocation
page read and write
1FD51EBC000
trusted library allocation
page read and write
1FD5ABA2000
trusted library allocation
page read and write
166BC80C000
trusted library allocation
page read and write
1FD53452000
trusted library allocation
page read and write
1FD51E8C000
trusted library allocation
page read and write
1FD48053000
heap
page read and write
1FD5B857000
trusted library allocation
page read and write
1FD51250000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
256D90EB000
heap
page read and write
1FD4FADA000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
256D9158000
heap
page read and write
1FD518CA000
trusted library allocation
page read and write
1FD58EC1000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
166BC647000
trusted library allocation
page read and write
1FD591CB000
trusted library allocation
page read and write
1FD4E232000
trusted library allocation
page read and write
1FD543AF000
trusted library allocation
page read and write
1FD5B741000
trusted library allocation
page read and write
1FD53384000
trusted library allocation
page read and write
1FD547C2000
trusted library allocation
page read and write
1FD4E35C000
trusted library allocation
page read and write
1FD5185B000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD5CF92000
trusted library allocation
page read and write
1FD59263000
trusted library allocation
page read and write
1FD5AAA9000
trusted library allocation
page read and write
1FD524A7000
trusted library allocation
page read and write
1FD5D1B7000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4807A000
heap
page read and write
1FD48090000
heap
page read and write
1FD5D1C4000
trusted library allocation
page read and write
2811BFE000
stack
page read and write
1FD51EDE000
trusted library allocation
page read and write
1FD590A7000
trusted library allocation
page read and write
1FD59523000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4E0D2000
trusted library allocation
page read and write
256D9144000
heap
page read and write
1FD50D11000
heap
page read and write
1FD512A4000
trusted library allocation
page read and write
1FD52D19000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD51AC2000
trusted library allocation
page read and write
1FD51A24000
trusted library allocation
page read and write
1FD51A7F000
trusted library allocation
page read and write
1FD50D24000
heap
page read and write
1FD5242C000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD52EDA000
trusted library allocation
page read and write
1FD5D63F000
heap
page read and write
1FD4805C000
heap
page read and write
1FD544BE000
trusted library allocation
page read and write
1FD51E67000
trusted library allocation
page read and write
1FD5B6A2000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5D45E000
trusted library allocation
page read and write
1FD54AD0000
trusted library allocation
page read and write
1FD4E8D6000
trusted library allocation
page read and write
1FD5ACF3000
trusted library allocation
page read and write
1FD52DDB000
trusted library allocation
page read and write
1FD4E438000
trusted library allocation
page read and write
1FD52A67000
trusted library allocation
page read and write
1FD5D547000
trusted library allocation
page read and write
1FD5C302000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD5B857000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD5E137000
trusted library allocation
page read and write
1FD53965000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD526FA000
trusted library allocation
page read and write
1FD4E2DE000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD50E2E000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD5DF84000
trusted library allocation
page read and write
1FD5AB9D000
trusted library allocation
page read and write
1FD51A82000
trusted library allocation
page read and write
1FD5D671000
heap
page read and write
1FD48095000
heap
page read and write
132675E000
unkown
page readonly
1FD52D33000
trusted library allocation
page read and write
1FD526BD000
trusted library allocation
page read and write
1FD5DF84000
trusted library allocation
page read and write
1FD5D566000
trusted library allocation
page read and write
1FD51E72000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD51A95000
trusted library allocation
page read and write
1FD50E6F000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD50EAD000
trusted library allocation
page read and write
1FD524B9000
trusted library allocation
page read and write
1FD544B6000
trusted library allocation
page read and write
1FD51AF6000
trusted library allocation
page read and write
1FD51826000
trusted library allocation
page read and write
166BC470000
heap
page read and write
1FD535CD000
trusted library allocation
page read and write
19B9245B000
heap
page read and write
256D9060000
heap
page read and write
1FD52D3A000
trusted library allocation
page read and write
1FD4D18D000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD51ED5000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD59458000
trusted library allocation
page read and write
256D90FD000
heap
page read and write
1FD48051000
heap
page read and write
1FD53082000
trusted library allocation
page read and write
256D8260000
heap
page read and write
1FD4805B000
heap
page read and write
1FD526E5000
trusted library allocation
page read and write
1FD539AF000
trusted library allocation
page read and write
1FD51A92000
trusted library allocation
page read and write
1FD52E5F000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD4E3B9000
trusted library allocation
page read and write
1FD52DDB000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48051000
heap
page read and write
1FD58EB3000
trusted library allocation
page read and write
1FD591B1000
trusted library allocation
page read and write
1FD4D175000
trusted library allocation
page read and write
1FD48079000
heap
page read and write
1FD480B1000
heap
page read and write
1FD48054000
heap
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD58F85000
trusted library allocation
page read and write
1141FA24000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD52DF0000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD5287A000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
256D9060000
heap
page read and write
256D8AC0000
heap
page read and write
1FD48090000
heap
page read and write
1FD5C3A8000
trusted library allocation
page read and write
1FD524DA000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD52562000
trusted library allocation
page read and write
1FD52DF6000
trusted library allocation
page read and write
1FD592C5000
trusted library allocation
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD480E1000
heap
page read and write
1FD52EEA000
trusted library allocation
page read and write
1141F6C0000
unclassified section
page readonly
1FD5AA0B000
trusted library allocation
page read and write
1FD54ACF000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
CE2000
heap
page read and write
1FD5D2C3000
trusted library allocation
page read and write
1FD592F5000
trusted library allocation
page read and write
1FD58ECD000
trusted library allocation
page read and write
256D9144000
heap
page read and write
1FD5AF43000
trusted library allocation
page read and write
256D90F1000
heap
page read and write
1FD590FB000
trusted library allocation
page read and write
1FD48091000
heap
page read and write
1FD592FC000
trusted library allocation
page read and write
1FD5D1D5000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
256D90E9000
heap
page read and write
1141FA8F000
trusted library allocation
page read and write
1FD58FCF000
trusted library allocation
page read and write
1FD5901F000
trusted library allocation
page read and write
1FD531F2000
trusted library allocation
page read and write
1FD480B9000
heap
page read and write
1FD52FCA000
trusted library allocation
page read and write
1FD52C13000
trusted library allocation
page read and write
1FD51E7C000
trusted library allocation
page read and write
1FD5D1C1000
trusted library allocation
page read and write
1FD526B8000
trusted library allocation
page read and write
1FD515A6000
trusted library allocation
page read and write
166BC310000
remote allocation
page read and write
1FD59485000
trusted library allocation
page read and write
1FD5D10C000
trusted library allocation
page read and write
1FD51ED9000
trusted library allocation
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
21DD0520000
heap
page read and write
1FD5D2CB000
trusted library allocation
page read and write
1FD58F66000
trusted library allocation
page read and write
1FD53961000
trusted library allocation
page read and write
1FD51EB7000
trusted library allocation
page read and write
1FD52D6B000
trusted library allocation
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD592C5000
trusted library allocation
page read and write
19B92442000
heap
page read and write
1FD5AF11000
trusted library allocation
page read and write
1FD52452000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4806F000
heap
page read and write
1FD59198000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD48068000
heap
page read and write
1FD52630000
trusted library allocation
page read and write
1FD4E0AA000
trusted library allocation
page read and write
1FD5189D000
trusted library allocation
page read and write
256D9069000
heap
page read and write
1FD48062000
heap
page read and write
1FD535D2000
trusted library allocation
page read and write
1FD52430000
trusted library allocation
page read and write
1FD58F64000
trusted library allocation
page read and write
1FD50CE6000
heap
page read and write
1FD4E225000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD48093000
heap
page read and write
1FD4D1C6000
trusted library allocation
page read and write
1FD52A50000
trusted library allocation
page read and write
1FD4E834000
trusted library allocation
page read and write
1FD54FC8000
trusted library allocation
page read and write
1FD52678000
trusted library allocation
page read and write
256D82B4000
heap
page read and write
CFE000
heap
page read and write
1FD545C5000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD52DE5000
trusted library allocation
page read and write
1FD54A59000
trusted library allocation
page read and write
1FD4E921000
trusted library allocation
page read and write
1FD480B2000
heap
page read and write
1FD4E29D000
trusted library allocation
page read and write
1FD5D4BD000
trusted library allocation
page read and write
256D8120000
heap
page read and write
1FD545EE000
trusted library allocation
page read and write
1FD52D9C000
trusted library allocation
page read and write
1FD4807A000
heap
page read and write
1FD4E209000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD480EA000
heap
page read and write
1FD52678000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD50CE8000
heap
page read and write
1FD51A66000
trusted library allocation
page read and write
1FD512C1000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD51E53000
trusted library allocation
page read and write
1FD52436000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD52469000
trusted library allocation
page read and write
1FD5D192000
trusted library allocation
page read and write
1FD591B1000
trusted library allocation
page read and write
1FD5D435000
trusted library allocation
page read and write
1141F900000
trusted library allocation
page read and write
1FD52C14000
trusted library allocation
page read and write
1FD54893000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
4E70DFE000
stack
page read and write
1FD52C3B000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD4FA94000
trusted library allocation
page read and write
1FD5442B000
trusted library allocation
page read and write
1FD590FB000
trusted library allocation
page read and write
1FD5953A000
trusted library allocation
page read and write
1FD58FFE000
trusted library allocation
page read and write
1FD532AE000
trusted library allocation
page read and write
1FD52C39000
trusted library allocation
page read and write
1FD5958F000
trusted library allocation
page read and write
1FD592F4000
trusted library allocation
page read and write
1FD4E2E6000
trusted library allocation
page read and write
1FD4806C000
heap
page read and write
1FD51AAF000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48068000
heap
page read and write
1FD52628000
trusted library allocation
page read and write
1FD4F37D000
trusted library allocation
page read and write
1FD52EF4000
trusted library allocation
page read and write
1FD4FADF000
trusted library allocation
page read and write
1FD4F33E000
trusted library allocation
page read and write
1FD5D2C5000
trusted library allocation
page read and write
1FD58FD9000
trusted library allocation
page read and write
1FD524EC000
trusted library allocation
page read and write
1FD51EDE000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD52C2B000
trusted library allocation
page read and write
611000
unkown
page execute read
1FD590FB000
trusted library allocation
page read and write
1FD53940000
trusted library allocation
page read and write
1FD5392A000
trusted library allocation
page read and write
1FD5185C000
trusted library allocation
page read and write
1141FB50000
heap
page read and write
1FD48068000
heap
page read and write
166BC696000
trusted library allocation
page read and write
1FD52E71000
trusted library allocation
page read and write
1FD4E3B0000
trusted library allocation
page read and write
1FD5286F000
trusted library allocation
page read and write
1FD5D1B4000
trusted library allocation
page read and write
1FD52CF6000
trusted library allocation
page read and write
1FD5DD2E000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4E3C7000
trusted library allocation
page read and write
1FD52672000
trusted library allocation
page read and write
1FD595AD000
trusted library allocation
page read and write
1FD4F39F000
trusted library allocation
page read and write
1FD51E6A000
trusted library allocation
page read and write
1FD52DE4000
trusted library allocation
page read and write
1FD59080000
trusted library allocation
page read and write
1FD5958F000
trusted library allocation
page read and write
166BC700000
heap
page readonly
1FD480C5000
heap
page read and write
1FD523F6000
trusted library allocation
page read and write
1FD58F3F000
trusted library allocation
page read and write
1FD4E34D000
trusted library allocation
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD480BD000
heap
page read and write
1FD5AAB4000
trusted library allocation
page read and write
1FD550E4000
trusted library allocation
page read and write
1FD5D593000
trusted library allocation
page read and write
6DC000
unkown
page write copy
1FD52625000
trusted library allocation
page read and write
1FD4E422000
trusted library allocation
page read and write
1FD5486A000
trusted library allocation
page read and write
1FD594D7000
trusted library allocation
page read and write
19B90868000
heap
page read and write
1FD52E63000
trusted library allocation
page read and write
4B0000
heap
page read and write
1FD480D1000
heap
page read and write
1FD48090000
heap
page read and write
1FD51A92000
trusted library allocation
page read and write
1FD5AA63000
trusted library allocation
page read and write
1FD52D36000
trusted library allocation
page read and write
1FD51ADF000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD52D33000
trusted library allocation
page read and write
1FD48053000
heap
page read and write
1FD5D1FB000
trusted library allocation
page read and write
256D90E3000
heap
page read and write
1FD480B2000
heap
page read and write
1FD52A2F000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD54468000
trusted library allocation
page read and write
256D840C000
trusted library allocation
page read and write
1FD530E6000
trusted library allocation
page read and write
1FD5D1E7000
trusted library allocation
page read and write
1FD5ABA5000
trusted library allocation
page read and write
1FD535E1000
trusted library allocation
page read and write
1FD5243D000
trusted library allocation
page read and write
1FD59567000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD48054000
heap
page read and write
1FD592F4000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD592FC000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD480B1000
heap
page read and write
256D9177000
heap
page read and write
1FD48062000
heap
page read and write
21DD09B0000
heap
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD5305E000
trusted library allocation
page read and write
1FD4E8BA000
trusted library allocation
page read and write
1FD593C3000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52A67000
trusted library allocation
page read and write
1FD51A7D000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD52452000
trusted library allocation
page read and write
1FD532E5000
trusted library allocation
page read and write
1FD51596000
trusted library allocation
page read and write
1FD51E92000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD52452000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
10343E000
stack
page read and write
CE6000
heap
page read and write
1FD48068000
heap
page read and write
C87B7FE000
unkown
page readonly
1FD592E1000
trusted library allocation
page read and write
19B92448000
heap
page read and write
3E839D41E000
trusted library allocation
page read and write
1FD4D1FA000
trusted library allocation
page read and write
1FD51EC4000
trusted library allocation
page read and write
1FD590A6000
trusted library allocation
page read and write
1FD58FD9000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4809F000
heap
page read and write
1FD48075000
heap
page read and write
1FD5129B000
trusted library allocation
page read and write
1FD5B786000
trusted library allocation
page read and write
1FD5919C000
trusted library allocation
page read and write
1FD52D96000
trusted library allocation
page read and write
1FD4E806000
trusted library allocation
page read and write
1FD59190000
trusted library allocation
page read and write
1FD548D8000
trusted library allocation
page read and write
1FD55101000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD52D94000
trusted library allocation
page read and write
19B90861000
heap
page read and write
1FD54899000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD592D0000
trusted library allocation
page read and write
1FD52FBF000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD48079000
heap
page read and write
1FD55133000
trusted library allocation
page read and write
1FD590FB000
trusted library allocation
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD51A95000
trusted library allocation
page read and write
1FD53600000
trusted library allocation
page read and write
1FD4E8D6000
trusted library allocation
page read and write
1FD4E962000
trusted library allocation
page read and write
1FD52E71000
trusted library allocation
page read and write
1FD4809C000
heap
page read and write
1FD5D1B0000
trusted library allocation
page read and write
1FD51EF1000
trusted library allocation
page read and write
1FD52EF7000
trusted library allocation
page read and write
1FD58F18000
trusted library allocation
page read and write
1FD4CA81000
trusted library allocation
page read and write
1FD524F9000
trusted library allocation
page read and write
256D906C000
heap
page read and write
1FD48058000
heap
page read and write
1FD52E5D000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD5D601000
heap
page read and write
1FD59125000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD480A2000
heap
page read and write
1FD5A800000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD52D90000
trusted library allocation
page read and write
256D90EB000
heap
page read and write
1FD52E6C000
trusted library allocation
page read and write
1FD593CA000
trusted library allocation
page read and write
256D909C000
heap
page read and write
1FD5153D000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD5ABEA000
trusted library allocation
page read and write
1FD480B9000
heap
page read and write
1FD4FACF000
trusted library allocation
page read and write
1FD53974000
trusted library allocation
page read and write
1FD58ECD000
trusted library allocation
page read and write
1FD4F358000
trusted library allocation
page read and write
1FD54842000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1141FE00000
trusted library allocation
page read and write
1FD59177000
trusted library allocation
page read and write
6AC000
unkown
page readonly
1FD58EC7000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD594D0000
trusted library allocation
page read and write
166BC370000
heap
page read and write
1FD4805B000
heap
page read and write
1FD5153C000
trusted library allocation
page read and write
1FD52E75000
trusted library allocation
page read and write
1FD58F64000
trusted library allocation
page read and write
256D9060000
heap
page read and write
1FD51594000
trusted library allocation
page read and write
1FD59558000
trusted library allocation
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD545CD000
trusted library allocation
page read and write
1FD52E5F000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
C879FD8000
stack
page read and write
1FD4806F000
heap
page read and write
1FD5D645000
heap
page read and write
1FD480C5000
heap
page read and write
103C7E000
stack
page read and write
1FD480D8000
heap
page read and write
101BFE000
stack
page read and write
1FD523C6000
trusted library allocation
page read and write
1FD5ABDE000
trusted library allocation
page read and write
1FD5302C000
trusted library allocation
page read and write
1FD52C19000
trusted library allocation
page read and write
1FD52D1A000
trusted library allocation
page read and write
1FD52E52000
trusted library allocation
page read and write
1FD480B2000
heap
page read and write
256D90F1000
heap
page read and write
1FD51AD2000
trusted library allocation
page read and write
1FD5919C000
trusted library allocation
page read and write
1FD52E16000
trusted library allocation
page read and write
1FD54897000
trusted library allocation
page read and write
1FD5D17E000
trusted library allocation
page read and write
1FD52DC9000
trusted library allocation
page read and write
1FD5C500000
trusted library allocation
page read and write
1FD51AA6000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD480E1000
heap
page read and write
1FD59569000
trusted library allocation
page read and write
1FD518F3000
trusted library allocation
page read and write
256D9177000
heap
page read and write
1FD5AFE6000
trusted library allocation
page read and write
1FD52494000
trusted library allocation
page read and write
256D905C000
heap
page read and write
1FD480A2000
heap
page read and write
1FD48090000
heap
page read and write
256D8300000
trusted library allocation
page read and write
1FD4FAC7000
trusted library allocation
page read and write
1FD51EF3000
trusted library allocation
page read and write
1141FA79000
trusted library allocation
page read and write
1FD4FA4A000
trusted library allocation
page read and write
1FD535A1000
trusted library allocation
page read and write
1FD50CFF000
heap
page read and write
1FD480B8000
heap
page read and write
1FD58F6B000
trusted library allocation
page read and write
1FD51AEA000
trusted library allocation
page read and write
1FD4E931000
trusted library allocation
page read and write
1FD50E63000
trusted library allocation
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD5D5A1000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4805D000
heap
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD48079000
heap
page read and write
1FD48090000
heap
page read and write
1FD48050000
heap
page read and write
1FD5B82E000
trusted library allocation
page read and write
1FD5D446000
trusted library allocation
page read and write
1FD5B76D000
trusted library allocation
page read and write
1FD59167000
trusted library allocation
page read and write
1FD50E7B000
trusted library allocation
page read and write
1FD4FAFD000
trusted library allocation
page read and write
1FD59147000
trusted library allocation
page read and write
1FD4809A000
heap
page read and write
256D90EB000
heap
page read and write
1FD48062000
heap
page read and write
1FD5398C000
trusted library allocation
page read and write
1FD480D1000
heap
page read and write
1FD52461000
trusted library allocation
page read and write
1FD52473000
trusted library allocation
page read and write
166BC6A3000
trusted library allocation
page read and write
1FD4E962000
trusted library allocation
page read and write
1FD59569000
trusted library allocation
page read and write
166BC673000
trusted library allocation
page read and write
1FD4807F000
heap
page read and write
166BC62E000
trusted library allocation
page read and write
1FD51A7F000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD4FACB000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
256D9144000
heap
page read and write
256D8090000
unclassified section
page readonly
1FD54CCE000
trusted library allocation
page read and write
256D913B000
heap
page read and write
1FD48062000
heap
page read and write
1FD4805C000
heap
page read and write
1FD527E4000
trusted library allocation
page read and write
1FD4E963000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD592AE000
trusted library allocation
page read and write
1FD5D2CF000
trusted library allocation
page read and write
1FD5D524000
trusted library allocation
page read and write
1FD52686000
trusted library allocation
page read and write
1FD52546000
trusted library allocation
page read and write
1FD48093000
heap
page read and write
1FD51AAF000
trusted library allocation
page read and write
1FD52670000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD4E2B8000
trusted library allocation
page read and write
1FD5B686000
trusted library allocation
page read and write
1FD523CD000
trusted library allocation
page read and write
1141FA19000
trusted library allocation
page read and write
1FD51AC2000
trusted library allocation
page read and write
CED000
heap
page read and write
166BC2B0000
unclassified section
page readonly
1FD51AAF000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD590D3000
trusted library allocation
page read and write
1FD52FD4000
trusted library allocation
page read and write
1FD5D1EA000
trusted library allocation
page read and write
1FD55005000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD4805C000
heap
page read and write
1FD48090000
heap
page read and write
1FD4806F000
heap
page read and write
1FD51E7F000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD480C5000
heap
page read and write
1FD480D7000
heap
page read and write
1FD52DEA000
trusted library allocation
page read and write
1FD5952F000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52DD0000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD480D1000
heap
page read and write
1FD54AF0000
trusted library allocation
page read and write
1FD5262E000
trusted library allocation
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD523B7000
trusted library allocation
page read and write
1FD5349F000
trusted library allocation
page read and write
1FD48095000
heap
page read and write
1FD51AB2000
trusted library allocation
page read and write
1FD594D9000
trusted library allocation
page read and write
1FD4E833000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5B7C5000
trusted library allocation
page read and write
1FD53979000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD48090000
heap
page read and write
1141FB70000
heap
page read and write
1FD480D9000
heap
page read and write
1FD535D0000
trusted library allocation
page read and write
1FD50D13000
heap
page read and write
1FD48041000
heap
page read and write
1FD48096000
heap
page read and write
1FD4805C000
heap
page read and write
1FD592D3000
trusted library allocation
page read and write
1FD4E3EB000
trusted library allocation
page read and write
256D8F07000
trusted library allocation
page read and write
1FD4FA9C000
trusted library allocation
page read and write
1FD48075000
heap
page read and write
1FD52494000
trusted library allocation
page read and write
1FD535CD000
trusted library allocation
page read and write
1FD52494000
trusted library allocation
page read and write
1FD548F8000
trusted library allocation
page read and write
1FD52411000
trusted library allocation
page read and write
1FD5D24E000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD58F66000
trusted library allocation
page read and write
1FD51A6B000
trusted library allocation
page read and write
166BC6B7000
trusted library allocation
page read and write
1FD52494000
trusted library allocation
page read and write
1FD4807F000
heap
page read and write
1FD4805B000
heap
page read and write
1FD515E4000
trusted library allocation
page read and write
1FD50D0D000
heap
page read and write
256D9158000
heap
page read and write
1FD52E52000
trusted library allocation
page read and write
1FD5CF92000
trusted library allocation
page read and write
166BC390000
heap
page read and write
166BC2A0000
unclassified section
page readonly
1FD54865000
trusted library allocation
page read and write
1FD5457F000
trusted library allocation
page read and write
1FD52EF7000
trusted library allocation
page read and write
1FD545EE000
trusted library allocation
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD4F384000
trusted library allocation
page read and write
166BC47A000
heap
page read and write
1FD48054000
heap
page read and write
1FD5D439000
trusted library allocation
page read and write
19B9084D000
heap
page read and write
1FD52633000
trusted library allocation
page read and write
1FD52ECB000
trusted library allocation
page read and write
1FD545B4000
trusted library allocation
page read and write
1FD4807F000
heap
page read and write
1FD5D442000
trusted library allocation
page read and write
1FD51E89000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD5B705000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
256D9158000
heap
page read and write
1FD52D4E000
trusted library allocation
page read and write
1FD52D6E000
trusted library allocation
page read and write
1FD5D2CD000
trusted library allocation
page read and write
1FD5AAD2000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD532E8000
trusted library allocation
page read and write
1FD52735000
trusted library allocation
page read and write
1FD53600000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD59569000
trusted library allocation
page read and write
1FD52408000
trusted library allocation
page read and write
1FD52533000
trusted library allocation
page read and write
1FD54AC7000
trusted library allocation
page read and write
1FD52D26000
trusted library allocation
page read and write
1FD5D6E1000
heap
page read and write
1FD594AA000
trusted library allocation
page read and write
1FD48098000
heap
page read and write
1FD544DD000
trusted library allocation
page read and write
1FD5AFFB000
trusted library allocation
page read and write
1FD594A2000
trusted library allocation
page read and write
1FD52EFA000
trusted library allocation
page read and write
1FD5D2FE000
trusted library allocation
page read and write
1FD5930F000
trusted library allocation
page read and write
1FD5D5FB000
trusted library allocation
page read and write
1FD52D40000
trusted library allocation
page read and write
1FD5D5F6000
trusted library allocation
page read and write
1FD5AF88000
trusted library allocation
page read and write
1FD524F9000
trusted library allocation
page read and write
1FD5ABC6000
trusted library allocation
page read and write
1FD52EEA000
trusted library allocation
page read and write
1FD480BC000
heap
page read and write
1FD48062000
heap
page read and write
1FD48084000
heap
page read and write
1FD52A92000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD50CE7000
heap
page read and write
4E6F5FF000
stack
page read and write
1FD50D5D000
heap
page read and write
1FD51EBE000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD5D223000
trusted library allocation
page read and write
1FD52FF0000
trusted library allocation
page read and write
1FD48072000
heap
page read and write
1FD532FA000
trusted library allocation
page read and write
1FD48034000
heap
page read and write
C87C8FE000
unkown
page readonly
1FD5D689000
heap
page read and write
1FD48058000
heap
page read and write
1FD5D262000
trusted library allocation
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD52D36000
trusted library allocation
page read and write
1FD52FFB000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
166BC720000
heap
page read and write
1FD4CADF000
trusted library allocation
page read and write
1FD5B70C000
trusted library allocation
page read and write
19B90868000
heap
page read and write
1FD4F3CF000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD51844000
trusted library allocation
page read and write
1FD5D1B7000
trusted library allocation
page read and write
1FD54439000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4FA94000
trusted library allocation
page read and write
1FD5B67B000
trusted library allocation
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD4FA70000
trusted library allocation
page read and write
166BC83C000
trusted library allocation
page read and write
1FD52637000
trusted library allocation
page read and write
166BC820000
trusted library allocation
page read and write
1FD4E998000
trusted library allocation
page read and write
1FD5D19D000
trusted library allocation
page read and write
1FD51EDC000
trusted library allocation
page read and write
1FD50D10000
heap
page read and write
1FD518CE000
trusted library allocation
page read and write
1FD4E833000
trusted library allocation
page read and write
1FD548A1000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD5448E000
trusted library allocation
page read and write
1FD54557000
trusted library allocation
page read and write
1FD535A1000
trusted library allocation
page read and write
1FD592D3000
trusted library allocation
page read and write
1FD52FF0000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD51EDE000
trusted library allocation
page read and write
1FD592E4000
trusted library allocation
page read and write
1FD5398C000
trusted library allocation
page read and write
1FD58EF3000
trusted library allocation
page read and write
1FD58EF3000
trusted library allocation
page read and write
1FD51E49000
trusted library allocation
page read and write
1FD4E04A000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD54AFD000
trusted library allocation
page read and write
1FD54F7B000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD5B806000
trusted library allocation
page read and write
256D8080000
unclassified section
page readonly
1FD5D190000
trusted library allocation
page read and write
1FD545CD000
trusted library allocation
page read and write
1FD59700000
trusted library allocation
page read and write
166BC7A0000
heap
page read and write
1FD5D24C000
trusted library allocation
page read and write
1FD58F94000
trusted library allocation
page read and write
1FD52C0B000
trusted library allocation
page read and write
1FD526A7000
trusted library allocation
page read and write
1FD51A7D000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD51555000
trusted library allocation
page read and write
1FD5D55E000
trusted library allocation
page read and write
1FD53244000
trusted library allocation
page read and write
1FD52576000
trusted library allocation
page read and write
1FD525EE000
trusted library allocation
page read and write
19B9086A000
heap
page read and write
1FD535DC000
trusted library allocation
page read and write
1FD4807F000
heap
page read and write
1FD4E20D000
trusted library allocation
page read and write
1FD524B9000
trusted library allocation
page read and write
166BC819000
trusted library allocation
page read and write
1FD52E1A000
trusted library allocation
page read and write
1FD5D418000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD50D02000
heap
page read and write
1FD4E2AE000
trusted library allocation
page read and write
1FD52D71000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
256D8960000
trusted library section
page readonly
4B4000
heap
page read and write
1FD532AE000
trusted library allocation
page read and write
1FD4E37F000
trusted library allocation
page read and write
1FD4E946000
trusted library allocation
page read and write
1FD4CAA6000
trusted library allocation
page read and write
1FD52AEB000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD4804E000
heap
page read and write
1FD48069000
heap
page read and write
1FD535DA000
trusted library allocation
page read and write
256D9177000
heap
page read and write
4B4000
heap
page read and write
1FD5268A000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
166BC623000
trusted library allocation
page read and write
1FD52ECB000
trusted library allocation
page read and write
1FD523F6000
trusted library allocation
page read and write
1FD51EBE000
trusted library allocation
page read and write
1FD480E1000
heap
page read and write
1FD48062000
heap
page read and write
1FD4806F000
heap
page read and write
1FD532FA000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD51EC4000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5125B000
trusted library allocation
page read and write
1FD5AD80000
trusted library allocation
page read and write
1FD50CE9000
heap
page read and write
1FD52EDA000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
19B9244C000
heap
page read and write
1FD54552000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD480E4000
heap
page read and write
1FD5929C000
trusted library allocation
page read and write
1FD50D0D000
heap
page read and write
1FD4FAFD000
trusted library allocation
page read and write
1FD4E829000
trusted library allocation
page read and write
1FD51A59000
trusted library allocation
page read and write
166BC500000
trusted library allocation
page read and write
1FD5B7E4000
trusted library allocation
page read and write
1FD52562000
trusted library allocation
page read and write
1FD4D166000
trusted library allocation
page read and write
1FD480A2000
heap
page read and write
1FD48037000
heap
page read and write
1FD4805C000
heap
page read and write
1141FA49000
trusted library allocation
page read and write
1FD54AEB000
trusted library allocation
page read and write
1FD52E75000
trusted library allocation
page read and write
1FD51A68000
trusted library allocation
page read and write
1FD4E36A000
trusted library allocation
page read and write
1FD5287A000
trusted library allocation
page read and write
1FD52CF5000
trusted library allocation
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD5E12A000
trusted library allocation
page read and write
1FD48045000
heap
page read and write
1FD52A55000
trusted library allocation
page read and write
1FD58EE3000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD480B0000
heap
page read and write
19B907E0000
heap
page read and write
1FD4805C000
heap
page read and write
1FD525DD000
trusted library allocation
page read and write
1FD5ACDD000
trusted library allocation
page read and write
1FD5245F000
trusted library allocation
page read and write
256D8F00000
trusted library allocation
page read and write
1FD5DF9E000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD53037000
trusted library allocation
page read and write
1FD54895000
trusted library allocation
page read and write
1FD54C84000
trusted library allocation
page read and write
1FD592E1000
trusted library allocation
page read and write
1FD5903B000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD5245F000
trusted library allocation
page read and write
1FD4E217000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4FA9C000
trusted library allocation
page read and write
1FD527F1000
trusted library allocation
page read and write
1FD50D09000
heap
page read and write
1FD52E67000
trusted library allocation
page read and write
1FD531D9000
trusted library allocation
page read and write
1FD5243A000
trusted library allocation
page read and write
1FD5D2D1000
trusted library allocation
page read and write
1FD52C0B000
trusted library allocation
page read and write
1FD4D1B6000
trusted library allocation
page read and write
1FD5D64D000
heap
page read and write
1141FADB000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4805C000
heap
page read and write
1FD5254C000
trusted library allocation
page read and write
1FD51EBE000
trusted library allocation
page read and write
1FD525FD000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD590AF000
trusted library allocation
page read and write
256D90E0000
heap
page read and write
1FD58EF7000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD51A7F000
trusted library allocation
page read and write
1FD5D59B000
trusted library allocation
page read and write
1FD52D36000
trusted library allocation
page read and write
1FD52D78000
trusted library allocation
page read and write
1FD52ECB000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD5D4B6000
trusted library allocation
page read and write
1FD52E5F000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD5ABCF000
trusted library allocation
page read and write
1FD58EBC000
trusted library allocation
page read and write
1FD5D601000
heap
page read and write
1FD4D02F000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
256D8280000
heap
page read and write
1FD48093000
heap
page read and write
4B4000
heap
page read and write
1FD480B0000
heap
page read and write
1FD52DD4000
trusted library allocation
page read and write
1FD51855000
trusted library allocation
page read and write
1FD5AF48000
trusted library allocation
page read and write
1FD50D5D000
heap
page read and write
1FD4D1AB000
trusted library allocation
page read and write
256D90F1000
heap
page read and write
1FD50D5D000
heap
page read and write
1FD52EEA000
trusted library allocation
page read and write
1FD5927F000
trusted library allocation
page read and write
1FD5D43C000
trusted library allocation
page read and write
132679E000
stack
page read and write
1FD4E87A000
trusted library allocation
page read and write
1FD51A9D000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD5CFD3000
trusted library allocation
page read and write
1FD59222000
trusted library allocation
page read and write
1FD4E8CD000
trusted library allocation
page read and write
1FD53287000
trusted library allocation
page read and write
1141FA03000
trusted library allocation
page read and write
1FD52DF4000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD52D82000
trusted library allocation
page read and write
1FD5D662000
heap
page read and write
1FD52E65000
trusted library allocation
page read and write
1FD54448000
trusted library allocation
page read and write
1FD54859000
trusted library allocation
page read and write
1FD54891000
trusted library allocation
page read and write
1FD48094000
heap
page read and write
1FD48058000
heap
page read and write
1FD48054000
heap
page read and write
1FD4806F000
heap
page read and write
1FD48063000
heap
page read and write
1FD51A75000
trusted library allocation
page read and write
1FD5D4FE000
trusted library allocation
page read and write
1FD5240C000
trusted library allocation
page read and write
102BFE000
stack
page read and write
1FD50D10000
heap
page read and write
1FD5CFC8000
trusted library allocation
page read and write
1FD524A5000
trusted library allocation
page read and write
1FD5B6C8000
trusted library allocation
page read and write
1FD4F320000
trusted library allocation
page read and write
1FD48073000
heap
page read and write
1FD59085000
trusted library allocation
page read and write
19B90A00000
trusted library allocation
page read and write
1FD52A73000
trusted library allocation
page read and write
1FD5159B000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD50D14000
heap
page read and write
1FD48051000
heap
page read and write
1FD48062000
heap
page read and write
1FD51A2A000
trusted library allocation
page read and write
1FD4804E000
heap
page read and write
1FD4F3A6000
trusted library allocation
page read and write
1FD51577000
trusted library allocation
page read and write
1FD54A69000
trusted library allocation
page read and write
1FD5504D000
trusted library allocation
page read and write
60E000
stack
page read and write
1FD594DA000
trusted library allocation
page read and write
1FD5DD25000
trusted library allocation
page read and write
1FD512E3000
trusted library allocation
page read and write
1FD53295000
trusted library allocation
page read and write
1FD51ACA000
trusted library allocation
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD51A7D000
trusted library allocation
page read and write
1FD523D2000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD526B8000
trusted library allocation
page read and write
1FD52A65000
trusted library allocation
page read and write
1FD4D126000
trusted library allocation
page read and write
19B9244D000
heap
page read and write
1FD4804E000
heap
page read and write
1FD52EF7000
trusted library allocation
page read and write
1FD54AD6000
trusted library allocation
page read and write
1FD52494000
trusted library allocation
page read and write
1FD51A7B000
trusted library allocation
page read and write
1FD480B3000
heap
page read and write
1FD50D11000
heap
page read and write
1FD58F55000
trusted library allocation
page read and write
1FD50D24000
heap
page read and write
1FD4E3F6000
trusted library allocation
page read and write
256D846F000
trusted library allocation
page read and write
1FD52D97000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1141FA5F000
trusted library allocation
page read and write
1FD55463000
trusted library allocation
page read and write
1FD524F9000
trusted library allocation
page read and write
1FD50E6D000
trusted library allocation
page read and write
1FD54AD6000
trusted library allocation
page read and write
1FD526FA000
trusted library allocation
page read and write
1FD518A0000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD480A7000
heap
page read and write
1FD48099000
heap
page read and write
1FD51ECB000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD59596000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD48062000
heap
page read and write
1FD4806F000
heap
page read and write
1FD58FF7000
trusted library allocation
page read and write
1FD51A31000
trusted library allocation
page read and write
21DD0807000
trusted library allocation
page read and write
4B4000
heap
page read and write
1FD52DE8000
trusted library allocation
page read and write
610000
unkown
page readonly
1FD480BC000
heap
page read and write
1FD51536000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD58FE8000
trusted library allocation
page read and write
1FD52DD6000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD4FA94000
trusted library allocation
page read and write
1FD54549000
trusted library allocation
page read and write
1FD594D9000
trusted library allocation
page read and write
1FD48069000
heap
page read and write
1FD480B8000
heap
page read and write
1FD51833000
trusted library allocation
page read and write
1FD50E00000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD59177000
trusted library allocation
page read and write
1FD51A6D000
trusted library allocation
page read and write
1FD4E2B5000
trusted library allocation
page read and write
1FD4804D000
heap
page read and write
1FD52473000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD52D36000
trusted library allocation
page read and write
1FD5D5A8000
trusted library allocation
page read and write
1FD590A9000
trusted library allocation
page read and write
1FD5AFEC000
trusted library allocation
page read and write
1FD5E118000
trusted library allocation
page read and write
1FD5924E000
trusted library allocation
page read and write
1FD5E11D000
trusted library allocation
page read and write
1FD547B9000
trusted library allocation
page read and write
1FD480A7000
heap
page read and write
1FD48098000
heap
page read and write
1FD59447000
trusted library allocation
page read and write
1FD51E67000
trusted library allocation
page read and write
1FD526A9000
trusted library allocation
page read and write
1FD5B82C000
trusted library allocation
page read and write
256D8E40000
unkown
page execute read
1FD5D231000
trusted library allocation
page read and write
CFE000
heap
page read and write
1FD515AC000
trusted library allocation
page read and write
256D84CE000
trusted library allocation
page read and write
1FD52DD0000
trusted library allocation
page read and write
1FD52FC8000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
1FD50D5D000
heap
page read and write
C20000
heap
page read and write
1FD58F85000
trusted library allocation
page read and write
1FD52DCA000
trusted library allocation
page read and write
1FD523D2000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD480CE000
heap
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD5D4C0000
trusted library allocation
page read and write
1FD4E957000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
256D9064000
heap
page read and write
1FD51ACC000
trusted library allocation
page read and write
4E71DFF000
stack
page read and write
19B907C0000
heap
page read and write
1FD48075000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD591B3000
trusted library allocation
page read and write
1FD480B1000
heap
page read and write
1FD52D8E000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD480A7000
heap
page read and write
1FD480A7000
heap
page read and write
1FD58F09000
trusted library allocation
page read and write
1FD5D4B6000
trusted library allocation
page read and write
1FD52A65000
trusted library allocation
page read and write
1FD52EF8000
trusted library allocation
page read and write
1FD54559000
trusted library allocation
page read and write
1FD526BB000
trusted library allocation
page read and write
1FD4E916000
trusted library allocation
page read and write
1FD53065000
trusted library allocation
page read and write
1FD52473000
trusted library allocation
page read and write
256D9177000
heap
page read and write
19B92443000
heap
page read and write
1FD524A5000
trusted library allocation
page read and write
1FD51E86000
trusted library allocation
page read and write
1FD52678000
trusted library allocation
page read and write
1FD52D80000
trusted library allocation
page read and write
1FD524B1000
trusted library allocation
page read and write
1FD59228000
trusted library allocation
page read and write
1FD4806C000
heap
page read and write
1FD515B2000
trusted library allocation
page read and write
1FD4FA9C000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD4FABF000
trusted library allocation
page read and write
2810BFC000
stack
page read and write
1FD55483000
trusted library allocation
page read and write
1FD5D1F2000
trusted library allocation
page read and write
1FD51AC0000
trusted library allocation
page read and write
1FD5D59E000
trusted library allocation
page read and write
1FD52E57000
trusted library allocation
page read and write
1FD58F1F000
trusted library allocation
page read and write
1FD51EAE000
trusted library allocation
page read and write
1FD5D579000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD58FCD000
trusted library allocation
page read and write
1FD52A67000
trusted library allocation
page read and write
1FD52471000
trusted library allocation
page read and write
1FD480C5000
heap
page read and write
1FD48069000
heap
page read and write
1FD54AFC000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD593C3000
trusted library allocation
page read and write
1FD5263F000
trusted library allocation
page read and write
1FD48054000
heap
page read and write
1FD4E0D9000
trusted library allocation
page read and write
1FD5D2DD000
trusted library allocation
page read and write
1FD5B801000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD48062000
heap
page read and write
1FD50D07000
heap
page read and write
1FD52D99000
trusted library allocation
page read and write
1FD52EF4000
trusted library allocation
page read and write
256D9069000
heap
page read and write
256D845C000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD48054000
heap
page read and write
1FD59243000
trusted library allocation
page read and write
1FD523FB000
trusted library allocation
page read and write
1FD4D0FB000
trusted library allocation
page read and write
1FD51A8C000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD52E57000
trusted library allocation
page read and write
1FD51E7C000
trusted library allocation
page read and write
1FD5B748000
trusted library allocation
page read and write
1FD58F41000
trusted library allocation
page read and write
1FD50E9D000
trusted library allocation
page read and write
1FD52E13000
trusted library allocation
page read and write
1FD48058000
heap
page read and write
1FD594F1000
trusted library allocation
page read and write
1FD4805C000
heap
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD518F7000
trusted library allocation
page read and write
1FD48070000
heap
page read and write
1FD480B3000
heap
page read and write
43A000
stack
page read and write
1FD51E99000
trusted library allocation
page read and write
1FD480D3000
heap
page read and write
1FD480E1000
heap
page read and write
1FD50D24000
heap
page read and write
1FD51A7F000
trusted library allocation
page read and write
1FD51A4B000
trusted library allocation
page read and write
1FD480B8000
heap
page read and write
1FD4D118000
trusted library allocation
page read and write
1FD480CE000
heap
page read and write
256D90F1000
heap
page read and write
1FD525E0000
trusted library allocation
page read and write
1FD5D5FB000
trusted library allocation
page read and write
1FD58E78000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
21DD0800000
trusted library allocation
page read and write
1FD52A34000
trusted library allocation
page read and write
6E0000
unkown
page write copy
1FD51A97000
trusted library allocation
page read and write
1FD52D94000
trusted library allocation
page read and write
1FD50CD6000
heap
page read and write
1FD4806F000
heap
page read and write
1FD58ED1000
trusted library allocation
page read and write
1FD51AC2000
trusted library allocation
page read and write
1FD4E91E000
trusted library allocation
page read and write
132927E000
stack
page read and write
1FD48071000
heap
page read and write
1FD59255000
trusted library allocation
page read and write
1FD4E82C000
trusted library allocation
page read and write
1FD5D518000
trusted library allocation
page read and write
1FD4E85A000
trusted library allocation
page read and write
1FD54899000
trusted library allocation
page read and write
1FD4806A000
heap
page read and write
1141F8D3000
heap
page read and write
1FD4E07C000
trusted library allocation
page read and write
1FD4E9D0000
trusted library allocation
page read and write
19B90B07000
trusted library allocation
page read and write
1FD4806F000
heap
page read and write
1FD480C5000
heap
page read and write
1328A3E000
stack
page read and write
1FD5B7A7000
trusted library allocation
page read and write
1FD526FA000
trusted library allocation
page read and write
1FD52D8E000
trusted library allocation
page read and write
1FD592AB000
trusted library allocation
page read and write
1FD5336D000
trusted library allocation
page read and write
1FD5D266000
trusted library allocation
page read and write
1FD51EE3000
trusted library allocation
page read and write
1FD5AA9B000
trusted library allocation
page read and write
1FD4805B000
heap
page read and write
1FD4E3B9000
trusted library allocation
page read and write
1FD4FA81000
trusted library allocation
page read and write
1FD480B0000
heap
page read and write
1FD5AAC4000
trusted library allocation
page read and write
1FD52A19000
trusted library allocation
page read and write
1FD52DFC000
trusted library allocation
page read and write
1FD52FBF000
trusted library allocation
page read and write
1FD51EDE000
trusted library allocation
page read and write
1FD48068000
heap
page read and write
1FD4809A000
heap
page read and write
1FD52D9C000
trusted library allocation
page read and write
1FD4E232000
trusted library allocation
page read and write
1FD50D02000
heap
page read and write
1FD50D13000
heap
page read and write
1FD5D18E000
trusted library allocation
page read and write
1FD5D1A1000
trusted library allocation
page read and write
13281FE000
stack
page read and write
1FD5916A000
trusted library allocation
page read and write
1FD5D1DF000
trusted library allocation
page read and write
1FD48098000
heap
page read and write
1FD595A6000
trusted library allocation
page read and write
1FD5926D000
trusted library allocation
page read and write
1FD5919E000
trusted library allocation
page read and write
1FD58EC7000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD480D7000
heap
page read and write
1FD5ABE8000
trusted library allocation
page read and write
1FD5240E000
trusted library allocation
page read and write
1FD480DB000
heap
page read and write
1FD4FA3E000
trusted library allocation
page read and write
1FD48063000
heap
page read and write
1FD4806F000
heap
page read and write
256D8E42000
unkown
page execute read
1FD52DF6000
trusted library allocation
page read and write
1FD5D19B000
trusted library allocation
page read and write
1FD592EB000
trusted library allocation
page read and write
1FD4FAE0000
trusted library allocation
page read and write
1FD5D1D4000
trusted library allocation
page read and write
1FD48062000
heap
page read and write
1FD48077000
heap
page read and write
1141FB2F000
unclassified section
page read and write
1FD480BD000
heap
page read and write
1FD51EC4000
trusted library allocation
page read and write
3961000
heap
page read and write
1FD5909F000
trusted library allocation
page read and write
1FD54ACD000
trusted library allocation
page read and write
1FD4806B000
heap
page read and write
1FD51EF1000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD5CFAC000
trusted library allocation
page read and write
1FD48090000
heap
page read and write
1FD51AD5000
trusted library allocation
page read and write
1FD51E6D000
trusted library allocation
page read and write
1FD480D7000
heap
page read and write
1FD52CEE000
trusted library allocation
page read and write
256D9169000
heap
page read and write
1FD48079000
heap
page read and write
1FD52D23000
trusted library allocation
page read and write
CF2000
heap
page read and write
1FD48096000
heap
page read and write
1FD480EA000
heap
page read and write
1FD51EF1000
trusted library allocation
page read and write
1FD48073000
heap
page read and write
1FD51AB2000
trusted library allocation
page read and write
There are 3911 hidden memdumps, click here to show them.