IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_fbedf706-f8e1-4f72-9a4c-7751ca0d5ff3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_fbedf706-f8e1-4f72-9a4c-7751ca0d5ff3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\4886cf35-f13b-436c-8f88-460001a6b0a3 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\4886cf35-f13b-436c-8f88-460001a6b0a3.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2108 -prefMapHandle 2100 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c4daa9b-a1d0-49df-b833-68d02750cc18} 1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19fe596e910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4284 -parentBuildID 20230927232528 -prefsHandle 2992 -prefMapHandle 4356 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d56eb04c-7f94-47f5-8980-12dd9ad4c01d} 1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19ff7e6e710 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5040 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4964 -prefMapHandle 4984 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1de7083f-c361-4a27-8ccf-42b49249a843} 1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19ff7537310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://detectportal.firefox.com8
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://shavar.services.mozilla.comP
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.80
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.110
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
52.222.236.80
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.186.110
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
19FF73AC000
trusted library allocation
page read and write
19FF59AC000
trusted library allocation
page read and write
1A00132B000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF56A9000
heap
page read and write
19FF91A9000
trusted library allocation
page read and write
19FF6ABF000
trusted library allocation
page read and write
19FFDC88000
trusted library allocation
page read and write
19FF6D8B000
trusted library allocation
page read and write
19FF1623000
trusted library allocation
page read and write
19FF82CF000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FFFC68000
trusted library allocation
page read and write
19FF91F6000
trusted library allocation
page read and write
19FF532A000
trusted library allocation
page read and write
19FF767B000
trusted library allocation
page read and write
1A001DD3000
trusted library allocation
page read and write
19FF7460000
trusted library allocation
page read and write
19FFDC61000
trusted library allocation
page read and write
19FF564F000
heap
page read and write
19FEC6AD000
heap
page read and write
19FEC692000
heap
page read and write
19FFF340000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
96CCB9C000
trusted library allocation
page execute read
19FEC6EE000
heap
page read and write
19FF796A000
trusted library allocation
page read and write
19FF2C58000
trusted library allocation
page read and write
19FF8652000
trusted library allocation
page read and write
19FFDD56000
trusted library allocation
page read and write
19FEC6B5000
heap
page read and write
19FF74BE000
trusted library allocation
page read and write
19FF6C88000
trusted library allocation
page read and write
19FF8282000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF6C6D000
trusted library allocation
page read and write
19FF5733000
trusted library allocation
page read and write
19FF77A3000
trusted library allocation
page read and write
19FF77E2000
trusted library allocation
page read and write
19FF595C000
trusted library allocation
page read and write
19FF5BD4000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FF6FB0000
trusted library allocation
page read and write
19FF8539000
trusted library allocation
page read and write
19FF79B8000
trusted library allocation
page read and write
19FF6C29000
trusted library allocation
page read and write
19FFDCF2000
trusted library allocation
page read and write
19FF2C58000
trusted library allocation
page read and write
EA44BFE000
stack
page read and write
1A0003E3000
heap
page read and write
EA41BFB000
stack
page read and write
19FFDBCF000
trusted library allocation
page read and write
19FF2C58000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FEC69C000
heap
page read and write
19FEC6EF000
heap
page read and write
19FF766B000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
33EC1FE000
stack
page read and write
19FFB6FB000
trusted library allocation
page read and write
1A0021AC000
trusted library allocation
page read and write
19FF769F000
trusted library allocation
page read and write
19FF85DC000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FF5BAF000
trusted library allocation
page read and write
19FF5390000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FFDCE6000
trusted library allocation
page read and write
19FFDB55000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF78B4000
trusted library allocation
page read and write
1A562FE0000
heap
page read and write
19FF567F000
heap
page read and write
19FEC69A000
heap
page read and write
19FFFC7E000
trusted library allocation
page read and write
1A562FE3000
heap
page read and write
19FFDB76000
trusted library allocation
page read and write
19FEC6AB000
heap
page read and write
19FF7800000
trusted library allocation
page read and write
19FFFC1D000
trusted library allocation
page read and write
19FF75C1000
trusted library allocation
page read and write
19FF1782000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FF9B92000
trusted library allocation
page read and write
19FF5EFA000
trusted library allocation
page read and write
19FF2A65000
trusted library allocation
page read and write
19FF58B9000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FEC6C8000
heap
page read and write
19FF819D000
trusted library allocation
page read and write
19FF2CBA000
trusted library allocation
page read and write
1985220C000
trusted library allocation
page read and write
19FF6C40000
trusted library allocation
page read and write
19851FF0000
heap
page read and write
19FF7129000
trusted library allocation
page read and write
19FF2C8B000
trusted library allocation
page read and write
19FF77D8000
trusted library allocation
page read and write
19FFF394000
trusted library allocation
page read and write
19FF5698000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF2A73000
trusted library allocation
page read and write
19FFF88A000
trusted library allocation
page read and write
19FF5BAF000
trusted library allocation
page read and write
1FF4230A000
trusted library allocation
page read and write
19FF2C54000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF532A000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF50D3000
trusted library allocation
page read and write
19FF5B65000
trusted library allocation
page read and write
19FF74E9000
trusted library allocation
page read and write
19FF6C6D000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FF5E85000
trusted library allocation
page read and write
19FF53DE000
trusted library allocation
page read and write
19FF28A8000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
19FFDC77000
trusted library allocation
page read and write
19FF6B7A000
trusted library allocation
page read and write
19FFFC82000
trusted library allocation
page read and write
19FFDAC1000
trusted library allocation
page read and write
19FFFA00000
trusted library allocation
page read and write
19FFD94C000
trusted library allocation
page read and write
19FF7AD8000
trusted library allocation
page read and write
19FF2A93000
trusted library allocation
page read and write
19FF6D96000
trusted library allocation
page read and write
19FF71B4000
trusted library allocation
page read and write
19FF63F2000
trusted library allocation
page read and write
19FF825C000
trusted library allocation
page read and write
214A1EBD000
heap
page read and write
19FF5693000
heap
page read and write
EB4000
heap
page read and write
19FF5B85000
trusted library allocation
page read and write
19FF8659000
trusted library allocation
page read and write
19FF74FE000
trusted library allocation
page read and write
19FF9443000
trusted library allocation
page read and write
19FF5A76000
trusted library allocation
page read and write
19FF6B81000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF79F5000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF28DB000
trusted library allocation
page read and write
19FF56E0000
heap
page read and write
19FEC6A4000
heap
page read and write
19FEC69F000
heap
page read and write
19FFDDD5000
trusted library allocation
page read and write
19FF2C4F000
trusted library allocation
page read and write
1A001EE6000
trusted library allocation
page read and write
19FFDBD5000
trusted library allocation
page read and write
19FF598D000
trusted library allocation
page read and write
19FF6B72000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF17E9000
trusted library allocation
page read and write
19FF1713000
trusted library allocation
page read and write
19FF77ED000
trusted library allocation
page read and write
19FF59CF000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FEC6E6000
heap
page read and write
19FF7958000
trusted library allocation
page read and write
19FF7130000
trusted library allocation
page read and write
19FF5E60000
trusted library allocation
page read and write
19FF7635000
trusted library allocation
page read and write
19FF8527000
trusted library allocation
page read and write
19FF6FED000
trusted library allocation
page read and write
19FF6360000
trusted library allocation
page read and write
19FF538F000
trusted library allocation
page read and write
2BFE56BA000
heap
page read and write
1A001E4E000
trusted library allocation
page read and write
19FF2CB5000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
19FF748A000
trusted library allocation
page read and write
214A0EE0000
unclassified section
page readonly
19FFDBB0000
trusted library allocation
page read and write
19FF77F7000
trusted library allocation
page read and write
839103E000
unkown
page readonly
214A1A00000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FEC6E6000
heap
page read and write
19FFF35A000
trusted library allocation
page read and write
19FEC6CC000
heap
page read and write
19FFB63C000
trusted library allocation
page read and write
19FF909B000
trusted library allocation
page read and write
19FF63B5000
trusted library allocation
page read and write
19FF6332000
trusted library allocation
page read and write
19FF915F000
trusted library allocation
page read and write
214A1F21000
heap
page read and write
19FF53C2000
trusted library allocation
page read and write
19FFF94B000
trusted library allocation
page read and write
19FF2CB4000
trusted library allocation
page read and write
214A108A000
heap
page read and write
19FF8583000
trusted library allocation
page read and write
1A002137000
trusted library allocation
page read and write
19FF56B1000
heap
page read and write
19FF9179000
trusted library allocation
page read and write
19FF50DF000
trusted library allocation
page read and write
19FF5BE3000
trusted library allocation
page read and write
19FF77DB000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
19FF5094000
trusted library allocation
page read and write
19FF590D000
trusted library allocation
page read and write
1A001D9E000
trusted library allocation
page read and write
214A1860000
heap
page read and write
19FF6A96000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FFB6FE000
trusted library allocation
page read and write
19FF71AB000
trusted library allocation
page read and write
19FF2CD7000
trusted library allocation
page read and write
19FF6FBA000
trusted library allocation
page read and write
19FF71C0000
trusted library allocation
page read and write
1A001DE3000
trusted library allocation
page read and write
19FF85A0000
trusted library allocation
page read and write
19FF2C7E000
trusted library allocation
page read and write
19FEC6EC000
heap
page read and write
19FF78C4000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF2A1B000
trusted library allocation
page read and write
F14000
heap
page read and write
19FFDB37000
trusted library allocation
page read and write
19FF76FD000
trusted library allocation
page read and write
19FFDB31000
trusted library allocation
page read and write
19FF7F8D000
trusted library allocation
page read and write
19FF6D61000
trusted library allocation
page read and write
19FF8273000
trusted library allocation
page read and write
19FFDCE6000
trusted library allocation
page read and write
19FF7691000
trusted library allocation
page read and write
1A001E8B000
trusted library allocation
page read and write
19FF74AC000
trusted library allocation
page read and write
19FFDAA1000
trusted library allocation
page read and write
839113E000
unkown
page readonly
19FF85A8000
trusted library allocation
page read and write
19FEC6E2000
heap
page read and write
19FF8081000
trusted library allocation
page read and write
19FF636F000
trusted library allocation
page read and write
19FFB688000
trusted library allocation
page read and write
1A563020000
heap
page readonly
1A00033F000
heap
page read and write
19FFD98D000
trusted library allocation
page read and write
19FF82A3000
trusted library allocation
page read and write
19FF5B84000
trusted library allocation
page read and write
2BFE71BE000
heap
page read and write
19FF7471000
trusted library allocation
page read and write
19FEC679000
heap
page read and write
19FFDAB4000
trusted library allocation
page read and write
214A1EA9000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF56A9000
heap
page read and write
19FEC69D000
heap
page read and write
19FF2CA7000
trusted library allocation
page read and write
19FF532A000
trusted library allocation
page read and write
19FF79E8000
trusted library allocation
page read and write
19FEC680000
heap
page read and write
19FEC6E4000
heap
page read and write
19FF5A9C000
trusted library allocation
page read and write
19852278000
trusted library allocation
page read and write
D6C000
unkown
page readonly
19FF6C5E000
trusted library allocation
page read and write
19FF77BD000
trusted library allocation
page read and write
1A000505000
trusted library allocation
page read and write
1FF42200000
trusted library allocation
page read and write
1A001BE3000
trusted library allocation
page read and write
19FF858C000
trusted library allocation
page read and write
1A00054D000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF5E56000
trusted library allocation
page read and write
19FF77F7000
trusted library allocation
page read and write
19851EB0000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF53CE000
trusted library allocation
page read and write
19FF2860000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
1A001373000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF7AD8000
trusted library allocation
page read and write
19FF79C2000
trusted library allocation
page read and write
19FF6B55000
trusted library allocation
page read and write
19FF8199000
trusted library allocation
page read and write
19FF6388000
trusted library allocation
page read and write
19FF5B9A000
trusted library allocation
page read and write
19FF85F9000
trusted library allocation
page read and write
19FF8045000
trusted library allocation
page read and write
19FF28B1000
trusted library allocation
page read and write
19FF770A000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FF5BE3000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF5A38000
trusted library allocation
page read and write
19FFDBB8000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
1A5633F6000
heap
page read and write
19FF7478000
trusted library allocation
page read and write
19FFF93F000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FEC6E6000
heap
page read and write
10BF000
heap
page read and write
19FFF890000
trusted library allocation
page read and write
19FFDCF5000
trusted library allocation
page read and write
19FF74F2000
trusted library allocation
page read and write
19FF6B93000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF9B1B000
trusted library allocation
page read and write
1A563247000
trusted library allocation
page read and write
19FF770F000
trusted library allocation
page read and write
19FF63F2000
trusted library allocation
page read and write
19FFD9F9000
trusted library allocation
page read and write
19FF5333000
trusted library allocation
page read and write
19FF177D000
trusted library allocation
page read and write
1A5632EB000
trusted library allocation
page read and write
19FF6B7E000
trusted library allocation
page read and write
19FF53CD000
trusted library allocation
page read and write
214A1EA0000
heap
page read and write
1A00202F000
trusted library allocation
page read and write
19FF5EB8000
trusted library allocation
page read and write
19FF81F9000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF85CD000
trusted library allocation
page read and write
1A5632B9000
trusted library allocation
page read and write
19FF5B57000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF7119000
trusted library allocation
page read and write
19FF171B000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
19FFB6FB000
trusted library allocation
page read and write
19FF6EBC000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC6DC000
heap
page read and write
109F000
heap
page read and write
19FF76A2000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
19FF7349000
trusted library allocation
page read and write
19FFDC43000
trusted library allocation
page read and write
214A1EF9000
heap
page read and write
19FF815E000
trusted library allocation
page read and write
19FF9501000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
19FFDAA4000
trusted library allocation
page read and write
19FF5998000
trusted library allocation
page read and write
19FF794F000
trusted library allocation
page read and write
19FF82CF000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FF74F4000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
214A1F26000
heap
page read and write
19FF6DBB000
trusted library allocation
page read and write
19FF7435000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
19FF5B8F000
trusted library allocation
page read and write
19FF6C6D000
trusted library allocation
page read and write
214A13AB000
trusted library allocation
page read and write
19FF74CE000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FFB682000
trusted library allocation
page read and write
19FF6D71000
trusted library allocation
page read and write
19FFDAAA000
trusted library allocation
page read and write
19FF74E0000
trusted library allocation
page read and write
C44B7FC000
stack
page read and write
19FFFA30000
trusted library allocation
page read and write
1FF42300000
trusted library allocation
page read and write
19FF71F5000
trusted library allocation
page read and write
19FFDB55000
trusted library allocation
page read and write
1A56326E000
trusted library allocation
page read and write
19FFD940000
trusted library allocation
page read and write
19FF2936000
trusted library allocation
page read and write
19FFDC7A000
trusted library allocation
page read and write
19FF766B000
trusted library allocation
page read and write
19FF6397000
trusted library allocation
page read and write
19FF53CD000
trusted library allocation
page read and write
19FFDCFE000
trusted library allocation
page read and write
19FF7616000
trusted library allocation
page read and write
19FF6BC5000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FEC696000
heap
page read and write
198522B5000
trusted library allocation
page read and write
19FF6ABD000
trusted library allocation
page read and write
19FF2CAD000
trusted library allocation
page read and write
19FEC6A1000
heap
page read and write
19FF78C4000
trusted library allocation
page read and write
19FF79F5000
trusted library allocation
page read and write
214A1F84000
heap
page read and write
1A001B6E000
trusted library allocation
page read and write
19FF716A000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF5ECC000
trusted library allocation
page read and write
214A1F6A000
heap
page read and write
19FF794F000
trusted library allocation
page read and write
214A1F84000
heap
page read and write
19FF78DB000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF7745000
trusted library allocation
page read and write
19FF78EC000
trusted library allocation
page read and write
19FFFC12000
trusted library allocation
page read and write
19FEC6F4000
heap
page read and write
19FF28CB000
trusted library allocation
page read and write
19FF79DF000
trusted library allocation
page read and write
19FFDC73000
trusted library allocation
page read and write
19FEC6E2000
heap
page read and write
19FEC6AD000
heap
page read and write
19FEC6EB000
heap
page read and write
19FF5E52000
trusted library allocation
page read and write
19FEC730000
heap
page read and write
2BFE5700000
trusted library allocation
page read and write
19852270000
trusted library allocation
page read and write
19FF748F000
trusted library allocation
page read and write
19FF6B7A000
trusted library allocation
page read and write
19FF63A7000
trusted library allocation
page read and write
19FEC6E2000
heap
page read and write
19FF9407000
trusted library allocation
page read and write
19FF80F9000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
EA443FE000
stack
page read and write
19FF7FBC000
trusted library allocation
page read and write
1A001E99000
trusted library allocation
page read and write
C4D000
stack
page read and write
19FEC69B000
heap
page read and write
19FF636B000
trusted library allocation
page read and write
19FF7753000
trusted library allocation
page read and write
2BFE56BC000
heap
page read and write
19FF53C9000
trusted library allocation
page read and write
19FF6BD1000
trusted library allocation
page read and write
19FF8070000
trusted library allocation
page read and write
214A1EA0000
heap
page read and write
19FF6C6D000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF5654000
heap
page read and write
19FFDCD9000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FF755B000
trusted library allocation
page read and write
19FF5EF1000
trusted library allocation
page read and write
19FF56A9000
heap
page read and write
19FEC68C000
heap
page read and write
19FF2C8B000
trusted library allocation
page read and write
19FF631B000
trusted library allocation
page read and write
19FF5B88000
trusted library allocation
page read and write
19FF6C26000
trusted library allocation
page read and write
1A002167000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FFB627000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FFDC1A000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FFDCBD000
trusted library allocation
page read and write
19FF78BF000
trusted library allocation
page read and write
19FF8290000
trusted library allocation
page read and write
1A001DF9000
trusted library allocation
page read and write
19FF6C5E000
trusted library allocation
page read and write
19FF79C6000
trusted library allocation
page read and write
1A001D57000
trusted library allocation
page read and write
19FF71C5000
trusted library allocation
page read and write
19FF77A2000
trusted library allocation
page read and write
19FF28C6000
trusted library allocation
page read and write
1A001DD4000
trusted library allocation
page read and write
19FEC710000
heap
page read and write
19FF6B97000
trusted library allocation
page read and write
19FF6BAA000
trusted library allocation
page read and write
19FF6B81000
trusted library allocation
page read and write
19FFDAB4000
trusted library allocation
page read and write
19FEC6E9000
heap
page read and write
1A000326000
heap
page read and write
19FF75C8000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
19FFF97C000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF6C53000
trusted library allocation
page read and write
19FF6368000
trusted library allocation
page read and write
214A1232000
unclassified section
page read and write
19FF74A1000
trusted library allocation
page read and write
19FF562F000
heap
page read and write
19FF7EEF000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF7DF8000
trusted library allocation
page read and write
19FFD9EF000
trusted library allocation
page read and write
19FEC697000
heap
page read and write
19FEC6B5000
heap
page read and write
19FF58D1000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FF9193000
trusted library allocation
page read and write
19FF5BFC000
trusted library allocation
page read and write
19FFDB31000
trusted library allocation
page read and write
19FF6BE1000
trusted library allocation
page read and write
1A563298000
trusted library allocation
page read and write
19FF8252000
trusted library allocation
page read and write
214A1EE8000
heap
page read and write
19FF78FB000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FFDCF5000
trusted library allocation
page read and write
EA43BFF000
stack
page read and write
19FFD952000
trusted library allocation
page read and write
19FEC679000
heap
page read and write
19FF289A000
trusted library allocation
page read and write
19FF2C8B000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF8191000
trusted library allocation
page read and write
19FF774D000
trusted library allocation
page read and write
214A1312000
trusted library allocation
page read and write
19FF6FE4000
trusted library allocation
page read and write
19FF718E000
trusted library allocation
page read and write
19FF807D000
trusted library allocation
page read and write
19FF2939000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF6BC8000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF53A5000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FEC6DC000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF5EDF000
trusted library allocation
page read and write
19FFF3DF000
trusted library allocation
page read and write
214A1F31000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF77B3000
trusted library allocation
page read and write
19FF6C73000
trusted library allocation
page read and write
19FF765E000
trusted library allocation
page read and write
19FFB636000
trusted library allocation
page read and write
19FF81C4000
trusted library allocation
page read and write
19FF8537000
trusted library allocation
page read and write
19FFD800000
trusted library allocation
page read and write
214A1362000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
19FFDC31000
trusted library allocation
page read and write
1A001BE3000
trusted library allocation
page read and write
19FF6AEE000
trusted library allocation
page read and write
19FF56BB000
heap
page read and write
EA433FF000
stack
page read and write
214A1F84000
heap
page read and write
19FF76E2000
trusted library allocation
page read and write
19FF766B000
trusted library allocation
page read and write
19FFFC7E000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC68C000
heap
page read and write
19FF74C7000
trusted library allocation
page read and write
19FF568B000
heap
page read and write
19FEC692000
heap
page read and write
19FF9D09000
heap
page read and write
19FF77A9000
trusted library allocation
page read and write
19FFDC77000
trusted library allocation
page read and write
1A001E99000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FFDDC8000
trusted library allocation
page read and write
19FFD9E1000
trusted library allocation
page read and write
19FFDC58000
trusted library allocation
page read and write
19FFB6B9000
trusted library allocation
page read and write
BDB000
stack
page read and write
1A00171C000
trusted library allocation
page read and write
19FF78DB000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
19FF861E000
trusted library allocation
page read and write
19FF7445000
trusted library allocation
page read and write
FE0000
heap
page read and write
19FF56A1000
heap
page read and write
19FF6A3F000
trusted library allocation
page read and write
19FF2AB4000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
19FFFA12000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF85EF000
trusted library allocation
page read and write
1A56325B000
trusted library allocation
page read and write
19FF8246000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF2CFC000
trusted library allocation
page read and write
19FFF94F000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF53BE000
trusted library allocation
page read and write
19FF5ECC000
trusted library allocation
page read and write
19FFFC24000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC701000
heap
page read and write
19FF8593000
trusted library allocation
page read and write
19FFDBF5000
trusted library allocation
page read and write
19FF10CC000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
EA423FE000
stack
page read and write
19FF82FA000
trusted library allocation
page read and write
19FF6E53000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF56AD000
heap
page read and write
19851DB0000
unclassified section
page readonly
19FFF898000
trusted library allocation
page read and write
19FF6CC1000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC693000
heap
page read and write
19FF9B1B000
trusted library allocation
page read and write
19FFF92F000
trusted library allocation
page read and write
19FF77C6000
trusted library allocation
page read and write
214A1303000
trusted library allocation
page read and write
19FFD993000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
19FF56A0000
heap
page read and write
19FF714A000
trusted library allocation
page read and write
19FF77C2000
trusted library allocation
page read and write
19FFF953000
trusted library allocation
page read and write
19FF637B000
trusted library allocation
page read and write
19FF6D17000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
19FF503E000
trusted library allocation
page read and write
19FFDDAF000
trusted library allocation
page read and write
19FF91FE000
trusted library allocation
page read and write
96CCC41000
trusted library allocation
page execute read
19FF71AE000
trusted library allocation
page read and write
214A1F40000
heap
page read and write
19FFF8DA000
trusted library allocation
page read and write
19FFB62C000
trusted library allocation
page read and write
19FFFC15000
trusted library allocation
page read and write
19FF63AC000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF6377000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF756E000
trusted library allocation
page read and write
19FF6BC3000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF53CD000
trusted library allocation
page read and write
19FF8539000
trusted library allocation
page read and write
19FF77C2000
trusted library allocation
page read and write
19FF7DF4000
trusted library allocation
page read and write
19FFB698000
trusted library allocation
page read and write
19FF6A8F000
trusted library allocation
page read and write
19FF6AA3000
trusted library allocation
page read and write
19FF6B81000
trusted library allocation
page read and write
19FF63ED000
trusted library allocation
page read and write
19FF6DB9000
trusted library allocation
page read and write
19FF2A6F000
trusted library allocation
page read and write
19FF71D4000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FF85DC000
trusted library allocation
page read and write
198522F4000
trusted library allocation
page read and write
19FFDDC5000
trusted library allocation
page read and write
19FF5E8D000
trusted library allocation
page read and write
19FFDB37000
trusted library allocation
page read and write
19FF861C000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF63ED000
trusted library allocation
page read and write
19FF54D2000
trusted library allocation
page read and write
19FF2A8B000
trusted library allocation
page read and write
214A123F000
unclassified section
page read and write
19FFDBF9000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF50B2000
trusted library allocation
page read and write
19FF56E0000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FF7863000
trusted library allocation
page read and write
19FF7F22000
trusted library allocation
page read and write
19FF79E4000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FFDCE8000
trusted library allocation
page read and write
33EEDBE000
stack
page read and write
19FF77C6000
trusted library allocation
page read and write
19FF53A0000
trusted library allocation
page read and write
19FF77E2000
trusted library allocation
page read and write
19FF6C46000
trusted library allocation
page read and write
19FF76FD000
trusted library allocation
page read and write
19FF74BE000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF637A000
trusted library allocation
page read and write
19FF77DF000
trusted library allocation
page read and write
214A1F7B000
heap
page read and write
1A001EC1000
trusted library allocation
page read and write
19FF7955000
trusted library allocation
page read and write
214A1060000
heap
page read and write
19FEC6AD000
heap
page read and write
19FF9F13000
trusted library allocation
page read and write
19FFDB45000
trusted library allocation
page read and write
214A1210000
heap
page readonly
19FF71AE000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
10AB000
heap
page read and write
214A1EF9000
heap
page read and write
19FF63ED000
trusted library allocation
page read and write
19FEC6B7000
heap
page read and write
19FF5AA2000
trusted library allocation
page read and write
1A001A4D000
trusted library allocation
page read and write
19FF56AE000
heap
page read and write
19FF82A3000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FF79FB000
trusted library allocation
page read and write
1A00209E000
trusted library allocation
page read and write
19FF85CD000
trusted library allocation
page read and write
19FF6C56000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC6EA000
heap
page read and write
19FF5047000
trusted library allocation
page read and write
19FF5B94000
trusted library allocation
page read and write
19FF2A70000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
1A56327B000
trusted library allocation
page read and write
214A1A14000
trusted library allocation
page read and write
19FF8523000
trusted library allocation
page read and write
19FF93C8000
trusted library allocation
page read and write
19FF6B7A000
trusted library allocation
page read and write
19FF62B4000
trusted library allocation
page read and write
19FF5F23000
trusted library allocation
page read and write
19FF5BBF000
trusted library allocation
page read and write
19FF6B6B000
trusted library allocation
page read and write
19FF76E8000
trusted library allocation
page read and write
19FF7FB9000
trusted library allocation
page read and write
19FFDCD3000
trusted library allocation
page read and write
19FFDC08000
trusted library allocation
page read and write
19FF94C5000
trusted library allocation
page read and write
19FF82E0000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF6C3B000
trusted library allocation
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FF868E000
trusted library allocation
page read and write
1A5632B4000
trusted library allocation
page read and write
19FEC6E9000
heap
page read and write
1A001E96000
trusted library allocation
page read and write
1A001D9A000
trusted library allocation
page read and write
19FF77D4000
trusted library allocation
page read and write
19FF769F000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FEC6B7000
heap
page read and write
19FF5022000
trusted library allocation
page read and write
19FF5BCF000
trusted library allocation
page read and write
19FF7F63000
trusted library allocation
page read and write
19FF56A8000
heap
page read and write
83911BE000
unkown
page readonly
214A13A4000
trusted library allocation
page read and write
19FFD92E000
trusted library allocation
page read and write
19FF79C2000
trusted library allocation
page read and write
19FF6D73000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
19852334000
heap
page read and write
1A562E70000
remote allocation
page read and write
19FEC6A0000
heap
page read and write
19FF6C63000
trusted library allocation
page read and write
19FF82F8000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF7F63000
trusted library allocation
page read and write
1A0002D1000
trusted library allocation
page read and write
19FFDCF2000
trusted library allocation
page read and write
19FFDB6B000
trusted library allocation
page read and write
19FF5684000
heap
page read and write
19FF734F000
trusted library allocation
page read and write
19FF5692000
heap
page read and write
19FFDCDD000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF852A000
trusted library allocation
page read and write
19FF5EDF000
trusted library allocation
page read and write
19FF6E93000
trusted library allocation
page read and write
1A001DCF000
trusted library allocation
page read and write
19FF6D85000
trusted library allocation
page read and write
19FFDBC6000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
19FF56A9000
heap
page read and write
19FEC6AE000
heap
page read and write
19FF53B1000
trusted library allocation
page read and write
19FF71F9000
trusted library allocation
page read and write
1A00037E000
heap
page read and write
214A1F62000
heap
page read and write
19FF56A8000
heap
page read and write
214A1F84000
heap
page read and write
2BFE56BA000
heap
page read and write
1A0013FB000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF5E5B000
trusted library allocation
page read and write
19FF6B93000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
19FEC6E9000
heap
page read and write
19FEC695000
heap
page read and write
19FF6BAA000
trusted library allocation
page read and write
838EDCE000
stack
page read and write
19FF7976000
trusted library allocation
page read and write
19FF56A8000
heap
page read and write
19FEC6E6000
heap
page read and write
1A001AB0000
trusted library allocation
page read and write
19FF596A000
trusted library allocation
page read and write
214A12F7000
unkown
page execute read
19FF2868000
trusted library allocation
page read and write
19FF2CE9000
trusted library allocation
page read and write
19FFF8DE000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF77C2000
trusted library allocation
page read and write
19FEC6E7000
heap
page read and write
19FF2CE9000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FEC6E6000
heap
page read and write
19FEC679000
heap
page read and write
1A001392000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FEC6DC000
heap
page read and write
19FFDCC8000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF53BE000
trusted library allocation
page read and write
19FFDAAA000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
1A562E10000
unclassified section
page readonly
1A0005E4000
trusted library allocation
page read and write
1A001E96000
trusted library allocation
page read and write
19FF82F8000
trusted library allocation
page read and write
19FF9198000
trusted library allocation
page read and write
1A001ED9000
trusted library allocation
page read and write
19FF74AE000
trusted library allocation
page read and write
1A001E96000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FFDCF2000
trusted library allocation
page read and write
19FF56CC000
heap
page read and write
19FF9B27000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
19FF6C36000
trusted library allocation
page read and write
19FF50DC000
trusted library allocation
page read and write
96CCC31000
trusted library allocation
page execute read
19FF77BA000
trusted library allocation
page read and write
19FF7682000
trusted library allocation
page read and write
1A001EC1000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF6C52000
trusted library allocation
page read and write
19FEC6B1000
heap
page read and write
19FF6C49000
trusted library allocation
page read and write
1A00036A000
heap
page read and write
EB4000
heap
page read and write
19FF5ACB000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF6C56000
trusted library allocation
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
10AE000
heap
page read and write
19FF7EF1000
trusted library allocation
page read and write
19851FD0000
heap
page readonly
19FF82FC000
trusted library allocation
page read and write
19FF5098000
trusted library allocation
page read and write
214A1FA9000
heap
page read and write
19FF6393000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
19FF8662000
trusted library allocation
page read and write
19FFDCE8000
trusted library allocation
page read and write
19851FE2000
unclassified section
page read and write
19FF2CAD000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
1A001793000
trusted library allocation
page read and write
19FEC6F9000
heap
page read and write
19FF76F5000
trusted library allocation
page read and write
19FF2CE9000
trusted library allocation
page read and write
19FFB6FB000
trusted library allocation
page read and write
19FFDDD5000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF6BDD000
trusted library allocation
page read and write
599000
stack
page read and write
19FEC686000
heap
page read and write
19FF6BD1000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF8051000
trusted library allocation
page read and write
1A001B4D000
trusted library allocation
page read and write
19FF6F04000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC692000
heap
page read and write
1A0005C5000
trusted library allocation
page read and write
19852200000
trusted library allocation
page read and write
19FF6FBE000
trusted library allocation
page read and write
19FF91AE000
trusted library allocation
page read and write
19FFD991000
trusted library allocation
page read and write
1FF42307000
trusted library allocation
page read and write
1985225D000
trusted library allocation
page read and write
19FF2AB4000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
214A12D7000
unkown
page execute read
19FEC6AB000
heap
page read and write
19FFD995000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF91F8000
trusted library allocation
page read and write
214A1F31000
heap
page read and write
19FF596A000
trusted library allocation
page read and write
214A0ED0000
unclassified section
page readonly
19FF7DF8000
trusted library allocation
page read and write
19FFDDD9000
trusted library allocation
page read and write
19FF7331000
trusted library allocation
page read and write
1A0002C4000
trusted library allocation
page read and write
19FFF947000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF2CE3000
trusted library allocation
page read and write
19FF73B5000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FEC6A2000
heap
page read and write
19FEC690000
heap
page read and write
19FF75EF000
trusted library allocation
page read and write
19FFD9BB000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FEC68C000
heap
page read and write
19FF2C44000
trusted library allocation
page read and write
19FFDCDB000
trusted library allocation
page read and write
19FEC6A7000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF7CF7000
trusted library allocation
page read and write
19FF178C000
trusted library allocation
page read and write
19FF5BA8000
trusted library allocation
page read and write
19FFDDE8000
trusted library allocation
page read and write
1FF42400000
heap
page read and write
19FF9B3F000
trusted library allocation
page read and write
19FF5EDF000
trusted library allocation
page read and write
19FFF953000
trusted library allocation
page read and write
19FF81E4000
trusted library allocation
page read and write
19FFDCC1000
trusted library allocation
page read and write
1A563403000
trusted library allocation
page read and write
19FF2CE0000
trusted library allocation
page read and write
C00000
heap
page read and write
19FF5BAF000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF7913000
trusted library allocation
page read and write
19FF5654000
heap
page read and write
1A001B73000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FF8511000
trusted library allocation
page read and write
19FF769C000
trusted library allocation
page read and write
19FF748F000
trusted library allocation
page read and write
19FF50E4000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF77AD000
trusted library allocation
page read and write
19FF5BCF000
trusted library allocation
page read and write
19FFDAF2000
trusted library allocation
page read and write
19FF5031000
trusted library allocation
page read and write
19FF5E3D000
trusted library allocation
page read and write
19FFF9D9000
trusted library allocation
page read and write
19FF71D2000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FEC6E6000
heap
page read and write
19FF16FE000
trusted library allocation
page read and write
19FF86BD000
trusted library allocation
page read and write
19FEC694000
heap
page read and write
19FF7966000
trusted library allocation
page read and write
19FF91A9000
trusted library allocation
page read and write
19FF17AF000
trusted library allocation
page read and write
19FEC6AB000
heap
page read and write
214A1FA7000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF2C58000
trusted library allocation
page read and write
19FFDCBF000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF7104000
trusted library allocation
page read and write
19FF85E8000
trusted library allocation
page read and write
19FF6CDB000
trusted library allocation
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF6C5F000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
214A0F4E000
remote allocation
page execute read
19FEC692000
heap
page read and write
214A1F31000
heap
page read and write
19FFDAF2000
trusted library allocation
page read and write
19FF6E7F000
trusted library allocation
page read and write
19FF9F25000
trusted library allocation
page read and write
19FF53C9000
trusted library allocation
page read and write
19FFF991000
trusted library allocation
page read and write
19FF50B2000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FEC6E6000
heap
page read and write
1A002150000
trusted library allocation
page read and write
19FF804B000
trusted library allocation
page read and write
2BFE71C1000
heap
page read and write
19FFD9E1000
trusted library allocation
page read and write
19FF85C7000
trusted library allocation
page read and write
19FFDCB8000
trusted library allocation
page read and write
19FF76FD000
trusted library allocation
page read and write
19FEC687000
heap
page read and write
19FF6D69000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
19FFD94E000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FFDB0F000
trusted library allocation
page read and write
19FF5E56000
trusted library allocation
page read and write
1A001EB1000
trusted library allocation
page read and write
19FF7663000
trusted library allocation
page read and write
1A00062C000
trusted library allocation
page read and write
19FEC6E8000
heap
page read and write
19FEC6AE000
heap
page read and write
19FF7764000
trusted library allocation
page read and write
19FF6C58000
trusted library allocation
page read and write
19FF7745000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF5BCF000
trusted library allocation
page read and write
19FF631E000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
1A001E8B000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FFF3B2000
trusted library allocation
page read and write
19FF78FB000
trusted library allocation
page read and write
19FF7656000
trusted library allocation
page read and write
1FF42060000
heap
page read and write
19FF826F000
trusted library allocation
page read and write
DA4000
unkown
page readonly
19FEC6DF000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF74BE000
trusted library allocation
page read and write
1A000543000
trusted library allocation
page read and write
19FF9096000
trusted library allocation
page read and write
19FEC690000
heap
page read and write
1A5632CB000
trusted library allocation
page read and write
19FF17A0000
trusted library allocation
page read and write
19FF94A3000
trusted library allocation
page read and write
19FF6368000
trusted library allocation
page read and write
198522F0000
trusted library allocation
page read and write
19FF5BDF000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF6CC9000
trusted library allocation
page read and write
19FFF34C000
trusted library allocation
page read and write
214A1230000
unclassified section
page read and write
19FFD94A000
trusted library allocation
page read and write
19FF7CD9000
trusted library allocation
page read and write
214A0F70000
heap
page read and write
19FF6E98000
trusted library allocation
page read and write
19FF53C7000
trusted library allocation
page read and write
19FF795E000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FFFC53000
trusted library allocation
page read and write
19FF6C50000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF6D65000
trusted library allocation
page read and write
19FF8534000
trusted library allocation
page read and write
214A1F3D000
heap
page read and write
19FEC684000
heap
page read and write
19FEC69E000
heap
page read and write
19FF10D4000
trusted library allocation
page read and write
19FEC6B7000
heap
page read and write
19FF17D5000
trusted library allocation
page read and write
19FF28A3000
trusted library allocation
page read and write
19FF946D000
trusted library allocation
page read and write
1A0002C2000
trusted library allocation
page read and write
19FF6E90000
trusted library allocation
page read and write
19FEC6EF000
heap
page read and write
19FEC6E0000
heap
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FF7966000
trusted library allocation
page read and write
19FF5998000
trusted library allocation
page read and write
19FFB634000
trusted library allocation
page read and write
19FF851B000
trusted library allocation
page read and write
19FF5695000
heap
page read and write
2BFE54F0000
heap
page read and write
19FFB680000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
2BFE590A000
trusted library allocation
page read and write
19FF59AF000
trusted library allocation
page read and write
1A001A85000
trusted library allocation
page read and write
19FF74D4000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF79F5000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF7691000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF597E000
trusted library allocation
page read and write
19FFDB41000
trusted library allocation
page read and write
19FF5BCB000
trusted library allocation
page read and write
19FF596A000
trusted library allocation
page read and write
19FF829A000
trusted library allocation
page read and write
19FF6D91000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF53C9000
trusted library allocation
page read and write
19FF6E84000
trusted library allocation
page read and write
19FFF38F000
trusted library allocation
page read and write
839117E000
stack
page read and write
19FF5E3D000
trusted library allocation
page read and write
19FF8195000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
1A0002BE000
trusted library allocation
page read and write
214A1EAC000
heap
page read and write
1A563266000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FEC69B000
heap
page read and write
19FFDBD3000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF9F2B000
trusted library allocation
page read and write
B06FFE1E000
trusted library allocation
page read and write
19FF2C42000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
1A001A89000
trusted library allocation
page read and write
198522B1000
trusted library allocation
page read and write
10B1000
heap
page read and write
19FFDA9B000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
19FF6E9D000
trusted library allocation
page read and write
19FF730E000
trusted library allocation
page read and write
19FFDB62000
trusted library allocation
page read and write
19FF63C0000
trusted library allocation
page read and write
19FF5ED2000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF6B91000
trusted library allocation
page read and write
19FFB6B1000
trusted library allocation
page read and write
214A1EA4000
heap
page read and write
19FF50AA000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FF86D1000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF769C000
trusted library allocation
page read and write
1A5633F4000
heap
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FFB6F1000
trusted library allocation
page read and write
1A001B3B000
trusted library allocation
page read and write
19FFDB81000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
19FFF99F000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
1A001AB0000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC6E0000
heap
page read and write
19FF53C7000
trusted library allocation
page read and write
19FF2866000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF710A000
trusted library allocation
page read and write
1A001A2F000
trusted library allocation
page read and write
19FF2A29000
trusted library allocation
page read and write
19FF79C6000
trusted library allocation
page read and write
19FF5BAF000
trusted library allocation
page read and write
19FF5BBF000
trusted library allocation
page read and write
1A001E75000
trusted library allocation
page read and write
1A00056D000
trusted library allocation
page read and write
19FFDBD7000
trusted library allocation
page read and write
19FF796C000
trusted library allocation
page read and write
19FF6C32000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF6C67000
trusted library allocation
page read and write
19FF857D000
trusted library allocation
page read and write
19FF6B6B000
trusted library allocation
page read and write
19FFDAF2000
trusted library allocation
page read and write
214A1FA7000
heap
page read and write
19FFFA28000
trusted library allocation
page read and write
19FF6C50000
trusted library allocation
page read and write
214A1323000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FEC6EF000
heap
page read and write
19FFF824000
trusted library allocation
page read and write
19FFDDD5000
trusted library allocation
page read and write
19FF5E62000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FF716A000
trusted library allocation
page read and write
19FFDCD0000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
1A000371000
heap
page read and write
19FF91AE000
trusted library allocation
page read and write
19FFF92B000
trusted library allocation
page read and write
1A000601000
trusted library allocation
page read and write
19FF5E98000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF9F31000
trusted library allocation
page read and write
19FF85E8000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF53AE000
trusted library allocation
page read and write
19FF5BCB000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF85EF000
trusted library allocation
page read and write
19FF53DE000
trusted library allocation
page read and write
19FF5BE9000
trusted library allocation
page read and write
C44C7FF000
stack
page read and write
19FF5B4A000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF82FC000
trusted library allocation
page read and write
1A563264000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
3851000
heap
page read and write
19FFDD9F000
trusted library allocation
page read and write
19FF74A1000
trusted library allocation
page read and write
19FEC6E5000
heap
page read and write
19FF79EA000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
19FF2A7F000
trusted library allocation
page read and write
19FF7708000
trusted library allocation
page read and write
19FF5025000
trusted library allocation
page read and write
19FFDA97000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FEC69E000
heap
page read and write
1A56322E000
trusted library allocation
page read and write
19FF6E82000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FFFCFC000
trusted library allocation
page read and write
19FF77A8000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FF5BC5000
trusted library allocation
page read and write
19FF745C000
trusted library allocation
page read and write
19FF6BB2000
trusted library allocation
page read and write
19FF7713000
trusted library allocation
page read and write
19FF8534000
trusted library allocation
page read and write
19FFF996000
trusted library allocation
page read and write
214A1F98000
heap
page read and write
19FF7FD4000
trusted library allocation
page read and write
19FF75ED000
trusted library allocation
page read and write
19FF77BD000
trusted library allocation
page read and write
214A1F32000
heap
page read and write
19FF6E9D000
trusted library allocation
page read and write
19852503000
trusted library allocation
page read and write
19FF82C6000
trusted library allocation
page read and write
19FF8539000
trusted library allocation
page read and write
19FEC701000
heap
page read and write
19FF6339000
trusted library allocation
page read and write
19FFD83C000
trusted library allocation
page read and write
19FFDCF5000
trusted library allocation
page read and write
19FFDCEF000
trusted library allocation
page read and write
19FF82A3000
trusted library allocation
page read and write
1A002193000
trusted library allocation
page read and write
1A00035C000
heap
page read and write
19FF7642000
trusted library allocation
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
214A1EBD000
heap
page read and write
19FEC6AD000
heap
page read and write
19FF6B59000
trusted library allocation
page read and write
19FF1775000
trusted library allocation
page read and write
19FF63AF000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF76E0000
trusted library allocation
page read and write
19FF82CF000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC69B000
heap
page read and write
19FF6C58000
trusted library allocation
page read and write
1A0013CC000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF812A000
trusted library allocation
page read and write
214A10C0000
heap
page read and write
19FF56A8000
heap
page read and write
19FF28C6000
trusted library allocation
page read and write
19FF825E000
trusted library allocation
page read and write
19852262000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
19FFD9F9000
trusted library allocation
page read and write
19FFF342000
trusted library allocation
page read and write
19FF5BD8000
trusted library allocation
page read and write
19FF75EA000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
19FF536F000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF5690000
heap
page read and write
1A001E43000
trusted library allocation
page read and write
19FF825C000
trusted library allocation
page read and write
1A001AC3000
trusted library allocation
page read and write
19FF5374000
trusted library allocation
page read and write
19FF74CC000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FEC692000
heap
page read and write
839423E000
unkown
page readonly
19FFDB7B000
trusted library allocation
page read and write
19FF819B000
trusted library allocation
page read and write
19FF10F8000
trusted library allocation
page read and write
214A1F3D000
heap
page read and write
19FF5B3B000
trusted library allocation
page read and write
19FF7470000
trusted library allocation
page read and write
19FF5EA2000
trusted library allocation
page read and write
19FF7EA4000
trusted library allocation
page read and write
19FF952E000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF5BCB000
trusted library allocation
page read and write
1FF42190000
heap
page read and write
19FF85FD000
trusted library allocation
page read and write
19FEC6C1000
heap
page read and write
1A000633000
trusted library allocation
page read and write
1A5630C0000
unclassified section
page readonly
19FFDAA3000
trusted library allocation
page read and write
19FF6B68000
trusted library allocation
page read and write
214A1F28000
heap
page read and write
1A562E90000
unclassified section
page readonly
19FF5BE7000
trusted library allocation
page read and write
19FF7462000
trusted library allocation
page read and write
19FF6B43000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FFF8FB000
trusted library allocation
page read and write
19FFDAD6000
trusted library allocation
page read and write
19FF6AE2000
trusted library allocation
page read and write
19FF5369000
trusted library allocation
page read and write
19FF54DA000
trusted library allocation
page read and write
19FF7691000
trusted library allocation
page read and write
19852203000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FEC6AD000
heap
page read and write
19FF6E69000
trusted library allocation
page read and write
19FF5B96000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
19FFF8D0000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF6BAE000
trusted library allocation
page read and write
10BF000
heap
page read and write
2BFE55E0000
heap
page read and write
19FF2CC0000
trusted library allocation
page read and write
19FF7AF7000
trusted library allocation
page read and write
1A001A60000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF8539000
trusted library allocation
page read and write
2BFE56BC000
heap
page read and write
19FF75C6000
trusted library allocation
page read and write
19FF62FB000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF7625000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
FA0000
trusted library allocation
page read and write
19FF6CDB000
trusted library allocation
page read and write
19FF1900000
trusted library allocation
page read and write
19FF2C63000
trusted library allocation
page read and write
19FF7322000
trusted library allocation
page read and write
19FF56B7000
heap
page read and write
DAF77FE000
unkown
page readonly
19FFD917000
trusted library allocation
page read and write
2BFE5907000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF5991000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF5369000
trusted library allocation
page read and write
19FF2A99000
trusted library allocation
page read and write
19FF73D1000
trusted library allocation
page read and write
19FF6AB8000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FFD816000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
1A00206D000
trusted library allocation
page read and write
19FF5B34000
trusted library allocation
page read and write
1A000336000
heap
page read and write
19FF632A000
trusted library allocation
page read and write
1A0013D2000
trusted library allocation
page read and write
1A0013B3000
trusted library allocation
page read and write
1A001767000
trusted library allocation
page read and write
19FFDBAA000
trusted library allocation
page read and write
214A136F000
trusted library allocation
page read and write
19FF54F0000
trusted library allocation
page read and write
19FFDCE8000
trusted library allocation
page read and write
1A001AEB000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
2BFE56B1000
heap
page read and write
19FF7691000
trusted library allocation
page read and write
1A000541000
trusted library allocation
page read and write
1A001AD2000
trusted library allocation
page read and write
1A001AE9000
trusted library allocation
page read and write
19852213000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FF2923000
trusted library allocation
page read and write
19FFF93F000
trusted library allocation
page read and write
19FEC6E8000
heap
page read and write
19FF53E6000
trusted library allocation
page read and write
19FFF8C1000
trusted library allocation
page read and write
19FF597E000
trusted library allocation
page read and write
19FF769F000
trusted library allocation
page read and write
19FF74E5000
trusted library allocation
page read and write
19FFB63F000
trusted library allocation
page read and write
19FF1676000
trusted library allocation
page read and write
19FF53A0000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF6C56000
trusted library allocation
page read and write
19FFF3DF000
trusted library allocation
page read and write
19FF76A3000
trusted library allocation
page read and write
19FF85AA000
trusted library allocation
page read and write
19FF7974000
trusted library allocation
page read and write
19FF5B39000
trusted library allocation
page read and write
1A00027A000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF63A7000
trusted library allocation
page read and write
19FF2C4F000
trusted library allocation
page read and write
19FF74DB000
trusted library allocation
page read and write
1A563203000
trusted library allocation
page read and write
214A1E40000
heap
page read and write
19FF7325000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FF5A8C000
trusted library allocation
page read and write
19FFDB2D000
trusted library allocation
page read and write
19FF5630000
heap
page read and write
19FEC6DF000
heap
page read and write
19FF539E000
trusted library allocation
page read and write
19FF5E59000
trusted library allocation
page read and write
19FF5BD5000
trusted library allocation
page read and write
19FF2CB0000
trusted library allocation
page read and write
19FF76ED000
trusted library allocation
page read and write
19FF2AA9000
trusted library allocation
page read and write
19FF5F54000
trusted library allocation
page read and write
1A000487000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF769F000
trusted library allocation
page read and write
19FF81C7000
trusted library allocation
page read and write
19FF53C7000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC69E000
heap
page read and write
19FEC6EF000
heap
page read and write
19FF9448000
trusted library allocation
page read and write
19FF2A73000
trusted library allocation
page read and write
19FF7618000
trusted library allocation
page read and write
19FF5984000
trusted library allocation
page read and write
19FF6BC9000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF753C000
trusted library allocation
page read and write
19FF7745000
trusted library allocation
page read and write
19FEC6AB000
heap
page read and write
19FFDCB8000
trusted library allocation
page read and write
19FF10DF000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF86EB000
trusted library allocation
page read and write
19FE7239000
heap
page read and write
1A0003B9000
heap
page read and write
19FF539C000
trusted library allocation
page read and write
19FFF92B000
trusted library allocation
page read and write
1A56327D000
trusted library allocation
page read and write
19FF82C6000
trusted library allocation
page read and write
1A00036D000
heap
page read and write
19852224000
trusted library allocation
page read and write
19FFDB7D000
trusted library allocation
page read and write
1A001324000
trusted library allocation
page read and write
1A001A85000
trusted library allocation
page read and write
19FF6C67000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
1A001E22000
trusted library allocation
page read and write
19FF6B72000
trusted library allocation
page read and write
214A1E9C000
heap
page read and write
19FF5984000
trusted library allocation
page read and write
19FF719A000
trusted library allocation
page read and write
19FF8266000
trusted library allocation
page read and write
19FF6B54000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
1A001AB0000
trusted library allocation
page read and write
19FFF864000
trusted library allocation
page read and write
2BFE56A2000
heap
page read and write
19FF75ED000
trusted library allocation
page read and write
19FFD9EE000
trusted library allocation
page read and write
19FF9B18000
trusted library allocation
page read and write
19FFDC7A000
trusted library allocation
page read and write
19FFDCD7000
trusted library allocation
page read and write
19FF2C87000
trusted library allocation
page read and write
19FF5F65000
trusted library allocation
page read and write
19FF7AFE000
trusted library allocation
page read and write
19FFFC68000
trusted library allocation
page read and write
19FF6B6B000
trusted library allocation
page read and write
19FF9F2F000
trusted library allocation
page read and write
19FF6CD7000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
19FFF8F6000
trusted library allocation
page read and write
19FF79D7000
trusted library allocation
page read and write
19FF6365000
trusted library allocation
page read and write
19FF91CD000
trusted library allocation
page read and write
1A001BF5000
trusted library allocation
page read and write
19FF534E000
trusted library allocation
page read and write
19FF634F000
trusted library allocation
page read and write
19FFDAFE000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC694000
heap
page read and write
19FF8539000
trusted library allocation
page read and write
19FF5B8D000
trusted library allocation
page read and write
19FEC686000
heap
page read and write
19FEC6F4000
heap
page read and write
19FF6B7E000
trusted library allocation
page read and write
19FF8534000
trusted library allocation
page read and write
19FF7448000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF6B5F000
trusted library allocation
page read and write
1A001DA2000
trusted library allocation
page read and write
839223E000
unkown
page readonly
DAF91FE000
stack
page read and write
19FF5B45000
trusted library allocation
page read and write
19FFB696000
trusted library allocation
page read and write
19FF1726000
trusted library allocation
page read and write
19FF28BF000
trusted library allocation
page read and write
214A1385000
trusted library allocation
page read and write
33EE4FE000
stack
page read and write
19FF6C46000
trusted library allocation
page read and write
19FF8276000
trusted library allocation
page read and write
19FF5362000
trusted library allocation
page read and write
19FF78BF000
trusted library allocation
page read and write
19FF6C53000
trusted library allocation
page read and write
19FFF35D000
trusted library allocation
page read and write
214A1F6D000
heap
page read and write
19FF6F06000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF5990000
trusted library allocation
page read and write
19FF5325000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FEC6C1000
heap
page read and write
214A135F000
trusted library allocation
page read and write
19FF8228000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
1A001EC4000
trusted library allocation
page read and write
19FF6C46000
trusted library allocation
page read and write
214A1240000
trusted library section
page readonly
19FF6BC3000
trusted library allocation
page read and write
19FF7129000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
2BFE568A000
heap
page read and write
19FF76ED000
trusted library allocation
page read and write
19FF864D000
trusted library allocation
page read and write
19FF6C52000
trusted library allocation
page read and write
19FEC6B5000
heap
page read and write
19FF77AD000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
1A000336000
heap
page read and write
19FF75B2000
trusted library allocation
page read and write
19FEC697000
heap
page read and write
19FF6C63000
trusted library allocation
page read and write
19FF71F9000
trusted library allocation
page read and write
19FF289C000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
1A001E33000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FFFC7C000
trusted library allocation
page read and write
19FF9F2B000
trusted library allocation
page read and write
19FFF9CE000
trusted library allocation
page read and write
19FF6CBF000
trusted library allocation
page read and write
19FF8032000
trusted library allocation
page read and write
19FF5EEF000
trusted library allocation
page read and write
19FF78AD000
trusted library allocation
page read and write
19FF7F63000
trusted library allocation
page read and write
19FEC698000
heap
page read and write
19FF85BB000
trusted library allocation
page read and write
19852600000
trusted library allocation
page read and write
19FF6D11000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF16F6000
trusted library allocation
page read and write
19FF63F6000
trusted library allocation
page read and write
19FF8221000
trusted library allocation
page read and write
19FF6C40000
trusted library allocation
page read and write
19FF79DC000
trusted library allocation
page read and write
19FF7713000
trusted library allocation
page read and write
19FF79F5000
trusted library allocation
page read and write
19FFF8DA000
trusted library allocation
page read and write
19FF6B91000
trusted library allocation
page read and write
1A001D98000
trusted library allocation
page read and write
19FFDAF7000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FFF364000
trusted library allocation
page read and write
1A5632E9000
trusted library allocation
page read and write
DAF5FD8000
stack
page read and write
19FFF981000
trusted library allocation
page read and write
214A1EA0000
heap
page read and write
1A0020F1000
trusted library allocation
page read and write
19FF7B66000
trusted library allocation
page read and write
19FFDDEE000
trusted library allocation
page read and write
19FF632A000
trusted library allocation
page read and write
2BFE5885000
heap
page read and write
19FEC691000
heap
page read and write
19FEC68B000
heap
page read and write
19FF17E9000
trusted library allocation
page read and write
1A562E87000
remote allocation
page execute read
19FF5311000
trusted library allocation
page read and write
19FFDCC8000
trusted library allocation
page read and write
214A1F98000
heap
page read and write
19FEC6B5000
heap
page read and write
1A001ED9000
trusted library allocation
page read and write
19FF6C60000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
1A001D60000
trusted library allocation
page read and write
214A13EB000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FEC692000
heap
page read and write
19FEC6F9000
heap
page read and write
19FF574E000
trusted library allocation
page read and write
1A0004A3000
trusted library allocation
page read and write
1FF421B0000
heap
page read and write
19FF9F0F000
trusted library allocation
page read and write
1A56341D000
trusted library allocation
page read and write
2BFE5900000
trusted library allocation
page read and write
19FF53C9000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FFF364000
trusted library allocation
page read and write
2BFE71B1000
heap
page read and write
19FEC695000
heap
page read and write
19FF5E94000
trusted library allocation
page read and write
19FF6362000
trusted library allocation
page read and write
19FF7627000
trusted library allocation
page read and write
19FF2AF7000
trusted library allocation
page read and write
19FF6360000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FFF99F000
trusted library allocation
page read and write
19FF77AB000
trusted library allocation
page read and write
19FF6393000
trusted library allocation
page read and write
19FF74F4000
trusted library allocation
page read and write
19FFB6A1000
trusted library allocation
page read and write
1A001E96000
trusted library allocation
page read and write
83910B7000
stack
page read and write
198522D7000
trusted library allocation
page read and write
19FF6372000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF80BC000
trusted library allocation
page read and write
19FF8217000
trusted library allocation
page read and write
19FF62BF000
trusted library allocation
page read and write
19FF73B5000
trusted library allocation
page read and write
19FEC694000
heap
page read and write
19851E3C000
remote allocation
page execute read
19FF631E000
trusted library allocation
page read and write
19FF5695000
heap
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FEC730000
heap
page read and write
19FEC696000
heap
page read and write
19FF2C54000
trusted library allocation
page read and write
19FEC685000
heap
page read and write
19FEC6EF000
heap
page read and write
19FF5BE9000
trusted library allocation
page read and write
19FF6C5B000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF5726000
trusted library allocation
page read and write
1A563223000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF7946000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FF762B000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF829A000
trusted library allocation
page read and write
19FF7541000
trusted library allocation
page read and write
19FF7F9E000
trusted library allocation
page read and write
19FFD9FD000
trusted library allocation
page read and write
19FFDB65000
trusted library allocation
page read and write
19FF2A73000
trusted library allocation
page read and write
19FF2A5E000
trusted library allocation
page read and write
19FEC6B6000
heap
page read and write
1A000301000
heap
page read and write
19FF533B000
trusted library allocation
page read and write
1A001E3A000
trusted library allocation
page read and write
1080000
heap
page read and write
19FF63C0000
trusted library allocation
page read and write
1A001DEE000
trusted library allocation
page read and write
19FF9533000
trusted library allocation
page read and write
19FF766B000
trusted library allocation
page read and write
19FF5031000
trusted library allocation
page read and write
1A0013CF000
trusted library allocation
page read and write
19FF6E6B000
trusted library allocation
page read and write
19FF78BF000
trusted library allocation
page read and write
19FF9B18000
trusted library allocation
page read and write
19FF858C000
trusted library allocation
page read and write
1A001EE6000
trusted library allocation
page read and write
19FF6B61000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
214A1880000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF78C2000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC6A2000
heap
page read and write
19FEC6A0000
heap
page read and write
19FF6C73000
trusted library allocation
page read and write
19FF7756000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
19FF633F000
trusted library allocation
page read and write
19FF74AC000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF75D1000
trusted library allocation
page read and write
19FF90C8000
trusted library allocation
page read and write
19FF71B2000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF6C40000
trusted library allocation
page read and write
19FF7642000
trusted library allocation
page read and write
19FF568B000
heap
page read and write
19FF80D8000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FFF99F000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
214A19A0000
heap
page read and write
19FFDCDD000
trusted library allocation
page read and write
19FF7CE3000
trusted library allocation
page read and write
19FF76E8000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
33EE5BE000
unkown
page readonly
19FF6CC3000
trusted library allocation
page read and write
19FF6C50000
trusted library allocation
page read and write
214A1FA7000
heap
page read and write
19FF5E6D000
trusted library allocation
page read and write
19FF733B000
trusted library allocation
page read and write
19FF7955000
trusted library allocation
page read and write
19FF7751000
trusted library allocation
page read and write
19FF85BD000
trusted library allocation
page read and write
1A001AD2000
trusted library allocation
page read and write
19FF825E000
trusted library allocation
page read and write
19FFDC38000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
19FF6F0E000
trusted library allocation
page read and write
19FF91A1000
trusted library allocation
page read and write
19FF7166000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
1A001ED9000
trusted library allocation
page read and write
19FF2A99000
trusted library allocation
page read and write
19FFF600000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FF6B6B000
trusted library allocation
page read and write
19FFF348000
trusted library allocation
page read and write
19FF5690000
heap
page read and write
214A12C0000
trusted library allocation
page read and write
19FF764F000
trusted library allocation
page read and write
19FF6341000
trusted library allocation
page read and write
19FFDB55000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
19FF918E000
trusted library allocation
page read and write
19FF76B0000
trusted library allocation
page read and write
19FFDCD9000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF7578000
trusted library allocation
page read and write
214A1365000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FF715A000
trusted library allocation
page read and write
214A1284000
heap
page read and write
19FF6C5F000
trusted library allocation
page read and write
19FFDCDD000
trusted library allocation
page read and write
19FF75AB000
trusted library allocation
page read and write
19FF6C73000
trusted library allocation
page read and write
1A0005AC000
trusted library allocation
page read and write
19FF5B52000
trusted library allocation
page read and write
10B2000
heap
page read and write
19FFDCD3000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
3850000
heap
page read and write
214A1300000
trusted library allocation
page read and write
19FEC6B3000
heap
page read and write
19FFDC14000
trusted library allocation
page read and write
19FF54C1000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FF77F7000
trusted library allocation
page read and write
19FF6BC0000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
19FF2CBA000
trusted library allocation
page read and write
19FF80C2000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF5EF4000
trusted library allocation
page read and write
19FF795E000
trusted library allocation
page read and write
19FF79E6000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF6365000
trusted library allocation
page read and write
19FF7179000
trusted library allocation
page read and write
19FF79E8000
trusted library allocation
page read and write
19FF770B000
trusted library allocation
page read and write
19FF1081000
trusted library allocation
page read and write
19FFFC82000
trusted library allocation
page read and write
DAF6FFE000
stack
page read and write
19FF6D57000
trusted library allocation
page read and write
19FEC6A3000
heap
page read and write
19FF539E000
trusted library allocation
page read and write
2BFE5680000
heap
page read and write
19FF639A000
trusted library allocation
page read and write
19FF5736000
trusted library allocation
page read and write
19FF10B3000
trusted library allocation
page read and write
19FEC6B3000
heap
page read and write
19FEC695000
heap
page read and write
19FEC6A2000
heap
page read and write
19FEC6EF000
heap
page read and write
19FF6FDF000
trusted library allocation
page read and write
19FF5325000
trusted library allocation
page read and write
19FEC691000
heap
page read and write
19FF7EBB000
trusted library allocation
page read and write
33EE57D000
stack
page read and write
19851E20000
remote allocation
page read and write
214A135C000
trusted library allocation
page read and write
1A00178A000
trusted library allocation
page read and write
19FF7691000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC68B000
heap
page read and write
1A0017AC000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FFD94C000
trusted library allocation
page read and write
19FF6C5B000
trusted library allocation
page read and write
19FF78AD000
trusted library allocation
page read and write
19FF7202000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
214A13CF000
trusted library allocation
page read and write
19FF5914000
trusted library allocation
page read and write
1A001AE9000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FFD922000
trusted library allocation
page read and write
19FF8290000
trusted library allocation
page read and write
19FEC6A1000
heap
page read and write
19FF7C9F000
trusted library allocation
page read and write
19FF2A73000
trusted library allocation
page read and write
19FF73AC000
trusted library allocation
page read and write
1A001EF2000
trusted library allocation
page read and write
19FF71BC000
trusted library allocation
page read and write
CD1000
unkown
page execute read
1A0003E1000
heap
page read and write
19FEC69F000
heap
page read and write
19FF2AB4000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FFF9E4000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF6CDD000
trusted library allocation
page read and write
19FEC67B000
heap
page read and write
214A1ECA000
heap
page read and write
1A000301000
heap
page read and write
19FF2CBA000
trusted library allocation
page read and write
19FF162F000
trusted library allocation
page read and write
19FFDCDD000
trusted library allocation
page read and write
19FFF8CC000
trusted library allocation
page read and write
DAF797E000
unkown
page readonly
19FEC6C8000
heap
page read and write
19FF5695000
heap
page read and write
19FF28B2000
trusted library allocation
page read and write
19FEC6DE000
heap
page read and write
19FEC6A3000
heap
page read and write
19FF7674000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FF5800000
trusted library allocation
page read and write
19FF6C26000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF8271000
trusted library allocation
page read and write
19FF5BBB000
trusted library allocation
page read and write
214A1F6A000
heap
page read and write
1A001AEB000
trusted library allocation
page read and write
214A1348000
trusted library allocation
page read and write
19FF5BCB000
trusted library allocation
page read and write
19FFDB5F000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF171E000
trusted library allocation
page read and write
19FEC6A7000
heap
page read and write
19FEC68E000
heap
page read and write
19FF6DB3000
trusted library allocation
page read and write
19FF6C4B000
trusted library allocation
page read and write
19FF10D4000
trusted library allocation
page read and write
19FEC738000
heap
page read and write
19FEC69A000
heap
page read and write
19FEC6F9000
heap
page read and write
19FF7958000
trusted library allocation
page read and write
214A1F31000
heap
page read and write
19FEC6AD000
heap
page read and write
19FEC692000
heap
page read and write
19FF7A83000
trusted library allocation
page read and write
19FF5369000
trusted library allocation
page read and write
19FFDA8E000
trusted library allocation
page read and write
19FFDCED000
trusted library allocation
page read and write
19FF2CA6000
trusted library allocation
page read and write
19FF502A000
trusted library allocation
page read and write
1A001E9C000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
214A1F20000
heap
page read and write
19FF76FD000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
1A563840000
heap
page read and write
19FF7C8D000
trusted library allocation
page read and write
19FFF3AE000
trusted library allocation
page read and write
19FF53CD000
trusted library allocation
page read and write
19FF109E000
trusted library allocation
page read and write
19FF857B000
trusted library allocation
page read and write
19FF6B7A000
trusted library allocation
page read and write
19FF7452000
trusted library allocation
page read and write
214A1F61000
heap
page read and write
1FF42069000
heap
page read and write
19FEC6A0000
heap
page read and write
19FF71F5000
trusted library allocation
page read and write
19FF5BAC000
trusted library allocation
page read and write
19FEC6E8000
heap
page read and write
1A001EC2000
trusted library allocation
page read and write
1A56303F000
unclassified section
page read and write
214A1EA0000
heap
page read and write
19FF6FDC000
trusted library allocation
page read and write
19FF7F1C000
trusted library allocation
page read and write
19FF77ED000
trusted library allocation
page read and write
19FF7661000
trusted library allocation
page read and write
19FFFC4D000
trusted library allocation
page read and write
19FF5B3B000
trusted library allocation
page read and write
19FF75BA000
trusted library allocation
page read and write
214A1EF2000
heap
page read and write
19FF74CE000
trusted library allocation
page read and write
19FF858C000
trusted library allocation
page read and write
19FF5BCF000
trusted library allocation
page read and write
ED0000
heap
page read and write
19FF6B91000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF5695000
heap
page read and write
1C7E000
stack
page read and write
19FF6CA8000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FF745C000
trusted library allocation
page read and write
19FF749C000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
1A56340E000
trusted library allocation
page read and write
19FFF32E000
trusted library allocation
page read and write
1A001BE3000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
2BFE569D000
heap
page read and write
19FFDB25000
trusted library allocation
page read and write
19FF5BE7000
trusted library allocation
page read and write
19FF6E73000
trusted library allocation
page read and write
19FF56B1000
heap
page read and write
19FF5BCF000
trusted library allocation
page read and write
19FF7949000
trusted library allocation
page read and write
19FF8280000
trusted library allocation
page read and write
214A1F20000
heap
page read and write
19FF53C7000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
214A1F98000
heap
page read and write
19FF6E95000
trusted library allocation
page read and write
D6C000
unkown
page readonly
19FF532A000
trusted library allocation
page read and write
19FF857D000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FFDB9F000
trusted library allocation
page read and write
1985228F000
trusted library allocation
page read and write
19FFF3AE000
trusted library allocation
page read and write
19FFDC77000
trusted library allocation
page read and write
19FFDB7F000
trusted library allocation
page read and write
19FF769A000
trusted library allocation
page read and write
19FF6AEE000
trusted library allocation
page read and write
19FF634F000
trusted library allocation
page read and write
19FF9B36000
trusted library allocation
page read and write
1A0002D9000
trusted library allocation
page read and write
19FF8262000
trusted library allocation
page read and write
214A1F20000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF6B97000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
19FF6CBC000
trusted library allocation
page read and write
19FEC694000
heap
page read and write
214A1A1F000
trusted library allocation
page read and write
214A1280000
heap
page read and write
19FFB6F9000
trusted library allocation
page read and write
19851EB3000
heap
page read and write
1A00038B000
heap
page read and write
19FF6D47000
trusted library allocation
page read and write
1A001AB0000
trusted library allocation
page read and write
19FF56A9000
heap
page read and write
1A001BB3000
trusted library allocation
page read and write
19FF5BD5000
trusted library allocation
page read and write
19FF7745000
trusted library allocation
page read and write
19FF6B33000
trusted library allocation
page read and write
19FF5BB4000
trusted library allocation
page read and write
1A563200000
trusted library allocation
page read and write
19FF5E35000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF5994000
trusted library allocation
page read and write
19FF78C4000
trusted library allocation
page read and write
19FF77C2000
trusted library allocation
page read and write
19FF17F6000
trusted library allocation
page read and write
19FEC701000
heap
page read and write
214A1E9C000
heap
page read and write
19FF5041000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
214A1EA9000
heap
page read and write
19FF62D0000
trusted library allocation
page read and write
19FF536F000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF5654000
heap
page read and write
19FFF378000
trusted library allocation
page read and write
19FF82F8000
trusted library allocation
page read and write
19FF7AFD000
trusted library allocation
page read and write
19FFF342000
trusted library allocation
page read and write
19FF91CA000
trusted library allocation
page read and write
19FF5E52000
trusted library allocation
page read and write
19FF857B000
trusted library allocation
page read and write
187E000
stack
page read and write
19FFDAA7000
trusted library allocation
page read and write
19FF9F38000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
19FF6CA8000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FFF94F000
trusted library allocation
page read and write
19FF28AB000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FF8070000
trusted library allocation
page read and write
19FEC710000
heap
page read and write
19FFFC0A000
trusted library allocation
page read and write
19FF863A000
trusted library allocation
page read and write
19FF77AB000
trusted library allocation
page read and write
19FFDD83000
trusted library allocation
page read and write
C44B7FF000
stack
page read and write
19FF53DE000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
1A563100000
trusted library allocation
page read and write
1A001A96000
trusted library allocation
page read and write
19FF5E20000
trusted library allocation
page read and write
19FF76A8000
trusted library allocation
page read and write
19FF56A8000
heap
page read and write
19FF75E5000
trusted library allocation
page read and write
19FF7147000
trusted library allocation
page read and write
19FF28CB000
trusted library allocation
page read and write
214A13B1000
trusted library allocation
page read and write
198522AC000
trusted library allocation
page read and write
19FF6C1B000
trusted library allocation
page read and write
19FF5BB9000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
214A19C0000
heap
page read and write
19FF77BA000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF1717000
trusted library allocation
page read and write
19FFDABB000
trusted library allocation
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
214A1EA0000
heap
page read and write
1A0013AE000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF769C000
trusted library allocation
page read and write
19FEC738000
heap
page read and write
19FF71BC000
trusted library allocation
page read and write
19FF6B43000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF9F51000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
2BFE56BC000
heap
page read and write
19FFDC88000
trusted library allocation
page read and write
19FFDDE6000
trusted library allocation
page read and write
1A001D6B000
trusted library allocation
page read and write
19FF532A000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF8276000
trusted library allocation
page read and write
2BFE71BE000
heap
page read and write
19FFDC2C000
trusted library allocation
page read and write
19FF59AC000
trusted library allocation
page read and write
19FF5BC2000
trusted library allocation
page read and write
DAF89FE000
unkown
page readonly
19FF769F000
trusted library allocation
page read and write
1A001E9C000
trusted library allocation
page read and write
19FF9F38000
trusted library allocation
page read and write
19FF7963000
trusted library allocation
page read and write
19FF62D2000
trusted library allocation
page read and write
19FEC6CC000
heap
page read and write
19FEC6A5000
heap
page read and write
1A00038D000
heap
page read and write
19FEC6A2000
heap
page read and write
1A001D9C000
trusted library allocation
page read and write
19FF5B99000
trusted library allocation
page read and write
19FF5697000
heap
page read and write
19FFDBF9000
trusted library allocation
page read and write
19FF6B7A000
trusted library allocation
page read and write
19FF63AF000
trusted library allocation
page read and write
19FEC715000
heap
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FEC6E9000
heap
page read and write
19FFD9DE000
trusted library allocation
page read and write
1A002105000
trusted library allocation
page read and write
19FFF854000
trusted library allocation
page read and write
19FF56E0000
heap
page read and write
19FF78AD000
trusted library allocation
page read and write
19FF176B000
trusted library allocation
page read and write
19FF76EA000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
19FF77A8000
trusted library allocation
page read and write
19FF6338000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FEC6A1000
heap
page read and write
19FF5BDF000
trusted library allocation
page read and write
1A001E8B000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF712D000
trusted library allocation
page read and write
19FF6C58000
trusted library allocation
page read and write
19FF8617000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF5362000
trusted library allocation
page read and write
19FF6D39000
trusted library allocation
page read and write
19FF7AC5000
trusted library allocation
page read and write
19FF6C40000
trusted library allocation
page read and write
BBE000
stack
page read and write
19FF765A000
trusted library allocation
page read and write
19FF8519000
trusted library allocation
page read and write
19FF74E3000
trusted library allocation
page read and write
19FF74F1000
trusted library allocation
page read and write
19FF5A6E000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF818F000
trusted library allocation
page read and write
19FF6B72000
trusted library allocation
page read and write
19FEC6A3000
heap
page read and write
19FEC69B000
heap
page read and write
19FF7192000
trusted library allocation
page read and write
19FFF35A000
trusted library allocation
page read and write
19FFDC73000
trusted library allocation
page read and write
19FF28AD000
trusted library allocation
page read and write
19851E80000
heap
page read and write
19FF79FB000
trusted library allocation
page read and write
10A3000
heap
page read and write
19FF1766000
trusted library allocation
page read and write
19FF53C9000
trusted library allocation
page read and write
19FFDA8B000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FF5695000
heap
page read and write
19FF5ACB000
trusted library allocation
page read and write
1A000657000
trusted library allocation
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FF6C9E000
trusted library allocation
page read and write
1A001E9C000
trusted library allocation
page read and write
33EF5BE000
unkown
page readonly
19FEC6A5000
heap
page read and write
19FF2A86000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF74EC000
trusted library allocation
page read and write
19FEC69A000
heap
page read and write
19FEC692000
heap
page read and write
1A001A85000
trusted library allocation
page read and write
19FF5A8A000
trusted library allocation
page read and write
1A001BC9000
trusted library allocation
page read and write
19FFDC53000
trusted library allocation
page read and write
19FFDAF0000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
1A001B86000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF2AF7000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FF6BD1000
trusted library allocation
page read and write
19FF5697000
heap
page read and write
19FEC693000
heap
page read and write
19FF74AC000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC6DC000
heap
page read and write
19FFD925000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC69F000
heap
page read and write
19FF6E5D000
trusted library allocation
page read and write
19FF7665000
trusted library allocation
page read and write
19FF7962000
trusted library allocation
page read and write
214A1F26000
heap
page read and write
19FF74FE000
trusted library allocation
page read and write
19FF757C000
trusted library allocation
page read and write
1A563296000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF78B4000
trusted library allocation
page read and write
19FF5098000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FF6B72000
trusted library allocation
page read and write
19FF7141000
trusted library allocation
page read and write
1A001E8B000
trusted library allocation
page read and write
19FF6CD9000
trusted library allocation
page read and write
19FFDC84000
trusted library allocation
page read and write
19FF857D000
trusted library allocation
page read and write
1A001AC3000
trusted library allocation
page read and write
19FF77DC000
trusted library allocation
page read and write
19FF2AE1000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FEC6A0000
heap
page read and write
19FEC69A000
heap
page read and write
19FF2AB2000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FF742A000
trusted library allocation
page read and write
19FFDAB2000
trusted library allocation
page read and write
214A1EE1000
heap
page read and write
19FF7124000
trusted library allocation
page read and write
1A563272000
trusted library allocation
page read and write
1A0005A7000
trusted library allocation
page read and write
19FF571E000
trusted library allocation
page read and write
19FFD952000
trusted library allocation
page read and write
19FFD92E000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19852282000
trusted library allocation
page read and write
19852030000
heap
page read and write
19FEC695000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF7691000
trusted library allocation
page read and write
19FF85F9000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
1A001DE3000
trusted library allocation
page read and write
83919BE000
stack
page read and write
19FEC6B5000
heap
page read and write
19FEC69C000
heap
page read and write
19FF6FC2000
trusted library allocation
page read and write
C90000
heap
page read and write
19FEC6E6000
heap
page read and write
19FF74E0000
trusted library allocation
page read and write
19FF8282000
trusted library allocation
page read and write
19FF292C000
trusted library allocation
page read and write
1A562E00000
unclassified section
page readonly
19FF10C0000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
214A1080000
heap
page read and write
19FFF8FB000
trusted library allocation
page read and write
1A001E9C000
trusted library allocation
page read and write
19FFF83F000
trusted library allocation
page read and write
10BF000
heap
page read and write
19FF5ACB000
trusted library allocation
page read and write
DA4000
unkown
page readonly
1A563032000
unclassified section
page read and write
19FF5BBF000
trusted library allocation
page read and write
19FFDB75000
trusted library allocation
page read and write
19FF8241000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FFDBEB000
trusted library allocation
page read and write
19FF2C58000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
DAF81FE000
stack
page read and write
19FF764A000
trusted library allocation
page read and write
19852070000
unclassified section
page readonly
1A0004C8000
trusted library allocation
page read and write
19FF796C000
trusted library allocation
page read and write
19FFFC3B000
trusted library allocation
page read and write
1A0002DF000
trusted library allocation
page read and write
19FF2CE9000
trusted library allocation
page read and write
1A001A6E000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FF5B8D000
trusted library allocation
page read and write
19FF78DB000
trusted library allocation
page read and write
19FF17C5000
trusted library allocation
page read and write
EA41BFF000
stack
page read and write
1A000301000
heap
page read and write
19FFDB0A000
trusted library allocation
page read and write
214A1EA0000
heap
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FF8048000
trusted library allocation
page read and write
19FF6CAA000
trusted library allocation
page read and write
19FF6CD9000
trusted library allocation
page read and write
839323E000
unkown
page readonly
19FEC6E0000
heap
page read and write
19FF91FE000
trusted library allocation
page read and write
19FF6C67000
trusted library allocation
page read and write
19FF7674000
trusted library allocation
page read and write
19FF10C0000
trusted library allocation
page read and write
19FF7616000
trusted library allocation
page read and write
19FF79FB000
trusted library allocation
page read and write
19FF1726000
trusted library allocation
page read and write
19FF5A8A000
trusted library allocation
page read and write
19FFDBF9000
trusted library allocation
page read and write
19FEC6E7000
heap
page read and write
19FF74CE000
trusted library allocation
page read and write
19FF6E6B000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF71A5000
trusted library allocation
page read and write
19FF85F9000
trusted library allocation
page read and write
19FF28A8000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF6C5E000
trusted library allocation
page read and write
19FF6C4B000
trusted library allocation
page read and write
19FF63C0000
trusted library allocation
page read and write
CD1000
unkown
page execute read
19FF5086000
trusted library allocation
page read and write
19FF8535000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF56A8000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF6FF3000
trusted library allocation
page read and write
1A001A45000
trusted library allocation
page read and write
1A001B32000
trusted library allocation
page read and write
19FF6BCB000
trusted library allocation
page read and write
19FF85D3000
trusted library allocation
page read and write
19FF6CC9000
trusted library allocation
page read and write
19FF6BC3000
trusted library allocation
page read and write
19FF6B5B000
trusted library allocation
page read and write
19FF2C54000
trusted library allocation
page read and write
19FF2A7F000
trusted library allocation
page read and write
33ECBD8000
stack
page read and write
19FFB6D9000
trusted library allocation
page read and write
10A3000
heap
page read and write
19FEC683000
heap
page read and write
19FF7679000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC6EB000
heap
page read and write
19FF77BD000
trusted library allocation
page read and write
19FF5321000
trusted library allocation
page read and write
19FF6DC8000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
19FF63F6000
trusted library allocation
page read and write
19FF6349000
trusted library allocation
page read and write
19FF9163000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FFF94B000
trusted library allocation
page read and write
214A1E41000
heap
page read and write
19FF6E93000
trusted library allocation
page read and write
19FF77A2000
trusted library allocation
page read and write
33F05BE000
unkown
page readonly
19FEC69E000
heap
page read and write
19FEC692000
heap
page read and write
838F7D8000
stack
page read and write
19FF7FE5000
trusted library allocation
page read and write
19FF801D000
trusted library allocation
page read and write
19FEC6EE000
heap
page read and write
19FF71F1000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FF5F3C000
trusted library allocation
page read and write
19FF53DE000
trusted library allocation
page read and write
19FF178C000
trusted library allocation
page read and write
19FF5BCC000
trusted library allocation
page read and write
19FF7625000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF536F000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FFB6FB000
trusted library allocation
page read and write
19FEC694000
heap
page read and write
19FF8300000
trusted library allocation
page read and write
214A1EA3000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF75EA000
trusted library allocation
page read and write
19FF85AA000
trusted library allocation
page read and write
19FFDAC1000
trusted library allocation
page read and write
8390FFE000
unkown
page readonly
19FF6A2D000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FEC6A2000
heap
page read and write
19FFF8B8000
trusted library allocation
page read and write
19FF6B93000
trusted library allocation
page read and write
19FF6FD6000
trusted library allocation
page read and write
19FF77F2000
trusted library allocation
page read and write
1A00136A000
trusted library allocation
page read and write
19FFDCFE000
trusted library allocation
page read and write
19FF5325000
trusted library allocation
page read and write
19FF6B72000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF7618000
trusted library allocation
page read and write
214A1EBF000
heap
page read and write
19FF539C000
trusted library allocation
page read and write
19FF6C56000
trusted library allocation
page read and write
19FF536F000
trusted library allocation
page read and write
19FF6C3A000
trusted library allocation
page read and write
19FF720A000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF6AA3000
trusted library allocation
page read and write
19FF7164000
trusted library allocation
page read and write
214A1286000
heap
page read and write
19FEC6E7000
heap
page read and write
19FFD92A000
trusted library allocation
page read and write
1A001EDF000
trusted library allocation
page read and write
1A001BE8000
trusted library allocation
page read and write
19FF5A8A000
trusted library allocation
page read and write
1A001DA0000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
19FFDCE6000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FF822C000
trusted library allocation
page read and write
19FF7958000
trusted library allocation
page read and write
19FF5A6B000
trusted library allocation
page read and write
19FF5E37000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF53A5000
trusted library allocation
page read and write
19FEC732000
heap
page read and write
19FFDA9F000
trusted library allocation
page read and write
19FF6397000
trusted library allocation
page read and write
19FEC687000
heap
page read and write
19FF91A9000
trusted library allocation
page read and write
1A001DF9000
trusted library allocation
page read and write
19851DC0000
unclassified section
page readonly
3851000
heap
page read and write
DAF783B000
stack
page read and write
19FF917D000
trusted library allocation
page read and write
19FF5B4D000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
19FF79BA000
trusted library allocation
page read and write
19FF2A6C000
trusted library allocation
page read and write
19FF6B7E000
trusted library allocation
page read and write
19FEC730000
heap
page read and write
19FEC6A0000
heap
page read and write
19FFB6DC000
trusted library allocation
page read and write
19FF5E2B000
trusted library allocation
page read and write
19FF597E000
trusted library allocation
page read and write
19FF803C000
trusted library allocation
page read and write
1A001EC4000
trusted library allocation
page read and write
19FF5BC5000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19852330000
heap
page read and write
19FEC6E0000
heap
page read and write
19FF5EF1000
trusted library allocation
page read and write
19FFD9DE000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FF75C3000
trusted library allocation
page read and write
19FF568E000
heap
page read and write
19FEC692000
heap
page read and write
19FF6B7E000
trusted library allocation
page read and write
19FF718B000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
19FF17D2000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF8258000
trusted library allocation
page read and write
19FF53E6000
trusted library allocation
page read and write
19FF91A6000
trusted library allocation
page read and write
19FFDAB2000
trusted library allocation
page read and write
214A1ECA000
heap
page read and write
19FF9188000
trusted library allocation
page read and write
19FF5BBB000
trusted library allocation
page read and write
19FFDDC3000
trusted library allocation
page read and write
D9C000
unkown
page write copy
19FFDCF5000
trusted library allocation
page read and write
19FF8214000
trusted library allocation
page read and write
19FF28CB000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
1A001E4E000
trusted library allocation
page read and write
1A000345000
heap
page read and write
19FEC69D000
heap
page read and write
19FEC69B000
heap
page read and write
19FF9441000
trusted library allocation
page read and write
19FEC710000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF5BB9000
trusted library allocation
page read and write
1A000606000
trusted library allocation
page read and write
10BF000
heap
page read and write
1A001DE6000
trusted library allocation
page read and write
19FF5BE9000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF50AC000
trusted library allocation
page read and write
19FF91BB000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF77BD000
trusted library allocation
page read and write
19FFDABC000
trusted library allocation
page read and write
19FF5BBB000
trusted library allocation
page read and write
19FFF870000
trusted library allocation
page read and write
19FF93A2000
trusted library allocation
page read and write
1A000F80000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF952C000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
19FEC6E0000
heap
page read and write
19FF8647000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF77FC000
trusted library allocation
page read and write
1A001A34000
trusted library allocation
page read and write
1A001EF5000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FFF35D000
trusted library allocation
page read and write
19FF6CB1000
trusted library allocation
page read and write
19FF50B7000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
1A5632A7000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FF7933000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF7DF4000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FF7CB7000
trusted library allocation
page read and write
1A000301000
heap
page read and write
19FF7E09000
trusted library allocation
page read and write
19FF7F7B000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FEC6E8000
heap
page read and write
19FFD9DE000
trusted library allocation
page read and write
1A000548000
trusted library allocation
page read and write
214A1F28000
heap
page read and write
1A001A23000
trusted library allocation
page read and write
19FF7679000
trusted library allocation
page read and write
19FF6C40000
trusted library allocation
page read and write
19FF6C3B000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
1A563210000
trusted library allocation
page read and write
1A56308A000
heap
page read and write
19FF7F7D000
trusted library allocation
page read and write
19FF8278000
trusted library allocation
page read and write
19FF75BA000
trusted library allocation
page read and write
19FFF824000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FFF8D0000
trusted library allocation
page read and write
19FF78EC000
trusted library allocation
page read and write
19FF82DB000
trusted library allocation
page read and write
19FFDDCA000
trusted library allocation
page read and write
19FF5BB9000
trusted library allocation
page read and write
1A001B60000
trusted library allocation
page read and write
19FF562F000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF5EF8000
trusted library allocation
page read and write
1A001BE8000
trusted library allocation
page read and write
19FF59C4000
trusted library allocation
page read and write
8392A3E000
stack
page read and write
19FF10EF000
trusted library allocation
page read and write
19FFDBEB000
trusted library allocation
page read and write
214A1F28000
heap
page read and write
19FF81D7000
trusted library allocation
page read and write
19FF6377000
trusted library allocation
page read and write
19FFDAFC000
trusted library allocation
page read and write
10AF000
heap
page read and write
19FF5BFC000
trusted library allocation
page read and write
19FF77D1000
trusted library allocation
page read and write
19FFDCE8000
trusted library allocation
page read and write
19FF6B33000
trusted library allocation
page read and write
1A001BF5000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
19FF2CAD000
trusted library allocation
page read and write
19FF26CA000
trusted library allocation
page read and write
19FF572B000
trusted library allocation
page read and write
19FF17B8000
trusted library allocation
page read and write
19FF2CC3000
trusted library allocation
page read and write
19FEC6B8000
heap
page read and write
19FF63A7000
trusted library allocation
page read and write
19FF5369000
trusted library allocation
page read and write
19FEC6B0000
heap
page read and write
19FF5B39000
trusted library allocation
page read and write
19FF6B4F000
trusted library allocation
page read and write
214A1369000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FEC6AA000
heap
page read and write
19FF71F9000
trusted library allocation
page read and write
19FF73C8000
trusted library allocation
page read and write
19FF73A3000
trusted library allocation
page read and write
19FF85CF000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF6CC9000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF77AB000
trusted library allocation
page read and write
19FEC6F6000
heap
page read and write
19FF9CF8000
heap
page read and write
1A0002B7000
trusted library allocation
page read and write
19FF814F000
trusted library allocation
page read and write
19FF573D000
trusted library allocation
page read and write
19FFD9A7000
trusted library allocation
page read and write
19FF9F38000
trusted library allocation
page read and write
19FF7974000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF867C000
trusted library allocation
page read and write
19FF9D09000
heap
page read and write
19FFDAD6000
trusted library allocation
page read and write
19FFDC3C000
trusted library allocation
page read and write
19FF8072000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF7745000
trusted library allocation
page read and write
19FF7CD0000
trusted library allocation
page read and write
19FF7137000
trusted library allocation
page read and write
19FF9B27000
trusted library allocation
page read and write
1A00138E000
trusted library allocation
page read and write
19FF10C0000
trusted library allocation
page read and write
1A00027E000
trusted library allocation
page read and write
19FF5EEF000
trusted library allocation
page read and write
19FF77E2000
trusted library allocation
page read and write
1A001705000
trusted library allocation
page read and write
19FF539E000
trusted library allocation
page read and write
19FF537F000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FEC6E6000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF6C50000
trusted library allocation
page read and write
19FEC701000
heap
page read and write
19FF50BB000
trusted library allocation
page read and write
19FF7F18000
trusted library allocation
page read and write
19FF53B6000
trusted library allocation
page read and write
1A001AD2000
trusted library allocation
page read and write
19FF8583000
trusted library allocation
page read and write
19FF6B97000
trusted library allocation
page read and write
19FFDAA7000
trusted library allocation
page read and write
1A001BF5000
trusted library allocation
page read and write
19FF5ACB000
trusted library allocation
page read and write
19FF10EF000
trusted library allocation
page read and write
214A1F31000
heap
page read and write
19FFDA99000
trusted library allocation
page read and write
19FF18C3000
trusted library allocation
page read and write
19FFDB15000
trusted library allocation
page read and write
19FEC732000
heap
page read and write
214A1FA7000
heap
page read and write
1A001DA4000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF6C36000
trusted library allocation
page read and write
19FF5964000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF79FB000
trusted library allocation
page read and write
19FF53F0000
trusted library allocation
page read and write
19FFDA49000
trusted library allocation
page read and write
19FF6BE1000
trusted library allocation
page read and write
19FF2C9C000
trusted library allocation
page read and write
C44BFFF000
stack
page read and write
19FF91C4000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FF76E0000
trusted library allocation
page read and write
19FF2AF7000
trusted library allocation
page read and write
19FFDCD7000
trusted library allocation
page read and write
19FF94E4000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19FFF943000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FF78FB000
trusted library allocation
page read and write
19FF2A70000
trusted library allocation
page read and write
19FF6C73000
trusted library allocation
page read and write
214A1F3D000
heap
page read and write
19FF77DC000
trusted library allocation
page read and write
2BFE56BA000
heap
page read and write
19FFDAD5000
trusted library allocation
page read and write
19FF7155000
trusted library allocation
page read and write
19FFFC3B000
trusted library allocation
page read and write
19FFDE00000
trusted library allocation
page read and write
19FEC6A7000
heap
page read and write
19FF7207000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
1A000301000
heap
page read and write
19FFDCB8000
trusted library allocation
page read and write
19FF6B93000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
19FF536C000
trusted library allocation
page read and write
19FEC6A3000
heap
page read and write
1A0013B3000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
214A1F98000
heap
page read and write
19FF85BD000
trusted library allocation
page read and write
19FF769F000
trusted library allocation
page read and write
19FF53CD000
trusted library allocation
page read and write
1A001DE3000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FF2860000
trusted library allocation
page read and write
1A00138C000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF28CE000
trusted library allocation
page read and write
1A001AC3000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FEC694000
heap
page read and write
19FFD832000
trusted library allocation
page read and write
19FF8300000
trusted library allocation
page read and write
19FF598D000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
1A000273000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF50B2000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
1A00218A000
trusted library allocation
page read and write
2BFE56B2000
heap
page read and write
19FF8040000
trusted library allocation
page read and write
19FF800D000
trusted library allocation
page read and write
19FF53C7000
trusted library allocation
page read and write
19FF10CE000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
19FF79E8000
trusted library allocation
page read and write
19FF767C000
trusted library allocation
page read and write
19FF719C000
trusted library allocation
page read and write
19FF8024000
trusted library allocation
page read and write
19FF6C4B000
trusted library allocation
page read and write
19FFF834000
trusted library allocation
page read and write
19FEC69D000
heap
page read and write
19FF5E63000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FFFC4D000
trusted library allocation
page read and write
214A1A1C000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
19FEC6C3000
heap
page read and write
19FF758C000
trusted library allocation
page read and write
19FF633F000
trusted library allocation
page read and write
214A1376000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
19FF5BD8000
trusted library allocation
page read and write
19FF5BE7000
trusted library allocation
page read and write
19FFD935000
trusted library allocation
page read and write
1A563279000
trusted library allocation
page read and write
19FF7CC6000
trusted library allocation
page read and write
1A00211C000
trusted library allocation
page read and write
19FF6A2B000
trusted library allocation
page read and write
19FF79F5000
trusted library allocation
page read and write
19FFDACD000
trusted library allocation
page read and write
19FF633D000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FEC6B0000
heap
page read and write
19FF80D8000
trusted library allocation
page read and write
19FFDA47000
trusted library allocation
page read and write
19FF78EC000
trusted library allocation
page read and write
19FF53DE000
trusted library allocation
page read and write
19FF5BC2000
trusted library allocation
page read and write
1A001E99000
trusted library allocation
page read and write
19FFDCED000
trusted library allocation
page read and write
19FF77DF000
trusted library allocation
page read and write
10B1000
heap
page read and write
19FFDBC7000
trusted library allocation
page read and write
19FF6B8D000
trusted library allocation
page read and write
19FF865D000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF825A000
trusted library allocation
page read and write
19FFB644000
trusted library allocation
page read and write
19FF78A3000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF598D000
trusted library allocation
page read and write
19FFF388000
trusted library allocation
page read and write
19FF6BE1000
trusted library allocation
page read and write
1A001E7F000
trusted library allocation
page read and write
19FF56A8000
heap
page read and write
19FEC69B000
heap
page read and write
1A563432000
trusted library allocation
page read and write
19FF77BA000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF82D3000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19852507000
trusted library allocation
page read and write
19FF53C9000
trusted library allocation
page read and write
19FF6B97000
trusted library allocation
page read and write
19FFDCBF000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
1A001AC3000
trusted library allocation
page read and write
19FF6C6D000
trusted library allocation
page read and write
19FF9B15000
trusted library allocation
page read and write
19FF9F38000
trusted library allocation
page read and write
19FF5E12000
trusted library allocation
page read and write
19FF9F28000
trusted library allocation
page read and write
19FF858C000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC69E000
heap
page read and write
19FFDDAA000
trusted library allocation
page read and write
214A1EEA000
heap
page read and write
19FEC695000
heap
page read and write
19FF7581000
trusted library allocation
page read and write
19FFF392000
trusted library allocation
page read and write
19FF82DB000
trusted library allocation
page read and write
19FEC68B000
heap
page read and write
19FEC695000
heap
page read and write
EB4000
heap
page read and write
19FEC6B0000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF78C2000
trusted library allocation
page read and write
19FF9405000
trusted library allocation
page read and write
19FF7E09000
trusted library allocation
page read and write
19FEC687000
heap
page read and write
1A563212000
trusted library allocation
page read and write
214A1EAC000
heap
page read and write
19FF53C7000
trusted library allocation
page read and write
19FEC69A000
heap
page read and write
19FEC6A7000
heap
page read and write
1A001BA9000
trusted library allocation
page read and write
19FF534C000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
1A001ED7000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FFB6A3000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF6CDD000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FEC6EF000
heap
page read and write
19FF7B6E000
trusted library allocation
page read and write
19FFF8CD000
trusted library allocation
page read and write
19FFDCE6000
trusted library allocation
page read and write
19FFDC1B000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FF7160000
trusted library allocation
page read and write
19FF82D3000
trusted library allocation
page read and write
19FF5908000
trusted library allocation
page read and write
EA42BFE000
stack
page read and write
19FFFC20000
trusted library allocation
page read and write
19852216000
trusted library allocation
page read and write
19FF7764000
trusted library allocation
page read and write
19FF17F6000
trusted library allocation
page read and write
19FFDABB000
trusted library allocation
page read and write
19FF5377000
trusted library allocation
page read and write
19FFF93B000
trusted library allocation
page read and write
19FF6CBF000
trusted library allocation
page read and write
19FF9CF8000
heap
page read and write
19FF826D000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF7187000
trusted library allocation
page read and write
19FF9F31000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF7963000
trusted library allocation
page read and write
19FF5039000
trusted library allocation
page read and write
19FF5BD5000
trusted library allocation
page read and write
1A000275000
trusted library allocation
page read and write
19FF7618000
trusted library allocation
page read and write
19FF177F000
trusted library allocation
page read and write
19FEC710000
heap
page read and write
214A1F99000
heap
page read and write
19FF6C73000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
19FF17E9000
trusted library allocation
page read and write
19FF91C7000
trusted library allocation
page read and write
19FF82DB000
trusted library allocation
page read and write
19FF76FD000
trusted library allocation
page read and write
19FFDC73000
trusted library allocation
page read and write
19FF53DE000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF77F7000
trusted library allocation
page read and write
19FF85B4000
trusted library allocation
page read and write
19FF7488000
trusted library allocation
page read and write
19FF5A6F000
trusted library allocation
page read and write
1A001750000
trusted library allocation
page read and write
19FFDCDD000
trusted library allocation
page read and write
19FF82D3000
trusted library allocation
page read and write
19FF769F000
trusted library allocation
page read and write
19851E60000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF6BC3000
trusted library allocation
page read and write
19FF5362000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
1A002084000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FFF8C1000
trusted library allocation
page read and write
214A1100000
trusted library allocation
page read and write
19FFDCE6000
trusted library allocation
page read and write
1A0013FD000
trusted library allocation
page read and write
19FFF985000
trusted library allocation
page read and write
19FF63C3000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC69B000
heap
page read and write
19FF6A2B000
trusted library allocation
page read and write
19FF7949000
trusted library allocation
page read and write
198522C4000
trusted library allocation
page read and write
19FFD9E1000
trusted library allocation
page read and write
19FFF92F000
trusted library allocation
page read and write
1A0002B6000
trusted library allocation
page read and write
1A563080000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF6D2F000
trusted library allocation
page read and write
19FF6FAB000
trusted library allocation
page read and write
19FF866C000
trusted library allocation
page read and write
1A001E99000
trusted library allocation
page read and write
19FF6C3A000
trusted library allocation
page read and write
19FEC6F4000
heap
page read and write
19FF6EFE000
trusted library allocation
page read and write
CD0000
unkown
page readonly
1A00138C000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
19FF2A4E000
trusted library allocation
page read and write
214A1E8D000
heap
page read and write
17434EB03000
trusted library allocation
page read and write
19FF6C56000
trusted library allocation
page read and write
1A001EB2000
trusted library allocation
page read and write
19FF8193000
trusted library allocation
page read and write
19FF713D000
trusted library allocation
page read and write
BEF000
stack
page read and write
19FF7F22000
trusted library allocation
page read and write
DAF78FE000
unkown
page readonly
1A001E96000
trusted library allocation
page read and write
19FF71D2000
trusted library allocation
page read and write
19FF76DD000
trusted library allocation
page read and write
19FFDB7D000
trusted library allocation
page read and write
19FF77A7000
trusted library allocation
page read and write
214A0F50000
unclassified section
page readonly
19FF5EDF000
trusted library allocation
page read and write
19FF50D9000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19FF80C2000
trusted library allocation
page read and write
19FF501F000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF6C4B000
trusted library allocation
page read and write
19FF77D1000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF7E48000
trusted library allocation
page read and write
19FF6D83000
trusted library allocation
page read and write
19FFF983000
trusted library allocation
page read and write
19FF74F4000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF62BB000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
1985225F000
trusted library allocation
page read and write
10BF000
heap
page read and write
19FF2C8B000
trusted library allocation
page read and write
19FF2C3E000
trusted library allocation
page read and write
19FF7445000
trusted library allocation
page read and write
1A001322000
trusted library allocation
page read and write
1A20003F000
trusted library allocation
page read and write
19FF73C5000
trusted library allocation
page read and write
19FFDCBF000
trusted library allocation
page read and write
19FF85F9000
trusted library allocation
page read and write
1A001AD2000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FF6CAA000
trusted library allocation
page read and write
19FFDDE2000
trusted library allocation
page read and write
DAF793E000
stack
page read and write
2BFE71C0000
heap
page read and write
214A130C000
trusted library allocation
page read and write
19FF7933000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FE7241000
heap
page read and write
19FF6B82000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF6BAE000
trusted library allocation
page read and write
19FF6BAD000
trusted library allocation
page read and write
19FFF394000
trusted library allocation
page read and write
19FF564F000
heap
page read and write
19FFFC8C000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FF93E5000
trusted library allocation
page read and write
BFE000
stack
page read and write
10A7000
heap
page read and write
1A001383000
trusted library allocation
page read and write
19FF5BDF000
trusted library allocation
page read and write
1A001737000
trusted library allocation
page read and write
33EFDBE000
stack
page read and write
19FF50A8000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FF6E8E000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC692000
heap
page read and write
19FF6AAE000
trusted library allocation
page read and write
19FF6393000
trusted library allocation
page read and write
19FF90BB000
trusted library allocation
page read and write
19FF744F000
trusted library allocation
page read and write
19FF719F000
trusted library allocation
page read and write
214A1E49000
heap
page read and write
19FF9557000
trusted library allocation
page read and write
19FFDA91000
trusted library allocation
page read and write
19FF503E000
trusted library allocation
page read and write
19FF77FC000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF77F7000
trusted library allocation
page read and write
214A1F98000
heap
page read and write
19FF5BA8000
trusted library allocation
page read and write
19FF9F4D000
trusted library allocation
page read and write
19FF823B000
trusted library allocation
page read and write
214A1F61000
heap
page read and write
19FF5BF4000
trusted library allocation
page read and write
10C7000
heap
page read and write
19FF7F1D000
trusted library allocation
page read and write
1A000298000
trusted library allocation
page read and write
1A00062E000
trusted library allocation
page read and write
19FFDCF2000
trusted library allocation
page read and write
19FFD92A000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC68C000
heap
page read and write
19FFDD91000
trusted library allocation
page read and write
19FF85EF000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF53E2000
trusted library allocation
page read and write
19FF6C1B000
trusted library allocation
page read and write
19FEC686000
heap
page read and write
19FFB6D1000
trusted library allocation
page read and write
19FF5BDC000
trusted library allocation
page read and write
1A562FA0000
heap
page read and write
19FF6380000
trusted library allocation
page read and write
19FF73A3000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FEC6A5000
heap
page read and write
96CCBB1000
trusted library allocation
page execute read
19FF6376000
trusted library allocation
page read and write
19FF7946000
trusted library allocation
page read and write
19FF7462000
trusted library allocation
page read and write
19FF71B8000
trusted library allocation
page read and write
19FF5EFE000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
214A13A7000
trusted library allocation
page read and write
19FF9F40000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FEC69C000
heap
page read and write
1A000347000
heap
page read and write
19FEC692000
heap
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FF857D000
trusted library allocation
page read and write
10AC000
heap
page read and write
19FF770F000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF53C9000
trusted library allocation
page read and write
1A563414000
trusted library allocation
page read and write
1A001EAF000
trusted library allocation
page read and write
33EE47D000
stack
page read and write
19FF71AB000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
1A001E7F000
trusted library allocation
page read and write
19FF5377000
trusted library allocation
page read and write
19FF53AE000
trusted library allocation
page read and write
19FF5EF7000
trusted library allocation
page read and write
19FF8245000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FF9093000
trusted library allocation
page read and write
19FF6C56000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC710000
heap
page read and write
19FF286F000
trusted library allocation
page read and write
19FFDCFE000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
19FFDCD0000
trusted library allocation
page read and write
1A000507000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF5A66000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FEC6AD000
heap
page read and write
19FF76E8000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF793D000
trusted library allocation
page read and write
19FF16FB000
trusted library allocation
page read and write
19FFDAE6000
trusted library allocation
page read and write
19FF768F000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF2856000
trusted library allocation
page read and write
19FF6A96000
trusted library allocation
page read and write
19FF74C4000
trusted library allocation
page read and write
19FF6332000
trusted library allocation
page read and write
19FFD939000
trusted library allocation
page read and write
19FF78C2000
trusted library allocation
page read and write
19FFDCD2000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
1985260C000
trusted library allocation
page read and write
19FFFCD5000
trusted library allocation
page read and write
214A12D2000
unkown
page execute read
19FF590D000
trusted library allocation
page read and write
19FF76ED000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19852230000
trusted library allocation
page read and write
214A12D4000
unkown
page execute read
19FF7616000
trusted library allocation
page read and write
19FEC6A7000
heap
page read and write
19FFF97D000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF5357000
trusted library allocation
page read and write
19852265000
trusted library allocation
page read and write
19FF6355000
trusted library allocation
page read and write
19FF74AC000
trusted library allocation
page read and write
19FEC701000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF71B8000
trusted library allocation
page read and write
19FF6D0D000
trusted library allocation
page read and write
19FF796C000
trusted library allocation
page read and write
19FEC6AB000
heap
page read and write
19FF77C4000
trusted library allocation
page read and write
19FF779B000
trusted library allocation
page read and write
19FF6C4B000
trusted library allocation
page read and write
19FF7390000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF5092000
trusted library allocation
page read and write
10BF000
heap
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FF6A0E000
trusted library allocation
page read and write
19FEC697000
heap
page read and write
19FEC695000
heap
page read and write
19FEC6A5000
heap
page read and write
19FF74AC000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
1A0002FE000
trusted library allocation
page read and write
19FF77F7000
trusted library allocation
page read and write
1A001E9C000
trusted library allocation
page read and write
1A563849000
heap
page read and write
19FF9B15000
trusted library allocation
page read and write
19FEC6C1000
heap
page read and write
19FF53E6000
trusted library allocation
page read and write
19FF6F24000
trusted library allocation
page read and write
19FF1800000
trusted library allocation
page read and write
214A12E0000
trusted library allocation
page read and write
19FF6BC7000
trusted library allocation
page read and write
19FFF876000
trusted library allocation
page read and write
19FF5BBF000
trusted library allocation
page read and write
1A56320D000
trusted library allocation
page read and write
19FF5BE1000
trusted library allocation
page read and write
19FF6C4D000
trusted library allocation
page read and write
19FFD977000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
BCE000
stack
page read and write
214A1FA7000
heap
page read and write
19FF56A9000
heap
page read and write
1A001EFE000
trusted library allocation
page read and write
19FFDCE8000
trusted library allocation
page read and write
EB0000
heap
page read and write
19FF76E8000
trusted library allocation
page read and write
214A1E9C000
heap
page read and write
19FFF8B8000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF6BAD000
trusted library allocation
page read and write
19FFFC24000
trusted library allocation
page read and write
19FEC691000
heap
page read and write
19851E40000
unclassified section
page readonly
1A0004E5000
trusted library allocation
page read and write
19FFDCF2000
trusted library allocation
page read and write
214A1F23000
heap
page read and write
19FF769C000
trusted library allocation
page read and write
19FFF96C000
trusted library allocation
page read and write
1A563283000
trusted library allocation
page read and write
19FF74C4000
trusted library allocation
page read and write
19FF851E000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
1A001B5C000
trusted library allocation
page read and write
19FF76DB000
trusted library allocation
page read and write
19FF78A3000
trusted library allocation
page read and write
1A5632C8000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FF562F000
heap
page read and write
1A0013FB000
trusted library allocation
page read and write
19FF6C50000
trusted library allocation
page read and write
83921BE000
unkown
page readonly
19FF50BF000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
1A0013AE000
trusted library allocation
page read and write
19FF79F5000
trusted library allocation
page read and write
19FF94A7000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF2CE0000
trusted library allocation
page read and write
19FF6CBC000
trusted library allocation
page read and write
19FFF96C000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
19FF76DD000
trusted library allocation
page read and write
DAF99FE000
unkown
page readonly
19FF17B0000
trusted library allocation
page read and write
19852249000
trusted library allocation
page read and write
1A001DF9000
trusted library allocation
page read and write
19FFF328000
trusted library allocation
page read and write
19FF2AF7000
trusted library allocation
page read and write
214A1290000
trusted library allocation
page read and write
1A5633F0000
heap
page read and write
214A132F000
trusted library allocation
page read and write
1A563269000
trusted library allocation
page read and write
19FF7615000
trusted library allocation
page read and write
19FFF81B000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FFF933000
trusted library allocation
page read and write
19FF531E000
trusted library allocation
page read and write
1A000586000
trusted library allocation
page read and write
19FF82BC000
trusted library allocation
page read and write
19FF77D5000
trusted library allocation
page read and write
19FF79EB000
trusted library allocation
page read and write
19FF7691000
trusted library allocation
page read and write
19FF2A4E000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FF7143000
trusted library allocation
page read and write
19FF828C000
trusted library allocation
page read and write
19FF2A4E000
trusted library allocation
page read and write
1A00137B000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF53B8000
trusted library allocation
page read and write
19FF502A000
trusted library allocation
page read and write
19FF5E41000
trusted library allocation
page read and write
19FF6B51000
trusted library allocation
page read and write
19FF94AC000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FEC69C000
heap
page read and write
19FF5AA2000
trusted library allocation
page read and write
19FF9198000
trusted library allocation
page read and write
1A001E7F000
trusted library allocation
page read and write
19FF5E41000
trusted library allocation
page read and write
19FEC69D000
heap
page read and write
19FF91DA000
trusted library allocation
page read and write
19FFDB7B000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF76A8000
trusted library allocation
page read and write
DA0000
unkown
page write copy
19FF5E94000
trusted library allocation
page read and write
19FF76BC000
trusted library allocation
page read and write
19FF6C73000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19FEC732000
heap
page read and write
19FF81D0000
trusted library allocation
page read and write
19FF761E000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF5B84000
trusted library allocation
page read and write
19FFF39D000
trusted library allocation
page read and write
19FFDC7A000
trusted library allocation
page read and write
2BFE5600000
heap
page read and write
19FF5088000
trusted library allocation
page read and write
19FF5BDF000
trusted library allocation
page read and write
2BFE71A0000
heap
page read and write
19FF28E2000
trusted library allocation
page read and write
19FF2AB2000
trusted library allocation
page read and write
19FF28F2000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF599A000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF5EDF000
trusted library allocation
page read and write
19FEC6F9000
heap
page read and write
19FEC692000
heap
page read and write
19FEC6DC000
heap
page read and write
C8E000
stack
page read and write
19FF77E2000
trusted library allocation
page read and write
19FF801B000
trusted library allocation
page read and write
19FF5A6E000
trusted library allocation
page read and write
19FEC681000
heap
page read and write
19FEC6A5000
heap
page read and write
19FFF93B000
trusted library allocation
page read and write
19FFDC38000
trusted library allocation
page read and write
19FFDBEB000
trusted library allocation
page read and write
19FF5E2F000
trusted library allocation
page read and write
19FF564F000
heap
page read and write
19852340000
heap
page read and write
19FFF981000
trusted library allocation
page read and write
19FF59D2000
trusted library allocation
page read and write
19FEC6AA000
heap
page read and write
19FEC6EE000
heap
page read and write
19FFDDC7000
trusted library allocation
page read and write
19FF59F7000
trusted library allocation
page read and write
3851000
heap
page read and write
33EE4BE000
unkown
page readonly
19FF503E000
trusted library allocation
page read and write
19FFF846000
trusted library allocation
page read and write
D9C000
unkown
page read and write
19FEC694000
heap
page read and write
214A1F29000
heap
page read and write
19FF2AB2000
trusted library allocation
page read and write
1985226B000
trusted library allocation
page read and write
19FF7723000
trusted library allocation
page read and write
19FF6C56000
trusted library allocation
page read and write
19FF58D3000
trusted library allocation
page read and write
19FF503E000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
214A1381000
trusted library allocation
page read and write
19FEC6A1000
heap
page read and write
1A001E99000
trusted library allocation
page read and write
19FF5041000
trusted library allocation
page read and write
19FF828C000
trusted library allocation
page read and write
19FF7B23000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FF79BA000
trusted library allocation
page read and write
10BF000
heap
page read and write
1A0013D2000
trusted library allocation
page read and write
19FF7639000
trusted library allocation
page read and write
19FF6C36000
trusted library allocation
page read and write
19FF59CF000
trusted library allocation
page read and write
19FF5050000
trusted library allocation
page read and write
19FF536F000
trusted library allocation
page read and write
19FF77EB000
trusted library allocation
page read and write
33EE3FE000
unkown
page readonly
19FEC6AD000
heap
page read and write
1A001B97000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF17D2000
trusted library allocation
page read and write
19FF79EF000
trusted library allocation
page read and write
19FF10A4000
trusted library allocation
page read and write
19FF6A10000
trusted library allocation
page read and write
19FF7151000
trusted library allocation
page read and write
1A000399000
heap
page read and write
19FFDC93000
trusted library allocation
page read and write
19FFDB46000
trusted library allocation
page read and write
19FFDCF2000
trusted library allocation
page read and write
19FF2A9A000
trusted library allocation
page read and write
214A1F7B000
heap
page read and write
19FF5A5F000
trusted library allocation
page read and write
19FEC6E4000
heap
page read and write
19FFF98B000
trusted library allocation
page read and write
19FFDDE2000
trusted library allocation
page read and write
19FF7974000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FFD91F000
trusted library allocation
page read and write
19FF91D4000
trusted library allocation
page read and write
19FF82BC000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
19FFF853000
trusted library allocation
page read and write
19FF77FC000
trusted library allocation
page read and write
19FF54FC000
trusted library allocation
page read and write
19FFDD9D000
trusted library allocation
page read and write
19FF86DE000
trusted library allocation
page read and write
19FF54C3000
trusted library allocation
page read and write
19FF6B72000
trusted library allocation
page read and write
19FF6DDA000
trusted library allocation
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FF5369000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF9486000
trusted library allocation
page read and write
19FF829A000
trusted library allocation
page read and write
214A1F3D000
heap
page read and write
1985203A000
heap
page read and write
19FF6CB2000
trusted library allocation
page read and write
19FF6DB1000
trusted library allocation
page read and write
19FF568B000
heap
page read and write
19FF857B000
trusted library allocation
page read and write
19FFB6F7000
trusted library allocation
page read and write
19FFE000000
trusted library allocation
page read and write
19FF91B5000
trusted library allocation
page read and write
19FF7146000
trusted library allocation
page read and write
19FFDCFE000
trusted library allocation
page read and write
19FF2A65000
trusted library allocation
page read and write
19FF6B7E000
trusted library allocation
page read and write
1A0013D2000
trusted library allocation
page read and write
19FEC6EB000
heap
page read and write
19FF2AF7000
trusted library allocation
page read and write
19FF5307000
trusted library allocation
page read and write
19FF5BBF000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
1A00050C000
trusted library allocation
page read and write
19FF821E000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
1A00138E000
trusted library allocation
page read and write
19FEC6CC000
heap
page read and write
19FF63AC000
trusted library allocation
page read and write
19FFF988000
trusted library allocation
page read and write
19FF56E0000
heap
page read and write
19FFD9AA000
trusted library allocation
page read and write
19FF631A000
trusted library allocation
page read and write
19FF62BD000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
19FEC697000
heap
page read and write
19FF868B000
trusted library allocation
page read and write
19FF5B4D000
trusted library allocation
page read and write
19FF568B000
heap
page read and write
19FFFC58000
trusted library allocation
page read and write
19FF8252000
trusted library allocation
page read and write
19FF81B5000
trusted library allocation
page read and write
19FF5E38000
trusted library allocation
page read and write
19FFDC8A000
trusted library allocation
page read and write
10A0000
heap
page read and write
19FF63F6000
trusted library allocation
page read and write
19FF6A7E000
trusted library allocation
page read and write
19FF7155000
trusted library allocation
page read and write
19FEC6DE000
heap
page read and write
19FFF8CC000
trusted library allocation
page read and write
19FF85C7000
trusted library allocation
page read and write
19FF5BBF000
trusted library allocation
page read and write
214A1EA9000
heap
page read and write
19FF7666000
trusted library allocation
page read and write
19FF7FED000
trusted library allocation
page read and write
1A563030000
unclassified section
page read and write
19FF531C000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF5364000
trusted library allocation
page read and write
19852276000
trusted library allocation
page read and write
19FEC6DF000
heap
page read and write
19FFDB81000
trusted library allocation
page read and write
8393A3E000
stack
page read and write
10AE000
heap
page read and write
19FF76BC000
trusted library allocation
page read and write
19FEC68B000
heap
page read and write
19FEC692000
heap
page read and write
33EE43E000
unkown
page readonly
19FF7494000
trusted library allocation
page read and write
19FF7FF7000
trusted library allocation
page read and write
19FF7FC4000
trusted library allocation
page read and write
19FEC6B2000
heap
page read and write
19FFB6DC000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FEC6E6000
heap
page read and write
19FF766B000
trusted library allocation
page read and write
19FF7733000
trusted library allocation
page read and write
19FEC6A4000
heap
page read and write
19FFA302000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF7426000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FFF947000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF6CAA000
trusted library allocation
page read and write
1A001BE8000
trusted library allocation
page read and write
19FFF8FB000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FEC6B2000
heap
page read and write
19FF5EA7000
trusted library allocation
page read and write
19FF5BDF000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF715A000
trusted library allocation
page read and write
19FFFA00000
trusted library allocation
page read and write
F10000
heap
page read and write
19FF7FB3000
trusted library allocation
page read and write
19FEC68A000
heap
page read and write
19FF9506000
trusted library allocation
page read and write
19FF5BCB000
trusted library allocation
page read and write
19FF17D5000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FF76E8000
trusted library allocation
page read and write
19FF17C5000
trusted library allocation
page read and write
19FFDCA8000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF8290000
trusted library allocation
page read and write
19FFDDE2000
trusted library allocation
page read and write
19FEC695000
heap
page read and write
19FFDBC5000
trusted library allocation
page read and write
19FF533B000
trusted library allocation
page read and write
33EDBFE000
stack
page read and write
19FF53AB000
trusted library allocation
page read and write
1A0005A3000
trusted library allocation
page read and write
1A001A57000
trusted library allocation
page read and write
19FFD9AA000
trusted library allocation
page read and write
19FF56AF000
heap
page read and write
1A001DEE000
trusted library allocation
page read and write
19FF5BF3000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
19FFDCC8000
trusted library allocation
page read and write
19FF6CC9000
trusted library allocation
page read and write
33EE53E000
unkown
page readonly
19FF7E9E000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FEC6E0000
heap
page read and write
19FF6368000
trusted library allocation
page read and write
19FF5EF8000
trusted library allocation
page read and write
19FFF8FB000
trusted library allocation
page read and write
19FF9084000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF7517000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
19FF6BC3000
trusted library allocation
page read and write
19FEC736000
heap
page read and write
19FF764A000
trusted library allocation
page read and write
19FF85AD000
trusted library allocation
page read and write
19FF76E8000
trusted library allocation
page read and write
19FF5ACB000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF6388000
trusted library allocation
page read and write
19FEC6E6000
heap
page read and write
19FF71A5000
trusted library allocation
page read and write
19FF5ACB000
trusted library allocation
page read and write
19FF8258000
trusted library allocation
page read and write
19FF6B16000
trusted library allocation
page read and write
19FF7544000
trusted library allocation
page read and write
19FF8089000
trusted library allocation
page read and write
214A1319000
trusted library allocation
page read and write
19FF5ACB000
trusted library allocation
page read and write
19FFF394000
trusted library allocation
page read and write
19FF78B4000
trusted library allocation
page read and write
19FF17A8000
trusted library allocation
page read and write
19FF53B1000
trusted library allocation
page read and write
214A1F7B000
heap
page read and write
19FF76DD000
trusted library allocation
page read and write
19FFDC81000
trusted library allocation
page read and write
19FF9386000
trusted library allocation
page read and write
19FF6A10000
trusted library allocation
page read and write
19852211000
trusted library allocation
page read and write
19FF28A8000
trusted library allocation
page read and write
19FF6C6D000
trusted library allocation
page read and write
19FF6BDD000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FFDCF5000
trusted library allocation
page read and write
1A001ECF000
trusted library allocation
page read and write
19FF74AE000
trusted library allocation
page read and write
19851FE0000
unclassified section
page read and write
19FF91AE000
trusted library allocation
page read and write
19FF76A8000
trusted library allocation
page read and write
1A562FC0000
heap
page read and write
19FF6BFE000
trusted library allocation
page read and write
19FFDC3C000
trusted library allocation
page read and write
19FF53A7000
trusted library allocation
page read and write
19FF85E4000
trusted library allocation
page read and write
19FF764F000
trusted library allocation
page read and write
19FF7923000
trusted library allocation
page read and write
19FF940C000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
1A001399000
trusted library allocation
page read and write
19FF77E7000
trusted library allocation
page read and write
83921FE000
stack
page read and write
19FF75BF000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19FF825E000
trusted library allocation
page read and write
214A1E9F000
heap
page read and write
19FFDB7F000
trusted library allocation
page read and write
19FF7588000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF8252000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
1A001AA8000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF5956000
trusted library allocation
page read and write
19FF5A7A000
trusted library allocation
page read and write
1A001DD3000
trusted library allocation
page read and write
19FF6C32000
trusted library allocation
page read and write
19FF762E000
trusted library allocation
page read and write
CD0000
unkown
page readonly
19FFDB81000
trusted library allocation
page read and write
214A1F31000
heap
page read and write
19FF7FF6000
trusted library allocation
page read and write
19FF6A0B000
trusted library allocation
page read and write
19FFF100000
trusted library allocation
page read and write
19FF53BE000
trusted library allocation
page read and write
19FF74E3000
trusted library allocation
page read and write
214A1310000
trusted library allocation
page read and write
19FF79E4000
trusted library allocation
page read and write
19FF5ACB000
trusted library allocation
page read and write
1A00034D000
heap
page read and write
19FF7663000
trusted library allocation
page read and write
2BFE71BA000
heap
page read and write
19FEC69F000
heap
page read and write
19FFDC0A000
trusted library allocation
page read and write
19FF79C2000
trusted library allocation
page read and write
19FF857D000
trusted library allocation
page read and write
19FF6C53000
trusted library allocation
page read and write
19FF76E8000
trusted library allocation
page read and write
19FF79EC000
trusted library allocation
page read and write
83910BB000
stack
page read and write
19FF91A6000
trusted library allocation
page read and write
D92000
unkown
page readonly
214A1F28000
heap
page read and write
19FF744B000
trusted library allocation
page read and write
214A1EA0000
heap
page read and write
19FF62C1000
trusted library allocation
page read and write
DAF78BD000
stack
page read and write
19FF767B000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
19FF807A000
trusted library allocation
page read and write
19FF53E2000
trusted library allocation
page read and write
214A13F5000
trusted library allocation
page read and write
19FF5963000
trusted library allocation
page read and write
19FEC6E0000
heap
page read and write
19FEC68C000
heap
page read and write
214A1A03000
trusted library allocation
page read and write
19FF53B8000
trusted library allocation
page read and write
19FF5B9C000
trusted library allocation
page read and write
19FF7682000
trusted library allocation
page read and write
19FF9D09000
heap
page read and write
19FFDD93000
trusted library allocation
page read and write
19FF85A3000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
19FF6BDD000
trusted library allocation
page read and write
19FEC6B1000
heap
page read and write
19FF289C000
trusted library allocation
page read and write
19FFD94E000
trusted library allocation
page read and write
19FF6C50000
trusted library allocation
page read and write
19FF5BAF000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FF286F000
trusted library allocation
page read and write
19FFF89F000
trusted library allocation
page read and write
19FEC6A3000
heap
page read and write
19FEC6A2000
heap
page read and write
19FF5690000
heap
page read and write
19FF90E0000
trusted library allocation
page read and write
19FFDAD9000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FF827D000
trusted library allocation
page read and write
19FEC686000
heap
page read and write
19FF5BA5000
trusted library allocation
page read and write
1A563400000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FEC6AD000
heap
page read and write
19FF75E7000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
1A56325D000
trusted library allocation
page read and write
1A001DEE000
trusted library allocation
page read and write
19FF77A4000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF6BCC000
trusted library allocation
page read and write
19851F90000
heap
page read and write
19FF2A60000
trusted library allocation
page read and write
19FF635D000
trusted library allocation
page read and write
1A001E8B000
trusted library allocation
page read and write
19FF54D6000
trusted library allocation
page read and write
19FF91A6000
trusted library allocation
page read and write
19FF631E000
trusted library allocation
page read and write
19852100000
trusted library allocation
page read and write
19FF74CE000
trusted library allocation
page read and write
2BFE5860000
heap
page read and write
19FFF402000
trusted library allocation
page read and write
19FF857B000
trusted library allocation
page read and write
EB4000
heap
page read and write
19FFF8D0000
trusted library allocation
page read and write
19FF825A000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF2A75000
trusted library allocation
page read and write
1A0020CE000
trusted library allocation
page read and write
19FF63F2000
trusted library allocation
page read and write
19FF719C000
trusted library allocation
page read and write
19FFDDFE000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
19FF7205000
trusted library allocation
page read and write
19FF567F000
heap
page read and write
19FF769F000
trusted library allocation
page read and write
19FF82C6000
trusted library allocation
page read and write
19FF8282000
trusted library allocation
page read and write
214A1FA7000
heap
page read and write
19FF6B16000
trusted library allocation
page read and write
214A1F6A000
heap
page read and write
19FF7373000
trusted library allocation
page read and write
19FFDCD2000
trusted library allocation
page read and write
19FF74E4000
trusted library allocation
page read and write
19FF73C3000
trusted library allocation
page read and write
19FF2880000
trusted library allocation
page read and write
19FF8623000
trusted library allocation
page read and write
19FF78A3000
trusted library allocation
page read and write
19FF6B97000
trusted library allocation
page read and write
19FF74CE000
trusted library allocation
page read and write
19FF6C77000
trusted library allocation
page read and write
19FF5A53000
trusted library allocation
page read and write
19FF828C000
trusted library allocation
page read and write
19FF5BD5000
trusted library allocation
page read and write
19FF77A5000
trusted library allocation
page read and write
19FF9B27000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FFDDEA000
trusted library allocation
page read and write
214A1EAC000
heap
page read and write
19FF76A3000
trusted library allocation
page read and write
1A0013FB000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
214A1F23000
heap
page read and write
19FF53A5000
trusted library allocation
page read and write
19FF82FC000
trusted library allocation
page read and write
1A562EB0000
heap
page read and write
19852336000
heap
page read and write
19FF5A1D000
trusted library allocation
page read and write
19FF8583000
trusted library allocation
page read and write
19FEC69E000
heap
page read and write
19FF5BDF000
trusted library allocation
page read and write
19FEC68C000
heap
page read and write
19FEC69F000
heap
page read and write
19FF77BF000
trusted library allocation
page read and write
19FEC696000
heap
page read and write
19FF75B2000
trusted library allocation
page read and write
19FF2CE9000
trusted library allocation
page read and write
19FF1793000
trusted library allocation
page read and write
1A0002FE000
trusted library allocation
page read and write
19FF7E95000
trusted library allocation
page read and write
19FF2AE7000
trusted library allocation
page read and write
19FFFC11000
trusted library allocation
page read and write
19FFF88F000
trusted library allocation
page read and write
19FF6D7D000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
19FEC6E6000
heap
page read and write
19FF77BA000
trusted library allocation
page read and write
214A1EA9000
heap
page read and write
19FF2CED000
trusted library allocation
page read and write
19FF9F1A000
trusted library allocation
page read and write
1A563040000
heap
page read and write
19FEC69B000
heap
page read and write
19FF82BC000
trusted library allocation
page read and write
19FFDCE6000
trusted library allocation
page read and write
19FFF933000
trusted library allocation
page read and write
19FF5096000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
D92000
unkown
page readonly
19FEC694000
heap
page read and write
19FF74BE000
trusted library allocation
page read and write
19FF5362000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FF564F000
heap
page read and write
19FF74C7000
trusted library allocation
page read and write
1FF420A0000
heap
page read and write
19FFDAAF000
trusted library allocation
page read and write
19FFB6C1000
trusted library allocation
page read and write
19FFDCFE000
trusted library allocation
page read and write
1A0002F1000
trusted library allocation
page read and write
19FF6FF6000
trusted library allocation
page read and write
19FF793D000
trusted library allocation
page read and write
19FF7665000
trusted library allocation
page read and write
19FEC69F000
heap
page read and write
214A1F98000
heap
page read and write
19FF75EF000
trusted library allocation
page read and write
10A8000
heap
page read and write
19FF6A2D000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF71F5000
trusted library allocation
page read and write
19FF8583000
trusted library allocation
page read and write
19FF6C49000
trusted library allocation
page read and write
19FFF97C000
trusted library allocation
page read and write
19FFFCD5000
trusted library allocation
page read and write
19FEC6EA000
heap
page read and write
19FF2A70000
trusted library allocation
page read and write
B06FFE24000
trusted library allocation
page read and write
19FF533B000
trusted library allocation
page read and write
19FF5B85000
trusted library allocation
page read and write
19FF1098000
trusted library allocation
page read and write
19851FEF000
unclassified section
page read and write
19FF6C58000
trusted library allocation
page read and write
19FEC6E2000
heap
page read and write
19FF85CF000
trusted library allocation
page read and write
19FF2C8B000
trusted library allocation
page read and write
19FFB6C9000
trusted library allocation
page read and write
19FF17D2000
trusted library allocation
page read and write
1A000371000
heap
page read and write
83907FE000
stack
page read and write
19FEC6A5000
heap
page read and write
19FFDB41000
trusted library allocation
page read and write
19FF5B55000
trusted library allocation
page read and write
19FEC6A2000
heap
page read and write
1A001D96000
trusted library allocation
page read and write
19FF53C7000
trusted library allocation
page read and write
19FFDB53000
trusted library allocation
page read and write
19FFDCD2000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FEC69B000
heap
page read and write
DAF787E000
unkown
page readonly
19FF6BFE000
trusted library allocation
page read and write
19FEC6DC000
heap
page read and write
19FFDC0D000
trusted library allocation
page read and write
19FF80F9000
trusted library allocation
page read and write
19FF6C8D000
trusted library allocation
page read and write
19FF8583000
trusted library allocation
page read and write
19FF7151000
trusted library allocation
page read and write
19FEC6A3000
heap
page read and write
1A001DC8000
trusted library allocation
page read and write
19FF76A8000
trusted library allocation
page read and write
19FF76F7000
trusted library allocation
page read and write
19FF1090000
trusted library allocation
page read and write
19FEC6F0000
heap
page read and write
1A001A77000
trusted library allocation
page read and write
19FF5695000
heap
page read and write
19FFF943000
trusted library allocation
page read and write
19FF7390000
trusted library allocation
page read and write
19FF53C7000
trusted library allocation
page read and write
19FEC6AE000
heap
page read and write
19FFF378000
trusted library allocation
page read and write
19FEC6A0000
heap
page read and write
214A137B000
trusted library allocation
page read and write
19FEC679000
heap
page read and write
2BFE5880000
heap
page read and write
19FFF4A8000
trusted library allocation
page read and write
19FF71B7000
trusted library allocation
page read and write
19FF6CB6000
trusted library allocation
page read and write
19FF1671000
trusted library allocation
page read and write
19FFF362000
trusted library allocation
page read and write
19FF8197000
trusted library allocation
page read and write
19FF7DF8000
trusted library allocation
page read and write
1A00137E000
trusted library allocation
page read and write
19FEC6AD000
heap
page read and write
19FF944D000
trusted library allocation
page read and write
19FEC6AB000
heap
page read and write
19FEC6DC000
heap
page read and write
19FF53F0000
trusted library allocation
page read and write
19FF7588000
trusted library allocation
page read and write
19FF7939000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FF76A2000
trusted library allocation
page read and write
19FF5BAF000
trusted library allocation
page read and write
1A001B6A000
trusted library allocation
page read and write
19FF5BB9000
trusted library allocation
page read and write
19FEC730000
heap
page read and write
214A1F29000
heap
page read and write
19FF9B72000
trusted library allocation
page read and write
19FEC730000
heap
page read and write
19FFFC1D000
trusted library allocation
page read and write
19FF8675000
trusted library allocation
page read and write
19FEC69C000
heap
page read and write
19FF769C000
trusted library allocation
page read and write
19FF5EF1000
trusted library allocation
page read and write
19FF5654000
heap
page read and write
19FF6CAE000
trusted library allocation
page read and write
19FF6341000
trusted library allocation
page read and write
1A001EF5000
trusted library allocation
page read and write
19FFDDEC000
trusted library allocation
page read and write
19FFDCD0000
trusted library allocation
page read and write
19FEC69B000
heap
page read and write
19FF717F000
trusted library allocation
page read and write
19FF76BE000
trusted library allocation
page read and write
19852245000
trusted library allocation
page read and write
19FFD9F1000
trusted library allocation
page read and write
214A1F2D000
heap
page read and write
19FF8232000
trusted library allocation
page read and write
19FF79FB000
trusted library allocation
page read and write
19FEC6E8000
heap
page read and write
2BFE71B2000
heap
page read and write
19FEC6A5000
heap
page read and write
1A0002D1000
trusted library allocation
page read and write
19FF63AE000
trusted library allocation
page read and write
19852500000
trusted library allocation
page read and write
19FEC693000
heap
page read and write
19FF79FB000
trusted library allocation
page read and write
19FEC6A5000
heap
page read and write
19FF77AD000
trusted library allocation
page read and write
19FF53CB000
trusted library allocation
page read and write
19FF56A8000
heap
page read and write
1088000
heap
page read and write
19FF748F000
trusted library allocation
page read and write
1A001399000
trusted library allocation
page read and write
19FF6C29000
trusted library allocation
page read and write
19FF5A9C000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
19FF53A5000
trusted library allocation
page read and write
1A001EFE000
trusted library allocation
page read and write
19FF53F1000
trusted library allocation
page read and write
19FF5A76000
trusted library allocation
page read and write
19FF634B000
trusted library allocation
page read and write
19FF858C000
trusted library allocation
page read and write
19FFFC8C000
trusted library allocation
page read and write
19FF85DF000
trusted library allocation
page read and write
19FEC692000
heap
page read and write
19FF7E3D000
trusted library allocation
page read and write
There are 3693 hidden memdumps, click here to show them.