IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1402b137-ed01-4215-b660-4f769c92a5de.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1402b137-ed01-4215-b660-4f769c92a5de.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\ab6f609f-17ee-4f84-b1d8-52696e1a07aa (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\ab6f609f-17ee-4f84-b1d8-52696e1a07aa.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2228 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d3a02f6-4639-4242-a5b9-9a48f9196107} 6548 "\\.\pipe\gecko-crash-server-pipe.6548" 1d59556db10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4244 -parentBuildID 20230927232528 -prefsHandle 2760 -prefMapHandle 4236 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dfa7db3e-6923-4036-bba0-8e3b5e3a72b8} 6548 "\\.\pipe\gecko-crash-server-pipe.6548" 1d5a76ed910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5016 -prefMapHandle 5012 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c7a4d4c-5c4b-4992-9801-409195ea74b6} 6548 "\\.\pipe\gecko-crash-server-pipe.6548" 1d5a92acb10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1616739https://bugzilla.mozilla.org/show_bug.cgi?id=160
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
http://mozilla.org/0
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://accounts.firefox.com/x
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.16.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
172.217.16.142
youtube.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
F7F000
heap
page read and write
malicious
1D5AD6DE000
trusted library allocation
page read and write
1D5AD6EE000
trusted library allocation
page read and write
1D5A2CA3000
heap
page read and write
1D5A266E000
trusted library allocation
page read and write
1AE00E2E000
trusted library allocation
page read and write
17A32680000
heap
page read and write
1D5AD4D6000
trusted library allocation
page read and write
1D5A70E9000
trusted library allocation
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D5A5EB4000
trusted library allocation
page read and write
1D5A5839000
trusted library allocation
page read and write
1D5A71B7000
trusted library allocation
page read and write
1D5A7B8A000
trusted library allocation
page read and write
1D59C3A9000
heap
page read and write
1D5A7AE0000
trusted library allocation
page read and write
1D5A557F000
trusted library allocation
page read and write
1D5A729C000
trusted library allocation
page read and write
1D5A8D71000
trusted library allocation
page read and write
1D5A2532000
trusted library allocation
page read and write
1D5A6CC6000
trusted library allocation
page read and write
1D59C408000
heap
page read and write
1D5ADA4B000
trusted library allocation
page read and write
1D5A715B000
trusted library allocation
page read and write
1D59C3A1000
heap
page read and write
17A32120000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5ADAB1000
trusted library allocation
page read and write
1D5AD6DE000
trusted library allocation
page read and write
1AE00F1C000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7149000
trusted library allocation
page read and write
1D5A7EB9000
trusted library allocation
page read and write
1D5A6DB0000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A8AF2000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D5ADAF6000
trusted library allocation
page read and write
1D5B0500000
trusted library allocation
page read and write
1D5A78AA000
trusted library allocation
page read and write
1D5A5EC1000
trusted library allocation
page read and write
1D5A74EA000
trusted library allocation
page read and write
1D5A3AE9000
trusted library allocation
page read and write
1D5A7E38000
trusted library allocation
page read and write
1D5A6F63000
trusted library allocation
page read and write
1D5A6F73000
trusted library allocation
page read and write
1D59C3B0000
heap
page read and write
1D5AD887000
trusted library allocation
page read and write
1D5A7670000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A6B70000
trusted library allocation
page read and write
F8D000
heap
page read and write
1D5A7CE4000
trusted library allocation
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D5A58DF000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A77E7000
trusted library allocation
page read and write
F9E000
heap
page read and write
1D5A7BC2000
trusted library allocation
page read and write
1D5A88D1000
trusted library allocation
page read and write
1E522A03000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7CEB000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7228000
trusted library allocation
page read and write
1D5A7240000
trusted library allocation
page read and write
1D5A5E53000
trusted library allocation
page read and write
1D596EDD000
heap
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1D5A8D64000
trusted library allocation
page read and write
1D5AD5E9000
trusted library allocation
page read and write
17A32715000
trusted library allocation
page read and write
1D5A2A3D000
trusted library allocation
page read and write
1D5AD42C000
trusted library allocation
page read and write
1D5A7E9F000
trusted library allocation
page read and write
1D5A6C6D000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1D5A7365000
trusted library allocation
page read and write
3470000
heap
page read and write
1D5A88D1000
trusted library allocation
page read and write
1D5AEF7F000
trusted library allocation
page read and write
1D5A712C000
trusted library allocation
page read and write
1D5A25B2000
trusted library allocation
page read and write
1D5A2330000
trusted library allocation
page read and write
1D5A2C99000
heap
page read and write
1D5AD5A9000
trusted library allocation
page read and write
1D5A311A000
trusted library allocation
page read and write
1D5A5887000
trusted library allocation
page read and write
F86000
heap
page read and write
1D5AD8F1000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1D5A266E000
trusted library allocation
page read and write
1D5B1151000
heap
page read and write
1D59C3B9000
heap
page read and write
470000
unkown
page readonly
1D5AD4D9000
trusted library allocation
page read and write
1D5A711C000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C3CC000
heap
page read and write
1D5A559C000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D59C3E9000
heap
page read and write
1D5A7259000
trusted library allocation
page read and write
F9E000
heap
page read and write
1D5AF9EA000
trusted library allocation
page read and write
1D5A7131000
trusted library allocation
page read and write
1D59C3D1000
heap
page read and write
1D5A761E000
trusted library allocation
page read and write
1D5A58C9000
trusted library allocation
page read and write
1D5A7648000
trusted library allocation
page read and write
8717F3E000
stack
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D59C416000
heap
page read and write
1D5AD3AE000
trusted library allocation
page read and write
1D5AF0B6000
trusted library allocation
page read and write
1D5ADA6C000
trusted library allocation
page read and write
1E521B6C000
remote allocation
page execute read
1D5A6F8E000
trusted library allocation
page read and write
1D5A7C8B000
trusted library allocation
page read and write
1D5A7E58000
trusted library allocation
page read and write
1D59C407000
heap
page read and write
1D5A37CA000
trusted library allocation
page read and write
1D5A2A98000
trusted library allocation
page read and write
1D5AFA8D000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5AD8BA000
trusted library allocation
page read and write
1D5A58D4000
trusted library allocation
page read and write
1D5A5590000
trusted library allocation
page read and write
1D5A25E6000
trusted library allocation
page read and write
1D5A7E6E000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5A88A0000
trusted library allocation
page read and write
1E522BFD000
heap
page read and write
1E522564000
unkown
page execute read
1D5AEEA3000
trusted library allocation
page read and write
1D5A6F8E000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D5A3107000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A7A35000
trusted library allocation
page read and write
1D5A71FD000
trusted library allocation
page read and write
1D5A761C000
trusted library allocation
page read and write
1D5A787F000
trusted library allocation
page read and write
1D5AD932000
trusted library allocation
page read and write
1D5A378C000
trusted library allocation
page read and write
1D5A3A6F000
trusted library allocation
page read and write
1D5A7217000
trusted library allocation
page read and write
F9E000
heap
page read and write
1D5A2504000
trusted library allocation
page read and write
1D5A7A7C000
trusted library allocation
page read and write
1D59C41A000
heap
page read and write
1D59C3B3000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A2A46000
trusted library allocation
page read and write
1D5A6FF0000
trusted library allocation
page read and write
2A612051000
heap
page read and write
1D5A6F98000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7A4F000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7CEB000
trusted library allocation
page read and write
1D59C3C9000
heap
page read and write
1E522C77000
heap
page read and write
1D5A7A45000
trusted library allocation
page read and write
1D5A1371000
trusted library allocation
page read and write
17A3290C000
trusted library allocation
page read and write
1D5A5892000
trusted library allocation
page read and write
1D5A6CD5000
trusted library allocation
page read and write
1D5A88B1000
trusted library allocation
page read and write
1D59C3B5000
heap
page read and write
871667E000
unkown
page readonly
1D59C3C3000
heap
page read and write
1D5A37FE000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A25B4000
trusted library allocation
page read and write
1D5A8AA4000
trusted library allocation
page read and write
1D5A6B88000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A7382000
trusted library allocation
page read and write
1D5A8AF2000
trusted library allocation
page read and write
1D5A71B5000
trusted library allocation
page read and write
1D5AD3C9000
trusted library allocation
page read and write
1D5A8A09000
trusted library allocation
page read and write
1D5A7800000
trusted library allocation
page read and write
1E522BF2000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5AD8C8000
trusted library allocation
page read and write
1D5A7640000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1AE00E5B000
trusted library allocation
page read and write
1D5A2330000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D59C39E000
heap
page read and write
1D5B1116000
heap
page read and write
1D5AEF48000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A7415000
trusted library allocation
page read and write
1D5AF0D5000
trusted library allocation
page read and write
1D5A25B9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E522B60000
heap
page read and write
1D5A88FC000
trusted library allocation
page read and write
1D5AD6B6000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
2A61220A000
trusted library allocation
page read and write
1D59C3C4000
heap
page read and write
1D5A76D9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
E1F000
stack
page read and write
1E522C2D000
heap
page read and write
1D5AEC3E000
trusted library allocation
page read and write
1D5A2D72000
trusted library allocation
page read and write
1D5A7274000
trusted library allocation
page read and write
1D5A7404000
trusted library allocation
page read and write
1D5A25C3000
trusted library allocation
page read and write
1D5A315F000
trusted library allocation
page read and write
1D5AD9F3000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1D59C39D000
heap
page read and write
1D5A73A6000
trusted library allocation
page read and write
1D5AF0F5000
trusted library allocation
page read and write
1D5A685F000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A77D5000
trusted library allocation
page read and write
1D5A88B4000
trusted library allocation
page read and write
1D59C433000
heap
page read and write
1D59C3BC000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5A7E69000
trusted library allocation
page read and write
1D5A58DD000
trusted library allocation
page read and write
1E522B69000
heap
page read and write
1D5A7263000
trusted library allocation
page read and write
1D5A7E9F000
trusted library allocation
page read and write
1D5A6FA0000
trusted library allocation
page read and write
1D5AF068000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D5A6DD4000
trusted library allocation
page read and write
1D5A311D000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A6859000
trusted library allocation
page read and write
1D5A6DA6000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
17A32749000
trusted library allocation
page read and write
1D5A7C85000
trusted library allocation
page read and write
1D5A882F000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
87165FE000
unkown
page readonly
1D5A2D92000
trusted library allocation
page read and write
8714398000
stack
page read and write
1D5A7181000
trusted library allocation
page read and write
1D5A8850000
trusted library allocation
page read and write
1E521F12000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AD87C000
trusted library allocation
page read and write
1D5A7A6A000
trusted library allocation
page read and write
1D5A253B000
trusted library allocation
page read and write
1D5A587A000
trusted library allocation
page read and write
1D5AF0A2000
trusted library allocation
page read and write
1D5AD4F5000
trusted library allocation
page read and write
1D5A71FE000
trusted library allocation
page read and write
566CCEE000
unkown
page readonly
1D5AF0F3000
trusted library allocation
page read and write
1D5AF394000
trusted library allocation
page read and write
1D5A37BD000
trusted library allocation
page read and write
1D5A8BC8000
trusted library allocation
page read and write
1D5A7C78000
trusted library allocation
page read and write
1D5A3A5B000
trusted library allocation
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D5A74AF000
trusted library allocation
page read and write
1D5A71B1000
trusted library allocation
page read and write
1D5AF394000
trusted library allocation
page read and write
1D5AFAC8000
trusted library allocation
page read and write
1D5AD8F3000
trusted library allocation
page read and write
1D5A71F0000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1E522BE8000
heap
page read and write
2A612207000
trusted library allocation
page read and write
1D5AEF98000
trusted library allocation
page read and write
1D5A688D000
trusted library allocation
page read and write
1D5AF077000
trusted library allocation
page read and write
1D5A7EA6000
trusted library allocation
page read and write
1D5A6FCE000
trusted library allocation
page read and write
1D5A7EF7000
trusted library allocation
page read and write
1D5A6F83000
trusted library allocation
page read and write
1D5AFABF000
trusted library allocation
page read and write
1D5A25EC000
trusted library allocation
page read and write
1D5AFA85000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A6F6C000
trusted library allocation
page read and write
1D5A25B9000
trusted library allocation
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1C40000
heap
page read and write
1D5A8BC8000
trusted library allocation
page read and write
1D59C3C8000
heap
page read and write
1D5AF08E000
trusted library allocation
page read and write
1D5A25C3000
trusted library allocation
page read and write
1D5A7378000
trusted library allocation
page read and write
1D5A6B8C000
trusted library allocation
page read and write
1D5A6B9A000
trusted library allocation
page read and write
1D5A8EC3000
trusted library allocation
page read and write
1D5A7670000
trusted library allocation
page read and write
17A32353000
heap
page read and write
1D5AEC3E000
trusted library allocation
page read and write
1D5A88C5000
trusted library allocation
page read and write
3CEC7271000
trusted library allocation
page execute read
1D5A7E99000
trusted library allocation
page read and write
1D5A5E5E000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
17A327C4000
trusted library allocation
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D5AD654000
trusted library allocation
page read and write
1D5B10E1000
heap
page read and write
1D5A3741000
trusted library allocation
page read and write
1D5A7EB7000
trusted library allocation
page read and write
1D5A7CB6000
trusted library allocation
page read and write
1E521F86000
trusted library allocation
page read and write
2A612042000
heap
page read and write
1D5AD6E3000
trusted library allocation
page read and write
1D59C408000
heap
page read and write
1D5A719D000
trusted library allocation
page read and write
1E521F9F000
trusted library allocation
page read and write
1D5A7021000
trusted library allocation
page read and write
1E522BF0000
heap
page read and write
1D5A724C000
trusted library allocation
page read and write
1D5A6DD6000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A73C5000
trusted library allocation
page read and write
1D5A8BF2000
trusted library allocation
page read and write
1D5A88B4000
trusted library allocation
page read and write
1D5A6B8F000
trusted library allocation
page read and write
1E521EC0000
trusted library section
page readonly
1D5A6F8E000
trusted library allocation
page read and write
1D5A5C77000
trusted library allocation
page read and write
1D5A5862000
trusted library allocation
page read and write
1D5A3132000
trusted library allocation
page read and write
1D5A37AA000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5AD8A8000
trusted library allocation
page read and write
1D5AD526000
trusted library allocation
page read and write
1D5A7026000
trusted library allocation
page read and write
1D5A6DA9000
trusted library allocation
page read and write
1D5A3791000
trusted library allocation
page read and write
1D59C3A0000
heap
page read and write
1D5A6B02000
trusted library allocation
page read and write
1D59C3AE000
heap
page read and write
1D5A71E5000
trusted library allocation
page read and write
1D5AEFD0000
trusted library allocation
page read and write
1D5A3A6C000
trusted library allocation
page read and write
1D5A6DFB000
trusted library allocation
page read and write
1D5A1323000
trusted library allocation
page read and write
1D5A8AE2000
trusted library allocation
page read and write
1D5A3741000
trusted library allocation
page read and write
1D5A37CA000
trusted library allocation
page read and write
1D5A5879000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1AE00E12000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A7C85000
trusted library allocation
page read and write
1D5A58BD000
trusted library allocation
page read and write
1D5AD8BE000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A3791000
trusted library allocation
page read and write
1D5AFADA000
trusted library allocation
page read and write
1D5AEF48000
trusted library allocation
page read and write
1D5A6FC1000
trusted library allocation
page read and write
1D5AD9F1000
trusted library allocation
page read and write
1D5A8892000
trusted library allocation
page read and write
1D5AF0D5000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3B4000
heap
page read and write
1D5AD46A000
trusted library allocation
page read and write
1D5A7454000
trusted library allocation
page read and write
1D5AD3BE000
trusted library allocation
page read and write
1D5AD5C5000
trusted library allocation
page read and write
1D5A7ABE000
trusted library allocation
page read and write
1D59C410000
heap
page read and write
1D59C3B9000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5A77F6000
trusted library allocation
page read and write
1D5A7CD1000
trusted library allocation
page read and write
1D5A3A21000
trusted library allocation
page read and write
1D5AF0F3000
trusted library allocation
page read and write
1D5AD932000
trusted library allocation
page read and write
1D5A2668000
trusted library allocation
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D5A733C000
trusted library allocation
page read and write
1D5A7487000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5A25DA000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D5A68F8000
trusted library allocation
page read and write
1D5AFAD5000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D5A6B6F000
trusted library allocation
page read and write
1D5A6F75000
trusted library allocation
page read and write
1D59C3C2000
heap
page read and write
17A32713000
trusted library allocation
page read and write
1D5A7ED2000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D59C3D8000
heap
page read and write
1D5AD8C1000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C416000
heap
page read and write
1D5A7444000
trusted library allocation
page read and write
1D5AD445000
trusted library allocation
page read and write
1D5A13FB000
trusted library allocation
page read and write
1D5AF339000
trusted library allocation
page read and write
1D5A7487000
trusted library allocation
page read and write
1D5A7349000
trusted library allocation
page read and write
1D5A7A5F000
trusted library allocation
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1E522C68000
heap
page read and write
F68000
heap
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3AC000
heap
page read and write
1D59C411000
heap
page read and write
1D5A72B8000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A7382000
trusted library allocation
page read and write
1D5AD4D9000
trusted library allocation
page read and write
1D5A8BC4000
trusted library allocation
page read and write
1D59C3C4000
heap
page read and write
1D5A8898000
trusted library allocation
page read and write
1E522C44000
heap
page read and write
1D59C3C0000
heap
page read and write
471000
unkown
page execute read
1D5AEF23000
trusted library allocation
page read and write
1D59C384000
heap
page read and write
1E522C29000
heap
page read and write
1D5A311F000
trusted library allocation
page read and write
1D5AF081000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5AD6B6000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A68CB000
trusted library allocation
page read and write
1D59C408000
heap
page read and write
1D5A8D73000
trusted library allocation
page read and write
1D5A7EB7000
trusted library allocation
page read and write
1D5AD8DE000
trusted library allocation
page read and write
1D5ADA92000
trusted library allocation
page read and write
1D5A55E7000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5A5871000
trusted library allocation
page read and write
1D5A37FE000
trusted library allocation
page read and write
1E521F48000
trusted library allocation
page read and write
1D59C3C8000
heap
page read and write
1D5AD5C5000
trusted library allocation
page read and write
1D5AF34D000
trusted library allocation
page read and write
1D5ADABC000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A26E8000
trusted library allocation
page read and write
1D59C3A3000
heap
page read and write
1D5AEE05000
trusted library allocation
page read and write
1D5A6D54000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A8BC8000
trusted library allocation
page read and write
1D5AD4D6000
trusted library allocation
page read and write
1D5A78B4000
trusted library allocation
page read and write
1D5A2D87000
trusted library allocation
page read and write
1D5A8DAB000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5AD5FB000
trusted library allocation
page read and write
1D5A588E000
trusted library allocation
page read and write
1D59C3AD000
heap
page read and write
1D5AEEAC000
trusted library allocation
page read and write
1D5AF0E9000
trusted library allocation
page read and write
1D5AD8D2000
trusted library allocation
page read and write
1D5AD3F8000
trusted library allocation
page read and write
1D5A236C000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D59C420000
heap
page read and write
1D5A255C000
trusted library allocation
page read and write
1D59C3E9000
heap
page read and write
1D5B10E1000
heap
page read and write
1D5A7200000
trusted library allocation
page read and write
1D5AD6B2000
trusted library allocation
page read and write
1E522C59000
heap
page read and write
2F1E4FE000
unkown
page readonly
1D5A729C000
trusted library allocation
page read and write
1D5A5862000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A711F000
trusted library allocation
page read and write
1D5A2330000
trusted library allocation
page read and write
1D5A68B0000
trusted library allocation
page read and write
470000
unkown
page readonly
1D5A6DB0000
trusted library allocation
page read and write
1D5A5879000
trusted library allocation
page read and write
1D5A7623000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5AD4D9000
trusted library allocation
page read and write
1D5A6DF9000
trusted library allocation
page read and write
1D5A68A2000
trusted library allocation
page read and write
1D5AF369000
trusted library allocation
page read and write
1D5A74F5000
trusted library allocation
page read and write
1D59C3A6000
heap
page read and write
1D5AD4D6000
trusted library allocation
page read and write
50C000
unkown
page readonly
1D5A73A6000
trusted library allocation
page read and write
1D5A7181000
trusted library allocation
page read and write
1D5A8D82000
trusted library allocation
page read and write
1D5A25AE000
trusted library allocation
page read and write
1E522B60000
heap
page read and write
1D5A687D000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A3A91000
trusted library allocation
page read and write
1D5A7C78000
trusted library allocation
page read and write
1D5A68B2000
trusted library allocation
page read and write
1D59C406000
heap
page read and write
1D5A7A45000
trusted library allocation
page read and write
1D5A7431000
trusted library allocation
page read and write
1D5AEF38000
trusted library allocation
page read and write
1D5A5E2A000
trusted library allocation
page read and write
1D5A723F000
trusted library allocation
page read and write
1E521EB0000
heap
page read and write
1D5A7C81000
trusted library allocation
page read and write
1D5A2C8D000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A7A46000
trusted library allocation
page read and write
1D5AF0BA000
trusted library allocation
page read and write
1D5A8B51000
trusted library allocation
page read and write
1D5A31DF000
trusted library allocation
page read and write
1E521F0A000
trusted library allocation
page read and write
1D5A7EDF000
trusted library allocation
page read and write
1D5A2531000
trusted library allocation
page read and write
1D5AD8B7000
trusted library allocation
page read and write
1D5A7EBF000
trusted library allocation
page read and write
1D5A375C000
trusted library allocation
page read and write
1D5A7E81000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A72B5000
trusted library allocation
page read and write
1AE00E5D000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AF074000
trusted library allocation
page read and write
1D5AD316000
trusted library allocation
page read and write
1E522C29000
heap
page read and write
1D59C3FD000
heap
page read and write
1D59C403000
heap
page read and write
1D5A7CF3000
trusted library allocation
page read and write
1D5A377D000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1E522BA1000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D5A71E5000
trusted library allocation
page read and write
2F1F4FE000
unkown
page readonly
1D5A7266000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D59C3A7000
heap
page read and write
1D5AD9B2000
trusted library allocation
page read and write
CF93DFE000
stack
page read and write
1D5A2544000
trusted library allocation
page read and write
1AE00F10000
trusted library allocation
page read and write
1D5A74E7000
trusted library allocation
page read and write
1D5A7268000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A60C3000
trusted library allocation
page read and write
1D5A6D73000
trusted library allocation
page read and write
1D5A74AA000
trusted library allocation
page read and write
1D5A0DDF000
trusted library allocation
page read and write
1D5A747A000
trusted library allocation
page read and write
1D59C39D000
heap
page read and write
1D59C3CC000
heap
page read and write
1E522B6C000
heap
page read and write
87176BE000
unkown
page readonly
1D5A71A2000
trusted library allocation
page read and write
1D5A552D000
trusted library allocation
page read and write
1D5AD887000
trusted library allocation
page read and write
1D5A6CCA000
trusted library allocation
page read and write
1D5A311F000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A88ED000
trusted library allocation
page read and write
1D5A5824000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D5A7CEB000
trusted library allocation
page read and write
1D5A2D90000
trusted library allocation
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D5A7A4F000
trusted library allocation
page read and write
1D5AD59D000
trusted library allocation
page read and write
1D5A7CD3000
trusted library allocation
page read and write
1D59C3AD000
heap
page read and write
1D5AD6AE000
trusted library allocation
page read and write
1D5AEDC8000
trusted library allocation
page read and write
1D5A7223000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5AEFF0000
trusted library allocation
page read and write
1D5A73A8000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A6CF3000
trusted library allocation
page read and write
1D5A88C9000
trusted library allocation
page read and write
1D5ADA6C000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A7BF2000
trusted library allocation
page read and write
1D5A7BC4000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A88ED000
trusted library allocation
page read and write
1D5A2D6A000
trusted library allocation
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A7AE0000
trusted library allocation
page read and write
567107E000
unkown
page readonly
1D5A3A26000
trusted library allocation
page read and write
1D5AEF64000
trusted library allocation
page read and write
1D5A71EB000
trusted library allocation
page read and write
566CCAB000
stack
page read and write
1D5A5862000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A789C000
trusted library allocation
page read and write
1D5A7E92000
trusted library allocation
page read and write
1D5A7A7C000
trusted library allocation
page read and write
1D59C416000
heap
page read and write
1D5A5812000
trusted library allocation
page read and write
1E522580000
unkown
page execute read
1D5A68E6000
trusted library allocation
page read and write
1D5A6F79000
trusted library allocation
page read and write
1D5A7BBC000
trusted library allocation
page read and write
1D5A746A000
trusted library allocation
page read and write
1D5A8BCD000
trusted library allocation
page read and write
1D5A71A7000
trusted library allocation
page read and write
E2F000
stack
page read and write
1D5ADAA4000
trusted library allocation
page read and write
1D59C44C000
heap
page read and write
1D5AEFFE000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D5A7487000
trusted library allocation
page read and write
1D5A68A2000
trusted library allocation
page read and write
1D5AD8D7000
trusted library allocation
page read and write
1D5A6DBE000
trusted library allocation
page read and write
1D5A6C49000
trusted library allocation
page read and write
1D5A6B41000
trusted library allocation
page read and write
1D5A25BF000
trusted library allocation
page read and write
1D5A6DB0000
trusted library allocation
page read and write
1D5A7304000
trusted library allocation
page read and write
13DDA460000
heap
page read and write
1D5AD356000
trusted library allocation
page read and write
1D5A25AE000
trusted library allocation
page read and write
1D59C416000
heap
page read and write
1D5AEF33000
trusted library allocation
page read and write
1D5AF942000
trusted library allocation
page read and write
1D5A780A000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D5A7640000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5AD61F000
trusted library allocation
page read and write
1D5A88F3000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
2A612057000
heap
page read and write
1D5A5862000
trusted library allocation
page read and write
1D59C3E9000
heap
page read and write
1D5A55AB000
trusted library allocation
page read and write
1D5A72D0000
trusted library allocation
page read and write
2A61203D000
heap
page read and write
1D5A2510000
trusted library allocation
page read and write
1D5A725D000
trusted library allocation
page read and write
1D5A740D000
trusted library allocation
page read and write
1D5AEFC8000
trusted library allocation
page read and write
1D5A2D44000
trusted library allocation
page read and write
1D5A55EA000
trusted library allocation
page read and write
1D5AD8E4000
trusted library allocation
page read and write
1D5AF359000
trusted library allocation
page read and write
1E522C2B000
heap
page read and write
1D59C3C1000
heap
page read and write
1D5AD3C2000
trusted library allocation
page read and write
1D5AD4C9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1AE00A00000
remote allocation
page read and write
1D59C3D4000
heap
page read and write
1AE00DE4000
heap
page read and write
1D5A2DA9000
trusted library allocation
page read and write
13DDA600000
trusted library allocation
page read and write
1AE00E00000
trusted library allocation
page read and write
1D5A7AF7000
trusted library allocation
page read and write
1D5A58D4000
trusted library allocation
page read and write
1D5A6889000
trusted library allocation
page read and write
1D5A8BEB000
trusted library allocation
page read and write
1D5A7ADD000
trusted library allocation
page read and write
1D5AD4CD000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A7425000
trusted library allocation
page read and write
1D5A2C8D000
heap
page read and write
1D5A8827000
trusted library allocation
page read and write
1D5A55AD000
trusted library allocation
page read and write
1D5AEFFE000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D59C3B3000
heap
page read and write
1D5A3788000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A711F000
trusted library allocation
page read and write
1D5A763E000
trusted library allocation
page read and write
1D5A375C000
trusted library allocation
page read and write
1D5AEC29000
trusted library allocation
page read and write
1D59C409000
heap
page read and write
1D59C3AC000
heap
page read and write
1D5AEFD0000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3AB000
heap
page read and write
1D5A7B23000
trusted library allocation
page read and write
1D5A6C15000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
2A612057000
heap
page read and write
1D59C3C6000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A6F79000
trusted library allocation
page read and write
1D5A149C000
trusted library allocation
page read and write
1D5B117B000
heap
page read and write
1D59C3CC000
heap
page read and write
1D59C3B9000
heap
page read and write
1D59C3BC000
heap
page read and write
1D5A5EBC000
trusted library allocation
page read and write
1D5A0D90000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A8DA2000
trusted library allocation
page read and write
1D5A7428000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A373F000
trusted library allocation
page read and write
1D59C388000
heap
page read and write
1D5AF0ED000
trusted library allocation
page read and write
1D5A8A16000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5B114B000
heap
page read and write
1D5A7842000
trusted library allocation
page read and write
17A32280000
heap
page readonly
1D59C3CD000
heap
page read and write
1D59C3A1000
heap
page read and write
1D5A703E000
trusted library allocation
page read and write
1D5A7E43000
trusted library allocation
page read and write
1D5A3A83000
trusted library allocation
page read and write
1D5AD912000
trusted library allocation
page read and write
1D59C3FC000
heap
page read and write
1D59C3A0000
heap
page read and write
1D59C3C7000
heap
page read and write
1D5AEF16000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5A6F33000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1E521F6F000
trusted library allocation
page read and write
1D59C3D1000
heap
page read and write
1D5A6F83000
trusted library allocation
page read and write
1D5A2D82000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
17A3212A000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A7EED000
trusted library allocation
page read and write
1D5A58C8000
trusted library allocation
page read and write
1D5AD815000
trusted library allocation
page read and write
1D5A8BF2000
trusted library allocation
page read and write
1D5A5E45000
trusted library allocation
page read and write
ED4000
heap
page read and write
1E522B64000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A55AB000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1D5A31CB000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1E522C2B000
heap
page read and write
1D5A8841000
trusted library allocation
page read and write
1D5A716E000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5AD8DE000
trusted library allocation
page read and write
1AE00DE6000
heap
page read and write
1D5AF3A5000
trusted library allocation
page read and write
1D5A7CB6000
trusted library allocation
page read and write
1D5A7CCA000
trusted library allocation
page read and write
1D5AF319000
trusted library allocation
page read and write
1D5A94C3000
trusted library allocation
page read and write
1D59C433000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A73BF000
trusted library allocation
page read and write
1D5AF0ED000
trusted library allocation
page read and write
1D5A8B9B000
trusted library allocation
page read and write
1D5AD6AE000
trusted library allocation
page read and write
1E522B8A000
heap
page read and write
1D5ADAAF000
trusted library allocation
page read and write
1D5ADAC0000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A725D000
trusted library allocation
page read and write
1E522B00000
heap
page read and write
1D59C3D9000
heap
page read and write
1D5A2541000
trusted library allocation
page read and write
1D5AFAD4000
trusted library allocation
page read and write
1D59C3A1000
heap
page read and write
1D5A71B1000
trusted library allocation
page read and write
1D5A55AB000
trusted library allocation
page read and write
17A322A0000
heap
page read and write
1D5A71B9000
trusted library allocation
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D5A7827000
trusted library allocation
page read and write
1D5AD84E000
trusted library allocation
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1AE00E10000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5AD5E5000
trusted library allocation
page read and write
1D5AEF38000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5A7E4A000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1D5A8E63000
trusted library allocation
page read and write
1D5AD8E0000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D59C3B2000
heap
page read and write
13DDA707000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A2532000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A71FD000
trusted library allocation
page read and write
1D5AD8C9000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
ED4000
heap
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D5A733C000
trusted library allocation
page read and write
1D5A7A5E000
trusted library allocation
page read and write
1D5A6B6D000
trusted library allocation
page read and write
1D5A68C0000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A92C9000
trusted library allocation
page read and write
1D5A8BCD000
trusted library allocation
page read and write
CF945FE000
stack
page read and write
566D7D8000
stack
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D5A74B5000
trusted library allocation
page read and write
1D5A6F63000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A72BE000
trusted library allocation
page read and write
1D5A264A000
trusted library allocation
page read and write
1D5A6F7E000
trusted library allocation
page read and write
1AE00F00000
trusted library allocation
page read and write
1D5A6DFB000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5AD89B000
trusted library allocation
page read and write
1D5A7D10000
trusted library allocation
page read and write
1D5AD4FE000
trusted library allocation
page read and write
1D5A742F000
trusted library allocation
page read and write
1D59C412000
heap
page read and write
1D5A7E3F000
trusted library allocation
page read and write
1D5AD8A6000
trusted library allocation
page read and write
1D5A5C67000
trusted library allocation
page read and write
1D5A2CA2000
heap
page read and write
1D5A55A2000
trusted library allocation
page read and write
1D5A6BDC000
trusted library allocation
page read and write
1E521E50000
unclassified section
page read and write
1D5A6FCE000
trusted library allocation
page read and write
1D5A73A8000
trusted library allocation
page read and write
1D5A8B7C000
trusted library allocation
page read and write
1D5A6D3F000
trusted library allocation
page read and write
1D5A5EE2000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A37C6000
trusted library allocation
page read and write
1E521F5F000
trusted library allocation
page read and write
1D5A3794000
trusted library allocation
page read and write
1D5A5516000
trusted library allocation
page read and write
1D5A7EAD000
trusted library allocation
page read and write
1D5AD356000
trusted library allocation
page read and write
1D5ADA46000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1E522BE1000
heap
page read and write
13DDA4A0000
heap
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D59C3FC000
heap
page read and write
544000
unkown
page readonly
1D5AD9B4000
trusted library allocation
page read and write
1D5A1376000
trusted library allocation
page read and write
1D5A6BE1000
trusted library allocation
page read and write
1D5A6DD4000
trusted library allocation
page read and write
F5E000
stack
page read and write
1D59C3C1000
heap
page read and write
1D59C3C0000
heap
page read and write
2A613B2F000
heap
page read and write
1D5A7268000
trusted library allocation
page read and write
CF94DFF000
stack
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D5A71B5000
trusted library allocation
page read and write
1D5A586F000
trusted library allocation
page read and write
1D5A7C8F000
trusted library allocation
page read and write
1D5AD45B000
trusted library allocation
page read and write
1D5A6C3D000
trusted library allocation
page read and write
1AE00F18000
trusted library allocation
page read and write
1D5A7842000
trusted library allocation
page read and write
1D5A236C000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5A7C98000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A761C000
trusted library allocation
page read and write
1D5AEFF0000
trusted library allocation
page read and write
1D5A763E000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A7A48000
trusted library allocation
page read and write
1D59C407000
heap
page read and write
1D5A64E7000
trusted library allocation
page read and write
1D5A7483000
trusted library allocation
page read and write
1D5A6DA5000
trusted library allocation
page read and write
1D5A8892000
trusted library allocation
page read and write
1D5A747E000
trusted library allocation
page read and write
1D5AD8A0000
trusted library allocation
page read and write
1D5A25E3000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5AD862000
trusted library allocation
page read and write
1D5A6BF3000
trusted library allocation
page read and write
1D5A3127000
trusted library allocation
page read and write
1D5A3122000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D5A6B73000
trusted library allocation
page read and write
1D5AF962000
trusted library allocation
page read and write
1D5AECCE000
trusted library allocation
page read and write
1D5AD8AB000
trusted library allocation
page read and write
1D5A7C6E000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C411000
heap
page read and write
1D5A68DA000
trusted library allocation
page read and write
1D5A55FB000
trusted library allocation
page read and write
1D5A31C5000
trusted library allocation
page read and write
1D5A8872000
trusted library allocation
page read and write
87143DE000
stack
page read and write
1D59C3FD000
heap
page read and write
1E522C77000
heap
page read and write
1D5A6DF1000
trusted library allocation
page read and write
1D5A727B000
trusted library allocation
page read and write
1D5A5892000
trusted library allocation
page read and write
1D5A782A000
trusted library allocation
page read and write
1D5A8DAB000
trusted library allocation
page read and write
1D5A1482000
trusted library allocation
page read and write
1D5AD669000
trusted library allocation
page read and write
1D5ADABC000
trusted library allocation
page read and write
1D59C391000
heap
page read and write
1E522570000
trusted library allocation
page read and write
1D5A88DE000
trusted library allocation
page read and write
1D5A7696000
trusted library allocation
page read and write
1D5A7454000
trusted library allocation
page read and write
1D5A6D76000
trusted library allocation
page read and write
1D59C416000
heap
page read and write
1D5A72F3000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5A746B000
trusted library allocation
page read and write
1D5AEF38000
trusted library allocation
page read and write
17A322C0000
unclassified section
page readonly
1E522B7F000
heap
page read and write
1D5A6FE7000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5AF34D000
trusted library allocation
page read and write
1D5A8BA0000
trusted library allocation
page read and write
1D59C3C0000
heap
page read and write
1D5B0100000
trusted library allocation
page read and write
1D5AEFC8000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5AD3E8000
trusted library allocation
page read and write
1D5A14F0000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A7CFD000
trusted library allocation
page read and write
1AE00EC8000
trusted library allocation
page read and write
1D5ADA16000
trusted library allocation
page read and write
1D5AD33C000
trusted library allocation
page read and write
1E522C2B000
heap
page read and write
1D59C3AC000
heap
page read and write
1D5AD9B2000
trusted library allocation
page read and write
1D59C3CA000
heap
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D5A6CC3000
trusted library allocation
page read and write
1D59C3DD000
heap
page read and write
1D5A2D76000
trusted library allocation
page read and write
1E522C3B000
heap
page read and write
1D59C3DD000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5ADAB1000
trusted library allocation
page read and write
1D5A8850000
trusted library allocation
page read and write
1D5A7EED000
trusted library allocation
page read and write
1D5A7255000
trusted library allocation
page read and write
1AE00EE9000
trusted library allocation
page read and write
1D5A7C98000
trusted library allocation
page read and write
1D5A6CB9000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
566EFFE000
unkown
page readonly
1D5A8B41000
trusted library allocation
page read and write
1D59C3C4000
heap
page read and write
1D5A70E6000
trusted library allocation
page read and write
1D5A8D71000
trusted library allocation
page read and write
1D5AF0EB000
trusted library allocation
page read and write
1D5A0DBF000
trusted library allocation
page read and write
1AE00B8A000
heap
page read and write
1D5A7493000
trusted library allocation
page read and write
1D5A7EFE000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A721A000
trusted library allocation
page read and write
1D5A6DBB000
trusted library allocation
page read and write
1D5AF09F000
trusted library allocation
page read and write
1D5AD468000
trusted library allocation
page read and write
1D5A6BDA000
trusted library allocation
page read and write
1D5AFAD7000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
1D5A6F8E000
trusted library allocation
page read and write
F8E000
heap
page read and write
1D5A7AC6000
trusted library allocation
page read and write
1D5A6B58000
trusted library allocation
page read and write
1D5A6F75000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D5A3ADD000
trusted library allocation
page read and write
1D5A8B31000
trusted library allocation
page read and write
1D5A7648000
trusted library allocation
page read and write
1D5A374E000
trusted library allocation
page read and write
1D5A68BF000
trusted library allocation
page read and write
1D5A7493000
trusted library allocation
page read and write
17A327F5000
trusted library allocation
page read and write
1D5A88B4000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AF0EB000
trusted library allocation
page read and write
1D5A7280000
trusted library allocation
page read and write
471000
unkown
page execute read
1D5AD4C9000
trusted library allocation
page read and write
1D5A2A63000
trusted library allocation
page read and write
1D5ADAFA000
trusted library allocation
page read and write
1D5A7170000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D5A373F000
trusted library allocation
page read and write
1D5A2665000
trusted library allocation
page read and write
1D5AD36C000
trusted library allocation
page read and write
1D5A719E000
trusted library allocation
page read and write
1D5A2532000
trusted library allocation
page read and write
22AB5FC000
stack
page read and write
1D59C3AC000
heap
page read and write
1D5A6B8F000
trusted library allocation
page read and write
1D5A31BE000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
3CEC72F1000
trusted library allocation
page execute read
1D5A6FC1000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1E521F00000
trusted library allocation
page read and write
1D5A746A000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A7A6D000
trusted library allocation
page read and write
1D5A6DC2000
trusted library allocation
page read and write
1D5AD4C3000
trusted library allocation
page read and write
1D5A7181000
trusted library allocation
page read and write
1D59C3C4000
heap
page read and write
1D59C387000
heap
page read and write
1D5AD4E0000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A7238000
trusted library allocation
page read and write
1D5A70E9000
trusted library allocation
page read and write
1D5A5EF6000
trusted library allocation
page read and write
1E521E30000
heap
page readonly
1D5A7307000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A783E000
trusted library allocation
page read and write
1D5A6B8A000
trusted library allocation
page read and write
1D5A7BC0000
trusted library allocation
page read and write
1D5A238B000
trusted library allocation
page read and write
1D5A7146000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3AC000
heap
page read and write
1D5A3121000
trusted library allocation
page read and write
1D5A7E51000
trusted library allocation
page read and write
1E522BF0000
heap
page read and write
1D5AF93C000
trusted library allocation
page read and write
1D5A37B7000
trusted library allocation
page read and write
1D5A71A8000
trusted library allocation
page read and write
1D5A31BE000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A2CB3000
heap
page read and write
1D59C407000
heap
page read and write
1D5A74C2000
trusted library allocation
page read and write
1D5AD87E000
trusted library allocation
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A374E000
trusted library allocation
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A71B5000
trusted library allocation
page read and write
1D5A8877000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
F8B000
heap
page read and write
1D5AF0E9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A7BB8000
trusted library allocation
page read and write
1D5A726B000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1D5A3109000
trusted library allocation
page read and write
1D59C416000
heap
page read and write
1D59C3B9000
heap
page read and write
1E522650000
heap
page read and write
1D5A7634000
trusted library allocation
page read and write
1D5AD88B000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A6882000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D59C40C000
heap
page read and write
1D5A7A2E000
trusted library allocation
page read and write
1D5A37D7000
trusted library allocation
page read and write
1D5A7EF7000
trusted library allocation
page read and write
1D5A7307000
trusted library allocation
page read and write
1D5A312D000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E521F23000
trusted library allocation
page read and write
1D5AF0B9000
trusted library allocation
page read and write
871431E000
unkown
page readonly
1D5A68D7000
trusted library allocation
page read and write
1D5A7B85000
trusted library allocation
page read and write
1D5AF349000
trusted library allocation
page read and write
1D5A88E3000
trusted library allocation
page read and write
1D5A6FD7000
trusted library allocation
page read and write
13DDA4AD000
heap
page read and write
1D5A7630000
trusted library allocation
page read and write
1AE00EA7000
trusted library allocation
page read and write
1D5A7E43000
trusted library allocation
page read and write
1D5A6B1B000
trusted library allocation
page read and write
1D5A7ADD000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A7483000
trusted library allocation
page read and write
1D59C3B5000
heap
page read and write
1D5AD332000
trusted library allocation
page read and write
1D5A14FC000
trusted library allocation
page read and write
1D5A71DE000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D5A6F63000
trusted library allocation
page read and write
1D5A716E000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1E522BE8000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5AD8C1000
trusted library allocation
page read and write
1D5AD652000
trusted library allocation
page read and write
1D5A6FC1000
trusted library allocation
page read and write
1D5A23BB000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D5A1475000
trusted library allocation
page read and write
1D596EE6000
heap
page read and write
1D5A37AD000
trusted library allocation
page read and write
1D5A7CA1000
trusted library allocation
page read and write
1D5A7259000
trusted library allocation
page read and write
1D5A92E9000
trusted library allocation
page read and write
1D5A7178000
trusted library allocation
page read and write
1D59C3AA000
heap
page read and write
1D5A23B8000
trusted library allocation
page read and write
87142DD000
stack
page read and write
1E521C9A000
heap
page read and write
1D5A78DA000
trusted library allocation
page read and write
1D5A92FE000
trusted library allocation
page read and write
1AE00E7B000
trusted library allocation
page read and write
1D5ADA05000
trusted library allocation
page read and write
1D5A25AE000
trusted library allocation
page read and write
1D5A78EB000
trusted library allocation
page read and write
1D5AEC3E000
trusted library allocation
page read and write
1E522A07000
trusted library allocation
page read and write
1E522BFD000
heap
page read and write
1D5AD475000
trusted library allocation
page read and write
1D5A3A9B000
trusted library allocation
page read and write
1D5A68C0000
trusted library allocation
page read and write
1D5AD5FB000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5AD8F5000
trusted library allocation
page read and write
2F1D47E000
unkown
page readonly
1D5A7CA1000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
1D5A68ED000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D59C3B2000
heap
page read and write
17A327DB000
trusted library allocation
page read and write
1D5AF94B000
trusted library allocation
page read and write
1D5A583B000
trusted library allocation
page read and write
1D5A3791000
trusted library allocation
page read and write
2F1D3FE000
unkown
page readonly
1D59C39E000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5AF940000
trusted library allocation
page read and write
22ABDFE000
stack
page read and write
1E522B8D000
heap
page read and write
1E522BE8000
heap
page read and write
1D59C3A4000
heap
page read and write
1C2E000
stack
page read and write
1D59C3A8000
heap
page read and write
1D5ADA4B000
trusted library allocation
page read and write
1AE01000000
heap
page read and write
1D5A71B7000
trusted library allocation
page read and write
1D5A2541000
trusted library allocation
page read and write
2A613B20000
heap
page read and write
1D5A378C000
trusted library allocation
page read and write
1D5A8866000
trusted library allocation
page read and write
1D5A6DDA000
trusted library allocation
page read and write
1D5AEFDD000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
2468CFE03000
trusted library allocation
page read and write
1D5A7646000
trusted library allocation
page read and write
1D5AF0F5000
trusted library allocation
page read and write
1D5A2DA9000
trusted library allocation
page read and write
1D5B1178000
heap
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5A7268000
trusted library allocation
page read and write
1D5AF321000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A6F3B000
trusted library allocation
page read and write
1E521F10000
trusted library allocation
page read and write
1D5A7C81000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A3A68000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A71DF000
trusted library allocation
page read and write
1D5A146A000
trusted library allocation
page read and write
1D5A6F9F000
trusted library allocation
page read and write
1D5A719D000
trusted library allocation
page read and write
1D5A8821000
trusted library allocation
page read and write
1D5AD60C000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AEF06000
trusted library allocation
page read and write
1D5A73A8000
trusted library allocation
page read and write
1D5AD33D000
trusted library allocation
page read and write
1D5A8B7A000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A74B5000
trusted library allocation
page read and write
1D5A7031000
trusted library allocation
page read and write
1D5AF339000
trusted library allocation
page read and write
1D5A739F000
trusted library allocation
page read and write
1D5A6C68000
trusted library allocation
page read and write
1D5A7A4F000
trusted library allocation
page read and write
1E522BE9000
heap
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D5A37B7000
trusted library allocation
page read and write
1E521CD0000
heap
page read and write
1D5AD6AC000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1E522BB9000
heap
page read and write
1D5A5EE6000
trusted library allocation
page read and write
1D5AEE0C000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A6F79000
trusted library allocation
page read and write
1D5A6CDC000
trusted library allocation
page read and write
1D5AD4CB000
trusted library allocation
page read and write
1D5A2CB0000
heap
page read and write
1D5AD6AA000
trusted library allocation
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D5A6F73000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A5ED1000
trusted library allocation
page read and write
1D5A6882000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A37CA000
trusted library allocation
page read and write
1E522BE6000
heap
page read and write
1D5A71DA000
trusted library allocation
page read and write
1D5A2527000
trusted library allocation
page read and write
1D5A7181000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A73AF000
trusted library allocation
page read and write
1D5A7EBD000
trusted library allocation
page read and write
1D5AF0C6000
trusted library allocation
page read and write
1D5A2572000
trusted library allocation
page read and write
1AE00F14000
trusted library allocation
page read and write
1D5A6C71000
trusted library allocation
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5A37C6000
trusted library allocation
page read and write
1D5AD923000
trusted library allocation
page read and write
1D5A6BB7000
trusted library allocation
page read and write
1D5A88FC000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A7BC0000
trusted library allocation
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
1D5A782A000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5AEF38000
trusted library allocation
page read and write
1D5A5871000
trusted library allocation
page read and write
1D59C44D000
heap
page read and write
1D5A3799000
trusted library allocation
page read and write
1AE00E23000
trusted library allocation
page read and write
2A613D00000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5B0137000
trusted library allocation
page read and write
1D5A6FCF000
trusted library allocation
page read and write
1D5A13FE000
trusted library allocation
page read and write
1D5A5EF6000
trusted library allocation
page read and write
1D5B0105000
trusted library allocation
page read and write
17A32803000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5B10E1000
heap
page read and write
1D59C3A8000
heap
page read and write
1D59C3C1000
heap
page read and write
1D5A7815000
trusted library allocation
page read and write
1D5A25E3000
trusted library allocation
page read and write
1D5A6F53000
trusted library allocation
page read and write
1D59C414000
heap
page read and write
1E521EB4000
heap
page read and write
1D5AD546000
trusted library allocation
page read and write
1D59C413000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5AD4D3000
trusted library allocation
page read and write
1D5AD4C9000
trusted library allocation
page read and write
1D5AD4D9000
trusted library allocation
page read and write
1D5AD5E5000
trusted library allocation
page read and write
1D5ADACA000
trusted library allocation
page read and write
1D5A8B9D000
trusted library allocation
page read and write
1D5A2510000
trusted library allocation
page read and write
1D5A236C000
trusted library allocation
page read and write
1D5A6BFA000
trusted library allocation
page read and write
2F1D43D000
stack
page read and write
1D59C404000
heap
page read and write
1D59C3BC000
heap
page read and write
1D5AD930000
trusted library allocation
page read and write
1D5AF361000
trusted library allocation
page read and write
1D5A31C9000
trusted library allocation
page read and write
1D5A7E7A000
trusted library allocation
page read and write
1D5A6FC1000
trusted library allocation
page read and write
1D5AD6B2000
trusted library allocation
page read and write
1D5A5E45000
trusted library allocation
page read and write
1D5A713C000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5AD8A1000
trusted library allocation
page read and write
1D5A7126000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5AD862000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5AF0BA000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AD4BD000
trusted library allocation
page read and write
17A32770000
trusted library allocation
page read and write
1D5A37CA000
trusted library allocation
page read and write
1D5A7C45000
trusted library allocation
page read and write
1D5A6FAE000
trusted library allocation
page read and write
1D5A3741000
trusted library allocation
page read and write
1D5A55C1000
trusted library allocation
page read and write
1D5A74DF000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C3B4000
heap
page read and write
1D5A252A000
trusted library allocation
page read and write
CF935FB000
stack
page read and write
1D5A78EB000
trusted library allocation
page read and write
1D5A7A35000
trusted library allocation
page read and write
1D5A7A45000
trusted library allocation
page read and write
1D5A7487000
trusted library allocation
page read and write
1D5A557F000
trusted library allocation
page read and write
1D5A7640000
trusted library allocation
page read and write
1D5A6DFB000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A6F58000
trusted library allocation
page read and write
1D5A6B31000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D5A6F9F000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1E522B5C000
heap
page read and write
1D59C3B9000
heap
page read and write
1D59C3D4000
heap
page read and write
1D5A7264000
trusted library allocation
page read and write
1D5A6D5D000
trusted library allocation
page read and write
1D5A8833000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D59C410000
heap
page read and write
1D5A7E7A000
trusted library allocation
page read and write
1D5A735F000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C403000
heap
page read and write
1D5A5EB1000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D5A55AB000
trusted library allocation
page read and write
1D5A712C000
trusted library allocation
page read and write
1D5A71DE000
trusted library allocation
page read and write
1D5A58F5000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A689C000
trusted library allocation
page read and write
1D5A747B000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5A3A6F000
trusted library allocation
page read and write
1D5A5E53000
trusted library allocation
page read and write
1D59C3D0000
heap
page read and write
17A327A2000
trusted library allocation
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1D5A73DE000
trusted library allocation
page read and write
1D5A8AA4000
trusted library allocation
page read and write
1D5A25E8000
trusted library allocation
page read and write
1D5A6EC1000
trusted library allocation
page read and write
1E522BE0000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5ADA40000
trusted library allocation
page read and write
1D5AD8C5000
trusted library allocation
page read and write
1D5AD5F6000
trusted library allocation
page read and write
2A612200000
trusted library allocation
page read and write
1D5A37FE000
trusted library allocation
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1D5A7670000
trusted library allocation
page read and write
1D5A6BF0000
trusted library allocation
page read and write
1D5A3A7B000
trusted library allocation
page read and write
871973E000
unkown
page readonly
1D5A310B000
trusted library allocation
page read and write
1D5AEF93000
trusted library allocation
page read and write
1D5AEF30000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5AF94B000
trusted library allocation
page read and write
1D5A77EE000
trusted library allocation
page read and write
17A32350000
heap
page read and write
17A32724000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5A37B7000
trusted library allocation
page read and write
1D5A7A7C000
trusted library allocation
page read and write
1AE00EA0000
trusted library allocation
page read and write
1D59C3B5000
heap
page read and write
1D59C3CC000
heap
page read and write
1D5A6DF9000
trusted library allocation
page read and write
17A327B6000
trusted library allocation
page read and write
1D5A781E000
trusted library allocation
page read and write
1D5A7273000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D5AD413000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1E521F63000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5AD342000
trusted library allocation
page read and write
1D5A6FE5000
trusted library allocation
page read and write
1E522C68000
heap
page read and write
1D5AD457000
trusted library allocation
page read and write
1D5A2A21000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5A73AF000
trusted library allocation
page read and write
1D59C444000
heap
page read and write
1D5A2D82000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
566CD6E000
unkown
page readonly
1D59C3BD000
heap
page read and write
1D5AF321000
trusted library allocation
page read and write
1AE00E81000
trusted library allocation
page read and write
1D5A7219000
trusted library allocation
page read and write
1D5AD552000
trusted library allocation
page read and write
1D5ADABC000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
871873E000
unkown
page readonly
1D5A6DBB000
trusted library allocation
page read and write
1D5A78D8000
trusted library allocation
page read and write
1D5A6C09000
trusted library allocation
page read and write
1D5A96F8000
heap
page read and write
1AE00E73000
trusted library allocation
page read and write
1D5AD89D000
trusted library allocation
page read and write
1D5A8821000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D59C403000
heap
page read and write
1D5A6D44000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C3D8000
heap
page read and write
1D5A6B91000
trusted library allocation
page read and write
1D5A6851000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D59C411000
heap
page read and write
1D5A749F000
trusted library allocation
page read and write
1D5A6DC2000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A6BED000
trusted library allocation
page read and write
1D5A6B9A000
trusted library allocation
page read and write
1D5A55F5000
trusted library allocation
page read and write
1D5A71B7000
trusted library allocation
page read and write
567007E000
unkown
page readonly
1D5A6C1B000
trusted library allocation
page read and write
1D5AEC37000
trusted library allocation
page read and write
1D5A71BE000
trusted library allocation
page read and write
17A3276B000
trusted library allocation
page read and write
1D5A6F75000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5AD8A1000
trusted library allocation
page read and write
1D5A5879000
trusted library allocation
page read and write
1D5A6DA6000
trusted library allocation
page read and write
1D5AD55F000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A788F000
trusted library allocation
page read and write
1D5A780A000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5A74B5000
trusted library allocation
page read and write
1E522BAA000
heap
page read and write
2F1B18E000
stack
page read and write
1D5A7A2E000
trusted library allocation
page read and write
1D5A6FD4000
trusted library allocation
page read and write
1D5AEDE5000
trusted library allocation
page read and write
1D5A3A7D000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A7837000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A2A46000
trusted library allocation
page read and write
1D5A5824000
trusted library allocation
page read and write
1D5ADA51000
trusted library allocation
page read and write
1D5AD8F9000
trusted library allocation
page read and write
1D5A6DFB000
trusted library allocation
page read and write
1D5A7A6A000
trusted library allocation
page read and write
1D5A7252000
trusted library allocation
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D5A885C000
trusted library allocation
page read and write
1D5AF0B6000
trusted library allocation
page read and write
1D5A6BE1000
trusted library allocation
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1D5A37B9000
trusted library allocation
page read and write
1D5A7C85000
trusted library allocation
page read and write
1D5AEF19000
trusted library allocation
page read and write
1D5A3A97000
trusted library allocation
page read and write
1D5A781E000
trusted library allocation
page read and write
1D5A2A25000
trusted library allocation
page read and write
1D5A58B8000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A7C78000
trusted library allocation
page read and write
1D5AF35B000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A6B2D000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
3CEC72A4000
trusted library allocation
page execute read
1D5A746A000
trusted library allocation
page read and write
1D5AF962000
trusted library allocation
page read and write
1D5A7EFE000
trusted library allocation
page read and write
F88000
heap
page read and write
1D5A735D000
trusted library allocation
page read and write
1D5A782A000
trusted library allocation
page read and write
1D5A729C000
trusted library allocation
page read and write
1D5A7428000
trusted library allocation
page read and write
1D5A7B6D000
trusted library allocation
page read and write
1D5AF0ED000
trusted library allocation
page read and write
1D5AF0E7000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D5A6CA5000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A8B75000
trusted library allocation
page read and write
1E521F67000
trusted library allocation
page read and write
1D5AD643000
trusted library allocation
page read and write
1D5AD36F000
trusted library allocation
page read and write
1AE00E03000
trusted library allocation
page read and write
1D59C3AE000
heap
page read and write
1D5A234B000
trusted library allocation
page read and write
1D5AF0C6000
trusted library allocation
page read and write
1D5A37C2000
trusted library allocation
page read and write
1D5A6DA8000
trusted library allocation
page read and write
1D5A77EE000
trusted library allocation
page read and write
1D5A68B2000
trusted library allocation
page read and write
1D5A74A9000
trusted library allocation
page read and write
1D5A3121000
trusted library allocation
page read and write
1D5AD5FD000
trusted library allocation
page read and write
1D5AEF23000
trusted library allocation
page read and write
1D5A7C8B000
trusted library allocation
page read and write
1D5A2555000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D5A7089000
trusted library allocation
page read and write
1D5A3AA8000
trusted library allocation
page read and write
1E522BE9000
heap
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1D5A76D9000
trusted library allocation
page read and write
1D5A68EA000
trusted library allocation
page read and write
1D5A3A99000
trusted library allocation
page read and write
1D5A3ABB000
trusted library allocation
page read and write
1D5AFABF000
trusted library allocation
page read and write
1D5B1116000
heap
page read and write
1D5AD92E000
trusted library allocation
page read and write
1AE00A50000
heap
page read and write
1D5A6BD8000
trusted library allocation
page read and write
1D5AF0EB000
trusted library allocation
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D5AD8C8000
trusted library allocation
page read and write
1D59C384000
heap
page read and write
1D5A6B2F000
trusted library allocation
page read and write
1D5AD8BA000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A8AFE000
trusted library allocation
page read and write
1D5A77D3000
trusted library allocation
page read and write
1D5A1855000
trusted library allocation
page read and write
13DDA4A7000
heap
page read and write
17A3270C000
trusted library allocation
page read and write
1D5A6BF7000
trusted library allocation
page read and write
1D5A55A2000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
ED4000
heap
page read and write
1D5AD8E1000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A7BBA000
trusted library allocation
page read and write
1D5A6BF0000
trusted library allocation
page read and write
1D5AF04B000
trusted library allocation
page read and write
1D5A2CA3000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A1466000
trusted library allocation
page read and write
1D5A74EB000
trusted library allocation
page read and write
1D59C3DD000
heap
page read and write
1D5A6B61000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A7CFD000
trusted library allocation
page read and write
1D5A5878000
trusted library allocation
page read and write
1D5A2513000
trusted library allocation
page read and write
1D5A8BA0000
trusted library allocation
page read and write
1D5A55AB000
trusted library allocation
page read and write
1D5A3A83000
trusted library allocation
page read and write
1D59C3DD000
heap
page read and write
1D5A0D9E000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5AD5F2000
trusted library allocation
page read and write
1D5AD64E000
trusted library allocation
page read and write
1D5AF0D5000
trusted library allocation
page read and write
1D5A7273000
trusted library allocation
page read and write
1D5A7815000
trusted library allocation
page read and write
1D5A6BC5000
trusted library allocation
page read and write
1D5A7CE4000
trusted library allocation
page read and write
1D5AD3D2000
trusted library allocation
page read and write
1D5A7263000
trusted library allocation
page read and write
CF935FF000
stack
page read and write
1D5AF0F3000
trusted library allocation
page read and write
1D5A7CC0000
trusted library allocation
page read and write
1D5AEF30000
trusted library allocation
page read and write
1D5A7126000
trusted library allocation
page read and write
1D59C3AA000
heap
page read and write
1D5AD87D000
trusted library allocation
page read and write
1D5A3A92000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A76CB000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
17A327B2000
trusted library allocation
page read and write
1D5A5EB4000
trusted library allocation
page read and write
1D5A730E000
trusted library allocation
page read and write
1D5A73F8000
trusted library allocation
page read and write
1D5AD3E3000
trusted library allocation
page read and write
2A612370000
heap
page read and write
1D59C3A2000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A6B21000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C395000
heap
page read and write
1D5A88E3000
trusted library allocation
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D59C3AD000
heap
page read and write
1D5A234B000
trusted library allocation
page read and write
1D5AEF98000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A6F66000
trusted library allocation
page read and write
1D5A7C8B000
trusted library allocation
page read and write
1D5A68F8000
trusted library allocation
page read and write
1D5A6FC4000
trusted library allocation
page read and write
1D5A2C9B000
heap
page read and write
1D5A729C000
trusted library allocation
page read and write
1D59C3A7000
heap
page read and write
F8A000
heap
page read and write
1D5ADAAB000
trusted library allocation
page read and write
1D5A8BC8000
trusted library allocation
page read and write
2A613B28000
heap
page read and write
1D5A7EC3000
trusted library allocation
page read and write
1D5AD4C3000
trusted library allocation
page read and write
1D59C3AA000
heap
page read and write
1D5A716E000
trusted library allocation
page read and write
1D5A7378000
trusted library allocation
page read and write
1D5A784D000
trusted library allocation
page read and write
1D5A7280000
trusted library allocation
page read and write
1D5A6DC2000
trusted library allocation
page read and write
1D5AD879000
trusted library allocation
page read and write
1D5AF0EB000
trusted library allocation
page read and write
1D59C3CE000
heap
page read and write
1D5A7268000
trusted library allocation
page read and write
1D5A726B000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A88E3000
trusted library allocation
page read and write
1D5A7636000
trusted library allocation
page read and write
1D5A7238000
trusted library allocation
page read and write
1D5A1500000
trusted library allocation
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5A253C000
trusted library allocation
page read and write
1D5A77AD000
trusted library allocation
page read and write
1D5A7BBA000
trusted library allocation
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5A77D3000
trusted library allocation
page read and write
1D5A7696000
trusted library allocation
page read and write
1D5A6BFA000
trusted library allocation
page read and write
1D5A25B4000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A7CF3000
trusted library allocation
page read and write
1D5AFAD4000
trusted library allocation
page read and write
1D59C406000
heap
page read and write
1D59C3FD000
heap
page read and write
1D5A5536000
trusted library allocation
page read and write
1D5A7309000
trusted library allocation
page read and write
1D5AD4CB000
trusted library allocation
page read and write
1D5A3791000
trusted library allocation
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5AEF76000
trusted library allocation
page read and write
1D5AF9FA000
trusted library allocation
page read and write
1D5A5ED1000
trusted library allocation
page read and write
1D5ADAB1000
trusted library allocation
page read and write
17A32040000
unclassified section
page readonly
1D5A25EC000
trusted library allocation
page read and write
1D5A7454000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A688D000
trusted library allocation
page read and write
1D5AD8BA000
trusted library allocation
page read and write
1D59C3FC000
heap
page read and write
1D5A3A8F000
trusted library allocation
page read and write
17A32030000
unclassified section
page readonly
1D5A881E000
trusted library allocation
page read and write
1D5A7CE4000
trusted library allocation
page read and write
544000
unkown
page readonly
1D5A6FEE000
trusted library allocation
page read and write
1D5A741C000
trusted library allocation
page read and write
1D5A2A86000
trusted library allocation
page read and write
1D5ADAAF000
trusted library allocation
page read and write
1D5ADA61000
trusted library allocation
page read and write
1D5A763E000
trusted library allocation
page read and write
1D5AD471000
trusted library allocation
page read and write
1D59C408000
heap
page read and write
1D59C407000
heap
page read and write
2A613B39000
heap
page read and write
1D5A3A68000
trusted library allocation
page read and write
1D5AD332000
trusted library allocation
page read and write
1D5A6BF3000
trusted library allocation
page read and write
1D5ADA5A000
trusted library allocation
page read and write
1D5A71B1000
trusted library allocation
page read and write
1D5A74A0000
trusted library allocation
page read and write
1D5A3A8A000
trusted library allocation
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A88C9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AD3AE000
trusted library allocation
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1D5AF0E7000
trusted library allocation
page read and write
1D5AF36E000
trusted library allocation
page read and write
1D5A8B89000
trusted library allocation
page read and write
1D5AEE48000
trusted library allocation
page read and write
F9E000
heap
page read and write
1D59C3A2000
heap
page read and write
1D59C3B3000
heap
page read and write
1D5A71A7000
trusted library allocation
page read and write
1D5A735F000
trusted library allocation
page read and write
1D5A883F000
trusted library allocation
page read and write
1D5AD8D0000
trusted library allocation
page read and write
1D5ADA3C000
trusted library allocation
page read and write
1D5A3AAB000
trusted library allocation
page read and write
1D5AD930000
trusted library allocation
page read and write
1D5A7268000
trusted library allocation
page read and write
1E522B8A000
heap
page read and write
1D5A0DB3000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
3474000
heap
page read and write
1D5AD85D000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A71B5000
trusted library allocation
page read and write
1D5AF0C6000
trusted library allocation
page read and write
1D5A6856000
trusted library allocation
page read and write
1D5A7483000
trusted library allocation
page read and write
1D5AF0E7000
trusted library allocation
page read and write
1D59C3CE000
heap
page read and write
1D5AF3A5000
trusted library allocation
page read and write
1D5A6F73000
trusted library allocation
page read and write
1E522BF0000
heap
page read and write
1D5A78AE000
trusted library allocation
page read and write
1AE00E0D000
trusted library allocation
page read and write
1D5A7C8F000
trusted library allocation
page read and write
1D5A7EEB000
trusted library allocation
page read and write
3940000
heap
page read and write
1D5A6B88000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A8D44000
trusted library allocation
page read and write
1D5A7146000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3C7000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A7238000
trusted library allocation
page read and write
3941000
heap
page read and write
1D5AD6C9000
trusted library allocation
page read and write
1D5A8BA4000
trusted library allocation
page read and write
1D5A7A5C000
trusted library allocation
page read and write
1D5A5E49000
trusted library allocation
page read and write
1D5A3A8F000
trusted library allocation
page read and write
17A32719000
trusted library allocation
page read and write
1E521E52000
unclassified section
page read and write
1D5A74C2000
trusted library allocation
page read and write
1D5AD6AA000
trusted library allocation
page read and write
1D5B0167000
trusted library allocation
page read and write
1D5A25B9000
trusted library allocation
page read and write
1D5A7A35000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5B011C000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AECFC000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D59C3B3000
heap
page read and write
1D5A7B28000
trusted library allocation
page read and write
1D5A72FE000
trusted library allocation
page read and write
1D5A724A000
trusted library allocation
page read and write
1D5A77D3000
trusted library allocation
page read and write
1D5A6FC1000
trusted library allocation
page read and write
1D5A7248000
trusted library allocation
page read and write
F9E000
heap
page read and write
1D5A3791000
trusted library allocation
page read and write
1D5A6D3D000
trusted library allocation
page read and write
1D5A8BEA000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A6F6D000
trusted library allocation
page read and write
1D5A6D73000
trusted library allocation
page read and write
1D5A74F6000
trusted library allocation
page read and write
1E522BE0000
heap
page read and write
1D5AEF48000
trusted library allocation
page read and write
1D5A719E000
trusted library allocation
page read and write
532000
unkown
page readonly
1D5AD6E3000
trusted library allocation
page read and write
1D5A68B2000
trusted library allocation
page read and write
1D5A88C9000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D59C407000
heap
page read and write
1D5A7475000
trusted library allocation
page read and write
8714DD8000
stack
page read and write
1D5A0DC0000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
17A32400000
trusted library allocation
page read and write
1D5A132F000
trusted library allocation
page read and write
1D5A6B75000
trusted library allocation
page read and write
1D5AEEE4000
trusted library allocation
page read and write
1D5AF0E9000
trusted library allocation
page read and write
1D59C411000
heap
page read and write
1D5A6DD4000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A8877000
trusted library allocation
page read and write
1D5A2D59000
trusted library allocation
page read and write
1D5A6DAC000
trusted library allocation
page read and write
1D59C3AF000
heap
page read and write
1D5A7268000
trusted library allocation
page read and write
1D5A6F3B000
trusted library allocation
page read and write
1D5AF0EF000
trusted library allocation
page read and write
1D59C395000
heap
page read and write
1D5A749F000
trusted library allocation
page read and write
1D5A2AF8000
trusted library allocation
page read and write
1D5AD8F5000
trusted library allocation
page read and write
2F1B1CE000
unkown
page readonly
1D5A6BC5000
trusted library allocation
page read and write
1E522460000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5AD5BC000
trusted library allocation
page read and write
1D5ADAB1000
trusted library allocation
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D59C406000
heap
page read and write
1D5A7EC3000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A74EC000
trusted library allocation
page read and write
1D5A8BEB000
trusted library allocation
page read and write
1D5A68C1000
trusted library allocation
page read and write
1D59C407000
heap
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D5A6859000
trusted library allocation
page read and write
1D5A26E4000
trusted library allocation
page read and write
1D5A8BCD000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
CF95DFE000
stack
page read and write
1D59C405000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D5B1132000
heap
page read and write
566CD2D000
stack
page read and write
1D5A72B9000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D5AD442000
trusted library allocation
page read and write
1D5A68F0000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A7C78000
trusted library allocation
page read and write
1D5A6B8A000
trusted library allocation
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1AE00F32000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5A14FC000
trusted library allocation
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A6B26000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
1D59C3AC000
heap
page read and write
1D59C3C3000
heap
page read and write
1D59C3A8000
heap
page read and write
1D59C3B2000
heap
page read and write
1E522B6C000
heap
page read and write
1D59C3D4000
heap
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A94C3000
trusted library allocation
page read and write
1D5A688D000
trusted library allocation
page read and write
1D5A743C000
trusted library allocation
page read and write
1D5A7349000
trusted library allocation
page read and write
1D59C3DA000
heap
page read and write
1D5A6F9F000
trusted library allocation
page read and write
1D5AD52B000
trusted library allocation
page read and write
17A32500000
heap
page read and write
1D5A71A7000
trusted library allocation
page read and write
1D5A2DA9000
trusted library allocation
page read and write
1AE00A40000
heap
page read and write
1D59C3FC000
heap
page read and write
1D5A2532000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1D5A7C5B000
trusted library allocation
page read and write
1D5A6F9F000
trusted library allocation
page read and write
1D5A747A000
trusted library allocation
page read and write
1D5A0DEF000
trusted library allocation
page read and write
1D59C420000
heap
page read and write
1D5A881E000
trusted library allocation
page read and write
1D5A74F2000
trusted library allocation
page read and write
1D5A71B7000
trusted library allocation
page read and write
1D5B0700000
trusted library allocation
page read and write
1D5AEF30000
trusted library allocation
page read and write
1D5A8BC8000
trusted library allocation
page read and write
1D5A2D86000
trusted library allocation
page read and write
1D5A8AFE000
trusted library allocation
page read and write
1D5A74C2000
trusted library allocation
page read and write
1D5A71DA000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1AE00BF0000
heap
page readonly
1D5A25F0000
trusted library allocation
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A6DAC000
trusted library allocation
page read and write
1D5A7483000
trusted library allocation
page read and write
1D5AEC3E000
trusted library allocation
page read and write
1D5A733C000
trusted library allocation
page read and write
1D5A6DBD000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5AD6FB000
trusted library allocation
page read and write
1D5A6B33000
trusted library allocation
page read and write
1D5A2645000
trusted library allocation
page read and write
1D5AD332000
trusted library allocation
page read and write
1D5A92ED000
trusted library allocation
page read and write
1D5A7357000
trusted library allocation
page read and write
1D5AD855000
trusted library allocation
page read and write
1AE00D00000
unclassified section
page read and write
1D59C413000
heap
page read and write
1D5A234B000
trusted library allocation
page read and write
1D5A73FC000
trusted library allocation
page read and write
1D5AD8E0000
trusted library allocation
page read and write
1D5AEF58000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A72D0000
trusted library allocation
page read and write
17A327AD000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5AD3C2000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A6DF1000
trusted library allocation
page read and write
1D5A7CB0000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A6B88000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5AEE41000
trusted library allocation
page read and write
1D5A883F000
trusted library allocation
page read and write
1D5A3AE9000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
1D5AD5FD000
trusted library allocation
page read and write
1D5A7DD9000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1E521E5F000
unclassified section
page read and write
1D5A7378000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1E521F0C000
trusted library allocation
page read and write
1D5A749F000
trusted library allocation
page read and write
1D5AEE07000
trusted library allocation
page read and write
1D5A71E0000
trusted library allocation
page read and write
1D5A6DF1000
trusted library allocation
page read and write
17A32763000
trusted library allocation
page read and write
1D5A8E02000
trusted library allocation
page read and write
1D5A7C6E000
trusted library allocation
page read and write
1D5A720B000
trusted library allocation
page read and write
1E522BE8000
heap
page read and write
1D59C3A4000
heap
page read and write
1D59C3DD000
heap
page read and write
1D5A73F2000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A237A000
trusted library allocation
page read and write
F1D000
stack
page read and write
1D5A6B58000
trusted library allocation
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5A6FD8000
trusted library allocation
page read and write
1D5A77D5000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E521F81000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5AD667000
trusted library allocation
page read and write
1D5A7BBC000
trusted library allocation
page read and write
1D5A7AC8000
trusted library allocation
page read and write
1D5AFAD4000
trusted library allocation
page read and write
1D5A6C05000
trusted library allocation
page read and write
1D5A7269000
trusted library allocation
page read and write
1D5A3783000
trusted library allocation
page read and write
1D59C3C5000
heap
page read and write
1D59C403000
heap
page read and write
1D59C407000
heap
page read and write
1D5A6879000
trusted library allocation
page read and write
1D5A7A5C000
trusted library allocation
page read and write
1D5A7498000
trusted library allocation
page read and write
1E522B09000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5AD4C9000
trusted library allocation
page read and write
1D5A2A52000
trusted library allocation
page read and write
1D5A14EE000
trusted library allocation
page read and write
1D5A1419000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AEF93000
trusted library allocation
page read and write
1E522B69000
heap
page read and write
1E522C77000
heap
page read and write
1D5AD88C000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5AD851000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A6FC1000
trusted library allocation
page read and write
2A612100000
trusted library allocation
page read and write
1D5ADA61000
trusted library allocation
page read and write
1D5AD8DE000
trusted library allocation
page read and write
1D5A6F6C000
trusted library allocation
page read and write
1D5A6D38000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D59C403000
heap
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1D5AD8A1000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A7181000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5B10E1000
heap
page read and write
1D59C3A4000
heap
page read and write
17A32292000
unclassified section
page read and write
1D5A5E14000
trusted library allocation
page read and write
1D5A7ADA000
trusted library allocation
page read and write
1D5A8B24000
trusted library allocation
page read and write
1D5A7AF7000
trusted library allocation
page read and write
1D5AD4C3000
trusted library allocation
page read and write
1D5A559C000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
D596A903000
trusted library allocation
page read and write
1E521C90000
heap
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5AD8FC000
trusted library allocation
page read and write
1D5A6899000
trusted library allocation
page read and write
1D5AEFF0000
trusted library allocation
page read and write
1D5AF394000
trusted library allocation
page read and write
1D5A8BC8000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A7365000
trusted library allocation
page read and write
1E522C3B000
heap
page read and write
1E521F5C000
trusted library allocation
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A25DA000
trusted library allocation
page read and write
1D5A25F8000
trusted library allocation
page read and write
1D5A8868000
trusted library allocation
page read and write
1D5A37AD000
trusted library allocation
page read and write
1D5A37FB000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AD6C4000
trusted library allocation
page read and write
1D5AD41A000
trusted library allocation
page read and write
1AE00990000
unclassified section
page readonly
1D5AEF5B000
trusted library allocation
page read and write
1D5A6D7F000
trusted library allocation
page read and write
1D5A7248000
trusted library allocation
page read and write
1D5A735D000
trusted library allocation
page read and write
1D5A5820000
trusted library allocation
page read and write
1AE00B40000
heap
page read and write
1D5A78B9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A74B5000
trusted library allocation
page read and write
1D5AF394000
trusted library allocation
page read and write
1D5A7838000
trusted library allocation
page read and write
1D59C40E000
heap
page read and write
1D5A74F0000
trusted library allocation
page read and write
1D5ADAF3000
trusted library allocation
page read and write
1E522C00000
heap
page read and write
1D5AD870000
trusted library allocation
page read and write
1D5A78B9000
trusted library allocation
page read and write
2A612020000
heap
page read and write
1AE00B80000
heap
page read and write
1E521EB6000
heap
page read and write
1D5A5892000
trusted library allocation
page read and write
1D5A8BA4000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1D5A7E69000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A6B2D000
trusted library allocation
page read and write
1D5A3AE9000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
E5E000
stack
page read and write
1D59C3B9000
heap
page read and write
1D5A2544000
trusted library allocation
page read and write
1D59C384000
heap
page read and write
1D5A7E51000
trusted library allocation
page read and write
1D5A7CC0000
trusted library allocation
page read and write
1D5A689F000
trusted library allocation
page read and write
1D5A375B000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D5A6C7B000
trusted library allocation
page read and write
2A612060000
heap
page read and write
1D5A6E83000
trusted library allocation
page read and write
1D5AD8A0000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1AE00EB7000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A7197000
trusted library allocation
page read and write
1D5A70E6000
trusted library allocation
page read and write
1D5A3A76000
trusted library allocation
page read and write
1D5A7CF3000
trusted library allocation
page read and write
1D5AD8BA000
trusted library allocation
page read and write
1D5A8BED000
trusted library allocation
page read and write
1D59C3BC000
heap
page read and write
1D5AD4E0000
trusted library allocation
page read and write
1D5A37C2000
trusted library allocation
page read and write
1D5AF9F8000
trusted library allocation
page read and write
1D5A0DCA000
trusted library allocation
page read and write
1D5A3144000
trusted library allocation
page read and write
1D5A6DA5000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3C3000
heap
page read and write
1D5A58FE000
trusted library allocation
page read and write
1D5A8BC4000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5B10E1000
heap
page read and write
1D5A92E5000
trusted library allocation
page read and write
1D59C3D0000
heap
page read and write
1D5A5873000
trusted library allocation
page read and write
1D5A6FCE000
trusted library allocation
page read and write
1D5B0150000
trusted library allocation
page read and write
1D5A6F80000
trusted library allocation
page read and write
1E522B5C000
heap
page read and write
1D5B10EB000
heap
page read and write
1D5ADA5A000
trusted library allocation
page read and write
1D5A7475000
trusted library allocation
page read and write
1D5B114D000
heap
page read and write
1D5AD9B4000
trusted library allocation
page read and write
1D5AF0F3000
trusted library allocation
page read and write
1D5A6F63000
trusted library allocation
page read and write
1D5A6D76000
trusted library allocation
page read and write
1D5A7BB6000
trusted library allocation
page read and write
1D5A6F83000
trusted library allocation
page read and write
1D5A74A9000
trusted library allocation
page read and write
1D5A2A4B000
trusted library allocation
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D5A70FB000
trusted library allocation
page read and write
17A32730000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
1AE00A53000
heap
page read and write
1D59C3B9000
heap
page read and write
1D59C39E000
heap
page read and write
1D5A73D3000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C3CC000
heap
page read and write
1D59C3A4000
heap
page read and write
1D59C403000
heap
page read and write
1D5A744E000
trusted library allocation
page read and write
1D5A6877000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5AD641000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5AD445000
trusted library allocation
page read and write
1D5AF0F1000
trusted library allocation
page read and write
1D5A77BE000
trusted library allocation
page read and write
1D5A2A52000
trusted library allocation
page read and write
1D5AF0AE000
trusted library allocation
page read and write
1D5AD8B8000
trusted library allocation
page read and write
1D5A7E38000
trusted library allocation
page read and write
1D5AD4FC000
trusted library allocation
page read and write
1E522B5F000
heap
page read and write
1D59C3B9000
heap
page read and write
1D59C3C7000
heap
page read and write
1D5AD5E5000
trusted library allocation
page read and write
1D5A6DF1000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A88DE000
trusted library allocation
page read and write
1D5AD810000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D5A92E1000
trusted library allocation
page read and write
1D5A6DA0000
trusted library allocation
page read and write
1D5AD5E5000
trusted library allocation
page read and write
1D5A6F3B000
trusted library allocation
page read and write
17A32711000
trusted library allocation
page read and write
1D5A8D64000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5A5E45000
trusted library allocation
page read and write
1D5A2532000
trusted library allocation
page read and write
1D5A55A8000
trusted library allocation
page read and write
540000
unkown
page write copy
1D5A5EE6000
trusted library allocation
page read and write
1D5A3783000
trusted library allocation
page read and write
1D5A6B88000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1D5A73D3000
trusted library allocation
page read and write
1D5A6F83000
trusted library allocation
page read and write
1D5A238B000
trusted library allocation
page read and write
1D5A7268000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C3A4000
heap
page read and write
1D59C407000
heap
page read and write
1D5AD870000
trusted library allocation
page read and write
1D59C412000
heap
page read and write
1D59C3B4000
heap
page read and write
1D5A3A6F000
trusted library allocation
page read and write
17A32807000
trusted library allocation
page read and write
1D59C3DA000
heap
page read and write
1D5A2358000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A7349000
trusted library allocation
page read and write
1D5A6F75000
trusted library allocation
page read and write
1D5A6DAC000
trusted library allocation
page read and write
1D5A72D0000
trusted library allocation
page read and write
1AE00E66000
trusted library allocation
page read and write
1D5AD4BD000
trusted library allocation
page read and write
1D5AD626000
trusted library allocation
page read and write
1D5A9443000
trusted library allocation
page read and write
1D5AFAEB000
trusted library allocation
page read and write
1D5A7248000
trusted library allocation
page read and write
1D59C3DD000
heap
page read and write
1D5A71A0000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A9423000
trusted library allocation
page read and write
1D5A68E9000
trusted library allocation
page read and write
2A61202A000
heap
page read and write
1D5A3780000
trusted library allocation
page read and write
1D5AEF01000
trusted library allocation
page read and write
1D5A724A000
trusted library allocation
page read and write
1D59C3B0000
heap
page read and write
1D59C40F000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5A2CB0000
heap
page read and write
1D5A7648000
trusted library allocation
page read and write
1D5A8B9B000
trusted library allocation
page read and write
1D5A6FCF000
trusted library allocation
page read and write
1E521F73000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5A6824000
trusted library allocation
page read and write
1D5A6EB0000
trusted library allocation
page read and write
1AE00A20000
unclassified section
page readonly
1D5A58D4000
trusted library allocation
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D5ADA23000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1AE00F0D000
trusted library allocation
page read and write
1D5AD563000
trusted library allocation
page read and write
1D5AF3A5000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A7CA1000
trusted library allocation
page read and write
1D5A3A91000
trusted library allocation
page read and write
1D5AD824000
trusted library allocation
page read and write
1D5AD6B4000
trusted library allocation
page read and write
1D5AFADA000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A88EB000
trusted library allocation
page read and write
1D5AD848000
trusted library allocation
page read and write
1D5AD3E3000
trusted library allocation
page read and write
1D5A6BFE000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D5ADAAD000
trusted library allocation
page read and write
1D5A71DE000
trusted library allocation
page read and write
1E522BE3000
heap
page read and write
1AE00ECB000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1E522C29000
heap
page read and write
1D59C3B2000
heap
page read and write
1D59C3A2000
heap
page read and write
1D59C3C3000
heap
page read and write
1D5A5EAD000
trusted library allocation
page read and write
1D5A3A6F000
trusted library allocation
page read and write
1D5AFAC4000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1D5AD920000
trusted library allocation
page read and write
1D5A7E58000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A37FB000
trusted library allocation
page read and write
1D5ADADB000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D5AD35D000
trusted library allocation
page read and write
1D5A68A5000
trusted library allocation
page read and write
1D5A6BB7000
trusted library allocation
page read and write
1D5A6B91000
trusted library allocation
page read and write
1E522C58000
heap
page read and write
1D5A2585000
trusted library allocation
page read and write
1D5A6D66000
trusted library allocation
page read and write
1D5A71DE000
trusted library allocation
page read and write
1E522C44000
heap
page read and write
1D5A7167000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A14B7000
trusted library allocation
page read and write
1D5A92BF000
trusted library allocation
page read and write
1D5A76CB000
trusted library allocation
page read and write
1D5AD9B4000
trusted library allocation
page read and write
1D59C412000
heap
page read and write
3CEC7311000
trusted library allocation
page execute read
1D59C3FD000
heap
page read and write
1D5A69FC000
trusted library allocation
page read and write
1D5A8B82000
trusted library allocation
page read and write
1D5A7A6D000
trusted library allocation
page read and write
17A32230000
heap
page read and write
1D59C404000
heap
page read and write
1D5A5E5E000
trusted library allocation
page read and write
1D59C3BA000
heap
page read and write
A5A000
stack
page read and write
1D5A8B41000
trusted library allocation
page read and write
1D59C395000
heap
page read and write
1D59C3B5000
heap
page read and write
1D5AD33D000
trusted library allocation
page read and write
1D5AD4E0000
trusted library allocation
page read and write
1D5AEFAA000
trusted library allocation
page read and write
1D5A7190000
trusted library allocation
page read and write
1E522A2A000
trusted library allocation
page read and write
1D5AF0EB000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A88ED000
trusted library allocation
page read and write
CF955FF000
stack
page read and write
1D5A7837000
trusted library allocation
page read and write
1D5A6B1E000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A6F75000
trusted library allocation
page read and write
1D5AD4CD000
trusted library allocation
page read and write
2A612080000
heap
page read and write
1D59C3A6000
heap
page read and write
1D5A1413000
trusted library allocation
page read and write
1D5A8DA2000
trusted library allocation
page read and write
1D5A31C9000
trusted library allocation
page read and write
1D5A7382000
trusted library allocation
page read and write
1D5AF0E7000
trusted library allocation
page read and write
1D5A6B05000
trusted library allocation
page read and write
2B4D4771E000
trusted library allocation
page read and write
1D5AD8F1000
trusted library allocation
page read and write
1D5A25EC000
trusted library allocation
page read and write
1D5A8D78000
trusted library allocation
page read and write
1D5A7A35000
trusted library allocation
page read and write
1D5A716E000
trusted library allocation
page read and write
1D5AF332000
trusted library allocation
page read and write
1D5A8B3F000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D59C3C7000
heap
page read and write
1D5AF08E000
trusted library allocation
page read and write
1D5A6DF9000
trusted library allocation
page read and write
1D5A724E000
trusted library allocation
page read and write
1D5A70F6000
trusted library allocation
page read and write
1D5A7134000
trusted library allocation
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1E522C21000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1D5A88F3000
trusted library allocation
page read and write
1D5AF0E7000
trusted library allocation
page read and write
1D5A73BF000
trusted library allocation
page read and write
1D5A8872000
trusted library allocation
page read and write
1D5A2D66000
trusted library allocation
page read and write
1D5A6B26000
trusted library allocation
page read and write
1D5A6BDA000
trusted library allocation
page read and write
1D5A6BE6000
trusted library allocation
page read and write
1D5A6FDB000
trusted library allocation
page read and write
1D5AD8B7000
trusted library allocation
page read and write
1D5A6856000
trusted library allocation
page read and write
1D5AD8AB000
trusted library allocation
page read and write
1D5AEFC8000
trusted library allocation
page read and write
1D59C3B7000
heap
page read and write
1D5AD39A000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AF0EF000
trusted library allocation
page read and write
1D5A7E92000
trusted library allocation
page read and write
1D5A37BD000
trusted library allocation
page read and write
2F1ECFE000
stack
page read and write
1D5A77BE000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D59C3D4000
heap
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A3799000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C408000
heap
page read and write
2A611F30000
heap
page read and write
1D59C3FC000
heap
page read and write
1D5A6899000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1D5A7BBE000
trusted library allocation
page read and write
1D5A6C0C000
trusted library allocation
page read and write
1D5A6FC1000
trusted library allocation
page read and write
1D5A3A63000
trusted library allocation
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D5A5ED9000
trusted library allocation
page read and write
1D5A58CD000
trusted library allocation
page read and write
53C000
unkown
page write copy
1D5A7242000
trusted library allocation
page read and write
1D5A7EBF000
trusted library allocation
page read and write
1D5ADA27000
trusted library allocation
page read and write
2A613B2E000
heap
page read and write
1D5A74C2000
trusted library allocation
page read and write
1D5A8B9B000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A7CEB000
trusted library allocation
page read and write
1D59C3B0000
heap
page read and write
1D5A31ED000
trusted library allocation
page read and write
1D5A6F9F000
trusted library allocation
page read and write
1D5A6B34000
trusted library allocation
page read and write
1D59C3AE000
heap
page read and write
F60000
heap
page read and write
1D5AD674000
trusted library allocation
page read and write
1E521E60000
trusted library allocation
page read and write
1D5A2D82000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5ADAAF000
trusted library allocation
page read and write
1D5AD6B4000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5A88B1000
trusted library allocation
page read and write
1D5AD6B6000
trusted library allocation
page read and write
1D5A743C000
trusted library allocation
page read and write
1D5A6F75000
trusted library allocation
page read and write
22AB5FF000
stack
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A37A8000
trusted library allocation
page read and write
1D5A8D73000
trusted library allocation
page read and write
1D5A8868000
trusted library allocation
page read and write
1D5AFA8A000
trusted library allocation
page read and write
1D5A6BD8000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
E4F000
stack
page read and write
1D5A581B000
trusted library allocation
page read and write
1D5ADAAD000
trusted library allocation
page read and write
1D5AD9B2000
trusted library allocation
page read and write
1D5AFA92000
trusted library allocation
page read and write
1D5AD910000
trusted library allocation
page read and write
1D5A763C000
trusted library allocation
page read and write
1D5A7134000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3D1000
heap
page read and write
1D59C446000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A6FD3000
trusted library allocation
page read and write
1D5A7630000
trusted library allocation
page read and write
1D5AD8A5000
trusted library allocation
page read and write
1D5A71BE000
trusted library allocation
page read and write
1D59C3A6000
heap
page read and write
2B4D47724000
trusted library allocation
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5A74B7000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A6EF6000
trusted library allocation
page read and write
1D59C404000
heap
page read and write
1D59C403000
heap
page read and write
8718F3E000
stack
page read and write
1D59C3B9000
heap
page read and write
1D5A88DE000
trusted library allocation
page read and write
1D5A7C51000
trusted library allocation
page read and write
1D5A2510000
trusted library allocation
page read and write
1E522488000
heap
page read and write
1D5AD4FE000
trusted library allocation
page read and write
1D5AD887000
trusted library allocation
page read and write
1D5A3A91000
trusted library allocation
page read and write
1D5A147D000
trusted library allocation
page read and write
1D5AEF7F000
trusted library allocation
page read and write
1D5A7274000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A2D66000
trusted library allocation
page read and write
1E521FC7000
trusted library allocation
page read and write
1D5A8B7E000
trusted library allocation
page read and write
1D5AF0ED000
trusted library allocation
page read and write
2A61204F000
heap
page read and write
1D5A687C000
trusted library allocation
page read and write
1E522BE0000
heap
page read and write
1D5A7EB9000
trusted library allocation
page read and write
1D5AD88B000
trusted library allocation
page read and write
1D59C411000
heap
page read and write
1D59C3C0000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5A7CB0000
trusted library allocation
page read and write
1D5AD85E000
trusted library allocation
page read and write
1E522BF0000
heap
page read and write
1D5A37BF000
trusted library allocation
page read and write
1D5A6D81000
trusted library allocation
page read and write
1D5A3A53000
trusted library allocation
page read and write
1D5B10E1000
heap
page read and write
1D5AD4CB000
trusted library allocation
page read and write
1E521B00000
unclassified section
page readonly
1D5A14D2000
trusted library allocation
page read and write
1D5A37B2000
trusted library allocation
page read and write
1D5A5EE2000
trusted library allocation
page read and write
1D5A37CA000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1E521EA0000
trusted library allocation
page read and write
1D5A6FD8000
trusted library allocation
page read and write
1D5A149C000
trusted library allocation
page read and write
1D5A6FD8000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E521E00000
heap
page read and write
1D5ADA51000
trusted library allocation
page read and write
1D5A7646000
trusted library allocation
page read and write
1D5A74F3000
trusted library allocation
page read and write
1D59C3AE000
heap
page read and write
1D5A5824000
trusted library allocation
page read and write
1D5A7309000
trusted library allocation
page read and write
1D5A58C0000
trusted library allocation
page read and write
1D5AF32B000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A7623000
trusted library allocation
page read and write
1D5A7CB0000
trusted library allocation
page read and write
2F1D4FE000
unkown
page readonly
1D5A2D92000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D59C3C7000
heap
page read and write
17A320E0000
heap
page read and write
1D5AD8B7000
trusted library allocation
page read and write
1D5AEF2E000
trusted library allocation
page read and write
1AE00E6E000
trusted library allocation
page read and write
3450000
heap
page read and write
1AE00D02000
unclassified section
page read and write
1D5A7EF1000
trusted library allocation
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D5A71F3000
trusted library allocation
page read and write
1D5A6889000
trusted library allocation
page read and write
1D5A8A06000
trusted library allocation
page read and write
1D5A7E6E000
trusted library allocation
page read and write
17A32684000
heap
page read and write
1E522B63000
heap
page read and write
1D5A788F000
trusted library allocation
page read and write
1E522C77000
heap
page read and write
1D5A6C41000
trusted library allocation
page read and write
1D5AD374000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A77BE000
trusted library allocation
page read and write
1D5A723F000
trusted library allocation
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5ADAFC000
trusted library allocation
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A8B7A000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AEF57000
trusted library allocation
page read and write
1D5A7DD3000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A64D1000
trusted library allocation
page read and write
1D5A7AC3000
trusted library allocation
page read and write
1D59C402000
heap
page read and write
1D5AF0E9000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A6C86000
trusted library allocation
page read and write
1D5AD8D4000
trusted library allocation
page read and write
2F1DCFE000
stack
page read and write
13DDA8C0000
heap
page read and write
1D5AEC3E000
trusted library allocation
page read and write
1D5A58DD000
trusted library allocation
page read and write
1D5A6DF8000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A885C000
trusted library allocation
page read and write
1D5A739F000
trusted library allocation
page read and write
1D5AEFAA000
trusted library allocation
page read and write
1D5A6FB8000
trusted library allocation
page read and write
1D5A14FC000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A7263000
trusted library allocation
page read and write
1D5A77E7000
trusted library allocation
page read and write
1D5A7CFD000
trusted library allocation
page read and write
1D5AEFAA000
trusted library allocation
page read and write
871773E000
unkown
page readonly
1D59C403000
heap
page read and write
1D5A5881000
trusted library allocation
page read and write
1D5A2DD2000
trusted library allocation
page read and write
1D5ADB00000
trusted library allocation
page read and write
1D5AEF30000
trusted library allocation
page read and write
1D5A6B6D000
trusted library allocation
page read and write
1D5A58C6000
trusted library allocation
page read and write
1D5A6D48000
trusted library allocation
page read and write
1D5A2CA5000
heap
page read and write
17A32100000
heap
page read and write
1D59C3C7000
heap
page read and write
1D59C3B8000
heap
page read and write
1D5A77AC000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A55F7000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
1D5A3133000
trusted library allocation
page read and write
1D5A8DFE000
trusted library allocation
page read and write
ED0000
heap
page read and write
1D5A5E36000
trusted library allocation
page read and write
1D5A685F000
trusted library allocation
page read and write
1D5ADADB000
trusted library allocation
page read and write
1D5A7AF7000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A2A59000
trusted library allocation
page read and write
1D5AD6B2000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A744A000
trusted library allocation
page read and write
1D59C3D3000
heap
page read and write
1D5AF0C6000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5AD8F3000
trusted library allocation
page read and write
1E522BE6000
heap
page read and write
1D5A7CF3000
trusted library allocation
page read and write
1D5A58DD000
trusted library allocation
page read and write
1D5A5589000
trusted library allocation
page read and write
1D5A31DF000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A5892000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A2D90000
trusted library allocation
page read and write
1D5A7800000
trusted library allocation
page read and write
1D5AD6AC000
trusted library allocation
page read and write
1D5A6C4B000
trusted library allocation
page read and write
1D5A7346000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D59C3BD000
heap
page read and write
1D5A55A2000
trusted library allocation
page read and write
1D5A7126000
trusted library allocation
page read and write
1D5A74EB000
trusted library allocation
page read and write
1E522C77000
heap
page read and write
1D59C408000
heap
page read and write
1D5AD300000
trusted library allocation
page read and write
1D5A7C81000
trusted library allocation
page read and write
1D5A73C5000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A37C2000
trusted library allocation
page read and write
1D5A6DC4000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A73DE000
trusted library allocation
page read and write
567087E000
stack
page read and write
1E522B69000
heap
page read and write
1D5AD858000
trusted library allocation
page read and write
1D5A6DFD000
trusted library allocation
page read and write
1D5A6B2F000
trusted library allocation
page read and write
1D5A71B7000
trusted library allocation
page read and write
1E522568000
unkown
page execute read
1D5AEEA7000
trusted library allocation
page read and write
1D5A7E88000
trusted library allocation
page read and write
1D5A7CB0000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A70F6000
trusted library allocation
page read and write
1D5A7B18000
trusted library allocation
page read and write
1D5A2668000
trusted library allocation
page read and write
1D59C41A000
heap
page read and write
1D59C405000
heap
page read and write
1D5AF05D000
trusted library allocation
page read and write
1D5A7CC0000
trusted library allocation
page read and write
1D5A8841000
trusted library allocation
page read and write
1D5A7E99000
trusted library allocation
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D5AD4C5000
trusted library allocation
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AD5FB000
trusted library allocation
page read and write
1D5AF33C000
trusted library allocation
page read and write
1D5A7213000
trusted library allocation
page read and write
1D5A72D0000
trusted library allocation
page read and write
1D5B1178000
heap
page read and write
1D5A6D5D000
trusted library allocation
page read and write
1D5A7DA9000
trusted library allocation
page read and write
1D5AD4F1000
trusted library allocation
page read and write
1D5A74ED000
trusted library allocation
page read and write
1D5A8D44000
trusted library allocation
page read and write
1D5A31B8000
trusted library allocation
page read and write
1D5A68F4000
trusted library allocation
page read and write
1D5A71FA000
trusted library allocation
page read and write
1D5A8B80000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A2ACF000
trusted library allocation
page read and write
1D5A7C5B000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5A724F000
trusted library allocation
page read and write
1D5A8D6B000
trusted library allocation
page read and write
1D5A7170000
trusted library allocation
page read and write
1D5AD8A5000
trusted library allocation
page read and write
1D5AD5FB000
trusted library allocation
page read and write
1D5AD376000
trusted library allocation
page read and write
1D5A5E49000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A7C8F000
trusted library allocation
page read and write
1D5A6B48000
trusted library allocation
page read and write
182D000
stack
page read and write
1D5A5572000
trusted library allocation
page read and write
1D5A688B000
trusted library allocation
page read and write
1D5A6FC3000
trusted library allocation
page read and write
1D5A8833000
trusted library allocation
page read and write
E3B000
stack
page read and write
1D59C39D000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A74D3000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A88EB000
trusted library allocation
page read and write
1D5A7242000
trusted library allocation
page read and write
1D5AD8EA000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D5AD6C9000
trusted library allocation
page read and write
1D5AEFAF000
trusted library allocation
page read and write
1D5A8EA3000
trusted library allocation
page read and write
1D5AD8E7000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5AD363000
trusted library allocation
page read and write
1D5A72FE000
trusted library allocation
page read and write
1D5AD5FD000
trusted library allocation
page read and write
1D5A77AC000
trusted library allocation
page read and write
1D5AD8C1000
trusted library allocation
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D59C3B4000
heap
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D5A7636000
trusted library allocation
page read and write
1AE00E47000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A7AE3000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A6BF7000
trusted library allocation
page read and write
1D5A2AEC000
trusted library allocation
page read and write
1D5AF324000
trusted library allocation
page read and write
1D5A7CC0000
trusted library allocation
page read and write
1D5A6B8C000
trusted library allocation
page read and write
1D5AEDA3000
trusted library allocation
page read and write
1D5A7197000
trusted library allocation
page read and write
1D5A70A9000
trusted library allocation
page read and write
1AE00E18000
trusted library allocation
page read and write
1D5A6DF1000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
17A3278F000
trusted library allocation
page read and write
1D5A373F000
trusted library allocation
page read and write
1D5A5E49000
trusted library allocation
page read and write
1D5B03A8000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A6CE2000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A71DC000
trusted library allocation
page read and write
1D5A37AF000
trusted library allocation
page read and write
1D5A72FE000
trusted library allocation
page read and write
1D5A311D000
trusted library allocation
page read and write
1D5AF0EF000
trusted library allocation
page read and write
1D59C3C2000
heap
page read and write
1D5A2DA9000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A6F7A000
trusted library allocation
page read and write
1D5AD9F1000
trusted library allocation
page read and write
1D5A7A96000
trusted library allocation
page read and write
1D59C40F000
heap
page read and write
1D5A5883000
trusted library allocation
page read and write
1D5A6D33000
trusted library allocation
page read and write
1D5A7696000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
1AE00DE0000
heap
page read and write
1D5AF0F5000
trusted library allocation
page read and write
1D5AD4CB000
trusted library allocation
page read and write
1D59C3A5000
heap
page read and write
17A32900000
trusted library allocation
page read and write
1D5A7292000
trusted library allocation
page read and write
1D5A71B1000
trusted library allocation
page read and write
172C4FF03000
trusted library allocation
page read and write
1D5A7EC1000
trusted library allocation
page read and write
1D5A5E53000
trusted library allocation
page read and write
17A3270E000
trusted library allocation
page read and write
1D5AD6E3000
trusted library allocation
page read and write
1D5A376C000
trusted library allocation
page read and write
1D5A3117000
trusted library allocation
page read and write
566CDEE000
unkown
page readonly
1D59C3D4000
heap
page read and write
1D5A72B2000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5A68ED000
trusted library allocation
page read and write
1D5A92DC000
trusted library allocation
page read and write
1D5A3117000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
1D5A6DBB000
trusted library allocation
page read and write
1D5A6F3B000
trusted library allocation
page read and write
1D5AD8C8000
trusted library allocation
page read and write
1D5A14D2000
trusted library allocation
page read and write
1D5A37D7000
trusted library allocation
page read and write
1D5A742F000
trusted library allocation
page read and write
1D5A6DBC000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5ADAAF000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A6F8E000
trusted library allocation
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D5A73BF000
trusted library allocation
page read and write
1D5A37FB000
trusted library allocation
page read and write
2A612375000
heap
page read and write
1D5A3A7D000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A8DFE000
trusted library allocation
page read and write
1D5A88A0000
trusted library allocation
page read and write
1D5A78B4000
trusted library allocation
page read and write
1D5AD3FC000
trusted library allocation
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D5A25C3000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D5A7E60000
trusted library allocation
page read and write
1D5A31D1000
trusted library allocation
page read and write
1D5AD8A1000
trusted library allocation
page read and write
1D59C410000
heap
page read and write
1D5A8BCD000
trusted library allocation
page read and write
1D5A71DA000
trusted library allocation
page read and write
1D5B0302000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5A7ED2000
trusted library allocation
page read and write
1D59C3D9000
heap
page read and write
1D59C421000
heap
page read and write
1D5A2DA9000
trusted library allocation
page read and write
1D5A7623000
trusted library allocation
page read and write
1D5A2513000
trusted library allocation
page read and write
1D5A6B2F000
trusted library allocation
page read and write
1D5A7646000
trusted library allocation
page read and write
1D5A7CEB000
trusted library allocation
page read and write
1D5A6DBB000
trusted library allocation
page read and write
1D5A7626000
trusted library allocation
page read and write
1D5A6CBE000
trusted library allocation
page read and write
1D5A0D81000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A78B7000
trusted library allocation
page read and write
1D5A141E000
trusted library allocation
page read and write
1D59C3B1000
heap
page read and write
1D5A725D000
trusted library allocation
page read and write
1D5A724A000
trusted library allocation
page read and write
1D5A92F3000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E522B60000
heap
page read and write
1D5A8827000
trusted library allocation
page read and write
1D5AD889000
trusted library allocation
page read and write
1D59C3C0000
heap
page read and write
1D5A6FE3000
trusted library allocation
page read and write
1D5A72D0000
trusted library allocation
page read and write
1D5A77F6000
trusted library allocation
page read and write
1D5A6DF9000
trusted library allocation
page read and write
1D5A2D23000
trusted library allocation
page read and write
1D5A234E000
trusted library allocation
page read and write
1D5A6DD0000
trusted library allocation
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A68CA000
trusted library allocation
page read and write
1D5AEC5E000
trusted library allocation
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D5AD585000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A6DC2000
trusted library allocation
page read and write
1D5AD674000
trusted library allocation
page read and write
1D5AEFD0000
trusted library allocation
page read and write
1D5AD5CD000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A74F6000
trusted library allocation
page read and write
1D5A68A2000
trusted library allocation
page read and write
1D5A6BF3000
trusted library allocation
page read and write
1D5A71DA000
trusted library allocation
page read and write
1D5A76CB000
trusted library allocation
page read and write
1D5A711C000
trusted library allocation
page read and write
1D5A25C4000
trusted library allocation
page read and write
1D59C3FC000
heap
page read and write
1D59C3B2000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5A3A68000
trusted library allocation
page read and write
1E521AF0000
unclassified section
page readonly
1D5A2538000
trusted library allocation
page read and write
1D5A74BF000
trusted library allocation
page read and write
1D5A749F000
trusted library allocation
page read and write
1D5AD4D1000
trusted library allocation
page read and write
1D5A7258000
trusted library allocation
page read and write
1D5AEF85000
trusted library allocation
page read and write
13DDA5B0000
heap
page read and write
17A32700000
trusted library allocation
page read and write
1D5A8A5E000
trusted library allocation
page read and write
1D5A71BE000
trusted library allocation
page read and write
1D5AD4F5000
trusted library allocation
page read and write
1D5A719D000
trusted library allocation
page read and write
17A32686000
heap
page read and write
1D5AD9F3000
trusted library allocation
page read and write
50C000
unkown
page readonly
1D5A8AB4000
trusted library allocation
page read and write
1D5A7194000
trusted library allocation
page read and write
1D5A6D52000
trusted library allocation
page read and write
1D5A25E2000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A7190000
trusted library allocation
page read and write
1D5A7255000
trusted library allocation
page read and write
1D5A6D5F000
trusted library allocation
page read and write
1D5A73FC000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A379B000
trusted library allocation
page read and write
1D5A8A5D000
trusted library allocation
page read and write
13DDA70A000
trusted library allocation
page read and write
1D5AD9F3000
trusted library allocation
page read and write
1D5AD5A0000
trusted library allocation
page read and write
1D5A8BEB000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1E522BFD000
heap
page read and write
1D5A31C5000
trusted library allocation
page read and write
1D59C3CD000
heap
page read and write
1D5AD6DE000
trusted library allocation
page read and write
1D5A686F000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
17A32774000
trusted library allocation
page read and write
1D5A7C85000
trusted library allocation
page read and write
1D5A7365000
trusted library allocation
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5AD8A5000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A71BE000
trusted library allocation
page read and write
1D5AD4D2000
trusted library allocation
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D5A72F1000
trusted library allocation
page read and write
1D5A7493000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
17A320C0000
unclassified section
page readonly
1D59C3B9000
heap
page read and write
1D5A252A000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C3CC000
heap
page read and write
1D5A55A8000
trusted library allocation
page read and write
1D5A37B2000
trusted library allocation
page read and write
1D5A6F23000
trusted library allocation
page read and write
1D5A729C000
trusted library allocation
page read and write
1D5A7A5E000
trusted library allocation
page read and write
1AE00E79000
trusted library allocation
page read and write
1D5AFADA000
trusted library allocation
page read and write
1D5A2665000
trusted library allocation
page read and write
1D5AEFDD000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5A2AF8000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A58FB000
trusted library allocation
page read and write
1D5A88FC000
trusted library allocation
page read and write
1D5A7A1D000
trusted library allocation
page read and write
1D5A7C74000
trusted library allocation
page read and write
1D5AD3FA000
trusted library allocation
page read and write
1D5A238B000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5AF314000
trusted library allocation
page read and write
1D5A6B26000
trusted library allocation
page read and write
1D5A7620000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1D5A5EC6000
trusted library allocation
page read and write
1D5A7E81000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D5A37B7000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A6D5F000
trusted library allocation
page read and write
1D5A14B0000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D5A2AEC000
trusted library allocation
page read and write
1D5AEF19000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1E521F76000
trusted library allocation
page read and write
1D59C404000
heap
page read and write
1D5A3A76000
trusted library allocation
page read and write
2F1D4BE000
stack
page read and write
1D5A55F8000
trusted library allocation
page read and write
8716E7E000
stack
page read and write
1D59C3CB000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5A7149000
trusted library allocation
page read and write
1D5A8BCD000
trusted library allocation
page read and write
1D5A68F8000
trusted library allocation
page read and write
1D5A73D3000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5B0980000
trusted library allocation
page read and write
1D5A7C98000
trusted library allocation
page read and write
1D5A5837000
trusted library allocation
page read and write
1E521F79000
trusted library allocation
page read and write
1D5A255C000
trusted library allocation
page read and write
1D5A2AF8000
trusted library allocation
page read and write
1D5A8BA4000
trusted library allocation
page read and write
1D5A1426000
trusted library allocation
page read and write
1D5A14BC000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A6F4A000
trusted library allocation
page read and write
1D5A73F2000
trusted library allocation
page read and write
1D5A7484000
trusted library allocation
page read and write
1D5A7BE8000
trusted library allocation
page read and write
1D5A779D000
trusted library allocation
page read and write
13DDA700000
trusted library allocation
page read and write
1D5A55A8000
trusted library allocation
page read and write
1D5AEF42000
trusted library allocation
page read and write
1D5A6889000
trusted library allocation
page read and write
1D5AF0F5000
trusted library allocation
page read and write
1D5A7E88000
trusted library allocation
page read and write
1D5A70E9000
trusted library allocation
page read and write
1D5AD454000
trusted library allocation
page read and write
1D5A7634000
trusted library allocation
page read and write
1D5A3133000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A7630000
trusted library allocation
page read and write
17A32782000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D5A252A000
trusted library allocation
page read and write
1D5A58D4000
trusted library allocation
page read and write
1D5AF0F3000
trusted library allocation
page read and write
1D5A7493000
trusted library allocation
page read and write
1D5AD3FA000
trusted library allocation
page read and write
1D59C3BC000
heap
page read and write
1E522B60000
heap
page read and write
1D5A748A000
trusted library allocation
page read and write
1D5AD543000
trusted library allocation
page read and write
1D5A7454000
trusted library allocation
page read and write
1D5A88F3000
trusted library allocation
page read and write
1D5A71DE000
trusted library allocation
page read and write
1D5A74E7000
trusted library allocation
page read and write
1D5A7A7C000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
ED4000
heap
page read and write
1D5A6FFA000
trusted library allocation
page read and write
1D5A70E9000
trusted library allocation
page read and write
1D5AD342000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AD8C3000
trusted library allocation
page read and write
1D5AD5FD000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D59C407000
heap
page read and write
1D5AD6C9000
trusted library allocation
page read and write
1D5B1231000
heap
page read and write
1D59C411000
heap
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D5AF031000
trusted library allocation
page read and write
1D5A6EE4000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5AD8BE000
trusted library allocation
page read and write
1D5A788F000
trusted library allocation
page read and write
1D5A55E4000
trusted library allocation
page read and write
1D5A6FA2000
trusted library allocation
page read and write
1D5A71BE000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A0D98000
trusted library allocation
page read and write
1E522C44000
heap
page read and write
1D5AD3FC000
trusted library allocation
page read and write
1D59C421000
heap
page read and write
1E521B90000
heap
page read and write
1D5A71F3000
trusted library allocation
page read and write
1D5A5EE3000
trusted library allocation
page read and write
17A320B4000
remote allocation
page execute read
1D5A37CA000
trusted library allocation
page read and write
1D5A7292000
trusted library allocation
page read and write
1D5A5ED5000
trusted library allocation
page read and write
1D5A2D7D000
trusted library allocation
page read and write
1D5AD8BE000
trusted library allocation
page read and write
87176FE000
stack
page read and write
1D5A6DA6000
trusted library allocation
page read and write
566F87E000
stack
page read and write
1D5AED87000
trusted library allocation
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1E522C2C000
heap
page read and write
1D59C3D1000
heap
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D5A55B3000
trusted library allocation
page read and write
1D5A8BCD000
trusted library allocation
page read and write
1D5AEFDD000
trusted library allocation
page read and write
1D5A2D6C000
trusted library allocation
page read and write
1E522C44000
heap
page read and write
1D59C3FC000
heap
page read and write
1E522BF0000
heap
page read and write
1E521FC0000
trusted library allocation
page read and write
17A3275D000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5A7149000
trusted library allocation
page read and write
2F1CBFE000
stack
page read and write
1D5A0DBF000
trusted library allocation
page read and write
1D5A58BE000
trusted library allocation
page read and write
1D5A7123000
trusted library allocation
page read and write
1D5AF0E9000
trusted library allocation
page read and write
1D5AF018000
trusted library allocation
page read and write
1D5A379F000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A715B000
trusted library allocation
page read and write
1D5A5E37000
trusted library allocation
page read and write
566E7FE000
stack
page read and write
1E52246F000
heap
page read and write
1D5A6C6A000
trusted library allocation
page read and write
1D5A7BC2000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A233B000
trusted library allocation
page read and write
1D5AD8C8000
trusted library allocation
page read and write
1D5A2C99000
heap
page read and write
17A32767000
trusted library allocation
page read and write
1AE00B60000
heap
page read and write
1D59C3A4000
heap
page read and write
1D5AD8D2000
trusted library allocation
page read and write
1D5A1426000
trusted library allocation
page read and write
1E521F18000
trusted library allocation
page read and write
1D5A3799000
trusted library allocation
page read and write
1D5A73A6000
trusted library allocation
page read and write
1E521FF3000
trusted library allocation
page read and write
1D5A71B7000
trusted library allocation
page read and write
1D5A76AB000
trusted library allocation
page read and write
1D5AEEC5000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D59C3FD000
heap
page read and write
1D5A74F3000
trusted library allocation
page read and write
1D5A0DC7000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5AF09F000
trusted library allocation
page read and write
1D5ADA92000
trusted library allocation
page read and write
1D5A5881000
trusted library allocation
page read and write
1D59C3A9000
heap
page read and write
1D5A7AC6000
trusted library allocation
page read and write
1D5A2722000
trusted library allocation
page read and write
1D59C3CB000
heap
page read and write
1D5A7C98000
trusted library allocation
page read and write
1D5A251D000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
EC0000
heap
page read and write
1D5A7634000
trusted library allocation
page read and write
1D5AF0C6000
trusted library allocation
page read and write
1D5A7797000
trusted library allocation
page read and write
1D5A6BDC000
trusted library allocation
page read and write
1D59C444000
heap
page read and write
1D5A7B28000
trusted library allocation
page read and write
1D5AD3BE000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D59C3C3000
heap
page read and write
1D59C3AB000
heap
page read and write
1D5A7223000
trusted library allocation
page read and write
1E522BF0000
heap
page read and write
1D5AD4D9000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1E522C21000
heap
page read and write
1D5A735F000
trusted library allocation
page read and write
1D5AF07D000
trusted library allocation
page read and write
1E522B9C000
heap
page read and write
1D5A716C000
trusted library allocation
page read and write
1D5AD87E000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1E522BE3000
heap
page read and write
1D5A7B85000
trusted library allocation
page read and write
1D5AD662000
trusted library allocation
page read and write
1D5A2572000
trusted library allocation
page read and write
1D5A92D8000
trusted library allocation
page read and write
1D5A3A76000
trusted library allocation
page read and write
1D5A7B0B000
trusted library allocation
page read and write
1D5AF0F5000
trusted library allocation
page read and write
1D5A37C6000
trusted library allocation
page read and write
1D5A37FB000
trusted library allocation
page read and write
1D5A71C2000
trusted library allocation
page read and write
1D5AD3F8000
trusted library allocation
page read and write
1D5A6882000
trusted library allocation
page read and write
1D5A7EEB000
trusted library allocation
page read and write
1D5A7AE3000
trusted library allocation
page read and write
1D5A882F000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A7263000
trusted library allocation
page read and write
1D5A6F7E000
trusted library allocation
page read and write
1D5A7D79000
trusted library allocation
page read and write
1D5AD35D000
trusted library allocation
page read and write
1D5AD819000
trusted library allocation
page read and write
1D5A88A0000
trusted library allocation
page read and write
1D59C3AA000
heap
page read and write
1D5A5ED9000
trusted library allocation
page read and write
1D5A739F000
trusted library allocation
page read and write
1D5AD90B000
trusted library allocation
page read and write
1D59C3DD000
heap
page read and write
1D59C3BD000
heap
page read and write
1D5A8BC4000
trusted library allocation
page read and write
1D59C3CF000
heap
page read and write
1D5A88D1000
trusted library allocation
page read and write
1D5A74A9000
trusted library allocation
page read and write
1D5AD4BD000
trusted library allocation
page read and write
1D5A8B9D000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D5A7282000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D5A7CA1000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5AD5C5000
trusted library allocation
page read and write
1D5A7304000
trusted library allocation
page read and write
1D5A74D1000
trusted library allocation
page read and write
1D5A78AA000
trusted library allocation
page read and write
1D5A6B91000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D5A315F000
trusted library allocation
page read and write
1D5AEFF0000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D59C416000
heap
page read and write
1D5AF34D000
trusted library allocation
page read and write
1D5AEF2C000
trusted library allocation
page read and write
1D5A25B2000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7C74000
trusted library allocation
page read and write
1D5A3A97000
trusted library allocation
page read and write
1D5B1178000
heap
page read and write
1D5A2CA9000
heap
page read and write
1D59C3C7000
heap
page read and write
1D59C3A8000
heap
page read and write
1E521E70000
heap
page read and write
1D5AF35E000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5AD915000
trusted library allocation
page read and write
1D5A7BBE000
trusted library allocation
page read and write
ED4000
heap
page read and write
1D59C3D1000
heap
page read and write
1D59C3A2000
heap
page read and write
1D5A2726000
trusted library allocation
page read and write
1D5A68B4000
trusted library allocation
page read and write
FA7000
heap
page read and write
1D5AD3A3000
trusted library allocation
page read and write
1D5AEC44000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
D5803603000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A96F8000
heap
page read and write
1D5AEF48000
trusted library allocation
page read and write
1D5A3791000
trusted library allocation
page read and write
1D5A2A4C000
trusted library allocation
page read and write
1D5A7AC8000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D59C3C3000
heap
page read and write
1D5AD8AB000
trusted library allocation
page read and write
1D5AF321000
trusted library allocation
page read and write
53C000
unkown
page read and write
1D5B112D000
heap
page read and write
1D5A88B1000
trusted library allocation
page read and write
1D5A55A8000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1E522C3B000
heap
page read and write
1D5A7167000
trusted library allocation
page read and write
1D5A2650000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A8BEB000
trusted library allocation
page read and write
1D5AD4CB000
trusted library allocation
page read and write
1AE00D0F000
unclassified section
page read and write
1D5A2DA2000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A6B48000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D5AD3B6000
trusted library allocation
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D59C3C6000
heap
page read and write
1D5A6DA5000
trusted library allocation
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A787F000
trusted library allocation
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1D5A7242000
trusted library allocation
page read and write
1D5B11C3000
heap
page read and write
1D5A7421000
trusted library allocation
page read and write
1D5A267E000
trusted library allocation
page read and write
1D5AEF23000
trusted library allocation
page read and write
1D5A6BDA000
trusted library allocation
page read and write
17A3275F000
trusted library allocation
page read and write
1D5A26F6000
trusted library allocation
page read and write
17A320A0000
remote allocation
page read and write
1AE009A0000
unclassified section
page readonly
1D5A6C64000
trusted library allocation
page read and write
1D59C3CF000
heap
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5A77AC000
trusted library allocation
page read and write
1D59C3BC000
heap
page read and write
1D5A5E37000
trusted library allocation
page read and write
1D5A64F9000
trusted library allocation
page read and write
1D5A685D000
trusted library allocation
page read and write
1D5A7CFD000
trusted library allocation
page read and write
1D5A5ED5000
trusted library allocation
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A6FF0000
trusted library allocation
page read and write
1D5AF3A0000
trusted library allocation
page read and write
1D5A6DB6000
trusted library allocation
page read and write
1D5A7255000
trusted library allocation
page read and write
1D5A74F3000
trusted library allocation
page read and write
1D5A73F8000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C3C3000
heap
page read and write
1D5A2AAF000
trusted library allocation
page read and write
1D5A7EA6000
trusted library allocation
page read and write
1D5A723F000
trusted library allocation
page read and write
1D5AEFDD000
trusted library allocation
page read and write
2F1BBD8000
stack
page read and write
1D59C3C6000
heap
page read and write
1D5A74B5000
trusted library allocation
page read and write
1D59C415000
heap
page read and write
1D5A68AF000
trusted library allocation
page read and write
1D5A7CF3000
trusted library allocation
page read and write
1E521F2F000
trusted library allocation
page read and write
1D5AD6C4000
trusted library allocation
page read and write
1D5A92CD000
trusted library allocation
page read and write
1D5AF321000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D59C3B3000
heap
page read and write
1D5A31ED000
trusted library allocation
page read and write
1D5A23B3000
trusted library allocation
page read and write
1D5A377B000
trusted library allocation
page read and write
1D5A8BDE000
trusted library allocation
page read and write
1E521D00000
trusted library allocation
page read and write
1D5AEFC8000
trusted library allocation
page read and write
1D5A71DA000
trusted library allocation
page read and write
1D5A64C3000
trusted library allocation
page read and write
1D59C3C0000
heap
page read and write
1D5AF35E000
trusted library allocation
page read and write
1D5A7E4A000
trusted library allocation
page read and write
1E522BA8000
heap
page read and write
1D5AD8D0000
trusted library allocation
page read and write
1D5AEF42000
trusted library allocation
page read and write
1E522B7D000
heap
page read and write
1D5A77F6000
trusted library allocation
page read and write
1E522B60000
heap
page read and write
1D59C3AD000
heap
page read and write
1E522B60000
heap
page read and write
1D5AEF23000
trusted library allocation
page read and write
1D5A68C1000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D5A3741000
trusted library allocation
page read and write
1D5A7CB6000
trusted library allocation
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D5A74BD000
trusted library allocation
page read and write
1D5A7B6D000
trusted library allocation
page read and write
1E522C79000
heap
page read and write
1D5A730E000
trusted library allocation
page read and write
1D5A7C8F000
trusted library allocation
page read and write
1D5A5877000
trusted library allocation
page read and write
1D5AD44D000
trusted library allocation
page read and write
1D5AD3E8000
trusted library allocation
page read and write
1D5A68A5000
trusted library allocation
page read and write
1D5A72FE000
trusted library allocation
page read and write
1D5A3171000
trusted library allocation
page read and write
1D5A7280000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D5A6DCC000
trusted library allocation
page read and write
1AE00E96000
trusted library allocation
page read and write
1D5A2CB0000
heap
page read and write
1D5A74E9000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D5A6878000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D5A763E000
trusted library allocation
page read and write
1D5AD8C1000
trusted library allocation
page read and write
1D5A37C6000
trusted library allocation
page read and write
1D5AF03E000
trusted library allocation
page read and write
8715DFE000
stack
page read and write
1D5A7475000
trusted library allocation
page read and write
1D59C3AC000
heap
page read and write
1D5A6C34000
trusted library allocation
page read and write
1D5A6B8F000
trusted library allocation
page read and write
1D5A7451000
trusted library allocation
page read and write
1D5AD423000
trusted library allocation
page read and write
1D5AD611000
trusted library allocation
page read and write
1D5AF0F1000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5AECFC000
trusted library allocation
page read and write
1D5A7264000
trusted library allocation
page read and write
1D5A2C9B000
heap
page read and write
1D5AD4CD000
trusted library allocation
page read and write
1D5A7C41000
trusted library allocation
page read and write
1D5A7D5A000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3A0000
heap
page read and write
2A612057000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5A7EF3000
trusted library allocation
page read and write
1D5A72B2000
trusted library allocation
page read and write
1D5A310D000
trusted library allocation
page read and write
1D5A5E17000
trusted library allocation
page read and write
1E521F03000
trusted library allocation
page read and write
1D5A7493000
trusted library allocation
page read and write
1D5A724A000
trusted library allocation
page read and write
1D5A723F000
trusted library allocation
page read and write
1D5A7A2E000
trusted library allocation
page read and write
1D5A374E000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A6DA0000
trusted library allocation
page read and write
1D5A88C5000
trusted library allocation
page read and write
1D5A6B6D000
trusted library allocation
page read and write
1D59C408000
heap
page read and write
1AE00D30000
unclassified section
page readonly
1D59C3A8000
heap
page read and write
1D5A5200000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A729C000
trusted library allocation
page read and write
1D5B018A000
trusted library allocation
page read and write
1E521FB5000
trusted library allocation
page read and write
1D59C412000
heap
page read and write
1D5AEE86000
trusted library allocation
page read and write
1D5A6C82000
trusted library allocation
page read and write
1D59C3D1000
heap
page read and write
1D5A71B1000
trusted library allocation
page read and write
1D5A7EDF000
trusted library allocation
page read and write
1D5A7C8B000
trusted library allocation
page read and write
1D5A5E3D000
trusted library allocation
page read and write
1D5AEFD0000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A73C5000
trusted library allocation
page read and write
1D5A7648000
trusted library allocation
page read and write
1D5A5892000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A7CB6000
trusted library allocation
page read and write
1D5A68C5000
trusted library allocation
page read and write
1D59C3B3000
heap
page read and write
1D59C3C0000
heap
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1AE00C00000
trusted library allocation
page read and write
871439B000
stack
page read and write
1D5AF0B9000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D5A7357000
trusted library allocation
page read and write
1D5AD363000
trusted library allocation
page read and write
1D5A6872000
trusted library allocation
page read and write
1D5A8B31000
trusted library allocation
page read and write
1D5AEF42000
trusted library allocation
page read and write
22AC5FE000
stack
page read and write
1D5A7054000
trusted library allocation
page read and write
17A3229F000
unclassified section
page read and write
1D5A7AC6000
trusted library allocation
page read and write
1D5A77E7000
trusted library allocation
page read and write
1E522C68000
heap
page read and write
1AE00F03000
trusted library allocation
page read and write
1D5A77D5000
trusted library allocation
page read and write
1D5A7A2E000
trusted library allocation
page read and write
1D5A3799000
trusted library allocation
page read and write
1D5A761E000
trusted library allocation
page read and write
1D5A6B2D000
trusted library allocation
page read and write
532000
unkown
page readonly
1D5A68CA000
trusted library allocation
page read and write
1D5A6DD4000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5A37FE000
trusted library allocation
page read and write
1D5A719A000
trusted library allocation
page read and write
1D5A74A5000
trusted library allocation
page read and write
1D5A7160000
trusted library allocation
page read and write
1D5A7357000
trusted library allocation
page read and write
1D5A7EAD000
trusted library allocation
page read and write
1E522A00000
trusted library allocation
page read and write
1D5AF0B9000
trusted library allocation
page read and write
1D59C3FC000
heap
page read and write
1D59C3C0000
heap
page read and write
1D59C3FC000
heap
page read and write
1D5AD650000
trusted library allocation
page read and write
1D59C406000
heap
page read and write
1D5A76D9000
trusted library allocation
page read and write
1D5A6B8F000
trusted library allocation
page read and write
1D5A6C4A000
trusted library allocation
page read and write
1D5AEE43000
trusted library allocation
page read and write
1D5A7636000
trusted library allocation
page read and write
1D5A8BF2000
trusted library allocation
page read and write
1D5AD8AB000
trusted library allocation
page read and write
1D59C3E4000
heap
page read and write
1D5A58D4000
trusted library allocation
page read and write
1D5AD923000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
3941000
heap
page read and write
1D5A55C2000
trusted library allocation
page read and write
1D5AD6AC000
trusted library allocation
page read and write
1D5A315F000
trusted library allocation
page read and write
1D5A2A59000
trusted library allocation
page read and write
1D5A6BF3000
trusted library allocation
page read and write
1D5A13F6000
trusted library allocation
page read and write
1D5A7EC1000
trusted library allocation
page read and write
1D5A6DE4000
trusted library allocation
page read and write
1D5A6B4D000
trusted library allocation
page read and write
1D5A719E000
trusted library allocation
page read and write
1D5A7BB8000
trusted library allocation
page read and write
1D5A6F73000
trusted library allocation
page read and write
1D5AD816000
trusted library allocation
page read and write
1D5A25B4000
trusted library allocation
page read and write
1D5AEE4D000
trusted library allocation
page read and write
1E521B70000
unclassified section
page readonly
1D5A74E9000
trusted library allocation
page read and write
1D5A3799000
trusted library allocation
page read and write
1D5AEF42000
trusted library allocation
page read and write
1D5A7EBD000
trusted library allocation
page read and write
1D5A7EF3000
trusted library allocation
page read and write
1D5A6FD8000
trusted library allocation
page read and write
1D5A5EF6000
trusted library allocation
page read and write
1D59C3FB000
heap
page read and write
1AE00A13000
remote allocation
page execute read
1D59C407000
heap
page read and write
1D5A74B1000
trusted library allocation
page read and write
1D5AF0ED000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A72D0000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A6F4B000
trusted library allocation
page read and write
1D59C395000
heap
page read and write
1D5A6CD8000
trusted library allocation
page read and write
1D5A8B75000
trusted library allocation
page read and write
1D5A5ED5000
trusted library allocation
page read and write
1D5AD6C4000
trusted library allocation
page read and write
1D5A741A000
trusted library allocation
page read and write
2A613B37000
heap
page read and write
1D5A6D8F000
trusted library allocation
page read and write
1D59C3D4000
heap
page read and write
1D5A2378000
trusted library allocation
page read and write
1E522B01000
heap
page read and write
1D5A71FA000
trusted library allocation
page read and write
1E522B6C000
heap
page read and write
1D59C416000
heap
page read and write
1D5A7AE0000
trusted library allocation
page read and write
1D5A7626000
trusted library allocation
page read and write
1D5A7421000
trusted library allocation
page read and write
1D5A68A5000
trusted library allocation
page read and write
1D5A58D4000
trusted library allocation
page read and write
1D5A58DD000
trusted library allocation
page read and write
17A32703000
trusted library allocation
page read and write
1D5A78B7000
trusted library allocation
page read and write
1D5A7696000
trusted library allocation
page read and write
1D5AD898000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D5AEFFE000
trusted library allocation
page read and write
1D5A3A76000
trusted library allocation
page read and write
1D5AF0F1000
trusted library allocation
page read and write
1AE00F3C000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D59C3B9000
heap
page read and write
1D5A6B07000
trusted library allocation
page read and write
1D5AD88B000
trusted library allocation
page read and write
1D5A88C5000
trusted library allocation
page read and write
1D5AF0F1000
trusted library allocation
page read and write
1D5A377F000
trusted library allocation
page read and write
1D5A3A4D000
trusted library allocation
page read and write
1AE00F1F000
trusted library allocation
page read and write
1E522B5C000
heap
page read and write
ED4000
heap
page read and write
1D5A6FFC000
trusted library allocation
page read and write
1D5A7EAA000
trusted library allocation
page read and write
1D5A31B8000
trusted library allocation
page read and write
1D5AD4CD000
trusted library allocation
page read and write
1D5A71E2000
trusted library allocation
page read and write
1D5A726B000
trusted library allocation
page read and write
1D5AF0EF000
trusted library allocation
page read and write
1D5A315F000
trusted library allocation
page read and write
1D5A7248000
trusted library allocation
page read and write
1D5A743C000
trusted library allocation
page read and write
1D5A374A000
trusted library allocation
page read and write
1E522C68000
heap
page read and write
1E522B7D000
heap
page read and write
1D5A7A4F000
trusted library allocation
page read and write
1D5A7BC4000
trusted library allocation
page read and write
1D5A7ADD000
trusted library allocation
page read and write
1E522B69000
heap
page read and write
1D59C3A8000
heap
page read and write
1D5AF34A000
trusted library allocation
page read and write
2A613B2A000
heap
page read and write
566CDAE000
stack
page read and write
1D5A7475000
trusted library allocation
page read and write
1D5A7CFD000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A7ADA000
trusted library allocation
page read and write
1D5A5EAF000
trusted library allocation
page read and write
1D5A7BB6000
trusted library allocation
page read and write
F82000
heap
page read and write
1D5A78AE000
trusted library allocation
page read and write
1D5AF0EF000
trusted library allocation
page read and write
1D5A735D000
trusted library allocation
page read and write
1D5A7C51000
trusted library allocation
page read and write
1D5A8B8D000
trusted library allocation
page read and write
1D5B0193000
trusted library allocation
page read and write
1D59C3C3000
heap
page read and write
1D5A3793000
trusted library allocation
page read and write
1D5A7165000
trusted library allocation
page read and write
1D5A6DB0000
trusted library allocation
page read and write
1D5A8B9D000
trusted library allocation
page read and write
1D5AFA83000
trusted library allocation
page read and write
1D5AD67B000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1D5A551A000
trusted library allocation
page read and write
1D5A7B0B000
trusted library allocation
page read and write
1D5A68C8000
trusted library allocation
page read and write
1D5A2D85000
trusted library allocation
page read and write
1D5A8AE2000
trusted library allocation
page read and write
3941000
heap
page read and write
1D5A55B4000
trusted library allocation
page read and write
1E522C77000
heap
page read and write
1D59C403000
heap
page read and write
1D5A6FEB000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D59C3CD000
heap
page read and write
1D5AD6AE000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5AEE6D000
trusted library allocation
page read and write
1D5A2D87000
trusted library allocation
page read and write
1D59C3E9000
heap
page read and write
1D5A7E3F000
trusted library allocation
page read and write
1D5A6D81000
trusted library allocation
page read and write
1D5A587C000
trusted library allocation
page read and write
1D5A6FEE000
trusted library allocation
page read and write
1D5A7A6A000
trusted library allocation
page read and write
1D5A6FB0000
trusted library allocation
page read and write
1D5AF0D5000
trusted library allocation
page read and write
1D5A74F3000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D5A6D7F000
trusted library allocation
page read and write
1D59C3AB000
heap
page read and write
1E522B60000
heap
page read and write
1D5ADABC000
trusted library allocation
page read and write
1D5AF0F1000
trusted library allocation
page read and write
1D5AD633000
trusted library allocation
page read and write
1D5A37AF000
trusted library allocation
page read and write
17A32800000
trusted library allocation
page read and write
1D5A788F000
trusted library allocation
page read and write
1D5A25B2000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3B9000
heap
page read and write
3CEC7321000
trusted library allocation
page execute read
1D5A71A0000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5A23EC000
trusted library allocation
page read and write
1D5A7DA2000
trusted library allocation
page read and write
1D5A3799000
trusted library allocation
page read and write
1D5A7BE8000
trusted library allocation
page read and write
1D5A8BEA000
trusted library allocation
page read and write
1D5AEF25000
trusted library allocation
page read and write
1D5A37BF000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A3AE7000
trusted library allocation
page read and write
1D5AD92E000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C3D8000
heap
page read and write
1D5A7A45000
trusted library allocation
page read and write
1E522561000
unkown
page execute read
1D5A26E4000
trusted library allocation
page read and write
1D5A8B82000
trusted library allocation
page read and write
1D5AF07D000
trusted library allocation
page read and write
1D5AD8BA000
trusted library allocation
page read and write
1D59C414000
heap
page read and write
1D5A71B5000
trusted library allocation
page read and write
1D5A312A000
trusted library allocation
page read and write
1D5A37D2000
trusted library allocation
page read and write
1D59C3C1000
heap
page read and write
1AE00D10000
heap
page read and write
1D5A729C000
trusted library allocation
page read and write
1D5A68BC000
trusted library allocation
page read and write
1D5A77EE000
trusted library allocation
page read and write
1D5A37FE000
trusted library allocation
page read and write
1D5A74E0000
trusted library allocation
page read and write
1D5A7B23000
trusted library allocation
page read and write
1D5AF9FD000
trusted library allocation
page read and write
1D5A7EAA000
trusted library allocation
page read and write
1D5A7C81000
trusted library allocation
page read and write
1D5A7425000
trusted library allocation
page read and write
1D59C3A2000
heap
page read and write
1D59C395000
heap
page read and write
1D59C3CB000
heap
page read and write
1D59C3C8000
heap
page read and write
1D5A2ACE000
trusted library allocation
page read and write
1D5A6F23000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D5A7840000
trusted library allocation
page read and write
1D5A72B5000
trusted library allocation
page read and write
13DDA450000
heap
page read and write
1D5A7670000
trusted library allocation
page read and write
1D59C403000
heap
page read and write
1D59C3B2000
heap
page read and write
1D5A88EB000
trusted library allocation
page read and write
1D5A2DA9000
trusted library allocation
page read and write
1D59C3A4000
heap
page read and write
1D5A71FB000
trusted library allocation
page read and write
1D5A71F3000
trusted library allocation
page read and write
1D59C3AA000
heap
page read and write
1D5A72D7000
trusted library allocation
page read and write
1D5A6FF2000
trusted library allocation
page read and write
1D5A74ED000
trusted library allocation
page read and write
1D59C3DB000
heap
page read and write
1D5A8BFD000
trusted library allocation
page read and write
1D5A2CD3000
heap
page read and write
1D5A73AD000
trusted library allocation
page read and write
1D5A783C000
trusted library allocation
page read and write
1D5A2AD5000
trusted library allocation
page read and write
1D5A5E13000
trusted library allocation
page read and write
1D59C3D8000
heap
page read and write
1D5A7451000
trusted library allocation
page read and write
1E522C68000
heap
page read and write
1D5A14BB000
trusted library allocation
page read and write
1D5A7CE4000
trusted library allocation
page read and write
17A32777000
trusted library allocation
page read and write
1D5A7178000
trusted library allocation
page read and write
1D5A31B1000
trusted library allocation
page read and write
1D59C3B2000
heap
page read and write
1D59C39E000
heap
page read and write
1E522B4D000
heap
page read and write
1D5AF200000
trusted library allocation
page read and write
1D5AF329000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D5A3783000
trusted library allocation
page read and write
1D59C39E000
heap
page read and write
1D59C3CE000
heap
page read and write
17A32746000
trusted library allocation
page read and write
1D59C3BD000
heap
page read and write
1D59C3C3000
heap
page read and write
1D5AD6B4000
trusted library allocation
page read and write
1D5A0DF9000
trusted library allocation
page read and write
1D59C3BC000
heap
page read and write
1D5AF0D5000
trusted library allocation
page read and write
1D5A6B0A000
trusted library allocation
page read and write
1D59C3FD000
heap
page read and write
1D59C3C7000
heap
page read and write
1D5A373F000
trusted library allocation
page read and write
1D5A6FA2000
trusted library allocation
page read and write
1D59C40C000
heap
page read and write
1D5AD9F1000
trusted library allocation
page read and write
1D5A6BED000
trusted library allocation
page read and write
1D59C3A8000
heap
page read and write
1D5ADAAD000
trusted library allocation
page read and write
1D5A31CB000
trusted library allocation
page read and write
17A32290000
unclassified section
page read and write
1D5A8D6B000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5A71C0000
trusted library allocation
page read and write
1D59C3B9000
heap
page read and write
1D5AD8D7000
trusted library allocation
page read and write
1D5A7EF1000
trusted library allocation
page read and write
1E521FE9000
trusted library allocation
page read and write
1D5A6FDD000
trusted library allocation
page read and write
1D5A7E60000
trusted library allocation
page read and write
1D5A7266000
trusted library allocation
page read and write
1D5A7183000
trusted library allocation
page read and write
1D5A5877000
trusted library allocation
page read and write
1D5A37A8000
trusted library allocation
page read and write
1D5AEFFE000
trusted library allocation
page read and write
1D5A7B8A000
trusted library allocation
page read and write
1C30000
heap
page read and write
1D5A689C000
trusted library allocation
page read and write
1D59C3C7000
heap
page read and write
1D5AD4CD000
trusted library allocation
page read and write
1D5A7CE4000
trusted library allocation
page read and write
1D59C3B1000
heap
page read and write
1D5B01AC000
trusted library allocation
page read and write
1D59C3CC000
heap
page read and write
1D59C3A9000
heap
page read and write
There are 3721 hidden memdumps, click here to show them.