IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_033fe187-7343-4f61-9672-73623c6f30c3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_033fe187-7343-4f61-9672-73623c6f30c3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2232 -prefMapHandle 2228 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ae33e5d-6f66-4269-9aad-bb5beef63bd6} 7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19fd896ef10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4108 -parentBuildID 20230927232528 -prefsHandle 4152 -prefMapHandle 4204 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a678e984-104c-431b-8a00-cf9919c7d1e3} 7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19fe8b54c10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5052 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5048 -prefMapHandle 5044 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96dff99a-b4b2-4052-8a9a-312eb0d9a788} 7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19ff1e6c310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://youtube.come
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.16.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.16.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
19FDF742000
heap
page read and write
19FE9CF3000
trusted library allocation
page read and write
19FEA69B000
trusted library allocation
page read and write
19FEBFD1000
trusted library allocation
page read and write
19FF0CFE000
trusted library allocation
page read and write
19FEBF97000
trusted library allocation
page read and write
19FE867D000
trusted library allocation
page read and write
19FF5327000
trusted library allocation
page read and write
19FE856D000
trusted library allocation
page read and write
19FE9E09000
trusted library allocation
page read and write
84D08BE000
stack
page read and write
19FEA333000
trusted library allocation
page read and write
19FEA4F4000
trusted library allocation
page read and write
19FF1C62000
trusted library allocation
page read and write
19FE9BBD000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
2753F3FD000
heap
page read and write
19FE909B000
trusted library allocation
page read and write
19FE59B0000
trusted library allocation
page read and write
2753F37D000
heap
page read and write
19FF0662000
trusted library allocation
page read and write
221FEEF2000
heap
page read and write
19FF0C9E000
trusted library allocation
page read and write
19FF3600000
trusted library allocation
page read and write
19FF0ECD000
trusted library allocation
page read and write
19FE9B29000
trusted library allocation
page read and write
84CE5EE000
unkown
page readonly
2753F458000
heap
page read and write
19FE80B3000
heap
page read and write
19FE8675000
trusted library allocation
page read and write
19FEA3C2000
trusted library allocation
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FE9BB0000
trusted library allocation
page read and write
19FEA212000
trusted library allocation
page read and write
19FEA500000
trusted library allocation
page read and write
19FEA3E7000
trusted library allocation
page read and write
C7F41FE000
stack
page read and write
19FF0A90000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FE9291000
trusted library allocation
page read and write
19FEA3F3000
trusted library allocation
page read and write
19FDF730000
heap
page read and write
19FF4F37000
trusted library allocation
page read and write
19FE89E8000
trusted library allocation
page read and write
2753F369000
heap
page read and write
19FE9826000
trusted library allocation
page read and write
19FEA3BB000
trusted library allocation
page read and write
19FDF749000
heap
page read and write
19FF0C7B000
trusted library allocation
page read and write
221FF200000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF74B000
heap
page read and write
19FF61B1000
trusted library allocation
page read and write
19FF088E000
trusted library allocation
page read and write
19FF1E20000
trusted library allocation
page read and write
2753E7C2000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF734000
heap
page read and write
19FEBC6A000
trusted library allocation
page read and write
2753F3F1000
heap
page read and write
19FF1CC8000
trusted library allocation
page read and write
19FEB031000
trusted library allocation
page read and write
19FF07E0000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF73F000
heap
page read and write
19FEA2F6000
trusted library allocation
page read and write
221FEEF7000
heap
page read and write
19FF05DE000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FEBF92000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FE9CC6000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FEA3CC000
trusted library allocation
page read and write
19FEA21A000
trusted library allocation
page read and write
19FF0CF0000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
C7F278D000
stack
page read and write
19FE6CDE000
trusted library allocation
page read and write
19FEA379000
trusted library allocation
page read and write
19FEA27F000
trusted library allocation
page read and write
2753F421000
heap
page read and write
19FEA3FC000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FE59B0000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE859E000
trusted library allocation
page read and write
19FF46C6000
trusted library allocation
page read and write
C7F62FE000
stack
page read and write
19FF50E3000
trusted library allocation
page read and write
19FE9A75000
trusted library allocation
page read and write
19FEB1F2000
trusted library allocation
page read and write
19FDF72D000
heap
page read and write
19FE46FB000
trusted library allocation
page read and write
19FE9013000
trusted library allocation
page read and write
19FF0CE9000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FF07B4000
trusted library allocation
page read and write
19FF1E63000
trusted library allocation
page read and write
19FDF765000
heap
page read and write
19FF05E2000
trusted library allocation
page read and write
19FE9C9D000
trusted library allocation
page read and write
61CADFE000
stack
page read and write
19FF5351000
trusted library allocation
page read and write
19FE59C7000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF1E65000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF50F2000
trusted library allocation
page read and write
19FF0A35000
trusted library allocation
page read and write
19FE5648000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FE6C33000
trusted library allocation
page read and write
19FE99FC000
trusted library allocation
page read and write
19FF0C9D000
trusted library allocation
page read and write
1DB6D320000
unclassified section
page readonly
19FF0C25000
trusted library allocation
page read and write
19FF0AE0000
trusted library allocation
page read and write
19FEA283000
trusted library allocation
page read and write
19FEA39D000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FEA715000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FE9B9C000
trusted library allocation
page read and write
19FEA757000
trusted library allocation
page read and write
2753E766000
trusted library allocation
page read and write
19FF4F3C000
trusted library allocation
page read and write
19FF4AC1000
trusted library allocation
page read and write
19FE56FE000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
160F000
stack
page read and write
2753F3E8000
heap
page read and write
19FE980B000
trusted library allocation
page read and write
19FEA3A6000
trusted library allocation
page read and write
22C75600000
heap
page read and write
19FE90FA000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF760000
heap
page read and write
221FEE50000
heap
page read and write
2753E7E9000
trusted library allocation
page read and write
2753F458000
heap
page read and write
19FF4BE1000
heap
page read and write
19FDF767000
heap
page read and write
19FF20C1000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FF4B01000
heap
page read and write
19FDF7D5000
heap
page read and write
19FF0CC2000
trusted library allocation
page read and write
19FE856A000
trusted library allocation
page read and write
19FF50CE000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF07BA000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FDF746000
heap
page read and write
19FF09FA000
trusted library allocation
page read and write
19FDF74C000
heap
page read and write
19FF09AB000
trusted library allocation
page read and write
502000
unkown
page readonly
19FE4A0E000
trusted library allocation
page read and write
19FE8684000
trusted library allocation
page read and write
19FE90FC000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FF4B6B000
heap
page read and write
19FDF74B000
heap
page read and write
19FDF73C000
heap
page read and write
19FDF72D000
heap
page read and write
19FDF765000
heap
page read and write
19FE9CB3000
trusted library allocation
page read and write
19FEA4C2000
trusted library allocation
page read and write
19FE902C000
trusted library allocation
page read and write
19FE8C28000
trusted library allocation
page read and write
19FF05FC000
trusted library allocation
page read and write
19FEAAF5000
trusted library allocation
page read and write
19FF0CA0000
trusted library allocation
page read and write
19FEA4E9000
trusted library allocation
page read and write
19FEBEF1000
trusted library allocation
page read and write
19FF3880000
trusted library allocation
page read and write
19FF07BC000
trusted library allocation
page read and write
19FEA279000
trusted library allocation
page read and write
19FF5088000
trusted library allocation
page read and write
19FF0C6F000
trusted library allocation
page read and write
19FF067F000
trusted library allocation
page read and write
19FEA443000
trusted library allocation
page read and write
19FDF746000
heap
page read and write
19FEBFF5000
trusted library allocation
page read and write
19FE9CFD000
trusted library allocation
page read and write
19FE996F000
trusted library allocation
page read and write
19FEA746000
trusted library allocation
page read and write
19FEA3BF000
trusted library allocation
page read and write
19FEA6F0000
trusted library allocation
page read and write
19FF09D9000
trusted library allocation
page read and write
19FF1E29000
trusted library allocation
page read and write
19FE9023000
trusted library allocation
page read and write
19FE462F000
trusted library allocation
page read and write
19FF6201000
trusted library allocation
page read and write
2753F301000
heap
page read and write
19FF4AB0000
trusted library allocation
page read and write
19FE9957000
trusted library allocation
page read and write
19FE9CF9000
trusted library allocation
page read and write
19FE86DD000
trusted library allocation
page read and write
19FE8695000
trusted library allocation
page read and write
19FDF76B000
heap
page read and write
19FF05F8000
trusted library allocation
page read and write
19FF6166000
trusted library allocation
page read and write
1DB6D70D000
trusted library allocation
page read and write
19FDF735000
heap
page read and write
19FEA25A000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FE9D61000
trusted library allocation
page read and write
19FE80AA000
heap
page read and write
19FE5978000
trusted library allocation
page read and write
19FEBFE6000
trusted library allocation
page read and write
19FE6068000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
1915000
heap
page read and write
19FF07CB000
trusted library allocation
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FEA7DA000
trusted library allocation
page read and write
19FF12CE000
trusted library allocation
page read and write
19FE9B99000
trusted library allocation
page read and write
19FEBFD6000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE9B61000
trusted library allocation
page read and write
19FF06A8000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
86E6BE000
unkown
page readonly
19FEA3FC000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF0CA6000
trusted library allocation
page read and write
19FDF75E000
heap
page read and write
2753E777000
trusted library allocation
page read and write
19FF0740000
trusted library allocation
page read and write
1DB6D75B000
trusted library allocation
page read and write
19FE89D0000
trusted library allocation
page read and write
19FF09EC000
trusted library allocation
page read and write
19FE59F6000
trusted library allocation
page read and write
19FEA65C000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FE597C000
trusted library allocation
page read and write
19FEBC66000
trusted library allocation
page read and write
19FE904D000
trusted library allocation
page read and write
2753F468000
heap
page read and write
221FF20A000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF3CA8000
trusted library allocation
page read and write
19FEA5BA000
trusted library allocation
page read and write
2753E70A000
trusted library allocation
page read and write
19FE866F000
trusted library allocation
page read and write
2753F3F1000
heap
page read and write
2753E723000
trusted library allocation
page read and write
2753E710000
trusted library allocation
page read and write
19FF07E7000
trusted library allocation
page read and write
19FF0CED000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
16A0000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE8562000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
440000
unkown
page readonly
19FEB0C5000
trusted library allocation
page read and write
19FEA7DA000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE9AD0000
trusted library allocation
page read and write
19FEA691000
trusted library allocation
page read and write
19FE9086000
trusted library allocation
page read and write
19FF0EF4000
trusted library allocation
page read and write
19FF0E82000
trusted library allocation
page read and write
19FF2204000
trusted library allocation
page read and write
19FE9CCE000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE807E000
heap
page read and write
19FEA2D4000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE9896000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FF07E0000
trusted library allocation
page read and write
19FDF7C4000
heap
page read and write
19FDF74C000
heap
page read and write
19FDF742000
heap
page read and write
221FEEDD000
heap
page read and write
19FE8453000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FF0C57000
trusted library allocation
page read and write
19FEA272000
trusted library allocation
page read and write
19FE9A47000
trusted library allocation
page read and write
19FE8067000
heap
page read and write
19FE8084000
heap
page read and write
19FEBF90000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
2753F38D000
heap
page read and write
19FF09E5000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE92E9000
trusted library allocation
page read and write
19FE5981000
trusted library allocation
page read and write
19FEA4F4000
trusted library allocation
page read and write
19FF1DF7000
trusted library allocation
page read and write
19FE9C8D000
trusted library allocation
page read and write
19FF4F2B000
trusted library allocation
page read and write
19FF0E8C000
trusted library allocation
page read and write
2753F3AA000
heap
page read and write
19FEBF97000
trusted library allocation
page read and write
19FE9E69000
trusted library allocation
page read and write
19FE982A000
trusted library allocation
page read and write
19FEA3F3000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FE804F000
heap
page read and write
2753E370000
heap
page read and write
19FE9824000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF731000
heap
page read and write
19FEAAAC000
trusted library allocation
page read and write
19FE5884000
trusted library allocation
page read and write
19FE998D000
trusted library allocation
page read and write
19FE9C9D000
trusted library allocation
page read and write
19FF0679000
trusted library allocation
page read and write
19FEA3CF000
trusted library allocation
page read and write
19FE6CF9000
trusted library allocation
page read and write
19FEA4EB000
trusted library allocation
page read and write
19FE56D2000
trusted library allocation
page read and write
19FE85CE000
trusted library allocation
page read and write
19FE80B6000
heap
page read and write
19FE56E4000
trusted library allocation
page read and write
19FF1EF6000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FDF760000
heap
page read and write
19FEA5A4000
trusted library allocation
page read and write
A6B01FE000
stack
page read and write
19FE6C62000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FEB1C6000
trusted library allocation
page read and write
19FF0C78000
trusted library allocation
page read and write
19FF09C4000
trusted library allocation
page read and write
19FF0C89000
trusted library allocation
page read and write
19FEA20C000
trusted library allocation
page read and write
19FF0C2F000
trusted library allocation
page read and write
19FE59DC000
trusted library allocation
page read and write
19FF073E000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FF0991000
trusted library allocation
page read and write
19FE86FA000
trusted library allocation
page read and write
19FE9CDC000
trusted library allocation
page read and write
19FEBFF3000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
2753E6C2000
unkown
page execute read
19FE99FC000
trusted library allocation
page read and write
19FE5693000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF79A000
heap
page read and write
19FEA259000
trusted library allocation
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FEA720000
trusted library allocation
page read and write
19FE80C3000
heap
page read and write
19FDF76D000
heap
page read and write
22C755F4000
trusted library allocation
page read and write
86A317000
stack
page read and write
19FE847B000
trusted library allocation
page read and write
19FDF7AF000
heap
page read and write
19FF12CA000
trusted library allocation
page read and write
19FF12DE000
trusted library allocation
page read and write
19FEA37D000
trusted library allocation
page read and write
2753E640000
trusted library section
page readonly
19FF0808000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE86E5000
trusted library allocation
page read and write
19FEA4CF000
trusted library allocation
page read and write
19FF1E93000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FEA370000
trusted library allocation
page read and write
19FE9014000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FF097E000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEABE1000
trusted library allocation
page read and write
19FEA4A6000
trusted library allocation
page read and write
19FEA34A000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FDF73E000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
17BE000
stack
page read and write
19FDF734000
heap
page read and write
19FE8465000
trusted library allocation
page read and write
2753F3FD000
heap
page read and write
19FEA3B0000
trusted library allocation
page read and write
86A39E000
unkown
page readonly
19FDF750000
heap
page read and write
19FEA2A4000
trusted library allocation
page read and write
19FEA7F9000
trusted library allocation
page read and write
19FE59EB000
trusted library allocation
page read and write
19FE851F000
trusted library allocation
page read and write
C7F6AFE000
unkown
page readonly
19FEA3E8000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE99B5000
trusted library allocation
page read and write
1B788E67000
heap
page read and write
19FF5095000
trusted library allocation
page read and write
19FE6CF7000
trusted library allocation
page read and write
19FF07B7000
trusted library allocation
page read and write
19FEA4A4000
trusted library allocation
page read and write
19FE8678000
trusted library allocation
page read and write
19FEA29E000
trusted library allocation
page read and write
19FE995E000
trusted library allocation
page read and write
2753E680000
trusted library allocation
page read and write
19FF0C31000
trusted library allocation
page read and write
19FEA3FC000
trusted library allocation
page read and write
19FEA270000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FE99B2000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE9851000
trusted library allocation
page read and write
19FF05F0000
trusted library allocation
page read and write
19FE8583000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF0983000
trusted library allocation
page read and write
19FE857C000
trusted library allocation
page read and write
19FDF765000
heap
page read and write
19FE56FB000
trusted library allocation
page read and write
19FF0994000
trusted library allocation
page read and write
19FEA343000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE9B82000
trusted library allocation
page read and write
19FF08EC000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE9B35000
trusted library allocation
page read and write
19FE86C1000
trusted library allocation
page read and write
19FF0806000
trusted library allocation
page read and write
19FF0619000
trusted library allocation
page read and write
19FE5908000
trusted library allocation
page read and write
19FEB157000
trusted library allocation
page read and write
19FE47EE000
trusted library allocation
page read and write
19FEA2AB000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF09AD000
trusted library allocation
page read and write
19FF0ADA000
trusted library allocation
page read and write
19FF5339000
trusted library allocation
page read and write
19FE47D2000
trusted library allocation
page read and write
19FF0C9A000
trusted library allocation
page read and write
19FEB041000
trusted library allocation
page read and write
19FEA24D000
trusted library allocation
page read and write
19FDF771000
heap
page read and write
19FF50F8000
trusted library allocation
page read and write
2753E6D4000
heap
page read and write
19FEA6FE000
trusted library allocation
page read and write
19FE4AEA000
trusted library allocation
page read and write
19FEA3C8000
trusted library allocation
page read and write
19FE80C6000
heap
page read and write
19FDF78E000
heap
page read and write
19FEA4BF000
trusted library allocation
page read and write
19FF067F000
trusted library allocation
page read and write
19FE4780000
trusted library allocation
page read and write
86DEBE000
stack
page read and write
19FF05FC000
trusted library allocation
page read and write
19FEBFD1000
trusted library allocation
page read and write
19FEBC77000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FE8573000
trusted library allocation
page read and write
19FE863D000
trusted library allocation
page read and write
19FF4F64000
trusted library allocation
page read and write
19FE6C63000
trusted library allocation
page read and write
19FE925C000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
2753E2D0000
unclassified section
page readonly
19FE998F000
trusted library allocation
page read and write
19FE5974000
trusted library allocation
page read and write
19FE8095000
heap
page read and write
19FDF744000
heap
page read and write
19FE5996000
trusted library allocation
page read and write
19FEA763000
trusted library allocation
page read and write
19FEA3E3000
trusted library allocation
page read and write
19FF1D93000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FDF75B000
heap
page read and write
19FF1DB4000
trusted library allocation
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FEA2FC000
trusted library allocation
page read and write
19FEB14A000
trusted library allocation
page read and write
19FF0C60000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
2753F3E8000
heap
page read and write
19FF4200000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
221FEEE8000
heap
page read and write
19FDF75A000
heap
page read and write
19FDF74B000
heap
page read and write
19FEB026000
trusted library allocation
page read and write
19FF0C7D000
trusted library allocation
page read and write
19FE858A000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FE4AB3000
trusted library allocation
page read and write
221FEECA000
heap
page read and write
19FE8562000
trusted library allocation
page read and write
19FEA67B000
trusted library allocation
page read and write
19FE80A1000
heap
page read and write
221FF6AB000
heap
page read and write
19FEBF5A000
trusted library allocation
page read and write
19FF09C4000
trusted library allocation
page read and write
221FF6AE000
heap
page read and write
C7F49FE000
unkown
page readonly
19FE9E3F000
trusted library allocation
page read and write
19FE86D8000
trusted library allocation
page read and write
19FDF752000
heap
page read and write
19FE90B6000
trusted library allocation
page read and write
19FE9847000
trusted library allocation
page read and write
19FE5925000
trusted library allocation
page read and write
19FE981C000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF73F000
heap
page read and write
19FDF75B000
heap
page read and write
19FE9B24000
trusted library allocation
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FEB0C5000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FEA4C8000
trusted library allocation
page read and write
A6AE9FA000
stack
page read and write
19FDF79B000
heap
page read and write
19FEA3D2000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FEABB9000
trusted library allocation
page read and write
22C75280000
heap
page read and write
2753F444000
heap
page read and write
19FF09AD000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FE99FC000
trusted library allocation
page read and write
19FE477E000
trusted library allocation
page read and write
84D07FE000
unkown
page readonly
19FE8081000
heap
page read and write
19FDF75B000
heap
page read and write
19FDF760000
heap
page read and write
19FF21F9000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF0848000
trusted library allocation
page read and write
19FE9052000
trusted library allocation
page read and write
19FE9977000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FDF78C000
heap
page read and write
19FDF7A1000
heap
page read and write
19FE9E6D000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEAA4D000
trusted library allocation
page read and write
19FEBC1A000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF745000
heap
page read and write
19FEA283000
trusted library allocation
page read and write
19FDF746000
heap
page read and write
19FF098C000
trusted library allocation
page read and write
19FE99C1000
trusted library allocation
page read and write
19FE56A5000
trusted library allocation
page read and write
19FE9BE4000
trusted library allocation
page read and write
19FE9EA7000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FF50EA000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE847B000
trusted library allocation
page read and write
19FDF730000
heap
page read and write
19FDF745000
heap
page read and write
19FDF73F000
heap
page read and write
19FE9D6B000
trusted library allocation
page read and write
19FF5079000
trusted library allocation
page read and write
19FF4B99000
heap
page read and write
19FDF72E000
heap
page read and write
19FE8CAC000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FEA37D000
trusted library allocation
page read and write
19FF0C57000
trusted library allocation
page read and write
19FEBCD5000
trusted library allocation
page read and write
19FE9830000
trusted library allocation
page read and write
19FEA49C000
trusted library allocation
page read and write
19FEA3C8000
trusted library allocation
page read and write
19FDF714000
heap
page read and write
19FF0AA3000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE9CFB000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FE5934000
trusted library allocation
page read and write
19FEA4A4000
trusted library allocation
page read and write
19FEA398000
trusted library allocation
page read and write
19FE864A000
trusted library allocation
page read and write
61CA5FF000
stack
page read and write
19FF215C000
trusted library allocation
page read and write
19FEBFE6000
trusted library allocation
page read and write
19FDF738000
heap
page read and write
19FDF74B000
heap
page read and write
19FEA3C1000
trusted library allocation
page read and write
19FE857C000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FF09FA000
trusted library allocation
page read and write
19FE9CB6000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF09FA000
trusted library allocation
page read and write
19FEA3B5000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE867D000
trusted library allocation
page read and write
1920000
heap
page read and write
19FF4B52000
heap
page read and write
19FDF76B000
heap
page read and write
19FE80A1000
heap
page read and write
19FDF745000
heap
page read and write
19FF4B01000
heap
page read and write
19FE89D7000
trusted library allocation
page read and write
22C755B6000
trusted library allocation
page read and write
1824000
heap
page read and write
19FEA34A000
trusted library allocation
page read and write
19FF09FA000
trusted library allocation
page read and write
19FE868C000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE6C33000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE8067000
heap
page read and write
1920000
heap
page read and write
2753F477000
heap
page read and write
19FEA467000
trusted library allocation
page read and write
19FE9824000
trusted library allocation
page read and write
19FF099A000
trusted library allocation
page read and write
19FF0C60000
trusted library allocation
page read and write
19FE8912000
trusted library allocation
page read and write
19FDF72D000
heap
page read and write
19FDF72E000
heap
page read and write
19FE9B99000
trusted library allocation
page read and write
19FE80C6000
heap
page read and write
19FEBFD1000
trusted library allocation
page read and write
19FE9BF2000
trusted library allocation
page read and write
19FE9CAE000
trusted library allocation
page read and write
19FE89D0000
trusted library allocation
page read and write
19FE594C000
trusted library allocation
page read and write
19FF09EC000
trusted library allocation
page read and write
19FE985A000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
2753E3DA000
heap
page read and write
19FE7E4B000
trusted library allocation
page read and write
19FF0C62000
trusted library allocation
page read and write
19FF05EA000
trusted library allocation
page read and write
84D18FE000
unkown
page readonly
19FE85A5000
trusted library allocation
page read and write
19FF4AC1000
trusted library allocation
page read and write
2753F3E3000
heap
page read and write
22C752C0000
unclassified section
page readonly
19FE80B3000
heap
page read and write
19FEBC12000
trusted library allocation
page read and write
19FEA2D4000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE59F4000
trusted library allocation
page read and write
19FF46C4000
trusted library allocation
page read and write
19FDF7A4000
heap
page read and write
1DB6D490000
heap
page read and write
19FE9996000
trusted library allocation
page read and write
19FDF748000
heap
page read and write
2753F37F000
heap
page read and write
19FDF734000
heap
page read and write
19FEBF42000
trusted library allocation
page read and write
19FE8085000
heap
page read and write
19FDF75D000
heap
page read and write
19FE8092000
heap
page read and write
19FE9095000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FEA2E9000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE4A47000
trusted library allocation
page read and write
24DD000
stack
page read and write
19FE9D69000
trusted library allocation
page read and write
1DB6D460000
heap
page read and write
19FEA60F000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
2753F360000
heap
page read and write
1824000
heap
page read and write
19FDF760000
heap
page read and write
19FF4F52000
trusted library allocation
page read and write
19FEBCED000
trusted library allocation
page read and write
19FF508C000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF0C4C000
trusted library allocation
page read and write
19FEBFF3000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FEA3F6000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEA2BF000
trusted library allocation
page read and write
2753E6B0000
trusted library allocation
page read and write
19FE849D000
trusted library allocation
page read and write
19FE5681000
trusted library allocation
page read and write
19FF0AE0000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FF0ADE000
trusted library allocation
page read and write
19FEA4A2000
trusted library allocation
page read and write
19FE590E000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FE8095000
heap
page read and write
19FEA2A4000
trusted library allocation
page read and write
1800000
heap
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FE4A55000
trusted library allocation
page read and write
19FF4F32000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE9826000
trusted library allocation
page read and write
19FF094A000
trusted library allocation
page read and write
19FEA7FC000
trusted library allocation
page read and write
19FF0BD9000
trusted library allocation
page read and write
19FE8678000
trusted library allocation
page read and write
19FEB14E000
trusted library allocation
page read and write
19FEBF94000
trusted library allocation
page read and write
19FEA5D3000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FEB023000
trusted library allocation
page read and write
19FE9EED000
trusted library allocation
page read and write
19FEA256000
trusted library allocation
page read and write
19FEB1EE000
trusted library allocation
page read and write
19FE857F000
trusted library allocation
page read and write
19FE8062000
heap
page read and write
19FEBF97000
trusted library allocation
page read and write
19FE5967000
trusted library allocation
page read and write
19FE9B87000
trusted library allocation
page read and write
19FF0AD6000
trusted library allocation
page read and write
1DB6D712000
trusted library allocation
page read and write
19FF2D9E000
trusted library allocation
page read and write
19FF09A5000
trusted library allocation
page read and write
1DB6D747000
trusted library allocation
page read and write
19FF078C000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FEA20E000
trusted library allocation
page read and write
19FE904D000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FEBC5D000
trusted library allocation
page read and write
22C75549000
trusted library allocation
page read and write
19FE8BCF000
trusted library allocation
page read and write
19FEA6E0000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
22C75516000
trusted library allocation
page read and write
19FF0ADE000
trusted library allocation
page read and write
19FDF74A000
heap
page read and write
19FEA29E000
trusted library allocation
page read and write
2753E75F000
trusted library allocation
page read and write
19FE80AA000
heap
page read and write
19FE9E69000
trusted library allocation
page read and write
19FF2118000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
2753F3A8000
heap
page read and write
19FDF75D000
heap
page read and write
19FF0C40000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FF09CF000
trusted library allocation
page read and write
19FDF79C000
heap
page read and write
19FDF736000
heap
page read and write
19FE867D000
trusted library allocation
page read and write
19FE4A8D000
trusted library allocation
page read and write
19FF1DF7000
trusted library allocation
page read and write
19FEA483000
trusted library allocation
page read and write
19FEBF92000
trusted library allocation
page read and write
19FE587C000
trusted library allocation
page read and write
221FEEF0000
heap
page read and write
19FE86C4000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FF05F4000
trusted library allocation
page read and write
19FEA3A6000
trusted library allocation
page read and write
19FF0679000
trusted library allocation
page read and write
2753F3EA000
heap
page read and write
19FF2204000
trusted library allocation
page read and write
19FE809C000
heap
page read and write
19FDF75B000
heap
page read and write
19FDF734000
heap
page read and write
19FE8080000
heap
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FF078A000
trusted library allocation
page read and write
19FF0C0F000
trusted library allocation
page read and write
19FEA4F4000
trusted library allocation
page read and write
19FF05E2000
trusted library allocation
page read and write
19FE9CB6000
trusted library allocation
page read and write
19FEB03D000
trusted library allocation
page read and write
221FF6AA000
heap
page read and write
2753E3B0000
heap
page read and write
19FF060A000
trusted library allocation
page read and write
19FEA3BA000
trusted library allocation
page read and write
19FF0C33000
trusted library allocation
page read and write
221FEEE2000
heap
page read and write
19FDF75B000
heap
page read and write
19FE98F3000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE5931000
trusted library allocation
page read and write
19FEA64F000
trusted library allocation
page read and write
19FF0C4A000
trusted library allocation
page read and write
86CDFE000
stack
page read and write
1DB6D48F000
unclassified section
page read and write
19FE868B000
trusted library allocation
page read and write
19FEA3AA000
trusted library allocation
page read and write
2753F35C000
heap
page read and write
19FDF74B000
heap
page read and write
2753E6C6000
unkown
page execute read
19FEA3B0000
trusted library allocation
page read and write
19FE9E78000
trusted library allocation
page read and write
19FF21FC000
trusted library allocation
page read and write
1DB6D482000
unclassified section
page read and write
19FDF79B000
heap
page read and write
19FE90C2000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FF4A9F000
trusted library allocation
page read and write
19FF0989000
trusted library allocation
page read and write
19FEAB80000
trusted library allocation
page read and write
1DB6D77B000
trusted library allocation
page read and write
19FE906E000
trusted library allocation
page read and write
19FEA2F6000
trusted library allocation
page read and write
19FF09F2000
trusted library allocation
page read and write
18E8000
heap
page read and write
19FE91E5000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE998B000
trusted library allocation
page read and write
19FE90C2000
trusted library allocation
page read and write
19FF07E7000
trusted library allocation
page read and write
19FEBF2C000
trusted library allocation
page read and write
19FF61B4000
trusted library allocation
page read and write
19FF0C55000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
19FE8CBC000
trusted library allocation
page read and write
19FE99F6000
trusted library allocation
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FE8BE0000
trusted library allocation
page read and write
19FF0BDF000
trusted library allocation
page read and write
19FE58BB000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF0C25000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FF0826000
trusted library allocation
page read and write
19FE80B6000
heap
page read and write
19FE9CBC000
trusted library allocation
page read and write
19FEA2E4000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FE4A69000
trusted library allocation
page read and write
86F6BE000
unkown
page readonly
19FF0A37000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FF099A000
trusted library allocation
page read and write
19FE56C2000
trusted library allocation
page read and write
19FE9093000
trusted library allocation
page read and write
1DB6D3F0000
heap
page read and write
19FEA398000
trusted library allocation
page read and write
2753E72F000
trusted library allocation
page read and write
19FF0AE0000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FF6224000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF0672000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FF0E9C000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE980B000
trusted library allocation
page read and write
19FEC1F8000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEA2AB000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF0BDF000
trusted library allocation
page read and write
19FEA291000
trusted library allocation
page read and write
19FDF7A4000
heap
page read and write
19FE8085000
heap
page read and write
19FE86E5000
trusted library allocation
page read and write
19FEBCBE000
trusted library allocation
page read and write
19FF5099000
trusted library allocation
page read and write
19FE80BA000
heap
page read and write
19FEA2FD000
trusted library allocation
page read and write
19FF0C62000
trusted library allocation
page read and write
19FEB188000
trusted library allocation
page read and write
1B789100000
trusted library allocation
page read and write
19FE9095000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FDF744000
heap
page read and write
19FE58A5000
trusted library allocation
page read and write
19FDF7AF000
heap
page read and write
19FDF73F000
heap
page read and write
19FE59DC000
trusted library allocation
page read and write
19FEA5A9000
trusted library allocation
page read and write
19FEA3DD000
trusted library allocation
page read and write
19FF21B4000
trusted library allocation
page read and write
19FF05C8000
trusted library allocation
page read and write
19FEA4F4000
trusted library allocation
page read and write
19FF0B22000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FEA5CE000
trusted library allocation
page read and write
19FE47EE000
trusted library allocation
page read and write
19FE9CFD000
trusted library allocation
page read and write
1B788E60000
heap
page read and write
19FE6056000
trusted library allocation
page read and write
19FF1DEF000
trusted library allocation
page read and write
19FEA4E3000
trusted library allocation
page read and write
19FF05CA000
trusted library allocation
page read and write
19FE56D2000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
22C7528A000
heap
page read and write
19FF0CFE000
trusted library allocation
page read and write
19FF3A00000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF1DF7000
trusted library allocation
page read and write
19FE86A4000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FEBCC8000
trusted library allocation
page read and write
19FEA2F8000
trusted library allocation
page read and write
19FF1DE8000
trusted library allocation
page read and write
19FEBF9F000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FEB0CD000
trusted library allocation
page read and write
19FF0572000
trusted library allocation
page read and write
19FE9BB6000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FEA5D1000
trusted library allocation
page read and write
19FE98D4000
trusted library allocation
page read and write
192B000
heap
page read and write
19FEA47B000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF09C7000
trusted library allocation
page read and write
19FE866E000
trusted library allocation
page read and write
19FF09A8000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF0BAB000
trusted library allocation
page read and write
19FE80C6000
heap
page read and write
19FF06DF000
trusted library allocation
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FEBE29000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FE9041000
trusted library allocation
page read and write
19FEBC45000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FEA744000
trusted library allocation
page read and write
22C75010000
unclassified section
page readonly
19FE58AC000
trusted library allocation
page read and write
19FF4B71000
heap
page read and write
19FDF72D000
heap
page read and write
19FE80C2000
heap
page read and write
19FEA3A1000
trusted library allocation
page read and write
19FEBF80000
trusted library allocation
page read and write
19FF0CF0000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF753000
heap
page read and write
19FDF73E000
heap
page read and write
19FF07DB000
trusted library allocation
page read and write
19FE6C7B000
trusted library allocation
page read and write
19FF09E1000
trusted library allocation
page read and write
1DB6D932000
trusted library allocation
page read and write
19FEA483000
trusted library allocation
page read and write
19FE7E33000
trusted library allocation
page read and write
19FF0728000
trusted library allocation
page read and write
19FE858B000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FF09A5000
trusted library allocation
page read and write
19FE868B000
trusted library allocation
page read and write
19FE80B4000
heap
page read and write
502000
unkown
page readonly
19FF07B2000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
86D63E000
unkown
page readonly
19FEA37E000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
190C000
heap
page read and write
84D28FE000
unkown
page readonly
19FE906A000
trusted library allocation
page read and write
19FF0CBC000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FEA399000
trusted library allocation
page read and write
19FF50EA000
trusted library allocation
page read and write
19FDF7AA000
heap
page read and write
19FDF7D5000
heap
page read and write
19FE807E000
heap
page read and write
19FDF742000
heap
page read and write
19FDF73F000
heap
page read and write
19FEA744000
trusted library allocation
page read and write
19FE9B80000
trusted library allocation
page read and write
19FEBF46000
trusted library allocation
page read and write
19FEA4D9000
trusted library allocation
page read and write
19FDF746000
heap
page read and write
19FEA698000
trusted library allocation
page read and write
19FF0C43000
trusted library allocation
page read and write
2753ED50000
heap
page read and write
19FE9CB6000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FE8C50000
trusted library allocation
page read and write
19FE9CC4000
trusted library allocation
page read and write
19FF0BA5000
trusted library allocation
page read and write
19FE89FB000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FF0C4A000
trusted library allocation
page read and write
19FEA5A9000
trusted library allocation
page read and write
19FEA3EF000
trusted library allocation
page read and write
19FE9CEA000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FDF75B000
heap
page read and write
19FDF757000
heap
page read and write
19FE80B3000
heap
page read and write
19FE40BF000
trusted library allocation
page read and write
19FE9D8D000
trusted library allocation
page read and write
19FEA2E4000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF4F5B000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FF50C6000
trusted library allocation
page read and write
19FE9CB6000
trusted library allocation
page read and write
19FEA4AD000
trusted library allocation
page read and write
19FE9CAB000
trusted library allocation
page read and write
221FF69E000
heap
page read and write
19FE9CB6000
trusted library allocation
page read and write
2753F34D000
heap
page read and write
19FF0C98000
trusted library allocation
page read and write
19FE9806000
trusted library allocation
page read and write
19FE9AA9000
trusted library allocation
page read and write
19FEA4C3000
trusted library allocation
page read and write
2753F444000
heap
page read and write
19FE9246000
trusted library allocation
page read and write
19FF4F44000
trusted library allocation
page read and write
19FEA3D2000
trusted library allocation
page read and write
19FF0C68000
trusted library allocation
page read and write
19FDF74A000
heap
page read and write
19FE809F000
heap
page read and write
19FE90FA000
trusted library allocation
page read and write
19FEBF38000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FDF789000
heap
page read and write
19FEA72C000
trusted library allocation
page read and write
22C75570000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
221FF69C000
heap
page read and write
19FF50F6000
trusted library allocation
page read and write
C7F270B000
stack
page read and write
19FDF73F000
heap
page read and write
19FE99E8000
trusted library allocation
page read and write
19FE40BF000
trusted library allocation
page read and write
19FEBE71000
trusted library allocation
page read and write
19FE8CFA000
trusted library allocation
page read and write
50C000
unkown
page read and write
19FDF762000
heap
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FEA2D4000
trusted library allocation
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FF0600000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE805F000
heap
page read and write
19FDF742000
heap
page read and write
22C75524000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FF1DEF000
trusted library allocation
page read and write
19FF0A90000
trusted library allocation
page read and write
19FE9824000
trusted library allocation
page read and write
19FE6CDB000
trusted library allocation
page read and write
19FE92DA000
trusted library allocation
page read and write
19FE908B000
trusted library allocation
page read and write
1824000
heap
page read and write
19FE99C3000
trusted library allocation
page read and write
19FE91DF000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
1900000
heap
page read and write
19FE5653000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF0749000
trusted library allocation
page read and write
19FE7E22000
trusted library allocation
page read and write
19FEA236000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF0AD8000
trusted library allocation
page read and write
19FE4AD7000
trusted library allocation
page read and write
19FEBC68000
trusted library allocation
page read and write
1DB6D7A0000
trusted library allocation
page read and write
19FEB0D7000
trusted library allocation
page read and write
C7F52FE000
stack
page read and write
19FDF757000
heap
page read and write
19FE928D000
trusted library allocation
page read and write
19FF098D000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF0A31000
trusted library allocation
page read and write
19FEA68F000
trusted library allocation
page read and write
19FF60FC000
trusted library allocation
page read and write
1820000
heap
page read and write
19FEA3F9000
trusted library allocation
page read and write
19FEA3B8000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE9BF2000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FE99C3000
trusted library allocation
page read and write
19FEBCED000
trusted library allocation
page read and write
19FE9E05000
trusted library allocation
page read and write
19FF09E3000
trusted library allocation
page read and write
19FF1CBE000
trusted library allocation
page read and write
2753E748000
trusted library allocation
page read and write
19FEACF2000
trusted library allocation
page read and write
19FEA3D2000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE853C000
trusted library allocation
page read and write
2753F3F1000
heap
page read and write
19FF12D7000
trusted library allocation
page read and write
19FF1E51000
trusted library allocation
page read and write
19FEA630000
trusted library allocation
page read and write
19FF0ADC000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FDF799000
heap
page read and write
1912000
heap
page read and write
19FE804F000
heap
page read and write
19FF07C8000
trusted library allocation
page read and write
2680000
heap
page read and write
19FDF73F000
heap
page read and write
19FF0B24000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEA2F7000
trusted library allocation
page read and write
19FF20FC000
trusted library allocation
page read and write
19FE8062000
heap
page read and write
19FE80A2000
heap
page read and write
19FEBCDE000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FE9088000
trusted library allocation
page read and write
19FF2161000
trusted library allocation
page read and write
19FF2DA0000
trusted library allocation
page read and write
19FEA49C000
trusted library allocation
page read and write
19FE987B000
trusted library allocation
page read and write
19FE9E3C000
trusted library allocation
page read and write
19FEA660000
trusted library allocation
page read and write
19FDF750000
heap
page read and write
19FE9CA5000
trusted library allocation
page read and write
C7F4A3E000
stack
page read and write
22C7550C000
trusted library allocation
page read and write
19FDF738000
heap
page read and write
19FE5A22000
trusted library allocation
page read and write
19FF0A29000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FEAADB000
trusted library allocation
page read and write
19FF06CD000
trusted library allocation
page read and write
19FE9031000
trusted library allocation
page read and write
19FE47D2000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF0C7D000
trusted library allocation
page read and write
19FE92EE000
trusted library allocation
page read and write
19FE8081000
heap
page read and write
19FDF72D000
heap
page read and write
1DB6D798000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FDF75D000
heap
page read and write
19FE80B4000
heap
page read and write
19FF4B01000
heap
page read and write
19FE9888000
trusted library allocation
page read and write
19FDF78C000
heap
page read and write
19FE80A2000
heap
page read and write
19FEA4AE000
trusted library allocation
page read and write
19FDF78E000
heap
page read and write
19FEB0BE000
trusted library allocation
page read and write
2753F3E6000
heap
page read and write
19FE8067000
heap
page read and write
1824000
heap
page read and write
19FDF73C000
heap
page read and write
2753F468000
heap
page read and write
19FE5895000
trusted library allocation
page read and write
19FF05F0000
trusted library allocation
page read and write
19FEBF46000
trusted library allocation
page read and write
19FDF72D000
heap
page read and write
19FE80A2000
heap
page read and write
19FDF73D000
heap
page read and write
19FE9BF2000
trusted library allocation
page read and write
19FEAAB4000
trusted library allocation
page read and write
19FE9954000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF78C000
heap
page read and write
19FDF73C000
heap
page read and write
1DB6D918000
trusted library allocation
page read and write
19FEA4E2000
trusted library allocation
page read and write
19FE85CE000
trusted library allocation
page read and write
2753F3A1000
heap
page read and write
19FF07C4000
trusted library allocation
page read and write
1DB6D470000
heap
page readonly
19FEBCC5000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FDF760000
heap
page read and write
19FEC138000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF07DB000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FF0C8B000
trusted library allocation
page read and write
19FE91F2000
trusted library allocation
page read and write
19FEA620000
trusted library allocation
page read and write
19FDF73D000
heap
page read and write
19FEA3CC000
trusted library allocation
page read and write
19FF2185000
trusted library allocation
page read and write
19FE40F9000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE809F000
heap
page read and write
86EEBE000
stack
page read and write
19FDF78C000
heap
page read and write
19FEBC22000
trusted library allocation
page read and write
19FDF730000
heap
page read and write
19FDF734000
heap
page read and write
19FEA6C5000
trusted library allocation
page read and write
19FF0593000
trusted library allocation
page read and write
19FEA3A6000
trusted library allocation
page read and write
19FF09EE000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FF4ADE000
trusted library allocation
page read and write
19FE99F6000
trusted library allocation
page read and write
19FE6CF9000
trusted library allocation
page read and write
221FEEEB000
heap
page read and write
19FEA379000
trusted library allocation
page read and write
19FEA67B000
trusted library allocation
page read and write
19FF5351000
trusted library allocation
page read and write
19FDF799000
heap
page read and write
19FE995A000
trusted library allocation
page read and write
19FE8487000
trusted library allocation
page read and write
19FE849D000
trusted library allocation
page read and write
19FF1DB4000
trusted library allocation
page read and write
19FF1EF1000
trusted library allocation
page read and write
19FE8B81000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FE9097000
trusted library allocation
page read and write
19FE6CE2000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FF088C000
trusted library allocation
page read and write
19FE980B000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF79A000
heap
page read and write
19FF1DEC000
trusted library allocation
page read and write
1914000
heap
page read and write
19FE868B000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FDF734000
heap
page read and write
19FDF757000
heap
page read and write
19FE9E50000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FE9CC6000
trusted library allocation
page read and write
19FF073E000
trusted library allocation
page read and write
19FF082B000
trusted library allocation
page read and write
19FF0CF4000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FF4B71000
heap
page read and write
19FDF73C000
heap
page read and write
2753E772000
trusted library allocation
page read and write
19FE9084000
trusted library allocation
page read and write
2753F468000
heap
page read and write
19FDF760000
heap
page read and write
19FEA4A6000
trusted library allocation
page read and write
19FF4A84000
trusted library allocation
page read and write
19FE9D55000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FE807E000
heap
page read and write
19FF2224000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
2753F3E1000
heap
page read and write
2753F36C000
heap
page read and write
19FE80A8000
heap
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FEBCE2000
trusted library allocation
page read and write
19FEBFD6000
trusted library allocation
page read and write
19FF09DF000
trusted library allocation
page read and write
19FF12CE000
trusted library allocation
page read and write
1824000
heap
page read and write
19FDF734000
heap
page read and write
19FE9285000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FE6C39000
trusted library allocation
page read and write
19FF4B0B000
heap
page read and write
19FE9AEF000
trusted library allocation
page read and write
19FF46DD000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF05B7000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
22C75573000
trusted library allocation
page read and write
19FE98BE000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FE9CDF000
trusted library allocation
page read and write
86D5FE000
unkown
page readonly
19FE86D8000
trusted library allocation
page read and write
19FEA76A000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE90D8000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE7E84000
trusted library allocation
page read and write
19FF0639000
trusted library allocation
page read and write
19FEC163000
trusted library allocation
page read and write
22C7555F000
trusted library allocation
page read and write
1DB6DA00000
heap
page read and write
1903000
heap
page read and write
19FEA281000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FF0CC2000
trusted library allocation
page read and write
19FE86BB000
trusted library allocation
page read and write
19FF4AF0000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FEA27D000
trusted library allocation
page read and write
19FE86D1000
trusted library allocation
page read and write
19FDF78C000
heap
page read and write
19FDF760000
heap
page read and write
19FE40C9000
trusted library allocation
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF742000
heap
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FEA4AB000
trusted library allocation
page read and write
19FF0BF3000
trusted library allocation
page read and write
C7F27CE000
unkown
page readonly
19FF09D9000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FEB179000
trusted library allocation
page read and write
19FF067B000
trusted library allocation
page read and write
19FEABFE000
trusted library allocation
page read and write
19FF0BD9000
trusted library allocation
page read and write
19FE86A1000
trusted library allocation
page read and write
19FF5C3B000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FE90B2000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FEA2B5000
trusted library allocation
page read and write
19FEB0A8000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FF4BBC000
heap
page read and write
19FEA2FD000
trusted library allocation
page read and write
19FEA4A0000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF760000
heap
page read and write
1913000
heap
page read and write
19FE8066000
heap
page read and write
19FEA2D4000
trusted library allocation
page read and write
C7F4A7E000
unkown
page readonly
19FEA3FD000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FE86BF000
trusted library allocation
page read and write
19FEABD0000
trusted library allocation
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEC200000
trusted library allocation
page read and write
19FF5C61000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FE5906000
trusted library allocation
page read and write
19FE4776000
trusted library allocation
page read and write
19FEA6F2000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FDF762000
heap
page read and write
19FDF73C000
heap
page read and write
19FEA4A0000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FF0ECD000
trusted library allocation
page read and write
19FE4AB5000
trusted library allocation
page read and write
2753E34F000
remote allocation
page execute read
19FEA2A4000
trusted library allocation
page read and write
19FE9EF8000
trusted library allocation
page read and write
19FF2201000
trusted library allocation
page read and write
19FDF7B1000
heap
page read and write
19FDF7A6000
heap
page read and write
1DB6D800000
unclassified section
page readonly
19FF0CA6000
trusted library allocation
page read and write
19FE865A000
trusted library allocation
page read and write
22C75703000
trusted library allocation
page read and write
19FEA3F4000
trusted library allocation
page read and write
19FE58B4000
trusted library allocation
page read and write
19FE8B6B000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FE80BA000
heap
page read and write
19FE599D000
trusted library allocation
page read and write
19FEA5E2000
trusted library allocation
page read and write
19FE86BB000
trusted library allocation
page read and write
19FE9DFC000
trusted library allocation
page read and write
19FE9964000
trusted library allocation
page read and write
19FE8093000
heap
page read and write
19FF0A97000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FF0991000
trusted library allocation
page read and write
19FF1DEC000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FEA3D2000
trusted library allocation
page read and write
19FE9CCE000
trusted library allocation
page read and write
19FE9CC6000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
22C755C4000
trusted library allocation
page read and write
41C1000
heap
page read and write
19FDF79B000
heap
page read and write
19FE581E000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FF4B7E000
heap
page read and write
19FF078C000
trusted library allocation
page read and write
19FE6C51000
trusted library allocation
page read and write
19FEA2D1000
trusted library allocation
page read and write
19FE9CC4000
trusted library allocation
page read and write
19FF099F000
trusted library allocation
page read and write
19FF50C8000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF534B000
trusted library allocation
page read and write
19FE80A1000
heap
page read and write
19FEBF46000
trusted library allocation
page read and write
1DB6D330000
unclassified section
page readonly
19FF0C73000
trusted library allocation
page read and write
19FE8090000
heap
page read and write
19FDF767000
heap
page read and write
19FDF789000
heap
page read and write
19FDF737000
heap
page read and write
19FEABDA000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
221FEEC0000
heap
page read and write
19FDF79C000
heap
page read and write
19FF09A2000
trusted library allocation
page read and write
19FEB1AA000
trusted library allocation
page read and write
19FDF74D000
heap
page read and write
2753F3F2000
heap
page read and write
22C7558F000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FF0AD2000
trusted library allocation
page read and write
19FEA3EB000
trusted library allocation
page read and write
19FDF7AF000
heap
page read and write
19FF4B36000
heap
page read and write
19FE91DF000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEBF5D000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE9818000
trusted library allocation
page read and write
19FDF752000
heap
page read and write
19FDF764000
heap
page read and write
19FE89E9000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEA741000
trusted library allocation
page read and write
19FF0CF7000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEA3D9000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FE9093000
trusted library allocation
page read and write
19FEA716000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE8095000
heap
page read and write
19FE9252000
trusted library allocation
page read and write
19FE868B000
trusted library allocation
page read and write
2753F3F1000
heap
page read and write
19FF0CFE000
trusted library allocation
page read and write
19FEB092000
trusted library allocation
page read and write
19FEBBF2000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FDF73E000
heap
page read and write
19FF0994000
trusted library allocation
page read and write
161B000
stack
page read and write
19FF0BFA000
trusted library allocation
page read and write
19FE98C3000
trusted library allocation
page read and write
2753E7C7000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF21CA000
trusted library allocation
page read and write
19FF50B8000
trusted library allocation
page read and write
19FE84CC000
trusted library allocation
page read and write
19FE863D000
trusted library allocation
page read and write
19FF21B1000
trusted library allocation
page read and write
22C75090000
unclassified section
page readonly
1B789270000
heap
page read and write
3CD0000
trusted library allocation
page read and write
19FE8BC5000
trusted library allocation
page read and write
19FF0AD2000
trusted library allocation
page read and write
2753E745000
trusted library allocation
page read and write
19FF4AB0000
trusted library allocation
page read and write
19FF0CF2000
trusted library allocation
page read and write
19FF20BA000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FF2DED000
trusted library allocation
page read and write
19FE8683000
trusted library allocation
page read and write
19FE9093000
trusted library allocation
page read and write
19FF098E000
trusted library allocation
page read and write
19FE9B64000
trusted library allocation
page read and write
19FE40CB000
trusted library allocation
page read and write
19FEA7C8000
trusted library allocation
page read and write
19FF2189000
trusted library allocation
page read and write
19FE99F6000
trusted library allocation
page read and write
19FF0C68000
trusted library allocation
page read and write
19FE92E9000
trusted library allocation
page read and write
18E0000
heap
page read and write
19FE8066000
heap
page read and write
19FDF72E000
heap
page read and write
19FEA76A000
trusted library allocation
page read and write
C7F31D8000
stack
page read and write
19FF07E0000
trusted library allocation
page read and write
19FEB0C0000
trusted library allocation
page read and write
19FE9E3C000
trusted library allocation
page read and write
19FE9A60000
trusted library allocation
page read and write
19FE5996000
trusted library allocation
page read and write
2753F3EA000
heap
page read and write
86A3DE000
stack
page read and write
19FDF760000
heap
page read and write
19FE8064000
heap
page read and write
19FF096F000
trusted library allocation
page read and write
19FE987B000
trusted library allocation
page read and write
19FE9E3C000
trusted library allocation
page read and write
19FEB03B000
trusted library allocation
page read and write
2753F37D000
heap
page read and write
19FDF757000
heap
page read and write
19FE891E000
trusted library allocation
page read and write
19FE85CE000
trusted library allocation
page read and write
19FE9EDB000
trusted library allocation
page read and write
19FF06BF000
trusted library allocation
page read and write
19FF1DF7000
trusted library allocation
page read and write
19FF50EE000
trusted library allocation
page read and write
19FEB0B6000
trusted library allocation
page read and write
19FE561E000
trusted library allocation
page read and write
19FE9986000
trusted library allocation
page read and write
19FF61F9000
trusted library allocation
page read and write
19FE98D9000
trusted library allocation
page read and write
19FE5A35000
trusted library allocation
page read and write
19FF1DEA000
trusted library allocation
page read and write
19FE91EF000
trusted library allocation
page read and write
19FDF730000
heap
page read and write
19FE9B27000
trusted library allocation
page read and write
19FDF789000
heap
page read and write
19FEBEBC000
trusted library allocation
page read and write
19FF05DA000
trusted library allocation
page read and write
19FF0C4C000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
1DB6D70B000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FE563F000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FF57AD000
trusted library allocation
page read and write
19FEA339000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FDF74B000
heap
page read and write
19FE6C33000
trusted library allocation
page read and write
19FE900C000
trusted library allocation
page read and write
2753F458000
heap
page read and write
19FDF79B000
heap
page read and write
19FEACF8000
trusted library allocation
page read and write
19FE9041000
trusted library allocation
page read and write
19FEA794000
trusted library allocation
page read and write
19FEBC57000
trusted library allocation
page read and write
19FEA315000
trusted library allocation
page read and write
19FE9BB0000
trusted library allocation
page read and write
19FF50F6000
trusted library allocation
page read and write
2753F3FD000
heap
page read and write
19FDF760000
heap
page read and write
19FE80AA000
heap
page read and write
19FEA2F7000
trusted library allocation
page read and write
19FE868B000
trusted library allocation
page read and write
19FEB184000
trusted library allocation
page read and write
19FE9B95000
trusted library allocation
page read and write
19FE4AD0000
trusted library allocation
page read and write
19FF0ADA000
trusted library allocation
page read and write
19FEA4D0000
trusted library allocation
page read and write
19FF0B20000
trusted library allocation
page read and write
19FE86A4000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE9E43000
trusted library allocation
page read and write
19FE9285000
trusted library allocation
page read and write
22C755D7000
trusted library allocation
page read and write
19FE588C000
trusted library allocation
page read and write
19FDF751000
heap
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FE6CDD000
trusted library allocation
page read and write
19FE58B8000
trusted library allocation
page read and write
19FDF752000
heap
page read and write
19FF0879000
trusted library allocation
page read and write
19FE9B43000
trusted library allocation
page read and write
19FF07DB000
trusted library allocation
page read and write
19FF46C4000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF6161000
trusted library allocation
page read and write
19FF1DEC000
trusted library allocation
page read and write
19FEA620000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
1DB6D7A3000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FE9A11000
trusted library allocation
page read and write
19FF0C31000
trusted library allocation
page read and write
19FE8085000
heap
page read and write
19FF1E82000
trusted library allocation
page read and write
19FDF78E000
heap
page read and write
19FEA5E8000
trusted library allocation
page read and write
19FE9B4A000
trusted library allocation
page read and write
19FF09E3000
trusted library allocation
page read and write
19FEAA3E000
trusted library allocation
page read and write
19FE857F000
trusted library allocation
page read and write
19FF0AA3000
trusted library allocation
page read and write
19FE996B000
trusted library allocation
page read and write
19FE9BBA000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE89FB000
trusted library allocation
page read and write
19FEA20B000
trusted library allocation
page read and write
19FE986E000
trusted library allocation
page read and write
19FF06C7000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF09FA000
trusted library allocation
page read and write
19FEA4D9000
trusted library allocation
page read and write
19FE7E25000
trusted library allocation
page read and write
19FF0976000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
3CB0000
heap
page read and write
19FF46CF000
trusted library allocation
page read and write
19FF07DB000
trusted library allocation
page read and write
19FDF753000
heap
page read and write
19FE85A5000
trusted library allocation
page read and write
19FE58DC000
trusted library allocation
page read and write
19FE4A95000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
19FF0C89000
trusted library allocation
page read and write
19FF0BF7000
trusted library allocation
page read and write
19FF0893000
trusted library allocation
page read and write
19FE84AF000
trusted library allocation
page read and write
19FF5311000
trusted library allocation
page read and write
19FE80AA000
heap
page read and write
19FDF75B000
heap
page read and write
19FEBCE2000
trusted library allocation
page read and write
19FE8BE9000
trusted library allocation
page read and write
19FE9EA7000
trusted library allocation
page read and write
19FEB1B9000
trusted library allocation
page read and write
19FF1E4D000
trusted library allocation
page read and write
19FEBC40000
trusted library allocation
page read and write
19FE9BF7000
trusted library allocation
page read and write
19FF0CA6000
trusted library allocation
page read and write
19FE5889000
trusted library allocation
page read and write
19FDF761000
heap
page read and write
19FF46FC000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FDF760000
heap
page read and write
19FDF742000
heap
page read and write
19FE849A000
trusted library allocation
page read and write
19FF46C6000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF07ED000
trusted library allocation
page read and write
19FF0C6F000
trusted library allocation
page read and write
19FF2224000
trusted library allocation
page read and write
1DB6D723000
trusted library allocation
page read and write
19FE6CBD000
trusted library allocation
page read and write
19FF0BAB000
trusted library allocation
page read and write
19FE80C3000
heap
page read and write
19FE98DE000
trusted library allocation
page read and write
19FF0723000
trusted library allocation
page read and write
2753F42A000
heap
page read and write
19FE5969000
trusted library allocation
page read and write
19FF0BB0000
trusted library allocation
page read and write
A6B11FF000
stack
page read and write
221FF207000
trusted library allocation
page read and write
19FE4A24000
trusted library allocation
page read and write
19FE9027000
trusted library allocation
page read and write
1DB6D3D0000
heap
page read and write
19FE7E69000
trusted library allocation
page read and write
19FF4ADE000
trusted library allocation
page read and write
19FF5323000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FF12EC000
trusted library allocation
page read and write
19FE9B87000
trusted library allocation
page read and write
19FE995E000
trusted library allocation
page read and write
19FE80A1000
heap
page read and write
19FE9C8D000
trusted library allocation
page read and write
19FE8434000
trusted library allocation
page read and write
19FF46EA000
trusted library allocation
page read and write
19FEA2A5000
trusted library allocation
page read and write
2753F300000
heap
page read and write
19FE9E69000
trusted library allocation
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FE9E02000
trusted library allocation
page read and write
19FEA9E5000
trusted library allocation
page read and write
19FE4A63000
trusted library allocation
page read and write
19FEA205000
trusted library allocation
page read and write
19FE9CB1000
trusted library allocation
page read and write
19FF2DE0000
trusted library allocation
page read and write
19FE9AF6000
trusted library allocation
page read and write
514000
unkown
page readonly
19FEA4A0000
trusted library allocation
page read and write
19FEA23A000
trusted library allocation
page read and write
19FE92AA000
trusted library allocation
page read and write
19FE8E66000
trusted library allocation
page read and write
19FF4F19000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF4AF0000
trusted library allocation
page read and write
2753E781000
trusted library allocation
page read and write
19FF12CE000
trusted library allocation
page read and write
19FF05E2000
trusted library allocation
page read and write
1DB6D710000
trusted library allocation
page read and write
19FF0CF4000
trusted library allocation
page read and write
19FE8573000
trusted library allocation
page read and write
19FE6CE5000
trusted library allocation
page read and write
19FE8491000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF744000
heap
page read and write
19FEBC57000
trusted library allocation
page read and write
2753F35C000
heap
page read and write
19FDF745000
heap
page read and write
19FF085E000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
2753F36C000
heap
page read and write
2753F477000
heap
page read and write
19FEBF9F000
trusted library allocation
page read and write
19FEBF58000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FEBCFB000
trusted library allocation
page read and write
19FF05DE000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FE471E000
trusted library allocation
page read and write
19FE59C7000
trusted library allocation
page read and write
19FF0611000
trusted library allocation
page read and write
19FEB0D1000
trusted library allocation
page read and write
19FE8474000
trusted library allocation
page read and write
19FE9A83000
trusted library allocation
page read and write
19FE86B8000
trusted library allocation
page read and write
19FF0851000
trusted library allocation
page read and write
19FED301000
trusted library allocation
page read and write
19FEB03B000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEBC42000
trusted library allocation
page read and write
19FF064D000
trusted library allocation
page read and write
19FF0CF0000
trusted library allocation
page read and write
19FE9EE2000
trusted library allocation
page read and write
19FE7ECF000
trusted library allocation
page read and write
19FF067F000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE91F6000
trusted library allocation
page read and write
19FEBF5D000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
22C75707000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE8999000
trusted library allocation
page read and write
19FDF76A000
heap
page read and write
19FEA34C000
trusted library allocation
page read and write
19FE9AE7000
trusted library allocation
page read and write
19FE9B23000
trusted library allocation
page read and write
19FEA359000
trusted library allocation
page read and write
19FEA3BF000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEC16C000
trusted library allocation
page read and write
19FEA2C2000
trusted library allocation
page read and write
19FEA3FC000
trusted library allocation
page read and write
19FEA2AB000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FE86CC000
trusted library allocation
page read and write
19FF0C66000
trusted library allocation
page read and write
19FEA4E0000
trusted library allocation
page read and write
19FE857C000
trusted library allocation
page read and write
19FE9023000
trusted library allocation
page read and write
19FE6CD1000
trusted library allocation
page read and write
19FF07BC000
trusted library allocation
page read and write
22C75070000
remote allocation
page read and write
19FDF73F000
heap
page read and write
19FDF72E000
heap
page read and write
19FF0EF4000
trusted library allocation
page read and write
19FE9065000
trusted library allocation
page read and write
19FF1DF1000
trusted library allocation
page read and write
19FF07FE000
trusted library allocation
page read and write
19FF4F48000
trusted library allocation
page read and write
19FEA720000
trusted library allocation
page read and write
19FF4F37000
trusted library allocation
page read and write
19FF61FC000
trusted library allocation
page read and write
19FF0C85000
trusted library allocation
page read and write
19FF05A5000
trusted library allocation
page read and write
2753F3EA000
heap
page read and write
19FF0EE1000
trusted library allocation
page read and write
441000
unkown
page execute read
19FEA281000
trusted library allocation
page read and write
19FEBF46000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
1DB6D921000
trusted library allocation
page read and write
19FE9CF4000
trusted library allocation
page read and write
19FE898E000
trusted library allocation
page read and write
19FF2DA8000
trusted library allocation
page read and write
19FE4098000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
1926000
heap
page read and write
1824000
heap
page read and write
19FF4A9F000
trusted library allocation
page read and write
19FE46F6000
trusted library allocation
page read and write
C7F274E000
unkown
page readonly
19FE409E000
trusted library allocation
page read and write
19FE5954000
trusted library allocation
page read and write
1DB6D463000
heap
page read and write
19FE9084000
trusted library allocation
page read and write
19FE9CD3000
trusted library allocation
page read and write
19FDF76D000
heap
page read and write
19FDF79B000
heap
page read and write
19FDF746000
heap
page read and write
19FE56DA000
trusted library allocation
page read and write
2753F477000
heap
page read and write
19FE86C1000
trusted library allocation
page read and write
19FEB094000
trusted library allocation
page read and write
19FE994A000
trusted library allocation
page read and write
19FE9258000
trusted library allocation
page read and write
19FF2159000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FDF75B000
heap
page read and write
19FE995A000
trusted library allocation
page read and write
2753F479000
heap
page read and write
19FE8474000
trusted library allocation
page read and write
19FF0C73000
trusted library allocation
page read and write
19FE9ACA000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
84D20FE000
stack
page read and write
19FF50AB000
trusted library allocation
page read and write
19FE8692000
trusted library allocation
page read and write
19FEAAA5000
trusted library allocation
page read and write
22C7555D000
trusted library allocation
page read and write
19FEA3DC000
trusted library allocation
page read and write
2753F43B000
heap
page read and write
19FDF736000
heap
page read and write
19FEA741000
trusted library allocation
page read and write
19FE9818000
trusted library allocation
page read and write
19FE9DAE000
trusted library allocation
page read and write
19FE925A000
trusted library allocation
page read and write
19FE9CB6000
trusted library allocation
page read and write
19FE984B000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FE56E1000
trusted library allocation
page read and write
19FEA3B5000
trusted library allocation
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FE80B6000
heap
page read and write
19FEA5E8000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE59EB000
trusted library allocation
page read and write
86A31B000
stack
page read and write
1DB6D8E0000
heap
page read and write
19FE9CDC000
trusted library allocation
page read and write
19FF4B36000
heap
page read and write
19FDF73E000
heap
page read and write
190B000
heap
page read and write
19FF07DF000
trusted library allocation
page read and write
19FE9D95000
trusted library allocation
page read and write
19FF0ED5000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF734000
heap
page read and write
19FDF73F000
heap
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FF09E3000
trusted library allocation
page read and write
19FEA2E4000
trusted library allocation
page read and write
19FEA46D000
trusted library allocation
page read and write
19FE8583000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE9A35000
trusted library allocation
page read and write
19FE9AB1000
trusted library allocation
page read and write
19FE9254000
trusted library allocation
page read and write
19FE80B4000
heap
page read and write
1B7CFD61000
trusted library allocation
page execute read
19FEA45B000
trusted library allocation
page read and write
19FDF764000
heap
page read and write
19FE9A4A000
trusted library allocation
page read and write
19FE9E10000
trusted library allocation
page read and write
19FEA5CA000
trusted library allocation
page read and write
19FEC169000
trusted library allocation
page read and write
19FEBCC8000
trusted library allocation
page read and write
19FE9BB3000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEA3BE000
trusted library allocation
page read and write
19FEC155000
trusted library allocation
page read and write
19FEBFCA000
trusted library allocation
page read and write
19FE908E000
trusted library allocation
page read and write
1DB6D913000
trusted library allocation
page read and write
19FF12CA000
trusted library allocation
page read and write
19FF0C76000
trusted library allocation
page read and write
19FF5C04000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEA69E000
trusted library allocation
page read and write
19FF092C000
trusted library allocation
page read and write
19FE9B2C000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FEA3F3000
trusted library allocation
page read and write
19FEA2CC000
trusted library allocation
page read and write
19FEA499000
trusted library allocation
page read and write
19FF0CC2000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE4717000
trusted library allocation
page read and write
19FE8664000
trusted library allocation
page read and write
19FF2118000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FF06A4000
trusted library allocation
page read and write
19FF46FC000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE80A1000
heap
page read and write
19FE9D87000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FF5C83000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
19FE9D67000
trusted library allocation
page read and write
2753F217000
trusted library allocation
page read and write
19FE9EFC000
trusted library allocation
page read and write
190E000
heap
page read and write
19FEBFF3000
trusted library allocation
page read and write
2753E703000
trusted library allocation
page read and write
19FE849F000
trusted library allocation
page read and write
19FF05DA000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FEA261000
trusted library allocation
page read and write
2753F364000
heap
page read and write
19FF0AFE000
trusted library allocation
page read and write
19FE98C2000
trusted library allocation
page read and write
19FF0B17000
trusted library allocation
page read and write
19FE8081000
heap
page read and write
19FE9D7F000
trusted library allocation
page read and write
19FE4671000
trusted library allocation
page read and write
19FEBC33000
trusted library allocation
page read and write
19FF4F37000
trusted library allocation
page read and write
19FE8587000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FDF759000
heap
page read and write
19FEA3B8000
trusted library allocation
page read and write
19FEA3C8000
trusted library allocation
page read and write
19FF0C39000
trusted library allocation
page read and write
19FE9A73000
trusted library allocation
page read and write
19FE9EFC000
trusted library allocation
page read and write
19FE92AA000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FEA37D000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FEA4EB000
trusted library allocation
page read and write
1927000
heap
page read and write
19FEA6C5000
trusted library allocation
page read and write
19FF2166000
trusted library allocation
page read and write
19FF0BE2000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FEA3CF000
trusted library allocation
page read and write
22C75240000
heap
page read and write
19FDF734000
heap
page read and write
19FEA3C1000
trusted library allocation
page read and write
19FEA3F3000
trusted library allocation
page read and write
2753F42A000
heap
page read and write
19FE5A2A000
trusted library allocation
page read and write
19FE9B29000
trusted library allocation
page read and write
19FE9DB9000
trusted library allocation
page read and write
19FF0726000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE8095000
heap
page read and write
22C75513000
trusted library allocation
page read and write
15FF000
stack
page read and write
19FDF760000
heap
page read and write
19FE8497000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FDF75D000
heap
page read and write
19FDF760000
heap
page read and write
19FE89D9000
trusted library allocation
page read and write
19FEA72F000
trusted library allocation
page read and write
19FDF714000
heap
page read and write
2753E6F7000
unkown
page execute read
19FEA3C4000
trusted library allocation
page read and write
19FF0ADC000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FF07E6000
trusted library allocation
page read and write
19FEA660000
trusted library allocation
page read and write
19FEBF5A000
trusted library allocation
page read and write
19FF09A5000
trusted library allocation
page read and write
19FF09E5000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FF60BA000
trusted library allocation
page read and write
19FF1DA6000
trusted library allocation
page read and write
1DB6D75D000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FE4AD4000
trusted library allocation
page read and write
19FEC18F000
trusted library allocation
page read and write
19FE99A4000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FE596D000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEA3C2000
trusted library allocation
page read and write
1DB6D703000
trusted library allocation
page read and write
19FF078C000
trusted library allocation
page read and write
19FE9DDE000
trusted library allocation
page read and write
19FEA283000
trusted library allocation
page read and write
19FDF748000
heap
page read and write
19FDF765000
heap
page read and write
19FE91DB000
trusted library allocation
page read and write
19FEA3CC000
trusted library allocation
page read and write
2753F3B9000
heap
page read and write
19FF091B000
trusted library allocation
page read and write
19FF3C02000
trusted library allocation
page read and write
19FEA2D1000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF07E0000
trusted library allocation
page read and write
19FE86DB000
trusted library allocation
page read and write
19FEBFF8000
trusted library allocation
page read and write
19FEA763000
trusted library allocation
page read and write
19FE9BF3000
trusted library allocation
page read and write
19FE90AA000
trusted library allocation
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FE4A13000
trusted library allocation
page read and write
19FDF78A000
heap
page read and write
19FEA3B8000
trusted library allocation
page read and write
19FF1DB4000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FE9CDB000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEA296000
trusted library allocation
page read and write
19FEA398000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FDF742000
heap
page read and write
19FF4F46000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FDF73C000
heap
page read and write
19FEACDB000
trusted library allocation
page read and write
19FEA5CA000
trusted library allocation
page read and write
19FF4BE1000
heap
page read and write
19FF0A39000
trusted library allocation
page read and write
19FE5897000
trusted library allocation
page read and write
19FEAA99000
trusted library allocation
page read and write
19FF05DE000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FF50F0000
trusted library allocation
page read and write
19FE9B20000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE56EF000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FDF760000
heap
page read and write
19FE92EF000
trusted library allocation
page read and write
19FE86FD000
trusted library allocation
page read and write
2753E390000
heap
page read and write
19FEA463000
trusted library allocation
page read and write
19FEA379000
trusted library allocation
page read and write
19FF46EA000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FDF742000
heap
page read and write
19FDF760000
heap
page read and write
19FEA2D1000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF751000
heap
page read and write
19FEA47B000
trusted library allocation
page read and write
19FE8BF9000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FE86E8000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FDF72E000
heap
page read and write
19FF0C4C000
trusted library allocation
page read and write
19FE9E0A000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FE9845000
trusted library allocation
page read and write
19FF1DEF000
trusted library allocation
page read and write
19FF533D000
trusted library allocation
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FF0ADA000
trusted library allocation
page read and write
19FF06D9000
trusted library allocation
page read and write
19FF0895000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FDF73F000
heap
page read and write
19FF4A7F000
trusted library allocation
page read and write
19FEC1D6000
trusted library allocation
page read and write
19FEB1F9000
trusted library allocation
page read and write
19FEA47B000
trusted library allocation
page read and write
19FF0851000
trusted library allocation
page read and write
19FEA7C8000
trusted library allocation
page read and write
19FEA2CC000
trusted library allocation
page read and write
19FE6C13000
trusted library allocation
page read and write
19FE4A51000
trusted library allocation
page read and write
19FE98DE000
trusted library allocation
page read and write
19FDF7B5000
heap
page read and write
19FDF73F000
heap
page read and write
19FEA4F4000
trusted library allocation
page read and write
19FEA3BD000
trusted library allocation
page read and write
19FE59E5000
trusted library allocation
page read and write
19FF09F2000
trusted library allocation
page read and write
19FF09A8000
trusted library allocation
page read and write
19FE901C000
trusted library allocation
page read and write
19FDF721000
heap
page read and write
19FDF745000
heap
page read and write
19FE92A6000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE9C8D000
trusted library allocation
page read and write
19FF0655000
trusted library allocation
page read and write
19FEA35D000
trusted library allocation
page read and write
19FF09EC000
trusted library allocation
page read and write
19FE9DCA000
trusted library allocation
page read and write
19FF0ECF000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
22C750D0000
heap
page read and write
19FEB172000
trusted library allocation
page read and write
19FF1DA7000
trusted library allocation
page read and write
19FF4AAD000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FF07C4000
trusted library allocation
page read and write
19FE8065000
heap
page read and write
19FE996B000
trusted library allocation
page read and write
19FE4A98000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
C7F5AFE000
unkown
page readonly
19FF093E000
trusted library allocation
page read and write
19FF09F2000
trusted library allocation
page read and write
19FF0976000
trusted library allocation
page read and write
19FE86D8000
trusted library allocation
page read and write
19FE58A5000
trusted library allocation
page read and write
19FF099A000
trusted library allocation
page read and write
19FF21B4000
trusted library allocation
page read and write
19FEB031000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FF0BE7000
trusted library allocation
page read and write
19FE9230000
trusted library allocation
page read and write
19FE9EB1000
trusted library allocation
page read and write
19FDF78E000
heap
page read and write
19FDF74B000
heap
page read and write
19FDF72E000
heap
page read and write
19FE98D9000
trusted library allocation
page read and write
19FDF7B5000
heap
page read and write
19FE804F000
heap
page read and write
19FDF73F000
heap
page read and write
19FDF79C000
heap
page read and write
19FDF746000
heap
page read and write
19FF057B000
trusted library allocation
page read and write
19FE8582000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FF0C3F000
trusted library allocation
page read and write
19FF4BB8000
heap
page read and write
19FE91DB000
trusted library allocation
page read and write
19FE924A000
trusted library allocation
page read and write
19FF5339000
trusted library allocation
page read and write
19FE56C2000
trusted library allocation
page read and write
19FE998F000
trusted library allocation
page read and write
19FE8300000
trusted library allocation
page read and write
19FE4726000
trusted library allocation
page read and write
19FF5778000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF760000
heap
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FF12F9000
trusted library allocation
page read and write
19FF0CC2000
trusted library allocation
page read and write
19FF099A000
trusted library allocation
page read and write
19FF09EC000
trusted library allocation
page read and write
19FEA3AD000
trusted library allocation
page read and write
19FEBFF8000
trusted library allocation
page read and write
19FE9B48000
trusted library allocation
page read and write
19FEBF06000
trusted library allocation
page read and write
19FE9A7E000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FEA69B000
trusted library allocation
page read and write
22C75130000
heap
page read and write
19FF0ADE000
trusted library allocation
page read and write
19FE99BF000
trusted library allocation
page read and write
19FE986A000
trusted library allocation
page read and write
1DB6D4D0000
heap
page read and write
19FF09AD000
trusted library allocation
page read and write
19FE9068000
trusted library allocation
page read and write
221FEEEB000
heap
page read and write
19FEA2A4000
trusted library allocation
page read and write
19FF09DF000
trusted library allocation
page read and write
19FEBC6D000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FEBC77000
trusted library allocation
page read and write
19FDF7B0000
heap
page read and write
19FDF73E000
heap
page read and write
1DB6D7B7000
trusted library allocation
page read and write
19FE86BB000
trusted library allocation
page read and write
19FDF738000
heap
page read and write
19FE9D59000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FE863B000
trusted library allocation
page read and write
19FE994F000
trusted library allocation
page read and write
3D84000
heap
page read and write
19FF5075000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FDF744000
heap
page read and write
19FEA299000
trusted library allocation
page read and write
19FE86B2000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FDF744000
heap
page read and write
19FE91C3000
trusted library allocation
page read and write
19FEA379000
trusted library allocation
page read and write
19FF4B5C000
heap
page read and write
22C754F4000
heap
page read and write
1DB6D779000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE9C9D000
trusted library allocation
page read and write
19FE99A7000
trusted library allocation
page read and write
19FE9285000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FF1E63000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FEA6FE000
trusted library allocation
page read and write
19FE8664000
trusted library allocation
page read and write
19FDF75F000
heap
page read and write
19FE868B000
trusted library allocation
page read and write
19FE9DCC000
trusted library allocation
page read and write
19FE56A5000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FEA3F6000
trusted library allocation
page read and write
1DB6D93D000
trusted library allocation
page read and write
19FEA4A0000
trusted library allocation
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FEA27D000
trusted library allocation
page read and write
19FF0CF2000
trusted library allocation
page read and write
19FE86C1000
trusted library allocation
page read and write
19FEBCDE000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FDF742000
heap
page read and write
19FF0CAF000
trusted library allocation
page read and write
19FF0746000
trusted library allocation
page read and write
19FDF782000
heap
page read and write
19FE9093000
trusted library allocation
page read and write
19FF1E67000
trusted library allocation
page read and write
19FEA720000
trusted library allocation
page read and write
19FF0BA5000
trusted library allocation
page read and write
2753E350000
unclassified section
page readonly
19FEBC37000
trusted library allocation
page read and write
19FE7EFE000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE908B000
trusted library allocation
page read and write
19FEA6DE000
trusted library allocation
page read and write
19FF0C9D000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FE8BDB000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE9845000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE9068000
trusted library allocation
page read and write
A6B09FE000
stack
page read and write
19FF0943000
trusted library allocation
page read and write
19FE86D8000
trusted library allocation
page read and write
19FEA37A000
trusted library allocation
page read and write
19FF2C51000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF50F4000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEA69E000
trusted library allocation
page read and write
19FF0C95000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FDF736000
heap
page read and write
19FF1C37000
trusted library allocation
page read and write
19FF1DEF000
trusted library allocation
page read and write
19FF085E000
trusted library allocation
page read and write
19FEA26E000
trusted library allocation
page read and write
19FF5796000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FEA6C9000
trusted library allocation
page read and write
19FE9ABE000
trusted library allocation
page read and write
19FEA37D000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF4AA2000
trusted library allocation
page read and write
510000
unkown
page write copy
19FEA398000
trusted library allocation
page read and write
19FDF749000
heap
page read and write
19FEA3F3000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
2753F369000
heap
page read and write
19FF4AC1000
trusted library allocation
page read and write
19FEA474000
trusted library allocation
page read and write
19FE9818000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF75A000
heap
page read and write
19FEA274000
trusted library allocation
page read and write
19FF0CBC000
trusted library allocation
page read and write
19FDF7B5000
heap
page read and write
19FDF734000
heap
page read and write
2753E500000
trusted library allocation
page read and write
19FF0994000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF4F52000
trusted library allocation
page read and write
19FF50A0000
trusted library allocation
page read and write
19FF2159000
trusted library allocation
page read and write
19FF50FC000
trusted library allocation
page read and write
19FEBFCA000
trusted library allocation
page read and write
163E000
stack
page read and write
19FEA291000
trusted library allocation
page read and write
19FE9020000
trusted library allocation
page read and write
19FE590E000
trusted library allocation
page read and write
19FF09E7000
trusted library allocation
page read and write
19FE90A5000
trusted library allocation
page read and write
19FE59DD000
trusted library allocation
page read and write
19FE92A4000
trusted library allocation
page read and write
1B789000000
trusted library allocation
page read and write
19FE9024000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE9231000
trusted library allocation
page read and write
19FDF718000
heap
page read and write
19FEA4CF000
trusted library allocation
page read and write
19FE92E4000
trusted library allocation
page read and write
1DB6D90C000
trusted library allocation
page read and write
19FE7E6B000
trusted library allocation
page read and write
19FE47F9000
trusted library allocation
page read and write
19FE90C8000
trusted library allocation
page read and write
19FEC1F8000
trusted library allocation
page read and write
2753F458000
heap
page read and write
19FDF760000
heap
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FEA47F000
trusted library allocation
page read and write
19FEB09B000
trusted library allocation
page read and write
19FEA7F9000
trusted library allocation
page read and write
19FEA76A000
trusted library allocation
page read and write
19FEA491000
trusted library allocation
page read and write
19FE9D5E000
trusted library allocation
page read and write
19FEBB51000
trusted library allocation
page read and write
19FF0BB5000
trusted library allocation
page read and write
19FEA3FC000
trusted library allocation
page read and write
19FF4AAD000
trusted library allocation
page read and write
19FF0C89000
trusted library allocation
page read and write
19FE8491000
trusted library allocation
page read and write
19FF4F26000
trusted library allocation
page read and write
19FE89FB000
trusted library allocation
page read and write
19FF0C2F000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
1DB6D76E000
trusted library allocation
page read and write
19FEA563000
trusted library allocation
page read and write
19FEA7E6000
trusted library allocation
page read and write
19FF05EA000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF760000
heap
page read and write
19FE7E5A000
trusted library allocation
page read and write
19FE7E31000
trusted library allocation
page read and write
4DC000
unkown
page readonly
19FE4AAE000
trusted library allocation
page read and write
2753F477000
heap
page read and write
19FDF79A000
heap
page read and write
19FF0C76000
trusted library allocation
page read and write
19FE90FA000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
1DB6D3B0000
unclassified section
page readonly
19FE807E000
heap
page read and write
19FEA654000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEBFCA000
trusted library allocation
page read and write
19FE9CDC000
trusted library allocation
page read and write
19FE596B000
trusted library allocation
page read and write
19FE4623000
trusted library allocation
page read and write
19FE847B000
trusted library allocation
page read and write
19FEA6E0000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FE6CF9000
trusted library allocation
page read and write
19FF06F7000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
2753F444000
heap
page read and write
19FE905E000
trusted library allocation
page read and write
19FF0587000
trusted library allocation
page read and write
19FE8084000
heap
page read and write
19FE80D5000
heap
page read and write
19FE847F000
trusted library allocation
page read and write
19FE8065000
heap
page read and write
19FEA20E000
trusted library allocation
page read and write
19FEA4E9000
trusted library allocation
page read and write
19FF096F000
trusted library allocation
page read and write
19FEA2E5000
trusted library allocation
page read and write
19FEA4CB000
trusted library allocation
page read and write
19FF1DC1000
trusted library allocation
page read and write
19FE4ACD000
trusted library allocation
page read and write
19FDF714000
heap
page read and write
19FDF761000
heap
page read and write
19FDF734000
heap
page read and write
1B789107000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE8647000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE9E24000
trusted library allocation
page read and write
19FF06E9000
trusted library allocation
page read and write
19FEA7CC000
trusted library allocation
page read and write
19FEBC26000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
19FE9D5B000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE983B000
trusted library allocation
page read and write
19FF57E1000
trusted library allocation
page read and write
19FEA28F000
trusted library allocation
page read and write
19FE9E19000
trusted library allocation
page read and write
19FE8577000
trusted library allocation
page read and write
19FE86D8000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE9E22000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
2753E2E0000
unclassified section
page readonly
221FF000000
trusted library allocation
page read and write
19FEA285000
trusted library allocation
page read and write
19FF4B3F000
heap
page read and write
19FE9CCE000
trusted library allocation
page read and write
19FE902C000
trusted library allocation
page read and write
2753F468000
heap
page read and write
19FDF789000
heap
page read and write
19FEA312000
trusted library allocation
page read and write
19FEA25A000
trusted library allocation
page read and write
19FF2201000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE996D000
trusted library allocation
page read and write
19FE9EDB000
trusted library allocation
page read and write
19FEB0CD000
trusted library allocation
page read and write
19FEB1C1000
trusted library allocation
page read and write
19FEACF4000
trusted library allocation
page read and write
2753F421000
heap
page read and write
19FF0BEA000
trusted library allocation
page read and write
19FDF749000
heap
page read and write
19FE857F000
trusted library allocation
page read and write
19FEA239000
trusted library allocation
page read and write
19FE9BCC000
trusted library allocation
page read and write
19FE927E000
trusted library allocation
page read and write
2753F43B000
heap
page read and write
19FF0911000
trusted library allocation
page read and write
19FF092E000
trusted library allocation
page read and write
19FE86B9000
trusted library allocation
page read and write
19FEA2E4000
trusted library allocation
page read and write
19FE80A1000
heap
page read and write
19FDF73C000
heap
page read and write
19FE809F000
heap
page read and write
19FF0746000
trusted library allocation
page read and write
19FE9C6B000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF79B000
heap
page read and write
19FE5648000
trusted library allocation
page read and write
2753EE90000
heap
page read and write
19FDF744000
heap
page read and write
1B78910A000
trusted library allocation
page read and write
19FE7EF4000
trusted library allocation
page read and write
19FE863B000
trusted library allocation
page read and write
2753F369000
heap
page read and write
19FE9B1C000
trusted library allocation
page read and write
2753E75C000
trusted library allocation
page read and write
19FF50CE000
trusted library allocation
page read and write
19FE900E000
trusted library allocation
page read and write
19FE89E8000
trusted library allocation
page read and write
19FF0A94000
trusted library allocation
page read and write
19FDF765000
heap
page read and write
19FEBFE6000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF7B5000
heap
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FF072C000
trusted library allocation
page read and write
19FEA379000
trusted library allocation
page read and write
221FEEF7000
heap
page read and write
1909000
heap
page read and write
19FE9084000
trusted library allocation
page read and write
221FEE90000
heap
page read and write
1DB6D480000
unclassified section
page read and write
19FEB1EC000
trusted library allocation
page read and write
19FE89D4000
trusted library allocation
page read and write
19FF0948000
trusted library allocation
page read and write
19FF0C5C000
trusted library allocation
page read and write
2753F200000
trusted library allocation
page read and write
19FF4F3F000
trusted library allocation
page read and write
19FEA3B7000
trusted library allocation
page read and write
19FF50A7000
trusted library allocation
page read and write
19FE9E6D000
trusted library allocation
page read and write
19FEA2D4000
trusted library allocation
page read and write
221FEEF7000
heap
page read and write
19FF0CF0000
trusted library allocation
page read and write
19FDF782000
heap
page read and write
19FEA757000
trusted library allocation
page read and write
19FDF72D000
heap
page read and write
19FEA656000
trusted library allocation
page read and write
19FE9EA7000
trusted library allocation
page read and write
19FF61CA000
trusted library allocation
page read and write
1DB6D72E000
trusted library allocation
page read and write
19FEC1A6000
trusted library allocation
page read and write
19FF0C25000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE58B3000
trusted library allocation
page read and write
19FEC496000
trusted library allocation
page read and write
19FF0C68000
trusted library allocation
page read and write
19FE9A79000
trusted library allocation
page read and write
19FF6204000
trusted library allocation
page read and write
22C750B0000
heap
page read and write
22C754F6000
heap
page read and write
19FEA3EE000
trusted library allocation
page read and write
19FDF725000
heap
page read and write
19FE8081000
heap
page read and write
1DB6D7E7000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FE863D000
trusted library allocation
page read and write
440000
unkown
page readonly
2753F400000
heap
page read and write
162275E1E000
trusted library allocation
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FE5655000
trusted library allocation
page read and write
19FF4F3E000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEA28F000
trusted library allocation
page read and write
1920000
heap
page read and write
19FF50E3000
trusted library allocation
page read and write
19FE5974000
trusted library allocation
page read and write
22C7580C000
trusted library allocation
page read and write
19FF0C66000
trusted library allocation
page read and write
19FE90B6000
trusted library allocation
page read and write
19FEA2CE000
trusted library allocation
page read and write
19FF05F4000
trusted library allocation
page read and write
19FEC4AD000
trusted library allocation
page read and write
19FF5335000
trusted library allocation
page read and write
19FEA314000
trusted library allocation
page read and write
19FEA4AB000
trusted library allocation
page read and write
19FE9052000
trusted library allocation
page read and write
19FEB0BE000
trusted library allocation
page read and write
2753F468000
heap
page read and write
19FEA34A000
trusted library allocation
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FF099C000
trusted library allocation
page read and write
84D083D000
stack
page read and write
19FDF736000
heap
page read and write
2753E70C000
trusted library allocation
page read and write
19FE9EB1000
trusted library allocation
page read and write
19FEA3A1000
trusted library allocation
page read and write
19FF50B6000
trusted library allocation
page read and write
19FF0C62000
trusted library allocation
page read and write
19FE99AF000
trusted library allocation
page read and write
19FF1DB6000
trusted library allocation
page read and write
19FEA314000
trusted library allocation
page read and write
2753F3E8000
heap
page read and write
19FEA7E6000
trusted library allocation
page read and write
19FDF750000
heap
page read and write
19FDF79C000
heap
page read and write
2753F458000
heap
page read and write
19FDF717000
heap
page read and write
19FDF79C000
heap
page read and write
19FDF75B000
heap
page read and write
19FF21FC000
trusted library allocation
page read and write
19FEA3DA000
trusted library allocation
page read and write
19FE89B6000
trusted library allocation
page read and write
19FEA37A000
trusted library allocation
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FEA350000
trusted library allocation
page read and write
19FF09E5000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF4B01000
heap
page read and write
221FF155000
heap
page read and write
19FE6C62000
trusted library allocation
page read and write
19FDF738000
heap
page read and write
19FE891C000
trusted library allocation
page read and write
19FE85CE000
trusted library allocation
page read and write
19FF1C50000
trusted library allocation
page read and write
19FE86F5000
trusted library allocation
page read and write
19FE9BBA000
trusted library allocation
page read and write
19FEA28B000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF07BC000
trusted library allocation
page read and write
19FEA6CE000
trusted library allocation
page read and write
19FE6043000
trusted library allocation
page read and write
19FF067B000
trusted library allocation
page read and write
221FEE70000
heap
page read and write
19FF05DA000
trusted library allocation
page read and write
19FEA365000
trusted library allocation
page read and write
19FF4AAD000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FE9A4C000
trusted library allocation
page read and write
19FF3400000
trusted library allocation
page read and write
1916000
heap
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FE86E5000
trusted library allocation
page read and write
19FEAACA000
trusted library allocation
page read and write
19FE80AA000
heap
page read and write
19FF1EF1000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
2753F444000
heap
page read and write
19FE847F000
trusted library allocation
page read and write
19FEA3F4000
trusted library allocation
page read and write
19FE92E4000
trusted library allocation
page read and write
19FE92FE000
trusted library allocation
page read and write
19FDF752000
heap
page read and write
19FF46DD000
trusted library allocation
page read and write
19FE906E000
trusted library allocation
page read and write
19FE857C000
trusted library allocation
page read and write
19FE866F000
trusted library allocation
page read and write
19FE59EB000
trusted library allocation
page read and write
19FF07F0000
trusted library allocation
page read and write
19FE86BB000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FEBCB2000
trusted library allocation
page read and write
19FF0C57000
trusted library allocation
page read and write
19FDF74F000
heap
page read and write
19FE89D3000
trusted library allocation
page read and write
19FE868F000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FDF75D000
heap
page read and write
2753F458000
heap
page read and write
19FE4713000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FF0C0F000
trusted library allocation
page read and write
19FE996F000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE86B7000
trusted library allocation
page read and write
1DB6D91A000
trusted library allocation
page read and write
19FEA5A9000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FF0789000
trusted library allocation
page read and write
19FDF725000
heap
page read and write
19FE4782000
trusted library allocation
page read and write
19FEAB9C000
trusted library allocation
page read and write
19FE8637000
trusted library allocation
page read and write
19FE9996000
trusted library allocation
page read and write
19FEA2F7000
trusted library allocation
page read and write
19FDF72D000
heap
page read and write
19FDF734000
heap
page read and write
19FDF72E000
heap
page read and write
19FEA5D2000
trusted library allocation
page read and write
19FEA3A6000
trusted library allocation
page read and write
19FE86A8000
trusted library allocation
page read and write
19FEA3CC000
trusted library allocation
page read and write
22C75000000
unclassified section
page readonly
19FEACFA000
trusted library allocation
page read and write
3CD0000
trusted library allocation
page read and write
19FEA3BA000
trusted library allocation
page read and write
19FEA3B9000
trusted library allocation
page read and write
19FF2DA5000
trusted library allocation
page read and write
19FF0839000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEB0BB000
trusted library allocation
page read and write
2753F38A000
heap
page read and write
22C755AD000
trusted library allocation
page read and write
22C75232000
unclassified section
page read and write
19FEB191000
trusted library allocation
page read and write
19FEA333000
trusted library allocation
page read and write
50C000
unkown
page write copy
19FDF751000
heap
page read and write
19FE928F000
trusted library allocation
page read and write
19FE47D0000
trusted library allocation
page read and write
19FE804F000
heap
page read and write
19FF4F29000
trusted library allocation
page read and write
19FEA21C000
trusted library allocation
page read and write
19FE90AE000
trusted library allocation
page read and write
19FE98EE000
trusted library allocation
page read and write
19FF4B4D000
heap
page read and write
86D67E000
stack
page read and write
19FEB153000
trusted library allocation
page read and write
84CFFFE000
stack
page read and write
19FE869C000
trusted library allocation
page read and write
19FF0662000
trusted library allocation
page read and write
19FEB0D1000
trusted library allocation
page read and write
19FF0CEA000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FF5C27000
trusted library allocation
page read and write
19FE90FC000
trusted library allocation
page read and write
19FE4AE7000
trusted library allocation
page read and write
19FEBCFB000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FF2166000
trusted library allocation
page read and write
19FE8481000
trusted library allocation
page read and write
19FE89F5000
trusted library allocation
page read and write
19FF09A5000
trusted library allocation
page read and write
19FEA763000
trusted library allocation
page read and write
19FE99F6000
trusted library allocation
page read and write
19FEA635000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF5095000
trusted library allocation
page read and write
19FEBF90000
trusted library allocation
page read and write
19FEA463000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
2753F3F1000
heap
page read and write
19FE897C000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
1DB6D4DA000
heap
page read and write
19FDF72E000
heap
page read and write
19FDF736000
heap
page read and write
19FEB041000
trusted library allocation
page read and write
19FF0CF2000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FE8684000
trusted library allocation
page read and write
19FF0CAF000
trusted library allocation
page read and write
19FE86C1000
trusted library allocation
page read and write
19FF0BF7000
trusted library allocation
page read and write
19FDF74F000
heap
page read and write
19FE9EA7000
trusted library allocation
page read and write
19FDF7AA000
heap
page read and write
2753E610000
heap
page readonly
19FEA2E6000
trusted library allocation
page read and write
19FF0672000
trusted library allocation
page read and write
2753F3E0000
heap
page read and write
19FEA4AB000
trusted library allocation
page read and write
19FF0CA7000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF72D000
heap
page read and write
19FF0863000
trusted library allocation
page read and write
19FE4676000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FEA2CC000
trusted library allocation
page read and write
19FE9E07000
trusted library allocation
page read and write
19FF09E3000
trusted library allocation
page read and write
19FF5323000
trusted library allocation
page read and write
19FEA212000
trusted library allocation
page read and write
19FE9CE2000
trusted library allocation
page read and write
19FDF782000
heap
page read and write
19FE6CF7000
trusted library allocation
page read and write
19FE899F000
trusted library allocation
page read and write
2753E712000
trusted library allocation
page read and write
19FF1EF9000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
1B788E40000
heap
page read and write
19FF2DFC000
trusted library allocation
page read and write
19FE9D5B000
trusted library allocation
page read and write
19FF0CF4000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FEA2DE000
trusted library allocation
page read and write
19FDF751000
heap
page read and write
2753E7C4000
trusted library allocation
page read and write
2753E7BE000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF0C33000
trusted library allocation
page read and write
1DB6D794000
trusted library allocation
page read and write
19FF0AD4000
trusted library allocation
page read and write
19FE5994000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FEBC5D000
trusted library allocation
page read and write
19FE99BF000
trusted library allocation
page read and write
19FF4A90000
trusted library allocation
page read and write
19FF20BA000
trusted library allocation
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FF05F8000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FDF742000
heap
page read and write
19FE91E5000
trusted library allocation
page read and write
19FDF7AA000
heap
page read and write
19FF0C6E000
trusted library allocation
page read and write
19FEC458000
trusted library allocation
page read and write
19FF09EC000
trusted library allocation
page read and write
19FF0989000
trusted library allocation
page read and write
19FE80C0000
heap
page read and write
19FF0989000
trusted library allocation
page read and write
19FEB092000
trusted library allocation
page read and write
19FF07C4000
trusted library allocation
page read and write
19FDF74A000
heap
page read and write
19FE9CEA000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF1DE8000
trusted library allocation
page read and write
19FE80A1000
heap
page read and write
2753E6D6000
heap
page read and write
19FE5994000
trusted library allocation
page read and write
19FF4B4E000
heap
page read and write
19FF09AD000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FDF75D000
heap
page read and write
19FE9D6B000
trusted library allocation
page read and write
19FE6CF7000
trusted library allocation
page read and write
19FDF74E000
heap
page read and write
19FEA4A6000
trusted library allocation
page read and write
19FF1DFE000
trusted library allocation
page read and write
19FF09D9000
trusted library allocation
page read and write
1DB6D7A9000
trusted library allocation
page read and write
19FF0730000
trusted library allocation
page read and write
19FE9996000
trusted library allocation
page read and write
19FEB02B000
trusted library allocation
page read and write
2753F43B000
heap
page read and write
19FEC1A6000
trusted library allocation
page read and write
19FE6CE2000
trusted library allocation
page read and write
86C5FE000
unkown
page readonly
2753E79F000
trusted library allocation
page read and write
2753F39C000
heap
page read and write
41C1000
heap
page read and write
19FE9E6D000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FE9CD3000
trusted library allocation
page read and write
19FF0890000
trusted library allocation
page read and write
19FE89C0000
trusted library allocation
page read and write
19FF5C6A000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FDF748000
heap
page read and write
19FF0AD4000
trusted library allocation
page read and write
19FF1E65000
trusted library allocation
page read and write
19FE9CAB000
trusted library allocation
page read and write
19FE8481000
trusted library allocation
page read and write
19FEBF80000
trusted library allocation
page read and write
19FE80B3000
heap
page read and write
19FEBCB2000
trusted library allocation
page read and write
19FF0CBC000
trusted library allocation
page read and write
19FEABC7000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FEBFF8000
trusted library allocation
page read and write
19FF4F44000
trusted library allocation
page read and write
19FF067B000
trusted library allocation
page read and write
19FF0AD6000
trusted library allocation
page read and write
86ADD8000
stack
page read and write
19FF1D93000
trusted library allocation
page read and write
19FEA3C8000
trusted library allocation
page read and write
19FE9E23000
trusted library allocation
page read and write
441000
unkown
page execute read
19FF07B2000
trusted library allocation
page read and write
19FEA70E000
trusted library allocation
page read and write
19FEA583000
trusted library allocation
page read and write
19FEB164000
trusted library allocation
page read and write
19FEBF9F000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FDF760000
heap
page read and write
19FE40EF000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE56D2000
trusted library allocation
page read and write
19FF0659000
trusted library allocation
page read and write
19FEA39B000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE9C9D000
trusted library allocation
page read and write
19FE6C74000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE86BB000
trusted library allocation
page read and write
19FE5996000
trusted library allocation
page read and write
19FDF765000
heap
page read and write
1824000
heap
page read and write
19FE597D000
trusted library allocation
page read and write
19FEAD00000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF4B89000
heap
page read and write
19FF5315000
trusted library allocation
page read and write
19FEA281000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FF078C000
trusted library allocation
page read and write
2753E700000
trusted library allocation
page read and write
19FE856D000
trusted library allocation
page read and write
19FEA474000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
2753ED71000
heap
page read and write
19FF0BF3000
trusted library allocation
page read and write
19FE86E5000
trusted library allocation
page read and write
19FE86CC000
trusted library allocation
page read and write
19FDF78C000
heap
page read and write
19FE90D8000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE80B3000
heap
page read and write
19FE998F000
trusted library allocation
page read and write
19FE9CDC000
trusted library allocation
page read and write
19FEBC6D000
trusted library allocation
page read and write
19FF0AD4000
trusted library allocation
page read and write
19FF072F000
trusted library allocation
page read and write
19FE40EF000
trusted library allocation
page read and write
19FE90B7000
trusted library allocation
page read and write
19FDF732000
heap
page read and write
19FDF736000
heap
page read and write
1824000
heap
page read and write
19FDF72D000
heap
page read and write
19FF0AD2000
trusted library allocation
page read and write
19FEA4A4000
trusted library allocation
page read and write
19FEBF7E000
trusted library allocation
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FF533D000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FEA3C2000
trusted library allocation
page read and write
19FF09E3000
trusted library allocation
page read and write
19FEBCC5000
trusted library allocation
page read and write
19FE8410000
trusted library allocation
page read and write
19FE86D8000
trusted library allocation
page read and write
2753F3E3000
heap
page read and write
1B7CFD3C000
trusted library allocation
page execute read
19FDF75B000
heap
page read and write
19FDF75B000
heap
page read and write
19FF1E82000
trusted library allocation
page read and write
19FE9EF8000
trusted library allocation
page read and write
19FE9A63000
trusted library allocation
page read and write
22C75564000
trusted library allocation
page read and write
1B788E10000
heap
page read and write
19FF0C47000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF760000
heap
page read and write
22C75577000
trusted library allocation
page read and write
19FDF768000
heap
page read and write
19FDF757000
heap
page read and write
19FE8555000
trusted library allocation
page read and write
19FE59C7000
trusted library allocation
page read and write
19FEB094000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF0C95000
trusted library allocation
page read and write
19FF1E20000
trusted library allocation
page read and write
19FE58DA000
trusted library allocation
page read and write
2753E717000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
2753F3EA000
heap
page read and write
19FF2DF5000
trusted library allocation
page read and write
19FE8570000
trusted library allocation
page read and write
19FEBBD0000
trusted library allocation
page read and write
19FF50D1000
trusted library allocation
page read and write
19FEBF65000
trusted library allocation
page read and write
162F000
stack
page read and write
19FF05EA000
trusted library allocation
page read and write
19FF1DB4000
trusted library allocation
page read and write
19FF0CBC000
trusted library allocation
page read and write
19FEA27D000
trusted library allocation
page read and write
19FEA2FC000
trusted library allocation
page read and write
19FDF725000
heap
page read and write
19FDF7C4000
heap
page read and write
19FE85A5000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FDF789000
heap
page read and write
19FEA3D4000
trusted library allocation
page read and write
19FE7EF4000
trusted library allocation
page read and write
19FF1C86000
trusted library allocation
page read and write
19FEBC1C000
trusted library allocation
page read and write
19FF09AD000
trusted library allocation
page read and write
19FEBF35000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FE843A000
trusted library allocation
page read and write
19FE859E000
trusted library allocation
page read and write
19FF0C31000
trusted library allocation
page read and write
19FF20D6000
trusted library allocation
page read and write
19FEA413000
trusted library allocation
page read and write
19FF0CEA000
trusted library allocation
page read and write
19FE927D000
trusted library allocation
page read and write
19FE9E0C000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FF05F8000
trusted library allocation
page read and write
86A25C000
stack
page read and write
19FDF765000
heap
page read and write
19FE80A2000
heap
page read and write
19FEA3A7000
trusted library allocation
page read and write
19FF0C64000
trusted library allocation
page read and write
19FE7E1F000
trusted library allocation
page read and write
19FF0EAE000
trusted library allocation
page read and write
19FF078A000
trusted library allocation
page read and write
19FF1EF6000
trusted library allocation
page read and write
19FEA5E8000
trusted library allocation
page read and write
19FF09E1000
trusted library allocation
page read and write
19FEA37D000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE9DC2000
trusted library allocation
page read and write
19FEA3F8000
trusted library allocation
page read and write
19FE984B000
trusted library allocation
page read and write
19FE9C51000
trusted library allocation
page read and write
19FEA5CE000
trusted library allocation
page read and write
19FEA9E1000
trusted library allocation
page read and write
19FF07D4000
trusted library allocation
page read and write
19FE9CDC000
trusted library allocation
page read and write
20DE000
stack
page read and write
19FDF757000
heap
page read and write
19FEA4DD000
trusted library allocation
page read and write
19FF07C4000
trusted library allocation
page read and write
19FE8562000
trusted library allocation
page read and write
19FEB1F0000
trusted library allocation
page read and write
19FE40DF000
trusted library allocation
page read and write
19FEA399000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FE863B000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
19FF07E6000
trusted library allocation
page read and write
19FE5665000
trusted library allocation
page read and write
19FE9C8D000
trusted library allocation
page read and write
41C1000
heap
page read and write
19FDF79C000
heap
page read and write
86D6BE000
unkown
page readonly
19FE9027000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
2753E779000
trusted library allocation
page read and write
19FF6159000
trusted library allocation
page read and write
19FF09A8000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FE564A000
trusted library allocation
page read and write
19FF0ADC000
trusted library allocation
page read and write
19FE981C000
trusted library allocation
page read and write
19FE855A000
trusted library allocation
page read and write
19FE9DDA000
trusted library allocation
page read and write
19FE9CB1000
trusted library allocation
page read and write
1824000
heap
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FE8497000
trusted library allocation
page read and write
19FF07C4000
trusted library allocation
page read and write
19FEBC6A000
trusted library allocation
page read and write
19FEA4D0000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FDF737000
heap
page read and write
19FEA4AD000
trusted library allocation
page read and write
22C755B1000
trusted library allocation
page read and write
19FEA3B0000
trusted library allocation
page read and write
19FE4081000
trusted library allocation
page read and write
22C7523F000
unclassified section
page read and write
19FE80B3000
heap
page read and write
19FF07BC000
trusted library allocation
page read and write
19FE8084000
heap
page read and write
19FE90A3000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FEA4BF000
trusted library allocation
page read and write
19FEA3D2000
trusted library allocation
page read and write
19FF0746000
trusted library allocation
page read and write
2753F468000
heap
page read and write
2753F360000
heap
page read and write
2753E630000
unclassified section
page read and write
19FDF749000
heap
page read and write
1DB6D700000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FDF7AF000
heap
page read and write
19FEA6CB000
trusted library allocation
page read and write
19FF4000000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FE92A3000
trusted library allocation
page read and write
19FE9824000
trusted library allocation
page read and write
1908000
heap
page read and write
19FF0AD6000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF0C48000
trusted library allocation
page read and write
19FE86EB000
trusted library allocation
page read and write
19FEA4D1000
trusted library allocation
page read and write
19FE905E000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FEA4E2000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FE9239000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FEA254000
trusted library allocation
page read and write
19FF2DEF000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FF07BA000
trusted library allocation
page read and write
19FF078A000
trusted library allocation
page read and write
19FE84F6000
trusted library allocation
page read and write
19FE983E000
trusted library allocation
page read and write
2753F369000
heap
page read and write
19FE59F1000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FEBFF8000
trusted library allocation
page read and write
19FF0C85000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FE99B5000
trusted library allocation
page read and write
19FEA4B3000
trusted library allocation
page read and write
19FE89E8000
trusted library allocation
page read and write
2753E7F3000
trusted library allocation
page read and write
19FF0BE7000
trusted library allocation
page read and write
1920000
heap
page read and write
19FF0ED2000
trusted library allocation
page read and write
19FE9289000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FDF736000
heap
page read and write
19FEA7DA000
trusted library allocation
page read and write
19FDF799000
heap
page read and write
19FF50D4000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FE5693000
trusted library allocation
page read and write
19FF50EA000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE9B31000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FDF755000
heap
page read and write
19FF1E20000
trusted library allocation
page read and write
19FE9D7B000
trusted library allocation
page read and write
19FEC1A6000
trusted library allocation
page read and write
19FE4766000
trusted library allocation
page read and write
19FE89D7000
trusted library allocation
page read and write
19FF0ED5000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE56FD000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEA72F000
trusted library allocation
page read and write
19FE9BE8000
trusted library allocation
page read and write
19FE9004000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
2753F3E0000
heap
page read and write
A6AF9FE000
stack
page read and write
19FEBCE7000
trusted library allocation
page read and write
19FF05F4000
trusted library allocation
page read and write
19FEA288000
trusted library allocation
page read and write
19FF0CEA000
trusted library allocation
page read and write
19FE9BBD000
trusted library allocation
page read and write
19FDF79B000
heap
page read and write
19FE9B9D000
trusted library allocation
page read and write
19FEA3C4000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FEA637000
trusted library allocation
page read and write
19FE999C000
trusted library allocation
page read and write
19FE90C2000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FE92BA000
trusted library allocation
page read and write
19FEC12F000
trusted library allocation
page read and write
86BDFE000
stack
page read and write
19FEBF80000
trusted library allocation
page read and write
19FEBCE4000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FDF760000
heap
page read and write
19FF07BA000
trusted library allocation
page read and write
19FF0A97000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FF09F2000
trusted library allocation
page read and write
19FE9250000
trusted library allocation
page read and write
1DB6D763000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF1DFE000
trusted library allocation
page read and write
1824000
heap
page read and write
19FF4B45000
heap
page read and write
19FE9C8A000
trusted library allocation
page read and write
19FF0BF2000
trusted library allocation
page read and write
19FF0963000
trusted library allocation
page read and write
19FF2185000
trusted library allocation
page read and write
84CEFD8000
stack
page read and write
22C75530000
trusted library allocation
page read and write
19FEA5BA000
trusted library allocation
page read and write
19FE99FC000
trusted library allocation
page read and write
19FE99B5000
trusted library allocation
page read and write
19FE9EFC000
trusted library allocation
page read and write
19FF0A77000
trusted library allocation
page read and write
3D80000
heap
page read and write
19FDF736000
heap
page read and write
221FF6AD000
heap
page read and write
19FF0ED5000
trusted library allocation
page read and write
19FE593B000
trusted library allocation
page read and write
1B788E00000
heap
page read and write
19FF087E000
trusted library allocation
page read and write
19FEC202000
trusted library allocation
page read and write
19FE9BB3000
trusted library allocation
page read and write
2753E3D0000
heap
page read and write
19FEA34A000
trusted library allocation
page read and write
19FF078A000
trusted library allocation
page read and write
19FE8B34000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FEBF1A000
trusted library allocation
page read and write
19FE846D000
trusted library allocation
page read and write
19FE91F4000
trusted library allocation
page read and write
19FDF799000
heap
page read and write
19FF0CAF000
trusted library allocation
page read and write
19FE8095000
heap
page read and write
19FF0972000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FEA3C8000
trusted library allocation
page read and write
19FEA267000
trusted library allocation
page read and write
19FE7E63000
trusted library allocation
page read and write
2753E6E0000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FEA2B8000
trusted library allocation
page read and write
7C9E1C03000
trusted library allocation
page read and write
19FF50DA000
trusted library allocation
page read and write
19FEA716000
trusted library allocation
page read and write
19FEA4AB000
trusted library allocation
page read and write
19FE9C44000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FF071F000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FDF746000
heap
page read and write
190F000
heap
page read and write
19FF07E2000
trusted library allocation
page read and write
19FEBCBE000
trusted library allocation
page read and write
19FE9849000
trusted library allocation
page read and write
19FE9B3C000
trusted library allocation
page read and write
19FF0AA3000
trusted library allocation
page read and write
86A29E000
unkown
page readonly
19FDF72D000
heap
page read and write
19FDF73C000
heap
page read and write
19FF0632000
trusted library allocation
page read and write
19FF0BFE000
trusted library allocation
page read and write
19FE6CCC000
trusted library allocation
page read and write
19FEA212000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE9964000
trusted library allocation
page read and write
19FDF751000
heap
page read and write
19FF21CA000
trusted library allocation
page read and write
19FDF759000
heap
page read and write
19FE86E6000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FDF737000
heap
page read and write
19FF21B1000
trusted library allocation
page read and write
19FE8463000
trusted library allocation
page read and write
19FF615C000
trusted library allocation
page read and write
19FF07DB000
trusted library allocation
page read and write
19FE86D4000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
2753F477000
heap
page read and write
19FDF79C000
heap
page read and write
19FE86E5000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
19FEBF92000
trusted library allocation
page read and write
19FF07D7000
trusted library allocation
page read and write
19FE89DC000
trusted library allocation
page read and write
19FE9280000
trusted library allocation
page read and write
19FDF75C000
heap
page read and write
19FDF742000
heap
page read and write
19FF12CA000
trusted library allocation
page read and write
19FEA47F000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
84CE5AE000
stack
page read and write
19FE85A5000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE8487000
trusted library allocation
page read and write
19FE848D000
trusted library allocation
page read and write
2753F3F1000
heap
page read and write
162275E24000
trusted library allocation
page read and write
19FEABA3000
trusted library allocation
page read and write
19FF0C48000
trusted library allocation
page read and write
19FEA499000
trusted library allocation
page read and write
19FE9CFE000
trusted library allocation
page read and write
19FEB0B6000
trusted library allocation
page read and write
19FF09A5000
trusted library allocation
page read and write
19FF05B5000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FEA4FA000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF2500000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
22C75503000
trusted library allocation
page read and write
19FEA630000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FE59F6000
trusted library allocation
page read and write
19FF4AF0000
trusted library allocation
page read and write
123A000
stack
page read and write
19FE9286000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF4F2D000
trusted library allocation
page read and write
19FEBB63000
trusted library allocation
page read and write
19FEBF4C000
trusted library allocation
page read and write
19FDF789000
heap
page read and write
19FE9CDC000
trusted library allocation
page read and write
19FEA4A2000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
1824000
heap
page read and write
1DB6D900000
trusted library allocation
page read and write
19FE98F0000
trusted library allocation
page read and write
19FF09F4000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
2753E6D0000
heap
page read and write
19FE9027000
trusted library allocation
page read and write
19FEA244000
trusted library allocation
page read and write
19FEBF8E000
trusted library allocation
page read and write
2753F477000
heap
page read and write
19FEA241000
trusted library allocation
page read and write
1DB6D600000
trusted library allocation
page read and write
19FE9CD3000
trusted library allocation
page read and write
19FDF75A000
heap
page read and write
19FE9BB6000
trusted library allocation
page read and write
19FE9ADD000
trusted library allocation
page read and write
19FE90FC000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF0C81000
trusted library allocation
page read and write
19FEA2F3000
trusted library allocation
page read and write
19FEA2A0000
trusted library allocation
page read and write
19FEA3C4000
trusted library allocation
page read and write
19FF46C6000
trusted library allocation
page read and write
19FDF771000
heap
page read and write
19FDF74B000
heap
page read and write
19FDF765000
heap
page read and write
22C75300000
trusted library allocation
page read and write
19FF0C9D000
trusted library allocation
page read and write
19FEA3DA000
trusted library allocation
page read and write
19FF0C2F000
trusted library allocation
page read and write
22C75220000
heap
page readonly
19FE857C000
trusted library allocation
page read and write
19FEA60F000
trusted library allocation
page read and write
19FEBC2B000
trusted library allocation
page read and write
19FF1DA3000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF0972000
trusted library allocation
page read and write
19FE59DD000
trusted library allocation
page read and write
19FDF789000
heap
page read and write
19FEC4E1000
trusted library allocation
page read and write
1DB6D3AA000
remote allocation
page execute read
19FE9B20000
trusted library allocation
page read and write
19FE9A27000
trusted library allocation
page read and write
19FE9C67000
trusted library allocation
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FE5884000
trusted library allocation
page read and write
19FF09C4000
trusted library allocation
page read and write
190E000
heap
page read and write
19FEA4C3000
trusted library allocation
page read and write
19FE80B4000
heap
page read and write
19FDF75D000
heap
page read and write
19FE5655000
trusted library allocation
page read and write
19FEA291000
trusted library allocation
page read and write
19FF0639000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FE56C9000
trusted library allocation
page read and write
2753F3E6000
heap
page read and write
19FE4800000
trusted library allocation
page read and write
19FEA3C3000
trusted library allocation
page read and write
1DB6D410000
heap
page read and write
19FE9D87000
trusted library allocation
page read and write
19FEA3C2000
trusted library allocation
page read and write
19FF0CBF000
trusted library allocation
page read and write
19FE58BB000
trusted library allocation
page read and write
61CA5FC000
stack
page read and write
19FDF736000
heap
page read and write
19FF098D000
trusted library allocation
page read and write
19FEBFD6000
trusted library allocation
page read and write
19FE8095000
heap
page read and write
19FF07E6000
trusted library allocation
page read and write
2753F42D000
heap
page read and write
2753F36C000
heap
page read and write
2753F42A000
heap
page read and write
19FF0EF4000
trusted library allocation
page read and write
19FEA4AD000
trusted library allocation
page read and write
19FE9975000
trusted library allocation
page read and write
19FEACD2000
trusted library allocation
page read and write
19FE982A000
trusted library allocation
page read and write
19FF1E93000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FF4ADE000
trusted library allocation
page read and write
1824000
heap
page read and write
19FEA2D4000
trusted library allocation
page read and write
19FF2DEB000
trusted library allocation
page read and write
1920000
heap
page read and write
19FE859E000
trusted library allocation
page read and write
19FEA370000
trusted library allocation
page read and write
19FE86B9000
trusted library allocation
page read and write
19FE564A000
trusted library allocation
page read and write
19FEA3FC000
trusted library allocation
page read and write
22C75582000
trusted library allocation
page read and write
19FE80A2000
heap
page read and write
19FE86A4000
trusted library allocation
page read and write
19FE9027000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FF0EA4000
trusted library allocation
page read and write
19FDF745000
heap
page read and write
19FDF7A1000
heap
page read and write
19FEB0A8000
trusted library allocation
page read and write
19FE4726000
trusted library allocation
page read and write
19FF4AB0000
trusted library allocation
page read and write
19FEA339000
trusted library allocation
page read and write
19FE7E88000
trusted library allocation
page read and write
2753F422000
heap
page read and write
19FE90C2000
trusted library allocation
page read and write
19FE98C3000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FDF73E000
heap
page read and write
1DB6D91D000
trusted library allocation
page read and write
19FEA6DA000
trusted library allocation
page read and write
19FE597F000
trusted library allocation
page read and write
19FEA4AE000
trusted library allocation
page read and write
19FEBF92000
trusted library allocation
page read and write
19FDF73E000
heap
page read and write
19FDF72E000
heap
page read and write
19FF0983000
trusted library allocation
page read and write
19FF4F35000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FE9826000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF72D000
heap
page read and write
22C750F0000
heap
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FDF746000
heap
page read and write
19FEB0C0000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FF1EF9000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE98A5000
trusted library allocation
page read and write
19FE864A000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE56E0000
trusted library allocation
page read and write
19FEBF8E000
trusted library allocation
page read and write
1DB6D903000
trusted library allocation
page read and write
19FE8678000
trusted library allocation
page read and write
1DB6D760000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FDF725000
heap
page read and write
2753F309000
heap
page read and write
19FDF75C000
heap
page read and write
19FE92AA000
trusted library allocation
page read and write
19FDF75E000
heap
page read and write
19FEA7CC000
trusted library allocation
page read and write
19FDF762000
heap
page read and write
19FF0BD8000
trusted library allocation
page read and write
514000
unkown
page readonly
19FE98BE000
trusted library allocation
page read and write
19FE804F000
heap
page read and write
19FDF767000
heap
page read and write
19FE99E8000
trusted library allocation
page read and write
19FF0BE4000
trusted library allocation
page read and write
19FE9CDB000
trusted library allocation
page read and write
19FF1C4C000
trusted library allocation
page read and write
19FF0C79000
trusted library allocation
page read and write
19FEA351000
trusted library allocation
page read and write
19FE6CFA000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FF0C64000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
1DB6D772000
trusted library allocation
page read and write
19FF0983000
trusted library allocation
page read and write
19FE9A98000
trusted library allocation
page read and write
19FE85CE000
trusted library allocation
page read and write
19FE90FA000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FE56A5000
trusted library allocation
page read and write
19FF0895000
trusted library allocation
page read and write
19FF09A4000
trusted library allocation
page read and write
19FF4A90000
trusted library allocation
page read and write
19FF08EC000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
19FDF73F000
heap
page read and write
19FE603F000
trusted library allocation
page read and write
19FEA4F9000
trusted library allocation
page read and write
19FE86E5000
trusted library allocation
page read and write
19FF09C4000
trusted library allocation
page read and write
19FDF751000
heap
page read and write
19FDF73F000
heap
page read and write
2753E76F000
trusted library allocation
page read and write
19FF09A8000
trusted library allocation
page read and write
22C7556B000
trusted library allocation
page read and write
19FF0C75000
trusted library allocation
page read and write
19FE59F6000
trusted library allocation
page read and write
19FE8BAA000
trusted library allocation
page read and write
19FE9CD8000
trusted library allocation
page read and write
19FF50F6000
trusted library allocation
page read and write
19FF0C5C000
trusted library allocation
page read and write
19FF1DFE000
trusted library allocation
page read and write
19FE8582000
trusted library allocation
page read and write
19FE858D000
trusted library allocation
page read and write
19FEA2DE000
trusted library allocation
page read and write
19FE8CFD000
trusted library allocation
page read and write
19FEBCD5000
trusted library allocation
page read and write
19FDF74B000
heap
page read and write
19FF0C46000
trusted library allocation
page read and write
19FF0EC0000
trusted library allocation
page read and write
19FE902C000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE89FB000
trusted library allocation
page read and write
19FE471B000
trusted library allocation
page read and write
19FE8080000
heap
page read and write
19FF0616000
trusted library allocation
page read and write
19FEB08E000
trusted library allocation
page read and write
19FE84B6000
trusted library allocation
page read and write
19FE927D000
trusted library allocation
page read and write
19FF099A000
trusted library allocation
page read and write
19FE8674000
trusted library allocation
page read and write
19FE6CE9000
trusted library allocation
page read and write
19FF4F5B000
trusted library allocation
page read and write
19FEA4C6000
trusted library allocation
page read and write
2753E786000
trusted library allocation
page read and write
84D087E000
unkown
page readonly
19FEA208000
trusted library allocation
page read and write
19FDF7A6000
heap
page read and write
19FDF75B000
heap
page read and write
19FDF730000
heap
page read and write
2753ED60000
heap
page read and write
19FDF767000
heap
page read and write
19FDF745000
heap
page read and write
19FE9CF4000
trusted library allocation
page read and write
19FF215C000
trusted library allocation
page read and write
19FEA4E6000
trusted library allocation
page read and write
4DC000
unkown
page readonly
19FEA5BE000
trusted library allocation
page read and write
19FE47D0000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FE86C1000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE8487000
trusted library allocation
page read and write
19FE91EF000
trusted library allocation
page read and write
19FE4A2C000
trusted library allocation
page read and write
19FE9CF6000
trusted library allocation
page read and write
19FE984D000
trusted library allocation
page read and write
19FE5880000
trusted library allocation
page read and write
19FE9CDF000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FDF73F000
heap
page read and write
84D10FE000
stack
page read and write
19FDF7A6000
heap
page read and write
19FEA4EB000
trusted library allocation
page read and write
41C0000
heap
page read and write
19FDF72E000
heap
page read and write
61CB5FF000
stack
page read and write
19FE807F000
heap
page read and write
19FE58DA000
trusted library allocation
page read and write
19FEB09B000
trusted library allocation
page read and write
19FEA7BD000
trusted library allocation
page read and write
19FEA6ED000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF79B000
heap
page read and write
19FF0CAF000
trusted library allocation
page read and write
19FF50A4000
trusted library allocation
page read and write
19FDF7B5000
heap
page read and write
19FE8080000
heap
page read and write
19FE90C4000
trusted library allocation
page read and write
19FEA3C2000
trusted library allocation
page read and write
19FF07C8000
trusted library allocation
page read and write
19FF4B6B000
heap
page read and write
19FEB0BB000
trusted library allocation
page read and write
19FDF767000
heap
page read and write
221FF150000
heap
page read and write
19FDF767000
heap
page read and write
19FF6185000
trusted library allocation
page read and write
19FEBC66000
trusted library allocation
page read and write
19FE9847000
trusted library allocation
page read and write
19FE9B1C000
trusted library allocation
page read and write
19FF0638000
trusted library allocation
page read and write
19FE8465000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FF07C4000
trusted library allocation
page read and write
19FF09D9000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF751000
heap
page read and write
19FE859E000
trusted library allocation
page read and write
19FDF771000
heap
page read and write
19FDF763000
heap
page read and write
19FDF72E000
heap
page read and write
19FE90C8000
trusted library allocation
page read and write
19FE9068000
trusted library allocation
page read and write
19FE8675000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FE8685000
trusted library allocation
page read and write
19FE4090000
trusted library allocation
page read and write
19FE8474000
trusted library allocation
page read and write
19FEA3CF000
trusted library allocation
page read and write
19FEA72C000
trusted library allocation
page read and write
19FE9C54000
trusted library allocation
page read and write
19FF4B01000
heap
page read and write
22C75133000
heap
page read and write
19FEA4E6000
trusted library allocation
page read and write
19FF096A000
trusted library allocation
page read and write
19FF4A98000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FDF738000
heap
page read and write
19FEA3CC000
trusted library allocation
page read and write
19FF06F1000
trusted library allocation
page read and write
19FE9CD6000
trusted library allocation
page read and write
19FE805F000
heap
page read and write
19FF20FC000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FEA3A2000
trusted library allocation
page read and write
19FE90A5000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FF05FC000
trusted library allocation
page read and write
19FDF74D000
heap
page read and write
19FE8060000
heap
page read and write
19FE85CE000
trusted library allocation
page read and write
19FEA674000
trusted library allocation
page read and write
19FEA319000
trusted library allocation
page read and write
19FF2161000
trusted library allocation
page read and write
19FEBF90000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
19FE80B4000
heap
page read and write
84D08FE000
unkown
page readonly
19FEA674000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FF09E1000
trusted library allocation
page read and write
19FE6C62000
trusted library allocation
page read and write
19FE46FE000
trusted library allocation
page read and write
19FF0879000
trusted library allocation
page read and write
19FE9868000
trusted library allocation
page read and write
19FEA3E1000
trusted library allocation
page read and write
19FF0739000
trusted library allocation
page read and write
19FEB08E000
trusted library allocation
page read and write
19FE8583000
trusted library allocation
page read and write
19FE8095000
heap
page read and write
19FF60D6000
trusted library allocation
page read and write
19FEA3B9000
trusted library allocation
page read and write
19FDF739000
heap
page read and write
19FEBF7E000
trusted library allocation
page read and write
19FE595D000
trusted library allocation
page read and write
19FF0C33000
trusted library allocation
page read and write
19FEA20E000
trusted library allocation
page read and write
19FEBC68000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FE40A1000
trusted library allocation
page read and write
1DB6D7C9000
trusted library allocation
page read and write
19FF0983000
trusted library allocation
page read and write
19FEA698000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE90B7000
trusted library allocation
page read and write
22C75700000
trusted library allocation
page read and write
1DB6D781000
trusted library allocation
page read and write
22C75230000
unclassified section
page read and write
19FDF725000
heap
page read and write
221FF690000
heap
page read and write
19FEA3F3000
trusted library allocation
page read and write
22C754F0000
heap
page read and write
19FDF736000
heap
page read and write
19FF0C16000
trusted library allocation
page read and write
19FF1E27000
trusted library allocation
page read and write
19FF0997000
trusted library allocation
page read and write
19FE40B3000
trusted library allocation
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FDF749000
heap
page read and write
19FF07C4000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FE86C1000
trusted library allocation
page read and write
19FF097E000
trusted library allocation
page read and write
19FEACF6000
trusted library allocation
page read and write
19FE9CFD000
trusted library allocation
page read and write
19FF0719000
trusted library allocation
page read and write
19FF08F7000
trusted library allocation
page read and write
19FF5762000
trusted library allocation
page read and write
19FF0C16000
trusted library allocation
page read and write
1DB6D8E6000
heap
page read and write
19FDF742000
heap
page read and write
19FEA2B8000
trusted library allocation
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FF0746000
trusted library allocation
page read and write
19FE9CB3000
trusted library allocation
page read and write
19FE8568000
trusted library allocation
page read and write
19FE99E4000
trusted library allocation
page read and write
19FE8064000
heap
page read and write
19FE9235000
trusted library allocation
page read and write
22C7508B000
remote allocation
page execute read
19FDF789000
heap
page read and write
1DB6D8E4000
heap
page read and write
19FE9DCE000
trusted library allocation
page read and write
19FEA4A2000
trusted library allocation
page read and write
19FF0B14000
trusted library allocation
page read and write
19FE6CFC000
trusted library allocation
page read and write
19FDF79A000
heap
page read and write
19FF0679000
trusted library allocation
page read and write
19FF0C60000
trusted library allocation
page read and write
2753F360000
heap
page read and write
19FE999B000
trusted library allocation
page read and write
19FEA7BD000
trusted library allocation
page read and write
19FEA4A6000
trusted library allocation
page read and write
19FEB0EF000
trusted library allocation
page read and write
19FEA2AB000
trusted library allocation
page read and write
221FF6A9000
heap
page read and write
19FDF767000
heap
page read and write
19FF0EB5000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FF05C6000
trusted library allocation
page read and write
19FE929A000
trusted library allocation
page read and write
19FDF754000
heap
page read and write
19FDF7A6000
heap
page read and write
19FE981C000
trusted library allocation
page read and write
19FE9C5C000
trusted library allocation
page read and write
19FF0AD8000
trusted library allocation
page read and write
19FF07E0000
trusted library allocation
page read and write
19FE7E1A000
trusted library allocation
page read and write
19FE98F0000
trusted library allocation
page read and write
19FDF742000
heap
page read and write
19FE9A9C000
trusted library allocation
page read and write
19FF099A000
trusted library allocation
page read and write
19FEA3F6000
trusted library allocation
page read and write
221FF7B0000
heap
page read and write
19FDF799000
heap
page read and write
19FE9DE4000
trusted library allocation
page read and write
19FF08F7000
trusted library allocation
page read and write
1DB6D792000
trusted library allocation
page read and write
19FF0619000
trusted library allocation
page read and write
19FE9DB7000
trusted library allocation
page read and write
19FEA4A7000
trusted library allocation
page read and write
19FEAAEA000
trusted library allocation
page read and write
19FE9041000
trusted library allocation
page read and write
19FE9CFB000
trusted library allocation
page read and write
19FE9CEB000
trusted library allocation
page read and write
19FEA28F000
trusted library allocation
page read and write
19FF4F35000
trusted library allocation
page read and write
19FE4A3E000
trusted library allocation
page read and write
19FF21F9000
trusted library allocation
page read and write
19FEA333000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FE9EFC000
trusted library allocation
page read and write
19FE848D000
trusted library allocation
page read and write
19FE8470000
trusted library allocation
page read and write
19FF1D83000
trusted library allocation
page read and write
19FF4F2B000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FE92E1000
trusted library allocation
page read and write
19FF0AD8000
trusted library allocation
page read and write
2753E632000
unclassified section
page read and write
19FF0EE1000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FEB03B000
trusted library allocation
page read and write
19FEA3BA000
trusted library allocation
page read and write
2753F3E8000
heap
page read and write
19FEA4C8000
trusted library allocation
page read and write
19FF0C78000
trusted library allocation
page read and write
19FE906E000
trusted library allocation
page read and write
A6AF1FE000
stack
page read and write
19FEA4CA000
trusted library allocation
page read and write
2753E63F000
unclassified section
page read and write
19FE9A5C000
trusted library allocation
page read and write
19FE9C75000
trusted library allocation
page read and write
2753F477000
heap
page read and write
19FDF78E000
heap
page read and write
19FE7E69000
trusted library allocation
page read and write
19FEA6CE000
trusted library allocation
page read and write
19FE858E000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FEA4C6000
trusted library allocation
page read and write
19FEA4D0000
trusted library allocation
page read and write
19FEA398000
trusted library allocation
page read and write
19FE9A54000
trusted library allocation
page read and write
19FF094F000
trusted library allocation
page read and write
19FEC1D6000
trusted library allocation
page read and write
19FE927E000
trusted library allocation
page read and write
2753E761000
trusted library allocation
page read and write
19FEA25F000
trusted library allocation
page read and write
19FDF72E000
heap
page read and write
19FE89E8000
trusted library allocation
page read and write
17FE000
stack
page read and write
19FEA4B1000
trusted library allocation
page read and write
19FE868B000
trusted library allocation
page read and write
19FE9EF8000
trusted library allocation
page read and write
19FE8659000
trusted library allocation
page read and write
19FEABAE000
trusted library allocation
page read and write
19FDF757000
heap
page read and write
19FE90C4000
trusted library allocation
page read and write
19FEA3F4000
trusted library allocation
page read and write
19FEBC52000
trusted library allocation
page read and write
19FE7ED7000
trusted library allocation
page read and write
19FEA423000
trusted library allocation
page read and write
1DB6D390000
remote allocation
page read and write
19FE869F000
trusted library allocation
page read and write
19FE80B6000
heap
page read and write
19FF097D000
trusted library allocation
page read and write
19FEA5A4000
trusted library allocation
page read and write
19FEAB5A000
trusted library allocation
page read and write
19FDF750000
heap
page read and write
19FF1E67000
trusted library allocation
page read and write
19FE91F2000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FEA3BA000
trusted library allocation
page read and write
19FDF79C000
heap
page read and write
19FF6118000
trusted library allocation
page read and write
19FF0643000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FEA3C1000
trusted library allocation
page read and write
19FF0CEB000
trusted library allocation
page read and write
19FF09A8000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
22C75800000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FE7E58000
trusted library allocation
page read and write
19FEA2E4000
trusted library allocation
page read and write
19FE90FC000
trusted library allocation
page read and write
19FE99AF000
trusted library allocation
page read and write
19FEA26B000
trusted library allocation
page read and write
19FEB0D7000
trusted library allocation
page read and write
19FE5889000
trusted library allocation
page read and write
2753F35C000
heap
page read and write
19FF079A000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FF4AAB000
trusted library allocation
page read and write
19FE85A5000
trusted library allocation
page read and write
19FF0EE1000
trusted library allocation
page read and write
19FF6189000
trusted library allocation
page read and write
2753F3E0000
heap
page read and write
19FDF75B000
heap
page read and write
1B7CFDF1000
trusted library allocation
page execute read
19FDF74E000
heap
page read and write
19FE9EE8000
trusted library allocation
page read and write
19FE84B6000
trusted library allocation
page read and write
19FF4F30000
trusted library allocation
page read and write
19FEA47B000
trusted library allocation
page read and write
19FE80B6000
heap
page read and write
19FEA2D4000
trusted library allocation
page read and write
19FEBC18000
trusted library allocation
page read and write
19FE9EA7000
trusted library allocation
page read and write
19FE9CB6000
trusted library allocation
page read and write
22C75511000
trusted library allocation
page read and write
2753F459000
heap
page read and write
19FE9C68000
trusted library allocation
page read and write
19FE924C000
trusted library allocation
page read and write
19FE849A000
trusted library allocation
page read and write
19FDF75B000
heap
page read and write
19FDF736000
heap
page read and write
19FE846D000
trusted library allocation
page read and write
1824000
heap
page read and write
19FDF735000
heap
page read and write
19FF0C46000
trusted library allocation
page read and write
19FE9CEA000
trusted library allocation
page read and write
19FE9B4D000
trusted library allocation
page read and write
19FF0739000
trusted library allocation
page read and write
19FEA649000
trusted library allocation
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FF09FD000
trusted library allocation
page read and write
19FDF734000
heap
page read and write
19FDF757000
heap
page read and write
19FE9CAE000
trusted library allocation
page read and write
19FE80D7000
heap
page read and write
19FDF755000
heap
page read and write
19FF05F0000
trusted library allocation
page read and write
19FF0C49000
trusted library allocation
page read and write
19FEA20B000
trusted library allocation
page read and write
19FEA375000
trusted library allocation
page read and write
19FEA4AC000
trusted library allocation
page read and write
19FEC153000
trusted library allocation
page read and write
19FEA21C000
trusted library allocation
page read and write
19FE9E0A000
trusted library allocation
page read and write
19FF0863000
trusted library allocation
page read and write
19FE906A000
trusted library allocation
page read and write
19FF09FA000
trusted library allocation
page read and write
19FF09E5000
trusted library allocation
page read and write
19FE9B27000
trusted library allocation
page read and write
19FE9A81000
trusted library allocation
page read and write
19FE8060000
heap
page read and write
19FEA3A0000
trusted library allocation
page read and write
19FF06ED000
trusted library allocation
page read and write
19FEAB6C000
trusted library allocation
page read and write
19FEBF7E000
trusted library allocation
page read and write
19FDF73C000
heap
page read and write
19FF4F23000
trusted library allocation
page read and write
19FEA4CA000
trusted library allocation
page read and write
19FEA4D0000
trusted library allocation
page read and write
19FF07CB000
trusted library allocation
page read and write
19FEA3AD000
trusted library allocation
page read and write
19FEA3EE000
trusted library allocation
page read and write
19FE99E8000
trusted library allocation
page read and write
19FE4B68000
trusted library allocation
page read and write
2753F38A000
heap
page read and write
19FF09D9000
trusted library allocation
page read and write
19FE848D000
trusted library allocation
page read and write
19FE9E78000
trusted library allocation
page read and write
19FEC151000
trusted library allocation
page read and write
19FE9BD4000
trusted library allocation
page read and write
19FEB0EF000
trusted library allocation
page read and write
22C75500000
trusted library allocation
page read and write
19FF2189000
trusted library allocation
page read and write
19FF4F46000
trusted library allocation
page read and write
19FEA2FE000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FEA5A4000
trusted library allocation
page read and write
19FDF73F000
heap
page read and write
19FF0659000
trusted library allocation
page read and write
19FDF760000
heap
page read and write
19FDF73E000
heap
page read and write
19FDF757000
heap
page read and write
19FE5883000
trusted library allocation
page read and write
1DB6D767000
trusted library allocation
page read and write
19FDF744000
heap
page read and write
19FE9CBC000
trusted library allocation
page read and write
19FF50E3000
trusted library allocation
page read and write
19FE86E0000
trusted library allocation
page read and write
19FDF7A4000
heap
page read and write
19FF0BB0000
trusted library allocation
page read and write
19FF0953000
trusted library allocation
page read and write
19FDF7A1000
heap
page read and write
19FF50A9000
trusted library allocation
page read and write
19FF0749000
trusted library allocation
page read and write
19FDF7AF000
heap
page read and write
19FEA323000
trusted library allocation
page read and write
19FF0C81000
trusted library allocation
page read and write
19FE8440000
trusted library allocation
page read and write
19FE809F000
heap
page read and write
2753F363000
heap
page read and write
19FE99E8000
trusted library allocation
page read and write
19FE9E19000
trusted library allocation
page read and write
19FEA49C000
trusted library allocation
page read and write
221FF6A7000
heap
page read and write
2753F208000
trusted library allocation
page read and write
A6AE9FF000
stack
page read and write
19FE80D7000
heap
page read and write
19FDF73F000
heap
page read and write
19FF07E2000
trusted library allocation
page read and write
19FEBF8E000
trusted library allocation
page read and write
19FDF75D000
heap
page read and write
There are 3785 hidden memdumps, click here to show them.