IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_ec1ca031-ec86-4970-a4ac-40b9ed9a89e3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_ec1ca031-ec86-4970-a4ac-40b9ed9a89e3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2112 -prefMapHandle 2104 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a382715-91ea-4e9d-adff-b013096cc28b} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" 1fac5b6fd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3948 -parentBuildID 20230927232528 -prefsHandle 3936 -prefMapHandle 4044 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db0bfcc8-6b1d-4cd7-9e24-cfb931e11c14} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" 1fad8122a10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5024 -prefMapHandle 5020 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79db0927-a12c-44b4-a85f-ce543a5c6f85} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" 1faddffcf10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://youtube.comP
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
http://mozilla.org/0
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=utf-8&mode=blended&tag=mozill
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.amazon.com/exec/obidos/external-search/Can
unknown
https://www.instagram.com/
unknown
https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2https:
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://youtube.com/account?=https://accounts.google.coUw
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.16.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.186.142
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
EE6000
heap
page read and write
malicious
EDF000
heap
page read and write
malicious
1FAD1971000
trusted library allocation
page read and write
1FAD8932000
trusted library allocation
page read and write
1FAD773C000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FAD779C000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADF4D8000
trusted library allocation
page read and write
1FAE02E5000
trusted library allocation
page read and write
1FAD8288000
trusted library allocation
page read and write
1FADDCDC000
trusted library allocation
page read and write
1FADDF33000
trusted library allocation
page read and write
1FAD5D81000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD5EBB000
trusted library allocation
page read and write
1FAD59ED000
heap
page read and write
1FAD70C9000
trusted library allocation
page read and write
1FAD6E42000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FADE24A000
trusted library allocation
page read and write
1FACC9E4000
heap
page read and write
1FADE2D6000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC980000
heap
page read and write
1FAE0F82000
trusted library allocation
page read and write
1FAD79A3000
trusted library allocation
page read and write
1FADF6B8000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADDD77000
trusted library allocation
page read and write
1FAD70A1000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
28185DD4000
heap
page read and write
1FAD531E000
trusted library allocation
page read and write
1FADF4B0000
trusted library allocation
page read and write
1FADDF6D000
trusted library allocation
page read and write
1E9801CA000
heap
page read and write
1FAD7085000
trusted library allocation
page read and write
1FAD9321000
trusted library allocation
page read and write
A6C000
unkown
page readonly
1FACC9C8000
heap
page read and write
1FAD7680000
trusted library allocation
page read and write
1FAD7BEF000
trusted library allocation
page read and write
1FAD7AFA000
trusted library allocation
page read and write
1FADE442000
trusted library allocation
page read and write
1FAD85AC000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD564E000
trusted library allocation
page read and write
1FACC985000
heap
page read and write
1FAD79DA000
trusted library allocation
page read and write
1FAD9686000
trusted library allocation
page read and write
1FAD2A56000
trusted library allocation
page read and write
1FAD5975000
heap
page read and write
1FAD750B000
trusted library allocation
page read and write
1FAD6FC2000
trusted library allocation
page read and write
28185C07000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FADDFBA000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD688F000
trusted library allocation
page read and write
1FAE0FCE000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FADDFC2000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD537F000
trusted library allocation
page read and write
1FAD59CC000
heap
page read and write
1FAE1367000
trusted library allocation
page read and write
1FAD70F5000
trusted library allocation
page read and write
1FAD85AC000
trusted library allocation
page read and write
1FAD7BB2000
trusted library allocation
page read and write
193BA9A0000
heap
page read and write
1FACC9ED000
heap
page read and write
1E980511000
trusted library allocation
page read and write
1FAD59E6000
heap
page read and write
1FACC990000
heap
page read and write
1FAD53B9000
trusted library allocation
page read and write
1FAD82EE000
trusted library allocation
page read and write
1FAD5E91000
trusted library allocation
page read and write
1FACC9EA000
heap
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
27A20B77000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FADE0A4000
trusted library allocation
page read and write
1FADDBAB000
trusted library allocation
page read and write
1FADDDAE000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FACC976000
heap
page read and write
1FADFF50000
trusted library allocation
page read and write
1FACC96A000
heap
page read and write
27A20B58000
heap
page read and write
27A20B77000
heap
page read and write
1FAD1976000
trusted library allocation
page read and write
1FAD7066000
trusted library allocation
page read and write
1FAD70F8000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
27A1FCE0000
unkown
page execute read
1FACC9C4000
heap
page read and write
1FADE439000
trusted library allocation
page read and write
1FAD7870000
trusted library allocation
page read and write
1FAD8327000
trusted library allocation
page read and write
F2453BE000
unkown
page readonly
1FAD85AC000
trusted library allocation
page read and write
1FAD6EBA000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD2D58000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD2EEA000
trusted library allocation
page read and write
1FAD13BF000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
27A1FCEC000
unkown
page execute read
1FADF6D2000
trusted library allocation
page read and write
1FADF4D1000
trusted library allocation
page read and write
1FACC9A0000
heap
page read and write
1FAD6875000
trusted library allocation
page read and write
1FAD6F3A000
trusted library allocation
page read and write
27A204C9000
heap
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FAD68CF000
trusted library allocation
page read and write
1FAC7492000
heap
page read and write
E1CF4BE000
unkown
page readonly
27A20B77000
heap
page read and write
1FADD9B5000
trusted library allocation
page read and write
1FAD5C9A000
trusted library allocation
page read and write
1FAD2E29000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC980000
heap
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FAD29CA000
trusted library allocation
page read and write
1FAD7981000
trusted library allocation
page read and write
1FAD8574000
trusted library allocation
page read and write
1FAD773F000
trusted library allocation
page read and write
1FAD707B000
trusted library allocation
page read and write
1FADDDC6000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FADE42C000
trusted library allocation
page read and write
1FAD69A1000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FACC96E000
heap
page read and write
1E980650000
heap
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC990000
heap
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FACC96A000
heap
page read and write
1FAD7768000
trusted library allocation
page read and write
1FAD79BE000
trusted library allocation
page read and write
1FACC9BF000
heap
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD53C6000
trusted library allocation
page read and write
1FAD5ED3000
trusted library allocation
page read and write
1FAD89E4000
trusted library allocation
page read and write
1FAD75EA000
trusted library allocation
page read and write
1FAD6622000
trusted library allocation
page read and write
1FAD85B9000
trusted library allocation
page read and write
28185E7E000
trusted library allocation
page read and write
1FAE007B000
trusted library allocation
page read and write
1FAD2EF7000
trusted library allocation
page read and write
1FAD6F8A000
trusted library allocation
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD8534000
trusted library allocation
page read and write
27A20419000
heap
page read and write
1FAD7B4B000
trusted library allocation
page read and write
1FAD6988000
trusted library allocation
page read and write
1FACC96D000
heap
page read and write
1FAE1741000
heap
page read and write
1FACC96F000
heap
page read and write
1FAD5C08000
trusted library allocation
page read and write
1FAD5C92000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC980000
heap
page read and write
1FAD56A5000
trusted library allocation
page read and write
2B2ED7A1000
trusted library allocation
page execute read
1FAD7989000
trusted library allocation
page read and write
1FAD8392000
trusted library allocation
page read and write
28185EC8000
trusted library allocation
page read and write
1FADE0F0000
trusted library allocation
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FADDCE0000
trusted library allocation
page read and write
1FAD1AE1000
trusted library allocation
page read and write
1FAD79DE000
trusted library allocation
page read and write
1AADFF70000
heap
page read and write
1FAD8392000
trusted library allocation
page read and write
28185E10000
trusted library allocation
page read and write
1FAD79D0000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC98A000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC9E5000
heap
page read and write
1FAD75E6000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD6179000
trusted library allocation
page read and write
1FAD96A2000
trusted library allocation
page read and write
1FAD664E000
trusted library allocation
page read and write
1FAD7B6F000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADE43E000
trusted library allocation
page read and write
1FAD6EAF000
trusted library allocation
page read and write
1FAD6EA7000
trusted library allocation
page read and write
27A1FD2F000
trusted library allocation
page read and write
1FAD77B1000
trusted library allocation
page read and write
1FAD94B8000
trusted library allocation
page read and write
1FAD78A1000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC992000
heap
page read and write
1FADDEDB000
trusted library allocation
page read and write
1FAD2EE6000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD2A66000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD7888000
trusted library allocation
page read and write
1FADE28A000
trusted library allocation
page read and write
1FADDD96000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FADDF69000
trusted library allocation
page read and write
1EAFDFF000
stack
page read and write
25D392D03000
trusted library allocation
page read and write
1FAD6F23000
trusted library allocation
page read and write
1FADDAF9000
trusted library allocation
page read and write
1FAE03A3000
trusted library allocation
page read and write
1FAD77F9000
trusted library allocation
page read and write
1FAD68D3000
trusted library allocation
page read and write
1FADE0F6000
trusted library allocation
page read and write
1FAD77D3000
trusted library allocation
page read and write
1FAD5C63000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FAD5C7C000
trusted library allocation
page read and write
1FAD7756000
trusted library allocation
page read and write
1FAD78E5000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FACC9D3000
heap
page read and write
1FAD1AA7000
trusted library allocation
page read and write
1FAD7896000
trusted library allocation
page read and write
1FADF6A2000
trusted library allocation
page read and write
1FAD1A17000
trusted library allocation
page read and write
1FADD8C9000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FAD7A7C000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
27A20B6B000
heap
page read and write
1FAD6683000
trusted library allocation
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC97A000
heap
page read and write
1FAD5E89000
trusted library allocation
page read and write
1FAD6F7E000
trusted library allocation
page read and write
1FAD68E9000
trusted library allocation
page read and write
1FAD70E9000
trusted library allocation
page read and write
1FAD76CF000
trusted library allocation
page read and write
1FAD7870000
trusted library allocation
page read and write
1FAD5ED0000
trusted library allocation
page read and write
1FADDDC9000
trusted library allocation
page read and write
1FACC9A0000
heap
page read and write
27A1FD48000
trusted library allocation
page read and write
2CA000
stack
page read and write
1FACC980000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1E980330000
heap
page read and write
1FAD5C63000
trusted library allocation
page read and write
1FADDEDD000
trusted library allocation
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FADE495000
trusted library allocation
page read and write
1FAD6E28000
trusted library allocation
page read and write
1FAD77D3000
trusted library allocation
page read and write
1FADE246000
trusted library allocation
page read and write
1FAD9D84000
trusted library allocation
page read and write
193BAA0A000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FAD7B7E000
trusted library allocation
page read and write
1FAD1A1E000
trusted library allocation
page read and write
1FAD843F000
trusted library allocation
page read and write
1FAD2DAC000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD2A94000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD5C91000
trusted library allocation
page read and write
1FADFF53000
trusted library allocation
page read and write
1FAE0F38000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FADDB2E000
trusted library allocation
page read and write
1FADDCDC000
trusted library allocation
page read and write
1FADD93A000
trusted library allocation
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FADF79F000
trusted library allocation
page read and write
1FADE495000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FACC96B000
heap
page read and write
1FAD5C8F000
trusted library allocation
page read and write
1FADF4D5000
trusted library allocation
page read and write
1FADF6D2000
trusted library allocation
page read and write
1FAD82E7000
trusted library allocation
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FAD786D000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD6F7B000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FACC97E000
heap
page read and write
E1CC1DE000
stack
page read and write
1FAD77D5000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FADE246000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC9CD000
heap
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FAD59BB000
heap
page read and write
1FACC96E000
heap
page read and write
1FAD7880000
trusted library allocation
page read and write
1E980807000
trusted library allocation
page read and write
27A20B44000
heap
page read and write
1FADD8BF000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD19F6000
trusted library allocation
page read and write
1FAD78EF000
trusted library allocation
page read and write
1FAD78DD000
trusted library allocation
page read and write
1FAD7566000
trusted library allocation
page read and write
1FAD6E40000
trusted library allocation
page read and write
27A20474000
heap
page read and write
1FAD6E87000
trusted library allocation
page read and write
27A1FDF3000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FAD6665000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FAD61EE000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FACC987000
heap
page read and write
F2463BE000
unkown
page readonly
1FAD5CAC000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC9C9000
heap
page read and write
1FAD6E37000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
28185C1A000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FADDDBD000
trusted library allocation
page read and write
1FAD7777000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD56DE000
trusted library allocation
page read and write
1FAD1398000
trusted library allocation
page read and write
1FAD567B000
trusted library allocation
page read and write
1FAD97A7000
trusted library allocation
page read and write
1FAD6FAB000
trusted library allocation
page read and write
1FAD56AB000
trusted library allocation
page read and write
1FACC9C1000
heap
page read and write
1FACC9EA000
heap
page read and write
1FAD864F000
trusted library allocation
page read and write
1FAD68C3000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC96E000
heap
page read and write
27A20B6B000
heap
page read and write
1E980524000
trusted library allocation
page read and write
1FACC9C2000
heap
page read and write
1FACC992000
heap
page read and write
1FAD78BC000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAE042E000
trusted library allocation
page read and write
1FAD948E000
trusted library allocation
page read and write
1FAD5975000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FAD5657000
trusted library allocation
page read and write
1FAD7EBB000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FAE0F54000
trusted library allocation
page read and write
1FAD89D0000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FACC9BB000
heap
page read and write
1FADE24A000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD569E000
trusted library allocation
page read and write
1FAD838B000
trusted library allocation
page read and write
1FAD6676000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD61FA000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD8348000
trusted library allocation
page read and write
1FAD5E91000
trusted library allocation
page read and write
1FAD7BDA000
trusted library allocation
page read and write
1FAD94AE000
trusted library allocation
page read and write
27A1F97A000
heap
page read and write
1FAD7BDA000
trusted library allocation
page read and write
1FAD75BC000
trusted library allocation
page read and write
1FADDFDA000
trusted library allocation
page read and write
1FADF6E8000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD7592000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC990000
heap
page read and write
1FAD899B000
trusted library allocation
page read and write
27A20B22000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC9AC000
heap
page read and write
27A20B6B000
heap
page read and write
1FACC9EA000
heap
page read and write
1FADE0F6000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FAE1393000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD7073000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAD6118000
trusted library allocation
page read and write
1FAD5370000
trusted library allocation
page read and write
1FADDF77000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD7EB3000
trusted library allocation
page read and write
E8E000
stack
page read and write
1FAD5D43000
trusted library allocation
page read and write
1FACC974000
heap
page read and write
1FACC966000
heap
page read and write
1FACC9E5000
heap
page read and write
1FACC9BB000
heap
page read and write
3601000
heap
page read and write
1FAD77F1000
trusted library allocation
page read and write
1FAD56CD000
trusted library allocation
page read and write
1FAD2D65000
trusted library allocation
page read and write
1FADDD9C000
trusted library allocation
page read and write
1FADF7FD000
trusted library allocation
page read and write
1FAD784E000
trusted library allocation
page read and write
1FAD663E000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD6FC4000
trusted library allocation
page read and write
1FAD6E37000
trusted library allocation
page read and write
1FAD5ED3000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD5D5D000
trusted library allocation
page read and write
1FAD7582000
trusted library allocation
page read and write
A6C000
unkown
page readonly
1FAD7537000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
28185850000
heap
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD5D53000
trusted library allocation
page read and write
1FAD78E8000
trusted library allocation
page read and write
1FAD97A3000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD7AE7000
trusted library allocation
page read and write
1FAD79FE000
trusted library allocation
page read and write
1FAD6F4C000
trusted library allocation
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC99A000
heap
page read and write
1E980513000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD53C6000
trusted library allocation
page read and write
1FAD77DB000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC97F000
heap
page read and write
1FAD78D8000
trusted library allocation
page read and write
1FAD5979000
heap
page read and write
1FADE483000
trusted library allocation
page read and write
1FAD85D5000
trusted library allocation
page read and write
1FADDFD4000
trusted library allocation
page read and write
1FAD83CE000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FAD777B000
trusted library allocation
page read and write
1FAD75EA000
trusted library allocation
page read and write
27A2047C000
heap
page read and write
1FAD7797000
trusted library allocation
page read and write
1FAD6EBD000
trusted library allocation
page read and write
1FAE0D00000
trusted library allocation
page read and write
1FAD9321000
trusted library allocation
page read and write
1FAD7996000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD59F0000
heap
page read and write
1FAD78E5000
trusted library allocation
page read and write
1FAD84EC000
trusted library allocation
page read and write
1FAD755B000
trusted library allocation
page read and write
EAF000
stack
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FAD2E3D000
trusted library allocation
page read and write
28185C32000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FADDA6D000
trusted library allocation
page read and write
1FAD773F000
trusted library allocation
page read and write
1FAD5365000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
27A20B58000
heap
page read and write
1FACC9D1000
heap
page read and write
1AADE400000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
7C4000
heap
page read and write
1FACC990000
heap
page read and write
1FAD6F2C000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FADE0FB000
trusted library allocation
page read and write
F24427B000
stack
page read and write
1FAD8288000
trusted library allocation
page read and write
1FACC966000
heap
page read and write
1FAD9429000
trusted library allocation
page read and write
EF0000
heap
page read and write
1FAD5994000
heap
page read and write
1FAD7759000
trusted library allocation
page read and write
27A20B3B000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD728A000
trusted library allocation
page read and write
1FAD774E000
trusted library allocation
page read and write
1FADE43E000
trusted library allocation
page read and write
1FAD6F74000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FAD85D5000
trusted library allocation
page read and write
1FAD9801000
trusted library allocation
page read and write
27A20470000
heap
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD9806000
trusted library allocation
page read and write
1FAE0F80000
trusted library allocation
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FAD2D4E000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FACC965000
heap
page read and write
27A1FD5F000
trusted library allocation
page read and write
1FAD78F9000
trusted library allocation
page read and write
1FACC9AC000
heap
page read and write
1FAD6649000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC99A000
heap
page read and write
2B2ED7B9000
trusted library allocation
page execute read
1FACC990000
heap
page read and write
1FACC95E000
heap
page read and write
31C0000
trusted library allocation
page read and write
1FAD70D3000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD7544000
trusted library allocation
page read and write
1FADDFB5000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FACC9D4000
heap
page read and write
1FAD7559000
trusted library allocation
page read and write
1FAD699B000
trusted library allocation
page read and write
1FAD8599000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD7880000
trusted library allocation
page read and write
1FAD59A0000
heap
page read and write
1FAD5EC3000
trusted library allocation
page read and write
1FADF7AE000
trusted library allocation
page read and write
1FAD6F77000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD7AA3000
trusted library allocation
page read and write
28185DD6000
heap
page read and write
1EB1DFE000
stack
page read and write
1FADDBB1000
trusted library allocation
page read and write
1FAD6F66000
trusted library allocation
page read and write
193BA5B0000
heap
page read and write
1FAD7797000
trusted library allocation
page read and write
1FAD5EB9000
trusted library allocation
page read and write
1FAD85B9000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
3601000
heap
page read and write
1FADDE4F000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FADDC35000
trusted library allocation
page read and write
1FAD6647000
trusted library allocation
page read and write
1FAE0457000
trusted library allocation
page read and write
1FAE0F54000
trusted library allocation
page read and write
27A20479000
heap
page read and write
1FAD8929000
trusted library allocation
page read and write
1FAE0F82000
trusted library allocation
page read and write
1FAD8591000
trusted library allocation
page read and write
1FADDFFC000
trusted library allocation
page read and write
1FAD70F8000
trusted library allocation
page read and write
1FAD94BE000
trusted library allocation
page read and write
1FAD76E0000
trusted library allocation
page read and write
1FACC95F000
heap
page read and write
1FADFF38000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FADF493000
trusted library allocation
page read and write
27A20A04000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FADD991000
trusted library allocation
page read and write
1FADE29A000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FACC990000
heap
page read and write
27A204B8000
heap
page read and write
1FACC9BF000
heap
page read and write
1FAD8686000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FADDD9D000
trusted library allocation
page read and write
1FAD6E30000
trusted library allocation
page read and write
1FAD78BC000
trusted library allocation
page read and write
28185A10000
heap
page read and write
1FAD831A000
trusted library allocation
page read and write
1FAD5633000
trusted library allocation
page read and write
1FAE0F6F000
trusted library allocation
page read and write
1FAD799C000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD76EF000
trusted library allocation
page read and write
1FADDF5D000
trusted library allocation
page read and write
1FAD56F1000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC964000
heap
page read and write
1FAD2EBC000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD2C36000
trusted library allocation
page read and write
1FAD8922000
trusted library allocation
page read and write
1FACC9E4000
heap
page read and write
27A20B58000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC96B000
heap
page read and write
27A20B58000
heap
page read and write
1FAD85DF000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD53F9000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FAE00D4000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC969000
heap
page read and write
1FADD87F000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD7940000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FADDED5000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC97A000
heap
page read and write
1FACC9CC000
heap
page read and write
1FAD7502000
trusted library allocation
page read and write
1FACC9CA000
heap
page read and write
1FAD7ABA000
trusted library allocation
page read and write
1FACC960000
heap
page read and write
1FAD1AB0000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD6EA3000
trusted library allocation
page read and write
1FAD8591000
trusted library allocation
page read and write
1E980646000
heap
page read and write
1FAD6166000
trusted library allocation
page read and write
1FAD853A000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD667C000
trusted library allocation
page read and write
1FAD8581000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FADDFFE000
trusted library allocation
page read and write
1FADE2EE000
trusted library allocation
page read and write
1FAD799C000
trusted library allocation
page read and write
193BA697000
heap
page read and write
1FAD2E57000
trusted library allocation
page read and write
1FAD65D4000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FAD5E45000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FADE446000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD784A000
trusted library allocation
page read and write
1FAD65FE000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADE0D2000
trusted library allocation
page read and write
1FADE0CF000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FADF7F5000
trusted library allocation
page read and write
27A1FCF0000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC9BB000
heap
page read and write
27A1FC4F000
unclassified section
page read and write
1FAD6E91000
trusted library allocation
page read and write
1FAD7AB4000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADDF50000
trusted library allocation
page read and write
1FAD948B000
trusted library allocation
page read and write
1FAD1A26000
trusted library allocation
page read and write
1FAD77F1000
trusted library allocation
page read and write
1FAD6137000
trusted library allocation
page read and write
1FAD8540000
trusted library allocation
page read and write
1FAD6E69000
trusted library allocation
page read and write
1FAD86D1000
trusted library allocation
page read and write
1FACC9D0000
heap
page read and write
1FADE28A000
trusted library allocation
page read and write
1FACC9C6000
heap
page read and write
1FADDDB0000
trusted library allocation
page read and write
EC0000
heap
page read and write
1E980900000
trusted library allocation
page read and write
1FAD661D000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FAD53A4000
trusted library allocation
page read and write
1FAD2E72000
trusted library allocation
page read and write
1FAD61D6000
trusted library allocation
page read and write
1FADF455000
trusted library allocation
page read and write
1FAE007E000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
28185680000
unclassified section
page readonly
1FACC99A000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC988000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD6E67000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
3C0000
heap
page read and write
1FACC9BE000
heap
page read and write
1FACC975000
heap
page read and write
1FADDFD1000
trusted library allocation
page read and write
27A20473000
heap
page read and write
1FAD76CC000
trusted library allocation
page read and write
1FAD82E7000
trusted library allocation
page read and write
1FADE2FE000
trusted library allocation
page read and write
1FAD7EF5000
trusted library allocation
page read and write
1FAD53DA000
trusted library allocation
page read and write
1FAD53F2000
trusted library allocation
page read and write
1FAD859B000
trusted library allocation
page read and write
1FAD7587000
trusted library allocation
page read and write
1FAE00DD000
trusted library allocation
page read and write
F07000
heap
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FAD85D9000
trusted library allocation
page read and write
1FAD8581000
trusted library allocation
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9C4000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD61FA000
trusted library allocation
page read and write
1FAD7710000
trusted library allocation
page read and write
1FAD9E1C000
trusted library allocation
page read and write
1FADDD7E000
trusted library allocation
page read and write
1FADDFE6000
trusted library allocation
page read and write
1FAD7B65000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1E980390000
heap
page read and write
1FAD5C8F000
trusted library allocation
page read and write
1FADDBDA000
trusted library allocation
page read and write
1FAD56CB000
trusted library allocation
page read and write
27A2046F000
heap
page read and write
1FAD81EC000
trusted library allocation
page read and write
1FAD7791000
trusted library allocation
page read and write
1FAD5EBE000
trusted library allocation
page read and write
28185700000
unclassified section
page readonly
1FAD758D000
trusted library allocation
page read and write
1FAD59A7000
heap
page read and write
1FAE0F5E000
trusted library allocation
page read and write
1FAD56CD000
trusted library allocation
page read and write
1FADDED9000
trusted library allocation
page read and write
1FAD6F7C000
trusted library allocation
page read and write
1FAD7B00000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FACC9C9000
heap
page read and write
1FADE414000
trusted library allocation
page read and write
1FAD945E000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD86A6000
trusted library allocation
page read and write
1FAD5991000
heap
page read and write
1FAD2DE1000
trusted library allocation
page read and write
1FAD6E46000
trusted library allocation
page read and write
1FAD53AE000
trusted library allocation
page read and write
1FADD986000
trusted library allocation
page read and write
1FADD9B1000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD53AA000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FADE0ED000
trusted library allocation
page read and write
1FADDC39000
trusted library allocation
page read and write
1FADD95A000
trusted library allocation
page read and write
27A1FD86000
trusted library allocation
page read and write
1FAD77F6000
trusted library allocation
page read and write
1FADDFCD000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD8992000
trusted library allocation
page read and write
1FADDC30000
trusted library allocation
page read and write
1FAD6F9D000
trusted library allocation
page read and write
1FAD7ED0000
trusted library allocation
page read and write
1FAD61E7000
trusted library allocation
page read and write
1FACC96F000
heap
page read and write
1FAD780E000
trusted library allocation
page read and write
1FAD6112000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FACC990000
heap
page read and write
1FAD7587000
trusted library allocation
page read and write
A32663D000
stack
page read and write
1FACC96E000
heap
page read and write
1FACC980000
heap
page read and write
1FAD9342000
trusted library allocation
page read and write
1FAD9833000
trusted library allocation
page read and write
1FAD6E2D000
trusted library allocation
page read and write
1FAD96E5000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD85CC000
trusted library allocation
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
27A1FD00000
trusted library allocation
page read and write
1FAD89C6000
trusted library allocation
page read and write
1FAD5D5F000
trusted library allocation
page read and write
1FADDA6F000
trusted library allocation
page read and write
1FAD86A6000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FAD1A26000
trusted library allocation
page read and write
1FACC97E000
heap
page read and write
1FADD8B5000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD935C000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC9E6000
heap
page read and write
1FACC9BE000
heap
page read and write
1FACC9BD000
heap
page read and write
1FACC975000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAE0FFE000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADDDE0000
trusted library allocation
page read and write
1FADE26B000
trusted library allocation
page read and write
1FAD53B9000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD79C4000
trusted library allocation
page read and write
1FADDD86000
trusted library allocation
page read and write
1FAD2EBC000
trusted library allocation
page read and write
1FAD68DD000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD94C1000
trusted library allocation
page read and write
1FAD8115000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD6F74000
trusted library allocation
page read and write
1FADDA96000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC97A000
heap
page read and write
1FAE0433000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FAD5E89000
trusted library allocation
page read and write
1FADDDA2000
trusted library allocation
page read and write
1FAD755E000
trusted library allocation
page read and write
1FAE17AA000
heap
page read and write
1FADDD14000
trusted library allocation
page read and write
1FAD5E5B000
trusted library allocation
page read and write
1FAD78E9000
trusted library allocation
page read and write
1FACC9CC000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD2E5D000
trusted library allocation
page read and write
1FADDD9F000
trusted library allocation
page read and write
1FACC9D9000
heap
page read and write
1FADDBA9000
trusted library allocation
page read and write
1FADF200000
trusted library allocation
page read and write
1FAD75BA000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FAD5370000
trusted library allocation
page read and write
1FAE177E000
heap
page read and write
1FAD688F000
trusted library allocation
page read and write
1FAD6E73000
trusted library allocation
page read and write
1E98090C000
trusted library allocation
page read and write
1FAD754F000
trusted library allocation
page read and write
1FAD662B000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
27A204F8000
heap
page read and write
1FACC975000
heap
page read and write
1E980572000
trusted library allocation
page read and write
1FAD85B1000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAD770A000
trusted library allocation
page read and write
3114B403000
trusted library allocation
page read and write
1FACC995000
heap
page read and write
1FAD68CC000
trusted library allocation
page read and write
28185EE7000
trusted library allocation
page read and write
1FAD61C6000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD684A000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
F244278000
stack
page read and write
1FAD784F000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD68E9000
trusted library allocation
page read and write
1FAD7780000
trusted library allocation
page read and write
1FAD82EE000
trusted library allocation
page read and write
AA4000
unkown
page readonly
193BA800000
heap
page read and write
1FACC9D7000
heap
page read and write
1FAD7656000
trusted library allocation
page read and write
1FAD79C6000
trusted library allocation
page read and write
28186240000
heap
page read and write
F2441FE000
unkown
page readonly
1FAD77F6000
trusted library allocation
page read and write
1FAD8322000
trusted library allocation
page read and write
37E000
stack
page read and write
1FAD6F9F000
trusted library allocation
page read and write
1FAD77D7000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD566F000
trusted library allocation
page read and write
1FADDCCB000
trusted library allocation
page read and write
1FAD1AE1000
trusted library allocation
page read and write
1AADFF80000
heap
page read and write
1FAD6858000
trusted library allocation
page read and write
27A20B77000
heap
page read and write
1FAD775C000
trusted library allocation
page read and write
193BA700000
trusted library allocation
page read and write
1FAD85A8000
trusted library allocation
page read and write
1FAD6EBA000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD799C000
trusted library allocation
page read and write
1FAD773F000
trusted library allocation
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC992000
heap
page read and write
1FAD5EFC000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD66DF000
trusted library allocation
page read and write
1FAD8381000
trusted library allocation
page read and write
1FAD9396000
trusted library allocation
page read and write
1FAD6E87000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC96B000
heap
page read and write
1FACC980000
heap
page read and write
1FACC9E5000
heap
page read and write
27A204F8000
heap
page read and write
1FACC9BE000
heap
page read and write
1FACC9DF000
heap
page read and write
F2439FE000
stack
page read and write
1FADE0D8000
trusted library allocation
page read and write
27A1FCC4000
heap
page read and write
27A2047C000
heap
page read and write
1FAD7514000
trusted library allocation
page read and write
1FAD6F81000
trusted library allocation
page read and write
1FAD96C8000
trusted library allocation
page read and write
1FAD76BA000
trusted library allocation
page read and write
1FAD85C2000
trusted library allocation
page read and write
1FAD84B0000
trusted library allocation
page read and write
1FAD1AB0000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FADF7FB000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC995000
heap
page read and write
31C0000
trusted library allocation
page read and write
1FAD5396000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD61E0000
trusted library allocation
page read and write
1FAD78B9000
trusted library allocation
page read and write
1FACC9CC000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD7BA3000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FAD53C1000
trusted library allocation
page read and write
1FAD8921000
trusted library allocation
page read and write
1FAD2E19000
trusted library allocation
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD75AB000
trusted library allocation
page read and write
1FAD53E4000
trusted library allocation
page read and write
1FAD85A8000
trusted library allocation
page read and write
1FAD79DE000
trusted library allocation
page read and write
1FAD89F3000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD6682000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD66A8000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAE0307000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD6E6B000
trusted library allocation
page read and write
27A20A00000
trusted library allocation
page read and write
1FADDF80000
trusted library allocation
page read and write
1FACC9DD000
heap
page read and write
1FAE0F5E000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC9EA000
heap
page read and write
1FAD5C8C000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD79AE000
trusted library allocation
page read and write
1FAD7948000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD2D6B000
trusted library allocation
page read and write
1FAD77C6000
trusted library allocation
page read and write
1FAD6E6E000
trusted library allocation
page read and write
1FAD53E1000
trusted library allocation
page read and write
1FACC9DC000
heap
page read and write
1FACC9BB000
heap
page read and write
27A2048D000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FAD5C94000
trusted library allocation
page read and write
1E98038F000
unclassified section
page read and write
1FACC994000
heap
page read and write
1FAD6852000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD5C81000
trusted library allocation
page read and write
1FAD6F18000
trusted library allocation
page read and write
1FAD798B000
trusted library allocation
page read and write
1FACC978000
heap
page read and write
1FAD78B7000
trusted library allocation
page read and write
1FAD5975000
heap
page read and write
1FAD5C8F000
trusted library allocation
page read and write
1FAD82DD000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD68EC000
trusted library allocation
page read and write
1FADF689000
trusted library allocation
page read and write
1FAD2E79000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
F245BBE000
stack
page read and write
1FADE0F0000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
27A1FD62000
trusted library allocation
page read and write
1FACC966000
heap
page read and write
1FAD85B9000
trusted library allocation
page read and write
1FAD2D65000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9EA000
heap
page read and write
1FACC9BF000
heap
page read and write
1FAD5E9D000
trusted library allocation
page read and write
1FAD13CC000
trusted library allocation
page read and write
1FACC9CA000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD59A0000
heap
page read and write
1FACC9AC000
heap
page read and write
27A1F8F0000
unclassified section
page readonly
1FAD77CA000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD6E37000
trusted library allocation
page read and write
1FADDF50000
trusted library allocation
page read and write
1FAD85D9000
trusted library allocation
page read and write
1FAD83B6000
trusted library allocation
page read and write
1FAD5EB1000
trusted library allocation
page read and write
27A20B58000
heap
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FAD7523000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC97A000
heap
page read and write
1FADDFD6000
trusted library allocation
page read and write
1FAD53BE000
trusted library allocation
page read and write
1FAD7858000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC964000
heap
page read and write
1FAD2EE8000
trusted library allocation
page read and write
1FADF400000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FACC9C4000
heap
page read and write
1FACC98B000
heap
page read and write
1FAD5E93000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FAD9E93000
trusted library allocation
page read and write
1FAE1776000
heap
page read and write
1FAD6F3A000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FADE286000
trusted library allocation
page read and write
1FAD6999000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FAD5EFC000
trusted library allocation
page read and write
1FAD7950000
trusted library allocation
page read and write
1FAD61E1000
trusted library allocation
page read and write
1FAD8322000
trusted library allocation
page read and write
1FACC9D0000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD89D2000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD77D2000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
28185E7A000
trusted library allocation
page read and write
1FAD8121000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD5EB6000
trusted library allocation
page read and write
1FAD854E000
trusted library allocation
page read and write
1FAD53C1000
trusted library allocation
page read and write
1FAE0F5A000
trusted library allocation
page read and write
1FAD6852000
trusted library allocation
page read and write
1FAD5973000
heap
page read and write
1FACC992000
heap
page read and write
1FADF7F9000
trusted library allocation
page read and write
2B2ED6EC000
trusted library allocation
page execute read
1FAD533E000
trusted library allocation
page read and write
1FAD5365000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
27A1FD23000
trusted library allocation
page read and write
1E98056A000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FADD97A000
trusted library allocation
page read and write
27A2046C000
heap
page read and write
EFF000
heap
page read and write
1FAD7572000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAC749B000
heap
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD2E74000
trusted library allocation
page read and write
1FAD843F000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FADE0F0000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FADF7F1000
trusted library allocation
page read and write
1FADDEDB000
trusted library allocation
page read and write
1FADD8ED000
trusted library allocation
page read and write
1FAD6E77000
trusted library allocation
page read and write
1FADDF62000
trusted library allocation
page read and write
1FAD53DA000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FADD9FC000
trusted library allocation
page read and write
1FAD79DE000
trusted library allocation
page read and write
1FADE444000
trusted library allocation
page read and write
1FAD2D29000
trusted library allocation
page read and write
1FAD707B000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FADF4E8000
trusted library allocation
page read and write
1FADDA5D000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC978000
heap
page read and write
1FADE2E7000
trusted library allocation
page read and write
1FAD78B7000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD786D000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
27A1FDC7000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
27A2048D000
heap
page read and write
1FADDDB0000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC988000
heap
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FADD9B7000
trusted library allocation
page read and write
1FAD5D38000
trusted library allocation
page read and write
1FAD82B8000
trusted library allocation
page read and write
1EB2DFF000
stack
page read and write
1FACC992000
heap
page read and write
1FADD9B7000
trusted library allocation
page read and write
1FAD1923000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
27A20470000
heap
page read and write
1FADE425000
trusted library allocation
page read and write
27A1FDB0000
trusted library allocation
page read and write
1FAD852E000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
A92000
unkown
page readonly
1FAD8985000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD5ED0000
trusted library allocation
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FAD75E1000
trusted library allocation
page read and write
1FAD83B5000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FADDA88000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FADD8FD000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FAD5669000
trusted library allocation
page read and write
1E980515000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
27A20B2A000
heap
page read and write
1FADDED1000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD59A1000
heap
page read and write
1FAD6F28000
trusted library allocation
page read and write
27A1FD65000
trusted library allocation
page read and write
1FADDCB5000
trusted library allocation
page read and write
281858D0000
unclassified section
page read and write
1FADDD48000
trusted library allocation
page read and write
1FADDDA2000
trusted library allocation
page read and write
1FAD7813000
trusted library allocation
page read and write
1FAD81F8000
trusted library allocation
page read and write
1FAD7761000
trusted library allocation
page read and write
7C0000
heap
page read and write
1FAD7961000
trusted library allocation
page read and write
1FAD7533000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FAD82AF000
trusted library allocation
page read and write
27A20B00000
heap
page read and write
1FAD68AF000
trusted library allocation
page read and write
1FAD78B7000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FAD1AA7000
trusted library allocation
page read and write
28185E64000
trusted library allocation
page read and write
1FACC9CF000
heap
page read and write
1FAE17AA000
heap
page read and write
1FAD5C08000
trusted library allocation
page read and write
1FAD8386000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD83F0000
trusted library allocation
page read and write
28185E81000
trusted library allocation
page read and write
A32667E000
unkown
page readonly
1FAD77DC000
trusted library allocation
page read and write
1FAD8686000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FACC9D8000
heap
page read and write
1FAD61DD000
trusted library allocation
page read and write
28185720000
heap
page read and write
1FACC9DF000
heap
page read and write
1FADF642000
trusted library allocation
page read and write
1FAD5991000
heap
page read and write
1FAD7776000
trusted library allocation
page read and write
1FACC9D6000
heap
page read and write
A324DD8000
stack
page read and write
1FAE0F80000
trusted library allocation
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAD6E46000
trusted library allocation
page read and write
1FAD1971000
trusted library allocation
page read and write
1FAD7B67000
trusted library allocation
page read and write
1FAD5CCF000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC97A000
heap
page read and write
1FACC992000
heap
page read and write
1FACC992000
heap
page read and write
1FAD6E46000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD5EBE000
trusted library allocation
page read and write
1FACC985000
heap
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1E980382000
unclassified section
page read and write
1FADF4EC000
trusted library allocation
page read and write
1FAD2AB1000
trusted library allocation
page read and write
1FAD75EA000
trusted library allocation
page read and write
1FADDF5B000
trusted library allocation
page read and write
1FADDB30000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC960000
heap
page read and write
1FAD2EAD000
trusted library allocation
page read and write
1FADE29E000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD6E93000
trusted library allocation
page read and write
1FAD2A9C000
trusted library allocation
page read and write
1FAD831D000
trusted library allocation
page read and write
1FAD6E42000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD8298000
trusted library allocation
page read and write
1FADDB98000
trusted library allocation
page read and write
1E980577000
trusted library allocation
page read and write
1FAD568C000
trusted library allocation
page read and write
1FADF4BE000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD5D4C000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD6E8C000
trusted library allocation
page read and write
1FAD7AD5000
trusted library allocation
page read and write
1FAD82C2000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FADE26E000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC98B000
heap
page read and write
1FACC992000
heap
page read and write
1FAD79C3000
trusted library allocation
page read and write
1FAD7580000
trusted library allocation
page read and write
1FAD2DE7000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FAD5B00000
trusted library allocation
page read and write
1FACC986000
heap
page read and write
27A1FCE2000
unkown
page execute read
1FACC992000
heap
page read and write
1FAD835E000
trusted library allocation
page read and write
1FADDDDA000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FAD7095000
trusted library allocation
page read and write
1AADE50A000
trusted library allocation
page read and write
1FADE2EE000
trusted library allocation
page read and write
1FAD6898000
trusted library allocation
page read and write
1FAE03E4000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
27A1FD10000
trusted library allocation
page read and write
E1CE43E000
unkown
page readonly
27A1FB00000
trusted library allocation
page read and write
1FAD8484000
trusted library allocation
page read and write
1FADDD94000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD59F0000
heap
page read and write
1FAD5D63000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1AADE1F0000
heap
page read and write
1FAD5EBE000
trusted library allocation
page read and write
1FADD985000
trusted library allocation
page read and write
1FAD6660000
trusted library allocation
page read and write
1FAD59A0000
heap
page read and write
1FAE1786000
heap
page read and write
27A20B2A000
heap
page read and write
1FAD773F000
trusted library allocation
page read and write
1FAD83BC000
trusted library allocation
page read and write
F2429D8000
stack
page read and write
1FADDBB8000
trusted library allocation
page read and write
1FADF465000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
EF1000
heap
page read and write
1FAD2D58000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1E980640000
heap
page read and write
1FAD778A000
trusted library allocation
page read and write
1FAD891D000
trusted library allocation
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FADDFD4000
trusted library allocation
page read and write
1FADDF65000
trusted library allocation
page read and write
1FAD1ADB000
trusted library allocation
page read and write
1FAD78DE000
trusted library allocation
page read and write
1FAD8348000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC9CC000
heap
page read and write
1FAD8149000
trusted library allocation
page read and write
1FAD569C000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD5991000
heap
page read and write
1FAD1ACB000
trusted library allocation
page read and write
1FAD77D5000
trusted library allocation
page read and write
1FAD569C000
trusted library allocation
page read and write
1FAD5CF7000
trusted library allocation
page read and write
28185E5B000
trusted library allocation
page read and write
1FAD5D88000
trusted library allocation
page read and write
1FAE0FCE000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FAE178E000
heap
page read and write
1FACC9C5000
heap
page read and write
1FAD6EAF000
trusted library allocation
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FAD78E8000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FAD7998000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD938A000
trusted library allocation
page read and write
1FAD2D9B000
trusted library allocation
page read and write
1FAD6F7B000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC988000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD77EC000
trusted library allocation
page read and write
1FAD84FE000
trusted library allocation
page read and write
1FADDCE0000
trusted library allocation
page read and write
1FAD788A000
trusted library allocation
page read and write
1FAD5979000
heap
page read and write
1FAD79DE000
trusted library allocation
page read and write
1FADDED3000
trusted library allocation
page read and write
1FAD6F74000
trusted library allocation
page read and write
1FAD59A7000
heap
page read and write
1FAD5997000
heap
page read and write
1FADD991000
trusted library allocation
page read and write
1FAD83C2000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAE138A000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FADDA8C000
trusted library allocation
page read and write
1FAD6F77000
trusted library allocation
page read and write
1FADDD71000
trusted library allocation
page read and write
27A1FD6F000
trusted library allocation
page read and write
1FAD77F7000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FADE474000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD6F1B000
trusted library allocation
page read and write
1FAD2E80000
trusted library allocation
page read and write
1FAD5ECD000
trusted library allocation
page read and write
1FACC997000
heap
page read and write
1FACC990000
heap
page read and write
1FADD8BB000
trusted library allocation
page read and write
1FAD6F85000
trusted library allocation
page read and write
1FAE0FFE000
trusted library allocation
page read and write
1FADDCB5000
trusted library allocation
page read and write
1FADE0C5000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD86CF000
trusted library allocation
page read and write
1FACC9EA000
heap
page read and write
1FACC988000
heap
page read and write
1FAD758A000
trusted library allocation
page read and write
1FADDED9000
trusted library allocation
page read and write
1FAD6F74000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC990000
heap
page read and write
1FAD5EDC000
trusted library allocation
page read and write
1FAD2E2D000
trusted library allocation
page read and write
E1CC15D000
stack
page read and write
1FAD2A86000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD2EC3000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD779D000
trusted library allocation
page read and write
1FADDAE2000
trusted library allocation
page read and write
1FAD2EB9000
trusted library allocation
page read and write
1FAD756D000
trusted library allocation
page read and write
1FAD8581000
trusted library allocation
page read and write
1FAD7077000
trusted library allocation
page read and write
1FAD7858000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADD9C7000
trusted library allocation
page read and write
27A2050D000
heap
page read and write
28185A13000
heap
page read and write
1FAD6F32000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FAD2E0B000
trusted library allocation
page read and write
1FAD5E5E000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD859B000
trusted library allocation
page read and write
1FAD5977000
heap
page read and write
1FAD75E1000
trusted library allocation
page read and write
1FAD78E8000
trusted library allocation
page read and write
28185E2E000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FACC981000
heap
page read and write
1FAD68AB000
trusted library allocation
page read and write
1FAD682D000
trusted library allocation
page read and write
1E980582000
trusted library allocation
page read and write
1FAD6F81000
trusted library allocation
page read and write
1FAD2EE4000
trusted library allocation
page read and write
28185E03000
trusted library allocation
page read and write
1FAD2A65000
trusted library allocation
page read and write
1FAD7955000
trusted library allocation
page read and write
1FAD860F000
trusted library allocation
page read and write
1FACC9C6000
heap
page read and write
1FACC992000
heap
page read and write
1FAD79CA000
trusted library allocation
page read and write
1FADDB80000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD707B000
trusted library allocation
page read and write
1FADE280000
trusted library allocation
page read and write
1FAD7792000
trusted library allocation
page read and write
28185C39000
trusted library allocation
page read and write
1FADDF80000
trusted library allocation
page read and write
1FADDBCC000
trusted library allocation
page read and write
1FAD76AD000
trusted library allocation
page read and write
1FAD86E4000
trusted library allocation
page read and write
1FADDD4B000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FAD2D27000
trusted library allocation
page read and write
1AADFF9F000
heap
page read and write
1AADE210000
heap
page read and write
1FAD53A6000
trusted library allocation
page read and write
27A1FD0A000
trusted library allocation
page read and write
1FAD13EF000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FACC9BE000
heap
page read and write
1FADE29A000
trusted library allocation
page read and write
1FAD7544000
trusted library allocation
page read and write
1FAD7865000
trusted library allocation
page read and write
1FADDCFD000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD2DF7000
trusted library allocation
page read and write
1EAFDFB000
stack
page read and write
1FAD61EE000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD77CD000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD7858000
trusted library allocation
page read and write
27A205C0000
heap
page read and write
1FAD5EB3000
trusted library allocation
page read and write
1FAD8585000
trusted library allocation
page read and write
1FAE1350000
trusted library allocation
page read and write
1FAD75FA000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD891D000
trusted library allocation
page read and write
1FAD5EB9000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD2E4B000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FACC988000
heap
page read and write
1FACC97E000
heap
page read and write
1FACC9A7000
heap
page read and write
27A20470000
heap
page read and write
1FAD6F6B000
trusted library allocation
page read and write
1FAD780B000
trusted library allocation
page read and write
1FAD7880000
trusted library allocation
page read and write
1FADD989000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FAD6F9D000
trusted library allocation
page read and write
1FAD5C8C000
trusted library allocation
page read and write
1FADD8FD000
trusted library allocation
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FACC9A0000
heap
page read and write
1FAD59A0000
heap
page read and write
1FADF7AB000
trusted library allocation
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9BB000
heap
page read and write
1FADE0FB000
trusted library allocation
page read and write
1FADE2FE000
trusted library allocation
page read and write
1FAD538B000
trusted library allocation
page read and write
1FAD7870000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD939F000
trusted library allocation
page read and write
1FAD8578000
trusted library allocation
page read and write
1FACC9E8000
heap
page read and write
1FAD8370000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9BE000
heap
page read and write
1FAD77D7000
trusted library allocation
page read and write
1FAD688E000
trusted library allocation
page read and write
1FACC95D000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD7582000
trusted library allocation
page read and write
1FAD568E000
trusted library allocation
page read and write
1FAD2D73000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FAD78FB000
trusted library allocation
page read and write
1FAD796E000
trusted library allocation
page read and write
1FAD757D000
trusted library allocation
page read and write
1FADF642000
trusted library allocation
page read and write
1FAD6E2B000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FAD13B3000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
E1CC19E000
unkown
page readonly
1FACC992000
heap
page read and write
27A204F6000
heap
page read and write
1FAD8298000
trusted library allocation
page read and write
1FAD838B000
trusted library allocation
page read and write
1FAD784F000
trusted library allocation
page read and write
1FADE439000
trusted library allocation
page read and write
1FAD2A6F000
trusted library allocation
page read and write
1FAD8540000
trusted library allocation
page read and write
1FAD7514000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD68D6000
trusted library allocation
page read and write
1FAD56DE000
trusted library allocation
page read and write
EEA000
heap
page read and write
1FAD7B37000
trusted library allocation
page read and write
1FADDF5F000
trusted library allocation
page read and write
1FACC966000
heap
page read and write
1FACC97E000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FADD891000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FADF78A000
trusted library allocation
page read and write
1FAD6120000
trusted library allocation
page read and write
A32438E000
stack
page read and write
1FACC9A0000
heap
page read and write
1FACC9D7000
heap
page read and write
1FAE0341000
trusted library allocation
page read and write
1FAD6FC2000
trusted library allocation
page read and write
1FAD83F0000
trusted library allocation
page read and write
1FADE2E7000
trusted library allocation
page read and write
1FAD5EC3000
trusted library allocation
page read and write
1EB0DFE000
stack
page read and write
1FAD5CAC000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
7C4000
heap
page read and write
1FAD83B5000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD9436000
trusted library allocation
page read and write
1FAD705E000
trusted library allocation
page read and write
1FADDDC7000
trusted library allocation
page read and write
1FAD78E5000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAE0401000
trusted library allocation
page read and write
1FAD9462000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD5994000
heap
page read and write
1FACC9A7000
heap
page read and write
F2452FE000
unkown
page readonly
1FACC9C4000
heap
page read and write
1FAD5C5C000
trusted library allocation
page read and write
1FADF6FC000
trusted library allocation
page read and write
1FAD1ACB000
trusted library allocation
page read and write
1FADDA58000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD76BF000
trusted library allocation
page read and write
1FAD754B000
trusted library allocation
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FADDF62000
trusted library allocation
page read and write
1FAD82CC000
trusted library allocation
page read and write
1FAD75FA000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC990000
heap
page read and write
1FAD830A000
trusted library allocation
page read and write
1FAD5CCF000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD77C8000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAE0F6F000
trusted library allocation
page read and write
1FADE29E000
trusted library allocation
page read and write
1FAD7B4D000
trusted library allocation
page read and write
1FADDE9E000
trusted library allocation
page read and write
1E9805F6000
trusted library allocation
page read and write
1FAD81B2000
trusted library allocation
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FADF65A000
trusted library allocation
page read and write
28185E12000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD85B1000
trusted library allocation
page read and write
1FADE0DA000
trusted library allocation
page read and write
1FAD5664000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FADF67F000
trusted library allocation
page read and write
1FAD53DF000
trusted library allocation
page read and write
1FAD89C8000
trusted library allocation
page read and write
1FAD531B000
trusted library allocation
page read and write
1FAD6F8E000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FACC9E2000
heap
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FACC9CF000
heap
page read and write
1E980400000
trusted library allocation
page read and write
1FADE442000
trusted library allocation
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD7566000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD7942000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD13F9000
trusted library allocation
page read and write
1E980500000
trusted library allocation
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FAD2E09000
trusted library allocation
page read and write
1FAD2AC5000
trusted library allocation
page read and write
1FADF6B8000
trusted library allocation
page read and write
1FAD5E7E000
trusted library allocation
page read and write
1FAD85DF000
trusted library allocation
page read and write
1FAD6FC0000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD53AF000
trusted library allocation
page read and write
1FAD5304000
trusted library allocation
page read and write
1FAD7BEF000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FACC992000
heap
page read and write
28185C15000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC988000
heap
page read and write
1FACC9BE000
heap
page read and write
32B0000
heap
page read and write
1FACC992000
heap
page read and write
1FACC976000
heap
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FAD2EBC000
trusted library allocation
page read and write
1FAD6EBD000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD848C000
trusted library allocation
page read and write
1FADDFD6000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD777B000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADF62D000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FAE1775000
heap
page read and write
1FAD78E8000
trusted library allocation
page read and write
E1CC11E000
unkown
page readonly
1FAD68B4000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD76C5000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
330000
heap
page read and write
1FADF602000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC98B000
heap
page read and write
1FACC9BF000
heap
page read and write
1FADE0F6000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC96E000
heap
page read and write
1FACC990000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD6FBD000
trusted library allocation
page read and write
1FADDFF5000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FACC969000
heap
page read and write
1FAD5342000
trusted library allocation
page read and write
1FADDB88000
trusted library allocation
page read and write
1FAD7858000
trusted library allocation
page read and write
1FAD7710000
trusted library allocation
page read and write
1FAD563B000
trusted library allocation
page read and write
1AADE2AA000
heap
page read and write
1FAD79E9000
trusted library allocation
page read and write
27A2049D000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD893D000
trusted library allocation
page read and write
1FAD83DA000
trusted library allocation
page read and write
1FAD777B000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FADDFBE000
trusted library allocation
page read and write
1FAD6EAF000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC9DF000
heap
page read and write
1FACC992000
heap
page read and write
1FAD5C0A000
trusted library allocation
page read and write
1FAD847D000
trusted library allocation
page read and write
1FAD7970000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC99A000
heap
page read and write
7C4000
heap
page read and write
1FAD7929000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD686D000
trusted library allocation
page read and write
1FADDD27000
trusted library allocation
page read and write
1FACC985000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD2E2D000
trusted library allocation
page read and write
1FADD98B000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD784A000
trusted library allocation
page read and write
1FAD5365000
trusted library allocation
page read and write
1FADD87E000
trusted library allocation
page read and write
1FAD6F12000
trusted library allocation
page read and write
1FAD68EC000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAE00DD000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD8938000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FAE0FB6000
trusted library allocation
page read and write
1FD0003F000
trusted library allocation
page read and write
1FAD2DFC000
trusted library allocation
page read and write
1FAE036D000
trusted library allocation
page read and write
1FAD789A000
trusted library allocation
page read and write
1FAE0FB8000
trusted library allocation
page read and write
1FAD2E63000
trusted library allocation
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
27A1F970000
heap
page read and write
1FADD9C7000
trusted library allocation
page read and write
1FAD5CC4000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD56DE000
trusted library allocation
page read and write
1FADDABC000
trusted library allocation
page read and write
1FAE0386000
trusted library allocation
page read and write
1FACC9D6000
heap
page read and write
1FAD9DCE000
trusted library allocation
page read and write
1FADDD5D000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
27A20B2D000
heap
page read and write
1FAD53DA000
trusted library allocation
page read and write
1FADDC2A000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FACC9EC000
heap
page read and write
1FACC9A7000
heap
page read and write
27A1FD03000
trusted library allocation
page read and write
1FADDF35000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD753C000
trusted library allocation
page read and write
1E980200000
heap
page read and write
1FAD8480000
trusted library allocation
page read and write
1FAD597E000
heap
page read and write
1FAD81C6000
trusted library allocation
page read and write
1FAD6640000
trusted library allocation
page read and write
1FAD5D5F000
trusted library allocation
page read and write
1FAE02A3000
trusted library allocation
page read and write
1FAD78F7000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD5E3B000
trusted library allocation
page read and write
1FAD7C00000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
EFF000
heap
page read and write
27A1FDBA000
trusted library allocation
page read and write
1FAD139E000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADF6A2000
trusted library allocation
page read and write
1FAD2E80000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FACC970000
heap
page read and write
1FAD6E6C000
trusted library allocation
page read and write
1FAD13C3000
trusted library allocation
page read and write
1FAD8370000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD597F000
heap
page read and write
1FACC98B000
heap
page read and write
1FAD75E6000
trusted library allocation
page read and write
1FADDBC2000
trusted library allocation
page read and write
1FAE0F72000
trusted library allocation
page read and write
1FAD59F0000
heap
page read and write
1FAD9379000
trusted library allocation
page read and write
1FAD788F000
trusted library allocation
page read and write
1FAD5EFC000
trusted library allocation
page read and write
27A20500000
heap
page read and write
1FACC992000
heap
page read and write
1FACC980000
heap
page read and write
1FACC9BD000
heap
page read and write
1FAE00D6000
trusted library allocation
page read and write
1FAD8585000
trusted library allocation
page read and write
1FACC978000
heap
page read and write
1FAD53C1000
trusted library allocation
page read and write
27A1FD74000
trusted library allocation
page read and write
1FAD6FBD000
trusted library allocation
page read and write
1FAD85D9000
trusted library allocation
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD568E000
trusted library allocation
page read and write
27A2049A000
heap
page read and write
1FAD2E74000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD85A8000
trusted library allocation
page read and write
EC8000
heap
page read and write
1FAE179C000
heap
page read and write
1FADDCCB000
trusted library allocation
page read and write
1FAD7582000
trusted library allocation
page read and write
1FADDFDA000
trusted library allocation
page read and write
1FAD66DF000
trusted library allocation
page read and write
1FADE495000
trusted library allocation
page read and write
1FADDDD8000
trusted library allocation
page read and write
27A1FAD0000
heap
page read and write
1FACC9D1000
heap
page read and write
1FAE0287000
trusted library allocation
page read and write
1FADE0FB000
trusted library allocation
page read and write
1FAD2E83000
trusted library allocation
page read and write
1FADDED5000
trusted library allocation
page read and write
1FAD89C0000
trusted library allocation
page read and write
27A1FDE9000
trusted library allocation
page read and write
1FADE2E6000
trusted library allocation
page read and write
1FAE0F51000
trusted library allocation
page read and write
1FACC9BD000
heap
page read and write
1FACC9C5000
heap
page read and write
27A1FD77000
trusted library allocation
page read and write
1FAD8912000
trusted library allocation
page read and write
1FAD5995000
heap
page read and write
1FAE0074000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1E98058F000
trusted library allocation
page read and write
1FADDFCD000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FAD2E80000
trusted library allocation
page read and write
E1CC0DB000
stack
page read and write
1FACC992000
heap
page read and write
1FAD59A1000
heap
page read and write
1FAD6F7B000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD7AF6000
trusted library allocation
page read and write
1FAE0F5E000
trusted library allocation
page read and write
1FAD859B000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD6F60000
trusted library allocation
page read and write
1FAD8394000
trusted library allocation
page read and write
1FAE00CC000
trusted library allocation
page read and write
1FAD68EC000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD6F29000
trusted library allocation
page read and write
1FAD9E67000
trusted library allocation
page read and write
1FAD5C6A000
trusted library allocation
page read and write
1FAD7507000
trusted library allocation
page read and write
E9B000
stack
page read and write
1FACC9C8000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD5C7C000
trusted library allocation
page read and write
1FAD68EF000
trusted library allocation
page read and write
1FADDD5F000
trusted library allocation
page read and write
1FAD844C000
trusted library allocation
page read and write
1FAD8932000
trusted library allocation
page read and write
1FAD85D5000
trusted library allocation
page read and write
3601000
heap
page read and write
1FAD81FC000
trusted library allocation
page read and write
1FAD6630000
trusted library allocation
page read and write
1FAD2D65000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FAD9D6D000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD6137000
trusted library allocation
page read and write
1FAD7544000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
A325DFE000
stack
page read and write
1FAD848A000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD61D7000
trusted library allocation
page read and write
1FAD75BA000
trusted library allocation
page read and write
1FAD5C86000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD6FBD000
trusted library allocation
page read and write
1FAD664E000
trusted library allocation
page read and write
1FAD859B000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD942E000
trusted library allocation
page read and write
1FAD662D000
trusted library allocation
page read and write
1FAD56CE000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FAD78DE000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD85D9000
trusted library allocation
page read and write
27A1FCD0000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD77B9000
trusted library allocation
page read and write
EFF000
heap
page read and write
1FAE0FC3000
trusted library allocation
page read and write
27A20B44000
heap
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FAD5995000
heap
page read and write
1FACC9A0000
heap
page read and write
1FAD84F2000
trusted library allocation
page read and write
1FAD2E4A000
trusted library allocation
page read and write
1FAD7095000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD935A000
trusted library allocation
page read and write
1FAD9741000
trusted library allocation
page read and write
28185E00000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FAD6173000
trusted library allocation
page read and write
1FADE0AB000
trusted library allocation
page read and write
1FADE0FB000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD9491000
trusted library allocation
page read and write
1FAD5CAF000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FADD9D3000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD75A5000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FADDA19000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD79AC000
trusted library allocation
page read and write
1FAD6857000
trusted library allocation
page read and write
A326EFE000
stack
page read and write
1FAD5C96000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD7BD7000
trusted library allocation
page read and write
1FAD89B8000
trusted library allocation
page read and write
1FACC9E5000
heap
page read and write
1FAD6FC3000
trusted library allocation
page read and write
1FAD2D4E000
trusted library allocation
page read and write
1FAD86CF000
trusted library allocation
page read and write
1FAD7548000
trusted library allocation
page read and write
1FADFF55000
trusted library allocation
page read and write
1FAE0F80000
trusted library allocation
page read and write
1FADFF53000
trusted library allocation
page read and write
1FAD784A000
trusted library allocation
page read and write
1FAD7B67000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
27A204F8000
heap
page read and write
1FAD53B9000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC992000
heap
page read and write
1FACC97A000
heap
page read and write
1FACC9CD000
heap
page read and write
1FAD795E000
trusted library allocation
page read and write
1FAE00CB000
trusted library allocation
page read and write
1FADDC46000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD56F0000
trusted library allocation
page read and write
1FAD56F1000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD97C5000
trusted library allocation
page read and write
27A20B44000
heap
page read and write
1FAD68CF000
trusted library allocation
page read and write
1FAD2E6F000
trusted library allocation
page read and write
1FAD6FB5000
trusted library allocation
page read and write
1FAD1A9D000
trusted library allocation
page read and write
1E980517000
trusted library allocation
page read and write
1EB05FE000
stack
page read and write
1FADDA13000
trusted library allocation
page read and write
1FAD7544000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9BE000
heap
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FACC981000
heap
page read and write
1FAD6FC0000
trusted library allocation
page read and write
A3243CE000
unkown
page readonly
1FACC9ED000
heap
page read and write
1FADDFC0000
trusted library allocation
page read and write
1FAD2EB9000
trusted library allocation
page read and write
1FAE17B1000
heap
page read and write
1FADE483000
trusted library allocation
page read and write
1FAD6593000
trusted library allocation
page read and write
27A204F9000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD5D6F000
trusted library allocation
page read and write
1FADD9B1000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD784A000
trusted library allocation
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADDC39000
trusted library allocation
page read and write
1FAD5E5B000
trusted library allocation
page read and write
1FAD1A9A000
trusted library allocation
page read and write
1E9802F0000
heap
page read and write
1FACC9C4000
heap
page read and write
1FACC9E5000
heap
page read and write
1FACC988000
heap
page read and write
1FADDBBB000
trusted library allocation
page read and write
1E980800000
trusted library allocation
page read and write
1FAD5EBE000
trusted library allocation
page read and write
27A204BA000
heap
page read and write
1FAD612B000
trusted library allocation
page read and write
1FAD74F4000
trusted library allocation
page read and write
27A2050D000
heap
page read and write
1FADE280000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FACC992000
heap
page read and write
1E9801A0000
unclassified section
page readonly
1E980370000
heap
page readonly
1FAD5D4F000
trusted library allocation
page read and write
1FAE00EE000
trusted library allocation
page read and write
1FADDD89000
trusted library allocation
page read and write
EBE000
stack
page read and write
27A20B58000
heap
page read and write
1FAD5E39000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD6EBA000
trusted library allocation
page read and write
1FAD78E8000
trusted library allocation
page read and write
1FAE0343000
trusted library allocation
page read and write
1FAD79FE000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD6F82000
trusted library allocation
page read and write
1FAD810F000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD2D4E000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC9C6000
heap
page read and write
1FACC990000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD857C000
trusted library allocation
page read and write
1FAD2E74000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FADD8ED000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD668A000
trusted library allocation
page read and write
1FADF6FC000
trusted library allocation
page read and write
1FAD788D000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FAD2D58000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD61E0000
trusted library allocation
page read and write
E1CECBE000
stack
page read and write
1FACC9EA000
heap
page read and write
1FAD784F000
trusted library allocation
page read and write
1FAD2DF6000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FADD985000
trusted library allocation
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FAD943B000
trusted library allocation
page read and write
1FAD2E57000
trusted library allocation
page read and write
1FAD68E3000
trusted library allocation
page read and write
1AADE230000
heap
page read and write
1FAD685B000
trusted library allocation
page read and write
1FAD5991000
heap
page read and write
1FAD70E5000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD2EE4000
trusted library allocation
page read and write
1E9805DB000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD56DE000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAE1741000
heap
page read and write
1E9805B6000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD6F1B000
trusted library allocation
page read and write
27A20479000
heap
page read and write
1FACC9C9000
heap
page read and write
1FAD85DF000
trusted library allocation
page read and write
1FAD705C000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD6875000
trusted library allocation
page read and write
1FAD13EF000
trusted library allocation
page read and write
1FADDC46000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD77C6000
trusted library allocation
page read and write
1FAD8370000
trusted library allocation
page read and write
1FAD569A000
trusted library allocation
page read and write
1FAD81CD000
trusted library allocation
page read and write
1FAD2DF7000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FACC980000
heap
page read and write
1FACC9C8000
heap
page read and write
1FACC964000
heap
page read and write
1FAD1A13000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD7BEF000
trusted library allocation
page read and write
1FACC986000
heap
page read and write
1FAD7546000
trusted library allocation
page read and write
1FADDA3A000
trusted library allocation
page read and write
27A20B79000
heap
page read and write
1FACC975000
heap
page read and write
1FAD2E5D000
trusted library allocation
page read and write
1FAD79AE000
trusted library allocation
page read and write
1FADF6FA000
trusted library allocation
page read and write
1FAD539E000
trusted library allocation
page read and write
1FADDB70000
trusted library allocation
page read and write
1FAD5C86000
trusted library allocation
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FADDE4F000
trusted library allocation
page read and write
1FAD704D000
trusted library allocation
page read and write
1FAD59A1000
heap
page read and write
1FADDDAD000
trusted library allocation
page read and write
1AADE6E5000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FAD77CB000
trusted library allocation
page read and write
1FAD788F000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC9D7000
heap
page read and write
1FAD753C000
trusted library allocation
page read and write
1FADDDBA000
trusted library allocation
page read and write
1FAD6F19000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD6F33000
trusted library allocation
page read and write
1FAD5C9C000
trusted library allocation
page read and write
1FAD8929000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
28185B00000
trusted library allocation
page read and write
1FADDBBD000
trusted library allocation
page read and write
1FAD982C000
trusted library allocation
page read and write
1FAD5C8F000
trusted library allocation
page read and write
1FAD77D5000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FADE446000
trusted library allocation
page read and write
1FAD8578000
trusted library allocation
page read and write
1FADDECF000
trusted library allocation
page read and write
1FAD6F82000
trusted library allocation
page read and write
1FADE2BC000
trusted library allocation
page read and write
1FAD5EC3000
trusted library allocation
page read and write
1FAD756D000
trusted library allocation
page read and write
1FAD89FC000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FACC990000
heap
page read and write
1E980644000
heap
page read and write
1FAD77B1000
trusted library allocation
page read and write
1FAD5EBB000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD6FBF000
trusted library allocation
page read and write
1FACC969000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD7766000
trusted library allocation
page read and write
1FAD1A1B000
trusted library allocation
page read and write
1FAD1AE4000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FACC9C8000
heap
page read and write
1FACC997000
heap
page read and write
1FAD5D63000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD8600000
trusted library allocation
page read and write
1FACC9E4000
heap
page read and write
1FADDF56000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9BB000
heap
page read and write
28185E5D000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FADDDF7000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FAD2E5D000
trusted library allocation
page read and write
1FAE00BA000
trusted library allocation
page read and write
1FAD618E000
trusted library allocation
page read and write
1FAD83DA000
trusted library allocation
page read and write
1FADE0ED000
trusted library allocation
page read and write
1FAD2E8C000
trusted library allocation
page read and write
1FADDF65000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAE0F51000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADDED7000
trusted library allocation
page read and write
1FACC968000
heap
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FAD785B000
trusted library allocation
page read and write
1FADDECF000
trusted library allocation
page read and write
1FADE26B000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC992000
heap
page read and write
1FACC97A000
heap
page read and write
1FAD84F6000
trusted library allocation
page read and write
27A20A17000
trusted library allocation
page read and write
1FAD7085000
trusted library allocation
page read and write
1FAD2EE3000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
32B4000
heap
page read and write
1FACC992000
heap
page read and write
1FADE22B000
trusted library allocation
page read and write
1FADD8C5000
trusted library allocation
page read and write
1FAD758D000
trusted library allocation
page read and write
1FAD59AF000
heap
page read and write
1FACC9C4000
heap
page read and write
1FADF4FA000
trusted library allocation
page read and write
1FADE0F0000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD75AB000
trusted library allocation
page read and write
1FAD59A1000
heap
page read and write
1FADF7B3000
trusted library allocation
page read and write
1FADFF38000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD6E7D000
trusted library allocation
page read and write
27A1F95E000
remote allocation
page execute read
1FAD84B0000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD5D8B000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD97AC000
trusted library allocation
page read and write
1FAD688B000
trusted library allocation
page read and write
1FAD79FC000
trusted library allocation
page read and write
1E980803000
trusted library allocation
page read and write
27A1FC50000
trusted library section
page readonly
1FADDDAA000
trusted library allocation
page read and write
1FADDBCF000
trusted library allocation
page read and write
1FAD1B00000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1E980570000
trusted library allocation
page read and write
1FAD5EBB000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FADF4EA000
trusted library allocation
page read and write
1FACC9EA000
heap
page read and write
1FACC9C5000
heap
page read and write
1FAD5EFC000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD6E38000
trusted library allocation
page read and write
1FAD6E67000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD5991000
heap
page read and write
1FAD77FC000
trusted library allocation
page read and write
1E980530000
trusted library allocation
page read and write
1FADD8A9000
trusted library allocation
page read and write
1FAD6FC2000
trusted library allocation
page read and write
1FAE1821000
heap
page read and write
1FADF7F3000
trusted library allocation
page read and write
1FAD5C81000
trusted library allocation
page read and write
1FAD2A9A000
trusted library allocation
page read and write
1FADDFBA000
trusted library allocation
page read and write
1FACC96F000
heap
page read and write
1FAD6FC2000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD9E8A000
trusted library allocation
page read and write
281858C0000
heap
page readonly
1FAD5E49000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD77A6000
trusted library allocation
page read and write
1FADD9B5000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC9CD000
heap
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FADDD9F000
trusted library allocation
page read and write
1FAD70F8000
trusted library allocation
page read and write
1FAD8938000
trusted library allocation
page read and write
1FAD2EE6000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC980000
heap
page read and write
1FADE444000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FADDFBC000
trusted library allocation
page read and write
1FAD85A8000
trusted library allocation
page read and write
1FAD5E4B000
trusted library allocation
page read and write
1FAD7267000
trusted library allocation
page read and write
1FADD8BB000
trusted library allocation
page read and write
1FADD93C000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC99A000
heap
page read and write
1FADE448000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD777B000
trusted library allocation
page read and write
1FAD75BD000
trusted library allocation
page read and write
1FAD85C2000
trusted library allocation
page read and write
1FAD9786000
trusted library allocation
page read and write
1FAD9441000
trusted library allocation
page read and write
28185EB7000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD7880000
trusted library allocation
page read and write
1FAD2E7E000
trusted library allocation
page read and write
1FAD5C9A000
trusted library allocation
page read and write
1FAD1A7E000
trusted library allocation
page read and write
1FAD5662000
trusted library allocation
page read and write
193BAA00000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD7929000
trusted library allocation
page read and write
1FADDF30000
trusted library allocation
page read and write
1FAD7998000
trusted library allocation
page read and write
27A204F0000
heap
page read and write
1FAD6647000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD8938000
trusted library allocation
page read and write
1FAD68BB000
trusted library allocation
page read and write
1FACC9AC000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD53B2000
trusted library allocation
page read and write
1FAD84F6000
trusted library allocation
page read and write
1FAD77F9000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC9E5000
heap
page read and write
1FAD8345000
trusted library allocation
page read and write
1FAD13A6000
trusted library allocation
page read and write
1FAD6F82000
trusted library allocation
page read and write
1FACC9E3000
heap
page read and write
28185E6A000
trusted library allocation
page read and write
1FAD7898000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC974000
heap
page read and write
1FADDB80000
trusted library allocation
page read and write
1E98050E000
trusted library allocation
page read and write
1FAD8591000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FADDF58000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD75A5000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD8919000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAE0F3B000
trusted library allocation
page read and write
1FADDAA3000
trusted library allocation
page read and write
28185E47000
trusted library allocation
page read and write
1FADD8C5000
trusted library allocation
page read and write
1FAD66DF000
trusted library allocation
page read and write
1FACC995000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD5972000
heap
page read and write
F241FBE000
unkown
page readonly
1FAD704E000
trusted library allocation
page read and write
1FACC9D0000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD5362000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FADDBA1000
trusted library allocation
page read and write
27A1FD68000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
28185C00000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD29CA000
trusted library allocation
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FADE094000
trusted library allocation
page read and write
2818585A000
heap
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FAD84FE000
trusted library allocation
page read and write
1FADD9B3000
trusted library allocation
page read and write
1FAD77D5000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD7540000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC988000
heap
page read and write
1FAD9E37000
trusted library allocation
page read and write
1FAE0076000
trusted library allocation
page read and write
1FADDDB4000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FAD773F000
trusted library allocation
page read and write
27A1F8E0000
unclassified section
page readonly
1FAD68EF000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
28185E6E000
trusted library allocation
page read and write
1FADF4FC000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD535D000
trusted library allocation
page read and write
1FAD61D6000
trusted library allocation
page read and write
1FAD688B000
trusted library allocation
page read and write
1FAD665D000
trusted library allocation
page read and write
1FADE42C000
trusted library allocation
page read and write
1FADF4E6000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD7843000
trusted library allocation
page read and write
1FADD932000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FAD708E000
trusted library allocation
page read and write
1FADDDB7000
trusted library allocation
page read and write
27A2050D000
heap
page read and write
1FAD66A4000
trusted library allocation
page read and write
1ABE000
stack
page read and write
7C4000
heap
page read and write
1FAD8941000
trusted library allocation
page read and write
1FAD5970000
heap
page read and write
27A1FD9F000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC96E000
heap
page read and write
1FACC990000
heap
page read and write
1FAD53F2000
trusted library allocation
page read and write
1FAD6640000
trusted library allocation
page read and write
1E98055F000
trusted library allocation
page read and write
1FAD7092000
trusted library allocation
page read and write
1FAD8136000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD5304000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD56AB000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD2DBC000
trusted library allocation
page read and write
1FAD7085000
trusted library allocation
page read and write
1FAD2E50000
trusted library allocation
page read and write
1FAD5D66000
trusted library allocation
page read and write
1FADDEDD000
trusted library allocation
page read and write
1FADF781000
trusted library allocation
page read and write
1FAD780F000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC992000
heap
page read and write
1FACC96E000
heap
page read and write
1FACC992000
heap
page read and write
A3265FE000
unkown
page readonly
1FAD8599000
trusted library allocation
page read and write
1FADDD97000
trusted library allocation
page read and write
1FAD6898000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD56F1000
trusted library allocation
page read and write
28185E67000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD6E46000
trusted library allocation
page read and write
1FAD705E000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FAD5677000
trusted library allocation
page read and write
1FAD77F4000
trusted library allocation
page read and write
1FAD84E3000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD89AB000
trusted library allocation
page read and write
27A1FDC2000
trusted library allocation
page read and write
1FAD5E83000
trusted library allocation
page read and write
1FADD900000
trusted library allocation
page read and write
EEC000
heap
page read and write
1FACC9D7000
heap
page read and write
1FAD857C000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FADDD4C000
trusted library allocation
page read and write
1FAD76BC000
trusted library allocation
page read and write
1FACC987000
heap
page read and write
1FAD974D000
trusted library allocation
page read and write
1FAD834B000
trusted library allocation
page read and write
1FAD56C2000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FAD8534000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD5ED0000
trusted library allocation
page read and write
1FAD6F89000
trusted library allocation
page read and write
1FACC9CF000
heap
page read and write
1FAD5E97000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FAD7961000
trusted library allocation
page read and write
1FAD597F000
heap
page read and write
1FACC98A000
heap
page read and write
1FACC992000
heap
page read and write
1FAD2E8C000
trusted library allocation
page read and write
1FADFF28000
trusted library allocation
page read and write
1FAD5657000
trusted library allocation
page read and write
1FACC994000
heap
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD754F000
trusted library allocation
page read and write
1FAD56F1000
trusted library allocation
page read and write
EF2000
heap
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FAD8348000
trusted library allocation
page read and write
1E98055D000
trusted library allocation
page read and write
1FAD6F38000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC96A000
heap
page read and write
281858E0000
heap
page read and write
1FAD6EB6000
trusted library allocation
page read and write
1FAD85CC000
trusted library allocation
page read and write
1FAD774D000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FACC9BB000
heap
page read and write
1FADE286000
trusted library allocation
page read and write
1FAD7783000
trusted library allocation
page read and write
1FAD970C000
trusted library allocation
page read and write
1FAD82AF000
trusted library allocation
page read and write
1FADE2D1000
trusted library allocation
page read and write
1FAD7811000
trusted library allocation
page read and write
1FAD9857000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
E1D04BE000
unkown
page readonly
AA4000
unkown
page readonly
1FACC9DF000
heap
page read and write
1E980549000
trusted library allocation
page read and write
1FAD567B000
trusted library allocation
page read and write
1FAD19FB000
trusted library allocation
page read and write
1FAD79E9000
trusted library allocation
page read and write
1FAD85C2000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD7057000
trusted library allocation
page read and write
1FAD778A000
trusted library allocation
page read and write
1FAE042C000
trusted library allocation
page read and write
1FACC995000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FAD2EFB000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FADDBF6000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FADDFDC000
trusted library allocation
page read and write
1FAD77C8000
trusted library allocation
page read and write
EEF000
heap
page read and write
1FAD569A000
trusted library allocation
page read and write
1FAE030C000
trusted library allocation
page read and write
1FAD82B8000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
990000
heap
page read and write
1FADDBE9000
trusted library allocation
page read and write
1FAD5C57000
trusted library allocation
page read and write
1FAD8486000
trusted library allocation
page read and write
1FAD7858000
trusted library allocation
page read and write
1FAD686D000
trusted library allocation
page read and write
1FAD5EB9000
trusted library allocation
page read and write
1FAD5EA5000
trusted library allocation
page read and write
1FAD7B3D000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAE00CE000
trusted library allocation
page read and write
27A2050D000
heap
page read and write
27A20470000
heap
page read and write
1FACC97A000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD7B6F000
trusted library allocation
page read and write
1FAD860F000
trusted library allocation
page read and write
1FADE29A000
trusted library allocation
page read and write
193BAA07000
trusted library allocation
page read and write
1FACC9C9000
heap
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FADF4CD000
trusted library allocation
page read and write
1FADE29E000
trusted library allocation
page read and write
27A204F8000
heap
page read and write
1FACC975000
heap
page read and write
1FAD7797000
trusted library allocation
page read and write
1FAD776B000
trusted library allocation
page read and write
1FAE1305000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD7858000
trusted library allocation
page read and write
1FAD9707000
trusted library allocation
page read and write
28185E23000
trusted library allocation
page read and write
1FAD76B7000
trusted library allocation
page read and write
1FAD56CD000
trusted library allocation
page read and write
1FACC95D000
heap
page read and write
1FAD76D7000
trusted library allocation
page read and write
1FADDA3E000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FACC970000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC97A000
heap
page read and write
1FAD2E2D000
trusted library allocation
page read and write
27A20281000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD2D58000
trusted library allocation
page read and write
1FADE2CA000
trusted library allocation
page read and write
1FAD78E8000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD77B0000
trusted library allocation
page read and write
27A204AC000
heap
page read and write
1FACC9D2000
heap
page read and write
1FACC98A000
heap
page read and write
1FACC980000
heap
page read and write
3A21FFE000
stack
page read and write
1FAD7572000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
27A1FD0C000
trusted library allocation
page read and write
1E980564000
trusted library allocation
page read and write
1FAD5EBB000
trusted library allocation
page read and write
1FAD943B000
trusted library allocation
page read and write
1FAD797E000
trusted library allocation
page read and write
1FADD8B5000
trusted library allocation
page read and write
1FAD56A5000
trusted library allocation
page read and write
1FAD930D000
trusted library allocation
page read and write
1FADFF9F000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD7818000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FAD758F000
trusted library allocation
page read and write
1AADFF97000
heap
page read and write
27A20B59000
heap
page read and write
1FAD5C0F000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC9C6000
heap
page read and write
1FADDB30000
trusted library allocation
page read and write
1FADE474000
trusted library allocation
page read and write
1FAD6E6C000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD56A7000
trusted library allocation
page read and write
1FACC9BD000
heap
page read and write
1FACC980000
heap
page read and write
1FAD6E89000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD68E3000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FADD916000
trusted library allocation
page read and write
1FAD77BA000
trusted library allocation
page read and write
1FADE0D2000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9CC000
heap
page read and write
1AADE2A0000
heap
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FAD2AAD000
trusted library allocation
page read and write
1FAD5EA9000
trusted library allocation
page read and write
1FAD6FB3000
trusted library allocation
page read and write
1FADDE8D000
trusted library allocation
page read and write
1FAD77D9000
trusted library allocation
page read and write
1FAD5D5D000
trusted library allocation
page read and write
1FAD68D8000
trusted library allocation
page read and write
1FAD2AB1000
trusted library allocation
page read and write
1FAD6E3A000
trusted library allocation
page read and write
1FAD5970000
heap
page read and write
1FAD6F7E000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD5979000
heap
page read and write
1FAD5975000
heap
page read and write
1FACC9C6000
heap
page read and write
1FACC96B000
heap
page read and write
1FADDF67000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
9D0000
unkown
page readonly
1FAD78E3000
trusted library allocation
page read and write
1FAD2E5A000
trusted library allocation
page read and write
A3266BE000
stack
page read and write
1FADE2DA000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FADD989000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD7BB2000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FACC9E5000
heap
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD56B6000
trusted library allocation
page read and write
1FAD786D000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAE0FD4000
trusted library allocation
page read and write
1FADFF9D000
trusted library allocation
page read and write
1FAD2A68000
trusted library allocation
page read and write
1FADD8AC000
trusted library allocation
page read and write
1FADE495000
trusted library allocation
page read and write
1FAD566F000
trusted library allocation
page read and write
1FAD778B000
trusted library allocation
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FAD5991000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FADDBDE000
trusted library allocation
page read and write
1FADDE9E000
trusted library allocation
page read and write
1FADDDC0000
trusted library allocation
page read and write
1FAD7942000
trusted library allocation
page read and write
1FAD8356000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC992000
heap
page read and write
1FAD7BEF000
trusted library allocation
page read and write
32A859824000
trusted library allocation
page read and write
1FAD5306000
trusted library allocation
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAD664B000
trusted library allocation
page read and write
1FADDBD3000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD5D86000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD61EB000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD5669000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD5E5E000
trusted library allocation
page read and write
1E980180000
remote allocation
page read and write
1FAD7085000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD936F000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD8574000
trusted library allocation
page read and write
1FAD7546000
trusted library allocation
page read and write
1FAD93A1000
trusted library allocation
page read and write
1FAD834B000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FADDC55000
trusted library allocation
page read and write
1FAD785A000
trusted library allocation
page read and write
1FADFF28000
trusted library allocation
page read and write
1FADDF4E000
trusted library allocation
page read and write
1FAD53E4000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FAD7BA3000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
1FADDCFD000
trusted library allocation
page read and write
F2442FE000
unkown
page readonly
1FAD7B3B000
trusted library allocation
page read and write
1FAD77D2000
trusted library allocation
page read and write
1FAD6E67000
trusted library allocation
page read and write
1FADDFEF000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD5378000
trusted library allocation
page read and write
E7E000
stack
page read and write
1FAD77FE000
trusted library allocation
page read and write
27A20470000
heap
page read and write
1FAD81F2000
trusted library allocation
page read and write
1FAD786D000
trusted library allocation
page read and write
1FAD7746000
trusted library allocation
page read and write
1FADE0C5000
trusted library allocation
page read and write
1FAD777B000
trusted library allocation
page read and write
1FAD2E29000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC98E000
heap
page read and write
1FAD5D8C000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC980000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD7851000
trusted library allocation
page read and write
1FAD89DA000
trusted library allocation
page read and write
1FADD9B3000
trusted library allocation
page read and write
27A2049A000
heap
page read and write
1FAD6F95000
trusted library allocation
page read and write
1FAD5669000
trusted library allocation
page read and write
1FAD2E10000
trusted library allocation
page read and write
1FAD83C2000
trusted library allocation
page read and write
1FAD8600000
trusted library allocation
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FAD7077000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD567D000
trusted library allocation
page read and write
28185EA7000
trusted library allocation
page read and write
1FADE2FE000
trusted library allocation
page read and write
1FAD65E3000
trusted library allocation
page read and write
1FADDDBB000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD77F6000
trusted library allocation
page read and write
1FAD85CC000
trusted library allocation
page read and write
1FAD8488000
trusted library allocation
page read and write
1FAD2A60000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FADDF69000
trusted library allocation
page read and write
1FAD2EE4000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD7061000
trusted library allocation
page read and write
1FAD2D6B000
trusted library allocation
page read and write
1FAD784A000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD86D1000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD68F6000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC992000
heap
page read and write
1FADF487000
trusted library allocation
page read and write
1FAD1A75000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FADDD53000
trusted library allocation
page read and write
7C4000
heap
page read and write
1E980120000
unclassified section
page readonly
1FAD7077000
trusted library allocation
page read and write
1FAD6FBD000
trusted library allocation
page read and write
1FAD1A90000
trusted library allocation
page read and write
1FAD6EA9000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD82C2000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC990000
heap
page read and write
1FAD6F89000
trusted library allocation
page read and write
1FAE034D000
trusted library allocation
page read and write
1FAD61FA000
trusted library allocation
page read and write
27A20410000
heap
page read and write
9D1000
unkown
page execute read
1FAD5D81000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD61FA000
trusted library allocation
page read and write
1FAD79DA000
trusted library allocation
page read and write
1FAD597D000
heap
page read and write
1FAD5975000
heap
page read and write
A3286FE000
unkown
page readonly
1FACC96B000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD5EBE000
trusted library allocation
page read and write
1FADF45F000
trusted library allocation
page read and write
28185C0F000
trusted library allocation
page read and write
1FADDEDB000
trusted library allocation
page read and write
27A20411000
heap
page read and write
1FAD9E05000
trusted library allocation
page read and write
1FAD7066000
trusted library allocation
page read and write
1FAD2EAF000
trusted library allocation
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FACC9ED000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD8599000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FADE28A000
trusted library allocation
page read and write
1FAD9310000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FADE483000
trusted library allocation
page read and write
1FADDDB2000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD5C86000
trusted library allocation
page read and write
1FAD7BA1000
trusted library allocation
page read and write
27A1FD81000
trusted library allocation
page read and write
27A204F6000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC97A000
heap
page read and write
1FACC9BD000
heap
page read and write
1FAD7977000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD774E000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD59A0000
heap
page read and write
1FACC98A000
heap
page read and write
1FAD7066000
trusted library allocation
page read and write
1FAD727B000
trusted library allocation
page read and write
1FADF49B000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FAD7986000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FACC9E0000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD68E3000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD799C000
trusted library allocation
page read and write
27A20470000
heap
page read and write
1FAE0348000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FAD70FE000
trusted library allocation
page read and write
1FAD857C000
trusted library allocation
page read and write
1FACC96F000
heap
page read and write
1FAD5975000
heap
page read and write
1EB15FE000
stack
page read and write
1FAD2AA8000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD6F3A000
trusted library allocation
page read and write
2B2ED7D1000
trusted library allocation
page execute read
1FAD7993000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
2B2ED6EC000
trusted library allocation
page execute read
1FACC9C8000
heap
page read and write
1FACC982000
heap
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FACC975000
heap
page read and write
1FACC9E4000
heap
page read and write
27A20B21000
heap
page read and write
1FACC964000
heap
page read and write
28185ECB000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD89F5000
trusted library allocation
page read and write
1FAD2EE4000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FACC97F000
heap
page read and write
1FAD982E000
trusted library allocation
page read and write
27A20479000
heap
page read and write
1FAD847D000
trusted library allocation
page read and write
1FAD70F8000
trusted library allocation
page read and write
1FAD5662000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD755E000
trusted library allocation
page read and write
1FAD84F2000
trusted library allocation
page read and write
1FAE0406000
trusted library allocation
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD61FA000
trusted library allocation
page read and write
1FAD1A19000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD74F2000
trusted library allocation
page read and write
1FAD7AF6000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FACC9D0000
heap
page read and write
1FAD7769000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FAD6F5E000
trusted library allocation
page read and write
27A2048F000
heap
page read and write
1FAD70FE000
trusted library allocation
page read and write
1FAD78E3000
trusted library allocation
page read and write
1E980503000
trusted library allocation
page read and write
1FADDFC0000
trusted library allocation
page read and write
1FAD7296000
trusted library allocation
page read and write
1FAD7537000
trusted library allocation
page read and write
E1CCBD8000
stack
page read and write
1FADDD06000
trusted library allocation
page read and write
1FAD5669000
trusted library allocation
page read and write
1FAD56C9000
trusted library allocation
page read and write
1FAD2A80000
trusted library allocation
page read and write
1FADDC4E000
trusted library allocation
page read and write
1FAD68F1000
trusted library allocation
page read and write
1FAD8361000
trusted library allocation
page read and write
1FADDF8C000
trusted library allocation
page read and write
1FAD89AE000
trusted library allocation
page read and write
1FAD6F6B000
trusted library allocation
page read and write
3A20FFC000
stack
page read and write
1FAE00D4000
trusted library allocation
page read and write
1FAD708E000
trusted library allocation
page read and write
1FAD79BE000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD70C3000
trusted library allocation
page read and write
1FAD75AE000
trusted library allocation
page read and write
1FADDDFC000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FACC9E5000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC9A7000
heap
page read and write
1FADDD71000
trusted library allocation
page read and write
1FAD53E7000
trusted library allocation
page read and write
1FAD7B5E000
trusted library allocation
page read and write
1FAD784F000
trusted library allocation
page read and write
EF2000
heap
page read and write
1FAE13AC000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FACC9BB000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD13DF000
trusted library allocation
page read and write
1FAD728F000
trusted library allocation
page read and write
1FAD7559000
trusted library allocation
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FAD6F3A000
trusted library allocation
page read and write
2B2ED7B1000
trusted library allocation
page execute read
1FAD6E8C000
trusted library allocation
page read and write
1FAD76CA000
trusted library allocation
page read and write
1FAD75FA000
trusted library allocation
page read and write
1FAD77F5000
trusted library allocation
page read and write
1FAD778F000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD775C000
trusted library allocation
page read and write
E1CFCBE000
stack
page read and write
27A20500000
heap
page read and write
1FAD85C2000
trusted library allocation
page read and write
27A20500000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC9DF000
heap
page read and write
1FAD816D000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD9E50000
trusted library allocation
page read and write
1FADDEDD000
trusted library allocation
page read and write
1FADDED7000
trusted library allocation
page read and write
1FAD79B7000
trusted library allocation
page read and write
1FAE03A7000
trusted library allocation
page read and write
1FAE0F92000
trusted library allocation
page read and write
1FAD79B7000
trusted library allocation
page read and write
1FADDDA2000
trusted library allocation
page read and write
1FAD78BC000
trusted library allocation
page read and write
281858DF000
unclassified section
page read and write
1FAD70E9000
trusted library allocation
page read and write
1FAD65C7000
trusted library allocation
page read and write
1FAD5392000
trusted library allocation
page read and write
1FADDE4F000
trusted library allocation
page read and write
27A20B3B000
heap
page read and write
1FAD7546000
trusted library allocation
page read and write
1FAD6831000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FAD7057000
trusted library allocation
page read and write
1FAD7852000
trusted library allocation
page read and write
1FAD567B000
trusted library allocation
page read and write
27A20B77000
heap
page read and write
1FAD7092000
trusted library allocation
page read and write
1FAD6888000
trusted library allocation
page read and write
1FAD7064000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADE483000
trusted library allocation
page read and write
1FAD7085000
trusted library allocation
page read and write
1AADE6E0000
heap
page read and write
F244AFE000
stack
page read and write
1FAE131C000
trusted library allocation
page read and write
1FAD7505000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAD77CB000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
28185900000
unclassified section
page readonly
1FAD2DFC000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FAD78F3000
trusted library allocation
page read and write
3600000
heap
page read and write
1FADA602000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAD7AD7000
trusted library allocation
page read and write
1FAD709B000
trusted library allocation
page read and write
1FAD85B1000
trusted library allocation
page read and write
1FAD566F000
trusted library allocation
page read and write
1FADE0DC000
trusted library allocation
page read and write
1FACC9C6000
heap
page read and write
1FAD56C7000
trusted library allocation
page read and write
1FAD2E10000
trusted library allocation
page read and write
1FAD750A000
trusted library allocation
page read and write
1FAD8372000
trusted library allocation
page read and write
1FAD78D5000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FAD8340000
trusted library allocation
page read and write
1FAD2E6F000
trusted library allocation
page read and write
1FADE08C000
trusted library allocation
page read and write
1FADF7BE000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD9468000
trusted library allocation
page read and write
1FADE0F0000
trusted library allocation
page read and write
1FAD78B9000
trusted library allocation
page read and write
27A20500000
heap
page read and write
1FACC990000
heap
page read and write
1FAE17BC000
heap
page read and write
1FAD8131000
trusted library allocation
page read and write
1FADFF50000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD5C94000
trusted library allocation
page read and write
1FAD6F08000
trusted library allocation
page read and write
1FAD8591000
trusted library allocation
page read and write
1FAD6F9B000
trusted library allocation
page read and write
1FAD7548000
trusted library allocation
page read and write
1FADD931000
trusted library allocation
page read and write
1FAD8484000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC9F1000
heap
page read and write
1FACC9D0000
heap
page read and write
1E980110000
unclassified section
page readonly
1FACC964000
heap
page read and write
1FACC97A000
heap
page read and write
1FAD9748000
trusted library allocation
page read and write
27A20479000
heap
page read and write
1FADE0BA000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC98B000
heap
page read and write
1FACC990000
heap
page read and write
1EB25FF000
stack
page read and write
1FAD2EC3000
trusted library allocation
page read and write
1FAD79DE000
trusted library allocation
page read and write
1FAD5997000
heap
page read and write
27A20B77000
heap
page read and write
A327EFE000
stack
page read and write
1FAD83DA000
trusted library allocation
page read and write
1FAD7893000
trusted library allocation
page read and write
1FACC9EB000
heap
page read and write
1FACC964000
heap
page read and write
1FAD2DFC000
trusted library allocation
page read and write
1FAD2E20000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAE17F9000
heap
page read and write
1FAD5975000
heap
page read and write
1FAD2EF4000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADDFE2000
trusted library allocation
page read and write
1FACC995000
heap
page read and write
1FAD5674000
trusted library allocation
page read and write
1FAD796B000
trusted library allocation
page read and write
1FADE0AD000
trusted library allocation
page read and write
1FACC968000
heap
page read and write
1FACC9BB000
heap
page read and write
1E980380000
unclassified section
page read and write
A3276FE000
unkown
page readonly
1FAD8625000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD70A3000
trusted library allocation
page read and write
1FADDED9000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
F24537E000
stack
page read and write
1FAD76A3000
trusted library allocation
page read and write
1FAD70FE000
trusted library allocation
page read and write
1FAD5D5D000
trusted library allocation
page read and write
1FAD7533000
trusted library allocation
page read and write
1FADD9B5000
trusted library allocation
page read and write
1FAD68F3000
trusted library allocation
page read and write
7C4000
heap
page read and write
1AADE2C2000
heap
page read and write
1FAD68F3000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAE17B1000
heap
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FADDDF3000
trusted library allocation
page read and write
1FAD2EE6000
trusted library allocation
page read and write
1FAD6F16000
trusted library allocation
page read and write
1FAD2EB7000
trusted library allocation
page read and write
1FAD85D5000
trusted library allocation
page read and write
1FADDC59000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD75FA000
trusted library allocation
page read and write
1FADDFE5000
trusted library allocation
page read and write
1FAD5D4B000
trusted library allocation
page read and write
1FACC972000
heap
page read and write
27A2046C000
heap
page read and write
1FACC992000
heap
page read and write
1FADDD94000
trusted library allocation
page read and write
1FAD9424000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD7854000
trusted library allocation
page read and write
9D0000
unkown
page readonly
1FADDED1000
trusted library allocation
page read and write
1FADDDB2000
trusted library allocation
page read and write
1FADF689000
trusted library allocation
page read and write
1FAD94C6000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FADDFD8000
trusted library allocation
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FAD2EA3000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD705E000
trusted library allocation
page read and write
1FACC96B000
heap
page read and write
1FAD8392000
trusted library allocation
page read and write
1FADDED1000
trusted library allocation
page read and write
1FAD2EFB000
trusted library allocation
page read and write
1FADDBFD000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FADE0C2000
trusted library allocation
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FADE26E000
trusted library allocation
page read and write
1FAD5994000
heap
page read and write
1FAD78BC000
trusted library allocation
page read and write
9D1000
unkown
page execute read
1FAD77ED000
trusted library allocation
page read and write
1FAD8941000
trusted library allocation
page read and write
1FAD833C000
trusted library allocation
page read and write
1FAD2DE7000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD53C6000
trusted library allocation
page read and write
1FADDF67000
trusted library allocation
page read and write
1FAD85CC000
trusted library allocation
page read and write
F2473BE000
unkown
page readonly
27A20B77000
heap
page read and write
1FAD70CC000
trusted library allocation
page read and write
1FAD2E50000
trusted library allocation
page read and write
1FAE00D9000
trusted library allocation
page read and write
1FAD6F7B000
trusted library allocation
page read and write
1FADE096000
trusted library allocation
page read and write
1FAD5E8C000
trusted library allocation
page read and write
1FAD8574000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADDB2E000
trusted library allocation
page read and write
1FAE0F00000
trusted library allocation
page read and write
1FAD6FAE000
trusted library allocation
page read and write
1FAD6649000
trusted library allocation
page read and write
1FAD77F9000
trusted library allocation
page read and write
1FADF7F7000
trusted library allocation
page read and write
1FAD8482000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FACC970000
heap
page read and write
1FAD93D4000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9D8000
heap
page read and write
1FAD78E5000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD77B9000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FAD9DF1000
trusted library allocation
page read and write
1FAD6868000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FADE29E000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD1381000
trusted library allocation
page read and write
1FAD6E30000
trusted library allocation
page read and write
1FACC9D6000
heap
page read and write
1FADDFDF000
trusted library allocation
page read and write
1FAD93C2000
trusted library allocation
page read and write
2B2ED711000
trusted library allocation
page execute read
1FACC980000
heap
page read and write
27A1FCC6000
heap
page read and write
1FAD7077000
trusted library allocation
page read and write
1FAD75BC000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD5EB0000
trusted library allocation
page read and write
1FAD9743000
trusted library allocation
page read and write
1FAD9374000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD56A0000
trusted library allocation
page read and write
1FACC994000
heap
page read and write
1FADF6E8000
trusted library allocation
page read and write
1FAD779C000
trusted library allocation
page read and write
1FAD5E87000
trusted library allocation
page read and write
1FAD7B7E000
trusted library allocation
page read and write
1FAD5D86000
trusted library allocation
page read and write
1E9805D6000
trusted library allocation
page read and write
1FADDA51000
trusted library allocation
page read and write
1FAD70D3000
trusted library allocation
page read and write
1FAD2A60000
trusted library allocation
page read and write
1FAD7788000
trusted library allocation
page read and write
1FAD7BB2000
trusted library allocation
page read and write
27A20260000
heap
page read and write
1FAD82CC000
trusted library allocation
page read and write
1FAD9705000
trusted library allocation
page read and write
1FAD6FC8000
trusted library allocation
page read and write
1FAD2E74000
trusted library allocation
page read and write
1FAD784F000
trusted library allocation
page read and write
1FAD819A000
trusted library allocation
page read and write
1FADE0EC000
trusted library allocation
page read and write
1FADDBE5000
trusted library allocation
page read and write
1FAD77CA000
trusted library allocation
page read and write
1FADDED3000
trusted library allocation
page read and write
1FADF6FA000
trusted library allocation
page read and write
1FAE0F3D000
trusted library allocation
page read and write
1FACC9D1000
heap
page read and write
1FACC988000
heap
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAD68B7000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD6EB2000
trusted library allocation
page read and write
1FAD8581000
trusted library allocation
page read and write
1FAD1390000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC97A000
heap
page read and write
1FAD85B1000
trusted library allocation
page read and write
1FADDDE0000
trusted library allocation
page read and write
27A1FCC0000
heap
page read and write
1FAD8574000
trusted library allocation
page read and write
1FACC9D0000
heap
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
281858D2000
unclassified section
page read and write
1FAD5C81000
trusted library allocation
page read and write
1FAD6F5E000
trusted library allocation
page read and write
1FAD5EA2000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FADF7EF000
trusted library allocation
page read and write
1FADFF99000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADDFD8000
trusted library allocation
page read and write
1FAD7813000
trusted library allocation
page read and write
1FACC995000
heap
page read and write
A9C000
unkown
page read and write
1FACC988000
heap
page read and write
1FADDC59000
trusted library allocation
page read and write
1FAD8928000
trusted library allocation
page read and write
1FAD707B000
trusted library allocation
page read and write
1FADF404000
trusted library allocation
page read and write
1FAD755B000
trusted library allocation
page read and write
1FAD798F000
trusted library allocation
page read and write
1FADDFBC000
trusted library allocation
page read and write
1FAD8931000
trusted library allocation
page read and write
1FADE085000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD6E93000
trusted library allocation
page read and write
1FAD2E2D000
trusted library allocation
page read and write
28185C21000
trusted library allocation
page read and write
1FAD89CC000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD6E38000
trusted library allocation
page read and write
1FAD7897000
trusted library allocation
page read and write
1FACC9E6000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD773F000
trusted library allocation
page read and write
1E9803B0000
unclassified section
page readonly
1FACC980000
heap
page read and write
1FADDA23000
trusted library allocation
page read and write
1FACC9EA000
heap
page read and write
1FADDFC2000
trusted library allocation
page read and write
1FAD2D70000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD6624000
trusted library allocation
page read and write
1FAD2E57000
trusted library allocation
page read and write
1FAD2AA3000
trusted library allocation
page read and write
1FAE0305000
trusted library allocation
page read and write
1FAD2E43000
trusted library allocation
page read and write
1FAD9448000
trusted library allocation
page read and write
1FAD61FA000
trusted library allocation
page read and write
1E9805B1000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC97A000
heap
page read and write
27A1FC40000
unclassified section
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC99A000
heap
page read and write
27A204B1000
heap
page read and write
1FACC975000
heap
page read and write
1FAD2EFB000
trusted library allocation
page read and write
1FAD6F4C000
trusted library allocation
page read and write
1FADD9B9000
trusted library allocation
page read and write
1FAD5EB3000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FAD5C96000
trusted library allocation
page read and write
1FADDBF7000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FAD778C000
trusted library allocation
page read and write
1FAD77D7000
trusted library allocation
page read and write
1FAD770D000
trusted library allocation
page read and write
1FADDB88000
trusted library allocation
page read and write
1FADE2BC000
trusted library allocation
page read and write
1FADF47E000
trusted library allocation
page read and write
1FAD566F000
trusted library allocation
page read and write
1FADDE8D000
trusted library allocation
page read and write
1FAD2E4E000
trusted library allocation
page read and write
1FAD7BDA000
trusted library allocation
page read and write
1FAD53B9000
trusted library allocation
page read and write
1FADE28A000
trusted library allocation
page read and write
1FAD7845000
trusted library allocation
page read and write
28185DD0000
heap
page read and write
1FAD6E9E000
trusted library allocation
page read and write
1FAD2E6F000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD66D4000
trusted library allocation
page read and write
1FAD79DE000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FADDFBE000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FACC986000
heap
page read and write
1FADDED7000
trusted library allocation
page read and write
27A1FD5C000
trusted library allocation
page read and write
1FACC9D3000
heap
page read and write
1FAD56A5000
trusted library allocation
page read and write
28185830000
heap
page read and write
1FAD19FE000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FACC975000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FAD2E87000
trusted library allocation
page read and write
1FAD786D000
trusted library allocation
page read and write
1FAD8585000
trusted library allocation
page read and write
1FADD95A000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD2AE2000
trusted library allocation
page read and write
1FAE0FD4000
trusted library allocation
page read and write
1FADDAE6000
trusted library allocation
page read and write
28185E72000
trusted library allocation
page read and write
1FAD1AF0000
trusted library allocation
page read and write
281856F7000
remote allocation
page execute read
1FACC992000
heap
page read and write
1FAD70E9000
trusted library allocation
page read and write
27A1FC20000
heap
page readonly
27A20B44000
heap
page read and write
1FADF4B8000
trusted library allocation
page read and write
1FAD85B9000
trusted library allocation
page read and write
281856E0000
remote allocation
page read and write
1FADDDBB000
trusted library allocation
page read and write
1FAD8912000
trusted library allocation
page read and write
27A20B3B000
heap
page read and write
3BE000
stack
page read and write
1FACC9CD000
heap
page read and write
1AADE2D3000
heap
page read and write
1FAD786D000
trusted library allocation
page read and write
27A20B6B000
heap
page read and write
1FACC990000
heap
page read and write
27A204F9000
heap
page read and write
1FACC9BE000
heap
page read and write
2B2ED7C1000
trusted library allocation
page execute read
1FAD61DC000
trusted library allocation
page read and write
1FADE2B9000
trusted library allocation
page read and write
1FADDDFE000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD5EC3000
trusted library allocation
page read and write
1FAD1AF0000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADF699000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
27A20500000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
E1CE3FE000
unkown
page readonly
1FAD6632000
trusted library allocation
page read and write
1FAD7854000
trusted library allocation
page read and write
1FAD8599000
trusted library allocation
page read and write
1FAD897C000
trusted library allocation
page read and write
1FADD9B1000
trusted library allocation
page read and write
1FAD757D000
trusted library allocation
page read and write
1FAD7942000
trusted library allocation
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FAD7EFD000
trusted library allocation
page read and write
1FAD8919000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD784F000
trusted library allocation
page read and write
1FAD59F0000
heap
page read and write
1FADE2B7000
trusted library allocation
page read and write
1FAD53FD000
trusted library allocation
page read and write
1FACC9D7000
heap
page read and write
1FACC96E000
heap
page read and write
1FAE0F82000
trusted library allocation
page read and write
780000
heap
page read and write
1FAD2E10000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD6F32000
trusted library allocation
page read and write
1FAD8107000
trusted library allocation
page read and write
1FAD5D5F000
trusted library allocation
page read and write
1FACC981000
heap
page read and write
1FAD778F000
trusted library allocation
page read and write
1FADE448000
trusted library allocation
page read and write
1FAD77D5000
trusted library allocation
page read and write
27A1FC90000
trusted library allocation
page read and write
1FAD976D000
trusted library allocation
page read and write
1FAD8488000
trusted library allocation
page read and write
1FAD7066000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD78EF000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FADF699000
trusted library allocation
page read and write
1FACC983000
heap
page read and write
1FADDE8D000
trusted library allocation
page read and write
1FAD7597000
trusted library allocation
page read and write
1FAD56A0000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD2E5A000
trusted library allocation
page read and write
1FADD9D8000
trusted library allocation
page read and write
27A2045D000
heap
page read and write
1FAD5EC3000
trusted library allocation
page read and write
1FAD7059000
trusted library allocation
page read and write
1FAD79CA000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FACC9C4000
heap
page read and write
1FADE0F2000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD7880000
trusted library allocation
page read and write
1FAD8922000
trusted library allocation
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FACC9C5000
heap
page read and write
1FADDFEF000
trusted library allocation
page read and write
1FAD848C000
trusted library allocation
page read and write
1FAD77B9000
trusted library allocation
page read and write
E1CDBFE000
stack
page read and write
1FAD5975000
heap
page read and write
1FACC98A000
heap
page read and write
1E980195000
remote allocation
page execute read
1FAD2AB2000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD2E3D000
trusted library allocation
page read and write
A92000
unkown
page readonly
1FAD942B000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD77F9000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FAE1741000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC96B000
heap
page read and write
1FAD68EC000
trusted library allocation
page read and write
1E980320000
heap
page read and write
1FACC9C8000
heap
page read and write
1FACC990000
heap
page read and write
1FACC9BE000
heap
page read and write
1FAD78B7000
trusted library allocation
page read and write
1FAD5970000
heap
page read and write
1FACC990000
heap
page read and write
1AADE500000
trusted library allocation
page read and write
1FAD857C000
trusted library allocation
page read and write
1FAD775C000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FADD8BF000
trusted library allocation
page read and write
1FAD779C000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD6F2D000
trusted library allocation
page read and write
1FAD8370000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD65F0000
trusted library allocation
page read and write
1FADD912000
trusted library allocation
page read and write
27A20470000
heap
page read and write
1FADDC24000
trusted library allocation
page read and write
1FACC970000
heap
page read and write
1FAD77B7000
trusted library allocation
page read and write
1FADE474000
trusted library allocation
page read and write
1FADE286000
trusted library allocation
page read and write
1FADDF2E000
trusted library allocation
page read and write
1FAD7B54000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC96E000
heap
page read and write
1FAD708E000
trusted library allocation
page read and write
1FAD5662000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FAD6F81000
trusted library allocation
page read and write
1FAD9D9E000
trusted library allocation
page read and write
1FAD79FE000
trusted library allocation
page read and write
1FAD758F000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FAD7942000
trusted library allocation
page read and write
1FAD78ED000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC9BB000
heap
page read and write
1FADF473000
trusted library allocation
page read and write
1FADDBA1000
trusted library allocation
page read and write
1FAD7540000
trusted library allocation
page read and write
1FAD5312000
trusted library allocation
page read and write
1FAD6E40000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD5EAB000
trusted library allocation
page read and write
27A204F1000
heap
page read and write
1FADE0C2000
trusted library allocation
page read and write
1FADF77C000
trusted library allocation
page read and write
1FAD561C000
trusted library allocation
page read and write
1FADE09D000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD77D5000
trusted library allocation
page read and write
1FAD2EB3000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD799E000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1AADFF9E000
heap
page read and write
1FAD56F1000
trusted library allocation
page read and write
1FAD85DF000
trusted library allocation
page read and write
1FAD6F74000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FACC980000
heap
page read and write
27A20A06000
trusted library allocation
page read and write
1FAD7057000
trusted library allocation
page read and write
1FAD5EBB000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD85AC000
trusted library allocation
page read and write
1FAD5D41000
trusted library allocation
page read and write
1FADDF27000
trusted library allocation
page read and write
1FAD6850000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC990000
heap
page read and write
1FACC9C8000
heap
page read and write
1FADDD07000
trusted library allocation
page read and write
1FAD689B000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD6130000
trusted library allocation
page read and write
1FADDF3D000
trusted library allocation
page read and write
2448C4B03000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FADE0FB000
trusted library allocation
page read and write
1FAD1A66000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD5306000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD934D000
trusted library allocation
page read and write
1FADF4F3000
trusted library allocation
page read and write
1FADDD0C000
trusted library allocation
page read and write
27A20500000
heap
page read and write
1FAD2E79000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD59F0000
heap
page read and write
1FAD53F9000
trusted library allocation
page read and write
1FAD68D3000
trusted library allocation
page read and write
1FAE0F88000
trusted library allocation
page read and write
1FAD770A000
trusted library allocation
page read and write
1FADD97A000
trusted library allocation
page read and write
1FAD8482000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
193BA690000
heap
page read and write
1E980323000
heap
page read and write
1FACC980000
heap
page read and write
F246BBE000
stack
page read and write
1FAD788C000
trusted library allocation
page read and write
1FADDE9E000
trusted library allocation
page read and write
1FAD6636000
trusted library allocation
page read and write
1FADE440000
trusted library allocation
page read and write
2B2ED7C1000
trusted library allocation
page execute read
1FADF67F000
trusted library allocation
page read and write
1FAD2DF4000
trusted library allocation
page read and write
1FAD79AE000
trusted library allocation
page read and write
1FAD8519000
trusted library allocation
page read and write
1FAD6F28000
trusted library allocation
page read and write
1FAD59F0000
heap
page read and write
1FAD5E87000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD709C000
trusted library allocation
page read and write
1FAD788D000
trusted library allocation
page read and write
1FAD75FC000
trusted library allocation
page read and write
1FADDF8C000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD1A82000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FACC9BF000
heap
page read and write
1FADDF58000
trusted library allocation
page read and write
1FAD7993000
trusted library allocation
page read and write
1FAD2A56000
trusted library allocation
page read and write
1FAD74B6000
trusted library allocation
page read and write
1FADDB88000
trusted library allocation
page read and write
1FAD6F23000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FAD9663000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FACC9BD000
heap
page read and write
1FAD8578000
trusted library allocation
page read and write
1FAD8585000
trusted library allocation
page read and write
27A1FDF0000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC9BB000
heap
page read and write
1FAD7073000
trusted library allocation
page read and write
1FAD77B0000
trusted library allocation
page read and write
1FAD94A3000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
3A217FD000
stack
page read and write
1AADFF9B000
heap
page read and write
1FAD789C000
trusted library allocation
page read and write
1FADF62D000
trusted library allocation
page read and write
1FAD7580000
trusted library allocation
page read and write
1FAD79FE000
trusted library allocation
page read and write
1FADDD5B000
trusted library allocation
page read and write
1FAD83B5000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD77FE000
trusted library allocation
page read and write
1FAD2AC2000
trusted library allocation
page read and write
1FAD6625000
trusted library allocation
page read and write
1FAD2A8E000
trusted library allocation
page read and write
1FAD78A5000
trusted library allocation
page read and write
1FACC974000
heap
page read and write
1FAD6620000
trusted library allocation
page read and write
1FAD5D8A000
trusted library allocation
page read and write
1FADF65A000
trusted library allocation
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAD2EEC000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC99A000
heap
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FAD8369000
trusted library allocation
page read and write
1FAD7B6F000
trusted library allocation
page read and write
1FAD56E6000
trusted library allocation
page read and write
1FAE0FD4000
trusted library allocation
page read and write
1FAD97E4000
trusted library allocation
page read and write
A3266FE000
unkown
page readonly
1FACC97A000
heap
page read and write
1FADDDA4000
trusted library allocation
page read and write
1FAE0FCE000
trusted library allocation
page read and write
1FAD597C000
heap
page read and write
AA0000
unkown
page write copy
28185810000
heap
page read and write
1FAD864F000
trusted library allocation
page read and write
1FADDF4E000
trusted library allocation
page read and write
1FAD6F97000
trusted library allocation
page read and write
1FAD93F7000
trusted library allocation
page read and write
27A20502000
heap
page read and write
1FADD93C000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FACC98B000
heap
page read and write
1FADE2EE000
trusted library allocation
page read and write
A9C000
unkown
page write copy
1FAD597C000
heap
page read and write
1FACC987000
heap
page read and write
27A204F0000
heap
page read and write
1FADE0F6000
trusted library allocation
page read and write
32A85981E000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FADF6A8000
trusted library allocation
page read and write
F24533E000
unkown
page readonly
1FACC970000
heap
page read and write
1FAD567D000
trusted library allocation
page read and write
1FACC9E0000
heap
page read and write
1FAD6E7D000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD7B7E000
trusted library allocation
page read and write
1FACC9DD000
heap
page read and write
1FAD56DE000
trusted library allocation
page read and write
1FAD78D8000
trusted library allocation
page read and write
1FACC9EA000
heap
page read and write
1FACC9CA000
heap
page read and write
1FACC990000
heap
page read and write
27A20B6B000
heap
page read and write
27A20B21000
heap
page read and write
1FAD5EB6000
trusted library allocation
page read and write
1FAD6F85000
trusted library allocation
page read and write
1FAD7948000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FADDA9C000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD893D000
trusted library allocation
page read and write
1FAD83C2000
trusted library allocation
page read and write
1FAD7546000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
F241F7D000
stack
page read and write
1FACC992000
heap
page read and write
1FACC96F000
heap
page read and write
1FAD2EEA000
trusted library allocation
page read and write
1FACC97E000
heap
page read and write
1FAD83F0000
trusted library allocation
page read and write
1FAD2E20000
trusted library allocation
page read and write
1FAD5E91000
trusted library allocation
page read and write
1FADE0BF000
trusted library allocation
page read and write
1FAD766C000
trusted library allocation
page read and write
1FAD5C6A000
trusted library allocation
page read and write
1FAD6EBD000
trusted library allocation
page read and write
1FAD2EEA000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC992000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD7950000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC975000
heap
page read and write
1FAD2C33000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD795E000
trusted library allocation
page read and write
1FADF4C3000
trusted library allocation
page read and write
1FADE440000
trusted library allocation
page read and write
27A1F960000
unclassified section
page readonly
1FACC992000
heap
page read and write
27A204F3000
heap
page read and write
1FAD6850000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAE02C8000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FAD5C88000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD2AD2000
trusted library allocation
page read and write
1FAD684B000
trusted library allocation
page read and write
1FAD6F7F000
trusted library allocation
page read and write
1FAE1821000
heap
page read and write
1FACC9CD000
heap
page read and write
1FADF4A5000
trusted library allocation
page read and write
1FACC9CD000
heap
page read and write
1FACC9A7000
heap
page read and write
1FADDAB6000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
3A20FFF000
stack
page read and write
1FADD977000
trusted library allocation
page read and write
1FADF7C3000
trusted library allocation
page read and write
F241FFE000
stack
page read and write
1FACC9A7000
heap
page read and write
1FAD84EC000
trusted library allocation
page read and write
1AADE2BE000
heap
page read and write
1FAD94FE000
trusted library allocation
page read and write
1FAD77C6000
trusted library allocation
page read and write
1FAD5D1D000
trusted library allocation
page read and write
1FAD2C38000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
27A20400000
heap
page read and write
1FACC99A000
heap
page read and write
1FACC990000
heap
page read and write
1E9801C0000
heap
page read and write
1FAD775F000
trusted library allocation
page read and write
1FAD74B3000
trusted library allocation
page read and write
1FAD778F000
trusted library allocation
page read and write
1FAD84E3000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
27A1FC42000
unclassified section
page read and write
1FACC9ED000
heap
page read and write
1FACC9CD000
heap
page read and write
1FAD8540000
trusted library allocation
page read and write
1FAD6F9D000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FACC9C4000
heap
page read and write
1FAD9387000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FACC987000
heap
page read and write
1FACC9D1000
heap
page read and write
1FAD7768000
trusted library allocation
page read and write
1FADDED3000
trusted library allocation
page read and write
1FAD56CD000
trusted library allocation
page read and write
1FADD97E000
trusted library allocation
page read and write
1FAD2E87000
trusted library allocation
page read and write
1FACC9C3000
heap
page read and write
1FAD7851000
trusted library allocation
page read and write
1FAD6F85000
trusted library allocation
page read and write
1FACC980000
heap
page read and write
1FADE474000
trusted library allocation
page read and write
1FAD837E000
trusted library allocation
page read and write
1FAD6834000
trusted library allocation
page read and write
1FAD77FC000
trusted library allocation
page read and write
1FADD9B3000
trusted library allocation
page read and write
1FACC964000
heap
page read and write
1FAD86E4000
trusted library allocation
page read and write
1FAD78F1000
trusted library allocation
page read and write
27A1FAB0000
heap
page read and write
1AADE507000
trusted library allocation
page read and write
28185670000
unclassified section
page readonly
1FAD895A000
trusted library allocation
page read and write
1FAD754B000
trusted library allocation
page read and write
1FAD8127000
trusted library allocation
page read and write
EF3000
heap
page read and write
1FACC966000
heap
page read and write
1FAD8480000
trusted library allocation
page read and write
1FAD8327000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
1FAD78F1000
trusted library allocation
page read and write
1FAD707B000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FAD76DA000
trusted library allocation
page read and write
1FACC988000
heap
page read and write
1FACC9ED000
heap
page read and write
1FADDAF3000
trusted library allocation
page read and write
1FAD786D000
trusted library allocation
page read and write
1FAD5E54000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FACC9A7000
heap
page read and write
1FACC980000
heap
page read and write
1FAD5E52000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FAD70F0000
trusted library allocation
page read and write
1FAD567D000
trusted library allocation
page read and write
1FACC98A000
heap
page read and write
1FAD8392000
trusted library allocation
page read and write
1FAD53B9000
trusted library allocation
page read and write
27A20B6B000
heap
page read and write
1FACC9A7000
heap
page read and write
1FADE0BF000
trusted library allocation
page read and write
1FAE03AC000
trusted library allocation
page read and write
1FAD2E27000
trusted library allocation
page read and write
27A20B2A000
heap
page read and write
1FADE08F000
trusted library allocation
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD838B000
trusted library allocation
page read and write
1FADDDA2000
trusted library allocation
page read and write
1FAD79DC000
trusted library allocation
page read and write
1FAD79B7000
trusted library allocation
page read and write
1FAE1337000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FADDF77000
trusted library allocation
page read and write
EE2000
heap
page read and write
1FACC96B000
heap
page read and write
1FAD75AE000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD5DA2000
trusted library allocation
page read and write
1FAD2EE6000
trusted library allocation
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FAD8578000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FACC9C4000
heap
page read and write
27A1FD12000
trusted library allocation
page read and write
1FACC9BF000
heap
page read and write
1FACC9ED000
heap
page read and write
1FAD75FA000
trusted library allocation
page read and write
1FAD6E2D000
trusted library allocation
page read and write
1FACC9EC000
heap
page read and write
1FACC95E000
heap
page read and write
1FAD5629000
trusted library allocation
page read and write
1FADE0F6000
trusted library allocation
page read and write
1FAD77CC000
trusted library allocation
page read and write
1FAD853A000
trusted library allocation
page read and write
1FACC97A000
heap
page read and write
1FADDF56000
trusted library allocation
page read and write
27A2046C000
heap
page read and write
1FAD752B000
trusted library allocation
page read and write
1FADDE3B000
trusted library allocation
page read and write
1FAD93D4000
trusted library allocation
page read and write
1FAD56BE000
trusted library allocation
page read and write
1FAD7061000
trusted library allocation
page read and write
1FAD93C2000
trusted library allocation
page read and write
1FACC9DD000
heap
page read and write
1FADF6D4000
trusted library allocation
page read and write
1FAD94B6000
trusted library allocation
page read and write
1FAD2D65000
trusted library allocation
page read and write
27A2047C000
heap
page read and write
1FADF880000
trusted library allocation
page read and write
7C4000
heap
page read and write
1FAD6FBD000
trusted library allocation
page read and write
1FAD56E2000
trusted library allocation
page read and write
1FAD61FA000
trusted library allocation
page read and write
1FADDDC9000
trusted library allocation
page read and write
1FACC9BE000
heap
page read and write
1FAD65C4000
trusted library allocation
page read and write
1FADD9B7000
trusted library allocation
page read and write
1FAD7580000
trusted library allocation
page read and write
1FAD6828000
trusted library allocation
page read and write
1FAD844C000
trusted library allocation
page read and write
1FAD5976000
heap
page read and write
1FACC970000
heap
page read and write
1FAD1A8D000
trusted library allocation
page read and write
1FAD838B000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1E9805C4000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FAD617C000
trusted library allocation
page read and write
1FADE0C1000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FADE0BA000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FAD7998000
trusted library allocation
page read and write
1FAD6E28000
trusted library allocation
page read and write
1FACC9BD000
heap
page read and write
1FAD5DCB000
trusted library allocation
page read and write
1FAE03C5000
trusted library allocation
page read and write
1FAE0FFE000
trusted library allocation
page read and write
1FACC9C5000
heap
page read and write
1FACC994000
heap
page read and write
1FACC975000
heap
page read and write
1FAD7057000
trusted library allocation
page read and write
1FAE0093000
trusted library allocation
page read and write
1FACC9C8000
heap
page read and write
1FACC992000
heap
page read and write
1FAD834B000
trusted library allocation
page read and write
1E9805F2000
trusted library allocation
page read and write
1FAD532D000
trusted library allocation
page read and write
1FAD5E96000
trusted library allocation
page read and write
1FAD7811000
trusted library allocation
page read and write
1FAE1741000
heap
page read and write
1FAD56F0000
trusted library allocation
page read and write
16BE000
stack
page read and write
1FACC9CC000
heap
page read and write
1FACC96B000
heap
page read and write
1FACC9E5000
heap
page read and write
1FACC9AC000
heap
page read and write
1FAD8625000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD13C9000
trusted library allocation
page read and write
1FACC96E000
heap
page read and write
1FAD6EB0000
trusted library allocation
page read and write
27A1F9C0000
heap
page read and write
1FACC980000
heap
page read and write
1FADD8C9000
trusted library allocation
page read and write
1FAD192F000
trusted library allocation
page read and write
1FAD6E9E000
trusted library allocation
page read and write
1FADE0DC000
trusted library allocation
page read and write
1FACC9DF000
heap
page read and write
1FADD891000
trusted library allocation
page read and write
1FAD79AE000
trusted library allocation
page read and write
1FAD848A000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FACC9E5000
heap
page read and write
1FACC97A000
heap
page read and write
28185C0C000
trusted library allocation
page read and write
1FAD6FB2000
trusted library allocation
page read and write
1FACC9BB000
heap
page read and write
27A204F3000
heap
page read and write
1FACC99A000
heap
page read and write
193BA6D0000
heap
page read and write
1FAD5365000
trusted library allocation
page read and write
EE8000
heap
page read and write
1FAD2E20000
trusted library allocation
page read and write
1FACC992000
heap
page read and write
1FACC964000
heap
page read and write
1FACC9A7000
heap
page read and write
1FAD65E1000
trusted library allocation
page read and write
1FACC975000
heap
page read and write
1FAD9464000
trusted library allocation
page read and write
1FAD78FE000
trusted library allocation
page read and write
1FAD56AE000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
EF5000
heap
page read and write
1FACC9C8000
heap
page read and write
1FAD5D9C000
trusted library allocation
page read and write
1FAD6F81000
trusted library allocation
page read and write
1FACC990000
heap
page read and write
1FADE29A000
trusted library allocation
page read and write
1FAD5E4D000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FAD755E000
trusted library allocation
page read and write
1FACC98B000
heap
page read and write
1FACC975000
heap
page read and write
1FADDED5000
trusted library allocation
page read and write
1FAD5E5D000
trusted library allocation
page read and write
1FAD78E1000
trusted library allocation
page read and write
1FAD69AD000
trusted library allocation
page read and write
28185E96000
trusted library allocation
page read and write
1FACC9C4000
heap
page read and write
1FAD68EF000
trusted library allocation
page read and write
1FAD9EAC000
trusted library allocation
page read and write
1FACC95E000
heap
page read and write
1FAD7877000
trusted library allocation
page read and write
1FAD8486000
trusted library allocation
page read and write
1FACC99A000
heap
page read and write
1FACC9CE000
heap
page read and write
1FADDBA6000
trusted library allocation
page read and write
1FAD75BD000
trusted library allocation
page read and write
1FAD6666000
trusted library allocation
page read and write
1FAD9D2F000
trusted library allocation
page read and write
1FAD7AF6000
trusted library allocation
page read and write
1FAD56B8000
trusted library allocation
page read and write
1FACC9D6000
heap
page read and write
1FAD5D63000
trusted library allocation
page read and write
27A2050D000
heap
page read and write
1FAD7843000
trusted library allocation
page read and write
124544103000
trusted library allocation
page read and write
27A204F0000
heap
page read and write
1FAD5EFC000
trusted library allocation
page read and write
1FACC9CE000
heap
page read and write
1FACC96E000
heap
page read and write
1FAD9377000
trusted library allocation
page read and write
1FAD7818000
trusted library allocation
page read and write
1FADDBCF000
trusted library allocation
page read and write
1FAD7BD7000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
1FACC980000
heap
page read and write
27A20361000
unkown
page execute read
1AADE2D4000
heap
page read and write
1FADDECF000
trusted library allocation
page read and write
1FAD79F5000
trusted library allocation
page read and write
1FACC9A7000
heap
page read and write
There are 3948 hidden memdumps, click here to show them.