IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1015e190-15b2-4716-b5c7-ad8b44e39a46.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1015e190-15b2-4716-b5c7-ad8b44e39a46.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\40f21b95-51e8-4ff3-be33-9bb1eaeaa26e (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\40f21b95-51e8-4ff3-be33-9bb1eaeaa26e.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e7b3aae-bb56-4284-a807-6c1b23098845} 6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3d5270310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -parentBuildID 20230927232528 -prefsHandle 3952 -prefMapHandle 3860 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7189440-4594-4ad1-9e14-9f55c229bd4f} 6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3e7452b10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1496 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4888 -prefMapHandle 4872 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {966cd51a-fee3-4338-b9d0-f8655f97fe69} 6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3f108fd10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.185.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1A3DC066000
heap
page read and write
8FE03D8000
stack
page read and write
1A3ED3EA000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFF2000
heap
page read and write
1A3ED13D000
trusted library allocation
page read and write
1E58EFA0000
heap
page read and write
1A3E742B000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3DBFD9000
heap
page read and write
1A3ED198000
trusted library allocation
page read and write
1A3E5E13000
trusted library allocation
page read and write
1D906761000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3E6969000
trusted library allocation
page read and write
1A3E5EA8000
trusted library allocation
page read and write
1A3EE136000
trusted library allocation
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3E6B1D000
trusted library allocation
page read and write
1A3ED577000
trusted library allocation
page read and write
1A3E6256000
trusted library allocation
page read and write
1A3E53B9000
trusted library allocation
page read and write
1A3ED6CF000
trusted library allocation
page read and write
1A3ED3EA000
trusted library allocation
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3E224D000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3ED576000
trusted library allocation
page read and write
1A3E4F55000
trusted library allocation
page read and write
1A3DBFE4000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3DC049000
heap
page read and write
1A3E89ED000
trusted library allocation
page read and write
1A3E50BE000
trusted library allocation
page read and write
1A3E6A5D000
trusted library allocation
page read and write
1A3F1605000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E6AFD000
trusted library allocation
page read and write
1D90672B000
heap
page read and write
1A3E6653000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E6ACD000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3ED39A000
trusted library allocation
page read and write
1A3E20E4000
trusted library allocation
page read and write
1CA8DB94000
trusted library allocation
page read and write
1A3E7A1E000
trusted library allocation
page read and write
1A3ED696000
trusted library allocation
page read and write
1A3E88A3000
trusted library allocation
page read and write
1A3ED1EE000
trusted library allocation
page read and write
1A3E6586000
trusted library allocation
page read and write
1A3E28D1000
heap
page read and write
1A3ED53B000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3EE113000
trusted library allocation
page read and write
1A3EE04C000
trusted library allocation
page read and write
1A3E6BAE000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1E58D3D0000
heap
page read and write
1A3ED149000
trusted library allocation
page read and write
1D90677B000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3EE2F5000
trusted library allocation
page read and write
1A3E7A3C000
trusted library allocation
page read and write
A0B7F2B000
stack
page read and write
1A3E74B6000
trusted library allocation
page read and write
1A3E6BF8000
trusted library allocation
page read and write
1A3E6A23000
trusted library allocation
page read and write
1A3E68EB000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3ED5A0000
trusted library allocation
page read and write
1A3E67FB000
trusted library allocation
page read and write
1A3E6B29000
trusted library allocation
page read and write
1A3ED0AC000
trusted library allocation
page read and write
1A3E62A3000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E6A90000
trusted library allocation
page read and write
1A3E619B000
trusted library allocation
page read and write
1D905900000
trusted library allocation
page read and write
1A3E6B06000
trusted library allocation
page read and write
1A3E7C9A000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3E6BE2000
trusted library allocation
page read and write
1A3EE143000
trusted library allocation
page read and write
1A3E65B2000
trusted library allocation
page read and write
1D906784000
heap
page read and write
1A3E65A1000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1CA8D9C0000
heap
page read and write
1A3ED5BA000
trusted library allocation
page read and write
64379FF000
stack
page read and write
1A3E8667000
trusted library allocation
page read and write
1A3E6A13000
trusted library allocation
page read and write
1A3F1596000
trusted library allocation
page read and write
1A3F1570000
trusted library allocation
page read and write
1A3E6AF6000
trusted library allocation
page read and write
1A3EE148000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3F16BB000
heap
page read and write
1A3ED4FB000
trusted library allocation
page read and write
1A3E4F45000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3E668C000
trusted library allocation
page read and write
1A3E76C8000
trusted library allocation
page read and write
1A3E92F9000
trusted library allocation
page read and write
1A3ED0C4000
trusted library allocation
page read and write
1A3E6A71000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3E6A45000
trusted library allocation
page read and write
1E58EFBE000
heap
page read and write
1A3EE124000
trusted library allocation
page read and write
1A3E503B000
trusted library allocation
page read and write
1D9067AC000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3E664E000
trusted library allocation
page read and write
1A3ED13B000
trusted library allocation
page read and write
1A3F11DF000
trusted library allocation
page read and write
1A3F0A97000
trusted library allocation
page read and write
1A3E9304000
trusted library allocation
page read and write
1A3ED5E8000
trusted library allocation
page read and write
1A3E6A33000
trusted library allocation
page read and write
1A3E86F8000
trusted library allocation
page read and write
1A3F1605000
heap
page read and write
1CA8DD05000
trusted library allocation
page read and write
1A3DBFE5000
heap
page read and write
1C22AE09000
heap
page read and write
1A3E50C4000
trusted library allocation
page read and write
1A3ED0B6000
trusted library allocation
page read and write
1A3E652B000
trusted library allocation
page read and write
1A3E8BDE000
trusted library allocation
page read and write
1A3E669B000
trusted library allocation
page read and write
1A3F0628000
trusted library allocation
page read and write
8FE25FE000
stack
page read and write
1A3E6AC4000
trusted library allocation
page read and write
1A3DC038000
heap
page read and write
1A3F14EC000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E5BB2000
trusted library allocation
page read and write
1A3E22F0000
trusted library allocation
page read and write
1A3F0A3A000
trusted library allocation
page read and write
1A3E690A000
trusted library allocation
page read and write
1A3E5067000
trusted library allocation
page read and write
1A3E4B77000
trusted library allocation
page read and write
1A3E7578000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3E62AE000
trusted library allocation
page read and write
20AA3F00000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E28DF000
heap
page read and write
1A3F16C5000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3E6AB5000
trusted library allocation
page read and write
1A3E2669000
trusted library allocation
page read and write
1A3EDB2A000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3F1661000
heap
page read and write
1A3E5E61000
trusted library allocation
page read and write
1A3E09F8000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E6A43000
trusted library allocation
page read and write
1A3E69B4000
trusted library allocation
page read and write
1A3ED3C3000
trusted library allocation
page read and write
1A3EE0B6000
trusted library allocation
page read and write
20AA39EA000
heap
page read and write
1A3EDBEF000
trusted library allocation
page read and write
20AA3880000
heap
page read and write
1B0000
unkown
page write copy
20AA3C76000
trusted library allocation
page read and write
1D905A0A000
trusted library allocation
page read and write
1A3E91B1000
trusted library allocation
page read and write
1A3E1075000
trusted library allocation
page read and write
1A3F16EB000
heap
page read and write
1A3E69C1000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E6567000
trusted library allocation
page read and write
1A3E6B48000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E6A67000
trusted library allocation
page read and write
1A3DBFFA000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3ED6B4000
trusted library allocation
page read and write
1A3E5E60000
trusted library allocation
page read and write
1A3E5E38000
trusted library allocation
page read and write
1A3E69D1000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
13B6000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3E26F4000
trusted library allocation
page read and write
1D9066AC000
heap
page read and write
1A3E6B27000
trusted library allocation
page read and write
1A3EE2D8000
trusted library allocation
page read and write
1A3EE19B000
trusted library allocation
page read and write
1A3E8B53000
trusted library allocation
page read and write
1A3EF7CF000
trusted library allocation
page read and write
1A3ED12B000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E6694000
trusted library allocation
page read and write
1D9066AC000
heap
page read and write
1A3DC025000
heap
page read and write
1A3E6BC6000
trusted library allocation
page read and write
1A3E20F8000
trusted library allocation
page read and write
FDB000
stack
page read and write
1A3F139B000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFD8000
heap
page read and write
1A3ED0E3000
trusted library allocation
page read and write
1A3E69DF000
trusted library allocation
page read and write
1A3F10FE000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3E6AB2000
trusted library allocation
page read and write
1D9066BD000
heap
page read and write
1A3E7AAC000
trusted library allocation
page read and write
1A3F11A8000
trusted library allocation
page read and write
1A3EE042000
trusted library allocation
page read and write
1A3E20E8000
trusted library allocation
page read and write
1A3F06B4000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3ED4F0000
trusted library allocation
page read and write
1A3E4BFE000
trusted library allocation
page read and write
1A3EFE02000
trusted library allocation
page read and write
1A3E6292000
trusted library allocation
page read and write
1A3EEBFC000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFDB000
heap
page read and write
1A3DC002000
heap
page read and write
1A3ED29C000
trusted library allocation
page read and write
1A3E6A7F000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E5E55000
trusted library allocation
page read and write
1A3E8BD5000
trusted library allocation
page read and write
1A3E67B2000
trusted library allocation
page read and write
1A3F0AC0000
trusted library allocation
page read and write
1D906798000
heap
page read and write
1A3E69E4000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3E6AE0000
trusted library allocation
page read and write
1A3ED12D000
trusted library allocation
page read and write
1A3DC039000
heap
page read and write
456BFF000
stack
page read and write
1A3EE03D000
trusted library allocation
page read and write
1A3EEBB1000
trusted library allocation
page read and write
1A3F0631000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E203F000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1D905A12000
trusted library allocation
page read and write
1A3E6BD8000
trusted library allocation
page read and write
1A3DBFB4000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3ED6BA000
trusted library allocation
page read and write
1A3E5190000
trusted library allocation
page read and write
1A3E109C000
trusted library allocation
page read and write
20AA3C13000
trusted library allocation
page read and write
1A3E6955000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3F10FE000
trusted library allocation
page read and write
1A3ED1CD000
trusted library allocation
page read and write
1D905AC5000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3ED693000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E5EAB000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E69B4000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3EE2F4000
trusted library allocation
page read and write
1A3ED4F7000
trusted library allocation
page read and write
1A3ED3FD000
trusted library allocation
page read and write
1A3ED66F000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3EE06F000
trusted library allocation
page read and write
1D905A10000
trusted library allocation
page read and write
1A3E657D000
trusted library allocation
page read and write
1A3EE0CC000
trusted library allocation
page read and write
1A3E6A30000
trusted library allocation
page read and write
1A3E6B1F000
trusted library allocation
page read and write
1A3E668C000
trusted library allocation
page read and write
1A3EE13A000
trusted library allocation
page read and write
1A3E7C5A000
trusted library allocation
page read and write
1A3ED417000
trusted library allocation
page read and write
1A3F135B000
trusted library allocation
page read and write
1A3EEBF9000
trusted library allocation
page read and write
1A3EDBE6000
trusted library allocation
page read and write
1B4000
unkown
page readonly
1A3E6720000
trusted library allocation
page read and write
20AA3C49000
trusted library allocation
page read and write
1A3E5EA6000
trusted library allocation
page read and write
13B6000
heap
page read and write
1A3F0631000
trusted library allocation
page read and write
1A3F06C6000
trusted library allocation
page read and write
1A3ED67C000
trusted library allocation
page read and write
1A3E7C7A000
trusted library allocation
page read and write
1A3EDB48000
trusted library allocation
page read and write
1A3EE148000
trusted library allocation
page read and write
1A3E20EA000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3E664C000
trusted library allocation
page read and write
1A3E6AE0000
trusted library allocation
page read and write
1A3E658A000
trusted library allocation
page read and write
1A3F16C0000
heap
page read and write
1A3E7CF0000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3DBFC1000
heap
page read and write
1A3E65F1000
trusted library allocation
page read and write
1A3F0A38000
trusted library allocation
page read and write
1A3E099E000
trusted library allocation
page read and write
1A3E684F000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3E2659000
trusted library allocation
page read and write
1A3F11A8000
trusted library allocation
page read and write
1A3EDB97000
trusted library allocation
page read and write
1A3E617B000
trusted library allocation
page read and write
1A3ED016000
trusted library allocation
page read and write
1A3E5B69000
trusted library allocation
page read and write
1D905A5C000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3F0657000
trusted library allocation
page read and write
1A3E6BE4000
trusted library allocation
page read and write
1A3E75A3000
trusted library allocation
page read and write
20AA3C73000
trusted library allocation
page read and write
1A3E5E25000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3ED02C000
trusted library allocation
page read and write
1A3E744F000
trusted library allocation
page read and write
1A3E6650000
trusted library allocation
page read and write
1D90673C000
heap
page read and write
1A3DBFB7000
heap
page read and write
1A3E2659000
trusted library allocation
page read and write
1A3E7CF8000
trusted library allocation
page read and write
1A3ED19B000
trusted library allocation
page read and write
1A3EE1F9000
trusted library allocation
page read and write
1A3E8B4D000
trusted library allocation
page read and write
13CE000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3E6134000
trusted library allocation
page read and write
1A3ED0F5000
trusted library allocation
page read and write
1A3E69BC000
trusted library allocation
page read and write
1A3DBFE3000
heap
page read and write
1A3EE03C000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EE167000
trusted library allocation
page read and write
1A3E665F000
trusted library allocation
page read and write
1A3E8990000
trusted library allocation
page read and write
FAD91AE000
stack
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3EE033000
trusted library allocation
page read and write
1A3ED4F0000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3E885B000
trusted library allocation
page read and write
1D905A78000
trusted library allocation
page read and write
A0BB27E000
stack
page read and write
20AA3CC4000
trusted library allocation
page read and write
1A3ED5B2000
trusted library allocation
page read and write
1A3ED3A5000
trusted library allocation
page read and write
1A3EE195000
trusted library allocation
page read and write
1A3E6A8E000
trusted library allocation
page read and write
1A3EDBA1000
trusted library allocation
page read and write
1A3E68E8000
trusted library allocation
page read and write
1A3EE068000
trusted library allocation
page read and write
1A3EE067000
trusted library allocation
page read and write
1A3E20EF000
trusted library allocation
page read and write
1A3EEBCA000
trusted library allocation
page read and write
1A3F0617000
trusted library allocation
page read and write
1A3F0A97000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E5EA6000
trusted library allocation
page read and write
1A3E61AA000
trusted library allocation
page read and write
1A3E6B21000
trusted library allocation
page read and write
11B0000
heap
page read and write
8FE2DFE000
unkown
page readonly
1A3E6BEE000
trusted library allocation
page read and write
1A3E6293000
trusted library allocation
page read and write
1CA8D970000
heap
page read and write
1A3DBFE1000
heap
page read and write
1A3E5E5B000
trusted library allocation
page read and write
1A3E657D000
trusted library allocation
page read and write
1A3E5095000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E551E000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E22EB000
trusted library allocation
page read and write
1A3EE048000
trusted library allocation
page read and write
1A3ED3F4000
trusted library allocation
page read and write
1A3E51B3000
trusted library allocation
page read and write
1A3E0F76000
trusted library allocation
page read and write
1A3E6943000
trusted library allocation
page read and write
1A3E5E05000
trusted library allocation
page read and write
1A3E0981000
trusted library allocation
page read and write
1A3E669D000
trusted library allocation
page read and write
1A3F16A8000
heap
page read and write
1A3ED1CD000
trusted library allocation
page read and write
1A3E6B04000
trusted library allocation
page read and write
1A3EDB0C000
trusted library allocation
page read and write
1A3E8651000
trusted library allocation
page read and write
1A3F169D000
heap
page read and write
1A3E6AB5000
trusted library allocation
page read and write
1A3ED6AA000
trusted library allocation
page read and write
1A3E6ACA000
trusted library allocation
page read and write
1CA8DB97000
trusted library allocation
page read and write
1A3E7AB6000
trusted library allocation
page read and write
1A3EDCD5000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E699F000
trusted library allocation
page read and write
1A3E6BE4000
trusted library allocation
page read and write
1A3F1574000
trusted library allocation
page read and write
1A3F15CE000
trusted library allocation
page read and write
1A3EE16C000
trusted library allocation
page read and write
1A3E518F000
trusted library allocation
page read and write
1A3ED6AD000
trusted library allocation
page read and write
1A3E75B2000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1A3F1720000
heap
page read and write
1A3ED6F7000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1D9066A0000
heap
page read and write
1A3EDB0F000
trusted library allocation
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E4B7A000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3EDB95000
trusted library allocation
page read and write
1A3E1017000
trusted library allocation
page read and write
1A3E5178000
trusted library allocation
page read and write
20AA3C11000
trusted library allocation
page read and write
1A3EE2E1000
trusted library allocation
page read and write
1CA8DD14000
trusted library allocation
page read and write
1A3E20E4000
trusted library allocation
page read and write
1A3F0FBB000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1D9058C0000
heap
page read and write
1A3ED4FB000
trusted library allocation
page read and write
1A3F1076000
trusted library allocation
page read and write
1A3E6172000
trusted library allocation
page read and write
1A3E895C000
trusted library allocation
page read and write
1A3EEB85000
trusted library allocation
page read and write
1A3E9259000
trusted library allocation
page read and write
1A3E74BD000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3EE0A3000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3ED1D0000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1D906732000
heap
page read and write
1A3EDB48000
trusted library allocation
page read and write
1A3DBFFC000
heap
page read and write
1A3E50CC000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFED000
heap
page read and write
11B4000
heap
page read and write
1A3DC066000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3ED3BF000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1D9066A0000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E8BDC000
trusted library allocation
page read and write
1A3EE033000
trusted library allocation
page read and write
1A3E7511000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3ED69C000
trusted library allocation
page read and write
1A3E7AE9000
trusted library allocation
page read and write
1A3E5B47000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E62C0000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3E53BD000
trusted library allocation
page read and write
1A3E7A2B000
trusted library allocation
page read and write
1A3F16A8000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFDF000
heap
page read and write
1A3E2098000
trusted library allocation
page read and write
1A3ED0FD000
trusted library allocation
page read and write
1A3E7570000
trusted library allocation
page read and write
1A3E62C3000
trusted library allocation
page read and write
1A3ED4F6000
trusted library allocation
page read and write
1A3F16A4000
heap
page read and write
1A3DC034000
heap
page read and write
1A3DBFDE000
heap
page read and write
1A3E656C000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3F1395000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3EEF00000
trusted library allocation
page read and write
1A3F15C4000
trusted library allocation
page read and write
1D9058A0000
heap
page read and write
1A3E69DF000
trusted library allocation
page read and write
1A3DC023000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3DBFD6000
heap
page read and write
20AA39E0000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3EE1F9000
trusted library allocation
page read and write
1A3DBFFA000
heap
page read and write
1A3EF650000
trusted library allocation
page read and write
1A3E20E8000
trusted library allocation
page read and write
FBF000
stack
page read and write
1A3ED13A000
trusted library allocation
page read and write
1A3ED4FB000
trusted library allocation
page read and write
1D9061A0000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3EE700000
trusted library allocation
page read and write
1A3F117E000
trusted library allocation
page read and write
1D9067AC000
heap
page read and write
1A3E503D000
trusted library allocation
page read and write
1A3ED1C8000
trusted library allocation
page read and write
1A3E7AE9000
trusted library allocation
page read and write
1A3ED543000
trusted library allocation
page read and write
1A3E6BF8000
trusted library allocation
page read and write
1A3EE0CC000
trusted library allocation
page read and write
1A3ED427000
trusted library allocation
page read and write
1C22AE50000
heap
page read and write
1A3ED6F9000
trusted library allocation
page read and write
1A3ED142000
trusted library allocation
page read and write
1A3EE133000
trusted library allocation
page read and write
1D906641000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3F117E000
trusted library allocation
page read and write
1A3ED3FC000
trusted library allocation
page read and write
20AA3980000
heap
page read and write
1A3ED527000
trusted library allocation
page read and write
1A3F109E000
trusted library allocation
page read and write
1A3EE0DD000
trusted library allocation
page read and write
1A3ED0A9000
trusted library allocation
page read and write
1A3F0628000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3E6A45000
trusted library allocation
page read and write
1A3ED3A5000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F14AF000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
20AA3C0C000
trusted library allocation
page read and write
1A3E6A25000
trusted library allocation
page read and write
1A3E6BE2000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E7570000
trusted library allocation
page read and write
1A3F16BE000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E6ACC000
trusted library allocation
page read and write
1A3E6A5F000
trusted library allocation
page read and write
1A3EE067000
trusted library allocation
page read and write
1A3EE0CD000
trusted library allocation
page read and write
1A3E6637000
trusted library allocation
page read and write
1A3E09A6000
trusted library allocation
page read and write
1A3E6BD7000
trusted library allocation
page read and write
1A3E5B8E000
trusted library allocation
page read and write
1A3E74CF000
trusted library allocation
page read and write
A0BB23E000
unkown
page readonly
1A3DBFF9000
heap
page read and write
1A3ED3F4000
trusted library allocation
page read and write
1A3E6145000
trusted library allocation
page read and write
1A3F16A8000
heap
page read and write
1CA8DB6E000
trusted library allocation
page read and write
1A3EDB77000
trusted library allocation
page read and write
1A3DBFD5000
heap
page read and write
1A3E10D2000
trusted library allocation
page read and write
1A3EE500000
trusted library allocation
page read and write
1A3F1582000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFFB000
heap
page read and write
1A3DC034000
heap
page read and write
1A3DBFFB000
heap
page read and write
1A3EE013000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3E690D000
trusted library allocation
page read and write
1A3E9285000
trusted library allocation
page read and write
FADC3FE000
unkown
page readonly
1A3E8BF9000
trusted library allocation
page read and write
1A3E7C6A000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3DBFEC000
heap
page read and write
13AF000
heap
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3F10D8000
trusted library allocation
page read and write
1A3ED585000
trusted library allocation
page read and write
1A3E62E9000
trusted library allocation
page read and write
1A3E5BF4000
trusted library allocation
page read and write
1A3ED64A000
trusted library allocation
page read and write
1D905B32000
unclassified section
page read and write
1A3E2069000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3DBFCD000
heap
page read and write
1D90669C000
heap
page read and write
1A3E4B34000
trusted library allocation
page read and write
1A3E6B39000
trusted library allocation
page read and write
1A3E89F7000
trusted library allocation
page read and write
1A3E6BE7000
trusted library allocation
page read and write
1A3E74DA000
trusted library allocation
page read and write
1A3E6988000
trusted library allocation
page read and write
1A3ED1DE000
trusted library allocation
page read and write
1A3E0F23000
trusted library allocation
page read and write
1A3ECFDD000
trusted library allocation
page read and write
1A3ED685000
trusted library allocation
page read and write
1A3E1F8B000
trusted library allocation
page read and write
1D9066A9000
heap
page read and write
1A3E7A1E000
trusted library allocation
page read and write
1A3ED3E9000
trusted library allocation
page read and write
1A3E69E4000
trusted library allocation
page read and write
1A3E69DA000
trusted library allocation
page read and write
1A3E62E9000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3ED026000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3E7AC8000
trusted library allocation
page read and write
1A3E6A38000
trusted library allocation
page read and write
FADABFE000
stack
page read and write
1A3E6BFD000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E4B2B000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3F1576000
trusted library allocation
page read and write
1A3ED195000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3F1576000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3ED3A8000
trusted library allocation
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3E86F0000
trusted library allocation
page read and write
1A3E687E000
trusted library allocation
page read and write
1A3EDB40000
trusted library allocation
page read and write
1D905A00000
trusted library allocation
page read and write
1A3E6AA6000
trusted library allocation
page read and write
1A3E658A000
trusted library allocation
page read and write
1A3E648C000
trusted library allocation
page read and write
1A3EE067000
trusted library allocation
page read and write
1A3EEBB4000
trusted library allocation
page read and write
1A3EE13C000
trusted library allocation
page read and write
1A3F1D04000
trusted library allocation
page read and write
1A3E92FC000
trusted library allocation
page read and write
1A3F0FA7000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3F0A38000
trusted library allocation
page read and write
1D905FF0000
heap
page read and write
1A3E62C3000
trusted library allocation
page read and write
1A3F16C0000
heap
page read and write
1A3E6650000
trusted library allocation
page read and write
1A3E6146000
trusted library allocation
page read and write
1A3F11C1000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1E58D48A000
heap
page read and write
1A3EE0AD000
trusted library allocation
page read and write
1A3EDCD2000
trusted library allocation
page read and write
1A3F107E000
trusted library allocation
page read and write
1A3E68AE000
trusted library allocation
page read and write
1A3E617B000
trusted library allocation
page read and write
1A3E1100000
trusted library allocation
page read and write
1A3E7A51000
trusted library allocation
page read and write
1A3DBFDD000
heap
page read and write
1A3E61AA000
trusted library allocation
page read and write
1A3EDBA3000
trusted library allocation
page read and write
1D906729000
heap
page read and write
1A3DBFDF000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFF0000
heap
page read and write
1D906011000
heap
page read and write
1A3EE2E5000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1A3E62AC000
trusted library allocation
page read and write
1A3ED12D000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E6653000
trusted library allocation
page read and write
1A3DC036000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFD0000
heap
page read and write
1A3E6699000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1CA8DB0D000
trusted library allocation
page read and write
1D9067AC000
heap
page read and write
1A3EE300000
trusted library allocation
page read and write
1A3E91D9000
trusted library allocation
page read and write
1A3E66BF000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E698F000
trusted library allocation
page read and write
1A3E74A5000
trusted library allocation
page read and write
1A3ED195000
trusted library allocation
page read and write
1A3E7CCD000
trusted library allocation
page read and write
1A3ED687000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F11C9000
trusted library allocation
page read and write
1A3E6A25000
trusted library allocation
page read and write
A0BB2BE000
unkown
page readonly
1A3E6648000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3E62EE000
trusted library allocation
page read and write
1A3DC00D000
heap
page read and write
1A3E925C000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E5E51000
trusted library allocation
page read and write
FAD916E000
unkown
page readonly
1A3E5093000
trusted library allocation
page read and write
1A3E4F1F000
trusted library allocation
page read and write
1D90676A000
heap
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3E663E000
trusted library allocation
page read and write
1A3F1D6A000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E67CC000
trusted library allocation
page read and write
1A3ED032000
trusted library allocation
page read and write
1A3ED39B000
trusted library allocation
page read and write
1A3F0ABB000
trusted library allocation
page read and write
1D906728000
heap
page read and write
1A3DBFD7000
heap
page read and write
1A3ED149000
trusted library allocation
page read and write
1A3E7517000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E107D000
trusted library allocation
page read and write
1A3F13F5000
trusted library allocation
page read and write
1A3E109C000
trusted library allocation
page read and write
1A3DBFDD000
heap
page read and write
1A3F0AC2000
trusted library allocation
page read and write
1A3E6172000
trusted library allocation
page read and write
1A3E755E000
trusted library allocation
page read and write
1CA8DB5B000
trusted library allocation
page read and write
1A3E6BD7000
trusted library allocation
page read and write
1A3E509E000
trusted library allocation
page read and write
1A3EE06F000
trusted library allocation
page read and write
1A3E7AE5000
trusted library allocation
page read and write
1A3F1596000
trusted library allocation
page read and write
1A3EE14E000
trusted library allocation
page read and write
1A3E22DD000
trusted library allocation
page read and write
1A3ED254000
trusted library allocation
page read and write
1D9060F0000
trusted library section
page readonly
1A3F0615000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3ED250000
trusted library allocation
page read and write
1A3ED3B5000
trusted library allocation
page read and write
1A3F2124000
trusted library allocation
page read and write
1A3E7A51000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E4BC4000
trusted library allocation
page read and write
1A3EE2DF000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3ED6C4000
trusted library allocation
page read and write
1A3EDCD2000
trusted library allocation
page read and write
1A3E5171000
trusted library allocation
page read and write
1A3E6169000
trusted library allocation
page read and write
1A3F0A75000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DC034000
heap
page read and write
1D906720000
heap
page read and write
13B8000
heap
page read and write
1A3EE0F2000
trusted library allocation
page read and write
1A3F11AE000
trusted library allocation
page read and write
1A3E8610000
trusted library allocation
page read and write
1A3E619B000
trusted library allocation
page read and write
1A3F11DF000
trusted library allocation
page read and write
1A3DC02C000
heap
page read and write
1A3ED3E9000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3DC041000
heap
page read and write
13C2000
heap
page read and write
1A3DBFF0000
heap
page read and write
1CA8DD10000
trusted library allocation
page read and write
1A3DBFEB000
heap
page read and write
1A3E8B4B000
trusted library allocation
page read and write
1A3E6121000
trusted library allocation
page read and write
1D905B30000
unclassified section
page read and write
1A3E679F000
trusted library allocation
page read and write
1A3DC038000
heap
page read and write
1A3E50B0000
trusted library allocation
page read and write
1A3E6680000
trusted library allocation
page read and write
1A3E61AA000
trusted library allocation
page read and write
1A3E09DF000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3DC033000
heap
page read and write
1A3E6902000
trusted library allocation
page read and write
1A3EDB81000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3ED6DA000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFD6000
heap
page read and write
1E58D481000
heap
page read and write
1A3EE0A3000
trusted library allocation
page read and write
1CA8D820000
heap
page read and write
1A3EE0DB000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E7AAF000
trusted library allocation
page read and write
1A3F11B8000
trusted library allocation
page read and write
1A3E621F000
trusted library allocation
page read and write
1A3E6297000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3F0A75000
trusted library allocation
page read and write
1A3E62A7000
trusted library allocation
page read and write
1A3ED1A3000
trusted library allocation
page read and write
1A3E62A3000
trusted library allocation
page read and write
1A3F1382000
trusted library allocation
page read and write
1A3E86F0000
trusted library allocation
page read and write
1A3EE069000
trusted library allocation
page read and write
1A3EE0C7000
trusted library allocation
page read and write
1A3E7CBF000
trusted library allocation
page read and write
1A3E6586000
trusted library allocation
page read and write
1A3E09B3000
trusted library allocation
page read and write
C7DF1000
trusted library allocation
page execute read
1D906144000
unkown
page execute read
1A3F14EA000
trusted library allocation
page read and write
1A3EEB18000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3E89D4000
trusted library allocation
page read and write
13BA000
heap
page read and write
1A3E614F000
trusted library allocation
page read and write
1A3E6282000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFFC000
heap
page read and write
1A3E50D8000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3E75DF000
trusted library allocation
page read and write
1D906731000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3EE091000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A2000
unkown
page readonly
1A3F0AE6000
trusted library allocation
page read and write
1A3DBFCD000
heap
page read and write
1A3E7A30000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED5E4000
trusted library allocation
page read and write
1A3ECFF7000
trusted library allocation
page read and write
1A3ED579000
trusted library allocation
page read and write
1CA8D9D0000
heap
page readonly
1A3F0668000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E6994000
trusted library allocation
page read and write
1A3DC066000
heap
page read and write
1A3E86FB000
trusted library allocation
page read and write
1A3EEC24000
trusted library allocation
page read and write
1A3DBFE6000
heap
page read and write
1A3ED678000
trusted library allocation
page read and write
1A3F0A32000
trusted library allocation
page read and write
1A3ED5E9000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3EFEA8000
trusted library allocation
page read and write
1A3E6BF4000
trusted library allocation
page read and write
1A3EE0C7000
trusted library allocation
page read and write
1398000
heap
page read and write
1CA8D93A000
heap
page read and write
1D905A75000
trusted library allocation
page read and write
1A3ED1E9000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3E5B98000
trusted library allocation
page read and write
1D905AEF000
trusted library allocation
page read and write
1A3ED1D5000
trusted library allocation
page read and write
1A3EE041000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E6132000
trusted library allocation
page read and write
1A3ED195000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E107D000
trusted library allocation
page read and write
1A3EE0DB000
trusted library allocation
page read and write
1A3F1651000
heap
page read and write
1A3ED195000
trusted library allocation
page read and write
1A3E749B000
trusted library allocation
page read and write
1A3EE19B000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1A3EE048000
trusted library allocation
page read and write
1A3E89FB000
trusted library allocation
page read and write
1CA8DB92000
trusted library allocation
page read and write
1A3EE08B000
trusted library allocation
page read and write
1A3E6964000
trusted library allocation
page read and write
1A3E66F3000
trusted library allocation
page read and write
1D906798000
heap
page read and write
1A3E4F87000
trusted library allocation
page read and write
1A3E6B82000
trusted library allocation
page read and write
1A3E8BDE000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3F107E000
trusted library allocation
page read and write
1A3ECFD8000
trusted library allocation
page read and write
1A3F0A8F000
trusted library allocation
page read and write
1A3E8BFD000
trusted library allocation
page read and write
1A3E699E000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3ED512000
trusted library allocation
page read and write
1A3E755E000
trusted library allocation
page read and write
1A3E6A5D000
trusted library allocation
page read and write
1A3E22F6000
trusted library allocation
page read and write
1A3E7AED000
trusted library allocation
page read and write
1A3EDCD2000
trusted library allocation
page read and write
1A3E4F4E000
trusted library allocation
page read and write
1A3F16C0000
heap
page read and write
1A3F1582000
trusted library allocation
page read and write
1A3EE0D2000
trusted library allocation
page read and write
20AA3C65000
trusted library allocation
page read and write
1A3E10F0000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3ED0BA000
trusted library allocation
page read and write
1A3EE14E000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFCE000
heap
page read and write
1D905A65000
trusted library allocation
page read and write
1A3E6660000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3F10D8000
trusted library allocation
page read and write
1A3F10D8000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3ED261000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3ED12F000
trusted library allocation
page read and write
1A3E6907000
trusted library allocation
page read and write
20AA3C70000
trusted library allocation
page read and write
1A3F11D6000
trusted library allocation
page read and write
1A3E6911000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E106A000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3E5E85000
trusted library allocation
page read and write
1A3E223D000
trusted library allocation
page read and write
1A3EE0AD000
trusted library allocation
page read and write
FFE000
stack
page read and write
1A3EE19B000
trusted library allocation
page read and write
1A3DBFF2000
heap
page read and write
1A3E4F55000
trusted library allocation
page read and write
1A3E506D000
trusted library allocation
page read and write
1A3E5B95000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3EDCF3000
trusted library allocation
page read and write
1A3DBFD3000
heap
page read and write
1A3E6A3F000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3F11B8000
trusted library allocation
page read and write
1A3E6ACC000
trusted library allocation
page read and write
1A3F13E7000
trusted library allocation
page read and write
20AA3CB2000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1CA8DB69000
trusted library allocation
page read and write
1A3E62AE000
trusted library allocation
page read and write
1A3DBFFA000
heap
page read and write
1A3E649D000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3ED6E8000
trusted library allocation
page read and write
1A3F11C9000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E6988000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED6C7000
trusted library allocation
page read and write
1A3E657A000
trusted library allocation
page read and write
1A3EEC01000
trusted library allocation
page read and write
1A3E619F000
trusted library allocation
page read and write
1A3E755E000
trusted library allocation
page read and write
1A3F1393000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1D9066CD000
heap
page read and write
1A3EE095000
trusted library allocation
page read and write
1A3ED4CF000
trusted library allocation
page read and write
1A3F16AC000
heap
page read and write
1A3E7BAA000
trusted library allocation
page read and write
1A3EE0C4000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3E7A2D000
trusted library allocation
page read and write
1A3EDCF9000
trusted library allocation
page read and write
1A3E68F0000
trusted library allocation
page read and write
1A3E68EB000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFC5000
heap
page read and write
1A3E5B8C000
trusted library allocation
page read and write
1A3E7AAC000
trusted library allocation
page read and write
1A3E8BF9000
trusted library allocation
page read and write
1A3E28DA000
heap
page read and write
1A3DBFDB000
heap
page read and write
1A3DBFE9000
heap
page read and write
1D9066A0000
heap
page read and write
1A3ED14B000
trusted library allocation
page read and write
1A3ED2E8000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3ED1A3000
trusted library allocation
page read and write
1A3E65B2000
trusted library allocation
page read and write
1A3DC060000
heap
page read and write
1A3F10FE000
trusted library allocation
page read and write
1A3E7A24000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3F1399000
trusted library allocation
page read and write
1A3E9289000
trusted library allocation
page read and write
1D906150000
trusted library allocation
page read and write
1A3E665B000
trusted library allocation
page read and write
1A3F10F7000
trusted library allocation
page read and write
1A3EF7DE000
trusted library allocation
page read and write
1A3E62AC000
trusted library allocation
page read and write
1A3EE2DF000
trusted library allocation
page read and write
1A3E62E9000
trusted library allocation
page read and write
1A3DBFE4000
heap
page read and write
1A3DBFDE000
heap
page read and write
1A3E51F3000
trusted library allocation
page read and write
1A3F0A32000
trusted library allocation
page read and write
1A3E50B0000
trusted library allocation
page read and write
1A3E7ACD000
trusted library allocation
page read and write
1A3F13E5000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3E6BCD000
trusted library allocation
page read and write
1A3ED18C000
trusted library allocation
page read and write
1A3E6F00000
trusted library allocation
page read and write
1A3ED383000
trusted library allocation
page read and write
1D905ACE000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3DC00F000
heap
page read and write
20AA3C24000
trusted library allocation
page read and write
1A3EE0E0000
trusted library allocation
page read and write
1A3E69F9000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3ED1EB000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E863D000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3ED3AF000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1D9066DC000
heap
page read and write
1A3DBFED000
heap
page read and write
E0000
unkown
page readonly
1A3DBFD6000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E10B3000
trusted library allocation
page read and write
1A3E6A67000
trusted library allocation
page read and write
1A3E69DC000
trusted library allocation
page read and write
1A3ED6DF000
trusted library allocation
page read and write
1A3F0695000
trusted library allocation
page read and write
1E58F180000
heap
page read and write
1D905A23000
trusted library allocation
page read and write
1A3ED147000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3E91B6000
trusted library allocation
page read and write
1A3E7AB4000
trusted library allocation
page read and write
1A3F15A7000
trusted library allocation
page read and write
1A3E53F6000
trusted library allocation
page read and write
1A3ED5E6000
trusted library allocation
page read and write
1A3DBFD0000
heap
page read and write
1D906798000
heap
page read and write
1A3DBFD4000
heap
page read and write
1D905AC0000
trusted library allocation
page read and write
1CA8D770000
heap
page read and write
1A3EDB0C000
trusted library allocation
page read and write
1A3E5E4D000
trusted library allocation
page read and write
1A3E69FB000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3ED5E6000
trusted library allocation
page read and write
1A3F14EE000
trusted library allocation
page read and write
1A3F0AC0000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3F16C5000
heap
page read and write
1A3E5E27000
trusted library allocation
page read and write
A0B7F28000
stack
page read and write
1D906726000
heap
page read and write
1A3ED142000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3ED5E4000
trusted library allocation
page read and write
1A3ED545000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3F1391000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E66D0000
trusted library allocation
page read and write
1A3DC035000
heap
page read and write
1A3ED393000
trusted library allocation
page read and write
1A3E67CC000
trusted library allocation
page read and write
1A3DC033000
heap
page read and write
1A3E86BE000
trusted library allocation
page read and write
1A3E6289000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3ED3AF000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E4BBA000
trusted library allocation
page read and write
1D90676A000
heap
page read and write
1A3ED6FE000
trusted library allocation
page read and write
1D905750000
unclassified section
page readonly
3A21000
heap
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3E6A66000
trusted library allocation
page read and write
A0BA1FE000
unkown
page readonly
1A3DBFE8000
heap
page read and write
1A3DBFE3000
heap
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E6853000
trusted library allocation
page read and write
1A3E1F31000
trusted library allocation
page read and write
1A3E6687000
trusted library allocation
page read and write
1A3E5E5A000
trusted library allocation
page read and write
20AA3C68000
trusted library allocation
page read and write
1A3E62EB000
trusted library allocation
page read and write
1A3E6132000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3E6924000
trusted library allocation
page read and write
1A3EE2EA000
trusted library allocation
page read and write
1A3E69B2000
trusted library allocation
page read and write
1A3E20E4000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3E1082000
trusted library allocation
page read and write
1A3ED677000
trusted library allocation
page read and write
1A3DBFD2000
heap
page read and write
1A3DC040000
heap
page read and write
1A3EE0AD000
trusted library allocation
page read and write
1A3E6948000
trusted library allocation
page read and write
1A3E5EB8000
trusted library allocation
page read and write
1A3EE2DF000
trusted library allocation
page read and write
1A3E88D6000
trusted library allocation
page read and write
1A3E62AC000
trusted library allocation
page read and write
1A3E7AD2000
trusted library allocation
page read and write
1A3E6A87000
trusted library allocation
page read and write
1A3EE2C7000
trusted library allocation
page read and write
1A3E6690000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3F1710000
heap
page read and write
1A3E617B000
trusted library allocation
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E6574000
trusted library allocation
page read and write
1A3E679F000
trusted library allocation
page read and write
1A3F210E000
trusted library allocation
page read and write
1A3ED142000
trusted library allocation
page read and write
1A3EF791000
trusted library allocation
page read and write
1A3E74EA000
trusted library allocation
page read and write
1A3ED25C000
trusted library allocation
page read and write
1A3E558A000
trusted library allocation
page read and write
1A3EE13C000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3E2074000
trusted library allocation
page read and write
1A3F10FE000
trusted library allocation
page read and write
1A3E538D000
trusted library allocation
page read and write
1A3E75A3000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3ED69E000
trusted library allocation
page read and write
1A3E6981000
trusted library allocation
page read and write
1A3EE0B6000
trusted library allocation
page read and write
1A3E69A1000
trusted library allocation
page read and write
1CA8D9EF000
unclassified section
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3E22DD000
trusted library allocation
page read and write
1A3DC060000
heap
page read and write
1CA8D910000
heap
page read and write
1D90673C000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3DC033000
heap
page read and write
1A3E92B1000
trusted library allocation
page read and write
1A3F16A8000
heap
page read and write
1A3E7AE5000
trusted library allocation
page read and write
1D90677B000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3ED5E8000
trusted library allocation
page read and write
1A3DBFEA000
heap
page read and write
1E58D700000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3E6892000
trusted library allocation
page read and write
1A3F0ABB000
trusted library allocation
page read and write
1A3EE157000
trusted library allocation
page read and write
1E58D5A0000
heap
page read and write
1A3E68C7000
trusted library allocation
page read and write
1A3E2035000
trusted library allocation
page read and write
1AC000
unkown
page write copy
1A3DBFD4000
heap
page read and write
1A3ED4F6000
trusted library allocation
page read and write
1A3E91AE000
trusted library allocation
page read and write
64381FE000
stack
page read and write
1A3ED29A000
trusted library allocation
page read and write
1A3F106B000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3ED3BF000
trusted library allocation
page read and write
1A3E5BCA000
trusted library allocation
page read and write
1A3E233A000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3ECFF1000
trusted library allocation
page read and write
1A3E6B24000
trusted library allocation
page read and write
1A3E6553000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
20AA3C30000
trusted library allocation
page read and write
1A3E74BD000
trusted library allocation
page read and write
1A3E8662000
trusted library allocation
page read and write
1A3F0AC9000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1CA8DA00000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3E8814000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E6BF8000
trusted library allocation
page read and write
13CE000
heap
page read and write
1A3E6BD1000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3ED56E000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3ED1EE000
trusted library allocation
page read and write
1A3E5079000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E8949000
trusted library allocation
page read and write
1A3E5EB5000
trusted library allocation
page read and write
20AA3A42000
unclassified section
page read and write
1A3F16BB000
heap
page read and write
1A3EDCA5000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E6AF4000
trusted library allocation
page read and write
20AA3860000
unclassified section
page readonly
FAD912E000
stack
page read and write
1A3E53FC000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3E6154000
trusted library allocation
page read and write
1A3F1593000
trusted library allocation
page read and write
1A3DC002000
heap
page read and write
1A3ED3CD000
trusted library allocation
page read and write
1A3E62BA000
trusted library allocation
page read and write
1A3EF7CB000
trusted library allocation
page read and write
1A3E26CF000
trusted library allocation
page read and write
1A3E0990000
trusted library allocation
page read and write
1A3EE0B6000
trusted library allocation
page read and write
1A3E6BCC000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3E6943000
trusted library allocation
page read and write
1A3E1F31000
trusted library allocation
page read and write
1A3F108B000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E7440000
trusted library allocation
page read and write
C7D71000
trusted library allocation
page execute read
1A3E62EB000
trusted library allocation
page read and write
1A3E50D2000
trusted library allocation
page read and write
1A3F1603000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3E6658000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3E6624000
trusted library allocation
page read and write
1A3E6BD4000
trusted library allocation
page read and write
1A3DBFD3000
heap
page read and write
1A3EDB28000
trusted library allocation
page read and write
1A3EE0CD000
trusted library allocation
page read and write
1A3E09EF000
trusted library allocation
page read and write
1A3E69F9000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E4B60000
trusted library allocation
page read and write
1CA8D9C4000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3EEAC1000
trusted library allocation
page read and write
20AA3C8F000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EE045000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E5079000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DC034000
heap
page read and write
1A3E75C2000
trusted library allocation
page read and write
1A3ED5F0000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3F1399000
trusted library allocation
page read and write
1A3E6743000
trusted library allocation
page read and write
1A3E4F77000
trusted library allocation
page read and write
1A3EF7D7000
trusted library allocation
page read and write
1A3F1076000
trusted library allocation
page read and write
3A20000
heap
page read and write
1D906731000
heap
page read and write
1A3E6ACE000
trusted library allocation
page read and write
13B2000
heap
page read and write
1A3EEC04000
trusted library allocation
page read and write
1A3E50CE000
trusted library allocation
page read and write
1A3E75D5000
trusted library allocation
page read and write
1A3E7A76000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1D905780000
heap
page read and write
1A3ED045000
trusted library allocation
page read and write
1A3E1F58000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1A3EDB43000
trusted library allocation
page read and write
1A3F10AA000
trusted library allocation
page read and write
1A3ED39C000
trusted library allocation
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3E6A5D000
trusted library allocation
page read and write
1A3DBFF3000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3E509D000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3ED3BF000
trusted library allocation
page read and write
1A3ED5E8000
trusted library allocation
page read and write
64389FF000
stack
page read and write
1A3F169D000
heap
page read and write
1A3E6712000
trusted library allocation
page read and write
64369FE000
stack
page read and write
1A3F109E000
trusted library allocation
page read and write
1A3E6BD7000
trusted library allocation
page read and write
1A3F169C000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3F1397000
trusted library allocation
page read and write
1A3E6BEE000
trusted library allocation
page read and write
1A3E4BD8000
trusted library allocation
page read and write
1A3E6AE0000
trusted library allocation
page read and write
1A3E5067000
trusted library allocation
page read and write
1A3ED5E9000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3ED1EB000
trusted library allocation
page read and write
FAD90AE000
stack
page read and write
1A3ED4E3000
trusted library allocation
page read and write
1A3E6143000
trusted library allocation
page read and write
1A3E6B1F000
trusted library allocation
page read and write
1A3E5375000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DC03C000
heap
page read and write
1A3DC023000
heap
page read and write
1A3E4FA5000
trusted library allocation
page read and write
13CE000
heap
page read and write
1D9066EA000
heap
page read and write
1A3EDB68000
trusted library allocation
page read and write
1A3E6690000
trusted library allocation
page read and write
20AA3CF4000
trusted library allocation
page read and write
1A3E5E1E000
trusted library allocation
page read and write
1A3ED5B2000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3DBFE6000
heap
page read and write
1A3E6A5D000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3E6BD7000
trusted library allocation
page read and write
1E58EFAC000
heap
page read and write
1A3DC049000
heap
page read and write
13C1000
heap
page read and write
8FE3DFE000
unkown
page readonly
1A3E6AF4000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3ED149000
trusted library allocation
page read and write
1A3E2290000
trusted library allocation
page read and write
1A3E6BE7000
trusted library allocation
page read and write
1A3EE16C000
trusted library allocation
page read and write
1A3E09C8000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3E7AD2000
trusted library allocation
page read and write
1D905AC7000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E6BE7000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3DBFD9000
heap
page read and write
1A3E89D2000
trusted library allocation
page read and write
1A3DBFC5000
heap
page read and write
1A3F11D6000
trusted library allocation
page read and write
1A3F2137000
trusted library allocation
page read and write
1A3E22EB000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EE067000
trusted library allocation
page read and write
1A3E618D000
trusted library allocation
page read and write
1A3DC066000
heap
page read and write
1A3F13BF000
trusted library allocation
page read and write
1A3E4F55000
trusted library allocation
page read and write
1A3ED2A0000
trusted library allocation
page read and write
1A3F169C000
heap
page read and write
1A3EEB89000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1CA8DD1E000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3EE124000
trusted library allocation
page read and write
8FE1C7E000
unkown
page readonly
1A3E6BC1000
trusted library allocation
page read and write
20AA3CF6000
trusted library allocation
page read and write
1A3EE19B000
trusted library allocation
page read and write
1A3F16B1000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3ED53B000
trusted library allocation
page read and write
1A3E664A000
trusted library allocation
page read and write
1A3E6A7F000
trusted library allocation
page read and write
1A3F0A38000
trusted library allocation
page read and write
1A3E5E64000
trusted library allocation
page read and write
1A3E6A30000
trusted library allocation
page read and write
1A3E62B1000
trusted library allocation
page read and write
1A3E6BE4000
trusted library allocation
page read and write
1A3E7CC1000
trusted library allocation
page read and write
1A3ED06F000
trusted library allocation
page read and write
1A3ED5E2000
trusted library allocation
page read and write
1A3E515B000
trusted library allocation
page read and write
1A3E6789000
trusted library allocation
page read and write
1A3EEC24000
trusted library allocation
page read and write
1D905B40000
heap
page read and write
1A3E69B2000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F14E4000
trusted library allocation
page read and write
1A3F16A2000
heap
page read and write
1A3F10E8000
trusted library allocation
page read and write
1A3EDB6C000
trusted library allocation
page read and write
1A3DC05E000
heap
page read and write
1C22B100000
trusted library allocation
page read and write
1A3E5069000
trusted library allocation
page read and write
1A3ED543000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3DC002000
heap
page read and write
1A3E69A1000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3ED53D000
trusted library allocation
page read and write
1A3E4F8E000
trusted library allocation
page read and write
1A3ED028000
trusted library allocation
page read and write
1A3F16BE000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E755C000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E67A9000
trusted library allocation
page read and write
1A3E8980000
trusted library allocation
page read and write
1A3EE13A000
trusted library allocation
page read and write
1A3E5067000
trusted library allocation
page read and write
C7DE1000
trusted library allocation
page execute read
1A3EDCF9000
trusted library allocation
page read and write
1A3ED523000
trusted library allocation
page read and write
1A3E4F4B000
trusted library allocation
page read and write
1D90578A000
heap
page read and write
1A3EDB50000
trusted library allocation
page read and write
1A3E6B4E000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
456BFC000
stack
page read and write
1A3ED6FE000
trusted library allocation
page read and write
1A3ED0CD000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3ED0A9000
trusted library allocation
page read and write
1A3E618B000
trusted library allocation
page read and write
1A3EE132000
trusted library allocation
page read and write
1D906720000
heap
page read and write
1A3E107E000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DC02E000
heap
page read and write
20AA3893000
heap
page read and write
1A3E656A000
trusted library allocation
page read and write
1A3ED680000
trusted library allocation
page read and write
1CA8DE04000
heap
page read and write
1A3E8B43000
trusted library allocation
page read and write
1A3ED4EB000
trusted library allocation
page read and write
1A3E89ED000
trusted library allocation
page read and write
1A3ED0EF000
trusted library allocation
page read and write
1A3F1596000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3E68C4000
trusted library allocation
page read and write
1A3E5BA2000
trusted library allocation
page read and write
1D90672B000
heap
page read and write
1D9066A0000
heap
page read and write
1A3ED0BA000
trusted library allocation
page read and write
1A3F1605000
heap
page read and write
1A3E2899000
heap
page read and write
13C2000
heap
page read and write
1A3E6BF8000
trusted library allocation
page read and write
1A3EE16C000
trusted library allocation
page read and write
1D9066A3000
heap
page read and write
1A3EE2D9000
trusted library allocation
page read and write
1A3E8BFD000
trusted library allocation
page read and write
1A3EE021000
trusted library allocation
page read and write
1A3E6A6D000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E50D3000
trusted library allocation
page read and write
13B2000
heap
page read and write
1A3E6650000
trusted library allocation
page read and write
1A3F13BF000
trusted library allocation
page read and write
1A3E91FC000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3E4F8C000
trusted library allocation
page read and write
1A3ED3AF000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3E8B48000
trusted library allocation
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3ED11C000
trusted library allocation
page read and write
8FE1CFE000
unkown
page readonly
1A3E205B000
trusted library allocation
page read and write
1A3E5E36000
trusted library allocation
page read and write
1A3E74DA000
trusted library allocation
page read and write
1A3E6493000
trusted library allocation
page read and write
1A3E20E4000
trusted library allocation
page read and write
1A3ED3CD000
trusted library allocation
page read and write
1A3DC033000
heap
page read and write
1A3E6BC1000
trusted library allocation
page read and write
1A3E4BF7000
trusted library allocation
page read and write
1A3E62A6000
trusted library allocation
page read and write
1A3E6293000
trusted library allocation
page read and write
1A3E6657000
trusted library allocation
page read and write
1A3E6BF5000
trusted library allocation
page read and write
1A3E7AAC000
trusted library allocation
page read and write
20AA3DC0000
heap
page read and write
1A3E699E000
trusted library allocation
page read and write
1A3DC045000
heap
page read and write
1A3F11A8000
trusted library allocation
page read and write
1A3E663B000
trusted library allocation
page read and write
1A3E8BC1000
trusted library allocation
page read and write
1A3E6BEE000
trusted library allocation
page read and write
1D90676D000
heap
page read and write
1A3E268E000
trusted library allocation
page read and write
1A3EE08B000
trusted library allocation
page read and write
1A3E6AA0000
trusted library allocation
page read and write
1A3E7548000
trusted library allocation
page read and write
1CA8DB60000
trusted library allocation
page read and write
1A3E6AEC000
trusted library allocation
page read and write
FCF000
stack
page read and write
1CA8DBA7000
trusted library allocation
page read and write
1A3E5BA2000
trusted library allocation
page read and write
1A3F10E8000
trusted library allocation
page read and write
1A3ED56C000
trusted library allocation
page read and write
1A3F10AA000
trusted library allocation
page read and write
1190000
heap
page read and write
1A3ED6F9000
trusted library allocation
page read and write
1A3DC04E000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3E62A6000
trusted library allocation
page read and write
1A3ED405000
trusted library allocation
page read and write
1A3E5089000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED3A5000
trusted library allocation
page read and write
1A3ED1FD000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3ED585000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E4F5A000
trusted library allocation
page read and write
1A3ED3F5000
trusted library allocation
page read and write
1A3E4BFE000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E6BF4000
trusted library allocation
page read and write
1A3E618D000
trusted library allocation
page read and write
20AA3C00000
trusted library allocation
page read and write
1A3DBFD9000
heap
page read and write
1A3F16A7000
heap
page read and write
1D905A5F000
trusted library allocation
page read and write
1A3ED424000
trusted library allocation
page read and write
20AA3C78000
trusted library allocation
page read and write
1A3E26F4000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1CA8DC20000
unclassified section
page readonly
1A3DC002000
heap
page read and write
1A3E6B15000
trusted library allocation
page read and write
1A3ECFE1000
trusted library allocation
page read and write
1A3EEBB4000
trusted library allocation
page read and write
1A3E508E000
trusted library allocation
page read and write
1A3E5120000
trusted library allocation
page read and write
3A21000
heap
page read and write
1A3DBFF3000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3EDB81000
trusted library allocation
page read and write
1A3ED0BA000
trusted library allocation
page read and write
1A3E62C3000
trusted library allocation
page read and write
1A3E7CCB000
trusted library allocation
page read and write
1A3E6AA0000
trusted library allocation
page read and write
1A3E6BEB000
trusted library allocation
page read and write
1A3ED5F8000
trusted library allocation
page read and write
1A3F10E8000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E5E18000
trusted library allocation
page read and write
1A3E6AA5000
trusted library allocation
page read and write
1A3E2656000
trusted library allocation
page read and write
1A3F0A75000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3EE0D2000
trusted library allocation
page read and write
1A3DC039000
heap
page read and write
1A3F1605000
heap
page read and write
1A3E61AA000
trusted library allocation
page read and write
1D90622A000
trusted library allocation
page read and write
1A3E2240000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E65FC000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3ED3DB000
trusted library allocation
page read and write
1A3E6760000
trusted library allocation
page read and write
1A3ED125000
trusted library allocation
page read and write
1A3ED5E6000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3ED112000
trusted library allocation
page read and write
1A2000
unkown
page readonly
1E58D600000
trusted library allocation
page read and write
1D906209000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3F06AC000
trusted library allocation
page read and write
1A3E2887000
heap
page read and write
1A3DBFDC000
heap
page read and write
1A3E62C3000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EF78A000
trusted library allocation
page read and write
1A3E8BDC000
trusted library allocation
page read and write
1A3DBFD3000
heap
page read and write
1A3ED65D000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3F0A97000
trusted library allocation
page read and write
1A3EE2F2000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E6ACA000
trusted library allocation
page read and write
1A3E5095000
trusted library allocation
page read and write
1A3DC033000
heap
page read and write
1A3ED066000
trusted library allocation
page read and write
1A3E894C000
trusted library allocation
page read and write
1A3E7CA2000
trusted library allocation
page read and write
1A3EE0D9000
trusted library allocation
page read and write
17C000
unkown
page readonly
1A3DBFE7000
heap
page read and write
1A3E5BA7000
trusted library allocation
page read and write
1A3ED261000
trusted library allocation
page read and write
1A3E75D5000
trusted library allocation
page read and write
1A3E516A000
trusted library allocation
page read and write
1A3EE095000
trusted library allocation
page read and write
1D905AB5000
trusted library allocation
page read and write
1A3F138F000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3ED668000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EDB14000
trusted library allocation
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E61ED000
trusted library allocation
page read and write
1A3E693B000
trusted library allocation
page read and write
930000
heap
page read and write
1A3EE039000
trusted library allocation
page read and write
1A3E8B45000
trusted library allocation
page read and write
1A3E7A34000
trusted library allocation
page read and write
1D905770000
heap
page read and write
1A3E6966000
trusted library allocation
page read and write
1A3E6B2B000
trusted library allocation
page read and write
1A3E6BF4000
trusted library allocation
page read and write
1A3E0998000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFDF000
heap
page read and write
11B4000
heap
page read and write
1A3ED6F4000
trusted library allocation
page read and write
1A3E5BF4000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E6A6F000
trusted library allocation
page read and write
1A3F1062000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3EF7E5000
trusted library allocation
page read and write
1A3EE0BB000
trusted library allocation
page read and write
1A3E68C2000
trusted library allocation
page read and write
1A3E7C64000
trusted library allocation
page read and write
1A3DC045000
heap
page read and write
1A3E511D000
trusted library allocation
page read and write
1A3E68CE000
trusted library allocation
page read and write
1A3E50FC000
trusted library allocation
page read and write
1D906723000
heap
page read and write
1A3E2663000
trusted library allocation
page read and write
13BB000
heap
page read and write
1A3DBFED000
heap
page read and write
13B8000
heap
page read and write
1A3ED2D5000
trusted library allocation
page read and write
1A3F1605000
heap
page read and write
1CA8DB00000
trusted library allocation
page read and write
1A3ED1D7000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3ED578000
trusted library allocation
page read and write
1A3ED545000
trusted library allocation
page read and write
1A3DC05F000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3EEB59000
trusted library allocation
page read and write
1A3ED4C4000
trusted library allocation
page read and write
1A3ECFFD000
trusted library allocation
page read and write
1A3EE143000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DC02C000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3E5EBA000
trusted library allocation
page read and write
1D906141000
unkown
page execute read
1A3EDCE8000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E2239000
trusted library allocation
page read and write
1D906200000
trusted library allocation
page read and write
1A3DBFD8000
heap
page read and write
1A3DBFDB000
heap
page read and write
1A3E6A87000
trusted library allocation
page read and write
1A3EE095000
trusted library allocation
page read and write
1A3E6589000
trusted library allocation
page read and write
A0BC2BE000
unkown
page readonly
1A3E9301000
trusted library allocation
page read and write
1A3E75DF000
trusted library allocation
page read and write
1A3F13FE000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E89CE000
trusted library allocation
page read and write
20AA37D0000
unclassified section
page readonly
1A3DBFE7000
heap
page read and write
1A3E6994000
trusted library allocation
page read and write
1A3F11B8000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3E7AC8000
trusted library allocation
page read and write
1A3EE136000
trusted library allocation
page read and write
1CA8DD32000
trusted library allocation
page read and write
1A3E516A000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3ED343000
trusted library allocation
page read and write
1A3E666E000
trusted library allocation
page read and write
1170000
heap
page read and write
1A3E8E96000
trusted library allocation
page read and write
1A3F1605000
heap
page read and write
1D9066E1000
heap
page read and write
11B4000
heap
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3E6BAE000
trusted library allocation
page read and write
1A3E5E0C000
trusted library allocation
page read and write
1A3ED4BF000
trusted library allocation
page read and write
1A3DBFF2000
heap
page read and write
1A3ED192000
trusted library allocation
page read and write
1A3ED10C000
trusted library allocation
page read and write
1A3EE143000
trusted library allocation
page read and write
1A3E5079000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3F1395000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3F11C1000
trusted library allocation
page read and write
1A3E9266000
trusted library allocation
page read and write
1A3EE02B000
trusted library allocation
page read and write
1A3E2335000
trusted library allocation
page read and write
1A3E7AE1000
trusted library allocation
page read and write
1A3DC04E000
heap
page read and write
1A3E69D8000
trusted library allocation
page read and write
1A3E6B34000
trusted library allocation
page read and write
1A3E758F000
trusted library allocation
page read and write
1A3E6B4A000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3ED1C6000
trusted library allocation
page read and write
1A3E6189000
trusted library allocation
page read and write
1A3E6BF8000
trusted library allocation
page read and write
1CA8DC00000
heap
page read and write
1A3DBFF7000
heap
page read and write
20AA3A50000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3E6BF4000
trusted library allocation
page read and write
1A3F169D000
heap
page read and write
1A3E6789000
trusted library allocation
page read and write
C7D3D000
trusted library allocation
page execute read
1A3ED049000
trusted library allocation
page read and write
1A3E2033000
trusted library allocation
page read and write
1A3E628F000
trusted library allocation
page read and write
1A3EE0CE000
trusted library allocation
page read and write
1A3E74A0000
trusted library allocation
page read and write
1A3E6197000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3F1088000
trusted library allocation
page read and write
1A3E6157000
trusted library allocation
page read and write
1A3EEAFC000
trusted library allocation
page read and write
1A3E0FFB000
trusted library allocation
page read and write
1A3E6BB2000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3DBFE2000
heap
page read and write
1CA8DB47000
trusted library allocation
page read and write
8FE1D3E000
stack
page read and write
1A3E4F72000
trusted library allocation
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3EEB89000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3E5EC6000
trusted library allocation
page read and write
1A3EE154000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFDE000
heap
page read and write
1A3F1586000
trusted library allocation
page read and write
1A3ED69C000
trusted library allocation
page read and write
1A3ED3B5000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
20AA3B00000
trusted library allocation
page read and write
1A3E69E7000
trusted library allocation
page read and write
1A3ED341000
trusted library allocation
page read and write
1A3E6BEE000
trusted library allocation
page read and write
1D906649000
heap
page read and write
1A3DC024000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E5E38000
trusted library allocation
page read and write
1A3E6961000
trusted library allocation
page read and write
1A3E669D000
trusted library allocation
page read and write
1CA8DBC9000
trusted library allocation
page read and write
1A3E5047000
trusted library allocation
page read and write
1A3DBFD3000
heap
page read and write
1A3F0A8F000
trusted library allocation
page read and write
1A3E75D5000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E69E4000
trusted library allocation
page read and write
1A3DBFE3000
heap
page read and write
1A3E69DC000
trusted library allocation
page read and write
1A3EE2F2000
trusted library allocation
page read and write
1A3E68E3000
trusted library allocation
page read and write
1A3E6B27000
trusted library allocation
page read and write
1A3E6B27000
trusted library allocation
page read and write
1A3E1075000
trusted library allocation
page read and write
1A3ED03C000
trusted library allocation
page read and write
1A3E09C4000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E5163000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E8639000
trusted library allocation
page read and write
1A3E662F000
trusted library allocation
page read and write
1A3E67A9000
trusted library allocation
page read and write
1A3ED573000
trusted library allocation
page read and write
1A3F11A8000
trusted library allocation
page read and write
1A3E628D000
trusted library allocation
page read and write
1A3E62A8000
trusted library allocation
page read and write
1A3F1656000
heap
page read and write
1A3ED29C000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3E5BA2000
trusted library allocation
page read and write
1A3E5B9E000
trusted library allocation
page read and write
11B4000
heap
page read and write
1D90672B000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3E616C000
trusted library allocation
page read and write
1A3E6B08000
trusted library allocation
page read and write
1CA8DB64000
trusted library allocation
page read and write
1A3EE148000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3EDCA3000
trusted library allocation
page read and write
1A3ED331000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F2128000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F0A97000
trusted library allocation
page read and write
1D906784000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E2050000
trusted library allocation
page read and write
1A3E86F8000
trusted library allocation
page read and write
1A3E51AC000
trusted library allocation
page read and write
1E58EFC0000
heap
page read and write
1A3E6BAE000
trusted library allocation
page read and write
1A3EE2F3000
trusted library allocation
page read and write
1A3E8BC1000
trusted library allocation
page read and write
1A3E507B000
trusted library allocation
page read and write
1A3E69BC000
trusted library allocation
page read and write
1A3E6660000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E6BE0000
trusted library allocation
page read and write
1A3EE1F9000
trusted library allocation
page read and write
1A3E86D5000
trusted library allocation
page read and write
1A3E7CCF000
trusted library allocation
page read and write
1A3EE065000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DC034000
heap
page read and write
1A3E61AA000
trusted library allocation
page read and write
1A3EF7F5000
trusted library allocation
page read and write
1A3ED0BF000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3ED322000
trusted library allocation
page read and write
1A3E2290000
trusted library allocation
page read and write
1A3DBFEB000
heap
page read and write
1A3E662F000
trusted library allocation
page read and write
1A3E69DF000
trusted library allocation
page read and write
1A3DBFDE000
heap
page read and write
13C0000
heap
page read and write
1A3E221C000
trusted library allocation
page read and write
1A3E4B33000
trusted library allocation
page read and write
1A3ED1D4000
trusted library allocation
page read and write
1A3E2653000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E625B000
trusted library allocation
page read and write
1A3E7CD1000
trusted library allocation
page read and write
1A3E2044000
trusted library allocation
page read and write
1A3E89F0000
trusted library allocation
page read and write
1A3F1195000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFE4000
heap
page read and write
1A3EE1F9000
trusted library allocation
page read and write
1A3EE0D7000
trusted library allocation
page read and write
1390000
heap
page read and write
1CA8DE08000
heap
page read and write
1A3F138F000
trusted library allocation
page read and write
1A3F11A3000
trusted library allocation
page read and write
1A3E1FC1000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED3C3000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
E1000
unkown
page execute read
1A3EE085000
trusted library allocation
page read and write
1A3E6A73000
trusted library allocation
page read and write
1A3E5EB8000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
1A3E6BCF000
trusted library allocation
page read and write
1A3E225F000
trusted library allocation
page read and write
1A3E9324000
trusted library allocation
page read and write
1D906798000
heap
page read and write
1A3E89FB000
trusted library allocation
page read and write
1A3F06DA000
trusted library allocation
page read and write
1D906164000
unkown
page execute read
1A3DBFE2000
heap
page read and write
1A3EE0D2000
trusted library allocation
page read and write
1A3E7AB4000
trusted library allocation
page read and write
1A3EEBCA000
trusted library allocation
page read and write
1A3E7A26000
trusted library allocation
page read and write
1A3E6A5D000
trusted library allocation
page read and write
1A3ED359000
trusted library allocation
page read and write
1D905A6F000
trusted library allocation
page read and write
1A3E75AA000
trusted library allocation
page read and write
1A3E89C9000
trusted library allocation
page read and write
1A3E6BC9000
trusted library allocation
page read and write
1A3DBFB8000
heap
page read and write
20AA3DC4000
heap
page read and write
1A3ED198000
trusted library allocation
page read and write
1A3F1603000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3E663F000
trusted library allocation
page read and write
1CA8DB2E000
trusted library allocation
page read and write
1A3E6869000
trusted library allocation
page read and write
1A3E7A24000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1A3ED53E000
trusted library allocation
page read and write
1A3E4F61000
trusted library allocation
page read and write
1A3EE1F3000
trusted library allocation
page read and write
1A3E2686000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3F169D000
heap
page read and write
1A3F16B0000
heap
page read and write
1A3F0622000
trusted library allocation
page read and write
1A3E26F4000
trusted library allocation
page read and write
1A3EE13C000
trusted library allocation
page read and write
1A3E629F000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E508E000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
20AA3DC6000
heap
page read and write
1A3ED3C8000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3ED137000
trusted library allocation
page read and write
1E58D48A000
heap
page read and write
1A3E6BEB000
trusted library allocation
page read and write
1A3E664A000
trusted library allocation
page read and write
1D9066CA000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3ED1F8000
trusted library allocation
page read and write
1A3E2078000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3E1013000
trusted library allocation
page read and write
1CA8DBBA000
trusted library allocation
page read and write
1E58D470000
heap
page read and write
1A3EE04C000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3EE167000
trusted library allocation
page read and write
1A3F061E000
trusted library allocation
page read and write
1A3ED53E000
trusted library allocation
page read and write
1A3ED0B6000
trusted library allocation
page read and write
1A3F0A38000
trusted library allocation
page read and write
1CA8DB66000
trusted library allocation
page read and write
1A3E6953000
trusted library allocation
page read and write
1A3E67A9000
trusted library allocation
page read and write
1A3E6B2B000
trusted library allocation
page read and write
1A3E88D9000
trusted library allocation
page read and write
A0BD2BE000
unkown
page readonly
1A3ED1D4000
trusted library allocation
page read and write
1A3E53D9000
trusted library allocation
page read and write
1A3F10F7000
trusted library allocation
page read and write
1A3ED6DA000
trusted library allocation
page read and write
1A3E0FF6000
trusted library allocation
page read and write
1A3E69D1000
trusted library allocation
page read and write
1A3ED1F2000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3EDB08000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3ED521000
trusted library allocation
page read and write
1A3E4B60000
trusted library allocation
page read and write
1A3E5B95000
trusted library allocation
page read and write
1A3EE2F2000
trusted library allocation
page read and write
1A3E6AB1000
trusted library allocation
page read and write
1A3ED5F0000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1D9067B7000
heap
page read and write
1A3ED3D6000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFF3000
heap
page read and write
1A3E92CA000
trusted library allocation
page read and write
1A3F14E6000
trusted library allocation
page read and write
1A3E10EE000
trusted library allocation
page read and write
1A3E1061000
trusted library allocation
page read and write
1A3E66A3000
trusted library allocation
page read and write
1A3EDBC4000
trusted library allocation
page read and write
1A3ED40F000
trusted library allocation
page read and write
1CA8DD12000
trusted library allocation
page read and write
1A3ED4F4000
trusted library allocation
page read and write
1A3E8EE1000
trusted library allocation
page read and write
A0BBABE000
stack
page read and write
1A3EE2ED000
trusted library allocation
page read and write
1A3F1586000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3DC024000
heap
page read and write
1A3E5E51000
trusted library allocation
page read and write
1A3ED527000
trusted library allocation
page read and write
1A3E625B000
trusted library allocation
page read and write
1A3EE14E000
trusted library allocation
page read and write
1A3E61D1000
trusted library allocation
page read and write
1A3E101E000
trusted library allocation
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3E69D8000
trusted library allocation
page read and write
1A3EEBFC000
trusted library allocation
page read and write
1A3F138D000
trusted library allocation
page read and write
1A3E4F4E000
trusted library allocation
page read and write
1A3ED65F000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3EDB9A000
trusted library allocation
page read and write
1A3EE0E0000
trusted library allocation
page read and write
1A3ED671000
trusted library allocation
page read and write
1A3E6572000
trusted library allocation
page read and write
1A3E75AA000
trusted library allocation
page read and write
1A3E4BFE000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3F2073000
trusted library allocation
page read and write
1A3EDB48000
trusted library allocation
page read and write
1A3ED2DE000
trusted library allocation
page read and write
1A3E099A000
trusted library allocation
page read and write
20AA3C19000
trusted library allocation
page read and write
1A3E4B61000
trusted library allocation
page read and write
1A3E6A3F000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFDA000
heap
page read and write
1D9056E0000
unclassified section
page readonly
13CE000
heap
page read and write
1A3E204D000
trusted library allocation
page read and write
1A3ED3FD000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1CA8DD00000
trusted library allocation
page read and write
1A3ED315000
trusted library allocation
page read and write
1A3E7A30000
trusted library allocation
page read and write
1CA8D7D0000
remote allocation
page read and write
1A3E8984000
trusted library allocation
page read and write
3A21000
heap
page read and write
1CA8D7F0000
unclassified section
page readonly
1A3E5129000
trusted library allocation
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3DC025000
heap
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3EE0FC000
trusted library allocation
page read and write
1D906146000
unkown
page execute read
1A3DBFEC000
heap
page read and write
1D906731000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3E0F2F000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3F11AE000
trusted library allocation
page read and write
1A3F212A000
trusted library allocation
page read and write
1A3E8EAD000
trusted library allocation
page read and write
1A3DC03B000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3EE09D000
trusted library allocation
page read and write
1A3ED19B000
trusted library allocation
page read and write
1A3ED5A0000
trusted library allocation
page read and write
1A3ED65B000
trusted library allocation
page read and write
1CA8D7E6000
remote allocation
page execute read
1D90676A000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E8667000
trusted library allocation
page read and write
1A3ED577000
trusted library allocation
page read and write
1A3DC066000
heap
page read and write
1A3DC035000
heap
page read and write
1A3E5EB5000
trusted library allocation
page read and write
1A3EDB68000
trusted library allocation
page read and write
1E58D482000
heap
page read and write
13BC000
heap
page read and write
1A3E518A000
trusted library allocation
page read and write
36D0000
heap
page read and write
1A3E5BB2000
trusted library allocation
page read and write
1A3EE09D000
trusted library allocation
page read and write
1A3E6A90000
trusted library allocation
page read and write
9BE000
stack
page read and write
1CA8D9E0000
unclassified section
page read and write
1A3ED147000
trusted library allocation
page read and write
1A3E519C000
trusted library allocation
page read and write
20AA3C5D000
trusted library allocation
page read and write
1A3ED539000
trusted library allocation
page read and write
1A3EDB4A000
trusted library allocation
page read and write
1A3EE0BB000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1CA8DB81000
trusted library allocation
page read and write
1A3ED0FD000
trusted library allocation
page read and write
1A3E519A000
trusted library allocation
page read and write
1A3E6A81000
trusted library allocation
page read and write
1A3E53CD000
trusted library allocation
page read and write
1A3EF6AA000
trusted library allocation
page read and write
1CA8D800000
unclassified section
page readonly
1A3EE136000
trusted library allocation
page read and write
1A3E65B2000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
FAD91EE000
unkown
page readonly
1A3DC038000
heap
page read and write
1A3ED4F4000
trusted library allocation
page read and write
1A3EDCD5000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1D9067AC000
heap
page read and write
1A3E69D9000
trusted library allocation
page read and write
1A3E698C000
trusted library allocation
page read and write
1A3F119D000
trusted library allocation
page read and write
1A3E5E48000
trusted library allocation
page read and write
1A3EE0BB000
trusted library allocation
page read and write
1A3EDB04000
trusted library allocation
page read and write
1A3F15AC000
trusted library allocation
page read and write
1A3E61C3000
trusted library allocation
page read and write
1A3E62EE000
trusted library allocation
page read and write
1A3ED29C000
trusted library allocation
page read and write
1A3ED4DB000
trusted library allocation
page read and write
1C22AF60000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3E1026000
trusted library allocation
page read and write
1A3E5E9B000
trusted library allocation
page read and write
1A3E8980000
trusted library allocation
page read and write
1A3ED0B6000
trusted library allocation
page read and write
1A3ED4C7000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3DC045000
heap
page read and write
1A3E6AEB000
trusted library allocation
page read and write
1A3ED18B000
trusted library allocation
page read and write
1A3F135B000
trusted library allocation
page read and write
1A3E6A40000
trusted library allocation
page read and write
1C22B10A000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3EE065000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E6653000
trusted library allocation
page read and write
1A3E6753000
trusted library allocation
page read and write
1A3ED36C000
trusted library allocation
page read and write
1A3E09BF000
trusted library allocation
page read and write
1A3E679F000
trusted library allocation
page read and write
1A3ED2F0000
trusted library allocation
page read and write
1A3E6773000
trusted library allocation
page read and write
1A3E5B69000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3F1603000
heap
page read and write
1A3DBFD3000
heap
page read and write
1A3E62AE000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E755C000
trusted library allocation
page read and write
1A3E53FC000
trusted library allocation
page read and write
1A3E50BB000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3E53F6000
trusted library allocation
page read and write
1A3F06A8000
trusted library allocation
page read and write
1A3E8628000
trusted library allocation
page read and write
1A3ED689000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3E76B0000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E62B1000
trusted library allocation
page read and write
1A3E651F000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED2A0000
trusted library allocation
page read and write
1A3EEB61000
trusted library allocation
page read and write
1A3EE132000
trusted library allocation
page read and write
1A3E4D00000
trusted library allocation
page read and write
1A3E8BD9000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1D9066AC000
heap
page read and write
1A3ED680000
trusted library allocation
page read and write
20AA3C82000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3F0A97000
trusted library allocation
page read and write
1A3DC035000
heap
page read and write
20AA3F07000
trusted library allocation
page read and write
1A3EEAD6000
trusted library allocation
page read and write
1A3ECFCD000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3F107E000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1D906130000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3F1639000
heap
page read and write
1A3E7AE5000
trusted library allocation
page read and write
1A3F15A1000
trusted library allocation
page read and write
1A3E5BB7000
trusted library allocation
page read and write
1A3EDCAB000
trusted library allocation
page read and write
1A3EDC43000
trusted library allocation
page read and write
1A3E1F88000
trusted library allocation
page read and write
1A3E0FFE000
trusted library allocation
page read and write
1A3E67C2000
trusted library allocation
page read and write
1D906726000
heap
page read and write
1A3E6B4E000
trusted library allocation
page read and write
1A3ED41B000
trusted library allocation
page read and write
1A3E665B000
trusted library allocation
page read and write
1A3E69BE000
trusted library allocation
page read and write
1A3E677E000
trusted library allocation
page read and write
1A3F212E000
trusted library allocation
page read and write
1A3EE030000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3F16B0000
heap
page read and write
1A3E61EB000
trusted library allocation
page read and write
1A3E6589000
trusted library allocation
page read and write
1A3E61DB000
trusted library allocation
page read and write
1A3EE2DF000
trusted library allocation
page read and write
1A3EE163000
trusted library allocation
page read and write
1A3E89D6000
trusted library allocation
page read and write
1A3F1576000
trusted library allocation
page read and write
1A3ED539000
trusted library allocation
page read and write
1A3E7423000
trusted library allocation
page read and write
1A3ED6F4000
trusted library allocation
page read and write
1A3F06B0000
trusted library allocation
page read and write
1A3E6985000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3DC00C000
heap
page read and write
1A3F14E2000
trusted library allocation
page read and write
1A3E75CD000
trusted library allocation
page read and write
1A3ED29A000
trusted library allocation
page read and write
1A3E22F8000
trusted library allocation
page read and write
1A3E4BDB000
trusted library allocation
page read and write
1A3DBFE5000
heap
page read and write
1A3EE12B000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E22F4000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E5184000
trusted library allocation
page read and write
1C22AF70000
heap
page read and write
1A3E6AA5000
trusted library allocation
page read and write
1A3DC000000
heap
page read and write
1A3E8E58000
trusted library allocation
page read and write
1A3F1603000
heap
page read and write
1A3E6A45000
trusted library allocation
page read and write
1A3ED19B000
trusted library allocation
page read and write
1A3ED6A2000
trusted library allocation
page read and write
1A3E6683000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFEB000
heap
page read and write
1A3ED545000
trusted library allocation
page read and write
1CA8DB23000
trusted library allocation
page read and write
1A3F1710000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E66BB000
trusted library allocation
page read and write
1D9066A4000
heap
page read and write
1A3E6AF4000
trusted library allocation
page read and write
1A3F1195000
trusted library allocation
page read and write
1A3E614F000
trusted library allocation
page read and write
1A3F1598000
trusted library allocation
page read and write
1A3EDCAB000
trusted library allocation
page read and write
1A3E10B9000
trusted library allocation
page read and write
1A3E76E3000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3E6BE0000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3ED5F0000
trusted library allocation
page read and write
1A3E861E000
trusted library allocation
page read and write
1A3EE084000
trusted library allocation
page read and write
1E58D475000
heap
page read and write
1A3F1710000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3E6AB1000
trusted library allocation
page read and write
1A3E7A3C000
trusted library allocation
page read and write
1D905A81000
trusted library allocation
page read and write
1A3E68FB000
trusted library allocation
page read and write
1A3ED1EB000
trusted library allocation
page read and write
1A3ED372000
trusted library allocation
page read and write
1A3E7AC8000
trusted library allocation
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3ED3DB000
trusted library allocation
page read and write
1A3E6A5D000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3ED585000
trusted library allocation
page read and write
1A3F0AE6000
trusted library allocation
page read and write
1A3EDCAB000
trusted library allocation
page read and write
13BC000
heap
page read and write
1A3F14E0000
trusted library allocation
page read and write
1A3E5BB5000
trusted library allocation
page read and write
1A3EDCB1000
trusted library allocation
page read and write
1A3E09EF000
trusted library allocation
page read and write
1A3E7A83000
trusted library allocation
page read and write
1A3E864F000
trusted library allocation
page read and write
1A3EE030000
trusted library allocation
page read and write
1A3E616D000
trusted library allocation
page read and write
1A3E2039000
trusted library allocation
page read and write
A0B7FAE000
unkown
page readonly
1ED4D1024000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
A0B99FE000
stack
page read and write
1A3DBFD6000
heap
page read and write
1A3E2624000
trusted library allocation
page read and write
1A3ED58A000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E69D8000
trusted library allocation
page read and write
1D90673C000
heap
page read and write
1A3E5EBA000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3DBFC5000
heap
page read and write
1A3E09C0000
trusted library allocation
page read and write
1A3EDCA5000
trusted library allocation
page read and write
1A3E20EA000
trusted library allocation
page read and write
1A3E618F000
trusted library allocation
page read and write
1A3DC046000
heap
page read and write
1A3DC00A000
heap
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3E7AE1000
trusted library allocation
page read and write
1A3F11C9000
trusted library allocation
page read and write
1A3E50B9000
trusted library allocation
page read and write
1A3E7A2B000
trusted library allocation
page read and write
1A3DBFF2000
heap
page read and write
1A3F0AA0000
trusted library allocation
page read and write
1ED4D101E000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3F16C5000
heap
page read and write
1A3DC060000
heap
page read and write
1A3DBFDC000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E62A3000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3F0A38000
trusted library allocation
page read and write
1CA8D9E2000
unclassified section
page read and write
1A3ED1FD000
trusted library allocation
page read and write
1A3F14FE000
trusted library allocation
page read and write
1A3E4BDC000
trusted library allocation
page read and write
1A3F0AA0000
trusted library allocation
page read and write
1A3ED1A1000
trusted library allocation
page read and write
1CA8DBE7000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3EDBE9000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1A3EE033000
trusted library allocation
page read and write
1A3E530F000
trusted library allocation
page read and write
1A3EDBD8000
trusted library allocation
page read and write
1A3E1F25000
trusted library allocation
page read and write
1A3E6A15000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
20AA3CDB000
trusted library allocation
page read and write
1A3DC003000
heap
page read and write
1A3EE045000
trusted library allocation
page read and write
1A3EE0D7000
trusted library allocation
page read and write
1A3ED3D6000
trusted library allocation
page read and write
1A3E6558000
trusted library allocation
page read and write
1D90669C000
heap
page read and write
1A3E699E000
trusted library allocation
page read and write
1A3E7ACD000
trusted library allocation
page read and write
1A3E5E33000
trusted library allocation
page read and write
1A3DC04E000
heap
page read and write
1A3E5194000
trusted library allocation
page read and write
1A3E68DD000
trusted library allocation
page read and write
1A3EDB50000
trusted library allocation
page read and write
1D905A6A000
trusted library allocation
page read and write
1C22AF40000
heap
page read and write
1A3ED4E8000
trusted library allocation
page read and write
1A3E5171000
trusted library allocation
page read and write
1A3E6948000
trusted library allocation
page read and write
1A3E6AF6000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3E20EF000
trusted library allocation
page read and write
1A3EE13C000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3ED1BE000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1D906723000
heap
page read and write
1A3E2669000
trusted library allocation
page read and write
1A3E5E25000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3F210B000
trusted library allocation
page read and write
A0B89D8000
stack
page read and write
1A3ED3F4000
trusted library allocation
page read and write
1A3E2227000
trusted library allocation
page read and write
1A3E6AF6000
trusted library allocation
page read and write
1A3F0665000
trusted library allocation
page read and write
1D905A48000
trusted library allocation
page read and write
1A3ED39F000
trusted library allocation
page read and write
1CA8DB03000
trusted library allocation
page read and write
1A3F060F000
trusted library allocation
page read and write
1A3E1075000
trusted library allocation
page read and write
1A3ED3A5000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3E7A51000
trusted library allocation
page read and write
1A3E6B4A000
trusted library allocation
page read and write
1A3ED579000
trusted library allocation
page read and write
1A3EE0D2000
trusted library allocation
page read and write
1A3E7AED000
trusted library allocation
page read and write
1A3E6BE4000
trusted library allocation
page read and write
1A3E50FC000
trusted library allocation
page read and write
1A3E6290000
trusted library allocation
page read and write
1A3E28CF000
heap
page read and write
1A3E7AAF000
trusted library allocation
page read and write
20AA3A4F000
unclassified section
page read and write
1A3E1F4B000
trusted library allocation
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3EE065000
trusted library allocation
page read and write
1E58EFAD000
heap
page read and write
1A3F1088000
trusted library allocation
page read and write
1A3E6558000
trusted library allocation
page read and write
1A3DBFF3000
heap
page read and write
1A3F16BB000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3EE033000
trusted library allocation
page read and write
1A3EE0DB000
trusted library allocation
page read and write
1A3DC000000
heap
page read and write
1A3F13FE000
trusted library allocation
page read and write
1A3EE0C5000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFEC000
heap
page read and write
1D90669C000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E6B25000
trusted library allocation
page read and write
1A3E6650000
trusted library allocation
page read and write
A0B7EAE000
unkown
page readonly
1A3E6BEE000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DC034000
heap
page read and write
1A3F16C5000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E2261000
trusted library allocation
page read and write
1A3EE041000
trusted library allocation
page read and write
1A3E22F6000
trusted library allocation
page read and write
1A3E552B000
trusted library allocation
page read and write
1A3DC02C000
heap
page read and write
1A3E2047000
trusted library allocation
page read and write
1A3DBFDE000
heap
page read and write
1A3E7A32000
trusted library allocation
page read and write
1E58EFBA000
heap
page read and write
1A3F134A000
trusted library allocation
page read and write
1A3F109E000
trusted library allocation
page read and write
1A3E6484000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED03F000
trusted library allocation
page read and write
1A3E6AF4000
trusted library allocation
page read and write
1A3E4F61000
trusted library allocation
page read and write
1A3E8662000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1A3DBFE7000
heap
page read and write
1D906720000
heap
page read and write
1A3E65FC000
trusted library allocation
page read and write
1E58D450000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3DC02E000
heap
page read and write
24FD8E03000
trusted library allocation
page read and write
1A3EE1AC000
trusted library allocation
page read and write
1A3E1F58000
trusted library allocation
page read and write
1A3F10E6000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3EE08B000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E89CE000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3E2282000
trusted library allocation
page read and write
1CA8D760000
unclassified section
page readonly
1A3E6BD1000
trusted library allocation
page read and write
1A3E669B000
trusted library allocation
page read and write
1A3F11DF000
trusted library allocation
page read and write
1A3E65FC000
trusted library allocation
page read and write
1A3F1593000
trusted library allocation
page read and write
1A3EE243000
trusted library allocation
page read and write
1A3E2899000
heap
page read and write
1A3E7C8B000
trusted library allocation
page read and write
1A3E6A81000
trusted library allocation
page read and write
1A3E4F3C000
trusted library allocation
page read and write
1A3ED4B8000
trusted library allocation
page read and write
1D9066A0000
heap
page read and write
1A3E6A71000
trusted library allocation
page read and write
1A3E4F8D000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFD6000
heap
page read and write
457BFF000
stack
page read and write
1A3E512B000
trusted library allocation
page read and write
1A3E5E2D000
trusted library allocation
page read and write
1A3EF7F9000
trusted library allocation
page read and write
1A3E6A5F000
trusted library allocation
page read and write
1A3E4B33000
trusted library allocation
page read and write
1E58EFC1000
heap
page read and write
FADD3FE000
unkown
page readonly
1A3E6741000
trusted library allocation
page read and write
1A3EF798000
trusted library allocation
page read and write
1A3E6AF6000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3F155E000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E5191000
trusted library allocation
page read and write
1A3F0A75000
trusted library allocation
page read and write
1A3E664C000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E665A000
trusted library allocation
page read and write
1D905A86000
trusted library allocation
page read and write
1A3DC002000
heap
page read and write
1A3ED024000
trusted library allocation
page read and write
1A3F1598000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1D9066A0000
heap
page read and write
1A3E6BAE000
trusted library allocation
page read and write
1A3E868A000
trusted library allocation
page read and write
1A3E50BE000
trusted library allocation
page read and write
1A3E7A73000
trusted library allocation
page read and write
1A3DC03C000
heap
page read and write
1A3EDCF9000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E7AD7000
trusted library allocation
page read and write
1A3E5E19000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3ED198000
trusted library allocation
page read and write
1D905AC2000
trusted library allocation
page read and write
1A3EEABA000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E621F000
trusted library allocation
page read and write
1A3F169D000
heap
page read and write
1A3DC02B000
heap
page read and write
9C0000
heap
page read and write
1A3F0AA0000
trusted library allocation
page read and write
1A3E6293000
trusted library allocation
page read and write
1A3ED01D000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3F13E5000
trusted library allocation
page read and write
1A3E6637000
trusted library allocation
page read and write
1A3E7A26000
trusted library allocation
page read and write
1A3E698F000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED08E000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E6AEC000
trusted library allocation
page read and write
1D906728000
heap
page read and write
1E58D48A000
heap
page read and write
11B4000
heap
page read and write
1A3DBFDA000
heap
page read and write
1D9066CA000
heap
page read and write
1A3E226E000
trusted library allocation
page read and write
20AA3CA2000
trusted library allocation
page read and write
1A3E8BD0000
trusted library allocation
page read and write
1A3E2249000
trusted library allocation
page read and write
1A3E62C0000
trusted library allocation
page read and write
1A3E509E000
trusted library allocation
page read and write
1A3E10B9000
trusted library allocation
page read and write
1A3E67FB000
trusted library allocation
page read and write
1A3E6BE0000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3E69F9000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
FADCBFE000
stack
page read and write
1A3E864B000
trusted library allocation
page read and write
1A3E668C000
trusted library allocation
page read and write
1A3F169C000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E7429000
trusted library allocation
page read and write
1A3E68D3000
trusted library allocation
page read and write
1A3F1598000
trusted library allocation
page read and write
1A3ED417000
trusted library allocation
page read and write
1D906728000
heap
page read and write
1A3DBFDF000
heap
page read and write
1A3E6981000
trusted library allocation
page read and write
1D906761000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3E5184000
trusted library allocation
page read and write
1A3ED0AC000
trusted library allocation
page read and write
1A3E8618000
trusted library allocation
page read and write
1A3E20E8000
trusted library allocation
page read and write
1A3E6BEB000
trusted library allocation
page read and write
1CA8DB7B000
trusted library allocation
page read and write
1A3E5BCA000
trusted library allocation
page read and write
1A3E61DB000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E7AB6000
trusted library allocation
page read and write
1A3DBFFB000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E1F9B000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3EF794000
trusted library allocation
page read and write
1A3E6A81000
trusted library allocation
page read and write
1A3E6145000
trusted library allocation
page read and write
1D9067B9000
heap
page read and write
1A3DBFD8000
heap
page read and write
8FE1BFE000
unkown
page readonly
1A3DBFEC000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFE4000
heap
page read and write
1A3ED525000
trusted library allocation
page read and write
1A3E656A000
trusted library allocation
page read and write
1A3DC033000
heap
page read and write
1A3DC060000
heap
page read and write
1A3DC002000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3E7BB1000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1D9066A9000
heap
page read and write
1A3E5EB8000
trusted library allocation
page read and write
1A3EDC83000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E866F000
trusted library allocation
page read and write
1A3F10E6000
trusted library allocation
page read and write
1A3E69DC000
trusted library allocation
page read and write
1A3E2244000
trusted library allocation
page read and write
1CA8DB12000
trusted library allocation
page read and write
1A3E6697000
trusted library allocation
page read and write
1A3F16A2000
heap
page read and write
1A3F16A0000
heap
page read and write
1A3E618D000
trusted library allocation
page read and write
1D906731000
heap
page read and write
1A3ED3D6000
trusted library allocation
page read and write
A0B7E6D000
stack
page read and write
1A3E76DA000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3E6A8E000
trusted library allocation
page read and write
1A3E6689000
trusted library allocation
page read and write
1A3DC002000
heap
page read and write
1A3E2062000
trusted library allocation
page read and write
1A3E50CD000
trusted library allocation
page read and write
1A3EE1F5000
trusted library allocation
page read and write
1A3E69D6000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E8624000
trusted library allocation
page read and write
1A3ED13D000
trusted library allocation
page read and write
1A3DC003000
heap
page read and write
1A3E7AED000
trusted library allocation
page read and write
1A3E6B2B000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1D906729000
heap
page read and write
1A3F11B8000
trusted library allocation
page read and write
1A3F212E000
trusted library allocation
page read and write
1A3E6126000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3E625B000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1A3EDB77000
trusted library allocation
page read and write
1A3E664A000
trusted library allocation
page read and write
1A3F138D000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
20AA3CB6000
trusted library allocation
page read and write
1A3EE16C000
trusted library allocation
page read and write
1A3E53BB000
trusted library allocation
page read and write
1A3E9218000
trusted library allocation
page read and write
20AA3F03000
trusted library allocation
page read and write
1A3E758F000
trusted library allocation
page read and write
1A3E7BD8000
trusted library allocation
page read and write
1A3E6AE0000
trusted library allocation
page read and write
1A3ED4FB000
trusted library allocation
page read and write
1A3E2098000
trusted library allocation
page read and write
1A3E517E000
trusted library allocation
page read and write
1A3E619B000
trusted library allocation
page read and write
1A3ED1BC000
trusted library allocation
page read and write
1A3DBFD0000
heap
page read and write
1A3E68E8000
trusted library allocation
page read and write
1A3E6AEC000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1D9067AC000
heap
page read and write
1A3ED26E000
trusted library allocation
page read and write
97E000
stack
page read and write
1A3E2261000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3E2282000
trusted library allocation
page read and write
1A3E6256000
trusted library allocation
page read and write
1A3EDBFE000
trusted library allocation
page read and write
1A3ED655000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3ED57A000
trusted library allocation
page read and write
1A3EE1C3000
trusted library allocation
page read and write
1A3ED0CD000
trusted library allocation
page read and write
1A3E5576000
trusted library allocation
page read and write
1A3F0100000
trusted library allocation
page read and write
1A3ED142000
trusted library allocation
page read and write
1A3E618D000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
13BE000
heap
page read and write
1A3E6AB4000
trusted library allocation
page read and write
1A3E7CF2000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E6A73000
trusted library allocation
page read and write
1D905743000
remote allocation
page execute read
1A3E6648000
trusted library allocation
page read and write
1A3E5082000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3E6ACE000
trusted library allocation
page read and write
1A3DC05E000
heap
page read and write
1A3E50A0000
trusted library allocation
page read and write
1A3EDCF3000
trusted library allocation
page read and write
1A3F156F000
trusted library allocation
page read and write
1A3E6ABA000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3F16C3000
heap
page read and write
1A3EE16F000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E7570000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3E10AA000
trusted library allocation
page read and write
1A3E66FE000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3F16A9000
heap
page read and write
1A3E5BB7000
trusted library allocation
page read and write
1A3F0FDE000
trusted library allocation
page read and write
1A3EDB1B000
trusted library allocation
page read and write
1A3E2656000
trusted library allocation
page read and write
1A3E10E4000
trusted library allocation
page read and write
1A3E5BF4000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3ED68F000
trusted library allocation
page read and write
1A3EF7FB000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3F1603000
heap
page read and write
1A3EE0B3000
trusted library allocation
page read and write
1A3F0628000
trusted library allocation
page read and write
1A3E6172000
trusted library allocation
page read and write
1A3E6A38000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
8FE1D7E000
unkown
page readonly
1A3E519A000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1D9066BD000
heap
page read and write
1A3F16A8000
heap
page read and write
1D905B3F000
unclassified section
page read and write
1A3ED049000
trusted library allocation
page read and write
1A3F0AC2000
trusted library allocation
page read and write
1A3E6116000
trusted library allocation
page read and write
1A3EE048000
trusted library allocation
page read and write
1A3F13F5000
trusted library allocation
page read and write
1A3E6154000
trusted library allocation
page read and write
1D9066F9000
heap
page read and write
1A3EE14E000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E76D4000
trusted library allocation
page read and write
1A3E7AE9000
trusted library allocation
page read and write
1A3F0AE6000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F11A8000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3EE0BD000
trusted library allocation
page read and write
1A3E6AFA000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3EDB1B000
trusted library allocation
page read and write
1A3EE12B000
trusted library allocation
page read and write
1A3F16A8000
heap
page read and write
1A3E8631000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
17C000
unkown
page readonly
4573FE000
stack
page read and write
1A3F0A8F000
trusted library allocation
page read and write
1A3E6567000
trusted library allocation
page read and write
20AA3A70000
unclassified section
page readonly
1A3ED6A7000
trusted library allocation
page read and write
1A3E5097000
trusted library allocation
page read and write
1A3E91D4000
trusted library allocation
page read and write
1C22AE00000
heap
page read and write
1A3F106B000
trusted library allocation
page read and write
1A3E6A87000
trusted library allocation
page read and write
1D905B80000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3ED521000
trusted library allocation
page read and write
1A3E6256000
trusted library allocation
page read and write
1A3E69C1000
trusted library allocation
page read and write
1A3EE0B6000
trusted library allocation
page read and write
1D906731000
heap
page read and write
1A3E9261000
trusted library allocation
page read and write
1A3F067C000
trusted library allocation
page read and write
1A3F0A32000
trusted library allocation
page read and write
1A3F0672000
trusted library allocation
page read and write
20AA3840000
remote allocation
page read and write
1CA8D773000
heap
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3ED53B000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3E62AE000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3F16A2000
heap
page read and write
1A3F117E000
trusted library allocation
page read and write
1A3E4F6F000
trusted library allocation
page read and write
1A3E67CC000
trusted library allocation
page read and write
1A3ED0E3000
trusted library allocation
page read and write
1A3ECFE9000
trusted library allocation
page read and write
1A3ED149000
trusted library allocation
page read and write
20AA3A30000
heap
page readonly
1A3E518F000
trusted library allocation
page read and write
1D905B10000
heap
page readonly
1A3F11A4000
trusted library allocation
page read and write
1A3ED4EF000
trusted library allocation
page read and write
13C1000
heap
page read and write
1A3DC025000
heap
page read and write
1A3E663F000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3ED1EB000
trusted library allocation
page read and write
1A3E5E48000
trusted library allocation
page read and write
1A3ED67E000
trusted library allocation
page read and write
1A3ED4F9000
trusted library allocation
page read and write
1A3E7A76000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3ED37A000
trusted library allocation
page read and write
1A3E6694000
trusted library allocation
page read and write
1A3E657A000
trusted library allocation
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E7AB4000
trusted library allocation
page read and write
1A3EE09D000
trusted library allocation
page read and write
1A3EE0D7000
trusted library allocation
page read and write
1A3E2075000
trusted library allocation
page read and write
1A3ED527000
trusted library allocation
page read and write
1A3ED5B7000
trusted library allocation
page read and write
1A3ED405000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3EE16C000
trusted library allocation
page read and write
1A3F0ABB000
trusted library allocation
page read and write
1A3E28DD000
heap
page read and write
1A3E61ED000
trusted library allocation
page read and write
1A3ED2A0000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3ED40F000
trusted library allocation
page read and write
1A3EDBA6000
trusted library allocation
page read and write
1A3E89D6000
trusted library allocation
page read and write
1A3E6AA5000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E65F1000
trusted library allocation
page read and write
1A3ED2E0000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E67C2000
trusted library allocation
page read and write
1CA8DD0D000
trusted library allocation
page read and write
1A3F155E000
trusted library allocation
page read and write
1A3F0AE6000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E6172000
trusted library allocation
page read and write
1A3E4F8E000
trusted library allocation
page read and write
1A3E6789000
trusted library allocation
page read and write
1A3EE163000
trusted library allocation
page read and write
1A3ED3BF000
trusted library allocation
page read and write
1A3E2322000
trusted library allocation
page read and write
1A3E6890000
trusted library allocation
page read and write
1D906798000
heap
page read and write
1A3E69B7000
trusted library allocation
page read and write
A0BCABE000
stack
page read and write
1A3ED3EA000
trusted library allocation
page read and write
13D7000
heap
page read and write
1A3E6B4E000
trusted library allocation
page read and write
1A3E7A32000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1D906799000
heap
page read and write
1A3E75DF000
trusted library allocation
page read and write
1A3E4F8A000
trusted library allocation
page read and write
1A3E4FA5000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3ECFE5000
trusted library allocation
page read and write
1A3DC041000
heap
page read and write
1A3E5B8E000
trusted library allocation
page read and write
1A3EE065000
trusted library allocation
page read and write
1A3EE04C000
trusted library allocation
page read and write
1A3ED3BC000
trusted library allocation
page read and write
1A3ED4F2000
trusted library allocation
page read and write
1A3E50DC000
trusted library allocation
page read and write
1A3E506E000
trusted library allocation
page read and write
1A3EE2F2000
trusted library allocation
page read and write
1A3E5BAC000
trusted library allocation
page read and write
1A3E5E85000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E74EA000
trusted library allocation
page read and write
1A3E4F47000
trusted library allocation
page read and write
1A3E86EB000
trusted library allocation
page read and write
1A3DBFC5000
heap
page read and write
1A3E1F33000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3DC045000
heap
page read and write
1CA8DB5D000
trusted library allocation
page read and write
1A3E6BDA000
trusted library allocation
page read and write
1A3ED18C000
trusted library allocation
page read and write
1A3F16AB000
heap
page read and write
1A3E22DE000
trusted library allocation
page read and write
1A3E8942000
trusted library allocation
page read and write
13CE000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3EE0A3000
trusted library allocation
page read and write
1A3E4F68000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3ED5A0000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1CA8DB72000
trusted library allocation
page read and write
1A3ED1C8000
trusted library allocation
page read and write
1A3ED1F2000
trusted library allocation
page read and write
1A3DBFE6000
heap
page read and write
1A3EDB6E000
trusted library allocation
page read and write
1A3E666E000
trusted library allocation
page read and write
1A3E86D8000
trusted library allocation
page read and write
1A3ED198000
trusted library allocation
page read and write
1A3E76BC000
trusted library allocation
page read and write
1A3EE0BB000
trusted library allocation
page read and write
1A3ED6E8000
trusted library allocation
page read and write
1A3E69EF000
trusted library allocation
page read and write
1A3E5EAB000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFD6000
heap
page read and write
1D905B84000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3ED237000
trusted library allocation
page read and write
1A3F1710000
heap
page read and write
1A3E5594000
trusted library allocation
page read and write
1A3EDCB1000
trusted library allocation
page read and write
1A3E5378000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E86C6000
trusted library allocation
page read and write
1D905AE9000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E4B60000
trusted library allocation
page read and write
1A3E7A83000
trusted library allocation
page read and write
1A3E75CD000
trusted library allocation
page read and write
1A3DC003000
heap
page read and write
1A3ECFD4000
trusted library allocation
page read and write
1A3DC046000
heap
page read and write
1A3DC02C000
heap
page read and write
1A3E69E5000
trusted library allocation
page read and write
1A3ED6DA000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3E4BC0000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3DC025000
heap
page read and write
1A3DC03B000
heap
page read and write
1A3F0631000
trusted library allocation
page read and write
1A3ED539000
trusted library allocation
page read and write
1A3E50D5000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3EE03C000
trusted library allocation
page read and write
1A3E5140000
trusted library allocation
page read and write
1A3ED254000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3F1D27000
trusted library allocation
page read and write
1A3F2128000
trusted library allocation
page read and write
1A3F14A4000
trusted library allocation
page read and write
1A3E50FC000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFD3000
heap
page read and write
A0BA9FE000
stack
page read and write
1A3E509C000
trusted library allocation
page read and write
1A3EE0BD000
trusted library allocation
page read and write
1A3ED6BC000
trusted library allocation
page read and write
1A3ED3B5000
trusted library allocation
page read and write
1A3ED4EB000
trusted library allocation
page read and write
1CA8DD3D000
trusted library allocation
page read and write
8FE35FE000
stack
page read and write
1A3E2239000
trusted library allocation
page read and write
1A3EEB85000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3E6166000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3F119D000
trusted library allocation
page read and write
1A3E2064000
trusted library allocation
page read and write
1A3DBFF5000
heap
page read and write
1A3ED424000
trusted library allocation
page read and write
1A3F10E6000
trusted library allocation
page read and write
1A3ED5F5000
trusted library allocation
page read and write
1A3ED3C9000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E6635000
trusted library allocation
page read and write
1A3F134A000
trusted library allocation
page read and write
1A3E6168000
trusted library allocation
page read and write
1A3ED6E1000
trusted library allocation
page read and write
1A3E101A000
trusted library allocation
page read and write
1D905A2F000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E53D9000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1D9066A0000
heap
page read and write
1A3E6A5F000
trusted library allocation
page read and write
1A3E86FC000
trusted library allocation
page read and write
1A3F15CE000
trusted library allocation
page read and write
1A3E5E33000
trusted library allocation
page read and write
1A3E65FC000
trusted library allocation
page read and write
64359FF000
stack
page read and write
13BC000
heap
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3ED668000
trusted library allocation
page read and write
1A3E74CF000
trusted library allocation
page read and write
1A3E616C000
trusted library allocation
page read and write
1A3E65F1000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3E20F8000
trusted library allocation
page read and write
1A3E6278000
trusted library allocation
page read and write
1A3DBFFB000
heap
page read and write
20AA3C0E000
trusted library allocation
page read and write
1A3E616C000
trusted library allocation
page read and write
1A3E28D8000
heap
page read and write
1A3DBFB4000
heap
page read and write
1A3EE0D2000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3F1582000
trusted library allocation
page read and write
13BD000
heap
page read and write
1A3E7C52000
trusted library allocation
page read and write
1A3E2099000
trusted library allocation
page read and write
1AC000
unkown
page read and write
1A3ED650000
trusted library allocation
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1D905B86000
heap
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3F14E8000
trusted library allocation
page read and write
1A3E7700000
trusted library allocation
page read and write
1A3E6B3E000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3EDB5F000
trusted library allocation
page read and write
1A3ED298000
trusted library allocation
page read and write
1A3E69C7000
trusted library allocation
page read and write
1A3ED6C4000
trusted library allocation
page read and write
1A3E7AE1000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E6693000
trusted library allocation
page read and write
1A3E6AD7000
trusted library allocation
page read and write
1A3ED5DC000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3DC024000
heap
page read and write
1A3E6AFD000
trusted library allocation
page read and write
1A3E6A6D000
trusted library allocation
page read and write
1A3E618D000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3E69B7000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
FAD90EE000
unkown
page readonly
1E58D3E0000
heap
page read and write
1A3E6A89000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3E6969000
trusted library allocation
page read and write
1A3ED02A000
trusted library allocation
page read and write
1A3E6BCC000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3EEB66000
trusted library allocation
page read and write
1A3F1382000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E6B56000
trusted library allocation
page read and write
1A3F109F000
trusted library allocation
page read and write
1A3ED4F2000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E53CD000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E8B4D000
trusted library allocation
page read and write
1A3F1646000
heap
page read and write
1A3EDB13000
trusted library allocation
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3E64F4000
trusted library allocation
page read and write
1A3F1593000
trusted library allocation
page read and write
1A3E6270000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3ED0F3000
trusted library allocation
page read and write
8FE1C3B000
stack
page read and write
1A3F10F7000
trusted library allocation
page read and write
1A3EE12C000
trusted library allocation
page read and write
1A3E6A67000
trusted library allocation
page read and write
E1000
unkown
page execute read
1A3EEB18000
trusted library allocation
page read and write
1A3E5B4B000
trusted library allocation
page read and write
1A3E6BE2000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3E28DF000
heap
page read and write
1A3DC041000
heap
page read and write
1A3EE08B000
trusted library allocation
page read and write
1A3E6AF4000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1A3EE033000
trusted library allocation
page read and write
1E58D5A5000
heap
page read and write
1A3E89D4000
trusted library allocation
page read and write
1A3F0653000
trusted library allocation
page read and write
1A3E5524000
trusted library allocation
page read and write
1A3E20F8000
trusted library allocation
page read and write
1D906731000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFE1000
heap
page read and write
1D9066E8000
heap
page read and write
1A3ED261000
trusted library allocation
page read and write
1A3E75B2000
trusted library allocation
page read and write
1A3F1555000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3DC025000
heap
page read and write
1A3ED1C6000
trusted library allocation
page read and write
1A3F1555000
trusted library allocation
page read and write
1A3F1076000
trusted library allocation
page read and write
1A3ED6E8000
trusted library allocation
page read and write
1A3ED251000
trusted library allocation
page read and write
20AA3DD0000
heap
page read and write
1A3ED4F7000
trusted library allocation
page read and write
1A3E6BEF000
trusted library allocation
page read and write
1A3DC040000
heap
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3E7578000
trusted library allocation
page read and write
1A3EE167000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1D906762000
heap
page read and write
1A3E6888000
trusted library allocation
page read and write
1A3EEC04000
trusted library allocation
page read and write
1A3F16AF000
heap
page read and write
1A3F1088000
trusted library allocation
page read and write
1A3DBFB4000
heap
page read and write
64361FE000
stack
page read and write
1A3ED543000
trusted library allocation
page read and write
1A3E65B4000
trusted library allocation
page read and write
1A3E89F0000
trusted library allocation
page read and write
1A3F16AD000
heap
page read and write
1A3E9D02000
trusted library allocation
page read and write
1A3DBFD9000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3EE048000
trusted library allocation
page read and write
1A3EE030000
trusted library allocation
page read and write
1A3ED68E000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3E617B000
trusted library allocation
page read and write
1A3E1061000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
20AA39A0000
heap
page read and write
E0000
unkown
page readonly
1A3F1574000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E2686000
trusted library allocation
page read and write
1A3DC060000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3ED19B000
trusted library allocation
page read and write
1A3F16A0000
heap
page read and write
1A3E5087000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1D906784000
heap
page read and write
1A3DBFDF000
heap
page read and write
1A3E6260000
trusted library allocation
page read and write
1A3E1FCF000
trusted library allocation
page read and write
1A3EEB61000
trusted library allocation
page read and write
1A3E89D0000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3F0A75000
trusted library allocation
page read and write
1A3E6B1F000
trusted library allocation
page read and write
1A3E69BE000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3EE023000
trusted library allocation
page read and write
1A3E6A87000
trusted library allocation
page read and write
1A3E615C000
trusted library allocation
page read and write
1A3ED045000
trusted library allocation
page read and write
1A3ED18C000
trusted library allocation
page read and write
1A3EE0DF000
trusted library allocation
page read and write
1A3E20EF000
trusted library allocation
page read and write
1A3F15A1000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3E62E9000
trusted library allocation
page read and write
1A3DC03D000
heap
page read and write
1A3DC066000
heap
page read and write
1A3E6699000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3E50BB000
trusted library allocation
page read and write
1A3F10F7000
trusted library allocation
page read and write
1A3E6B82000
trusted library allocation
page read and write
1A3E2078000
trusted library allocation
page read and write
1A3E1066000
trusted library allocation
page read and write
64371FE000
stack
page read and write
20AA3A40000
unclassified section
page read and write
1A3DC02E000
heap
page read and write
1A3ED230000
trusted library allocation
page read and write
1D906640000
heap
page read and write
1A3E8BD0000
trusted library allocation
page read and write
1A3E6AA0000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3E6561000
trusted library allocation
page read and write
1A3F2118000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3E698C000
trusted library allocation
page read and write
1A3DC024000
heap
page read and write
1A3E61B6000
trusted library allocation
page read and write
1A3E6ADA000
trusted library allocation
page read and write
1A3E50AF000
trusted library allocation
page read and write
1A3E685C000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DC034000
heap
page read and write
1B8E000
stack
page read and write
1A3F16BD000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3E6A6D000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3E6BE7000
trusted library allocation
page read and write
1A3E6653000
trusted library allocation
page read and write
1A3E2621000
trusted library allocation
page read and write
1A3EE0DB000
trusted library allocation
page read and write
1A3E6AA0000
trusted library allocation
page read and write
1A3EDB40000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E6A64000
trusted library allocation
page read and write
1A3E74A9000
trusted library allocation
page read and write
1A3DC00A000
heap
page read and write
1A3E69B9000
trusted library allocation
page read and write
1A3EE1A4000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
A0BB1FE000
unkown
page readonly
1A3E7513000
trusted library allocation
page read and write
1A3EDCB1000
trusted library allocation
page read and write
1A3E8BF9000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E5E09000
trusted library allocation
page read and write
1A3F1397000
trusted library allocation
page read and write
1A3E7446000
trusted library allocation
page read and write
1A3EE0BD000
trusted library allocation
page read and write
1A3EE0D7000
trusted library allocation
page read and write
1A3DBFDE000
heap
page read and write
1A3DC002000
heap
page read and write
1A3ED6F4000
trusted library allocation
page read and write
1A3E6658000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E89D2000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3ED147000
trusted library allocation
page read and write
1A3DC049000
heap
page read and write
1A3DBFF2000
heap
page read and write
1A3ED375000
trusted library allocation
page read and write
1A3ED03F000
trusted library allocation
page read and write
1A3DC039000
heap
page read and write
1A3E2238000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
20AA3C03000
trusted library allocation
page read and write
1A3F0880000
trusted library allocation
page read and write
1A3E5E1D000
trusted library allocation
page read and write
1A3DC035000
heap
page read and write
1A3E53B0000
trusted library allocation
page read and write
1A3E6B82000
trusted library allocation
page read and write
1A3EE2C7000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3EDCD5000
trusted library allocation
page read and write
1A3E4BFE000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3F16A4000
heap
page read and write
1D9066A0000
heap
page read and write
1A3F106B000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
13C4000
heap
page read and write
1A3E8984000
trusted library allocation
page read and write
1A3E6513000
trusted library allocation
page read and write
1A3E6586000
trusted library allocation
page read and write
1A3E657D000
trusted library allocation
page read and write
1A3ED3EA000
trusted library allocation
page read and write
1A3F212A000
trusted library allocation
page read and write
1A3DC002000
heap
page read and write
1A3EF7F5000
trusted library allocation
page read and write
1A3E6BF8000
trusted library allocation
page read and write
1A3E69DC000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DC034000
heap
page read and write
1A3ED39B000
trusted library allocation
page read and write
1A3E6BCD000
trusted library allocation
page read and write
1A3E86E9000
trusted library allocation
page read and write
1A3DC033000
heap
page read and write
1A3EE0AD000
trusted library allocation
page read and write
1A3E6AF6000
trusted library allocation
page read and write
1A3E4B72000
trusted library allocation
page read and write
1A3E67C2000
trusted library allocation
page read and write
1A3ED512000
trusted library allocation
page read and write
1A3EE14A000
trusted library allocation
page read and write
1A3F13E7000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1A3ED2DE000
trusted library allocation
page read and write
1A3E6287000
trusted library allocation
page read and write
1A3E4B22000
trusted library allocation
page read and write
1A3ED6E8000
trusted library allocation
page read and write
1A3DC03B000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3E7AD7000
trusted library allocation
page read and write
1A3E6812000
trusted library allocation
page read and write
1A3F10AA000
trusted library allocation
page read and write
1A3F15B2000
trusted library allocation
page read and write
1A3E6BCC000
trusted library allocation
page read and write
1A3DC00A000
heap
page read and write
1A3E6B34000
trusted library allocation
page read and write
1A3E8616000
trusted library allocation
page read and write
20AA3856000
remote allocation
page execute read
1A3DBFDA000
heap
page read and write
1A3EE19B000
trusted library allocation
page read and write
1A3E222F000
trusted library allocation
page read and write
1A3DBFEB000
heap
page read and write
1A3E68C7000
trusted library allocation
page read and write
1A3EEBF9000
trusted library allocation
page read and write
1A3ED653000
trusted library allocation
page read and write
1A3F13CA000
trusted library allocation
page read and write
1A3E69DA000
trusted library allocation
page read and write
1A3ED424000
trusted library allocation
page read and write
1A3E7AAF000
trusted library allocation
page read and write
1A3E62EB000
trusted library allocation
page read and write
FEF000
stack
page read and write
1A3DBFE6000
heap
page read and write
1A3E69F9000
trusted library allocation
page read and write
1A3E6A75000
trusted library allocation
page read and write
1A3E2887000
heap
page read and write
1A3EF671000
trusted library allocation
page read and write
1A3ED6D9000
trusted library allocation
page read and write
1A3EEB5C000
trusted library allocation
page read and write
1A3E5B72000
trusted library allocation
page read and write
1A3ED19B000
trusted library allocation
page read and write
1A3EE0AD000
trusted library allocation
page read and write
13CE000
heap
page read and write
1A3E6278000
trusted library allocation
page read and write
1A3E1FEA000
trusted library allocation
page read and write
1A3E6218000
trusted library allocation
page read and write
1A3EE154000
trusted library allocation
page read and write
FADB3FE000
unkown
page readonly
1CA8D930000
heap
page read and write
1A3F1D83000
trusted library allocation
page read and write
1A3EE045000
trusted library allocation
page read and write
1A3E6AB5000
trusted library allocation
page read and write
1A3E615A000
trusted library allocation
page read and write
1CA8DB79000
trusted library allocation
page read and write
20AA37E0000
unclassified section
page readonly
1A3DBFDA000
heap
page read and write
1A3E664C000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DC045000
heap
page read and write
1A3E5079000
trusted library allocation
page read and write
1A3E64F2000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3E5E8B000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1A3F11A3000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFE5000
heap
page read and write
1A3ED26E000
trusted library allocation
page read and write
1A3ED5B2000
trusted library allocation
page read and write
1A3E741E000
trusted library allocation
page read and write
1A3E62EB000
trusted library allocation
page read and write
1A3E6A7F000
trusted library allocation
page read and write
1A3E6183000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3ED298000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3E68F1000
trusted library allocation
page read and write
1A3F11AE000
trusted library allocation
page read and write
1A3EE0B6000
trusted library allocation
page read and write
1A3E75AA000
trusted library allocation
page read and write
1A3EE2D8000
trusted library allocation
page read and write
1A3DC024000
heap
page read and write
1A3ED3E9000
trusted library allocation
page read and write
1A3F169D000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E69B9000
trusted library allocation
page read and write
1A3E518A000
trusted library allocation
page read and write
1A3EEBB1000
trusted library allocation
page read and write
1A3EE0D2000
trusted library allocation
page read and write
1A3F068E000
trusted library allocation
page read and write
1A3E618F000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E6132000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3F212A000
trusted library allocation
page read and write
1A3F16C3000
heap
page read and write
1A3E6AB1000
trusted library allocation
page read and write
1A3E6BE0000
trusted library allocation
page read and write
1A3F16BB000
heap
page read and write
1A3E66A3000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3ED32E000
trusted library allocation
page read and write
1A3E6687000
trusted library allocation
page read and write
1A3DBFDF000
heap
page read and write
1A3E4BBC000
trusted library allocation
page read and write
1A3ED3CD000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3E7578000
trusted library allocation
page read and write
1A3E6658000
trusted library allocation
page read and write
1A3E68CE000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3F169D000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3E89D0000
trusted library allocation
page read and write
1A3E264E000
trusted library allocation
page read and write
1CA8DB10000
trusted library allocation
page read and write
1A3E508E000
trusted library allocation
page read and write
1A3DBFED000
heap
page read and write
1A3EF78C000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3E5B76000
trusted library allocation
page read and write
1E58D707000
trusted library allocation
page read and write
1A3F0AC0000
trusted library allocation
page read and write
1A3E6A45000
trusted library allocation
page read and write
1A3EEB5C000
trusted library allocation
page read and write
1A3ED33C000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3EE1C3000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E6AE0000
trusted library allocation
page read and write
FAD9BD8000
stack
page read and write
8CA000
stack
page read and write
1A3DBFED000
heap
page read and write
1CA8DD16000
trusted library allocation
page read and write
1A3ED0BF000
trusted library allocation
page read and write
1A3E6BBB000
trusted library allocation
page read and write
1A3E8934000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E20EA000
trusted library allocation
page read and write
1A3EDCE8000
trusted library allocation
page read and write
1A3E92B4000
trusted library allocation
page read and write
1A3EE034000
trusted library allocation
page read and write
1A3E61E2000
trusted library allocation
page read and write
1A3E662A000
trusted library allocation
page read and write
1A3EE14E000
trusted library allocation
page read and write
1A3E6269000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3F15A1000
trusted library allocation
page read and write
1A3E5B89000
trusted library allocation
page read and write
1A3E4F68000
trusted library allocation
page read and write
1A3E8BDF000
trusted library allocation
page read and write
1A3ED3ED000
trusted library allocation
page read and write
1A3ED147000
trusted library allocation
page read and write
1A3ED1FD000
trusted library allocation
page read and write
1A3F11C1000
trusted library allocation
page read and write
1A3EE095000
trusted library allocation
page read and write
1A3ED4CA000
trusted library allocation
page read and write
1A3E8BFD000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1A3ED3B5000
trusted library allocation
page read and write
1A3ED6A2000
trusted library allocation
page read and write
1D906784000
heap
page read and write
1A3E88F6000
trusted library allocation
page read and write
1A3F0A8F000
trusted library allocation
page read and write
1A3EDB08000
trusted library allocation
page read and write
1A3DBFD4000
heap
page read and write
1A3DC025000
heap
page read and write
1A3F212E000
trusted library allocation
page read and write
1A3E7CF4000
trusted library allocation
page read and write
1A3ED655000
trusted library allocation
page read and write
1A3ED523000
trusted library allocation
page read and write
1A3EE2EA000
trusted library allocation
page read and write
1A3EE0C5000
trusted library allocation
page read and write
1D90672B000
heap
page read and write
1A3ED3DB000
trusted library allocation
page read and write
1A3EE0DB000
trusted library allocation
page read and write
11B4000
heap
page read and write
1A3EEC01000
trusted library allocation
page read and write
1A3E5E49000
trusted library allocation
page read and write
1E58D457000
heap
page read and write
1CA8D9C6000
heap
page read and write
1A3E76B2000
trusted library allocation
page read and write
1A3EE093000
trusted library allocation
page read and write
1A3E664C000
trusted library allocation
page read and write
1A3EEAFC000
trusted library allocation
page read and write
1A3EDCE8000
trusted library allocation
page read and write
1A3E66C9000
trusted library allocation
page read and write
1D90677B000
heap
page read and write
1A3E6A63000
trusted library allocation
page read and write
1D90672B000
heap
page read and write
1A3ED5F0000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3DC02B000
heap
page read and write
1E58D410000
heap
page read and write
1A3DBFCE000
heap
page read and write
1A3EDB28000
trusted library allocation
page read and write
1A3E6AB1000
trusted library allocation
page read and write
1A3ED525000
trusted library allocation
page read and write
1D9066BF000
heap
page read and write
1A3E6AC0000
trusted library allocation
page read and write
1A3E6A39000
trusted library allocation
page read and write
1D90672B000
heap
page read and write
1A3F1391000
trusted library allocation
page read and write
1A3E6648000
trusted library allocation
page read and write
1A3ED6BA000
trusted library allocation
page read and write
1A3E7A2D000
trusted library allocation
page read and write
1A3ED1F4000
trusted library allocation
page read and write
1A3E7A4C000
trusted library allocation
page read and write
1A3E68E3000
trusted library allocation
page read and write
1A3DBFE4000
heap
page read and write
1A3E6BC6000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
20AA4000000
trusted library allocation
page read and write
1A3E6B2B000
trusted library allocation
page read and write
1D906740000
heap
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFDA000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3E508E000
trusted library allocation
page read and write
1A3DC005000
heap
page read and write
1A3E28DF000
heap
page read and write
1A3DC025000
heap
page read and write
1A3DBFD4000
heap
page read and write
1A3ED6A2000
trusted library allocation
page read and write
1A3E7AB6000
trusted library allocation
page read and write
20AA3C5F000
trusted library allocation
page read and write
1A3E5073000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3E226E000
trusted library allocation
page read and write
1D906798000
heap
page read and write
1A3DC023000
heap
page read and write
1A3F11D6000
trusted library allocation
page read and write
1A3E531D000
trusted library allocation
page read and write
1A3DC034000
heap
page read and write
1C22B000000
trusted library allocation
page read and write
1A3F0300000
trusted library allocation
page read and write
1A3F1D3B000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3F1710000
heap
page read and write
1A3EE01B000
trusted library allocation
page read and write
1A3E4BFE000
trusted library allocation
page read and write
1A3ED0A9000
trusted library allocation
page read and write
1A3ED5B7000
trusted library allocation
page read and write
1A3DBFEB000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3E5BB1000
trusted library allocation
page read and write
1A3E6282000
trusted library allocation
page read and write
1A3E5155000
trusted library allocation
page read and write
1A3F139B000
trusted library allocation
page read and write
1A3E69A1000
trusted library allocation
page read and write
1A3DC03E000
heap
page read and write
1D906728000
heap
page read and write
1A3DBFF9000
heap
page read and write
1A3E22EB000
trusted library allocation
page read and write
1A3E6905000
trusted library allocation
page read and write
1A3E7548000
trusted library allocation
page read and write
1A3F160F000
heap
page read and write
1A3DC02E000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3F1603000
heap
page read and write
1A3EE0A3000
trusted library allocation
page read and write
1A3E75C2000
trusted library allocation
page read and write
1A3ED3AF000
trusted library allocation
page read and write
1A3DC035000
heap
page read and write
1A3EE2ED000
trusted library allocation
page read and write
1A3ED4E3000
trusted library allocation
page read and write
1A3E20EA000
trusted library allocation
page read and write
1A3E6BD1000
trusted library allocation
page read and write
1A3E7CDA000
trusted library allocation
page read and write
1A3F10D8000
trusted library allocation
page read and write
1A3EE165000
trusted library allocation
page read and write
1A3E6B34000
trusted library allocation
page read and write
1A3E69D6000
trusted library allocation
page read and write
1A3DBFF3000
heap
page read and write
1A3F16A0000
heap
page read and write
1A3EDCA3000
trusted library allocation
page read and write
1A3E6A5F000
trusted library allocation
page read and write
1A3E68A6000
trusted library allocation
page read and write
1A3E6B25000
trusted library allocation
page read and write
1A3E6166000
trusted library allocation
page read and write
1A3E6A73000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3E7AD2000
trusted library allocation
page read and write
1A3EDB43000
trusted library allocation
page read and write
1A3E61A5000
trusted library allocation
page read and write
1A3ED5DC000
trusted library allocation
page read and write
1A3E7ACD000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFF0000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3EE09D000
trusted library allocation
page read and write
1A3F06DE000
trusted library allocation
page read and write
1A3DC02E000
heap
page read and write
1A3ED3F5000
trusted library allocation
page read and write
1A3F1640000
heap
page read and write
1A3E6690000
trusted library allocation
page read and write
1A3E7BA6000
trusted library allocation
page read and write
1A3DBFD6000
heap
page read and write
1CA8DBB7000
trusted library allocation
page read and write
1A3DBFDB000
heap
page read and write
1A3F16BB000
heap
page read and write
64359FA000
stack
page read and write
1A3DBFD7000
heap
page read and write
1A3E68B3000
trusted library allocation
page read and write
1A3E4F9E000
trusted library allocation
page read and write
A0B7FEE000
stack
page read and write
1A3DBFF9000
heap
page read and write
1A3E6BEB000
trusted library allocation
page read and write
1A3E4F61000
trusted library allocation
page read and write
1A3DBFF9000
heap
page read and write
1A3E75A3000
trusted library allocation
page read and write
1A3DC02B000
heap
page read and write
1A3E1FED000
trusted library allocation
page read and write
1A3E6166000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E2899000
heap
page read and write
1A3E51B3000
trusted library allocation
page read and write
1A3ED682000
trusted library allocation
page read and write
1A3E6A71000
trusted library allocation
page read and write
1D9066A9000
heap
page read and write
1A3E64F4000
trusted library allocation
page read and write
1A3E6297000
trusted library allocation
page read and write
1A3EE02B000
trusted library allocation
page read and write
8FE1CBD000
stack
page read and write
1A3ED1EE000
trusted library allocation
page read and write
1A3ED3B9000
trusted library allocation
page read and write
1A3E69D8000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E750E000
trusted library allocation
page read and write
1A3F16AE000
heap
page read and write
1A3DC038000
heap
page read and write
1A3E6BC6000
trusted library allocation
page read and write
1A3E50C4000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3DBFFC000
heap
page read and write
1A3E6168000
trusted library allocation
page read and write
1A3ED6FE000
trusted library allocation
page read and write
1A3DBFE1000
heap
page read and write
1A3ED3FC000
trusted library allocation
page read and write
1A3DC003000
heap
page read and write
1A3E5178000
trusted library allocation
page read and write
1A3ED3EA000
trusted library allocation
page read and write
1A3ED0C2000
trusted library allocation
page read and write
1A3E86D0000
trusted library allocation
page read and write
1D9066A9000
heap
page read and write
1A3E6860000
trusted library allocation
page read and write
1A3EE0D7000
trusted library allocation
page read and write
1A3DC00A000
heap
page read and write
1A3DBFE2000
heap
page read and write
1A3EE041000
trusted library allocation
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1D905A03000
trusted library allocation
page read and write
1A3E629F000
trusted library allocation
page read and write
1A3DBFE5000
heap
page read and write
1A3E6689000
trusted library allocation
page read and write
1A3F1586000
trusted library allocation
page read and write
1A3E2890000
heap
page read and write
1A3ED08E000
trusted library allocation
page read and write
1A3E5EA8000
trusted library allocation
page read and write
1A3DBFD8000
heap
page read and write
1A3F16C5000
heap
page read and write
1A3E65F1000
trusted library allocation
page read and write
1A3EE13A000
trusted library allocation
page read and write
1A3ED000000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3E5E1A000
trusted library allocation
page read and write
1F8F000
stack
page read and write
1A3E5E25000
trusted library allocation
page read and write
1A3F10E8000
trusted library allocation
page read and write
1A3E865A000
trusted library allocation
page read and write
1D9067AC000
heap
page read and write
1A3E6B25000
trusted library allocation
page read and write
20AA400C000
trusted library allocation
page read and write
1B4000
unkown
page readonly
1A3E4F68000
trusted library allocation
page read and write
1D90668D000
heap
page read and write
13B8000
heap
page read and write
1A3EE0B6000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3E6B82000
trusted library allocation
page read and write
1A3F10E6000
trusted library allocation
page read and write
1A3E1026000
trusted library allocation
page read and write
1A3ED5BA000
trusted library allocation
page read and write
1A3E51CB000
trusted library allocation
page read and write
1A3E89C9000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3EEABA000
trusted library allocation
page read and write
36D4000
heap
page read and write
1A3EEB59000
trusted library allocation
page read and write
1A3E7AD7000
trusted library allocation
page read and write
1A3DBFDA000
heap
page read and write
1A3F0AE6000
trusted library allocation
page read and write
1A3EE168000
trusted library allocation
page read and write
1A3DC038000
heap
page read and write
1A3E6297000
trusted library allocation
page read and write
1A3EE073000
trusted library allocation
page read and write
1A3F1734000
heap
page read and write
1A3E8BD7000
trusted library allocation
page read and write
20AA3890000
heap
page read and write
FADBBFE000
stack
page read and write
1A3EE08B000
trusted library allocation
page read and write
1A3DC042000
heap
page read and write
1A3DBFC5000
heap
page read and write
1A3F0A8F000
trusted library allocation
page read and write
1A3ED536000
trusted library allocation
page read and write
1A3E7A4C000
trusted library allocation
page read and write
1A3DC00F000
heap
page read and write
1A3DC037000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3E2899000
heap
page read and write
1A3E664A000
trusted library allocation
page read and write
1A3E28DF000
heap
page read and write
1A3E4F7D000
trusted library allocation
page read and write
1A3ED0AC000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3DBFFA000
heap
page read and write
1A3EE0F5000
trusted library allocation
page read and write
1A3E89F7000
trusted library allocation
page read and write
1A3F1734000
heap
page read and write
1A3F13CA000
trusted library allocation
page read and write
13C2000
heap
page read and write
1A3E50C7000
trusted library allocation
page read and write
1A3E6AEB000
trusted library allocation
page read and write
1D905B50000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
1A3E75C2000
trusted library allocation
page read and write
1A3E62A9000
trusted library allocation
page read and write
1A3EEB66000
trusted library allocation
page read and write
1A3E5E27000
trusted library allocation
page read and write
1A3F065A000
trusted library allocation
page read and write
1A3EDCF3000
trusted library allocation
page read and write
1A3DBFEC000
heap
page read and write
1A3DBFED000
heap
page read and write
1A3DBFCE000
heap
page read and write
8FE13FE000
stack
page read and write
1A3ED26E000
trusted library allocation
page read and write
1A3E6A30000
trusted library allocation
page read and write
1A3F10AA000
trusted library allocation
page read and write
1D906721000
heap
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3E69F9000
trusted library allocation
page read and write
1A3F2106000
trusted library allocation
page read and write
1A3ED414000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3ED393000
trusted library allocation
page read and write
1A3DC025000
heap
page read and write
1A3DC02B000
heap
page read and write
1A3F1D61000
trusted library allocation
page read and write
1CA8DE00000
heap
page read and write
1A3E6A85000
trusted library allocation
page read and write
1A3ED1D5000
trusted library allocation
page read and write
1A3E5BAC000
trusted library allocation
page read and write
1C22B107000
trusted library allocation
page read and write
1A3E4FCE000
trusted library allocation
page read and write
1A3E5BC3000
trusted library allocation
page read and write
1A3ED659000
trusted library allocation
page read and write
1A3DBFCE000
heap
page read and write
1A3EE143000
trusted library allocation
page read and write
1A3DBFE2000
heap
page read and write
1A3E4F9E000
trusted library allocation
page read and write
1A3EE2DF000
trusted library allocation
page read and write
1A3ED414000
trusted library allocation
page read and write
1A3DBFE7000
heap
page read and write
1A3DBFEC000
heap
page read and write
1A3DC03E000
heap
page read and write
1A3EE0AD000
trusted library allocation
page read and write
1A3E75B2000
trusted library allocation
page read and write
1A3E6B34000
trusted library allocation
page read and write
1E58D70A000
trusted library allocation
page read and write
1D9056D0000
unclassified section
page readonly
1A3E69DF000
trusted library allocation
page read and write
1A3E758F000
trusted library allocation
page read and write
1A3F1393000
trusted library allocation
page read and write
1A3E0F71000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3EE065000
trusted library allocation
page read and write
1A3F15A7000
trusted library allocation
page read and write
1A3E232A000
trusted library allocation
page read and write
1A3DBFF0000
heap
page read and write
1A3ED5E4000
trusted library allocation
page read and write
There are 3741 hidden memdumps, click here to show them.