IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b672c5e8-b960-444e-ac57-75a237ddab58.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b672c5e8-b960-444e-ac57-75a237ddab58.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20230927232528 -prefsHandle 2128 -prefMapHandle 2120 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39515606-0953-4238-9f6b-6d6653a23c41} 1288 "\\.\pipe\gecko-crash-server-pipe.1288" 1fdff570310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4656 -prefMapHandle 4648 -prefsLen 26273 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e71d3d03-5e0e-4be1-9e03-002cc7d7a404} 1288 "\\.\pipe\gecko-crash-server-pipe.1288" 1fd91c29910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4940 -prefMapHandle 4952 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04af4695-a06b-4c33-be4e-ae43f533d05c} 1288 "\\.\pipe\gecko-crash-server-pipe.1288" 1fd994d8510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://youtube.com/account?=https://accounts.google.co5l
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.212.174
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
142.250.185.238
youtube.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
16FF000
heap
page read and write
malicious
1FDFFEED000
heap
page read and write
1A85A1B7000
heap
page read and write
2243B7E0000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD920D5000
trusted library allocation
page read and write
1FD91B83000
trusted library allocation
page read and write
1FD8F810000
trusted library allocation
page read and write
1FD91372000
trusted library allocation
page read and write
1FD91841000
trusted library allocation
page read and write
9C7C3803000
trusted library allocation
page read and write
1708000
heap
page read and write
1FD9129A000
trusted library allocation
page read and write
1FD90CB5000
trusted library allocation
page read and write
1FDFFEB2000
heap
page read and write
1FD903A3000
trusted library allocation
page read and write
1FD97620000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD97AC7000
trusted library allocation
page read and write
1FD924B6000
trusted library allocation
page read and write
1FD924FB000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD99475000
trusted library allocation
page read and write
1FD905AB000
trusted library allocation
page read and write
1FD910B4000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD90D65000
trusted library allocation
page read and write
1FD90D4F000
trusted library allocation
page read and write
1FD90CEF000
trusted library allocation
page read and write
1FD910DE000
trusted library allocation
page read and write
1FD920FA000
trusted library allocation
page read and write
1FD9918A000
trusted library allocation
page read and write
1FD8F86A000
trusted library allocation
page read and write
1FD97AAE000
trusted library allocation
page read and write
1FD97AD1000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1FD90F7D000
trusted library allocation
page read and write
1FDFFEEB000
heap
page read and write
1A859433000
unkown
page execute read
1FD8F98A000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD916B0000
trusted library allocation
page read and write
1FD9ACEF000
trusted library allocation
page read and write
1FD90368000
trusted library allocation
page read and write
1FD8C469000
trusted library allocation
page read and write
1FD90992000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
1FD99C6D000
trusted library allocation
page read and write
1FD97CB8000
trusted library allocation
page read and write
1FD8F8AC000
trusted library allocation
page read and write
1FD90594000
trusted library allocation
page read and write
1FD8F379000
trusted library allocation
page read and write
2243D1BD000
heap
page read and write
1FD8C3CA000
trusted library allocation
page read and write
15EF000
stack
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD91CC4000
trusted library allocation
page read and write
1FD8EF83000
heap
page read and write
1FD9362A000
trusted library allocation
page read and write
1FD910F0000
trusted library allocation
page read and write
1FD911CD000
trusted library allocation
page read and write
1A85936F000
trusted library allocation
page read and write
1FD90E91000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD90E4D000
trusted library allocation
page read and write
9F131FF000
stack
page read and write
1FDFFE95000
heap
page read and write
1FDFFEAE000
heap
page read and write
1FD9A1D3000
trusted library allocation
page read and write
1FD91369000
trusted library allocation
page read and write
1FD911ED000
trusted library allocation
page read and write
1FD90DE6000
trusted library allocation
page read and write
1FD97D09000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD90E22000
trusted library allocation
page read and write
1FD979FC000
trusted library allocation
page read and write
1FD8F31A000
trusted library allocation
page read and write
1FD8FB80000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD8F9D2000
trusted library allocation
page read and write
1FD924CF000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD8C4D5000
trusted library allocation
page read and write
1FD8F6C3000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD9203B000
trusted library allocation
page read and write
1FD903D4000
trusted library allocation
page read and write
1FD8F006000
heap
page read and write
1FD90DAE000
trusted library allocation
page read and write
1FD910DA000
trusted library allocation
page read and write
1FD97400000
trusted library allocation
page read and write
1FD90368000
trusted library allocation
page read and write
1FD90FBB000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD994A8000
trusted library allocation
page read and write
1FD9786F000
trusted library allocation
page read and write
1FD8EBD3000
trusted library allocation
page read and write
1FD904D1000
trusted library allocation
page read and write
1FD97A14000
trusted library allocation
page read and write
1FD916B9000
trusted library allocation
page read and write
1FD916EB000
trusted library allocation
page read and write
1FDFFF10000
heap
page read and write
1FDFFE95000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEAE000
heap
page read and write
1A85A0AC000
heap
page read and write
1A85A162000
heap
page read and write
1FD9AC80000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD97AAB000
trusted library allocation
page read and write
1DD4AF24000
trusted library allocation
page read and write
1FD90FB5000
trusted library allocation
page read and write
1FD91341000
trusted library allocation
page read and write
1FD917FE000
trusted library allocation
page read and write
1FD9123A000
trusted library allocation
page read and write
1FD97A19000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8F30B000
trusted library allocation
page read and write
1FD91D79000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD90E05000
trusted library allocation
page read and write
1FD97A97000
trusted library allocation
page read and write
1FDFFF0A000
heap
page read and write
1FDFFEA5000
heap
page read and write
1FDFFEF1000
heap
page read and write
1FD903A3000
trusted library allocation
page read and write
1A4D46B0000
heap
page read and write
1FD916A6000
trusted library allocation
page read and write
1FD9ACC6000
trusted library allocation
page read and write
1FD905AB000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1FD8F64F000
trusted library allocation
page read and write
411000
unkown
page execute read
1FDFFF0A000
heap
page read and write
1FD979E9000
trusted library allocation
page read and write
1A4D4630000
remote allocation
page read and write
1FD91D4C000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD915B9000
trusted library allocation
page read and write
1FD92007000
trusted library allocation
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD91B6B000
trusted library allocation
page read and write
1FD8F3A5000
trusted library allocation
page read and write
2E347BE000
unkown
page readonly
1FD8F376000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD8FBF1000
trusted library allocation
page read and write
1FD8FBBE000
trusted library allocation
page read and write
1FD8F006000
heap
page read and write
1FD9ACC6000
trusted library allocation
page read and write
1FD978F8000
trusted library allocation
page read and write
1FD8B500000
trusted library allocation
page read and write
1FDFFEAB000
heap
page read and write
1FDFFEE8000
heap
page read and write
24C0000
heap
page read and write
1FD913BA000
trusted library allocation
page read and write
1FD92F4C000
trusted library allocation
page read and write
1A85A1AA000
heap
page read and write
1FD976CA000
trusted library allocation
page read and write
2A30EB924000
trusted library allocation
page read and write
1FD8F9BB000
trusted library allocation
page read and write
1FD97A64000
trusted library allocation
page read and write
1FD90F6F000
trusted library allocation
page read and write
1FD97DA6000
trusted library allocation
page read and write
1FD8EFFD000
heap
page read and write
1FD8B41B000
trusted library allocation
page read and write
1A4D47C9000
heap
page read and write
1FDFFF04000
heap
page read and write
1FD8F6C2000
trusted library allocation
page read and write
1FD8F006000
heap
page read and write
1FD92200000
trusted library allocation
page read and write
1FD920FA000
trusted library allocation
page read and write
1FD90C74000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
A5202AE000
stack
page read and write
1FD8F966000
trusted library allocation
page read and write
1FD8F3F1000
trusted library allocation
page read and write
1FD9769F000
trusted library allocation
page read and write
1FD8F3C9000
trusted library allocation
page read and write
1FD9AC23000
trusted library allocation
page read and write
1FD90A43000
trusted library allocation
page read and write
1FD8EB26000
trusted library allocation
page read and write
1FD90D3A000
trusted library allocation
page read and write
1FDFFEA7000
heap
page read and write
1FD97635000
trusted library allocation
page read and write
1FD8F98D000
trusted library allocation
page read and write
1FD8EFAB000
heap
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD905B0000
trusted library allocation
page read and write
1A85930C000
trusted library allocation
page read and write
1FD924A0000
trusted library allocation
page read and write
1FD97AFC000
trusted library allocation
page read and write
1FD9AC16000
trusted library allocation
page read and write
1FD976A9000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1A85A198000
heap
page read and write
1FD91220000
trusted library allocation
page read and write
1FD93F63000
trusted library allocation
page read and write
1FD97877000
trusted library allocation
page read and write
1FDFFEE0000
heap
page read and write
1A85A0EA000
heap
page read and write
1FD91830000
trusted library allocation
page read and write
1FD91471000
trusted library allocation
page read and write
1FD976E2000
trusted library allocation
page read and write
1FD90C26000
trusted library allocation
page read and write
1DD4AAC6000
remote allocation
page execute read
1FD916B9000
trusted library allocation
page read and write
1A4D4AA7000
trusted library allocation
page read and write
1FD916F0000
trusted library allocation
page read and write
1FD976E2000
trusted library allocation
page read and write
1FD90364000
trusted library allocation
page read and write
1FD8F9BB000
trusted library allocation
page read and write
1FD8F6F0000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD90460000
trusted library allocation
page read and write
1A8591B0000
trusted library section
page readonly
1FD90C54000
trusted library allocation
page read and write
1FD8F3E6000
trusted library allocation
page read and write
1710000
heap
page read and write
1FD97AEF000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD90F8D000
trusted library allocation
page read and write
1FD9756E000
trusted library allocation
page read and write
1FD8FB41000
trusted library allocation
page read and write
1FD9036C000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FD8F668000
trusted library allocation
page read and write
1FD97A87000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD8C4AD000
trusted library allocation
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1FD92035000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD903AE000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD910B9000
trusted library allocation
page read and write
1FD8F263000
trusted library allocation
page read and write
1FD99D8A000
trusted library allocation
page read and write
1FD912F7000
trusted library allocation
page read and write
1FD90E25000
trusted library allocation
page read and write
1A85A140000
heap
page read and write
1FD8EF78000
heap
page read and write
1A4D4723000
heap
page read and write
1FDFFEE2000
heap
page read and write
1FD994B6000
trusted library allocation
page read and write
1FD90696000
trusted library allocation
page read and write
1FD91348000
trusted library allocation
page read and write
1FD96F26000
trusted library allocation
page read and write
1FD97BF0000
trusted library allocation
page read and write
1FD91348000
trusted library allocation
page read and write
1FD914CF000
trusted library allocation
page read and write
1FD90F6A000
trusted library allocation
page read and write
1FD978EA000
trusted library allocation
page read and write
1FD8FB56000
trusted library allocation
page read and write
1FD92F6E000
trusted library allocation
page read and write
1FD90368000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD97625000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD9208C000
trusted library allocation
page read and write
1FD976CA000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD916D0000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8F5F6000
trusted library allocation
page read and write
1FD90F67000
trusted library allocation
page read and write
1FD915AC000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD9124F000
trusted library allocation
page read and write
1FD924CF000
trusted library allocation
page read and write
1A85A08D000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD8F95B000
trusted library allocation
page read and write
1FD910A5000
trusted library allocation
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1A85A123000
heap
page read and write
1FD9059F000
trusted library allocation
page read and write
1FD8EBCA000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD916C9000
trusted library allocation
page read and write
1FD905C3000
trusted library allocation
page read and write
1A85A1B7000
heap
page read and write
1FD96F8F000
trusted library allocation
page read and write
1FD8EB8F000
trusted library allocation
page read and write
1FD920BE000
trusted library allocation
page read and write
1FD97DD0000
trusted library allocation
page read and write
1FD90F6A000
trusted library allocation
page read and write
1FD9A800000
trusted library allocation
page read and write
1FD8ADCB000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD8F529000
trusted library allocation
page read and write
1FD9ACEF000
trusted library allocation
page read and write
1FD92FCD000
trusted library allocation
page read and write
1FD92FFC000
trusted library allocation
page read and write
1FD90C1A000
trusted library allocation
page read and write
1FD92FF3000
trusted library allocation
page read and write
1A85A13D000
heap
page read and write
1FDFFEAE000
heap
page read and write
1FD913D0000
trusted library allocation
page read and write
1FD97A64000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD903D9000
trusted library allocation
page read and write
1FD906BC000
trusted library allocation
page read and write
1FD9138A000
trusted library allocation
page read and write
1FD91FE9000
trusted library allocation
page read and write
1FD93841000
heap
page read and write
1FD8EF73000
heap
page read and write
1FD90C6F000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FD97AB5000
trusted library allocation
page read and write
1FD90463000
trusted library allocation
page read and write
1FD90FAE000
trusted library allocation
page read and write
1FD8F95F000
trusted library allocation
page read and write
1A85A0A0000
heap
page read and write
1FD903C9000
trusted library allocation
page read and write
2E3473B000
stack
page read and write
1FD91D52000
trusted library allocation
page read and write
1FD8FFD7000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD916C9000
trusted library allocation
page read and write
1FD8F33B000
trusted library allocation
page read and write
1FD96F7A000
trusted library allocation
page read and write
1FD91379000
trusted library allocation
page read and write
1FD932A7000
trusted library allocation
page read and write
1FD978D9000
trusted library allocation
page read and write
1FD97AE1000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD916C9000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD977AB000
trusted library allocation
page read and write
1FD937BB000
heap
page read and write
1FD912C7000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD9332C000
trusted library allocation
page read and write
1A4D4C17000
trusted library allocation
page read and write
1FD8B4DB000
trusted library allocation
page read and write
1FD97AB7000
trusted library allocation
page read and write
1FD8F812000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD97A8F000
trusted library allocation
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD9AEEE000
trusted library allocation
page read and write
1FD978AC000
trusted library allocation
page read and write
1FD976C4000
trusted library allocation
page read and write
1FD913E4000
trusted library allocation
page read and write
1FD97AAB000
trusted library allocation
page read and write
1FD9AEE0000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8F691000
trusted library allocation
page read and write
1FD90FB6000
trusted library allocation
page read and write
1FDFFEB2000
heap
page read and write
1FD976C2000
trusted library allocation
page read and write
1FD91323000
trusted library allocation
page read and write
1FD97AFC000
trusted library allocation
page read and write
1FD9AC83000
trusted library allocation
page read and write
1FD8F6C8000
trusted library allocation
page read and write
1FD97AAE000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD918E6000
trusted library allocation
page read and write
1FD90362000
trusted library allocation
page read and write
1FD8FB3D000
trusted library allocation
page read and write
1FD911FE000
trusted library allocation
page read and write
1FD931E5000
trusted library allocation
page read and write
1FD97D20000
trusted library allocation
page read and write
1FD90312000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD9243D000
trusted library allocation
page read and write
2243B778000
heap
page read and write
1FD912C7000
trusted library allocation
page read and write
1DD4AEB4000
heap
page read and write
1FD8B4E0000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1A85A126000
heap
page read and write
1FDFFED9000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD912A9000
trusted library allocation
page read and write
1FD97711000
trusted library allocation
page read and write
1FD97A2F000
trusted library allocation
page read and write
1FD9ACEC000
trusted library allocation
page read and write
1FD910DA000
trusted library allocation
page read and write
1FD9A1D9000
trusted library allocation
page read and write
F34000
heap
page read and write
1DD4AF6A000
trusted library allocation
page read and write
1FD977B3000
trusted library allocation
page read and write
1FD8C4A8000
trusted library allocation
page read and write
1FD9AEE3000
trusted library allocation
page read and write
1FD90C39000
trusted library allocation
page read and write
1FD8F8CF000
trusted library allocation
page read and write
1FD90597000
trusted library allocation
page read and write
1FD9AEE7000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD97717000
trusted library allocation
page read and write
1FD913F2000
trusted library allocation
page read and write
1A4D4A47000
trusted library allocation
page read and write
1FD91345000
trusted library allocation
page read and write
1FD90640000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD93795000
heap
page read and write
1FD994EA000
trusted library allocation
page read and write
1FD8EF73000
heap
page read and write
1FD96F36000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
1FD8F3AE000
trusted library allocation
page read and write
1A85A131000
heap
page read and write
1FD905BD000
trusted library allocation
page read and write
1A4D4A81000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
A523DFE000
stack
page read and write
1FD8EFF0000
heap
page read and write
1FD910EC000
trusted library allocation
page read and write
1DD4AF30000
trusted library allocation
page read and write
1FD8F3AE000
trusted library allocation
page read and write
1FD90F38000
trusted library allocation
page read and write
1A85A17B000
heap
page read and write
1A859415000
unkown
page execute read
1FD937E9000
heap
page read and write
1FD8EFAA000
heap
page read and write
A5245FE000
unkown
page readonly
1FD924B6000
trusted library allocation
page read and write
3A727EE000
unkown
page readonly
1FD97A98000
trusted library allocation
page read and write
1FD90FF7000
trusted library allocation
page read and write
1FD912E4000
trusted library allocation
page read and write
1FD9947C000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
F34000
heap
page read and write
1FD8C486000
trusted library allocation
page read and write
1FD8FCEE000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8F87E000
trusted library allocation
page read and write
1FD91231000
trusted library allocation
page read and write
1FD91C76000
trusted library allocation
page read and write
1A8593C7000
trusted library allocation
page read and write
1FD9ACEF000
trusted library allocation
page read and write
1FD97B98000
trusted library allocation
page read and write
1A85A17B000
heap
page read and write
1FD9124A000
trusted library allocation
page read and write
1FD913E0000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD92445000
trusted library allocation
page read and write
1FD9062C000
trusted library allocation
page read and write
1FD8FFC4000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD97B95000
trusted library allocation
page read and write
1FD977EC000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD90EF1000
trusted library allocation
page read and write
1FD97586000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD91C27000
trusted library allocation
page read and write
1FD90DCD000
trusted library allocation
page read and write
1FD978F1000
trusted library allocation
page read and write
1FD97620000
trusted library allocation
page read and write
1FD9105B000
trusted library allocation
page read and write
1FDFFF0E000
heap
page read and write
1FD97AE1000
trusted library allocation
page read and write
1FDFFEF9000
heap
page read and write
1FD924D7000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD905B5000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8EBF1000
trusted library allocation
page read and write
1FD924D5000
trusted library allocation
page read and write
1FD99D0C000
trusted library allocation
page read and write
1DD4AB10000
heap
page read and write
1FD91682000
trusted library allocation
page read and write
1FD8F3CD000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEF1000
heap
page read and write
1FD9AEC9000
trusted library allocation
page read and write
1FD90F5A000
trusted library allocation
page read and write
1FD9166D000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
1FD92EA1000
trusted library allocation
page read and write
1FD97AEF000
trusted library allocation
page read and write
1DD4AF81000
trusted library allocation
page read and write
1FD99D93000
trusted library allocation
page read and write
1FDFFEB1000
heap
page read and write
1FD916D0000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1A4D4A72000
trusted library allocation
page read and write
1FD96FBB000
trusted library allocation
page read and write
1FD8EB62000
trusted library allocation
page read and write
1FD8F28C000
trusted library allocation
page read and write
1FD904A5000
trusted library allocation
page read and write
1FD91638000
trusted library allocation
page read and write
1FD92F65000
trusted library allocation
page read and write
1FD92450000
trusted library allocation
page read and write
1FD913E2000
trusted library allocation
page read and write
1FD8FB3A000
trusted library allocation
page read and write
9F111FE000
stack
page read and write
1FD90C40000
trusted library allocation
page read and write
1FD8F956000
trusted library allocation
page read and write
1FD9042A000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD90D4F000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD978CE000
trusted library allocation
page read and write
1FD92477000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD903C4000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD91341000
trusted library allocation
page read and write
1FD913E7000
trusted library allocation
page read and write
1FD937D1000
heap
page read and write
1FD913F2000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
2243D1C7000
heap
page read and write
1FD932AC000
trusted library allocation
page read and write
1FDFFF10000
heap
page read and write
1FD910A5000
trusted library allocation
page read and write
1FD9129A000
trusted library allocation
page read and write
1FD8F95B000
trusted library allocation
page read and write
1FD97635000
trusted library allocation
page read and write
1FD976A4000
trusted library allocation
page read and write
1FD910F0000
trusted library allocation
page read and write
1FD9138A000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD911BD000
trusted library allocation
page read and write
1FD8F3A5000
trusted library allocation
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD8EFAA000
heap
page read and write
1FDFFEDC000
heap
page read and write
1727000
heap
page read and write
1FDFFEA5000
heap
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1A8593AC000
trusted library allocation
page read and write
1FD9121A000
trusted library allocation
page read and write
1FD97581000
trusted library allocation
page read and write
1FD91899000
trusted library allocation
page read and write
1FD9248E000
trusted library allocation
page read and write
1A85A09C000
heap
page read and write
1FD8F89A000
trusted library allocation
page read and write
1FD9769E000
trusted library allocation
page read and write
1FD91E57000
trusted library allocation
page read and write
1A4D4700000
heap
page readonly
1FD994C0000
trusted library allocation
page read and write
1FD97AF3000
trusted library allocation
page read and write
1FD912BA000
trusted library allocation
page read and write
1FD9AEE0000
trusted library allocation
page read and write
1FD97683000
trusted library allocation
page read and write
1FD924CD000
trusted library allocation
page read and write
1FD9130B000
trusted library allocation
page read and write
1FD8FC53000
trusted library allocation
page read and write
1FD91643000
trusted library allocation
page read and write
171F000
heap
page read and write
1FD8F007000
heap
page read and write
1FD8F39A000
trusted library allocation
page read and write
1FDFF5DB000
trusted library allocation
page read and write
1A4D4A7B000
trusted library allocation
page read and write
1FD97680000
trusted library allocation
page read and write
1FD90423000
trusted library allocation
page read and write
1FD9ACFA000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD97BDA000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD994E1000
trusted library allocation
page read and write
1FD8B376000
trusted library allocation
page read and write
1FD910EC000
trusted library allocation
page read and write
1FD8F3A0000
trusted library allocation
page read and write
1FD90DBC000
trusted library allocation
page read and write
1FD97DBE000
trusted library allocation
page read and write
3A741FE000
stack
page read and write
1FD910DA000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD8EB91000
trusted library allocation
page read and write
1FD8B371000
trusted library allocation
page read and write
1A8594C0000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD8EBF4000
trusted library allocation
page read and write
1FD912F8000
trusted library allocation
page read and write
1FD977B5000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FD92F2D000
trusted library allocation
page read and write
1FD92FE9000
trusted library allocation
page read and write
1FD90D84000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD97A8F000
trusted library allocation
page read and write
1FD994D2000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD97A93000
trusted library allocation
page read and write
1A4D4C13000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFEA5000
heap
page read and write
1FD916B0000
trusted library allocation
page read and write
1FDFFEA7000
heap
page read and write
1FD90CFD000
trusted library allocation
page read and write
1FD914F6000
trusted library allocation
page read and write
1A85A0A0000
heap
page read and write
1FD92F8E000
trusted library allocation
page read and write
1FD994DD000
trusted library allocation
page read and write
1FD8F9BE000
trusted library allocation
page read and write
9F129FE000
stack
page read and write
1FDFFEF1000
heap
page read and write
1FD91027000
trusted library allocation
page read and write
1FD97676000
trusted library allocation
page read and write
1FD8FBE3000
trusted library allocation
page read and write
171F000
heap
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD910FE000
trusted library allocation
page read and write
1FDFFEE5000
heap
page read and write
1FD96F05000
trusted library allocation
page read and write
1A859150000
trusted library allocation
page read and write
1A85A0BF000
heap
page read and write
1FD90E4D000
trusted library allocation
page read and write
1FD90E1E000
trusted library allocation
page read and write
1A85A16D000
heap
page read and write
1FD91241000
trusted library allocation
page read and write
1FD91BEB000
trusted library allocation
page read and write
1DD4AF63000
trusted library allocation
page read and write
1FD97D39000
trusted library allocation
page read and write
1FD90623000
trusted library allocation
page read and write
1FD90FE9000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD920B7000
trusted library allocation
page read and write
1A85A132000
heap
page read and write
1FD9247F000
trusted library allocation
page read and write
1FD912C7000
trusted library allocation
page read and write
1FD9ACEC000
trusted library allocation
page read and write
1FD9ACFA000
trusted library allocation
page read and write
1FD92FA1000
trusted library allocation
page read and write
1FD8F253000
trusted library allocation
page read and write
1FD8F3AE000
trusted library allocation
page read and write
1FDFFEDA000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD91C73000
trusted library allocation
page read and write
1FD97BDA000
trusted library allocation
page read and write
1FDFFEDF000
heap
page read and write
1FD90DD3000
trusted library allocation
page read and write
1FD91231000
trusted library allocation
page read and write
1A859367000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD91298000
trusted library allocation
page read and write
1FD9761D000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD908D2000
trusted library allocation
page read and write
1FD97AA0000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FD8FB92000
trusted library allocation
page read and write
1FD976FB000
trusted library allocation
page read and write
1FD8EB20000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD8EF6B000
heap
page read and write
1FD9049A000
trusted library allocation
page read and write
1A4D4AA2000
trusted library allocation
page read and write
22DF000
stack
page read and write
1FDFFF04000
heap
page read and write
1FD903D4000
trusted library allocation
page read and write
1FD91636000
trusted library allocation
page read and write
1DD4B104000
trusted library allocation
page read and write
A52036E000
unkown
page readonly
1FDFFEF1000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEE8000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD92053000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FDFFEEC000
heap
page read and write
1FD91C34000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD8EF89000
heap
page read and write
1FD978C5000
trusted library allocation
page read and write
1A859A00000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FD8F3C7000
trusted library allocation
page read and write
1FD91FC3000
trusted library allocation
page read and write
1FD8FBE9000
trusted library allocation
page read and write
1FD8C49C000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD9AE9B000
trusted library allocation
page read and write
1FD910B0000
trusted library allocation
page read and write
1FD97676000
trusted library allocation
page read and write
1FD92FB7000
trusted library allocation
page read and write
1FD91D86000
trusted library allocation
page read and write
1FD91117000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD976D7000
trusted library allocation
page read and write
1FDFFF0A000
heap
page read and write
1FDFFEF1000
heap
page read and write
1FD8FF4E000
trusted library allocation
page read and write
1FD9149F000
trusted library allocation
page read and write
1FD99CA3000
trusted library allocation
page read and write
1FD92041000
trusted library allocation
page read and write
1FD97BB8000
trusted library allocation
page read and write
1FD8F554000
trusted library allocation
page read and write
3A76A7E000
unkown
page readonly
1FDFFEA4000
heap
page read and write
1FDFFE9E000
heap
page read and write
1FD96FD3000
trusted library allocation
page read and write
1FD99CC8000
trusted library allocation
page read and write
1FD90E06000
trusted library allocation
page read and write
1FD906B9000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8EF8E000
heap
page read and write
1FD8F286000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD8EF6B000
heap
page read and write
1DD4AFB5000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD92086000
trusted library allocation
page read and write
1FD9136B000
trusted library allocation
page read and write
1FD99D41000
trusted library allocation
page read and write
2243B710000
heap
page read and write
1FDFFF00000
heap
page read and write
F34000
heap
page read and write
1A85A131000
heap
page read and write
1FD92456000
trusted library allocation
page read and write
1FD905E6000
trusted library allocation
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD916EA000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD8EB75000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
1A85935F000
trusted library allocation
page read and write
1FD91278000
trusted library allocation
page read and write
1FD916FD000
trusted library allocation
page read and write
1FD8EFFE000
heap
page read and write
1FD910B4000
trusted library allocation
page read and write
1A859348000
trusted library allocation
page read and write
1FD916C7000
trusted library allocation
page read and write
1FD8F25D000
trusted library allocation
page read and write
1FD913CB000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD90A3C000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD99102000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FDFFEF1000
heap
page read and write
1FD90358000
trusted library allocation
page read and write
1FD90FD3000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FD9139C000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD90F96000
trusted library allocation
page read and write
1FD910CF000
trusted library allocation
page read and write
1FD91400000
trusted library allocation
page read and write
1FD90CF3000
trusted library allocation
page read and write
1A4D4790000
heap
page read and write
1FD92035000
trusted library allocation
page read and write
1FDFFEA7000
heap
page read and write
1FD8B4AD000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD910EC000
trusted library allocation
page read and write
1FD8F64D000
trusted library allocation
page read and write
1FD97D70000
trusted library allocation
page read and write
4071000
heap
page read and write
1FD90C45000
trusted library allocation
page read and write
1FD92F50000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD976CB000
trusted library allocation
page read and write
1FD8F6C8000
trusted library allocation
page read and write
1FD8F984000
trusted library allocation
page read and write
1FD92F9F000
trusted library allocation
page read and write
1FD976CA000
trusted library allocation
page read and write
1FD9111A000
trusted library allocation
page read and write
1FD9120B000
trusted library allocation
page read and write
1FD8ADA9000
trusted library allocation
page read and write
1FD8FB35000
trusted library allocation
page read and write
1FD8B4E4000
trusted library allocation
page read and write
1FD8F805000
trusted library allocation
page read and write
1FD9ACBE000
trusted library allocation
page read and write
1FD924EC000
trusted library allocation
page read and write
1FD92037000
trusted library allocation
page read and write
1FD977D2000
trusted library allocation
page read and write
1FD8F281000
trusted library allocation
page read and write
1FD8EB69000
trusted library allocation
page read and write
1FD90E34000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FD97A14000
trusted library allocation
page read and write
1FD90354000
trusted library allocation
page read and write
1FD913F2000
trusted library allocation
page read and write
1FD91365000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD92FA8000
trusted library allocation
page read and write
1FD97B63000
trusted library allocation
page read and write
1FD8EFF6000
heap
page read and write
1FD916EE000
trusted library allocation
page read and write
1FD97B67000
trusted library allocation
page read and write
1FD8FB63000
trusted library allocation
page read and write
1FD90643000
trusted library allocation
page read and write
1FD9756E000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD99D43000
trusted library allocation
page read and write
1FD994DE000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FD90876000
trusted library allocation
page read and write
1FD8EFEC000
heap
page read and write
1FDFFED8000
heap
page read and write
1A85A161000
heap
page read and write
1FDFFEA7000
heap
page read and write
1FD97769000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD99DC5000
trusted library allocation
page read and write
1FDFFEA3000
heap
page read and write
1FD924D4000
trusted library allocation
page read and write
1FD8D266000
trusted library allocation
page read and write
1FD97537000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD916BF000
trusted library allocation
page read and write
1A85A16A000
heap
page read and write
1FDFFEF6000
heap
page read and write
1FDFFEDE000
heap
page read and write
1DD4AF15000
trusted library allocation
page read and write
1FD920BE000
trusted library allocation
page read and write
1FD9AEA6000
trusted library allocation
page read and write
1FD903D1000
trusted library allocation
page read and write
9DE95FF000
stack
page read and write
1FDFFEDE000
heap
page read and write
1FD91CF7000
trusted library allocation
page read and write
1FD912AC000
trusted library allocation
page read and write
1FD91657000
trusted library allocation
page read and write
1FD97635000
trusted library allocation
page read and write
1FD91063000
trusted library allocation
page read and write
1FD916A4000
trusted library allocation
page read and write
1FD8F56E000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD99D6D000
trusted library allocation
page read and write
1FD924EC000
trusted library allocation
page read and write
1FD904A8000
trusted library allocation
page read and write
1FD8F9D7000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD8F3F1000
trusted library allocation
page read and write
1FD9ACC4000
trusted library allocation
page read and write
1FD916EA000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD912A2000
trusted library allocation
page read and write
1FD99137000
trusted library allocation
page read and write
1FD90F96000
trusted library allocation
page read and write
1FD8F3A5000
trusted library allocation
page read and write
1FD9AED9000
trusted library allocation
page read and write
1FD91667000
trusted library allocation
page read and write
1FD97A93000
trusted library allocation
page read and write
1FD912A5000
trusted library allocation
page read and write
1FD97C5A000
trusted library allocation
page read and write
1FD8FCD3000
trusted library allocation
page read and write
1FD8EF8B000
heap
page read and write
1FD99193000
trusted library allocation
page read and write
1FD97DB3000
trusted library allocation
page read and write
1FD97D0E000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FD9ACC0000
trusted library allocation
page read and write
1A4D464C000
remote allocation
page execute read
1FD8FB41000
trusted library allocation
page read and write
1FD8F6AE000
trusted library allocation
page read and write
1FD8F43A000
trusted library allocation
page read and write
1FD924EC000
trusted library allocation
page read and write
1FD912A9000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD92043000
trusted library allocation
page read and write
1FD90439000
trusted library allocation
page read and write
2243B79A000
heap
page read and write
1FD92F65000
trusted library allocation
page read and write
1FD912B2000
trusted library allocation
page read and write
1FD97A89000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD91CF7000
trusted library allocation
page read and write
1FD913E7000
trusted library allocation
page read and write
1FD97AD1000
trusted library allocation
page read and write
1FD9161A000
trusted library allocation
page read and write
1FD90FED000
trusted library allocation
page read and write
1FD91BAA000
trusted library allocation
page read and write
1FD8F898000
trusted library allocation
page read and write
1FD8F007000
heap
page read and write
1A85A0CD000
heap
page read and write
1FD99C87000
trusted library allocation
page read and write
1FD90F4C000
trusted library allocation
page read and write
1FD8F3C9000
trusted library allocation
page read and write
1FD8EF78000
heap
page read and write
1FD8EB43000
trusted library allocation
page read and write
1FD9049A000
trusted library allocation
page read and write
1FD91FFB000
trusted library allocation
page read and write
1FD93207000
trusted library allocation
page read and write
2243D1B7000
heap
page read and write
2E361FE000
stack
page read and write
1FD8EFF6000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FD90492000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD903C3000
trusted library allocation
page read and write
1FD910BB000
trusted library allocation
page read and write
1FD97A97000
trusted library allocation
page read and write
1FD97A8D000
trusted library allocation
page read and write
348A327D000
trusted library allocation
page execute read
1FD8FB52000
trusted library allocation
page read and write
1FD8EFB1000
heap
page read and write
1FD91463000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD90E68000
trusted library allocation
page read and write
1FD8F88B000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FD9AEEE000
trusted library allocation
page read and write
1FD90563000
trusted library allocation
page read and write
1FD9109A000
trusted library allocation
page read and write
1FD92FCD000
trusted library allocation
page read and write
1FD97B8B000
trusted library allocation
page read and write
1FD97BC4000
trusted library allocation
page read and write
1FD92F76000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD9785E000
trusted library allocation
page read and write
1FD91365000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD91363000
trusted library allocation
page read and write
1FD8F86A000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD9777D000
trusted library allocation
page read and write
1FD93631000
trusted library allocation
page read and write
1FD91EDB000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1A4D4A63000
trusted library allocation
page read and write
1FD90DC0000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FD903D4000
trusted library allocation
page read and write
1A859120000
heap
page readonly
1FD8EF6B000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD8F3C6000
trusted library allocation
page read and write
1FD97DB2000
trusted library allocation
page read and write
1FD9ACC0000
trusted library allocation
page read and write
1FD90F99000
trusted library allocation
page read and write
1FD995D0000
trusted library allocation
page read and write
1FDFFEDF000
heap
page read and write
1FD8ADEF000
trusted library allocation
page read and write
1FD99C9E000
trusted library allocation
page read and write
171F000
heap
page read and write
1FD8AD98000
trusted library allocation
page read and write
1FD97D20000
trusted library allocation
page read and write
3C30000
heap
page read and write
1FD975D8000
trusted library allocation
page read and write
1FD90657000
trusted library allocation
page read and write
1FD8FB60000
trusted library allocation
page read and write
1FD911C8000
trusted library allocation
page read and write
1FD978FA000
trusted library allocation
page read and write
1FD90439000
trusted library allocation
page read and write
1FD977DF000
trusted library allocation
page read and write
1A85A1B7000
heap
page read and write
1FD92461000
trusted library allocation
page read and write
170F000
heap
page read and write
1FD90D4B000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEF6000
heap
page read and write
2243B7A8000
heap
page read and write
1FD8EB87000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD977EA000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD8EF8E000
heap
page read and write
1FD91C20000
trusted library allocation
page read and write
1FD91C82000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD97537000
trusted library allocation
page read and write
1FD913CD000
trusted library allocation
page read and write
1FDFFEF9000
heap
page read and write
1FDFFE9E000
heap
page read and write
1FD9760F000
trusted library allocation
page read and write
1FD8F362000
trusted library allocation
page read and write
1FD8EBCA000
trusted library allocation
page read and write
1FD9069D000
trusted library allocation
page read and write
1FD90DF4000
trusted library allocation
page read and write
1FD8F68D000
trusted library allocation
page read and write
1FD91E63000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFF5FE000
trusted library allocation
page read and write
1FD91365000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD9132E000
trusted library allocation
page read and write
2243B900000
trusted library allocation
page read and write
1FD976A9000
trusted library allocation
page read and write
1FD916E8000
trusted library allocation
page read and write
1FD9ACCA000
trusted library allocation
page read and write
1A4D479A000
heap
page read and write
22CDCFA0000
heap
page read and write
1FD8EFEE000
heap
page read and write
1A85A126000
heap
page read and write
1FDFFF10000
heap
page read and write
1FD905FA000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD97B98000
trusted library allocation
page read and write
1FD97AE9000
trusted library allocation
page read and write
1FD97AF3000
trusted library allocation
page read and write
1FD92F5F000
trusted library allocation
page read and write
1FD97BDA000
trusted library allocation
page read and write
1FD8F525000
trusted library allocation
page read and write
1FD97DAB000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1DD4AB53000
heap
page read and write
1FD9113A000
trusted library allocation
page read and write
1FD8EFAB000
heap
page read and write
1FD92E7F000
trusted library allocation
page read and write
1FDFFF07000
heap
page read and write
1A4D4C0F000
trusted library allocation
page read and write
1FD97B87000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FDFFE97000
heap
page read and write
1FDFFEC9000
heap
page read and write
1FD90FA8000
trusted library allocation
page read and write
170A000
heap
page read and write
1FD9AE90000
trusted library allocation
page read and write
1FD97625000
trusted library allocation
page read and write
1FD91027000
trusted library allocation
page read and write
1FD8F25D000
trusted library allocation
page read and write
1A85A0A0000
heap
page read and write
1FD92FFC000
trusted library allocation
page read and write
1FD96FB3000
trusted library allocation
page read and write
1FD8EB26000
trusted library allocation
page read and write
1FD8F6B8000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FD8FBFA000
trusted library allocation
page read and write
1FD92FF1000
trusted library allocation
page read and write
1FD9761D000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FDFFEAB000
heap
page read and write
1FD90FFB000
trusted library allocation
page read and write
1FD91FE6000
trusted library allocation
page read and write
1FD912CA000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD91FC5000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
4AC000
unkown
page readonly
1FD91341000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD8F5A7000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD8F65B000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FDFFF0B000
heap
page read and write
1A85A198000
heap
page read and write
1FD90629000
trusted library allocation
page read and write
1FD9134D000
trusted library allocation
page read and write
1FD97693000
trusted library allocation
page read and write
1FD8F963000
trusted library allocation
page read and write
1FD9036C000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FDFFEF1000
heap
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD99D05000
trusted library allocation
page read and write
1FD8F3BE000
trusted library allocation
page read and write
1FD91E6D000
trusted library allocation
page read and write
1FD99300000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD913F2000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8EB75000
trusted library allocation
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD90C77000
trusted library allocation
page read and write
1FD8C47D000
trusted library allocation
page read and write
1FD9AC80000
trusted library allocation
page read and write
1FD8F56B000
trusted library allocation
page read and write
F34000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD92445000
trusted library allocation
page read and write
1FD8F565000
trusted library allocation
page read and write
1FD9207F000
trusted library allocation
page read and write
1A85A1B7000
heap
page read and write
1FD97AC7000
trusted library allocation
page read and write
1FD8F894000
trusted library allocation
page read and write
1FD978C5000
trusted library allocation
page read and write
1FD912BC000
trusted library allocation
page read and write
1FD978C5000
trusted library allocation
page read and write
1A4D4C06000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD9A17C000
trusted library allocation
page read and write
1FD914BA000
trusted library allocation
page read and write
1FD994B6000
trusted library allocation
page read and write
1FD92FD7000
trusted library allocation
page read and write
1FD9200F000
trusted library allocation
page read and write
1FD99D05000
trusted library allocation
page read and write
1FD91D79000
trusted library allocation
page read and write
1FD910F0000
trusted library allocation
page read and write
1FD9759B000
trusted library allocation
page read and write
1FD9320C000
trusted library allocation
page read and write
1FD92110000
trusted library allocation
page read and write
1FD90EA9000
trusted library allocation
page read and write
1FD912A9000
trusted library allocation
page read and write
1FD97685000
trusted library allocation
page read and write
1FD913DF000
trusted library allocation
page read and write
1FD92F12000
trusted library allocation
page read and write
1FD97AC1000
trusted library allocation
page read and write
1FD9ACC8000
trusted library allocation
page read and write
1FD8F554000
trusted library allocation
page read and write
1FD916C6000
trusted library allocation
page read and write
1FD90E25000
trusted library allocation
page read and write
1FD99DE4000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD97B87000
trusted library allocation
page read and write
1FD8F436000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD97B9A000
trusted library allocation
page read and write
1FD916EE000
trusted library allocation
page read and write
1FD912B2000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD924CF000
trusted library allocation
page read and write
1A85A199000
heap
page read and write
1FD91361000
trusted library allocation
page read and write
1FD910F7000
trusted library allocation
page read and write
1FD915F7000
trusted library allocation
page read and write
1FD912A5000
trusted library allocation
page read and write
1FD97B0F000
trusted library allocation
page read and write
1FD8F3F1000
trusted library allocation
page read and write
1FD92FD2000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FD90C40000
trusted library allocation
page read and write
1FD90487000
trusted library allocation
page read and write
1FD8F3BE000
trusted library allocation
page read and write
1FD8ADB3000
trusted library allocation
page read and write
1FD977EA000
trusted library allocation
page read and write
1A85A12F000
heap
page read and write
1FD8F997000
trusted library allocation
page read and write
1FD9768E000
trusted library allocation
page read and write
1FD8D24D000
trusted library allocation
page read and write
1FD8FC23000
trusted library allocation
page read and write
1FD8F9FC000
trusted library allocation
page read and write
1FD8F987000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD90C66000
trusted library allocation
page read and write
1FD8F3E6000
trusted library allocation
page read and write
1FD8FB56000
trusted library allocation
page read and write
1FD90EEB000
trusted library allocation
page read and write
1FD9047F000
trusted library allocation
page read and write
1FD97586000
trusted library allocation
page read and write
1FD8F8AC000
trusted library allocation
page read and write
1FD97B66000
trusted library allocation
page read and write
1FD97AA1000
trusted library allocation
page read and write
1FD9043F000
trusted library allocation
page read and write
1FD90473000
trusted library allocation
page read and write
1A859300000
trusted library allocation
page read and write
1FD8F956000
trusted library allocation
page read and write
1A4D4A12000
trusted library allocation
page read and write
1FD90A36000
trusted library allocation
page read and write
1FD90F6F000
trusted library allocation
page read and write
1FD9787F000
trusted library allocation
page read and write
1FD9201B000
trusted library allocation
page read and write
1FD90775000
trusted library allocation
page read and write
1FD90C8B000
trusted library allocation
page read and write
1FD910A9000
trusted library allocation
page read and write
1FD8EFF4000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FD8F3E6000
trusted library allocation
page read and write
1FD90338000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFED9000
heap
page read and write
1FD978F0000
trusted library allocation
page read and write
1FD9AC83000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1A4D4AC8000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD8F3C2000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD910DC000
trusted library allocation
page read and write
1A859140000
unclassified section
page read and write
1FD8F6B4000
trusted library allocation
page read and write
3A726AB000
stack
page read and write
1FD90F9E000
trusted library allocation
page read and write
1A8593F5000
trusted library allocation
page read and write
1FD9036C000
trusted library allocation
page read and write
1FD92E4A000
trusted library allocation
page read and write
1FD977D1000
trusted library allocation
page read and write
1FD8F9C3000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD8EBB9000
trusted library allocation
page read and write
1FD90C42000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD976D6000
trusted library allocation
page read and write
22CDD107000
trusted library allocation
page read and write
1FD916B9000
trusted library allocation
page read and write
1FD97D35000
trusted library allocation
page read and write
1FD8B48C000
trusted library allocation
page read and write
1FD91013000
trusted library allocation
page read and write
1FD8F23E000
trusted library allocation
page read and write
2243D1C5000
heap
page read and write
1FD91657000
trusted library allocation
page read and write
1FD9056C000
trusted library allocation
page read and write
1FD910FE000
trusted library allocation
page read and write
1FD92F95000
trusted library allocation
page read and write
1FD8FF4E000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD90FD3000
trusted library allocation
page read and write
1FD97553000
trusted library allocation
page read and write
1FD90C84000
trusted library allocation
page read and write
1FD97612000
trusted library allocation
page read and write
1FD8FBE3000
trusted library allocation
page read and write
1FD90FD5000
trusted library allocation
page read and write
1FD91381000
trusted library allocation
page read and write
1FD977D0000
trusted library allocation
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD904A5000
trusted library allocation
page read and write
1FD90433000
trusted library allocation
page read and write
1FD97BB8000
trusted library allocation
page read and write
1FD91827000
trusted library allocation
page read and write
1FD8EB2B000
trusted library allocation
page read and write
1FDFFF01000
heap
page read and write
3B60000
trusted library allocation
page read and write
1FD913FC000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
22CDD000000
trusted library allocation
page read and write
1FD90C69000
trusted library allocation
page read and write
1A85A0CA000
heap
page read and write
1FDFFF0A000
heap
page read and write
1FD92FB2000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD8F688000
trusted library allocation
page read and write
1FD8F3C7000
trusted library allocation
page read and write
1FD99C2F000
trusted library allocation
page read and write
1FD90C74000
trusted library allocation
page read and write
1FD90E1B000
trusted library allocation
page read and write
1FD9942C000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD911D5000
trusted library allocation
page read and write
1FD90FF7000
trusted library allocation
page read and write
1FD97A0F000
trusted library allocation
page read and write
1FD9AED9000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD91379000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD9178C000
trusted library allocation
page read and write
1FD93286000
trusted library allocation
page read and write
1FD97432000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FDFFED9000
heap
page read and write
1FD91379000
trusted library allocation
page read and write
1FD9AE99000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD9782E000
trusted library allocation
page read and write
1FD91379000
trusted library allocation
page read and write
1FD9777F000
trusted library allocation
page read and write
1FD91258000
trusted library allocation
page read and write
1FD8F3BE000
trusted library allocation
page read and write
1FD8FB3D000
trusted library allocation
page read and write
1FD9947C000
trusted library allocation
page read and write
1FD91313000
trusted library allocation
page read and write
1FD9170F000
trusted library allocation
page read and write
1DD4AF66000
trusted library allocation
page read and write
1FD97AF5000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD97863000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FD977EB000
trusted library allocation
page read and write
1A4D4BF0000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FD8B4B0000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEE7000
heap
page read and write
1FD97A89000
trusted library allocation
page read and write
1FD912D4000
trusted library allocation
page read and write
1FD97B8B000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
F30000
heap
page read and write
1FD97AE1000
trusted library allocation
page read and write
1FD91C1D000
trusted library allocation
page read and write
1FD90475000
trusted library allocation
page read and write
1FD93186000
trusted library allocation
page read and write
1FD8F5F4000
trusted library allocation
page read and write
1FD8F3C9000
trusted library allocation
page read and write
1FD90C77000
trusted library allocation
page read and write
1FD90C96000
trusted library allocation
page read and write
1FD97693000
trusted library allocation
page read and write
1FD910DE000
trusted library allocation
page read and write
1FD91EAB000
trusted library allocation
page read and write
1DD4AFF5000
trusted library allocation
page read and write
1FD903C0000
trusted library allocation
page read and write
1FD916C6000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FDFFEE8000
heap
page read and write
1FD8EB37000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD9163D000
trusted library allocation
page read and write
1A85930A000
trusted library allocation
page read and write
1FD8F694000
trusted library allocation
page read and write
1FD97843000
trusted library allocation
page read and write
1FD924F3000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD97D26000
trusted library allocation
page read and write
1FD90FA8000
trusted library allocation
page read and write
1FD9A1F7000
trusted library allocation
page read and write
1A4D4A00000
trusted library allocation
page read and write
1FD92F8B000
trusted library allocation
page read and write
1FD91E97000
trusted library allocation
page read and write
1FD8F3C7000
trusted library allocation
page read and write
1FD97A85000
trusted library allocation
page read and write
1702000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FDFFED9000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD916EA000
trusted library allocation
page read and write
1FDFFEEA000
heap
page read and write
1A4D4ACA000
trusted library allocation
page read and write
1FD910B4000
trusted library allocation
page read and write
1FD8F935000
trusted library allocation
page read and write
F8D000
stack
page read and write
1FD916FD000
trusted library allocation
page read and write
1FD8F94B000
trusted library allocation
page read and write
1FD908B2000
trusted library allocation
page read and write
1FD913A2000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD920A5000
trusted library allocation
page read and write
1A85914F000
unclassified section
page read and write
1FD99D1C000
trusted library allocation
page read and write
1FD911EF000
trusted library allocation
page read and write
1FD92086000
trusted library allocation
page read and write
1FD90DFD000
trusted library allocation
page read and write
1FD8C4A3000
trusted library allocation
page read and write
1FD916C6000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD8EB37000
trusted library allocation
page read and write
1FD97507000
trusted library allocation
page read and write
1FD90C7D000
trusted library allocation
page read and write
1FD914CF000
trusted library allocation
page read and write
1FD918EA000
trusted library allocation
page read and write
1FD8F9AB000
trusted library allocation
page read and write
1FD911B4000
trusted library allocation
page read and write
1A85A128000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD8FB74000
trusted library allocation
page read and write
1FD97AB5000
trusted library allocation
page read and write
1FD8AD9E000
trusted library allocation
page read and write
1FD8EB2C000
trusted library allocation
page read and write
1FD90434000
trusted library allocation
page read and write
1FD9160D000
trusted library allocation
page read and write
1FD8FF38000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FD8F6A9000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD91063000
trusted library allocation
page read and write
1FD97AAB000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD937A6000
heap
page read and write
1FD90C84000
trusted library allocation
page read and write
1FD97A6D000
trusted library allocation
page read and write
1FD90460000
trusted library allocation
page read and write
1FD8B47D000
trusted library allocation
page read and write
1FD97D1B000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFE9E000
heap
page read and write
1A4D4A6E000
trusted library allocation
page read and write
1FD97A64000
trusted library allocation
page read and write
1FD9379E000
heap
page read and write
1FD97AF9000
trusted library allocation
page read and write
1FD9057A000
trusted library allocation
page read and write
1FD97DE2000
trusted library allocation
page read and write
1FD90999000
trusted library allocation
page read and write
1FD90FB6000
trusted library allocation
page read and write
1FD96FC3000
trusted library allocation
page read and write
1FD8C4A8000
trusted library allocation
page read and write
1FD912BB000
trusted library allocation
page read and write
1FD91027000
trusted library allocation
page read and write
1FD97A2F000
trusted library allocation
page read and write
2E351D8000
stack
page read and write
1FD97AAE000
trusted library allocation
page read and write
1FD8F007000
heap
page read and write
1FD924FB000
trusted library allocation
page read and write
1FD9099D000
trusted library allocation
page read and write
1A859480000
heap
page read and write
1FD8FB7A000
trusted library allocation
page read and write
1FD8EBB9000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD91361000
trusted library allocation
page read and write
1FD90A65000
trusted library allocation
page read and write
1FD976A7000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD8C466000
trusted library allocation
page read and write
1FD91615000
trusted library allocation
page read and write
1FD9243F000
trusted library allocation
page read and write
1FD91298000
trusted library allocation
page read and write
1FD913CB000
trusted library allocation
page read and write
1FD91318000
trusted library allocation
page read and write
1FD910A7000
trusted library allocation
page read and write
4E4000
unkown
page readonly
1FD90587000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FDFFF04000
heap
page read and write
1FD98D00000
trusted library allocation
page read and write
1FD903A6000
trusted library allocation
page read and write
1FD91641000
trusted library allocation
page read and write
1FD976FB000
trusted library allocation
page read and write
1FD9752E000
trusted library allocation
page read and write
1FD92F2A000
trusted library allocation
page read and write
1FD90C8B000
trusted library allocation
page read and write
1FD8EBE7000
trusted library allocation
page read and write
1A85A184000
heap
page read and write
1FD9111A000
trusted library allocation
page read and write
1FD915B5000
trusted library allocation
page read and write
1FD8FBFA000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FD8FC66000
trusted library allocation
page read and write
1FD97B87000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD93241000
trusted library allocation
page read and write
1FD8FBFC000
trusted library allocation
page read and write
1FD910E5000
trusted library allocation
page read and write
1FD97AE9000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD92EA7000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD8F963000
trusted library allocation
page read and write
1FD97AF5000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD90FE7000
trusted library allocation
page read and write
1FD9056C000
trusted library allocation
page read and write
1FD8F670000
trusted library allocation
page read and write
1FD8FB52000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD91638000
trusted library allocation
page read and write
1FD91EE1000
trusted library allocation
page read and write
2E392BE000
stack
page read and write
1FD908A6000
trusted library allocation
page read and write
2243D1BB000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD99CF1000
trusted library allocation
page read and write
1FD8EFF5000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD8EF8E000
heap
page read and write
1FD8EB84000
trusted library allocation
page read and write
1FD9AC94000
trusted library allocation
page read and write
1FD99D07000
trusted library allocation
page read and write
1FD8EF9B000
heap
page read and write
1FD8F952000
trusted library allocation
page read and write
1DD4ABB0000
heap
page read and write
1FDFFEBB000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FD90C69000
trusted library allocation
page read and write
1FD97AD3000
trusted library allocation
page read and write
1FD97AF7000
trusted library allocation
page read and write
1FD8F3F0000
trusted library allocation
page read and write
1FD97BC4000
trusted library allocation
page read and write
1FD90FE9000
trusted library allocation
page read and write
1FD91653000
trusted library allocation
page read and write
1A859312000
trusted library allocation
page read and write
1FD9043F000
trusted library allocation
page read and write
1FD90EDA000
trusted library allocation
page read and write
1FD91620000
trusted library allocation
page read and write
1FD99105000
trusted library allocation
page read and write
1FD97A97000
trusted library allocation
page read and write
1FD97AB7000
trusted library allocation
page read and write
1FD97A1D000
trusted library allocation
page read and write
1FD8F9FC000
trusted library allocation
page read and write
1FD97AF5000
trusted library allocation
page read and write
1FD8F3CB000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEEE000
heap
page read and write
1FD920A5000
trusted library allocation
page read and write
1FD8D2D7000
trusted library allocation
page read and write
1FD913DF000
trusted library allocation
page read and write
1FD8FF3D000
trusted library allocation
page read and write
1FD904AE000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FDFFE99000
heap
page read and write
A5203AE000
stack
page read and write
1FDFFEED000
heap
page read and write
1FD92FE9000
trusted library allocation
page read and write
1711000
heap
page read and write
1FD8F3B6000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD90324000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
1FD8F56E000
trusted library allocation
page read and write
1A8590B0000
heap
page read and write
1FD91613000
trusted library allocation
page read and write
1FD97D10000
trusted library allocation
page read and write
1FD976FB000
trusted library allocation
page read and write
1FD97D96000
trusted library allocation
page read and write
1FD97D39000
trusted library allocation
page read and write
1FD92043000
trusted library allocation
page read and write
1FD96FE9000
trusted library allocation
page read and write
1FD90E94000
trusted library allocation
page read and write
1FD90C77000
trusted library allocation
page read and write
1FD97A87000
trusted library allocation
page read and write
1FD91363000
trusted library allocation
page read and write
1FD97AD1000
trusted library allocation
page read and write
1FD911D0000
trusted library allocation
page read and write
1FD8F956000
trusted library allocation
page read and write
1FDFFF07000
heap
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1FD91170000
trusted library allocation
page read and write
1FDFFF0A000
heap
page read and write
1FD91330000
trusted library allocation
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD976A6000
trusted library allocation
page read and write
1FD976E4000
trusted library allocation
page read and write
1FDFFEF0000
heap
page read and write
9DE8DFC000
stack
page read and write
1FD916C9000
trusted library allocation
page read and write
1FD97685000
trusted library allocation
page read and write
1FD976C8000
trusted library allocation
page read and write
1FD977EA000
trusted library allocation
page read and write
1A85A12F000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FDFFED9000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FDFF5E4000
trusted library allocation
page read and write
1FD92FE9000
trusted library allocation
page read and write
1FD8FBD7000
trusted library allocation
page read and write
1FD8F007000
heap
page read and write
1FD8F6BF000
trusted library allocation
page read and write
1FD903A3000
trusted library allocation
page read and write
1FD9768E000
trusted library allocation
page read and write
1FD8F39E000
trusted library allocation
page read and write
1A85A0A9000
heap
page read and write
1FD8D274000
trusted library allocation
page read and write
1FD8B480000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD97AA2000
trusted library allocation
page read and write
1FD8F6C2000
trusted library allocation
page read and write
1FD97D39000
trusted library allocation
page read and write
1FD977C4000
trusted library allocation
page read and write
1FD91CDD000
trusted library allocation
page read and write
1FD994C5000
trusted library allocation
page read and write
1FD90F92000
trusted library allocation
page read and write
1A85A12F000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD991AC000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD90F9C000
trusted library allocation
page read and write
1FD99E33000
trusted library allocation
page read and write
1FD9109B000
trusted library allocation
page read and write
1FDFFF0A000
heap
page read and write
1FD8F262000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD976D6000
trusted library allocation
page read and write
1FD8F64F000
trusted library allocation
page read and write
1FD8C4AD000
trusted library allocation
page read and write
1FD92090000
trusted library allocation
page read and write
1FD8EB20000
trusted library allocation
page read and write
1A859400000
trusted library allocation
page read and write
1FD97AF9000
trusted library allocation
page read and write
1FD97BA1000
trusted library allocation
page read and write
1FD92F8E000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD97837000
trusted library allocation
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD90362000
trusted library allocation
page read and write
1FD99C84000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD9753C000
trusted library allocation
page read and write
1FD97AAB000
trusted library allocation
page read and write
1FD9911C000
trusted library allocation
page read and write
1FD90650000
trusted library allocation
page read and write
1FD8F949000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD91664000
trusted library allocation
page read and write
2000003F000
trusted library allocation
page read and write
1FD8FCEC000
trusted library allocation
page read and write
1FD9ACC2000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1A85A0A0000
heap
page read and write
1FD8F991000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FDFFF0A000
heap
page read and write
1FD97DAB000
trusted library allocation
page read and write
1FD920B7000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD91FFB000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8F379000
trusted library allocation
page read and write
1FD8EF6B000
heap
page read and write
1DD4ABA0000
unclassified section
page read and write
1FD90342000
trusted library allocation
page read and write
1FD8C4C8000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
3B60000
trusted library allocation
page read and write
1A85A0A3000
heap
page read and write
1FD8F3BE000
trusted library allocation
page read and write
2E371FE000
stack
page read and write
1FDFFED8000
heap
page read and write
1FD8EFF7000
heap
page read and write
1FD9086B000
trusted library allocation
page read and write
1A85A120000
heap
page read and write
1FD913D0000
trusted library allocation
page read and write
1FD8F5C4000
trusted library allocation
page read and write
1FD9AEA4000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD92090000
trusted library allocation
page read and write
2E34738000
stack
page read and write
1FD9132A000
trusted library allocation
page read and write
1FD8F369000
trusted library allocation
page read and write
1FD90684000
trusted library allocation
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD8F6C8000
trusted library allocation
page read and write
1FD910F0000
trusted library allocation
page read and write
1FD9768E000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD8EB75000
trusted library allocation
page read and write
1FD8F6BF000
trusted library allocation
page read and write
1FD97A89000
trusted library allocation
page read and write
1FD924FB000
trusted library allocation
page read and write
1FD90CDD000
trusted library allocation
page read and write
1FD905A4000
trusted library allocation
page read and write
1FD90587000
trusted library allocation
page read and write
1FD912E4000
trusted library allocation
page read and write
1FD905BD000
trusted library allocation
page read and write
1FD978F1000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD979F3000
trusted library allocation
page read and write
1FD90F96000
trusted library allocation
page read and write
1FD8F69A000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEEC000
heap
page read and write
1FD9130C000
trusted library allocation
page read and write
3A7527E000
stack
page read and write
1FD8F423000
trusted library allocation
page read and write
1A859A30000
heap
page read and write
1FD9AC2D000
trusted library allocation
page read and write
1FD905BD000
trusted library allocation
page read and write
1FD90FED000
trusted library allocation
page read and write
1FD8F9FC000
trusted library allocation
page read and write
1FD8F36F000
trusted library allocation
page read and write
1FD9ACBC000
trusted library allocation
page read and write
1FD91063000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD90FCF000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1DD4ABA2000
unclassified section
page read and write
1FD8ADF6000
trusted library allocation
page read and write
1FD9ACBC000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD97DD0000
trusted library allocation
page read and write
3A7627E000
stack
page read and write
1FD8FBFC000
trusted library allocation
page read and write
1FD8F6BD000
trusted library allocation
page read and write
1FD913DD000
trusted library allocation
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD90385000
trusted library allocation
page read and write
1FD97AFC000
trusted library allocation
page read and write
1FD90F4F000
trusted library allocation
page read and write
1FD92E27000
trusted library allocation
page read and write
1FD9753C000
trusted library allocation
page read and write
22CDCF90000
heap
page read and write
1FD90DA6000
trusted library allocation
page read and write
1FD90627000
trusted library allocation
page read and write
1FD8F9AD000
trusted library allocation
page read and write
1FD92FA8000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD9054B000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD908B7000
trusted library allocation
page read and write
1FD903C9000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD91D76000
trusted library allocation
page read and write
1FD9064B000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1DD4AF5F000
trusted library allocation
page read and write
1FD97A87000
trusted library allocation
page read and write
1FD97744000
trusted library allocation
page read and write
1A85A120000
heap
page read and write
1A85A12F000
heap
page read and write
1FDFFF07000
heap
page read and write
1FD9162B000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD8F5A7000
trusted library allocation
page read and write
1FD99467000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD99D50000
trusted library allocation
page read and write
1FD8F3CE000
trusted library allocation
page read and write
1FD9361C000
trusted library allocation
page read and write
1FD978F2000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD8EBB9000
trusted library allocation
page read and write
1FD97A91000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD920E0000
trusted library allocation
page read and write
1FD99DAC000
trusted library allocation
page read and write
1FD9147F000
trusted library allocation
page read and write
1FDFFEB2000
heap
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD920BE000
trusted library allocation
page read and write
1FD924C5000
trusted library allocation
page read and write
1FD978F0000
trusted library allocation
page read and write
1FD90DD4000
trusted library allocation
page read and write
1FD913F2000
trusted library allocation
page read and write
1FD8F003000
heap
page read and write
1FD8EF89000
heap
page read and write
1FDFFEFC000
heap
page read and write
1FD912BC000
trusted library allocation
page read and write
1FDFFEDF000
heap
page read and write
1FD916A6000
trusted library allocation
page read and write
1FD910B0000
trusted library allocation
page read and write
1FD90EE5000
trusted library allocation
page read and write
1FD916B0000
trusted library allocation
page read and write
1FD8EF77000
heap
page read and write
1FD976E4000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8F6DD000
trusted library allocation
page read and write
1FD92EA9000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD97876000
trusted library allocation
page read and write
1FD905A7000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD90E56000
trusted library allocation
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FD8F9A3000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD8F949000
trusted library allocation
page read and write
1FD8F3E6000
trusted library allocation
page read and write
4D2000
unkown
page readonly
1FD8F98B000
trusted library allocation
page read and write
1FD91313000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD915FD000
trusted library allocation
page read and write
1FD913BA000
trusted library allocation
page read and write
1A85A121000
heap
page read and write
1A85A09C000
heap
page read and write
1FD910DC000
trusted library allocation
page read and write
1FD8FB1D000
trusted library allocation
page read and write
1FD8FB38000
trusted library allocation
page read and write
1FD915B2000
trusted library allocation
page read and write
1FD9059F000
trusted library allocation
page read and write
2A30EB91E000
trusted library allocation
page read and write
1DD4AAB0000
remote allocation
page read and write
1FD97AA1000
trusted library allocation
page read and write
1FD8F260000
trusted library allocation
page read and write
1FD977C4000
trusted library allocation
page read and write
1FDFFEDF000
heap
page read and write
1FD8B482000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD90DC0000
trusted library allocation
page read and write
1FD93631000
trusted library allocation
page read and write
1FD97A93000
trusted library allocation
page read and write
1FD97A78000
trusted library allocation
page read and write
1FD920A5000
trusted library allocation
page read and write
1FDFFEAB000
heap
page read and write
1FD975BC000
trusted library allocation
page read and write
1FD97A6C000
trusted library allocation
page read and write
1FD8EBEE000
trusted library allocation
page read and write
1FD8EFF9000
heap
page read and write
1FD92461000
trusted library allocation
page read and write
1FD9786D000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD91C32000
trusted library allocation
page read and write
1FD90C91000
trusted library allocation
page read and write
1FD9048A000
trusted library allocation
page read and write
1FD905FA000
trusted library allocation
page read and write
1FD8FFFB000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD8F898000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD9145D000
trusted library allocation
page read and write
1FD97A91000
trusted library allocation
page read and write
1FD90F46000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FDFFED9000
heap
page read and write
1FD913C7000
trusted library allocation
page read and write
1FD913F2000
trusted library allocation
page read and write
1A4D471F000
unclassified section
page read and write
4070000
heap
page read and write
1FDFFEA5000
heap
page read and write
1A85A12F000
heap
page read and write
1FD91268000
trusted library allocation
page read and write
1FD9138A000
trusted library allocation
page read and write
1FD92FFA000
trusted library allocation
page read and write
1FD8B4FE000
trusted library allocation
page read and write
1FD978CE000
trusted library allocation
page read and write
1FD9756E000
trusted library allocation
page read and write
1FD90365000
trusted library allocation
page read and write
1A859420000
trusted library allocation
page read and write
1A4D4BF6000
heap
page read and write
1FD90365000
trusted library allocation
page read and write
1FD90E34000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD9A1F7000
trusted library allocation
page read and write
1FD97A62000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FDFFEE2000
heap
page read and write
1FD90571000
trusted library allocation
page read and write
1FD903E9000
trusted library allocation
page read and write
1FD9108E000
trusted library allocation
page read and write
1FD90EAF000
trusted library allocation
page read and write
1FD91CAA000
trusted library allocation
page read and write
1FD91D4F000
trusted library allocation
page read and write
1FDFFF10000
heap
page read and write
1FD916B9000
trusted library allocation
page read and write
1FD90E59000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD8F3F0000
trusted library allocation
page read and write
1FD913DD000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FD90385000
trusted library allocation
page read and write
9DE9DFF000
stack
page read and write
1FD915AD000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD97871000
trusted library allocation
page read and write
1FD90D3C000
trusted library allocation
page read and write
1FD9769C000
trusted library allocation
page read and write
1FD91113000
trusted library allocation
page read and write
1FD97A1F000
trusted library allocation
page read and write
1FD8B4B0000
trusted library allocation
page read and write
2243B907000
trusted library allocation
page read and write
1FD90EF4000
trusted library allocation
page read and write
4E4000
unkown
page readonly
1FD97AD5000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD90FFB000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1A85A0A0000
heap
page read and write
1FDFFF0A000
heap
page read and write
1FD90EA3000
trusted library allocation
page read and write
1FD910B9000
trusted library allocation
page read and write
1FD97D60000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD9768E000
trusted library allocation
page read and write
1FD90FAB000
trusted library allocation
page read and write
1FD90C37000
trusted library allocation
page read and write
1FD99D4D000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
2243B78D000
heap
page read and write
1FD8B4DB000
trusted library allocation
page read and write
1FD93626000
trusted library allocation
page read and write
1FD91FFC000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD99438000
trusted library allocation
page read and write
1FD913C7000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD90FD7000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD913BF000
trusted library allocation
page read and write
1FD9AEE7000
trusted library allocation
page read and write
1FD910DC000
trusted library allocation
page read and write
1FD9ACBC000
trusted library allocation
page read and write
1FD8EFF9000
heap
page read and write
1FD8FBE9000
trusted library allocation
page read and write
1FD912AC000
trusted library allocation
page read and write
1DD4AF5D000
trusted library allocation
page read and write
1FD9130A000
trusted library allocation
page read and write
1FD905A7000
trusted library allocation
page read and write
1FD912A0000
trusted library allocation
page read and write
1FD90375000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1A85A040000
heap
page read and write
1FDFFEEA000
heap
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD937CA000
heap
page read and write
1FD8F98D000
trusted library allocation
page read and write
1FD8F675000
trusted library allocation
page read and write
1FD904A0000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FDFFF04000
heap
page read and write
1FD931C8000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD913CB000
trusted library allocation
page read and write
1FD91D76000
trusted library allocation
page read and write
1A4D4A5B000
trusted library allocation
page read and write
1FD994E1000
trusted library allocation
page read and write
1FD97BB8000
trusted library allocation
page read and write
1FD912A5000
trusted library allocation
page read and write
1FD90438000
trusted library allocation
page read and write
1FD9AE7E000
trusted library allocation
page read and write
1FDFFEE9000
heap
page read and write
1FD90EAD000
trusted library allocation
page read and write
1FD90DA2000
trusted library allocation
page read and write
1FD9162F000
trusted library allocation
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FD90473000
trusted library allocation
page read and write
1FD97A85000
trusted library allocation
page read and write
1FD9043D000
trusted library allocation
page read and write
1FD914E1000
trusted library allocation
page read and write
1FD8EBD8000
trusted library allocation
page read and write
1FD8F694000
trusted library allocation
page read and write
1FD916FD000
trusted library allocation
page read and write
1A4D45C0000
unclassified section
page readonly
1FD8F673000
trusted library allocation
page read and write
1FD916BF000
trusted library allocation
page read and write
1FD976C4000
trusted library allocation
page read and write
1FD90C6B000
trusted library allocation
page read and write
1FD8F849000
trusted library allocation
page read and write
1FD9057D000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD910A9000
trusted library allocation
page read and write
1FD98D80000
trusted library allocation
page read and write
1FD8EBD3000
trusted library allocation
page read and write
1FD8EB80000
trusted library allocation
page read and write
1FD911ED000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FDFFEED000
heap
page read and write
1FDFFEF2000
heap
page read and write
1FD90364000
trusted library allocation
page read and write
1FD90FFE000
trusted library allocation
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FD8F688000
trusted library allocation
page read and write
1FD91B98000
trusted library allocation
page read and write
1FD8B3F6000
trusted library allocation
page read and write
1FD8EF9B000
heap
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD90C77000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD97BC4000
trusted library allocation
page read and write
1FD8FBC7000
trusted library allocation
page read and write
1FD99486000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
1FD9751C000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFE8E000
heap
page read and write
1A8593BF000
trusted library allocation
page read and write
1FD97AB7000
trusted library allocation
page read and write
1FD903A6000
trusted library allocation
page read and write
1FD910FC000
trusted library allocation
page read and write
1FD90FFE000
trusted library allocation
page read and write
1FD913C3000
trusted library allocation
page read and write
9DE8DFF000
stack
page read and write
1FD8F25D000
trusted library allocation
page read and write
1FD978E5000
trusted library allocation
page read and write
1FD90F2C000
trusted library allocation
page read and write
1FD913F0000
trusted library allocation
page read and write
1FDFFEF0000
heap
page read and write
1FD97BE5000
trusted library allocation
page read and write
1FD9AC87000
trusted library allocation
page read and write
1DD4AEB6000
heap
page read and write
1FD8F683000
trusted library allocation
page read and write
1FD937AD000
heap
page read and write
1FD9762F000
trusted library allocation
page read and write
1FD90FF9000
trusted library allocation
page read and write
1A4D4C20000
trusted library allocation
page read and write
1FD91399000
trusted library allocation
page read and write
1FD9772D000
trusted library allocation
page read and write
1FD8ADBF000
trusted library allocation
page read and write
1FD912E4000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD9033B000
trusted library allocation
page read and write
1FD8F6F0000
trusted library allocation
page read and write
1FD8EFF6000
heap
page read and write
1FD8EFF0000
heap
page read and write
1A85A16A000
heap
page read and write
1FD8D2B4000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FD903A8000
trusted library allocation
page read and write
1FD9AC9F000
trusted library allocation
page read and write
1FD914B2000
trusted library allocation
page read and write
1FD913FA000
trusted library allocation
page read and write
1FD8F9AE000
trusted library allocation
page read and write
1FD90CF9000
trusted library allocation
page read and write
1EDE000
stack
page read and write
1FDFFEB6000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD8EBAB000
trusted library allocation
page read and write
1FD91223000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD90F9E000
trusted library allocation
page read and write
1FD9AEBE000
trusted library allocation
page read and write
1A85A0E8000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD920B7000
trusted library allocation
page read and write
1FD9049A000
trusted library allocation
page read and write
1A859303000
trusted library allocation
page read and write
1A85A0BD000
heap
page read and write
1A859375000
trusted library allocation
page read and write
1FD9AC18000
trusted library allocation
page read and write
1FD994E7000
trusted library allocation
page read and write
1FD914C3000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FDFFE8F000
heap
page read and write
1FD976A7000
trusted library allocation
page read and write
1FD91330000
trusted library allocation
page read and write
1FD8EBD8000
trusted library allocation
page read and write
1FD91FE6000
trusted library allocation
page read and write
1FD92090000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD8EB91000
trusted library allocation
page read and write
1FD913C3000
trusted library allocation
page read and write
1FD90354000
trusted library allocation
page read and write
1FD976FB000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD91096000
trusted library allocation
page read and write
1FD913A2000
trusted library allocation
page read and write
1DD4ABDA000
heap
page read and write
1FD8B3FE000
trusted library allocation
page read and write
1FD90571000
trusted library allocation
page read and write
1FD92F8E000
trusted library allocation
page read and write
1FD97A0D000
trusted library allocation
page read and write
1FD8C4B2000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD99467000
trusted library allocation
page read and write
1FD915B2000
trusted library allocation
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FD8EF77000
heap
page read and write
1FD90385000
trusted library allocation
page read and write
1FD97BAF000
trusted library allocation
page read and write
1FD97535000
trusted library allocation
page read and write
FD0000
heap
page read and write
1FD8F000000
heap
page read and write
1FD8B3FB000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD8F8AF000
trusted library allocation
page read and write
1A85A184000
heap
page read and write
1FD8EF85000
heap
page read and write
1FD976C8000
trusted library allocation
page read and write
1FD9063D000
trusted library allocation
page read and write
1FD90C28000
trusted library allocation
page read and write
1FD920D5000
trusted library allocation
page read and write
1FD976C4000
trusted library allocation
page read and write
1FD91E6D000
trusted library allocation
page read and write
1FD906E6000
trusted library allocation
page read and write
2243B630000
heap
page read and write
1FD9203F000
trusted library allocation
page read and write
1FD96F2E000
trusted library allocation
page read and write
1FD918EC000
trusted library allocation
page read and write
1FD8EBB7000
trusted library allocation
page read and write
1FD97A78000
trusted library allocation
page read and write
1FD9098F000
trusted library allocation
page read and write
1FD9210C000
trusted library allocation
page read and write
1FD99467000
trusted library allocation
page read and write
1FD9949E000
trusted library allocation
page read and write
1FD90375000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD977A5000
trusted library allocation
page read and write
1FDFFF0E000
heap
page read and write
1FD8FB7A000
trusted library allocation
page read and write
1FD9114A000
trusted library allocation
page read and write
1FD976E8000
trusted library allocation
page read and write
1FD976C8000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD97635000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD920D5000
trusted library allocation
page read and write
1FD99E06000
trusted library allocation
page read and write
22CDCDB0000
heap
page read and write
1FD8D27D000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD978E8000
trusted library allocation
page read and write
1FD91664000
trusted library allocation
page read and write
1FD913DF000
trusted library allocation
page read and write
1FD9758A000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1FD8F28B000
trusted library allocation
page read and write
1FD90312000
trusted library allocation
page read and write
1A85A131000
heap
page read and write
1FD90A38000
trusted library allocation
page read and write
1FD97A8F000
trusted library allocation
page read and write
1FD913DD000
trusted library allocation
page read and write
A522DFE000
stack
page read and write
1FD904A8000
trusted library allocation
page read and write
1DD4AF78000
trusted library allocation
page read and write
1FD97699000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8F3A5000
trusted library allocation
page read and write
1FD905BD000
trusted library allocation
page read and write
1FD92039000
trusted library allocation
page read and write
1FD8F289000
trusted library allocation
page read and write
1FD910FE000
trusted library allocation
page read and write
1DD4AF73000
trusted library allocation
page read and write
1FDFFE96000
heap
page read and write
1FD91D99000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD97874000
trusted library allocation
page read and write
1FD97AEF000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD9769A000
trusted library allocation
page read and write
1FD9947C000
trusted library allocation
page read and write
1FD8F37F000
trusted library allocation
page read and write
9F119FE000
stack
page read and write
1FD91374000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD91322000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FDFFE9B000
heap
page read and write
1FD97CB2000
trusted library allocation
page read and write
1FD97AE9000
trusted library allocation
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD96F1B000
trusted library allocation
page read and write
1FD8D291000
trusted library allocation
page read and write
1FD905B5000
trusted library allocation
page read and write
1FD906C1000
trusted library allocation
page read and write
1FD8F260000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD9AAED000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1FD8F260000
trusted library allocation
page read and write
1FD8F9B6000
trusted library allocation
page read and write
1FD97C5F000
trusted library allocation
page read and write
1FD90F46000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FD9AC61000
trusted library allocation
page read and write
171F000
heap
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FD8F3E6000
trusted library allocation
page read and write
1A4D4710000
unclassified section
page read and write
1FDFFEAF000
heap
page read and write
1FD97AD5000
trusted library allocation
page read and write
1FD97586000
trusted library allocation
page read and write
1FD8F39C000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD97D4A000
trusted library allocation
page read and write
1DD4ABD0000
heap
page read and write
1FD8F93B000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEA5000
heap
page read and write
1FD8F816000
trusted library allocation
page read and write
1FD97C53000
trusted library allocation
page read and write
1FD916AA000
trusted library allocation
page read and write
1FDFFEEA000
heap
page read and write
1FD91393000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD90C7D000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD93796000
heap
page read and write
1A4D4BF4000
heap
page read and write
1FD976C4000
trusted library allocation
page read and write
1FDFFEE5000
heap
page read and write
1FD8F6D8000
trusted library allocation
page read and write
1FD9129A000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD9043F000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FDFFEEC000
heap
page read and write
1FD97A83000
trusted library allocation
page read and write
1FD9759B000
trusted library allocation
page read and write
1FD93841000
heap
page read and write
1FDFFEB2000
heap
page read and write
1FD911F8000
trusted library allocation
page read and write
171F000
heap
page read and write
1FD910B9000
trusted library allocation
page read and write
1FD905AB000
trusted library allocation
page read and write
1FD8F3C7000
trusted library allocation
page read and write
1FD8F5B1000
trusted library allocation
page read and write
1FD97537000
trusted library allocation
page read and write
1FD91C6D000
trusted library allocation
page read and write
1A859170000
heap
page read and write
1FD910F7000
trusted library allocation
page read and write
1FD90F25000
trusted library allocation
page read and write
1FD9760D000
trusted library allocation
page read and write
3A726EE000
unkown
page readonly
1FDFFEED000
heap
page read and write
1FD91450000
trusted library allocation
page read and write
1FD978D7000
trusted library allocation
page read and write
1FD9122F000
trusted library allocation
page read and write
1A85A184000
heap
page read and write
22CDD10A000
trusted library allocation
page read and write
1FD8F286000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD9035C000
trusted library allocation
page read and write
1FD8F5C4000
trusted library allocation
page read and write
1FD8F3AE000
trusted library allocation
page read and write
1FD8FC3C000
trusted library allocation
page read and write
1FD92086000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD976FB000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD92FFA000
trusted library allocation
page read and write
1FD913E2000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD99438000
trusted library allocation
page read and write
1FD96FFE000
trusted library allocation
page read and write
2243B792000
heap
page read and write
1FDFFED9000
heap
page read and write
1FD91613000
trusted library allocation
page read and write
1A85A13D000
heap
page read and write
15BF000
stack
page read and write
1FD8F376000
trusted library allocation
page read and write
1FD92FAE000
trusted library allocation
page read and write
1FD8EFFE000
heap
page read and write
1DD4AA40000
unclassified section
page readonly
22CDCF9A000
heap
page read and write
1FD91330000
trusted library allocation
page read and write
1FD99479000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD97AD5000
trusted library allocation
page read and write
1FD8F3B8000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD97B00000
trusted library allocation
page read and write
1FD920BB000
trusted library allocation
page read and write
1FD97C44000
trusted library allocation
page read and write
1A85A0BD000
heap
page read and write
1A858F94000
remote allocation
page execute read
1FD91214000
trusted library allocation
page read and write
1FD976E2000
trusted library allocation
page read and write
1FD912A0000
trusted library allocation
page read and write
1FD8EBE9000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8EF86000
heap
page read and write
1FD90F88000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD9063D000
trusted library allocation
page read and write
1FD9ACCA000
trusted library allocation
page read and write
1FD924CD000
trusted library allocation
page read and write
1FD91229000
trusted library allocation
page read and write
1FD910A5000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD97861000
trusted library allocation
page read and write
1FD97AC7000
trusted library allocation
page read and write
2243D1B6000
heap
page read and write
2E382BE000
stack
page read and write
1FD8EF83000
heap
page read and write
1A4D45D0000
unclassified section
page readonly
1FDFFEB2000
heap
page read and write
1A85A1B7000
heap
page read and write
1FD90C36000
trusted library allocation
page read and write
1FD977A5000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FD8ADEF000
trusted library allocation
page read and write
1FD8AD81000
trusted library allocation
page read and write
22CDD100000
trusted library allocation
page read and write
1FD910FC000
trusted library allocation
page read and write
1FD91363000
trusted library allocation
page read and write
1FD97D57000
trusted library allocation
page read and write
1FD913E7000
trusted library allocation
page read and write
1A859C06000
trusted library allocation
page read and write
1FD91376000
trusted library allocation
page read and write
1FD91FEF000
trusted library allocation
page read and write
1FD92FB7000
trusted library allocation
page read and write
1FD903C9000
trusted library allocation
page read and write
1A4D4A03000
trusted library allocation
page read and write
1FD8EF77000
heap
page read and write
1FDFFEA5000
heap
page read and write
1FD979E3000
trusted library allocation
page read and write
1FD90C23000
trusted library allocation
page read and write
1FD91667000
trusted library allocation
page read and write
1FD92037000
trusted library allocation
page read and write
1FD9162D000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD97AA1000
trusted library allocation
page read and write
2243D370000
heap
page read and write
1FD911E1000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD8FFE7000
trusted library allocation
page read and write
1FD912BA000
trusted library allocation
page read and write
1FD90D38000
trusted library allocation
page read and write
1FD9332E000
trusted library allocation
page read and write
1FD97D4A000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD91268000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1DD4AAD0000
unclassified section
page readonly
1FDFFE95000
heap
page read and write
1FD93248000
trusted library allocation
page read and write
1FD97D96000
trusted library allocation
page read and write
1FD910FC000
trusted library allocation
page read and write
1FD9059C000
trusted library allocation
page read and write
1FD9AEB0000
trusted library allocation
page read and write
1FD91613000
trusted library allocation
page read and write
1FD8EBE7000
trusted library allocation
page read and write
1FD91298000
trusted library allocation
page read and write
1FD91647000
trusted library allocation
page read and write
1FD9ACC8000
trusted library allocation
page read and write
1FD91348000
trusted library allocation
page read and write
15CE000
stack
page read and write
1FD97DE2000
trusted library allocation
page read and write
1FD97D20000
trusted library allocation
page read and write
1FDFFE98000
heap
page read and write
1A859315000
trusted library allocation
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD8F852000
trusted library allocation
page read and write
1FD8F675000
trusted library allocation
page read and write
1FD916D0000
trusted library allocation
page read and write
1A859410000
unkown
page execute read
1FD910DA000
trusted library allocation
page read and write
1FD91657000
trusted library allocation
page read and write
1FD8C470000
trusted library allocation
page read and write
1FD90E09000
trusted library allocation
page read and write
1A85A1B9000
heap
page read and write
1FD9AEB0000
trusted library allocation
page read and write
1FD90C5B000
trusted library allocation
page read and write
1DD4AAF0000
heap
page read and write
1FD910EC000
trusted library allocation
page read and write
1FD903AE000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8FB12000
trusted library allocation
page read and write
1FD911E1000
trusted library allocation
page read and write
1FD8EFF1000
heap
page read and write
1FD90584000
trusted library allocation
page read and write
1FD90498000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD91D43000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD8F97C000
trusted library allocation
page read and write
1FD91330000
trusted library allocation
page read and write
1FD9769E000
trusted library allocation
page read and write
1FD915F4000
trusted library allocation
page read and write
1FD93357000
trusted library allocation
page read and write
1FD99438000
trusted library allocation
page read and write
1FD90C63000
trusted library allocation
page read and write
1FD8F21D000
trusted library allocation
page read and write
1FD937D1000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FD9769F000
trusted library allocation
page read and write
1DD4AF13000
trusted library allocation
page read and write
1FD8EF90000
heap
page read and write
1FDFFEFB000
heap
page read and write
F34000
heap
page read and write
1FD8FC63000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD93761000
heap
page read and write
1FDFFEE7000
heap
page read and write
1FD97AE1000
trusted library allocation
page read and write
1FD91311000
trusted library allocation
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1FD9132C000
trusted library allocation
page read and write
1FD8F884000
trusted library allocation
page read and write
1FD90FB2000
trusted library allocation
page read and write
1FD9162D000
trusted library allocation
page read and write
1FD8F939000
trusted library allocation
page read and write
1FD8EF73000
heap
page read and write
171F000
heap
page read and write
1FD905AD000
trusted library allocation
page read and write
1FD90482000
trusted library allocation
page read and write
1A4D4A10000
trusted library allocation
page read and write
1FD906E4000
trusted library allocation
page read and write
1FD932E4000
trusted library allocation
page read and write
1FD92FFA000
trusted library allocation
page read and write
1FD9AE9B000
trusted library allocation
page read and write
1FD9789A000
trusted library allocation
page read and write
1FD90460000
trusted library allocation
page read and write
1FD92FAE000
trusted library allocation
page read and write
1A85939F000
trusted library allocation
page read and write
1A85A0A0000
heap
page read and write
1FD8C4A3000
trusted library allocation
page read and write
1FD9163D000
trusted library allocation
page read and write
1FD91FEF000
trusted library allocation
page read and write
1FD97AF3000
trusted library allocation
page read and write
1FD97D4A000
trusted library allocation
page read and write
1FD9059F000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD8F6AE000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEEC000
heap
page read and write
1FD93761000
heap
page read and write
1FD9AC20000
trusted library allocation
page read and write
1A858F30000
unclassified section
page readonly
1FD8F3AE000
trusted library allocation
page read and write
1FD91379000
trusted library allocation
page read and write
1FD913E7000
trusted library allocation
page read and write
1FD97D85000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD8EFF9000
heap
page read and write
1FD93306000
trusted library allocation
page read and write
F40000
heap
page read and write
1FD97B62000
trusted library allocation
page read and write
1FD91825000
trusted library allocation
page read and write
1FD97BDA000
trusted library allocation
page read and write
1FD91FEB000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
1FDFFEAF000
heap
page read and write
1A4D4ABA000
trusted library allocation
page read and write
1FD8F369000
trusted library allocation
page read and write
1FD97697000
trusted library allocation
page read and write
ECA000
stack
page read and write
1FD90C45000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD91247000
trusted library allocation
page read and write
1A85A184000
heap
page read and write
1FDFFEE9000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD90460000
trusted library allocation
page read and write
1FD91BF6000
trusted library allocation
page read and write
1FD914E1000
trusted library allocation
page read and write
1FD9035C000
trusted library allocation
page read and write
1FD8EFF9000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FDFFE9E000
heap
page read and write
1FD910BB000
trusted library allocation
page read and write
1FD8EF8B000
heap
page read and write
1FDFFE8F000
heap
page read and write
1FD8F3CD000
trusted library allocation
page read and write
1FD91298000
trusted library allocation
page read and write
1A85A131000
heap
page read and write
1A85A129000
heap
page read and write
1FD8ADDF000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD97607000
trusted library allocation
page read and write
1A4D4730000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD99D67000
trusted library allocation
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD8F991000
trusted library allocation
page read and write
1FD97B5D000
trusted library allocation
page read and write
1FD920FA000
trusted library allocation
page read and write
1FD96F0A000
trusted library allocation
page read and write
1FD9ACC0000
trusted library allocation
page read and write
A5225FE000
unkown
page readonly
1FD910B0000
trusted library allocation
page read and write
1FD97DE2000
trusted library allocation
page read and write
1FD90FC8000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8F007000
heap
page read and write
1FD97AA1000
trusted library allocation
page read and write
1FD90F92000
trusted library allocation
page read and write
1FD90587000
trusted library allocation
page read and write
1FD90C4B000
trusted library allocation
page read and write
1FD92467000
trusted library allocation
page read and write
1FD8FB3A000
trusted library allocation
page read and write
1A4D4A96000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD912A0000
trusted library allocation
page read and write
1FD97693000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD90D15000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD8F5B0000
trusted library allocation
page read and write
1FD90DFD000
trusted library allocation
page read and write
1FD8F88B000
trusted library allocation
page read and write
1FD8F9D6000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1DD4AE00000
unclassified section
page readonly
1FD9AE65000
trusted library allocation
page read and write
1FD977C4000
trusted library allocation
page read and write
1FD97680000
trusted library allocation
page read and write
1A85A17B000
heap
page read and write
1FDFFF0E000
heap
page read and write
1FD91381000
trusted library allocation
page read and write
1FD8F3BE000
trusted library allocation
page read and write
1FD90767000
trusted library allocation
page read and write
1FD90350000
trusted library allocation
page read and write
1FD924FB000
trusted library allocation
page read and write
1FD8EFF5000
heap
page read and write
1FD975C1000
trusted library allocation
page read and write
1FD90575000
trusted library allocation
page read and write
1FD97868000
trusted library allocation
page read and write
1DD4AF11000
trusted library allocation
page read and write
1FD8F85C000
trusted library allocation
page read and write
1A4D4650000
unclassified section
page readonly
1FD977A9000
trusted library allocation
page read and write
1FD924D2000
trusted library allocation
page read and write
1A859200000
trusted library allocation
page read and write
1FD97ADF000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD8EBCF000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD8F005000
heap
page read and write
1FD90341000
trusted library allocation
page read and write
1FDFFF0A000
heap
page read and write
1FD9030F000
trusted library allocation
page read and write
1FD97DDD000
trusted library allocation
page read and write
1FD93301000
trusted library allocation
page read and write
1FD8FBB6000
trusted library allocation
page read and write
1FD975D3000
trusted library allocation
page read and write
4071000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD9138A000
trusted library allocation
page read and write
1FD91FF1000
trusted library allocation
page read and write
1A85A0A0000
heap
page read and write
1FD9138B000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1A859310000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD8FF96000
trusted library allocation
page read and write
1FD8F9A2000
trusted library allocation
page read and write
1FD90429000
trusted library allocation
page read and write
1FD90DA6000
trusted library allocation
page read and write
1A859C17000
trusted library allocation
page read and write
1FD912A7000
trusted library allocation
page read and write
1FD8C4A8000
trusted library allocation
page read and write
1FD976A4000
trusted library allocation
page read and write
1FD9A18A000
trusted library allocation
page read and write
1FDFFF0E000
heap
page read and write
1A85A13D000
heap
page read and write
1FD91C14000
trusted library allocation
page read and write
1FD903AE000
trusted library allocation
page read and write
1FD8F3A5000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD905B5000
trusted library allocation
page read and write
1FD9957C000
trusted library allocation
page read and write
1FD9ACBE000
trusted library allocation
page read and write
1FD8F963000
trusted library allocation
page read and write
1FD90C4B000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1A85A0A9000
heap
page read and write
1FD912AE000
trusted library allocation
page read and write
1FD976E8000
trusted library allocation
page read and write
1FD97A89000
trusted library allocation
page read and write
1FD913CE000
trusted library allocation
page read and write
1FD9036C000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD975BF000
trusted library allocation
page read and write
1A85A1AA000
heap
page read and write
3A7276E000
unkown
page readonly
1FD8F29C000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
2243B800000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FD924A1000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1A85A198000
heap
page read and write
1A859C00000
trusted library allocation
page read and write
2243B7A1000
heap
page read and write
1FD976A9000
trusted library allocation
page read and write
1FD90DF1000
trusted library allocation
page read and write
1FD98F00000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
348A3231000
trusted library allocation
page execute read
1DD4AF49000
trusted library allocation
page read and write
1FD97AF5000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FD8F978000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD9769E000
trusted library allocation
page read and write
1FD8F6F1000
trusted library allocation
page read and write
1FD8F996000
trusted library allocation
page read and write
A5202EE000
unkown
page readonly
1FDFFEDC000
heap
page read and write
1FD92F9F000
trusted library allocation
page read and write
1FD9743C000
trusted library allocation
page read and write
1FD99442000
trusted library allocation
page read and write
3A7272C000
stack
page read and write
1FD8F6D8000
trusted library allocation
page read and write
1FD90F72000
trusted library allocation
page read and write
1FD96F3E000
trusted library allocation
page read and write
1FD9ACC8000
trusted library allocation
page read and write
1FD8EFAB000
heap
page read and write
1FD8F993000
trusted library allocation
page read and write
1A4D4C32000
trusted library allocation
page read and write
1FD9109A000
trusted library allocation
page read and write
1FD975CF000
trusted library allocation
page read and write
1FD97BC4000
trusted library allocation
page read and write
1FD92054000
trusted library allocation
page read and write
1FD99E2E000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD90C84000
trusted library allocation
page read and write
1FD97CC2000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
1FD9118E000
trusted library allocation
page read and write
1FDFFF00000
heap
page read and write
1FDFFEEE000
heap
page read and write
1FD90652000
trusted library allocation
page read and write
1FD90338000
trusted library allocation
page read and write
410000
unkown
page readonly
1FDFFEE6000
heap
page read and write
1FD99442000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FDFFEB2000
heap
page read and write
1FD8EF9A000
heap
page read and write
1FD8F9BB000
trusted library allocation
page read and write
1DD4B000000
heap
page read and write
1FD91023000
trusted library allocation
page read and write
1FD8EF6B000
heap
page read and write
1A4D4D00000
heap
page read and write
171F000
heap
page read and write
1FD9AEE9000
trusted library allocation
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FDFFE9D000
heap
page read and write
1FD910A9000
trusted library allocation
page read and write
1FD8F863000
trusted library allocation
page read and write
1FD9134D000
trusted library allocation
page read and write
1FD913FA000
trusted library allocation
page read and write
1FDFFEAB000
heap
page read and write
1FD9A1F7000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD8EFF9000
heap
page read and write
1FD910DA000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD97526000
trusted library allocation
page read and write
1FDFFF00000
heap
page read and write
1FD9AE90000
trusted library allocation
page read and write
1FD90DE1000
trusted library allocation
page read and write
1FD8F9A3000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
A5203EE000
unkown
page readonly
1FD97A60000
trusted library allocation
page read and write
1FD916EE000
trusted library allocation
page read and write
1FD90460000
trusted library allocation
page read and write
1FD90F8D000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD8EFF0000
heap
page read and write
1FD978FE000
trusted library allocation
page read and write
1FD97DB2000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD8F266000
trusted library allocation
page read and write
1A4D4A2E000
trusted library allocation
page read and write
1FD8F6BD000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD9AC30000
trusted library allocation
page read and write
4DC000
unkown
page read and write
1FD924C5000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1DD4AF7B000
trusted library allocation
page read and write
1FD9ACFA000
trusted library allocation
page read and write
1FD8EB2E000
trusted library allocation
page read and write
1FD910E5000
trusted library allocation
page read and write
1FD99E2C000
trusted library allocation
page read and write
1FD920BB000
trusted library allocation
page read and write
1FD90385000
trusted library allocation
page read and write
1FD97D39000
trusted library allocation
page read and write
1FD92014000
trusted library allocation
page read and write
1FD8F61A000
trusted library allocation
page read and write
1FD905B5000
trusted library allocation
page read and write
1FD92F0E000
trusted library allocation
page read and write
1FD91D46000
trusted library allocation
page read and write
1FD8EFF3000
heap
page read and write
1FD97AB7000
trusted library allocation
page read and write
1FD913DA000
trusted library allocation
page read and write
1FD937F9000
heap
page read and write
1FD8F3C7000
trusted library allocation
page read and write
1FD8EBCF000
trusted library allocation
page read and write
1FD8EFEC000
heap
page read and write
1FD90560000
trusted library allocation
page read and write
1FD903A3000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD9053C000
trusted library allocation
page read and write
1FD8F945000
trusted library allocation
page read and write
1FD91379000
trusted library allocation
page read and write
1FD91298000
trusted library allocation
page read and write
1FD91258000
trusted library allocation
page read and write
1FD9755A000
trusted library allocation
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FDFFEE6000
heap
page read and write
1A858F20000
unclassified section
page readonly
1FD90347000
trusted library allocation
page read and write
1FD90D88000
trusted library allocation
page read and write
1FD92095000
trusted library allocation
page read and write
1FD9AE86000
trusted library allocation
page read and write
1FD9A1FC000
trusted library allocation
page read and write
1FD924F9000
trusted library allocation
page read and write
1FD9AE6E000
trusted library allocation
page read and write
1FDFFE96000
heap
page read and write
1FD9069B000
trusted library allocation
page read and write
1FD91373000
trusted library allocation
page read and write
1FD924A0000
trusted library allocation
page read and write
1FD90545000
trusted library allocation
page read and write
1FD90AA9000
trusted library allocation
page read and write
1FD97AAE000
trusted library allocation
page read and write
1A85A198000
heap
page read and write
1FD8F31D000
trusted library allocation
page read and write
1FD92467000
trusted library allocation
page read and write
1FD975AA000
trusted library allocation
page read and write
1FD92456000
trusted library allocation
page read and write
1FD91659000
trusted library allocation
page read and write
1FD903D4000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FD92E81000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD90F90000
trusted library allocation
page read and write
1FD93333000
trusted library allocation
page read and write
1FD97AE9000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD8EF8E000
heap
page read and write
1FD8F24C000
trusted library allocation
page read and write
1FD99475000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD8FF74000
trusted library allocation
page read and write
1DD4AF0C000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD8FBE9000
trusted library allocation
page read and write
1FD91352000
trusted library allocation
page read and write
1FD8C460000
trusted library allocation
page read and write
1FD976FB000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD924C5000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD9146D000
trusted library allocation
page read and write
1FD978F0000
trusted library allocation
page read and write
1FD91DE0000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FDFFEDE000
heap
page read and write
1A85A198000
heap
page read and write
1FD910A5000
trusted library allocation
page read and write
1FD8EFFE000
heap
page read and write
1FD9ACBE000
trusted library allocation
page read and write
1FD96F39000
trusted library allocation
page read and write
1FD8F3E9000
trusted library allocation
page read and write
1FD8F3C9000
trusted library allocation
page read and write
1FD97AE9000
trusted library allocation
page read and write
1FD912A2000
trusted library allocation
page read and write
1FD8C460000
trusted library allocation
page read and write
1FD97A8F000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD90633000
trusted library allocation
page read and write
1FD9A1E1000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1FD9ACC4000
trusted library allocation
page read and write
1FD9ACC6000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD90334000
trusted library allocation
page read and write
1A85A1B7000
heap
page read and write
1A85937A000
trusted library allocation
page read and write
1A85A120000
heap
page read and write
1FD91C44000
trusted library allocation
page read and write
1FD909BD000
trusted library allocation
page read and write
1FD8F333000
trusted library allocation
page read and write
1FD8F663000
trusted library allocation
page read and write
1FD9AC94000
trusted library allocation
page read and write
1A85A123000
heap
page read and write
1FDFFEE4000
heap
page read and write
1FD91FED000
trusted library allocation
page read and write
1FD916B0000
trusted library allocation
page read and write
1FD8B32F000
trusted library allocation
page read and write
1FD91063000
trusted library allocation
page read and write
1FD8C47D000
trusted library allocation
page read and write
1FD9042E000
trusted library allocation
page read and write
1FD97699000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
2E369FE000
unkown
page readonly
1FDFFEF6000
heap
page read and write
1FD97881000
trusted library allocation
page read and write
1FD8F9C3000
trusted library allocation
page read and write
1FD8FBD7000
trusted library allocation
page read and write
1FD9135D000
trusted library allocation
page read and write
1FD97612000
trusted library allocation
page read and write
9F109FA000
stack
page read and write
1FD8EBE9000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD91117000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD97B87000
trusted library allocation
page read and write
1FD91FEC000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD8EBFE000
trusted library allocation
page read and write
1FD97A8D000
trusted library allocation
page read and write
1FD8FFE5000
trusted library allocation
page read and write
1FD8FBFA000
trusted library allocation
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD905E6000
trusted library allocation
page read and write
1FD97779000
trusted library allocation
page read and write
1FD90F68000
trusted library allocation
page read and write
1FD90F51000
trusted library allocation
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD8EB89000
trusted library allocation
page read and write
1FD9AEA6000
trusted library allocation
page read and write
1FD91FF1000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD92095000
trusted library allocation
page read and write
1FD9326D000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD913DF000
trusted library allocation
page read and write
1FD916D4000
trusted library allocation
page read and write
1FD91027000
trusted library allocation
page read and write
1FD91466000
trusted library allocation
page read and write
1FD97AA8000
trusted library allocation
page read and write
1FD9362A000
trusted library allocation
page read and write
1FD90F6C000
trusted library allocation
page read and write
1FD9035E000
trusted library allocation
page read and write
1FD90A5D000
trusted library allocation
page read and write
1FD977A5000
trusted library allocation
page read and write
1FD8F3AE000
trusted library allocation
page read and write
1FD90FBB000
trusted library allocation
page read and write
1FD912AC000
trusted library allocation
page read and write
1A85A1AA000
heap
page read and write
1FD913BA000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FDFFE95000
heap
page read and write
1FD92039000
trusted library allocation
page read and write
1FD91ECB000
trusted library allocation
page read and write
1FD913E2000
trusted library allocation
page read and write
2243B770000
heap
page read and write
1FD8F93B000
trusted library allocation
page read and write
1FD9787C000
trusted library allocation
page read and write
1FD9206F000
trusted library allocation
page read and write
1FD92FFC000
trusted library allocation
page read and write
1A85A1AA000
heap
page read and write
1FD91259000
trusted library allocation
page read and write
1FD8D26C000
trusted library allocation
page read and write
1FD916C9000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1A85A128000
heap
page read and write
1FD8EB1A000
trusted library allocation
page read and write
1FD913EF000
trusted library allocation
page read and write
1FD8F9D5000
trusted library allocation
page read and write
1FD97724000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD97A8D000
trusted library allocation
page read and write
1FD912A9000
trusted library allocation
page read and write
1A8594C6000
heap
page read and write
1FD97AF9000
trusted library allocation
page read and write
1FD975FB000
trusted library allocation
page read and write
1FD97DD9000
trusted library allocation
page read and write
1FD978EA000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD97AAE000
trusted library allocation
page read and write
1FD90493000
trusted library allocation
page read and write
1FD91D93000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD96FCB000
trusted library allocation
page read and write
9F121FF000
stack
page read and write
1FDFFE8F000
heap
page read and write
1FD93FC3000
trusted library allocation
page read and write
1FD8FBE9000
trusted library allocation
page read and write
1FD97532000
trusted library allocation
page read and write
1FD8EF75000
heap
page read and write
1FDFFEC9000
heap
page read and write
1FD91399000
trusted library allocation
page read and write
1FD91309000
trusted library allocation
page read and write
1DD4AF76000
trusted library allocation
page read and write
1FD932C5000
trusted library allocation
page read and write
1FD8FB34000
trusted library allocation
page read and write
1FD90DCD000
trusted library allocation
page read and write
22CDCEF0000
heap
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD976D1000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD8F599000
trusted library allocation
page read and write
1FD97DBE000
trusted library allocation
page read and write
1FD9ACC4000
trusted library allocation
page read and write
1FD90D84000
trusted library allocation
page read and write
1FD903AE000
trusted library allocation
page read and write
1FD912B2000
trusted library allocation
page read and write
1FD8FBF8000
trusted library allocation
page read and write
1FD91313000
trusted library allocation
page read and write
1FD913BA000
trusted library allocation
page read and write
1FD9948D000
trusted library allocation
page read and write
1FD906C3000
trusted library allocation
page read and write
1FD92064000
trusted library allocation
page read and write
1FD91298000
trusted library allocation
page read and write
1FD9A1E0000
trusted library allocation
page read and write
1FD8FBFB000
trusted library allocation
page read and write
1FD8FC4E000
trusted library allocation
page read and write
1FD97AE1000
trusted library allocation
page read and write
1FD8EF86000
heap
page read and write
1FD97DF7000
trusted library allocation
page read and write
1FD91CF5000
trusted library allocation
page read and write
1FD910FC000
trusted library allocation
page read and write
1FD9AEA4000
trusted library allocation
page read and write
1FD97915000
trusted library allocation
page read and write
1FD9AC20000
trusted library allocation
page read and write
4E0000
unkown
page write copy
4071000
heap
page read and write
1FD8F3E6000
trusted library allocation
page read and write
1FD906FA000
trusted library allocation
page read and write
1FD99479000
trusted library allocation
page read and write
1FD90EA7000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD8EFAB000
heap
page read and write
1FD924F9000
trusted library allocation
page read and write
1FD97D4A000
trusted library allocation
page read and write
1FD90375000
trusted library allocation
page read and write
1FD97693000
trusted library allocation
page read and write
1FD92FF1000
trusted library allocation
page read and write
A52032D000
stack
page read and write
1FD8F633000
trusted library allocation
page read and write
1FD916C6000
trusted library allocation
page read and write
1FD91361000
trusted library allocation
page read and write
1FD8F694000
trusted library allocation
page read and write
1FD90C18000
trusted library allocation
page read and write
3A727AE000
stack
page read and write
1FD90493000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FDFFEED000
heap
page read and write
1A85A0AC000
heap
page read and write
1FD97AB5000
trusted library allocation
page read and write
1FD97DF7000
trusted library allocation
page read and write
1FD9115F000
trusted library allocation
page read and write
1FD8FF92000
trusted library allocation
page read and write
1FD96F7C000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD90C69000
trusted library allocation
page read and write
1FD9AC83000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD91319000
trusted library allocation
page read and write
1A85A1AA000
heap
page read and write
1A4D4A5D000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD9036C000
trusted library allocation
page read and write
1FD97AD3000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FDFFEA4000
heap
page read and write
1FD8F262000
trusted library allocation
page read and write
1FD9AE9E000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
348A31B1000
trusted library allocation
page execute read
1FD9767D000
trusted library allocation
page read and write
1FD8F3DE000
trusted library allocation
page read and write
1FD8F6C3000
trusted library allocation
page read and write
1FD91361000
trusted library allocation
page read and write
1FD8FBBA000
trusted library allocation
page read and write
1FD9786A000
trusted library allocation
page read and write
1FD903C9000
trusted library allocation
page read and write
1FD8B41E000
trusted library allocation
page read and write
1FD97A1D000
trusted library allocation
page read and write
1A4D4750000
unclassified section
page readonly
1FD9752E000
trusted library allocation
page read and write
1FD9AEF4000
trusted library allocation
page read and write
1FD97686000
trusted library allocation
page read and write
1DD4AF70000
trusted library allocation
page read and write
1FD8F87E000
trusted library allocation
page read and write
2243B90A000
trusted library allocation
page read and write
1FD9203B000
trusted library allocation
page read and write
1FD97B9A000
trusted library allocation
page read and write
1FD8EFAB000
heap
page read and write
1FD975CF000
trusted library allocation
page read and write
1FD91163000
trusted library allocation
page read and write
1DD4AB30000
heap
page read and write
1FD90AA4000
trusted library allocation
page read and write
1FD90C1C000
trusted library allocation
page read and write
1FD97620000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD8F39C000
trusted library allocation
page read and write
1FD9243D000
trusted library allocation
page read and write
1FD91DC2000
trusted library allocation
page read and write
1FD92ECA000
trusted library allocation
page read and write
1FD903F8000
trusted library allocation
page read and write
1FD9135D000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD913BA000
trusted library allocation
page read and write
1FD9109B000
trusted library allocation
page read and write
1FDFFEB7000
heap
page read and write
1FD8F3A0000
trusted library allocation
page read and write
1FD910FE000
trusted library allocation
page read and write
1FD8C371000
trusted library allocation
page read and write
1FD90E56000
trusted library allocation
page read and write
1FD910E5000
trusted library allocation
page read and write
1FD994C0000
trusted library allocation
page read and write
1DD4AFC3000
trusted library allocation
page read and write
1FD916CE000
trusted library allocation
page read and write
1FD91BCB000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD8EFEA000
heap
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD97B66000
trusted library allocation
page read and write
1FD90C31000
trusted library allocation
page read and write
1FD97A93000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD9785E000
trusted library allocation
page read and write
1FD92EA4000
trusted library allocation
page read and write
1FD97AA1000
trusted library allocation
page read and write
1FD91613000
trusted library allocation
page read and write
1FD913BF000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD90FFE000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD916EA000
trusted library allocation
page read and write
1FD91663000
trusted library allocation
page read and write
1DD4AF8E000
trusted library allocation
page read and write
1FD91479000
trusted library allocation
page read and write
1FD976D6000
trusted library allocation
page read and write
1FD8EFA5000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FD9AAD8000
trusted library allocation
page read and write
1FD97C18000
trusted library allocation
page read and write
1FD8FFDF000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1DD4AB50000
heap
page read and write
1FD8F669000
trusted library allocation
page read and write
F34000
heap
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD8F95B000
trusted library allocation
page read and write
1FD910E5000
trusted library allocation
page read and write
1FD97507000
trusted library allocation
page read and write
1FD97BA1000
trusted library allocation
page read and write
1FD91D8A000
trusted library allocation
page read and write
1FD90C6F000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD90C6B000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD90D81000
trusted library allocation
page read and write
1FD8B4AD000
trusted library allocation
page read and write
1FD903A3000
trusted library allocation
page read and write
1FD90F9C000
trusted library allocation
page read and write
1FD97CB2000
trusted library allocation
page read and write
1FD9AEFC000
trusted library allocation
page read and write
1FD9771F000
trusted library allocation
page read and write
1FD94102000
trusted library allocation
page read and write
1FD9ACEC000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD90DE1000
trusted library allocation
page read and write
1FD905B3000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD979EE000
trusted library allocation
page read and write
1FD97DDD000
trusted library allocation
page read and write
1FD91BC0000
trusted library allocation
page read and write
1DD4AFDA000
trusted library allocation
page read and write
1FD97677000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD910B4000
trusted library allocation
page read and write
1FD97625000
trusted library allocation
page read and write
1FD8FFF9000
trusted library allocation
page read and write
1A85A0A9000
heap
page read and write
1FD908DC000
trusted library allocation
page read and write
1FD9109B000
trusted library allocation
page read and write
1FD8FF51000
trusted library allocation
page read and write
1FD8EF9A000
heap
page read and write
1FD976E0000
trusted library allocation
page read and write
1FD90CB3000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8B466000
trusted library allocation
page read and write
1FD8F56B000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD90A2A000
trusted library allocation
page read and write
1FD913CB000
trusted library allocation
page read and write
1A4D4C00000
trusted library allocation
page read and write
1FD8EBEE000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD975A6000
trusted library allocation
page read and write
1FD975D3000
trusted library allocation
page read and write
1FD8FBE3000
trusted library allocation
page read and write
1FDFFEF0000
heap
page read and write
1FD915F4000
trusted library allocation
page read and write
1FD9AACE000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD92FFA000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FD8F95B000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD97CC2000
trusted library allocation
page read and write
1FD8F3DE000
trusted library allocation
page read and write
1FD8F007000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD8B426000
trusted library allocation
page read and write
1FD8C4A8000
trusted library allocation
page read and write
1FD8FB63000
trusted library allocation
page read and write
1FD8F3DE000
trusted library allocation
page read and write
1FD8FFED000
trusted library allocation
page read and write
1FD917FA000
trusted library allocation
page read and write
1FD8EF83000
heap
page read and write
1FD8EF8B000
heap
page read and write
1FDFFE95000
heap
page read and write
1FD93626000
trusted library allocation
page read and write
1FD92F85000
trusted library allocation
page read and write
1FD97A62000
trusted library allocation
page read and write
1FD904A0000
trusted library allocation
page read and write
1FD914E5000
trusted library allocation
page read and write
1FD8EFF6000
heap
page read and write
1FD9110C000
trusted library allocation
page read and write
1FD90FC3000
trusted library allocation
page read and write
1FD9AC44000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD90C5C000
trusted library allocation
page read and write
1FD8F281000
trusted library allocation
page read and write
1FD97C3D000
trusted library allocation
page read and write
1DD4B20C000
trusted library allocation
page read and write
1FD8F3F1000
trusted library allocation
page read and write
1FD910FC000
trusted library allocation
page read and write
1FD977C4000
trusted library allocation
page read and write
1FD8EF9B000
heap
page read and write
1FD8F373000
trusted library allocation
page read and write
1FD978AF000
trusted library allocation
page read and write
1FD8F6A9000
trusted library allocation
page read and write
1FD97915000
trusted library allocation
page read and write
1FD8EFF1000
heap
page read and write
1FD9751C000
trusted library allocation
page read and write
1FD910A9000
trusted library allocation
page read and write
1FD97610000
trusted library allocation
page read and write
1FD9AC9F000
trusted library allocation
page read and write
1FD913BF000
trusted library allocation
page read and write
1A4D4A67000
trusted library allocation
page read and write
4DC000
unkown
page write copy
1FD92F59000
trusted library allocation
page read and write
1FD8B493000
trusted library allocation
page read and write
1FDFF5DE000
trusted library allocation
page read and write
1FD8EFF4000
heap
page read and write
1FD9111E000
trusted library allocation
page read and write
1FD90FE7000
trusted library allocation
page read and write
1FD8F95B000
trusted library allocation
page read and write
1FD90C6D000
trusted library allocation
page read and write
1FD911FC000
trusted library allocation
page read and write
1FD976DC000
trusted library allocation
page read and write
1FD91369000
trusted library allocation
page read and write
1FD97A19000
trusted library allocation
page read and write
1FD91127000
trusted library allocation
page read and write
1FD8F966000
trusted library allocation
page read and write
1FD8F8D2000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD8F36F000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD90C45000
trusted library allocation
page read and write
1FD90A9D000
trusted library allocation
page read and write
1FD8F5E7000
trusted library allocation
page read and write
1FD97A60000
trusted library allocation
page read and write
1FD97AD1000
trusted library allocation
page read and write
1FD97589000
trusted library allocation
page read and write
1FD91241000
trusted library allocation
page read and write
1FD910DA000
trusted library allocation
page read and write
2E3467D000
stack
page read and write
1FD97DB2000
trusted library allocation
page read and write
1FD9132C000
trusted library allocation
page read and write
1FD9135D000
trusted library allocation
page read and write
1FD90368000
trusted library allocation
page read and write
1FD978D3000
trusted library allocation
page read and write
1FD97DD9000
trusted library allocation
page read and write
1FD90E06000
trusted library allocation
page read and write
1FD9207F000
trusted library allocation
page read and write
1FD91FE9000
trusted library allocation
page read and write
1FD9AC44000
trusted library allocation
page read and write
1FD8F390000
trusted library allocation
page read and write
1FD9AE76000
trusted library allocation
page read and write
1FD97A93000
trusted library allocation
page read and write
1FD9124E000
trusted library allocation
page read and write
1FD97D26000
trusted library allocation
page read and write
1FDFFEC9000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FDFFE9A000
heap
page read and write
1FD90633000
trusted library allocation
page read and write
1FD975D8000
trusted library allocation
page read and write
1FD8FCBE000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD924CD000
trusted library allocation
page read and write
1FD97D26000
trusted library allocation
page read and write
1FD9780F000
trusted library allocation
page read and write
1DD4B107000
trusted library allocation
page read and write
1FD93786000
heap
page read and write
1FDFFEAF000
heap
page read and write
1FDFFEDF000
heap
page read and write
1FD91667000
trusted library allocation
page read and write
1FD924D2000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
2E39ABE000
unkown
page readonly
1FD90AAB000
trusted library allocation
page read and write
1FD90640000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
1FD8FFE1000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD90C96000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD9248E000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD91158000
trusted library allocation
page read and write
1FD920AF000
trusted library allocation
page read and write
1FD9164D000
trusted library allocation
page read and write
1FD8F843000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD976C8000
trusted library allocation
page read and write
2E347FE000
stack
page read and write
1FD8C3CA000
trusted library allocation
page read and write
1FD904F4000
trusted library allocation
page read and write
1FD90FB0000
trusted library allocation
page read and write
1FD90F7F000
trusted library allocation
page read and write
1FD9208C000
trusted library allocation
page read and write
1FDFF5EC000
trusted library allocation
page read and write
1FD8B493000
trusted library allocation
page read and write
1FD97731000
trusted library allocation
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD8AD90000
trusted library allocation
page read and write
1FD916C9000
trusted library allocation
page read and write
1FD9042D000
trusted library allocation
page read and write
1FD9206F000
trusted library allocation
page read and write
1A85A0F9000
heap
page read and write
1FD9055A000
trusted library allocation
page read and write
1FD97A2F000
trusted library allocation
page read and write
1FD91113000
trusted library allocation
page read and write
1FD8F987000
trusted library allocation
page read and write
1FD8F371000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD8EF6C000
heap
page read and write
170C000
heap
page read and write
1FDFFEE5000
heap
page read and write
1FD90DBC000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD97DF7000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD91247000
trusted library allocation
page read and write
1DD4AF17000
trusted library allocation
page read and write
1FD8F94D000
trusted library allocation
page read and write
1A4D4AE7000
trusted library allocation
page read and write
1FD912BC000
trusted library allocation
page read and write
15DB000
stack
page read and write
1FD913E7000
trusted library allocation
page read and write
1A4D4C39000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FDFFE95000
heap
page read and write
1FD91C89000
trusted library allocation
page read and write
1FD97DD0000
trusted library allocation
page read and write
1FD8FBD7000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD97586000
trusted library allocation
page read and write
1FD8EB4A000
trusted library allocation
page read and write
1FD9AC80000
trusted library allocation
page read and write
1FD92041000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD90C7B000
trusted library allocation
page read and write
1FD913C7000
trusted library allocation
page read and write
1FD994C0000
trusted library allocation
page read and write
1FD905E9000
trusted library allocation
page read and write
1FD978AF000
trusted library allocation
page read and write
1FD916B9000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD903AE000
trusted library allocation
page read and write
1FD904A5000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1DD4AFFD000
trusted library allocation
page read and write
1FDFFF00000
heap
page read and write
1FD9752A000
trusted library allocation
page read and write
1FDFFED9000
heap
page read and write
1FD90E07000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD8F66F000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD9A1C7000
trusted library allocation
page read and write
1A4D4AB7000
trusted library allocation
page read and write
1A85A1B7000
heap
page read and write
1FD91657000
trusted library allocation
page read and write
1FD8EBF1000
trusted library allocation
page read and write
1FD904A5000
trusted library allocation
page read and write
1FD912BB000
trusted library allocation
page read and write
1A85917A000
heap
page read and write
1FD911EF000
trusted library allocation
page read and write
1FD8B413000
trusted library allocation
page read and write
1FD90F8A000
trusted library allocation
page read and write
1FD8FF46000
trusted library allocation
page read and write
1FD96F0F000
trusted library allocation
page read and write
1FD8F939000
trusted library allocation
page read and write
1FD931A2000
trusted library allocation
page read and write
1FD8B419000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD906C6000
trusted library allocation
page read and write
1FD924D6000
trusted library allocation
page read and write
1FD90385000
trusted library allocation
page read and write
1FD912AC000
trusted library allocation
page read and write
2243B79A000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD911FE000
trusted library allocation
page read and write
1FD937A5000
heap
page read and write
1FDFFEE2000
heap
page read and write
1706000
heap
page read and write
1FD914BA000
trusted library allocation
page read and write
1DD4B200000
trusted library allocation
page read and write
1FD91350000
trusted library allocation
page read and write
1A85A131000
heap
page read and write
1FD91DC9000
trusted library allocation
page read and write
1FD96FEE000
trusted library allocation
page read and write
1FDFFEB8000
heap
page read and write
1FD90E0A000
trusted library allocation
page read and write
1FD8C4E2000
trusted library allocation
page read and write
1FD99475000
trusted library allocation
page read and write
1FD97CC2000
trusted library allocation
page read and write
1FD92F95000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD8F682000
trusted library allocation
page read and write
1FD97913000
trusted library allocation
page read and write
1FD97DA8000
trusted library allocation
page read and write
1FD903A6000
trusted library allocation
page read and write
3C34000
heap
page read and write
1DD4AA50000
unclassified section
page readonly
1FD90FB6000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD91318000
trusted library allocation
page read and write
1FD91653000
trusted library allocation
page read and write
1FD903E9000
trusted library allocation
page read and write
1FD92053000
trusted library allocation
page read and write
1FD92100000
trusted library allocation
page read and write
1FD913F2000
trusted library allocation
page read and write
1FDFFEBB000
heap
page read and write
1FD97DDD000
trusted library allocation
page read and write
1FD8FFA1000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1A85932F000
trusted library allocation
page read and write
1FD9AE9E000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD977A9000
trusted library allocation
page read and write
1FD92095000
trusted library allocation
page read and write
1FD977B1000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD8F6B4000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1DD4AD00000
trusted library allocation
page read and write
2E37A7E000
stack
page read and write
1FD8C4D5000
trusted library allocation
page read and write
1FD97B8B000
trusted library allocation
page read and write
1FD9208C000
trusted library allocation
page read and write
1A85A09F000
heap
page read and write
1FD91682000
trusted library allocation
page read and write
1FD910DE000
trusted library allocation
page read and write
22CDCEC0000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD97AF9000
trusted library allocation
page read and write
1FD8F686000
trusted library allocation
page read and write
1FD905EB000
trusted library allocation
page read and write
1FD903B4000
trusted library allocation
page read and write
1A8593C2000
trusted library allocation
page read and write
1A85A13D000
heap
page read and write
1FD937DC000
heap
page read and write
1FD9AC94000
trusted library allocation
page read and write
1FD90D4B000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD8FCE6000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD9207F000
trusted library allocation
page read and write
1FD8EBE0000
trusted library allocation
page read and write
1FD90C26000
trusted library allocation
page read and write
1FD913E0000
trusted library allocation
page read and write
1FD975C1000
trusted library allocation
page read and write
1FD90CAC000
trusted library allocation
page read and write
1FD93816000
heap
page read and write
1FDFFEDC000
heap
page read and write
1FD90871000
trusted library allocation
page read and write
1FD91D65000
trusted library allocation
page read and write
1FD978C5000
trusted library allocation
page read and write
1FD8B475000
trusted library allocation
page read and write
1FD97535000
trusted library allocation
page read and write
1FD8EB26000
trusted library allocation
page read and write
1FD8C47D000
trusted library allocation
page read and write
1A4D4670000
heap
page read and write
1FD97DDD000
trusted library allocation
page read and write
1FD903C0000
trusted library allocation
page read and write
1FD91D8F000
trusted library allocation
page read and write
1FD9065A000
trusted library allocation
page read and write
1A859361000
trusted library allocation
page read and write
1FD90364000
trusted library allocation
page read and write
1FD9324D000
trusted library allocation
page read and write
1FD99E01000
trusted library allocation
page read and write
1FDFFEF2000
heap
page read and write
1FDFFF00000
heap
page read and write
1FD924F9000
trusted library allocation
page read and write
1FD97AD3000
trusted library allocation
page read and write
1FD90A57000
trusted library allocation
page read and write
24A0000
heap
page read and write
1FD90396000
trusted library allocation
page read and write
1FD9066E000
trusted library allocation
page read and write
1FD8FBD7000
trusted library allocation
page read and write
1DD4AB90000
heap
page readonly
1FD90CBC000
trusted library allocation
page read and write
1FD91319000
trusted library allocation
page read and write
1FD8F5FC000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD99D48000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FD91242000
trusted library allocation
page read and write
1FD9164E000
trusted library allocation
page read and write
1FD97636000
trusted library allocation
page read and write
1FD8F949000
trusted library allocation
page read and write
1FD8B426000
trusted library allocation
page read and write
15FE000
stack
page read and write
1FD915B5000
trusted library allocation
page read and write
1FD9134D000
trusted library allocation
page read and write
1A4D4A79000
trusted library allocation
page read and write
1FD91DBB000
trusted library allocation
page read and write
1FD8F6BF000
trusted library allocation
page read and write
1FD8C4F2000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD90E2B000
trusted library allocation
page read and write
1FD8F987000
trusted library allocation
page read and write
1FD90C74000
trusted library allocation
page read and write
1FDFFEE0000
heap
page read and write
1FD9203D000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD9203D000
trusted library allocation
page read and write
1FDFF5F0000
trusted library allocation
page read and write
1FD905B3000
trusted library allocation
page read and write
1A4D4A23000
trusted library allocation
page read and write
1FDFFF0E000
heap
page read and write
1FD97858000
trusted library allocation
page read and write
1FD913D0000
trusted library allocation
page read and write
1FD8F9BE000
trusted library allocation
page read and write
1A85A0AC000
heap
page read and write
1A85A0A9000
heap
page read and write
1FD97AFC000
trusted library allocation
page read and write
1FD913E7000
trusted library allocation
page read and write
1FD97A60000
trusted library allocation
page read and write
1FD976CA000
trusted library allocation
page read and write
1FD936B7000
trusted library allocation
page read and write
1FD913BF000
trusted library allocation
page read and write
1FD978F8000
trusted library allocation
page read and write
1A85A198000
heap
page read and write
1FD9769C000
trusted library allocation
page read and write
1FD97AB5000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD97BBF000
trusted library allocation
page read and write
1FD8F9C3000
trusted library allocation
page read and write
1FD905B3000
trusted library allocation
page read and write
1FD93243000
trusted library allocation
page read and write
1FD9134D000
trusted library allocation
page read and write
1FD91374000
trusted library allocation
page read and write
1FD8F890000
trusted library allocation
page read and write
1FD91709000
trusted library allocation
page read and write
1FD91FD9000
trusted library allocation
page read and write
1FD90FCD000
trusted library allocation
page read and write
1FD9769C000
trusted library allocation
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FD90C8B000
trusted library allocation
page read and write
1FD91FF3000
trusted library allocation
page read and write
1A85A0A4000
heap
page read and write
1FDFFEA8000
heap
page read and write
1FDFFEDF000
heap
page read and write
1FD97BA1000
trusted library allocation
page read and write
1FD8EFF0000
heap
page read and write
1FD977D1000
trusted library allocation
page read and write
1FD91063000
trusted library allocation
page read and write
1FD8F8C4000
trusted library allocation
page read and write
1FDFFEC4000
heap
page read and write
1FD90581000
trusted library allocation
page read and write
1FD8F673000
trusted library allocation
page read and write
1FD8FBFE000
trusted library allocation
page read and write
1FD8EF77000
heap
page read and write
1FD8F3E9000
trusted library allocation
page read and write
1FD915B9000
trusted library allocation
page read and write
1FD918BC000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD99496000
trusted library allocation
page read and write
1FD90C34000
trusted library allocation
page read and write
1FD90A41000
trusted library allocation
page read and write
1A8590D0000
heap
page read and write
1FD8EF8E000
heap
page read and write
1FD91B7C000
trusted library allocation
page read and write
1FD97865000
trusted library allocation
page read and write
1FD96F30000
trusted library allocation
page read and write
1FDFFF07000
heap
page read and write
1A859378000
trusted library allocation
page read and write
1FD91EBF000
trusted library allocation
page read and write
1FDFFEF6000
heap
page read and write
1FD97B63000
trusted library allocation
page read and write
1FD90619000
trusted library allocation
page read and write
1FD8F42C000
trusted library allocation
page read and write
1FD8FBE3000
trusted library allocation
page read and write
1FD978D7000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1A85A09C000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD90C74000
trusted library allocation
page read and write
1FD910FE000
trusted library allocation
page read and write
1FD9248E000
trusted library allocation
page read and write
1FD90C6F000
trusted library allocation
page read and write
1FD90FF7000
trusted library allocation
page read and write
1FD8F56B000
trusted library allocation
page read and write
1FD913C3000
trusted library allocation
page read and write
1FD97AF3000
trusted library allocation
page read and write
1FDFFEBB000
heap
page read and write
16E8000
heap
page read and write
1FD9247E000
trusted library allocation
page read and write
1FD92450000
trusted library allocation
page read and write
1FD90D71000
trusted library allocation
page read and write
1FDFFE9A000
heap
page read and write
1A8593EB000
trusted library allocation
page read and write
1FDFFF00000
heap
page read and write
1FD96F82000
trusted library allocation
page read and write
1FD8C4C2000
trusted library allocation
page read and write
1FD8C480000
trusted library allocation
page read and write
1FD97A87000
trusted library allocation
page read and write
1FD90C72000
trusted library allocation
page read and write
1FD8F3C9000
trusted library allocation
page read and write
1FD9AAF4000
trusted library allocation
page read and write
1FD905E6000
trusted library allocation
page read and write
1FD92477000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FD91FF8000
trusted library allocation
page read and write
1FD8FB74000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
1FD977AF000
trusted library allocation
page read and write
1FD97AC7000
trusted library allocation
page read and write
1FD8F3BE000
trusted library allocation
page read and write
1FD90C6B000
trusted library allocation
page read and write
1FD90FBA000
trusted library allocation
page read and write
1FD8FF51000
trusted library allocation
page read and write
1FD976D4000
trusted library allocation
page read and write
1FD8F95D000
trusted library allocation
page read and write
1FD976E2000
trusted library allocation
page read and write
1FD91374000
trusted library allocation
page read and write
1FD90354000
trusted library allocation
page read and write
1FD90C77000
trusted library allocation
page read and write
1FD976E2000
trusted library allocation
page read and write
411000
unkown
page execute read
1FD914E7000
trusted library allocation
page read and write
1FD97DAB000
trusted library allocation
page read and write
1FD8F28C000
trusted library allocation
page read and write
A520DD8000
stack
page read and write
2E37A3E000
unkown
page readonly
1FD8F991000
trusted library allocation
page read and write
1FD97A9F000
trusted library allocation
page read and write
1FD91EB3000
trusted library allocation
page read and write
1FD91350000
trusted library allocation
page read and write
1A85A161000
heap
page read and write
1FD9AEF4000
trusted library allocation
page read and write
1FD8FCE0000
trusted library allocation
page read and write
1FD978EA000
trusted library allocation
page read and write
FCE000
stack
page read and write
1FD906B3000
trusted library allocation
page read and write
1FD8EB43000
trusted library allocation
page read and write
1FD9146A000
trusted library allocation
page read and write
1FD8F379000
trusted library allocation
page read and write
2E346BE000
unkown
page readonly
1FD9AAF9000
trusted library allocation
page read and write
1FD97852000
trusted library allocation
page read and write
1FD9203F000
trusted library allocation
page read and write
1FD90C84000
trusted library allocation
page read and write
9F109FF000
stack
page read and write
1FD8FBE9000
trusted library allocation
page read and write
1FD920AF000
trusted library allocation
page read and write
1FD9132E000
trusted library allocation
page read and write
1FD91354000
trusted library allocation
page read and write
1FD91EEA000
trusted library allocation
page read and write
1FD9AC8A000
trusted library allocation
page read and write
1FD97B98000
trusted library allocation
page read and write
2243B7A8000
heap
page read and write
1DD4AEB0000
heap
page read and write
1FD913FA000
trusted library allocation
page read and write
1A4D4A60000
trusted library allocation
page read and write
1FD915F0000
trusted library allocation
page read and write
1FD8F2CB000
trusted library allocation
page read and write
1FD9042D000
trusted library allocation
page read and write
1FD93667000
trusted library allocation
page read and write
1FD8C34A000
trusted library allocation
page read and write
1FDFFEE6000
heap
page read and write
1FD976EE000
trusted library allocation
page read and write
1FD90FC3000
trusted library allocation
page read and write
1FDFFEF1000
heap
page read and write
1FD90C3D000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD99D37000
trusted library allocation
page read and write
1FD90ED7000
trusted library allocation
page read and write
1FD8FCC3000
trusted library allocation
page read and write
1FDFFE8E000
heap
page read and write
1FD91063000
trusted library allocation
page read and write
1FD97737000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD9776F000
trusted library allocation
page read and write
1FD97913000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD8F884000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD912D4000
trusted library allocation
page read and write
1FD90E1B000
trusted library allocation
page read and write
1FD97B5D000
trusted library allocation
page read and write
1FD90375000
trusted library allocation
page read and write
1FD97CBF000
trusted library allocation
page read and write
1FD91FD9000
trusted library allocation
page read and write
1FD91399000
trusted library allocation
page read and write
1FD90C28000
trusted library allocation
page read and write
1FD8F007000
heap
page read and write
1FD905AD000
trusted library allocation
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FD91225000
trusted library allocation
page read and write
1FD90C45000
trusted library allocation
page read and write
1FD912A9000
trusted library allocation
page read and write
1FDFFEB2000
heap
page read and write
1FD8D298000
trusted library allocation
page read and write
1A4D4C0C000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD9136E000
trusted library allocation
page read and write
1FD97612000
trusted library allocation
page read and write
1FD8FBD7000
trusted library allocation
page read and write
1FD910A5000
trusted library allocation
page read and write
1FD924EE000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD994B3000
trusted library allocation
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FD92F63000
trusted library allocation
page read and write
1FD92FE9000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD90FCF000
trusted library allocation
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD97AD5000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1A859323000
trusted library allocation
page read and write
1FD9AC2D000
trusted library allocation
page read and write
1FD99CE5000
trusted library allocation
page read and write
1FD8F364000
trusted library allocation
page read and write
1FD978D7000
trusted library allocation
page read and write
1FD92FB2000
trusted library allocation
page read and write
1FD91CB6000
trusted library allocation
page read and write
1FD91399000
trusted library allocation
page read and write
1FD90FDF000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD90FA6000
trusted library allocation
page read and write
1FD90C6B000
trusted library allocation
page read and write
1FD8F327000
trusted library allocation
page read and write
1FD97B8B000
trusted library allocation
page read and write
1FD9774E000
trusted library allocation
page read and write
1FD8F949000
trusted library allocation
page read and write
1FD97AA5000
trusted library allocation
page read and write
1FD9062C000
trusted library allocation
page read and write
1FD90C7D000
trusted library allocation
page read and write
1FD8F6B4000
trusted library allocation
page read and write
1FD9111E000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD90FB8000
trusted library allocation
page read and write
1FD97DBE000
trusted library allocation
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD911FC000
trusted library allocation
page read and write
1FD8F281000
trusted library allocation
page read and write
1FD8FB20000
trusted library allocation
page read and write
4AC000
unkown
page readonly
1A8594C4000
heap
page read and write
1FD91BBE000
trusted library allocation
page read and write
1FD99DA3000
trusted library allocation
page read and write
1FD8F9FC000
trusted library allocation
page read and write
1FD9132C000
trusted library allocation
page read and write
1A85A128000
heap
page read and write
1FDFFEFB000
heap
page read and write
1FD9132A000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD91365000
trusted library allocation
page read and write
1FD97697000
trusted library allocation
page read and write
1FD9761D000
trusted library allocation
page read and write
1FD97AEF000
trusted library allocation
page read and write
1FD99DAC000
trusted library allocation
page read and write
1A85935C000
trusted library allocation
page read and write
2E37ABE000
unkown
page readonly
1FD9767D000
trusted library allocation
page read and write
1FDFFF10000
heap
page read and write
1FD97AD5000
trusted library allocation
page read and write
1FD93205000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD97AF5000
trusted library allocation
page read and write
1FD8F9CD000
trusted library allocation
page read and write
1FD8FBE3000
trusted library allocation
page read and write
1FD97AD3000
trusted library allocation
page read and write
1FD976E4000
trusted library allocation
page read and write
1FD8EB8B000
trusted library allocation
page read and write
1FD978D7000
trusted library allocation
page read and write
1FD995D5000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1FD90FF7000
trusted library allocation
page read and write
1FD8F816000
trusted library allocation
page read and write
1FD8F56E000
trusted library allocation
page read and write
1A85A129000
heap
page read and write
1FD910B0000
trusted library allocation
page read and write
1FD9AEE9000
trusted library allocation
page read and write
1FD8F554000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FD8FB66000
trusted library allocation
page read and write
1FD97C50000
trusted library allocation
page read and write
1FD91363000
trusted library allocation
page read and write
1FD8FF7D000
trusted library allocation
page read and write
1FD924F9000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD8EFF9000
heap
page read and write
1FD9243F000
trusted library allocation
page read and write
1A4D4690000
heap
page read and write
1FD97A85000
trusted library allocation
page read and write
1FD905CB000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FDFFE9E000
heap
page read and write
1FD90EFE000
trusted library allocation
page read and write
1FD8FF71000
trusted library allocation
page read and write
1DD4AFB1000
trusted library allocation
page read and write
1FD8F38C000
trusted library allocation
page read and write
1FD977B1000
trusted library allocation
page read and write
1FD9947C000
trusted library allocation
page read and write
1A85A128000
heap
page read and write
1FD8EF75000
heap
page read and write
1FDFFE9D000
heap
page read and write
1A4D4900000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD916B0000
trusted library allocation
page read and write
1FD99D86000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
1FD97532000
trusted library allocation
page read and write
1FD912B2000
trusted library allocation
page read and write
1FD90D3E000
trusted library allocation
page read and write
2243B7A8000
heap
page read and write
1FD9ACC2000
trusted library allocation
page read and write
1FDFFE9D000
heap
page read and write
1FD9160E000
trusted library allocation
page read and write
1FD97AD1000
trusted library allocation
page read and write
1FD8EBB2000
trusted library allocation
page read and write
1FD90D49000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD913F2000
trusted library allocation
page read and write
1FD977B1000
trusted library allocation
page read and write
1FD97AA1000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD91318000
trusted library allocation
page read and write
1FD8FB37000
trusted library allocation
page read and write
1FDFFEAF000
heap
page read and write
1FDFFEEC000
heap
page read and write
1FD8F700000
trusted library allocation
page read and write
1FD924B6000
trusted library allocation
page read and write
1FDFFEE0000
heap
page read and write
1FDFFEE3000
heap
page read and write
1FD906A3000
trusted library allocation
page read and write
1FD91DF0000
trusted library allocation
page read and write
1FD90E3C000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
1FD910B0000
trusted library allocation
page read and write
1FD97A89000
trusted library allocation
page read and write
1FD90DAE000
trusted library allocation
page read and write
1FD97AFC000
trusted library allocation
page read and write
1FD90E2B000
trusted library allocation
page read and write
1FD913D0000
trusted library allocation
page read and write
1FD8F9CD000
trusted library allocation
page read and write
1FD97DE2000
trusted library allocation
page read and write
1A859381000
trusted library allocation
page read and write
1FD9AAF9000
trusted library allocation
page read and write
1FDFFEFB000
heap
page read and write
1FD9135A000
trusted library allocation
page read and write
2243B7A3000
heap
page read and write
1FD9245A000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD912A9000
trusted library allocation
page read and write
1FD9AEBE000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD8EF9A000
heap
page read and write
1FD90C6F000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD8EFB3000
heap
page read and write
1FD97416000
trusted library allocation
page read and write
1FD903C9000
trusted library allocation
page read and write
1FD93647000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD97676000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1DD4AF00000
trusted library allocation
page read and write
1FD8F6D8000
trusted library allocation
page read and write
1FD91CDD000
trusted library allocation
page read and write
1FDFFEEE000
heap
page read and write
1FD92F81000
trusted library allocation
page read and write
1FD90C91000
trusted library allocation
page read and write
1FD8F6FB000
trusted library allocation
page read and write
1FD97AAB000
trusted library allocation
page read and write
1FD90FF7000
trusted library allocation
page read and write
1FD978D3000
trusted library allocation
page read and write
1FD9AEEE000
trusted library allocation
page read and write
1FDFFE95000
heap
page read and write
1FDFFF00000
heap
page read and write
1FD979FE000
trusted library allocation
page read and write
1FD913A1000
trusted library allocation
page read and write
1FD91396000
trusted library allocation
page read and write
1FD99150000
trusted library allocation
page read and write
1FD8FBFA000
trusted library allocation
page read and write
2243B740000
heap
page read and write
1FDFFEF5000
heap
page read and write
1FD976FB000
trusted library allocation
page read and write
1FD97DF7000
trusted library allocation
page read and write
22CDCEA0000
heap
page read and write
1FD912BC000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FD8F2A2000
trusted library allocation
page read and write
1FD8B4A8000
trusted library allocation
page read and write
1FD913BF000
trusted library allocation
page read and write
1FD978FE000
trusted library allocation
page read and write
1FD906B0000
trusted library allocation
page read and write
1FD90368000
trusted library allocation
page read and write
1FD97A91000
trusted library allocation
page read and write
1FD8F3E2000
trusted library allocation
page read and write
1DD4AFA1000
trusted library allocation
page read and write
1A85A041000
heap
page read and write
1FDFFE95000
heap
page read and write
1FD8F29C000
trusted library allocation
page read and write
1FD97D1B000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FDFFEED000
heap
page read and write
410000
unkown
page readonly
1FD8FBFC000
trusted library allocation
page read and write
1A85A0DC000
heap
page read and write
1FDFFEA4000
heap
page read and write
1DD4B100000
trusted library allocation
page read and write
1FD9138A000
trusted library allocation
page read and write
1FD90FF9000
trusted library allocation
page read and write
1FD92F86000
trusted library allocation
page read and write
1FD913C7000
trusted library allocation
page read and write
1FD97A91000
trusted library allocation
page read and write
1FD90C5C000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD932A3000
trusted library allocation
page read and write
1FD97DD9000
trusted library allocation
page read and write
1FDFFEDE000
heap
page read and write
1FD903A3000
trusted library allocation
page read and write
1FD90F8E000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD90A97000
trusted library allocation
page read and write
1FD908BD000
trusted library allocation
page read and write
1FD977C4000
trusted library allocation
page read and write
16E0000
heap
page read and write
1FD90C8B000
trusted library allocation
page read and write
1FD9245A000
trusted library allocation
page read and write
1FD994D2000
trusted library allocation
page read and write
1FD8D28E000
trusted library allocation
page read and write
1FD91CED000
trusted library allocation
page read and write
1FD97AB5000
trusted library allocation
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD8F8AC000
trusted library allocation
page read and write
1FD90E5E000
trusted library allocation
page read and write
1FD8EFF4000
heap
page read and write
1FDFFED8000
heap
page read and write
1FD8EF89000
heap
page read and write
1FD913FC000
trusted library allocation
page read and write
1FD96F9B000
trusted library allocation
page read and write
1FDFFEA4000
heap
page read and write
2E38ABE000
unkown
page readonly
1FD9248A000
trusted library allocation
page read and write
1FD9059C000
trusted library allocation
page read and write
1FD914C3000
trusted library allocation
page read and write
1FDFFF00000
heap
page read and write
1FD99CCE000
trusted library allocation
page read and write
1FD92FFA000
trusted library allocation
page read and write
1FD9A1C3000
trusted library allocation
page read and write
1FD90C54000
trusted library allocation
page read and write
1FD90F99000
trusted library allocation
page read and write
1FD90362000
trusted library allocation
page read and write
1FD8FB60000
trusted library allocation
page read and write
1FD9AE86000
trusted library allocation
page read and write
1FD92F75000
trusted library allocation
page read and write
1FD8F39E000
trusted library allocation
page read and write
1FD91365000
trusted library allocation
page read and write
1FD9777D000
trusted library allocation
page read and write
1FD904CF000
trusted library allocation
page read and write
1FDFFEA5000
heap
page read and write
1A85A0CA000
heap
page read and write
1FD90CB9000
trusted library allocation
page read and write
1FD8F8F7000
trusted library allocation
page read and write
1FDFFE8F000
heap
page read and write
1FD914A1000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FD90B24000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FD917C2000
trusted library allocation
page read and write
1FD920AF000
trusted library allocation
page read and write
1A4D4720000
heap
page read and write
1FDFFEB6000
heap
page read and write
1FD97CB8000
trusted library allocation
page read and write
1FD8EFF7000
heap
page read and write
1DD4AF03000
trusted library allocation
page read and write
1FD9940C000
trusted library allocation
page read and write
1FD92ECA000
trusted library allocation
page read and write
1FDFFED8000
heap
page read and write
1FDFFE9B000
heap
page read and write
1FDFFEF2000
heap
page read and write
1DD4ABAF000
unclassified section
page read and write
1FD90F5E000
trusted library allocation
page read and write
1FD90643000
trusted library allocation
page read and write
1FD90DA2000
trusted library allocation
page read and write
1A859A10000
heap
page read and write
1FD9AC67000
trusted library allocation
page read and write
1FD912B7000
trusted library allocation
page read and write
1FD99167000
trusted library allocation
page read and write
1FD915F0000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD976FB000
trusted library allocation
page read and write
1FD8F000000
heap
page read and write
1FD8C456000
trusted library allocation
page read and write
1FD920BB000
trusted library allocation
page read and write
1FD904BB000
trusted library allocation
page read and write
1FD906D8000
trusted library allocation
page read and write
1A85A16A000
heap
page read and write
1FDFFEE8000
heap
page read and write
1FD8F9B7000
trusted library allocation
page read and write
3A731D8000
stack
page read and write
1A859365000
trusted library allocation
page read and write
1FDFFEB6000
heap
page read and write
1FDFFEF0000
heap
page read and write
1FD9188E000
trusted library allocation
page read and write
1FD8F95F000
trusted library allocation
page read and write
1FD8C36C000
trusted library allocation
page read and write
1712000
heap
page read and write
1FDFFEED000
heap
page read and write
2243D1B0000
heap
page read and write
1FD8F6C8000
trusted library allocation
page read and write
1FD92FF1000
trusted library allocation
page read and write
4D2000
unkown
page readonly
1FD976E2000
trusted library allocation
page read and write
1FD8F554000
trusted library allocation
page read and write
1FDFFEDA000
heap
page read and write
1FD9ACCA000
trusted library allocation
page read and write
1FD8F3A5000
trusted library allocation
page read and write
1FDFFE9E000
heap
page read and write
1FD910BB000
trusted library allocation
page read and write
1FD97697000
trusted library allocation
page read and write
1A859142000
unclassified section
page read and write
F34000
heap
page read and write
1FDFFEF5000
heap
page read and write
1A85A131000
heap
page read and write
1A4D4712000
unclassified section
page read and write
1FDFFEF2000
heap
page read and write
1FD913A2000
trusted library allocation
page read and write
1A858FA0000
unclassified section
page readonly
1A85A12F000
heap
page read and write
1FD8B323000
trusted library allocation
page read and write
1FD9AC9F000
trusted library allocation
page read and write
1FD90F70000
trusted library allocation
page read and write
1FD90EF1000
trusted library allocation
page read and write
1FD8EF89000
heap
page read and write
1FD93761000
heap
page read and write
1FD99E57000
trusted library allocation
page read and write
1FD93761000
heap
page read and write
1FD8F837000
trusted library allocation
page read and write
1FD90E02000
trusted library allocation
page read and write
1FDFFEE3000
heap
page read and write
1FD8F6F0000
trusted library allocation
page read and write
1FDFFEF5000
heap
page read and write
1FD8EF73000
heap
page read and write
1FD9752C000
trusted library allocation
page read and write
1FD92FFC000
trusted library allocation
page read and write
1FD9A17E000
trusted library allocation
page read and write
1FDFFEEC000
heap
page read and write
1FD9ACC2000
trusted library allocation
page read and write
1FDFFEDC000
heap
page read and write
1FD9031E000
trusted library allocation
page read and write
1A85A0E1000
heap
page read and write
1FD91063000
trusted library allocation
page read and write
1FD8F675000
trusted library allocation
page read and write
1FD91348000
trusted library allocation
page read and write
1FD8F3A7000
trusted library allocation
page read and write
1FD913BA000
trusted library allocation
page read and write
1FD991A8000
trusted library allocation
page read and write
1FD8F85A000
trusted library allocation
page read and write
1FD97AEF000
trusted library allocation
page read and write
1FD9AC44000
trusted library allocation
page read and write
1FD92F38000
trusted library allocation
page read and write
1FD90EDF000
trusted library allocation
page read and write
1FD90E7C000
trusted library allocation
page read and write
1A859386000
trusted library allocation
page read and write
1FD90E3C000
trusted library allocation
page read and write
1FD8F6C8000
trusted library allocation
page read and write
1FD9A1C7000
trusted library allocation
page read and write
1FD905E9000
trusted library allocation
page read and write
1FD9753C000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD97DB9000
trusted library allocation
page read and write
1A85A049000
heap
page read and write
1FD90C34000
trusted library allocation
page read and write
1FD92FFC000
trusted library allocation
page read and write
2243B7E5000
heap
page read and write
1FD8EF9A000
heap
page read and write
1FD91E84000
trusted library allocation
page read and write
1FDFFEE7000
heap
page read and write
1FD90556000
trusted library allocation
page read and write
1FD9AE99000
trusted library allocation
page read and write
1FD97DBE000
trusted library allocation
page read and write
1FD97A62000
trusted library allocation
page read and write
1FD90FF9000
trusted library allocation
page read and write
1FD8EFAB000
heap
page read and write
1FD8EF6B000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD912A2000
trusted library allocation
page read and write
1FD8EF8E000
heap
page read and write
1FD905E9000
trusted library allocation
page read and write
1FD93FA3000
trusted library allocation
page read and write
1FD8FFBB000
trusted library allocation
page read and write
1FD97D85000
trusted library allocation
page read and write
A521DFE000
stack
page read and write
1FD903D4000
trusted library allocation
page read and write
1FD9A183000
trusted library allocation
page read and write
1FD978F8000
trusted library allocation
page read and write
1FD9129A000
trusted library allocation
page read and write
3A749FE000
unkown
page readonly
1A85A1AA000
heap
page read and write
1FDFFEA1000
heap
page read and write
1FD8FBFA000
trusted library allocation
page read and write
1FDFFEE8000
heap
page read and write
1FD8EF9B000
heap
page read and write
1FDFFED9000
heap
page read and write
1FD8F9BE000
trusted library allocation
page read and write
1FD97DD9000
trusted library allocation
page read and write
1A85A13D000
heap
page read and write
1FD96FAB000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD9109A000
trusted library allocation
page read and write
1FDFFEE4000
heap
page read and write
1FD91381000
trusted library allocation
page read and write
1FD8EFF1000
heap
page read and write
1FD9108E000
trusted library allocation
page read and write
1FDFFEE2000
heap
page read and write
1FDFFEDE000
heap
page read and write
1A858FC0000
heap
page read and write
1FD913D0000
trusted library allocation
page read and write
1FD97699000
trusted library allocation
page read and write
1FDFFEED000
heap
page read and write
1FDFFEDE000
heap
page read and write
1FD99DA7000
trusted library allocation
page read and write
1FD8F966000
trusted library allocation
page read and write
1FDFFE9B000
heap
page read and write
There are 3987 hidden memdumps, click here to show them.