IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfd86c6c-6021-4862-88af-cc316151702a.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfd86c6c-6021-4862-88af-cc316151702a.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2MYL4839XKGVXI1RNYNT.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZWPUUJFJFQIHM1G01R0T.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0590ddfb-40e1-4d22-93f3-32ecdcb7185d} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a84756f510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4148 -parentBuildID 20230927232528 -prefsHandle 4204 -prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {429ab7b8-4f74-4e64-a7bd-da10c280bcea} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a8598a2810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5140 -prefMapHandle 5136 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8adebb1d-ed68-4c68-8123-8531c6a1a629} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a858849110 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1A85F591000
trusted library allocation
page read and write
1A85F2C2000
trusted library allocation
page read and write
1A859D2C000
trusted library allocation
page read and write
3A1000
unkown
page execute read
1A857E7D000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
2359C7C0000
unclassified section
page readonly
1A84E28B000
heap
page read and write
1A854D8E000
trusted library allocation
page read and write
1A862B32000
trusted library allocation
page read and write
1A8589F0000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A85F493000
trusted library allocation
page read and write
1A857F59000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
1A862BA0000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85AE34000
trusted library allocation
page read and write
1A85F2D4000
trusted library allocation
page read and write
1A8628F8000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A84E283000
heap
page read and write
1A84E2E5000
heap
page read and write
1A85F4E0000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85ABC6000
trusted library allocation
page read and write
1A858539000
trusted library allocation
page read and write
1A84E2E8000
heap
page read and write
1A84E2D0000
heap
page read and write
1A8597AD000
trusted library allocation
page read and write
1A858A05000
trusted library allocation
page read and write
1A85F343000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A858DC8000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
D74000
heap
page read and write
1A858D8F000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A85336A000
trusted library allocation
page read and write
1A853382000
trusted library allocation
page read and write
1A85F5FC000
trusted library allocation
page read and write
190CFF07000
trusted library allocation
page read and write
20D1A423000
trusted library allocation
page read and write
1A862C99000
heap
page read and write
1A84E29F000
heap
page read and write
1A859BF2000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A8612E5000
trusted library allocation
page read and write
2190F459000
heap
page read and write
1A859DC7000
trusted library allocation
page read and write
1A85F4D8000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A858A6C000
trusted library allocation
page read and write
1A858761000
trusted library allocation
page read and write
1A857AF7000
trusted library allocation
page read and write
1A858165000
trusted library allocation
page read and write
37E000
stack
page read and write
1A85ADC2000
trusted library allocation
page read and write
1A859000000
trusted library allocation
page read and write
1A858A07000
trusted library allocation
page read and write
1A858B82000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A8544EB000
trusted library allocation
page read and write
F85000
heap
page read and write
1A862CA0000
heap
page read and write
1A861282000
trusted library allocation
page read and write
1A8581A3000
trusted library allocation
page read and write
1A856E33000
trusted library allocation
page read and write
20D1A4B7000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A84E28E000
heap
page read and write
1A8590D0000
trusted library allocation
page read and write
1A858A59000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85F560000
trusted library allocation
page read and write
1A857E7D000
trusted library allocation
page read and write
1A84E275000
heap
page read and write
1A84E2DA000
heap
page read and write
1A8625C7000
trusted library allocation
page read and write
1A857DBA000
trusted library allocation
page read and write
1A854D89000
trusted library allocation
page read and write
1A854D8C000
trusted library allocation
page read and write
1A85872E000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E2AD000
heap
page read and write
1A85F332000
trusted library allocation
page read and write
1A85F6CE000
trusted library allocation
page read and write
1A85AB27000
trusted library allocation
page read and write
1A85A869000
trusted library allocation
page read and write
1A8532FE000
trusted library allocation
page read and write
1A8589DD000
trusted library allocation
page read and write
1A857E8F000
trusted library allocation
page read and write
1A857EB6000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E2E0000
heap
page read and write
1A84E2D8000
heap
page read and write
1A85AE7E000
trusted library allocation
page read and write
1A854432000
trusted library allocation
page read and write
1A85ADFB000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E2D8000
heap
page read and write
1A858DDA000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A86124D000
trusted library allocation
page read and write
1A8575FB000
trusted library allocation
page read and write
1A857518000
trusted library allocation
page read and write
1A857AE1000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
20D1A520000
heap
page read and write
1A862D51000
heap
page read and write
1A860E61000
trusted library allocation
page read and write
1A8549CA000
trusted library allocation
page read and write
2190F1B1000
unkown
page execute read
1A84E2D8000
heap
page read and write
1A858BCC000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E2AF000
heap
page read and write
1A85F605000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A84E291000
heap
page read and write
1A858A9E000
trusted library allocation
page read and write
1A857FE3000
trusted library allocation
page read and write
1A85F376000
trusted library allocation
page read and write
1A8544EF000
trusted library allocation
page read and write
1A84E2E7000
heap
page read and write
2190F477000
heap
page read and write
1A862879000
trusted library allocation
page read and write
1A857A6A000
trusted library allocation
page read and write
1A85F5B6000
trusted library allocation
page read and write
2190F42D000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E2D3000
heap
page read and write
1A8613F5000
trusted library allocation
page read and write
2190F369000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E2CF000
heap
page read and write
1A85AB27000
trusted library allocation
page read and write
1A86134F000
trusted library allocation
page read and write
1A8571AC000
trusted library allocation
page read and write
1A854CB2000
heap
page read and write
1A862C6D000
heap
page read and write
1A84E29F000
heap
page read and write
1A8581B3000
trusted library allocation
page read and write
1A8628FA000
trusted library allocation
page read and write
1A858191000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A84E289000
heap
page read and write
1A85F493000
trusted library allocation
page read and write
1A859DF5000
trusted library allocation
page read and write
1A85716A000
trusted library allocation
page read and write
1A857FC0000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A85F2F7000
trusted library allocation
page read and write
2190E7C0000
trusted library allocation
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85873B000
trusted library allocation
page read and write
1A85F316000
trusted library allocation
page read and write
1A8619DA000
trusted library allocation
page read and write
1A85F591000
trusted library allocation
page read and write
1A862487000
trusted library allocation
page read and write
1A859BF4000
trusted library allocation
page read and write
1A857F30000
trusted library allocation
page read and write
1A859789000
trusted library allocation
page read and write
1A8581A3000
trusted library allocation
page read and write
1A862B2A000
trusted library allocation
page read and write
1A85729D000
trusted library allocation
page read and write
1A857EA8000
trusted library allocation
page read and write
1A8575EB000
trusted library allocation
page read and write
2190F477000
heap
page read and write
1A84E2CF000
heap
page read and write
1A85AE47000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A85F591000
trusted library allocation
page read and write
1A859B55000
trusted library allocation
page read and write
1A85AE31000
trusted library allocation
page read and write
1A8544E4000
trusted library allocation
page read and write
1A85F6B4000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A85A9DD000
trusted library allocation
page read and write
1A854D07000
trusted library allocation
page read and write
1A857D93000
trusted library allocation
page read and write
1A85786D000
trusted library allocation
page read and write
1A85F966000
trusted library allocation
page read and write
1A858E7A000
trusted library allocation
page read and write
2190F360000
heap
page read and write
1A85F740000
trusted library allocation
page read and write
1A854CAE000
heap
page read and write
1A84E295000
heap
page read and write
1A84E2E5000
heap
page read and write
20D1A479000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A8544D9000
trusted library allocation
page read and write
1A857EAD000
trusted library allocation
page read and write
1A859DE5000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8587AC000
trusted library allocation
page read and write
1A8613D6000
trusted library allocation
page read and write
1A85F7EE000
trusted library allocation
page read and write
1A858788000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A8545F3000
trusted library allocation
page read and write
1A84E2E7000
heap
page read and write
1A858DBC000
trusted library allocation
page read and write
21590742000
heap
page read and write
1A8612FD000
trusted library allocation
page read and write
2359CCB2000
trusted library allocation
page read and write
D74000
heap
page read and write
1A858545000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
299DFFF000
stack
page read and write
1A84E2D0000
heap
page read and write
1A85ADDF000
trusted library allocation
page read and write
1A857E75000
trusted library allocation
page read and write
2190E730000
heap
page readonly
1A8619E5000
trusted library allocation
page read and write
1A85816B000
trusted library allocation
page read and write
2190F3E9000
heap
page read and write
1A84E2CF000
heap
page read and write
1A860E59000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A8571B3000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A84E2A0000
heap
page read and write
1A85F69A000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E292000
heap
page read and write
1A85F4B1000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E27A000
heap
page read and write
1A85AB80000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
20D1A465000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A858DB4000
trusted library allocation
page read and write
21590865000
heap
page read and write
1A8628FA000
trusted library allocation
page read and write
1A85ABFA000
trusted library allocation
page read and write
2359CC00000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A85896F000
trusted library allocation
page read and write
1A84E27C000
heap
page read and write
1A86285E000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A857D8C000
trusted library allocation
page read and write
1A8590A5000
trusted library allocation
page read and write
1A858159000
trusted library allocation
page read and write
1A857DCA000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A84E28A000
heap
page read and write
1A859DEA000
trusted library allocation
page read and write
1A8586C2000
trusted library allocation
page read and write
1A859B76000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A859D41000
trusted library allocation
page read and write
2190E861000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E295000
heap
page read and write
1A8549B4000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E294000
heap
page read and write
1A84E295000
heap
page read and write
1A85449F000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A859DE5000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E2AC000
heap
page read and write
1A85984D000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A8581ED000
trusted library allocation
page read and write
1A85AEED000
trusted library allocation
page read and write
1A8587ED000
trusted library allocation
page read and write
1A853366000
trusted library allocation
page read and write
1A85AB51000
trusted library allocation
page read and write
1A85F488000
trusted library allocation
page read and write
1A857EB6000
trusted library allocation
page read and write
F58000
heap
page read and write
1A860ECA000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A858DC5000
trusted library allocation
page read and write
1A85AE2F000
trusted library allocation
page read and write
1A85877B000
trusted library allocation
page read and write
1A858992000
trusted library allocation
page read and write
1A8597F3000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A8588C2000
trusted library allocation
page read and write
1A858DC0000
trusted library allocation
page read and write
1A857645000
trusted library allocation
page read and write
1A858D9B000
trusted library allocation
page read and write
1A857129000
trusted library allocation
page read and write
1A858AFA000
trusted library allocation
page read and write
1A8586C5000
trusted library allocation
page read and write
1A85F4A2000
trusted library allocation
page read and write
1A859B94000
trusted library allocation
page read and write
1A861388000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
2190F364000
heap
page read and write
1A85F591000
trusted library allocation
page read and write
1A859929000
trusted library allocation
page read and write
9052C7E000
unkown
page readonly
1A84E2D7000
heap
page read and write
1A84E2B0000
heap
page read and write
1A84E26D000
heap
page read and write
B513C7B000
stack
page read and write
1A84E280000
heap
page read and write
1A858D5D000
trusted library allocation
page read and write
20D1A570000
unclassified section
page readonly
1A85F63E000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E26A000
heap
page read and write
1A85AE93000
trusted library allocation
page read and write
1A85AA9D000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A854CA2000
heap
page read and write
1A860E66000
trusted library allocation
page read and write
1A85F6ED000
trusted library allocation
page read and write
1A858894000
trusted library allocation
page read and write
1A858DAB000
trusted library allocation
page read and write
1A856E99000
trusted library allocation
page read and write
1A85AEF8000
trusted library allocation
page read and write
1A857287000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A861388000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E2D3000
heap
page read and write
1A8549B8000
trusted library allocation
page read and write
1A84E2BE000
heap
page read and write
1A857AA7000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A859AC3000
trusted library allocation
page read and write
1A8586DC000
trusted library allocation
page read and write
1A8589D3000
trusted library allocation
page read and write
1A858B3B000
trusted library allocation
page read and write
1A858798000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
2190F363000
heap
page read and write
1A862B0D000
trusted library allocation
page read and write
1A8557E1000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A857EB0000
trusted library allocation
page read and write
1A861257000
trusted library allocation
page read and write
1A858B3D000
trusted library allocation
page read and write
1A859927000
trusted library allocation
page read and write
1A86198E000
trusted library allocation
page read and write
1A858766000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A859B93000
trusted library allocation
page read and write
1A859BE3000
trusted library allocation
page read and write
20D1A526000
heap
page read and write
1A85858F000
trusted library allocation
page read and write
1A85F7D3000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A84E2CF000
heap
page read and write
21590900000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A858931000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A8544E8000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E2CF000
heap
page read and write
1A8631E1000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A859180000
trusted library allocation
page read and write
1A859BE0000
trusted library allocation
page read and write
190CFB80000
heap
page read and write
1A85A7D9000
trusted library allocation
page read and write
F30000
heap
page read and write
1A84E2AC000
heap
page read and write
1A858B40000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
7C2B5FE000
unkown
page readonly
1A857FF1000
trusted library allocation
page read and write
1A858D9E000
trusted library allocation
page read and write
1A85870F000
trusted library allocation
page read and write
1A85A9F6000
trusted library allocation
page read and write
1A84E275000
heap
page read and write
1A84E2DA000
heap
page read and write
1A858E7F000
trusted library allocation
page read and write
1A857E45000
trusted library allocation
page read and write
1A859BEC000
trusted library allocation
page read and write
1A85AB39000
trusted library allocation
page read and write
1A859865000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2F3000
heap
page read and write
2190F360000
heap
page read and write
1A862C5A000
heap
page read and write
B5167FE000
stack
page read and write
1A84E29F000
heap
page read and write
20D1A498000
trusted library allocation
page read and write
1A858132000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A84E290000
heap
page read and write
1A85F591000
trusted library allocation
page read and write
1A85AB39000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A859BF4000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A8589D0000
trusted library allocation
page read and write
1A857E7D000
trusted library allocation
page read and write
1A85F6C2000
trusted library allocation
page read and write
1A85A7DA000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A858EEE000
trusted library allocation
page read and write
1A85A8BD000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A859B8B000
trusted library allocation
page read and write
1A859D5B000
trusted library allocation
page read and write
1A858DBC000
trusted library allocation
page read and write
1A85AE6F000
trusted library allocation
page read and write
1A85F7FA000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E295000
heap
page read and write
1A857FCB000
trusted library allocation
page read and write
1A858BBC000
trusted library allocation
page read and write
1A85F589000
trusted library allocation
page read and write
1A8585B2000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A857E9B000
trusted library allocation
page read and write
1A859BFE000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A857F57000
trusted library allocation
page read and write
1A85F651000
trusted library allocation
page read and write
1A85F35B000
trusted library allocation
page read and write
1A857EB7000
trusted library allocation
page read and write
1A85F9DF000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8626A8000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A858E9C000
trusted library allocation
page read and write
1A8599A1000
trusted library allocation
page read and write
1A858761000
trusted library allocation
page read and write
1A857EAB000
trusted library allocation
page read and write
2190F3AA000
heap
page read and write
1A8575E3000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A857E81000
trusted library allocation
page read and write
1A85F916000
trusted library allocation
page read and write
1A858E9D000
trusted library allocation
page read and write
1A85AD78000
trusted library allocation
page read and write
2190F42B000
heap
page read and write
1A858BED000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A84E2B6000
heap
page read and write
2190F3F1000
heap
page read and write
20D1A618000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A858A2D000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
190CFF0A000
trusted library allocation
page read and write
1A861337000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A84E2DD000
heap
page read and write
1A85893C000
trusted library allocation
page read and write
1A858E5D000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A857EFA000
trusted library allocation
page read and write
1A8590E6000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A8581A9000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A858E7F000
trusted library allocation
page read and write
1A85F2D8000
trusted library allocation
page read and write
1A8575E7000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A8533D2000
trusted library allocation
page read and write
2359CC17000
trusted library allocation
page read and write
1A85855E000
trusted library allocation
page read and write
1A858154000
trusted library allocation
page read and write
1A854575000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85AD38000
trusted library allocation
page read and write
1A85AE51000
trusted library allocation
page read and write
1A859B8F000
trusted library allocation
page read and write
1A854544000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A8545EB000
trusted library allocation
page read and write
1A858DC0000
trusted library allocation
page read and write
1A857EAB000
trusted library allocation
page read and write
1A85817B000
trusted library allocation
page read and write
F82000
heap
page read and write
2359CC70000
trusted library allocation
page read and write
1A85F67A000
trusted library allocation
page read and write
2190E3F0000
unclassified section
page readonly
1A858582000
trusted library allocation
page read and write
1A857E7D000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A85F376000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A858768000
trusted library allocation
page read and write
20D1A410000
trusted library allocation
page read and write
1A8574B9000
trusted library allocation
page read and write
1A859989000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E2AF000
heap
page read and write
1A85498C000
trusted library allocation
page read and write
1A854DA5000
trusted library allocation
page read and write
2190E80C000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A858798000
trusted library allocation
page read and write
1A85499A000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A8544EF000
trusted library allocation
page read and write
1A860F01000
trusted library allocation
page read and write
1A8572CE000
trusted library allocation
page read and write
1A8587AC000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A85F6E1000
trusted library allocation
page read and write
215906E0000
heap
page read and write
1A8597A5000
trusted library allocation
page read and write
1A854CA2000
heap
page read and write
1A84E295000
heap
page read and write
1A84E28B000
heap
page read and write
1A84E295000
heap
page read and write
1A85F68E000
trusted library allocation
page read and write
1A856E60000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A858734000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
F86000
heap
page read and write
1A857E7D000
trusted library allocation
page read and write
1A857E8B000
trusted library allocation
page read and write
1A858191000
trusted library allocation
page read and write
1A85898D000
trusted library allocation
page read and write
1A861304000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A857F8D000
trusted library allocation
page read and write
1A85443D000
trusted library allocation
page read and write
1A8585AD000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
2190F3EB000
heap
page read and write
1A86131E000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A858761000
trusted library allocation
page read and write
1A85AE93000
trusted library allocation
page read and write
1A8542CB000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A858560000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
DCBB641000
trusted library allocation
page execute read
D74000
heap
page read and write
1A84E28B000
heap
page read and write
1A84E2AF000
heap
page read and write
1A854538000
trusted library allocation
page read and write
20D1A130000
remote allocation
page read and write
1A858A4D000
trusted library allocation
page read and write
1A859BF4000
trusted library allocation
page read and write
1A84E2DD000
heap
page read and write
1A858794000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A862885000
trusted library allocation
page read and write
474000
unkown
page readonly
1A85F547000
trusted library allocation
page read and write
1A84E2DD000
heap
page read and write
1A8586AD000
trusted library allocation
page read and write
1A858D9E000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A858EE9000
trusted library allocation
page read and write
1A85ABA8000
trusted library allocation
page read and write
1A854D85000
trusted library allocation
page read and write
1A8599D6000
trusted library allocation
page read and write
1A84E2F0000
heap
page read and write
1A854D3C000
trusted library allocation
page read and write
1A858587000
trusted library allocation
page read and write
1A86135D000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A857E87000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A858A1B000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A857EA8000
trusted library allocation
page read and write
1A858B62000
trusted library allocation
page read and write
1A8628B8000
trusted library allocation
page read and write
190CFA70000
heap
page read and write
1A84E299000
heap
page read and write
1A84E2D8000
heap
page read and write
1A84E2AD000
heap
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85879B000
trusted library allocation
page read and write
1A8557F0000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A85A938000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A84E280000
heap
page read and write
1A859B67000
trusted library allocation
page read and write
1A84E2A5000
heap
page read and write
1A85F68A000
trusted library allocation
page read and write
7C2A47B000
stack
page read and write
1A84E2DF000
heap
page read and write
1A84E2CF000
heap
page read and write
2190E848000
trusted library allocation
page read and write
1A857A66000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A85F7D3000
trusted library allocation
page read and write
1A858A42000
trusted library allocation
page read and write
1A859BFE000
trusted library allocation
page read and write
1A853318000
trusted library allocation
page read and write
1A8575FB000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A858E65000
trusted library allocation
page read and write
1A858155000
trusted library allocation
page read and write
1A85992D000
trusted library allocation
page read and write
1A8598DD000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A858768000
trusted library allocation
page read and write
1A85498F000
trusted library allocation
page read and write
1A857A53000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A858EC9000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A857E71000
trusted library allocation
page read and write
1A85F686000
trusted library allocation
page read and write
1A85A8F6000
trusted library allocation
page read and write
2359CBB4000
heap
page read and write
1A857EB1000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
2190F35C000
heap
page read and write
1A858563000
trusted library allocation
page read and write
1A857171000
trusted library allocation
page read and write
1A85AE84000
trusted library allocation
page read and write
1A858771000
trusted library allocation
page read and write
2190F43B000
heap
page read and write
1A84E27A000
heap
page read and write
1A858768000
trusted library allocation
page read and write
1A859BD4000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A858D7F000
trusted library allocation
page read and write
1A85719A000
trusted library allocation
page read and write
1A85F6AF000
trusted library allocation
page read and write
1A857F63000
trusted library allocation
page read and write
1A84E286000
heap
page read and write
1A8572B9000
trusted library allocation
page read and write
1A858A0A000
trusted library allocation
page read and write
1A859AF8000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A861376000
trusted library allocation
page read and write
1A858777000
trusted library allocation
page read and write
1A85A9DD000
trusted library allocation
page read and write
1A854D68000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A85728A000
trusted library allocation
page read and write
1A8572C4000
trusted library allocation
page read and write
20D1A524000
heap
page read and write
1A858B8E000
trusted library allocation
page read and write
1A85A9B5000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A858DB0000
trusted library allocation
page read and write
1A858DFC000
trusted library allocation
page read and write
1A85F2B1000
trusted library allocation
page read and write
1A858B31000
trusted library allocation
page read and write
1A85F643000
trusted library allocation
page read and write
1A857D80000
trusted library allocation
page read and write
1A859BF0000
trusted library allocation
page read and write
2190F429000
heap
page read and write
1A857E81000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A859DD3000
trusted library allocation
page read and write
1A857291000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A856E1D000
trusted library allocation
page read and write
1A85F678000
trusted library allocation
page read and write
1A858EBB000
trusted library allocation
page read and write
2190F300000
heap
page read and write
1A84E285000
heap
page read and write
1A857FF1000
trusted library allocation
page read and write
1A857EC3000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A84E264000
heap
page read and write
190CFEE0000
heap
page read and write
1A84E26D000
heap
page read and write
F87000
heap
page read and write
1A857E93000
trusted library allocation
page read and write
F8D000
heap
page read and write
1A857132000
trusted library allocation
page read and write
D74000
heap
page read and write
1A85FC33000
trusted library allocation
page read and write
1A85819B000
trusted library allocation
page read and write
1A85AB40000
trusted library allocation
page read and write
F80000
heap
page read and write
1A84E27A000
heap
page read and write
1A84E281000
heap
page read and write
1A85819B000
trusted library allocation
page read and write
1A8544F8000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A856E93000
trusted library allocation
page read and write
1A8572DC000
trusted library allocation
page read and write
1A8590D0000
trusted library allocation
page read and write
1A85855B000
trusted library allocation
page read and write
1A85F6FA000
trusted library allocation
page read and write
1A859B51000
trusted library allocation
page read and write
1A8612FB000
trusted library allocation
page read and write
1A8628F4000
trusted library allocation
page read and write
1A862B56000
trusted library allocation
page read and write
1A85F6E4000
trusted library allocation
page read and write
1A858DE6000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
1A8588EE000
trusted library allocation
page read and write
1A858728000
trusted library allocation
page read and write
2359CCAA000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E281000
heap
page read and write
1A85F7EC000
trusted library allocation
page read and write
3DE21FE000
stack
page read and write
1A84E2DC000
heap
page read and write
1A84E298000
heap
page read and write
1A84E2E5000
heap
page read and write
1A857247000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A85F55F000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
1A8544EA000
trusted library allocation
page read and write
1A857F30000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A84E2E5000
heap
page read and write
1A8585FB000
trusted library allocation
page read and write
1A8575EC000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A859748000
trusted library allocation
page read and write
9052D3E000
stack
page read and write
1A858B33000
trusted library allocation
page read and write
1A85A9EA000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
2190F477000
heap
page read and write
2359C81A000
heap
page read and write
21590A00000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A8619DF000
trusted library allocation
page read and write
1A859DF5000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85AD34000
trusted library allocation
page read and write
1A859B8B000
trusted library allocation
page read and write
2190F400000
heap
page read and write
1A854DA5000
trusted library allocation
page read and write
2190E875000
trusted library allocation
page read and write
1A858757000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E28A000
heap
page read and write
1A8581D8000
trusted library allocation
page read and write
BDB000
stack
page read and write
1A858A3F000
trusted library allocation
page read and write
1A84E284000
heap
page read and write
1A862B28000
trusted library allocation
page read and write
20D1A530000
heap
page readonly
1A84E26A000
heap
page read and write
1A84E27A000
heap
page read and write
1A858D9F000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A85F7EC000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A8575CF000
trusted library allocation
page read and write
1A8599E2000
trusted library allocation
page read and write
1A858677000
trusted library allocation
page read and write
1A858539000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A859931000
trusted library allocation
page read and write
1A85339E000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A861200000
trusted library allocation
page read and write
1A85F631000
trusted library allocation
page read and write
1A8599DD000
trusted library allocation
page read and write
1A857E81000
trusted library allocation
page read and write
1A862D99000
heap
page read and write
1A84E299000
heap
page read and write
1A85F72A000
trusted library allocation
page read and write
1A859B5A000
trusted library allocation
page read and write
20D1A400000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85F33A000
trusted library allocation
page read and write
1A86255F000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A862971000
trusted library allocation
page read and write
1A8589D0000
trusted library allocation
page read and write
1A85AE3F000
trusted library allocation
page read and write
21590730000
heap
page read and write
1A8575F5000
trusted library allocation
page read and write
1A857E9E000
trusted library allocation
page read and write
1A85A819000
trusted library allocation
page read and write
1A858A59000
trusted library allocation
page read and write
1A85F970000
trusted library allocation
page read and write
20D1A2AA000
heap
page read and write
1A859B87000
trusted library allocation
page read and write
1A857F9F000
trusted library allocation
page read and write
1A857197000
trusted library allocation
page read and write
190CFC09000
heap
page read and write
1A84E2AC000
heap
page read and write
1A861376000
trusted library allocation
page read and write
1A85F56A000
trusted library allocation
page read and write
1A85974C000
trusted library allocation
page read and write
1A857A58000
trusted library allocation
page read and write
1A858A55000
trusted library allocation
page read and write
1A85879D000
trusted library allocation
page read and write
1A854D8A000
trusted library allocation
page read and write
462000
unkown
page readonly
1A84E283000
heap
page read and write
1A84E2A6000
heap
page read and write
1A84E28A000
heap
page read and write
1A84E281000
heap
page read and write
1A84E292000
heap
page read and write
1A85F5B6000
trusted library allocation
page read and write
1A85F48D000
trusted library allocation
page read and write
3DE39FE000
stack
page read and write
1A85F7D3000
trusted library allocation
page read and write
1A85874A000
trusted library allocation
page read and write
1A852C81000
trusted library allocation
page read and write
2359CCDB000
trusted library allocation
page read and write
1A84E2BE000
heap
page read and write
1A86123E000
trusted library allocation
page read and write
2359CE07000
trusted library allocation
page read and write
1A84E267000
heap
page read and write
1A85AA59000
trusted library allocation
page read and write
1A854561000
trusted library allocation
page read and write
1A8581A5000
trusted library allocation
page read and write
1A857EAD000
trusted library allocation
page read and write
1A857E87000
trusted library allocation
page read and write
2190E800000
trusted library allocation
page read and write
1A8585FB000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A85F6F2000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
1A859DE5000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A858A42000
trusted library allocation
page read and write
1A8589C8000
trusted library allocation
page read and write
1A857D40000
trusted library allocation
page read and write
1A84E2AD000
heap
page read and write
1A858745000
trusted library allocation
page read and write
1A85F4D2000
trusted library allocation
page read and write
2190F46C000
heap
page read and write
1A858B55000
trusted library allocation
page read and write
1A85FC9E000
trusted library allocation
page read and write
1A85F6FA000
trusted library allocation
page read and write
1A859B8B000
trusted library allocation
page read and write
1A8585E6000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A8628F8000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E2DC000
heap
page read and write
1A85899C000
trusted library allocation
page read and write
CD4000
heap
page read and write
1A84E280000
heap
page read and write
1A857F9F000
trusted library allocation
page read and write
3DE19FF000
stack
page read and write
2190F3F1000
heap
page read and write
1A85873D000
trusted library allocation
page read and write
1A854D77000
trusted library allocation
page read and write
1A854D65000
trusted library allocation
page read and write
1A860DFC000
trusted library allocation
page read and write
1A858A6C000
trusted library allocation
page read and write
1A8598EB000
trusted library allocation
page read and write
9052CBD000
stack
page read and write
1A858994000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A8572CD000
trusted library allocation
page read and write
1A84E2B7000
heap
page read and write
1A8544BD000
trusted library allocation
page read and write
1A8628FA000
trusted library allocation
page read and write
1A8613EE000
trusted library allocation
page read and write
1A85F6AA000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A85F7EC000
trusted library allocation
page read and write
1A85A8BF000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A8619D0000
trusted library allocation
page read and write
1A85980C000
trusted library allocation
page read and write
1A859BF2000
trusted library allocation
page read and write
1A84E2BC000
heap
page read and write
2190E760000
unclassified section
page read and write
1A857DCC000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A84E281000
heap
page read and write
38E5E2124000
trusted library allocation
page read and write
1A85A8C7000
trusted library allocation
page read and write
1A85A97A000
trusted library allocation
page read and write
2190F458000
heap
page read and write
1A858DED000
trusted library allocation
page read and write
2C9000
stack
page read and write
1A858A3B000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A858E71000
trusted library allocation
page read and write
1A858E5D000
trusted library allocation
page read and write
1A85ADF0000
trusted library allocation
page read and write
1A85F66B000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A85F664000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A86255F000
trusted library allocation
page read and write
1A858599000
trusted library allocation
page read and write
1A8532FB000
trusted library allocation
page read and write
1A85F745000
trusted library allocation
page read and write
1A85F2CA000
trusted library allocation
page read and write
1A858545000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A86134F000
trusted library allocation
page read and write
2190F200000
trusted library allocation
page read and write
1A858DE3000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A84E2CF000
heap
page read and write
1A862480000
trusted library allocation
page read and write
1A858D6D000
trusted library allocation
page read and write
1A85A828000
trusted library allocation
page read and write
1A859AFB000
trusted library allocation
page read and write
1A85A89C000
trusted library allocation
page read and write
1A85AAFE000
trusted library allocation
page read and write
1A857E89000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A85ABD5000
trusted library allocation
page read and write
1A86131E000
trusted library allocation
page read and write
1A852CBF000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8612B2000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
1A85815C000
trusted library allocation
page read and write
1A862DAF000
heap
page read and write
1A85783D000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A861376000
trusted library allocation
page read and write
1A859B5A000
trusted library allocation
page read and write
1A857881000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A854DA5000
trusted library allocation
page read and write
1A8588EE000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A858D4F000
trusted library allocation
page read and write
1A857FA1000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2AD000
heap
page read and write
1A8575FE000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A858D9E000
trusted library allocation
page read and write
1A84E2B2000
heap
page read and write
2190F3F2000
heap
page read and write
1A84E28B000
heap
page read and write
1A854D9E000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A84E2A0000
heap
page read and write
1A84E2A0000
heap
page read and write
1A858176000
trusted library allocation
page read and write
1A84E2EF000
heap
page read and write
2190F3F1000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E27A000
heap
page read and write
1A858169000
trusted library allocation
page read and write
1A8544EA000
trusted library allocation
page read and write
1A858A42000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
1A8581A9000
trusted library allocation
page read and write
1A854CAC000
heap
page read and write
1A84E26A000
heap
page read and write
59E000
stack
page read and write
1A8589EE000
trusted library allocation
page read and write
1A85878E000
trusted library allocation
page read and write
1A8572D2000
trusted library allocation
page read and write
1A857EBC000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A8590A5000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85F6E1000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A85A9FE000
trusted library allocation
page read and write
1A85F54D000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
2190F3E8000
heap
page read and write
1A859B51000
trusted library allocation
page read and write
1A85AE43000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A85F7DD000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A85A9CD000
trusted library allocation
page read and write
1A857F73000
trusted library allocation
page read and write
1A8572BE000
trusted library allocation
page read and write
F80000
heap
page read and write
1A85984D000
trusted library allocation
page read and write
BBF000
stack
page read and write
1A8581AC000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
9052CFE000
unkown
page readonly
1A85F6D2000
trusted library allocation
page read and write
1A860E18000
trusted library allocation
page read and write
1A858EED000
trusted library allocation
page read and write
2190F20B000
trusted library allocation
page read and write
1A858BAA000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85ADD6000
trusted library allocation
page read and write
2190F1BF000
unkown
page execute read
1A85F640000
trusted library allocation
page read and write
1A85F7EC000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A85894A000
trusted library allocation
page read and write
1A85A970000
trusted library allocation
page read and write
20D1A270000
heap
page read and write
1A86135D000
trusted library allocation
page read and write
1A8625D4000
trusted library allocation
page read and write
1A85F54D000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A84E2DC000
heap
page read and write
1A858935000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85F7E1000
trusted library allocation
page read and write
1A85AB06000
trusted library allocation
page read and write
1A8628C8000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A862996000
trusted library allocation
page read and write
1A8590D7000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A85AB51000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85A984000
trusted library allocation
page read and write
1A86295E000
trusted library allocation
page read and write
1A85A7F2000
trusted library allocation
page read and write
2190F43B000
heap
page read and write
1A84E292000
heap
page read and write
1A85819B000
trusted library allocation
page read and write
1A857E4F000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E295000
heap
page read and write
1A85A948000
trusted library allocation
page read and write
1A858DFC000
trusted library allocation
page read and write
1A857EAB000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A8545F6000
trusted library allocation
page read and write
1A853276000
trusted library allocation
page read and write
2190E85F000
trusted library allocation
page read and write
1A85F55E000
trusted library allocation
page read and write
1A8581C3000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A8588DA000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A859BFE000
trusted library allocation
page read and write
1A854D85000
trusted library allocation
page read and write
1A8590D8000
trusted library allocation
page read and write
1A863196000
trusted library allocation
page read and write
1A8589CB000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
2190F360000
heap
page read and write
1A84E26D000
heap
page read and write
1A85AD38000
trusted library allocation
page read and write
1A85FC14000
trusted library allocation
page read and write
1A8589BB000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A85F737000
trusted library allocation
page read and write
1A85F3E1000
trusted library allocation
page read and write
1A86255A000
trusted library allocation
page read and write
1A857575000
trusted library allocation
page read and write
1A85F3DE000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A85A7FB000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A859AF5000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
2190F458000
heap
page read and write
1A85815A000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85875B000
trusted library allocation
page read and write
1A8581A7000
trusted library allocation
page read and write
1A85858C000
trusted library allocation
page read and write
2359C7A0000
remote allocation
page read and write
FA6000
heap
page read and write
2359C9B0000
heap
page read and write
1A857293000
trusted library allocation
page read and write
1A85F2C6000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A85F5B6000
trusted library allocation
page read and write
1A85FCB7000
trusted library allocation
page read and write
2190F458000
heap
page read and write
1A84E292000
heap
page read and write
1A858DB4000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A85A8DF000
trusted library allocation
page read and write
1A8549F1000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A84E280000
heap
page read and write
1A859063000
trusted library allocation
page read and write
1A8585E6000
trusted library allocation
page read and write
1A862B9E000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A85725E000
trusted library allocation
page read and write
FA4000
heap
page read and write
1A857FE3000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A854DA5000
trusted library allocation
page read and write
5F0000
heap
page read and write
1A84E2AF000
heap
page read and write
1A861348000
trusted library allocation
page read and write
1A8589D3000
trusted library allocation
page read and write
1A862BCF000
trusted library allocation
page read and write
1A858B1C000
trusted library allocation
page read and write
1A8589E2000
trusted library allocation
page read and write
1A854CA8000
heap
page read and write
1A857E45000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A84E2A6000
heap
page read and write
1A84E28F000
heap
page read and write
1A84E282000
heap
page read and write
1A8572A9000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
21592370000
heap
page read and write
1A8544B5000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
2190E8E9000
trusted library allocation
page read and write
1A84E2B2000
heap
page read and write
1A84E292000
heap
page read and write
1A8619EE000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A859C13000
trusted library allocation
page read and write
1A85F336000
trusted library allocation
page read and write
1A85421B000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A8613D6000
trusted library allocation
page read and write
2190E770000
heap
page read and write
1A84E26D000
heap
page read and write
1A84E2DC000
heap
page read and write
1A84E264000
heap
page read and write
1A84E299000
heap
page read and write
1A859BE3000
trusted library allocation
page read and write
1A858936000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A8613F6000
trusted library allocation
page read and write
1A8585B2000
trusted library allocation
page read and write
1A85ABCA000
trusted library allocation
page read and write
1A8544EA000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A857EAD000
trusted library allocation
page read and write
1A85717E000
trusted library allocation
page read and write
1A858191000
trusted library allocation
page read and write
1A8575FB000
trusted library allocation
page read and write
1A8589DB000
trusted library allocation
page read and write
1A8557F4000
trusted library allocation
page read and write
1A859B76000
trusted library allocation
page read and write
1A85F361000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A85FCED000
trusted library allocation
page read and write
1A8587D7000
trusted library allocation
page read and write
1A857DBA000
trusted library allocation
page read and write
3D3EE4D03000
trusted library allocation
page read and write
1A854D6A000
trusted library allocation
page read and write
905357E000
stack
page read and write
7C281CE000
unkown
page readonly
1A85AB5B000
trusted library allocation
page read and write
1A862589000
trusted library allocation
page read and write
1A858D95000
trusted library allocation
page read and write
1A8544EA000
trusted library allocation
page read and write
1A84E297000
heap
page read and write
1A84E294000
heap
page read and write
1A8549D6000
trusted library allocation
page read and write
1A8557F2000
trusted library allocation
page read and write
1A8587A9000
trusted library allocation
page read and write
1A858747000
trusted library allocation
page read and write
1A84E27F000
heap
page read and write
2190F309000
heap
page read and write
1A858768000
trusted library allocation
page read and write
1A8612F7000
trusted library allocation
page read and write
1A858A55000
trusted library allocation
page read and write
1A854CB2000
heap
page read and write
1A84E26A000
heap
page read and write
1A86131E000
trusted library allocation
page read and write
1A8612DF000
trusted library allocation
page read and write
1A8629A6000
trusted library allocation
page read and write
1A85AE2B000
trusted library allocation
page read and write
1A85F98D000
trusted library allocation
page read and write
1A85719A000
trusted library allocation
page read and write
1A85818B000
trusted library allocation
page read and write
1A8545A2000
trusted library allocation
page read and write
1A85F7D0000
trusted library allocation
page read and write
1A85F4B1000
trusted library allocation
page read and write
1A858D9B000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A858DC5000
trusted library allocation
page read and write
1A854D3B000
trusted library allocation
page read and write
1A857E15000
trusted library allocation
page read and write
2190F3E1000
heap
page read and write
1A859083000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A857FEB000
trusted library allocation
page read and write
1A84E2DD000
heap
page read and write
1A85F644000
trusted library allocation
page read and write
1A856EDB000
trusted library allocation
page read and write
20D1A4EB000
trusted library allocation
page read and write
1A84E27F000
heap
page read and write
1A858745000
trusted library allocation
page read and write
1A852CC3000
trusted library allocation
page read and write
1A858BF5000
trusted library allocation
page read and write
1A861255000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A8581A9000
trusted library allocation
page read and write
1A857F33000
trusted library allocation
page read and write
1A858191000
trusted library allocation
page read and write
1A858759000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A853326000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8586DC000
trusted library allocation
page read and write
1A854DCE000
trusted library allocation
page read and write
1A857E75000
trusted library allocation
page read and write
1A862971000
trusted library allocation
page read and write
1A862565000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
2190F3EB000
heap
page read and write
1A859BFE000
trusted library allocation
page read and write
1A8544F8000
trusted library allocation
page read and write
1A84E2B6000
heap
page read and write
1A85813E000
trusted library allocation
page read and write
1A85F620000
trusted library allocation
page read and write
1A84E2A5000
heap
page read and write
1A858AFD000
trusted library allocation
page read and write
1A858BC0000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A85AE29000
trusted library allocation
page read and write
1A857EB6000
trusted library allocation
page read and write
21592398000
heap
page read and write
1A84E27A000
heap
page read and write
1A85ABF5000
trusted library allocation
page read and write
1A85728A000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E2E3000
heap
page read and write
1A84E28A000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2E0000
heap
page read and write
1A84E290000
heap
page read and write
1A85F5B6000
trusted library allocation
page read and write
2359CC30000
trusted library allocation
page read and write
1A85F2C6000
trusted library allocation
page read and write
B513D7E000
stack
page read and write
1A8572D8000
trusted library allocation
page read and write
1A858DAB000
trusted library allocation
page read and write
1A85A8A6000
trusted library allocation
page read and write
1A85F587000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A854237000
trusted library allocation
page read and write
1A862B36000
trusted library allocation
page read and write
2359CD00000
heap
page read and write
1A84E280000
heap
page read and write
1A8557CB000
trusted library allocation
page read and write
1A8590D0000
trusted library allocation
page read and write
1A857FEB000
trusted library allocation
page read and write
1A858DB4000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E285000
heap
page read and write
1A86294E000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E264000
heap
page read and write
1A857EB1000
trusted library allocation
page read and write
1A85ABF7000
trusted library allocation
page read and write
1A8585E2000
trusted library allocation
page read and write
1A85ABDC000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
2190F421000
heap
page read and write
1A85AF00000
trusted library allocation
page read and write
2190F421000
heap
page read and write
1A85F97E000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E292000
heap
page read and write
1A8589DF000
trusted library allocation
page read and write
1A85F4DE000
trusted library allocation
page read and write
1A85F6C2000
trusted library allocation
page read and write
1A858A9E000
trusted library allocation
page read and write
1A85F9B2000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A84E27A000
heap
page read and write
2190E823000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
1A84E2D0000
heap
page read and write
1A84E290000
heap
page read and write
2190E744000
heap
page read and write
1A84E27A000
heap
page read and write
1A854DA5000
trusted library allocation
page read and write
1A85716A000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A84E26D000
heap
page read and write
1A84E2CF000
heap
page read and write
1A858E71000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A858599000
trusted library allocation
page read and write
1A85F6A3000
trusted library allocation
page read and write
1A8586F8000
trusted library allocation
page read and write
1A858AFA000
trusted library allocation
page read and write
1A857D73000
trusted library allocation
page read and write
1A8581C3000
trusted library allocation
page read and write
1A858D95000
trusted library allocation
page read and write
1A85758B000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E299000
heap
page read and write
1A85AEFB000
trusted library allocation
page read and write
1A854DCE000
trusted library allocation
page read and write
1A854564000
trusted library allocation
page read and write
1A856E4C000
trusted library allocation
page read and write
1A862C3E000
heap
page read and write
1A857EBC000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85728E000
trusted library allocation
page read and write
1A85F737000
trusted library allocation
page read and write
1A8575E3000
trusted library allocation
page read and write
1A85463A000
trusted library allocation
page read and write
2359CF00000
trusted library allocation
page read and write
1A85FC1B000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
1A84E2DA000
heap
page read and write
1A860EB4000
trusted library allocation
page read and write
1A858A55000
trusted library allocation
page read and write
1A857EB6000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A857667000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A85498F000
trusted library allocation
page read and write
1A85F4D4000
trusted library allocation
page read and write
1A8587ED000
trusted library allocation
page read and write
20D1A600000
trusted library allocation
page read and write
1A8572FC000
trusted library allocation
page read and write
1A8624DD000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A858A4E000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A8590D8000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A8613D6000
trusted library allocation
page read and write
1A8557EE000
trusted library allocation
page read and write
2190E4B0000
heap
page read and write
1A8581A3000
trusted library allocation
page read and write
2359CC11000
trusted library allocation
page read and write
1A860F04000
trusted library allocation
page read and write
1A85874C000
trusted library allocation
page read and write
1A85C002000
trusted library allocation
page read and write
1A858D9B000
trusted library allocation
page read and write
1A858794000
trusted library allocation
page read and write
1A8578B7000
trusted library allocation
page read and write
1A85A9F6000
trusted library allocation
page read and write
1A84E2BE000
heap
page read and write
2190F3E0000
heap
page read and write
1A857FA3000
trusted library allocation
page read and write
2190F3E8000
heap
page read and write
1A8624C9000
trusted library allocation
page read and write
1A852CDF000
trusted library allocation
page read and write
1A862200000
trusted library allocation
page read and write
1A85F6E4000
trusted library allocation
page read and write
1A85F9BD000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A85A9D8000
trusted library allocation
page read and write
1A85F3F1000
trusted library allocation
page read and write
1A857FDA000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
21590830000
heap
page read and write
1A854D9E000
trusted library allocation
page read and write
1A8545DD000
trusted library allocation
page read and write
1A8542F5000
trusted library allocation
page read and write
1A8619CD000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A84E2B2000
heap
page read and write
1A85788A000
trusted library allocation
page read and write
1A85441E000
trusted library allocation
page read and write
1A858DED000
trusted library allocation
page read and write
1A85782D000
trusted library allocation
page read and write
2190F444000
heap
page read and write
1A8545F8000
trusted library allocation
page read and write
1A859BD4000
trusted library allocation
page read and write
2190E82F000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A858577000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A857E6F000
trusted library allocation
page read and write
1A86135D000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
2190F22D000
trusted library allocation
page read and write
1A85A96C000
trusted library allocation
page read and write
1A84E2A3000
heap
page read and write
1A84E289000
heap
page read and write
1A84E2AF000
heap
page read and write
1A85F69A000
trusted library allocation
page read and write
2359CC72000
trusted library allocation
page read and write
1A854DA5000
trusted library allocation
page read and write
1A862C71000
heap
page read and write
1A859B7F000
trusted library allocation
page read and write
1A85F6F2000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
D74000
heap
page read and write
1A857D73000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8578B7000
trusted library allocation
page read and write
1A85F6B9000
trusted library allocation
page read and write
1A85F9C1000
trusted library allocation
page read and write
1A8587CC000
trusted library allocation
page read and write
1A85FCE3000
trusted library allocation
page read and write
1A85F6B9000
trusted library allocation
page read and write
1A85F6BD000
trusted library allocation
page read and write
1A8589D3000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
1A85F74B000
trusted library allocation
page read and write
1A858DF2000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A86257F000
trusted library allocation
page read and write
1A84E2AD000
heap
page read and write
1A8598CD000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
F79000
heap
page read and write
1A8576F0000
trusted library allocation
page read and write
1A858521000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
20D1A540000
unclassified section
page read and write
1A8581D8000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E295000
heap
page read and write
1A857284000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A862B96000
trusted library allocation
page read and write
1A858D6D000
trusted library allocation
page read and write
2359CC8F000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E2E3000
heap
page read and write
1A858A49000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
20D1A54F000
unclassified section
page read and write
1A861314000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
2159074F000
heap
page read and write
1A84E2AC000
heap
page read and write
1A85F632000
trusted library allocation
page read and write
1A857E79000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A858777000
trusted library allocation
page read and write
1A85AB45000
trusted library allocation
page read and write
1A84E2EA000
heap
page read and write
1A84E2AC000
heap
page read and write
1A84E2D0000
heap
page read and write
1A85A94D000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
2359C740000
unclassified section
page readonly
1A858169000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
1A84E281000
heap
page read and write
1A8581F9000
trusted library allocation
page read and write
1A8589DB000
trusted library allocation
page read and write
1A85A8C9000
trusted library allocation
page read and write
299D7FE000
stack
page read and write
1A84E299000
heap
page read and write
1A856EE7000
trusted library allocation
page read and write
2190F3F1000
heap
page read and write
2190F360000
heap
page read and write
1A8597F3000
trusted library allocation
page read and write
20D1A632000
trusted library allocation
page read and write
1A859DA1000
trusted library allocation
page read and write
1A85AB34000
trusted library allocation
page read and write
1A857E82000
trusted library allocation
page read and write
1A8589EE000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E2D7000
heap
page read and write
F81000
heap
page read and write
1A84E2CF000
heap
page read and write
1A8587AD000
trusted library allocation
page read and write
1A8612E5000
trusted library allocation
page read and write
1A8572BB000
trusted library allocation
page read and write
1A858E83000
trusted library allocation
page read and write
B5147D8000
stack
page read and write
1A8612DF000
trusted library allocation
page read and write
20D1A403000
trusted library allocation
page read and write
1A858663000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A858DC0000
trusted library allocation
page read and write
2190F37F000
heap
page read and write
1A84E2A0000
heap
page read and write
1A858DC0000
trusted library allocation
page read and write
1A8625DA000
trusted library allocation
page read and write
B5157FE000
stack
page read and write
1A84E2D8000
heap
page read and write
20D1A0D0000
unclassified section
page readonly
1A8585F5000
trusted library allocation
page read and write
1A85F9FC000
trusted library allocation
page read and write
1A85F3DC000
trusted library allocation
page read and write
1A85F372000
trusted library allocation
page read and write
1A85723B000
trusted library allocation
page read and write
1A859754000
trusted library allocation
page read and write
1A858E65000
trusted library allocation
page read and write
1A8599FB000
trusted library allocation
page read and write
1A85F9A9000
trusted library allocation
page read and write
1A8624EA000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E2AF000
heap
page read and write
1A858757000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A859B6C000
trusted library allocation
page read and write
2190F1B6000
unkown
page execute read
F8C000
heap
page read and write
1A84E27A000
heap
page read and write
1A84E2AC000
heap
page read and write
1A862B2C000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E2EE000
heap
page read and write
1A84E285000
heap
page read and write
1A84E28A000
heap
page read and write
1A84E26D000
heap
page read and write
1A858DF2000
trusted library allocation
page read and write
1A862871000
trusted library allocation
page read and write
1A8587B0000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E29F000
heap
page read and write
1A861337000
trusted library allocation
page read and write
1A854DA5000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2D7000
heap
page read and write
1A85448E000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E266000
heap
page read and write
1A854539000
trusted library allocation
page read and write
1A85F750000
trusted library allocation
page read and write
1A85F3C4000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A857EB1000
trusted library allocation
page read and write
1A85A9FE000
trusted library allocation
page read and write
2190F3E3000
heap
page read and write
2190F3EB000
heap
page read and write
1A862432000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
2359C7BB000
remote allocation
page execute read
1A858587000
trusted library allocation
page read and write
1A8581A7000
trusted library allocation
page read and write
2190E89F000
trusted library allocation
page read and write
1A862879000
trusted library allocation
page read and write
2190E810000
trusted library allocation
page read and write
1A85A88F000
trusted library allocation
page read and write
1A85F740000
trusted library allocation
page read and write
2190F444000
heap
page read and write
1A8545F3000
trusted library allocation
page read and write
F7C000
heap
page read and write
1A84E2DA000
heap
page read and write
1A84E28B000
heap
page read and write
1A857DA0000
trusted library allocation
page read and write
1A86136F000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A857FF1000
trusted library allocation
page read and write
1A857287000
trusted library allocation
page read and write
1A858548000
trusted library allocation
page read and write
90513D8000
stack
page read and write
1A8549BF000
trusted library allocation
page read and write
1A859935000
trusted library allocation
page read and write
1A858A02000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A8589D6000
trusted library allocation
page read and write
1A85872B000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A858775000
trusted library allocation
page read and write
1A854D8E000
trusted library allocation
page read and write
1A862602000
trusted library allocation
page read and write
1A8628F6000
trusted library allocation
page read and write
2190E5E0000
heap
page read and write
2190E819000
trusted library allocation
page read and write
1A858ADA000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A84E2DA000
heap
page read and write
1A86124A000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A854496000
trusted library allocation
page read and write
1A8588B1000
trusted library allocation
page read and write
1A8599CD000
trusted library allocation
page read and write
1A854CAE000
heap
page read and write
1A84E280000
heap
page read and write
1A85F7F7000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A85ABE1000
trusted library allocation
page read and write
1A85A838000
trusted library allocation
page read and write
1A84E305000
heap
page read and write
1A85F547000
trusted library allocation
page read and write
1A857FFC000
trusted library allocation
page read and write
1A85F6E4000
trusted library allocation
page read and write
1A862C6B000
heap
page read and write
2190E762000
unclassified section
page read and write
1A858B3B000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A85AB64000
trusted library allocation
page read and write
1A85ADD8000
trusted library allocation
page read and write
1A857EB6000
trusted library allocation
page read and write
20D1A4A7000
trusted library allocation
page read and write
20D1A0C0000
unclassified section
page readonly
1A85876B000
trusted library allocation
page read and write
1A8612B2000
trusted library allocation
page read and write
1A858A4E000
trusted library allocation
page read and write
1A861282000
trusted library allocation
page read and write
1A858563000
trusted library allocation
page read and write
1A859B9B000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A857827000
trusted library allocation
page read and write
1A858AE8000
trusted library allocation
page read and write
1A85717C000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
35887BF03000
trusted library allocation
page read and write
1A857E75000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A84E2A6000
heap
page read and write
1A84E2DC000
heap
page read and write
1A85F589000
trusted library allocation
page read and write
1A8572BB000
trusted library allocation
page read and write
1A84E2F3000
heap
page read and write
1A84E2EE000
heap
page read and write
1A8587B5000
trusted library allocation
page read and write
1A8544E8000
trusted library allocation
page read and write
2190F46C000
heap
page read and write
1A85895A000
trusted library allocation
page read and write
1A8589C0000
trusted library allocation
page read and write
1A8572C7000
trusted library allocation
page read and write
1A859D8A000
trusted library allocation
page read and write
1A858AE8000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A85992F000
trusted library allocation
page read and write
1A859DD3000
trusted library allocation
page read and write
1A857178000
trusted library allocation
page read and write
43C000
unkown
page readonly
1A8549D9000
trusted library allocation
page read and write
20D1A461000
trusted library allocation
page read and write
1A85F72E000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A859D20000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85F3FB000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
F9A000
heap
page read and write
1A86240F000
trusted library allocation
page read and write
1A857EA8000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E2D2000
heap
page read and write
1A854D9E000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A857E93000
trusted library allocation
page read and write
1A854D9E000
trusted library allocation
page read and write
1A85F68A000
trusted library allocation
page read and write
1A85F7DD000
trusted library allocation
page read and write
1A857E73000
trusted library allocation
page read and write
7C2818C000
stack
page read and write
3DE19FA000
stack
page read and write
1A85F56E000
trusted library allocation
page read and write
1A858B4F000
trusted library allocation
page read and write
1A8575E6000
trusted library allocation
page read and write
1A85F6F2000
trusted library allocation
page read and write
1A858E7F000
trusted library allocation
page read and write
1A85AE9D000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85F3C6000
trusted library allocation
page read and write
1A854DCE000
trusted library allocation
page read and write
1A85818B000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A858168000
trusted library allocation
page read and write
1A854981000
trusted library allocation
page read and write
B513CFD000
stack
page read and write
1A8549AB000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
20D1A4A5000
trusted library allocation
page read and write
1A85F3F8000
trusted library allocation
page read and write
1A857D56000
trusted library allocation
page read and write
1A858B15000
trusted library allocation
page read and write
2190E8BA000
trusted library allocation
page read and write
1A85A88B000
trusted library allocation
page read and write
1A859BD4000
trusted library allocation
page read and write
21590700000
heap
page read and write
1A862579000
trusted library allocation
page read and write
2359CCC4000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A84E295000
heap
page read and write
1A854627000
trusted library allocation
page read and write
1A8581A3000
trusted library allocation
page read and write
1A85A821000
trusted library allocation
page read and write
1A862867000
trusted library allocation
page read and write
1A859C13000
trusted library allocation
page read and write
2190E5C0000
heap
page read and write
1A8533FB000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
380000
heap
page read and write
1A858941000
trusted library allocation
page read and write
2359CC69000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
2190F3E3000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E28A000
heap
page read and write
1A860EB1000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A84E295000
heap
page read and write
1A857579000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A854D8A000
trusted library allocation
page read and write
1A858B22000
trusted library allocation
page read and write
1A85ABC2000
trusted library allocation
page read and write
1A852CEF000
trusted library allocation
page read and write
20D1A45B000
trusted library allocation
page read and write
D74000
heap
page read and write
1A84E280000
heap
page read and write
1A84E289000
heap
page read and write
1A8575F0000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A8589C8000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A8585A0000
trusted library allocation
page read and write
1A84E27C000
heap
page read and write
1A85F281000
trusted library allocation
page read and write
1A85A984000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A857EEF000
trusted library allocation
page read and write
1A8572D8000
trusted library allocation
page read and write
1A861388000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A8589D3000
trusted library allocation
page read and write
20D1A4C8000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A8575F4000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A859B93000
trusted library allocation
page read and write
1A858587000
trusted library allocation
page read and write
1A8533D2000
trusted library allocation
page read and write
1A84E2E0000
heap
page read and write
20D1A700000
heap
page read and write
1A84E2A5000
heap
page read and write
1A84E2AC000
heap
page read and write
43C000
unkown
page readonly
1A858768000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A856E60000
trusted library allocation
page read and write
1A857F28000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
1A858BB0000
trusted library allocation
page read and write
1A8581EB000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A858ADA000
trusted library allocation
page read and write
1A854224000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E282000
heap
page read and write
1A84E2A3000
heap
page read and write
1A862D53000
heap
page read and write
1A8578B5000
trusted library allocation
page read and write
1A85F645000
trusted library allocation
page read and write
1A862C4D000
heap
page read and write
1A84E285000
heap
page read and write
1A853375000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A862434000
trusted library allocation
page read and write
1A857287000
trusted library allocation
page read and write
7C2ACFE000
stack
page read and write
1A86139D000
trusted library allocation
page read and write
1A858EBB000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E295000
heap
page read and write
1A854963000
trusted library allocation
page read and write
1A85AACE000
trusted library allocation
page read and write
1A862581000
trusted library allocation
page read and write
1A85F63E000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E264000
heap
page read and write
1A84E2E6000
heap
page read and write
1A84E2E2000
heap
page read and write
1A8575B9000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A859DF1000
trusted library allocation
page read and write
1A858BFB000
trusted library allocation
page read and write
1A85F4D6000
trusted library allocation
page read and write
1A85F71F000
trusted library allocation
page read and write
1A859BFE000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
2190F1D0000
trusted library allocation
page read and write
F78000
heap
page read and write
1A85F6B3000
trusted library allocation
page read and write
2190F46C000
heap
page read and write
1A85F485000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
2190F36C000
heap
page read and write
2359CCA2000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A858A3F000
trusted library allocation
page read and write
1A858A55000
trusted library allocation
page read and write
1A859DB3000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
20D1A173000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E2DC000
heap
page read and write
1A859BFB000
trusted library allocation
page read and write
1A86121A000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
46C000
unkown
page read and write
1A858967000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A859D39000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85A831000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A84E2DC000
heap
page read and write
1A8578FC000
trusted library allocation
page read and write
1A84E2D4000
heap
page read and write
1A859B8F000
trusted library allocation
page read and write
1A858A4E000
trusted library allocation
page read and write
1A857F2A000
trusted library allocation
page read and write
1A8587AC000
trusted library allocation
page read and write
1A85ABCA000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A858E2F000
trusted library allocation
page read and write
1A85F4DA000
trusted library allocation
page read and write
1A8575EB000
trusted library allocation
page read and write
1A854CAC000
heap
page read and write
1A84E294000
heap
page read and write
1A857FD0000
trusted library allocation
page read and write
1A862C36000
heap
page read and write
1A858551000
trusted library allocation
page read and write
1A8587D0000
trusted library allocation
page read and write
1A858560000
trusted library allocation
page read and write
1A85AB69000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A85F620000
trusted library allocation
page read and write
1A858567000
trusted library allocation
page read and write
1A85AD1A000
trusted library allocation
page read and write
1A84E2B7000
heap
page read and write
1A85875B000
trusted library allocation
page read and write
1A857E81000
trusted library allocation
page read and write
1A857190000
trusted library allocation
page read and write
2190F479000
heap
page read and write
1A858169000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A8572B8000
trusted library allocation
page read and write
1A85A9D5000
trusted library allocation
page read and write
7C2A4FE000
unkown
page readonly
1A85F6E6000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A857AB7000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E28A000
heap
page read and write
1A859B6C000
trusted library allocation
page read and write
1A858539000
trusted library allocation
page read and write
1A85F54D000
trusted library allocation
page read and write
1A8589BD000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A84E2DC000
heap
page read and write
1A85449F000
trusted library allocation
page read and write
1A85F2A8000
trusted library allocation
page read and write
1A85F587000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A857DAB000
trusted library allocation
page read and write
1A84E2EE000
heap
page read and write
1A859B4D000
trusted library allocation
page read and write
1A854561000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E264000
heap
page read and write
1A85813E000
trusted library allocation
page read and write
1A857F90000
trusted library allocation
page read and write
1A8544E8000
trusted library allocation
page read and write
1A85F9FC000
trusted library allocation
page read and write
1A85712F000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
2190F35C000
heap
page read and write
1A859AFB000
trusted library allocation
page read and write
1A858D8B000
trusted library allocation
page read and write
1A85454D000
trusted library allocation
page read and write
F88000
heap
page read and write
1A8586C5000
trusted library allocation
page read and write
1A85337D000
trusted library allocation
page read and write
1A85F74E000
trusted library allocation
page read and write
1A86127A000
trusted library allocation
page read and write
2190F458000
heap
page read and write
1A85788B000
trusted library allocation
page read and write
1A857E7D000
trusted library allocation
page read and write
1A859BE3000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A859BFE000
trusted library allocation
page read and write
1A85F6D2000
trusted library allocation
page read and write
1A856EE0000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A859BFB000
trusted library allocation
page read and write
1A858B2D000
trusted library allocation
page read and write
1A85FCA6000
trusted library allocation
page read and write
1A84E2A5000
heap
page read and write
1A857873000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A84E2A6000
heap
page read and write
1A858DAB000
trusted library allocation
page read and write
1A860E89000
trusted library allocation
page read and write
1A85F4DC000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2DC000
heap
page read and write
1A84E295000
heap
page read and write
1A84E2B7000
heap
page read and write
1A84E2BE000
heap
page read and write
1A84E292000
heap
page read and write
1A8571F3000
trusted library allocation
page read and write
1A8629C3000
trusted library allocation
page read and write
190CFD00000
trusted library allocation
page read and write
1A85F6D2000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A85813B000
trusted library allocation
page read and write
1A857EAD000
trusted library allocation
page read and write
1A85F610000
trusted library allocation
page read and write
1A8589E4000
trusted library allocation
page read and write
1A853313000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
2159072A000
heap
page read and write
1A85A9AC000
trusted library allocation
page read and write
1A857FEA000
trusted library allocation
page read and write
1A85710E000
trusted library allocation
page read and write
1A85F63E000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A8588C8000
trusted library allocation
page read and write
1A8613AE000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A8544D6000
trusted library allocation
page read and write
1A85F570000
trusted library allocation
page read and write
1A858761000
trusted library allocation
page read and write
2190F3EB000
heap
page read and write
1A857A68000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A85F9A9000
trusted library allocation
page read and write
1A85F669000
trusted library allocation
page read and write
3591000
heap
page read and write
1A84E293000
heap
page read and write
1A8586F9000
trusted library allocation
page read and write
1A857A6D000
trusted library allocation
page read and write
1A857E9E000
trusted library allocation
page read and write
2190F444000
heap
page read and write
1A84E2D1000
heap
page read and write
1A84E289000
heap
page read and write
1A859B8F000
trusted library allocation
page read and write
1A860E5C000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A85ABAF000
trusted library allocation
page read and write
F82000
heap
page read and write
1A858B75000
trusted library allocation
page read and write
1A84E2EE000
heap
page read and write
F72000
heap
page read and write
1A857EA1000
trusted library allocation
page read and write
1A857EB1000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A8589E4000
trusted library allocation
page read and write
1A85F7D0000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A85F2A8000
trusted library allocation
page read and write
1A857E9B000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A85854C000
trusted library allocation
page read and write
2190F3FD000
heap
page read and write
1A85F9EA000
trusted library allocation
page read and write
1A857FD8000
trusted library allocation
page read and write
1A854D9E000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E280000
heap
page read and write
1A84E292000
heap
page read and write
1A85A980000
trusted library allocation
page read and write
1A85723D000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A857F90000
trusted library allocation
page read and write
1A85A9B2000
trusted library allocation
page read and write
2190F444000
heap
page read and write
1A8544E4000
trusted library allocation
page read and write
1A856E4C000
trusted library allocation
page read and write
9052BFE000
unkown
page readonly
1A858515000
trusted library allocation
page read and write
1A85AEF0000
trusted library allocation
page read and write
1A858ED5000
trusted library allocation
page read and write
1A857151000
trusted library allocation
page read and write
BCE000
stack
page read and write
1A8578EC000
trusted library allocation
page read and write
1A858775000
trusted library allocation
page read and write
1A857EEF000
trusted library allocation
page read and write
1A85A932000
trusted library allocation
page read and write
1A8628F8000
trusted library allocation
page read and write
1A85F4D8000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A85AD2D000
trusted library allocation
page read and write
1A85A9AF000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A84E2DC000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E2E6000
heap
page read and write
1A84E26D000
heap
page read and write
2359CC03000
trusted library allocation
page read and write
2190F477000
heap
page read and write
1A85F2D8000
trusted library allocation
page read and write
1A85AE1A000
trusted library allocation
page read and write
2190E490000
heap
page read and write
1A84E295000
heap
page read and write
1A8589E2000
trusted library allocation
page read and write
1A858DC7000
trusted library allocation
page read and write
1A85AE2D000
trusted library allocation
page read and write
2190F3A1000
heap
page read and write
1A84E295000
heap
page read and write
1A84E299000
heap
page read and write
2190F3F1000
heap
page read and write
2359CB00000
unclassified section
page readonly
1A856E60000
trusted library allocation
page read and write
20D1A150000
unclassified section
page readonly
1A85984C000
trusted library allocation
page read and write
1A857FDA000
trusted library allocation
page read and write
1A85F4FE000
trusted library allocation
page read and write
1A85F563000
trusted library allocation
page read and write
1A8589E4000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A84E2DF000
heap
page read and write
1A84E279000
heap
page read and write
1A8578B5000
trusted library allocation
page read and write
1A85F985000
trusted library allocation
page read and write
1A859873000
trusted library allocation
page read and write
1A858759000
trusted library allocation
page read and write
1A84E27B000
heap
page read and write
1A84E2EF000
heap
page read and write
1A84E285000
heap
page read and write
1A84E26D000
heap
page read and write
1A84E280000
heap
page read and write
1A858695000
trusted library allocation
page read and write
F8E000
heap
page read and write
1A85F61E000
trusted library allocation
page read and write
1A85F654000
trusted library allocation
page read and write
1A859B9B000
trusted library allocation
page read and write
1A857EAD000
trusted library allocation
page read and write
1A857D8C000
trusted library allocation
page read and write
1A861258000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A858D80000
trusted library allocation
page read and write
1A85498F000
trusted library allocation
page read and write
1A8619D9000
trusted library allocation
page read and write
1A854638000
trusted library allocation
page read and write
1A85F5B6000
trusted library allocation
page read and write
1A862429000
trusted library allocation
page read and write
1A8613E4000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A854481000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
1A84E2DC000
heap
page read and write
190CFC00000
heap
page read and write
1A85F72A000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A859AFB000
trusted library allocation
page read and write
1A85A7F4000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E26D000
heap
page read and write
1A862562000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A858FF1000
trusted library allocation
page read and write
1A85AEF0000
trusted library allocation
page read and write
1A8585AD000
trusted library allocation
page read and write
20D1A550000
heap
page read and write
1A85AB5C000
trusted library allocation
page read and write
1A85F4E0000
trusted library allocation
page read and write
1A85F716000
trusted library allocation
page read and write
1A8619EE000
trusted library allocation
page read and write
1A85F633000
trusted library allocation
page read and write
1A854281000
trusted library allocation
page read and write
1A8589D0000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A84E29D000
heap
page read and write
1A85F5B6000
trusted library allocation
page read and write
1A8599F4000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A84E2D8000
heap
page read and write
1A85F48D000
trusted library allocation
page read and write
1A854564000
trusted library allocation
page read and write
1A858879000
trusted library allocation
page read and write
1A85F3D4000
trusted library allocation
page read and write
1A8587CC000
trusted library allocation
page read and write
1A857258000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A858E65000
trusted library allocation
page read and write
1A85F2F7000
trusted library allocation
page read and write
1A862556000
trusted library allocation
page read and write
1A8544EF000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A84E283000
heap
page read and write
190CFF00000
trusted library allocation
page read and write
1A858F68000
trusted library allocation
page read and write
1A85F9DF000
trusted library allocation
page read and write
1A85F3ED000
trusted library allocation
page read and write
1A858781000
trusted library allocation
page read and write
1A858A4E000
trusted library allocation
page read and write
2190F458000
heap
page read and write
2159073D000
heap
page read and write
1A857D80000
trusted library allocation
page read and write
1A858569000
trusted library allocation
page read and write
1A859B97000
trusted library allocation
page read and write
2359CC13000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
2159238B000
heap
page read and write
1A8589E4000
trusted library allocation
page read and write
1A857E5E000
trusted library allocation
page read and write
1A84E275000
heap
page read and write
3DE31FE000
stack
page read and write
1A84E2D3000
heap
page read and write
1A859A33000
trusted library allocation
page read and write
1A857E9E000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A858B27000
trusted library allocation
page read and write
1A859B47000
trusted library allocation
page read and write
1A84E2B6000
heap
page read and write
1A84E26D000
heap
page read and write
20D1A472000
trusted library allocation
page read and write
1A862CA2000
heap
page read and write
1A84E281000
heap
page read and write
1A862C45000
heap
page read and write
1A8625C7000
trusted library allocation
page read and write
1A85AEC1000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A858DED000
trusted library allocation
page read and write
21590860000
heap
page read and write
1A85A989000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A8629A6000
trusted library allocation
page read and write
1A8575D0000
trusted library allocation
page read and write
1A8544AA000
trusted library allocation
page read and write
1A8587ED000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
1A858D6D000
trusted library allocation
page read and write
1A858599000
trusted library allocation
page read and write
20D1A61E000
trusted library allocation
page read and write
1A859AC5000
trusted library allocation
page read and write
1A84E2E7000
heap
page read and write
1A84E264000
heap
page read and write
1A84E2DD000
heap
page read and write
1A858D95000
trusted library allocation
page read and write
1A859748000
trusted library allocation
page read and write
1A8629C3000
trusted library allocation
page read and write
7C2A478000
stack
page read and write
1A84E2DC000
heap
page read and write
1A85871D000
trusted library allocation
page read and write
1A8589B0000
trusted library allocation
page read and write
1A84E2AD000
heap
page read and write
21592397000
heap
page read and write
F9A000
heap
page read and write
1A84E2DA000
heap
page read and write
1A8612AA000
trusted library allocation
page read and write
1A8590D0000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
2190F3E6000
heap
page read and write
1A8589C8000
trusted library allocation
page read and write
1A8613B5000
trusted library allocation
page read and write
1A85F7D0000
trusted library allocation
page read and write
1A85F369000
trusted library allocation
page read and write
1A858DC7000
trusted library allocation
page read and write
1A8545A2000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
20D1A496000
trusted library allocation
page read and write
1A8575F0000
trusted library allocation
page read and write
1A85F612000
trusted library allocation
page read and write
1A85A9AC000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A85AE31000
trusted library allocation
page read and write
1A862800000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A856E33000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A8590A5000
trusted library allocation
page read and write
1A85818B000
trusted library allocation
page read and write
1A85A9EA000
trusted library allocation
page read and write
1A852C98000
trusted library allocation
page read and write
1A85F563000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A85876C000
trusted library allocation
page read and write
1A85ABB8000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
3591000
heap
page read and write
2359CC78000
trusted library allocation
page read and write
20D1A42E000
trusted library allocation
page read and write
1A858E78000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A857841000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A86295E000
trusted library allocation
page read and write
1A857EB9000
trusted library allocation
page read and write
20D1A620000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A85866F000
trusted library allocation
page read and write
1A858FF1000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A85F620000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A84E2AC000
heap
page read and write
1A84E280000
heap
page read and write
1A85F589000
trusted library allocation
page read and write
1A85F997000
trusted library allocation
page read and write
1A854497000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A8576FB000
trusted library allocation
page read and write
1A85AE67000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A84E2D2000
heap
page read and write
1A8628F4000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A84E28A000
heap
page read and write
1A85F724000
trusted library allocation
page read and write
1A858742000
trusted library allocation
page read and write
1A858569000
trusted library allocation
page read and write
1A858883000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85F7D0000
trusted library allocation
page read and write
1A8572FC000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A862589000
trusted library allocation
page read and write
1A84E293000
heap
page read and write
1A85AB39000
trusted library allocation
page read and write
1A85F587000
trusted library allocation
page read and write
1A858925000
trusted library allocation
page read and write
1A85A967000
trusted library allocation
page read and write
1A8572FC000
trusted library allocation
page read and write
1A8549D9000
trusted library allocation
page read and write
1A86134F000
trusted library allocation
page read and write
1A8575E5000
trusted library allocation
page read and write
1A857E79000
trusted library allocation
page read and write
1A858A71000
trusted library allocation
page read and write
1A854CD1000
heap
page read and write
1A857E30000
trusted library allocation
page read and write
1A85F7FB000
trusted library allocation
page read and write
1A854D5A000
trusted library allocation
page read and write
1A858EEE000
trusted library allocation
page read and write
1A85AEFB000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
1A8542E9000
trusted library allocation
page read and write
1A84E2DD000
heap
page read and write
1A84E2DA000
heap
page read and write
1A8581A7000
trusted library allocation
page read and write
1A862413000
trusted library allocation
page read and write
1A8549CD000
trusted library allocation
page read and write
1A858DFC000
trusted library allocation
page read and write
1A858152000
trusted library allocation
page read and write
1A858153000
trusted library allocation
page read and write
1A8585DF000
trusted library allocation
page read and write
1A862885000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A8625E5000
trusted library allocation
page read and write
1A858A7D000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
2190F301000
heap
page read and write
1A85F4A2000
trusted library allocation
page read and write
1A859B43000
trusted library allocation
page read and write
1A858536000
trusted library allocation
page read and write
1A85F27F000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A8619DC000
trusted library allocation
page read and write
1A859AF8000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A862400000
trusted library allocation
page read and write
20D1A170000
heap
page read and write
1A8625DE000
trusted library allocation
page read and write
1A85F2D4000
trusted library allocation
page read and write
1A854549000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
2359C730000
unclassified section
page readonly
1A84E292000
heap
page read and write
1A858AFD000
trusted library allocation
page read and write
1A85A840000
trusted library allocation
page read and write
F9A000
heap
page read and write
1A84E2D3000
heap
page read and write
1A858D8B000
trusted library allocation
page read and write
1A8589E2000
trusted library allocation
page read and write
1A858718000
trusted library allocation
page read and write
20D1A4CA000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A84E2DA000
heap
page read and write
1A86292D000
trusted library allocation
page read and write
1A85A858000
trusted library allocation
page read and write
1A858759000
trusted library allocation
page read and write
1A8628C3000
trusted library allocation
page read and write
1A85F329000
trusted library allocation
page read and write
1A85F369000
trusted library allocation
page read and write
1A85AB39000
trusted library allocation
page read and write
1A859959000
trusted library allocation
page read and write
20D1A180000
heap
page read and write
1A85F54D000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A8597F3000
trusted library allocation
page read and write
2190E8F3000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
1A854D9E000
trusted library allocation
page read and write
1A84E2B0000
heap
page read and write
1A862C01000
heap
page read and write
1A85A9B5000
trusted library allocation
page read and write
1A85F607000
trusted library allocation
page read and write
1A8589DF000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
1A85ABFA000
trusted library allocation
page read and write
1A84E2AA000
heap
page read and write
1A84E2E8000
heap
page read and write
1A8585C3000
trusted library allocation
page read and write
1A8576F2000
trusted library allocation
page read and write
1A858A59000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E295000
heap
page read and write
1A857A4D000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A859DB3000
trusted library allocation
page read and write
1A859DF1000
trusted library allocation
page read and write
2190E746000
heap
page read and write
1A859BC3000
trusted library allocation
page read and write
1A8585FB000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A854D8D000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A858874000
trusted library allocation
page read and write
1A862C09000
heap
page read and write
1A858173000
trusted library allocation
page read and write
1A8542F1000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A84E2D0000
heap
page read and write
1A854DA5000
trusted library allocation
page read and write
1A859B8F000
trusted library allocation
page read and write
1A8625B8000
trusted library allocation
page read and write
1A858157000
trusted library allocation
page read and write
2190E86A000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2CF000
heap
page read and write
1A8585A7000
trusted library allocation
page read and write
1A8575F3000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2D2000
heap
page read and write
299CFFC000
stack
page read and write
1A85A8F2000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A859D14000
trusted library allocation
page read and write
2359C990000
heap
page readonly
1A84E2DF000
heap
page read and write
1A858E0B000
trusted library allocation
page read and write
FA2000
heap
page read and write
1A84E2DA000
heap
page read and write
1A856E4C000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E295000
heap
page read and write
1A84E28B000
heap
page read and write
1A84E292000
heap
page read and write
1A858B65000
trusted library allocation
page read and write
1A8571CA000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
1A858DEA000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
2190F206000
trusted library allocation
page read and write
1A8575B3000
trusted library allocation
page read and write
1A858E71000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E292000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A857253000
trusted library allocation
page read and write
1A85A989000
trusted library allocation
page read and write
1A84E289000
heap
page read and write
1A84E290000
heap
page read and write
1A85F4DA000
trusted library allocation
page read and write
2359CC67000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
1A859A00000
trusted library allocation
page read and write
1A85ADD2000
trusted library allocation
page read and write
1A86296A000
trusted library allocation
page read and write
1A84E2E7000
heap
page read and write
1A84E2DA000
heap
page read and write
1A84E2D7000
heap
page read and write
1A854257000
trusted library allocation
page read and write
1A859BFE000
trusted library allocation
page read and write
1A85F9B2000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E275000
heap
page read and write
2359CC49000
trusted library allocation
page read and write
1A8571B3000
trusted library allocation
page read and write
1A858157000
trusted library allocation
page read and write
1A85858F000
trusted library allocation
page read and write
1A85728E000
trusted library allocation
page read and write
2190F3E6000
heap
page read and write
1A858E65000
trusted library allocation
page read and write
1A85AD75000
trusted library allocation
page read and write
1A858775000
trusted library allocation
page read and write
1A85ADFB000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2AF000
heap
page read and write
1A858B40000
trusted library allocation
page read and write
1A859BFE000
trusted library allocation
page read and write
1A85F74E000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A85AE73000
trusted library allocation
page read and write
1A858894000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A8544EF000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A858DE6000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A859DD3000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A858ED5000
trusted library allocation
page read and write
1A8581A9000
trusted library allocation
page read and write
1A858179000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A859AFB000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A8587CC000
trusted library allocation
page read and write
1A857833000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A858E13000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A84E2D0000
heap
page read and write
1A84E27A000
heap
page read and write
1A84E295000
heap
page read and write
1A858E71000
trusted library allocation
page read and write
20D1A613000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
1A857D2B000
trusted library allocation
page read and write
1A862D53000
heap
page read and write
1A85FC9E000
trusted library allocation
page read and write
1A858B4F000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85F372000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
2190E8C2000
trusted library allocation
page read and write
1A859D78000
trusted library allocation
page read and write
1A858E2B000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A858147000
trusted library allocation
page read and write
1A8585AA000
trusted library allocation
page read and write
1A85717C000
trusted library allocation
page read and write
1A85498C000
trusted library allocation
page read and write
1A858757000
trusted library allocation
page read and write
1A858759000
trusted library allocation
page read and write
1A862B92000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A859043000
trusted library allocation
page read and write
1A86292F000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E26A000
heap
page read and write
1A85AB19000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
2190F3E8000
heap
page read and write
1A859B4B000
trusted library allocation
page read and write
2190E400000
unclassified section
page readonly
1A84E2DC000
heap
page read and write
1A858AFD000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A8581AD000
trusted library allocation
page read and write
1A84E29E000
heap
page read and write
1A84E27A000
heap
page read and write
1A84E27A000
heap
page read and write
1A85AE5D000
trusted library allocation
page read and write
1A85A8D3000
trusted library allocation
page read and write
1A857A51000
trusted library allocation
page read and write
1A857D32000
trusted library allocation
page read and write
1A859D7E000
trusted library allocation
page read and write
1A8545EB000
trusted library allocation
page read and write
1A862B2E000
trusted library allocation
page read and write
1A8572C9000
trusted library allocation
page read and write
1A85874C000
trusted library allocation
page read and write
1A859883000
trusted library allocation
page read and write
2359C940000
heap
page read and write
1A85F7EE000
trusted library allocation
page read and write
1A859023000
trusted library allocation
page read and write
1A85498C000
trusted library allocation
page read and write
1A862B94000
trusted library allocation
page read and write
1A857839000
trusted library allocation
page read and write
1A857249000
trusted library allocation
page read and write
1A85F926000
trusted library allocation
page read and write
1A859BF4000
trusted library allocation
page read and write
1A85F6C2000
trusted library allocation
page read and write
1A85A970000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A852CB3000
trusted library allocation
page read and write
1A85872E000
trusted library allocation
page read and write
1A8574C3000
trusted library allocation
page read and write
1A8575F0000
trusted library allocation
page read and write
7C2C5FE000
unkown
page readonly
1A85A941000
trusted library allocation
page read and write
1A857138000
trusted library allocation
page read and write
1A8572B3000
trusted library allocation
page read and write
1A856EBC000
trusted library allocation
page read and write
1A857F5C000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
20D1A447000
trusted library allocation
page read and write
1A85F28F000
trusted library allocation
page read and write
1A854D65000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E298000
heap
page read and write
1A8542D3000
trusted library allocation
page read and write
1A8613A4000
trusted library allocation
page read and write
1A858990000
trusted library allocation
page read and write
1A857D6D000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A85A9AF000
trusted library allocation
page read and write
1A85992B000
trusted library allocation
page read and write
1A85ADF5000
trusted library allocation
page read and write
1A857184000
trusted library allocation
page read and write
2190E865000
trusted library allocation
page read and write
2190F37D000
heap
page read and write
1A85F645000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A86127A000
trusted library allocation
page read and write
1A85AEFB000
trusted library allocation
page read and write
20D1A639000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A84E2E5000
heap
page read and write
1A84E280000
heap
page read and write
1A84E2D8000
heap
page read and write
1A85A97A000
trusted library allocation
page read and write
2190E8C7000
trusted library allocation
page read and write
2190F39C000
heap
page read and write
1A8597FC000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A857F9D000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
1A8581D8000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A8587A9000
trusted library allocation
page read and write
F50000
heap
page read and write
1A8575D5000
trusted library allocation
page read and write
1A857EAD000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A8612FB000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85F56C000
trusted library allocation
page read and write
1A857E87000
trusted library allocation
page read and write
1A857F9D000
trusted library allocation
page read and write
1A858DBC000
trusted library allocation
page read and write
1A85ADFB000
trusted library allocation
page read and write
1A858D8A000
trusted library allocation
page read and write
1A859995000
trusted library allocation
page read and write
1A8572C4000
trusted library allocation
page read and write
1A853223000
trusted library allocation
page read and write
1A85F997000
trusted library allocation
page read and write
1A85F6AC000
trusted library allocation
page read and write
1A859848000
trusted library allocation
page read and write
2190F35F000
heap
page read and write
1A84E264000
heap
page read and write
1A84E280000
heap
page read and write
1A854943000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
7C2B57E000
unkown
page readonly
1A85AD1A000
trusted library allocation
page read and write
1A85AE3F000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
D74000
heap
page read and write
1A85F54A000
trusted library allocation
page read and write
1A859A53000
trusted library allocation
page read and write
1A857A49000
trusted library allocation
page read and write
FA4000
heap
page read and write
2190F458000
heap
page read and write
1A859B3E000
trusted library allocation
page read and write
1A8542F9000
trusted library allocation
page read and write
1A857A6F000
trusted library allocation
page read and write
1A85F745000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A8581D8000
trusted library allocation
page read and write
2190F36C000
heap
page read and write
1A84E2EE000
heap
page read and write
1A84E295000
heap
page read and write
1A8575E3000
trusted library allocation
page read and write
1A85F367000
trusted library allocation
page read and write
1A8588A6000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
2190F3B9000
heap
page read and write
1A85AB32000
trusted library allocation
page read and write
1A858DE6000
trusted library allocation
page read and write
474000
unkown
page readonly
1A84E279000
heap
page read and write
2190F360000
heap
page read and write
F9A000
heap
page read and write
1A84E2A6000
heap
page read and write
1A858692000
trusted library allocation
page read and write
1A857F5E000
trusted library allocation
page read and write
7C29BFE000
stack
page read and write
1A859BFE000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A858775000
trusted library allocation
page read and write
1A857EB1000
trusted library allocation
page read and write
1A858D44000
trusted library allocation
page read and write
F72000
heap
page read and write
1A8598D5000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E295000
heap
page read and write
1A858176000
trusted library allocation
page read and write
1A84E269000
heap
page read and write
1A84E2DA000
heap
page read and write
2190E881000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85AE58000
trusted library allocation
page read and write
1A8572BE000
trusted library allocation
page read and write
1A85F6FA000
trusted library allocation
page read and write
1A862B9C000
trusted library allocation
page read and write
1A857E7D000
trusted library allocation
page read and write
1A85F2B1000
trusted library allocation
page read and write
1A85F6FC000
trusted library allocation
page read and write
1A85FC14000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E280000
heap
page read and write
1A8549F8000
trusted library allocation
page read and write
1A859DC7000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A85893E000
trusted library allocation
page read and write
1A858E9C000
trusted library allocation
page read and write
1A854DA5000
trusted library allocation
page read and write
1A857EA8000
trusted library allocation
page read and write
1A84E2F3000
heap
page read and write
1A84E281000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A857DAB000
trusted library allocation
page read and write
20D1A467000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A8631AD000
trusted library allocation
page read and write
1A85F9D6000
trusted library allocation
page read and write
1A8613D6000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A859BF4000
trusted library allocation
page read and write
1A8590A5000
trusted library allocation
page read and write
1A8613B9000
trusted library allocation
page read and write
1A8581C3000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A858D88000
trusted library allocation
page read and write
1A85F98D000
trusted library allocation
page read and write
1A85817B000
trusted library allocation
page read and write
1A857E0D000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A859AE5000
trusted library allocation
page read and write
1A859B93000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A8581D8000
trusted library allocation
page read and write
7C2B53E000
stack
page read and write
1A8585C0000
trusted library allocation
page read and write
1A862B30000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A84E280000
heap
page read and write
1A859B6C000
trusted library allocation
page read and write
1A85A9D5000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A85F3FB000
trusted library allocation
page read and write
1A858AFD000
trusted library allocation
page read and write
1A85F375000
trusted library allocation
page read and write
1A858742000
trusted library allocation
page read and write
1A85498C000
trusted library allocation
page read and write
1A8587B5000
trusted library allocation
page read and write
470000
unkown
page write copy
1A85858F000
trusted library allocation
page read and write
1A859B68000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A84E27A000
heap
page read and write
1A858DB0000
trusted library allocation
page read and write
174E000
stack
page read and write
1A84E280000
heap
page read and write
1A857F97000
trusted library allocation
page read and write
2190E803000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
2159239F000
heap
page read and write
1A857F2F000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A85498F000
trusted library allocation
page read and write
1A857E2C000
trusted library allocation
page read and write
2359CC82000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E29F000
heap
page read and write
F6F000
heap
page read and write
F9A000
heap
page read and write
1A85F7E3000
trusted library allocation
page read and write
1A857178000
trusted library allocation
page read and write
1A85F913000
trusted library allocation
page read and write
1A85449C000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A85F2D0000
trusted library allocation
page read and write
1A858DA8000
trusted library allocation
page read and write
1A8628C3000
trusted library allocation
page read and write
1A85A97E000
trusted library allocation
page read and write
1A85875B000
trusted library allocation
page read and write
1A85750F000
trusted library allocation
page read and write
2190ED80000
heap
page read and write
1A858B85000
trusted library allocation
page read and write
1A857184000
trusted library allocation
page read and write
1A853400000
trusted library allocation
page read and write
1A84E27D000
heap
page read and write
1A84E2CF000
heap
page read and write
1A858DE3000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A858DD6000
trusted library allocation
page read and write
1A858757000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A85A980000
trusted library allocation
page read and write
1A862D92000
heap
page read and write
B516FFE000
unkown
page readonly
1A858AA6000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
2190E4BA000
heap
page read and write
1A858759000
trusted library allocation
page read and write
1A84E26E000
heap
page read and write
1A85718A000
trusted library allocation
page read and write
1A85ABC2000
trusted library allocation
page read and write
1A85F640000
trusted library allocation
page read and write
1A857AEB000
trusted library allocation
page read and write
1A8545DD000
trusted library allocation
page read and write
1A859063000
trusted library allocation
page read and write
1A85F9D6000
trusted library allocation
page read and write
1A859DAF000
trusted library allocation
page read and write
1A85AE7C000
trusted library allocation
page read and write
2190E740000
heap
page read and write
1A85AE1F000
trusted library allocation
page read and write
2359CC5F000
trusted library allocation
page read and write
1A85A80F000
trusted library allocation
page read and write
1A8544FA000
trusted library allocation
page read and write
1A85F4DE000
trusted library allocation
page read and write
1A85ADF1000
trusted library allocation
page read and write
1A85AD36000
trusted library allocation
page read and write
1A858AF3000
trusted library allocation
page read and write
20D1A45D000
trusted library allocation
page read and write
1A84E28F000
heap
page read and write
1A858B55000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A85F9EA000
trusted library allocation
page read and write
1A858E5D000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A84E295000
heap
page read and write
1A8585C3000
trusted library allocation
page read and write
1A8585BA000
trusted library allocation
page read and write
2159239E000
heap
page read and write
1A85A808000
trusted library allocation
page read and write
1A858933000
trusted library allocation
page read and write
1A85F6AF000
trusted library allocation
page read and write
1A85AE84000
trusted library allocation
page read and write
1A857F8D000
trusted library allocation
page read and write
2359CF0C000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A857DD5000
trusted library allocation
page read and write
1A858141000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A84E28A000
heap
page read and write
1A84E28A000
heap
page read and write
1A86292F000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A859D45000
trusted library allocation
page read and write
1A858757000
trusted library allocation
page read and write
1A859DEA000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A85F965000
trusted library allocation
page read and write
1A85817B000
trusted library allocation
page read and write
1A85F7DD000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A858161000
trusted library allocation
page read and write
1A857DB3000
trusted library allocation
page read and write
1A858A6C000
trusted library allocation
page read and write
1A854D65000
trusted library allocation
page read and write
1A857EB1000
trusted library allocation
page read and write
2359C9A0000
unclassified section
page read and write
1A860F24000
trusted library allocation
page read and write
1A857252000
trusted library allocation
page read and write
1A85AEED000
trusted library allocation
page read and write
1A85987C000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2F3000
heap
page read and write
1A84E28A000
heap
page read and write
1A857F22000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E2D8000
heap
page read and write
1A84E294000
heap
page read and write
1A84E2A0000
heap
page read and write
1A84E27F000
heap
page read and write
1A85ADF5000
trusted library allocation
page read and write
2190E468000
remote allocation
page execute read
1A85F664000
trusted library allocation
page read and write
1A8599EE000
trusted library allocation
page read and write
1A8588E2000
trusted library allocation
page read and write
1A85443B000
trusted library allocation
page read and write
1A858EFE000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A856EDC000
trusted library allocation
page read and write
1A858736000
trusted library allocation
page read and write
1A853326000
trusted library allocation
page read and write
1A859B65000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A85F589000
trusted library allocation
page read and write
1A8625FE000
trusted library allocation
page read and write
1A8612B2000
trusted library allocation
page read and write
1A85AB48000
trusted library allocation
page read and write
1A8625EE000
trusted library allocation
page read and write
1A858173000
trusted library allocation
page read and write
1A85728E000
trusted library allocation
page read and write
1A85AE73000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A85F2B5000
trusted library allocation
page read and write
1A85A97E000
trusted library allocation
page read and write
1A857E87000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
1A857EB1000
trusted library allocation
page read and write
1A857FEA000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85A967000
trusted library allocation
page read and write
2190E76F000
unclassified section
page read and write
1A84E2E9000
heap
page read and write
1A84E290000
heap
page read and write
1A84E28B000
heap
page read and write
1A84E2DA000
heap
page read and write
1A8589AB000
trusted library allocation
page read and write
20D1A2D6000
heap
page read and write
1A858ADA000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
1A858DB0000
trusted library allocation
page read and write
1A854960000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85F587000
trusted library allocation
page read and write
1A8597A5000
trusted library allocation
page read and write
1A8589D0000
trusted library allocation
page read and write
2190F42C000
heap
page read and write
1A84E299000
heap
page read and write
1A858A22000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
2190E7F0000
trusted library allocation
page read and write
1A863158000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8613C1000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85F587000
trusted library allocation
page read and write
1A8612E5000
trusted library allocation
page read and write
1A858528000
trusted library allocation
page read and write
1A854956000
trusted library allocation
page read and write
2190F3E8000
heap
page read and write
1A84E2B2000
heap
page read and write
1A854C75000
heap
page read and write
1A85AA13000
trusted library allocation
page read and write
1A85426F000
trusted library allocation
page read and write
1A861314000
trusted library allocation
page read and write
1A85853C000
trusted library allocation
page read and write
1A84E286000
heap
page read and write
1A85F55F000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A857DD5000
trusted library allocation
page read and write
1A857EA4000
trusted library allocation
page read and write
1A859754000
trusted library allocation
page read and write
BFE000
stack
page read and write
1A85AE78000
trusted library allocation
page read and write
1A8544F8000
trusted library allocation
page read and write
1A857284000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85F7FB000
trusted library allocation
page read and write
1A85F2BB000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
1A857171000
trusted library allocation
page read and write
2190E780000
trusted library section
page readonly
1A858DDE000
trusted library allocation
page read and write
1A86292D000
trusted library allocation
page read and write
2190F35C000
heap
page read and write
1A857E4F000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A85727A000
trusted library allocation
page read and write
1A8589F0000
trusted library allocation
page read and write
2190ED60000
heap
page read and write
1A85894B000
trusted library allocation
page read and write
1A857EA8000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
2190F3E9000
heap
page read and write
1A85A943000
trusted library allocation
page read and write
1A861304000
trusted library allocation
page read and write
1A854CA2000
heap
page read and write
1A856E61000
trusted library allocation
page read and write
1A854D3F000
trusted library allocation
page read and write
1A862C36000
heap
page read and write
1A85F7EE000
trusted library allocation
page read and write
1A858872000
trusted library allocation
page read and write
1A84E284000
heap
page read and write
1A857EC6000
trusted library allocation
page read and write
1A8590A3000
trusted library allocation
page read and write
1A8549BF000
trusted library allocation
page read and write
1A8628F6000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A860EFC000
trusted library allocation
page read and write
1A84E2E0000
heap
page read and write
1A862C71000
heap
page read and write
1A84E295000
heap
page read and write
1A854540000
trusted library allocation
page read and write
1A85AE9D000
trusted library allocation
page read and write
1A854CC3000
heap
page read and write
2190E886000
trusted library allocation
page read and write
1A8575BE000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A857EB9000
trusted library allocation
page read and write
1A862B34000
trusted library allocation
page read and write
20D1A481000
trusted library allocation
page read and write
1A85FC4A000
trusted library allocation
page read and write
1A85F6E1000
trusted library allocation
page read and write
1A85AB48000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
2359CCF6000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E280000
heap
page read and write
2190E8C5000
trusted library allocation
page read and write
1A862540000
trusted library allocation
page read and write
1A85818B000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A8549A8000
trusted library allocation
page read and write
1A858998000
trusted library allocation
page read and write
1A859D49000
trusted library allocation
page read and write
1A856EB2000
trusted library allocation
page read and write
1A84E282000
heap
page read and write
1A85F2C2000
trusted library allocation
page read and write
1A860E85000
trusted library allocation
page read and write
1A861348000
trusted library allocation
page read and write
1A84E2E1000
heap
page read and write
F9F000
heap
page read and write
2359CE03000
trusted library allocation
page read and write
1A858141000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A85FC4A000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85F6E6000
trusted library allocation
page read and write
1A84E2D7000
heap
page read and write
1A84E2AC000
heap
page read and write
1A84E2AF000
heap
page read and write
1A85F31F000
trusted library allocation
page read and write
1A854951000
trusted library allocation
page read and write
1A85783B000
trusted library allocation
page read and write
1A858A6C000
trusted library allocation
page read and write
1A85A89A000
trusted library allocation
page read and write
1A857AFE000
trusted library allocation
page read and write
1A862B9A000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E27A000
heap
page read and write
1A85F7EE000
trusted library allocation
page read and write
1A857EC6000
trusted library allocation
page read and write
1A85F664000
trusted library allocation
page read and write
1A858998000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E295000
heap
page read and write
F9A000
heap
page read and write
1A854CA2000
heap
page read and write
1A852CAA000
trusted library allocation
page read and write
1A858DF2000
trusted library allocation
page read and write
1A854622000
trusted library allocation
page read and write
1A856E72000
trusted library allocation
page read and write
1A857EA8000
trusted library allocation
page read and write
1A84E28F000
heap
page read and write
1A859B51000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A8587A2000
trusted library allocation
page read and write
1A84E27C000
heap
page read and write
1A85AB45000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E28A000
heap
page read and write
1A8629C3000
trusted library allocation
page read and write
1A85AE37000
trusted library allocation
page read and write
1A85AE7E000
trusted library allocation
page read and write
1A858DB0000
trusted library allocation
page read and write
2190E812000
trusted library allocation
page read and write
1A857EC6000
trusted library allocation
page read and write
2359C943000
heap
page read and write
1A857D93000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A85F372000
trusted library allocation
page read and write
1A85F4FE000
trusted library allocation
page read and write
1A857F30000
trusted library allocation
page read and write
1A858A3F000
trusted library allocation
page read and write
1A8625E2000
trusted library allocation
page read and write
1A85F626000
trusted library allocation
page read and write
1A857EC3000
trusted library allocation
page read and write
1A854CA0000
heap
page read and write
1A858165000
trusted library allocation
page read and write
1A858D7F000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A858969000
trusted library allocation
page read and write
1A86241C000
trusted library allocation
page read and write
1A85886A000
trusted library allocation
page read and write
1A854CA2000
heap
page read and write
1A859B65000
trusted library allocation
page read and write
1A8628C3000
trusted library allocation
page read and write
1A85875B000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A857D34000
trusted library allocation
page read and write
1A858B0B000
trusted library allocation
page read and write
1A854956000
trusted library allocation
page read and write
1A86292F000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A85F727000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A85AE7C000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E299000
heap
page read and write
1A84E280000
heap
page read and write
1A84E2DC000
heap
page read and write
1A84E292000
heap
page read and write
1A8578F2000
trusted library allocation
page read and write
20D1A148000
remote allocation
page execute read
1A857FEA000
trusted library allocation
page read and write
1A858EBB000
trusted library allocation
page read and write
1A85853C000
trusted library allocation
page read and write
1A858145000
trusted library allocation
page read and write
1A8588E2000
trusted library allocation
page read and write
1A858DED000
trusted library allocation
page read and write
21590751000
heap
page read and write
1A84E295000
heap
page read and write
1A854D04000
trusted library allocation
page read and write
1A85F66F000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A85A84A000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A84E2DF000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2CF000
heap
page read and write
1A859BF2000
trusted library allocation
page read and write
1A86254E000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E27C000
heap
page read and write
1A8589A8000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A85F7F7000
trusted library allocation
page read and write
1A857FF1000
trusted library allocation
page read and write
1B4E000
stack
page read and write
1A857FA3000
trusted library allocation
page read and write
1A85F2D0000
trusted library allocation
page read and write
1A858E5B000
trusted library allocation
page read and write
1A857ADD000
trusted library allocation
page read and write
1A857D6D000
trusted library allocation
page read and write
1A858DF2000
trusted library allocation
page read and write
2359CE00000
trusted library allocation
page read and write
1A8581ED000
trusted library allocation
page read and write
1A854D1F000
trusted library allocation
page read and write
1A859DAF000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A85AEF0000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A8628E2000
trusted library allocation
page read and write
1A858EEE000
trusted library allocation
page read and write
1A857FE9000
trusted library allocation
page read and write
1A862496000
trusted library allocation
page read and write
1A8549C5000
trusted library allocation
page read and write
1A84E2DD000
heap
page read and write
1A84E2A5000
heap
page read and write
1A85322F000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E2D0000
heap
page read and write
1A858761000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E2AC000
heap
page read and write
1A857000000
trusted library allocation
page read and write
1A858169000
trusted library allocation
page read and write
1A8572FC000
trusted library allocation
page read and write
1A8587D0000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A84E2A0000
heap
page read and write
1A84E2D8000
heap
page read and write
1A858645000
trusted library allocation
page read and write
FA4000
heap
page read and write
1A84E27A000
heap
page read and write
1A84E279000
heap
page read and write
1A862565000
trusted library allocation
page read and write
1A8612EE000
trusted library allocation
page read and write
1A852C9E000
trusted library allocation
page read and write
1A8625B8000
trusted library allocation
page read and write
F8A000
heap
page read and write
21590A07000
trusted library allocation
page read and write
1A857DB3000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E2D3000
heap
page read and write
1A84E2D8000
heap
page read and write
1A858B65000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85F671000
trusted library allocation
page read and write
462000
unkown
page readonly
1A84E2DC000
heap
page read and write
1A85817B000
trusted library allocation
page read and write
1A857EFE000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
2190F3EB000
heap
page read and write
1A8598E4000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
3A1000
unkown
page execute read
1A84E281000
heap
page read and write
1A84E27A000
heap
page read and write
1A858BC8000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
21590A0A000
trusted library allocation
page read and write
2359CBB0000
heap
page read and write
1A85F7F7000
trusted library allocation
page read and write
1A8572BE000
trusted library allocation
page read and write
1A857EC6000
trusted library allocation
page read and write
1A862D53000
heap
page read and write
1A854CCF000
heap
page read and write
FA4000
heap
page read and write
1A84E295000
heap
page read and write
1A858518000
trusted library allocation
page read and write
2190F38A000
heap
page read and write
1A84E2A6000
heap
page read and write
1A84E295000
heap
page read and write
1A857EB1000
trusted library allocation
page read and write
1A84E28F000
heap
page read and write
2190F42B000
heap
page read and write
1A8575F5000
trusted library allocation
page read and write
1A85F9BD000
trusted library allocation
page read and write
21590720000
heap
page read and write
1A858165000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A8589E4000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A85FCEC000
trusted library allocation
page read and write
1A8575CF000
trusted library allocation
page read and write
1A85AD2D000
trusted library allocation
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85452C000
trusted library allocation
page read and write
1A8590E6000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A861997000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A861304000
trusted library allocation
page read and write
1A857FF9000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A857FE3000
trusted library allocation
page read and write
1A854CA2000
heap
page read and write
1A84E285000
heap
page read and write
1A85818B000
trusted library allocation
page read and write
1A8544E4000
trusted library allocation
page read and write
1A858EE9000
trusted library allocation
page read and write
1A858148000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
2359CA00000
trusted library allocation
page read and write
1A84E29E000
heap
page read and write
1A858E2B000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A859DC4000
trusted library allocation
page read and write
1A858DF6000
trusted library allocation
page read and write
1A857EC3000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85A972000
trusted library allocation
page read and write
2359CC24000
trusted library allocation
page read and write
1A85AEFB000
trusted library allocation
page read and write
1A857EAB000
trusted library allocation
page read and write
1A8575EB000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A84E28A000
heap
page read and write
2190E80A000
trusted library allocation
page read and write
1A857F2B000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
2359C920000
heap
page read and write
1A85AB50000
trusted library allocation
page read and write
2190F477000
heap
page read and write
1A84E2DC000
heap
page read and write
1A85AD27000
trusted library allocation
page read and write
1A8578F9000
trusted library allocation
page read and write
1A85AE58000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A85A9D8000
trusted library allocation
page read and write
1A84E28B000
heap
page read and write
1A8545F6000
trusted library allocation
page read and write
1A8585F5000
trusted library allocation
page read and write
1A84E2AA000
heap
page read and write
1A854D61000
trusted library allocation
page read and write
1A858766000
trusted library allocation
page read and write
2190F429000
heap
page read and write
1A8575EB000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A858DFC000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A84E289000
heap
page read and write
1A857E73000
trusted library allocation
page read and write
1A858D82000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
90523FE000
stack
page read and write
1A84E295000
heap
page read and write
1A854248000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A859AF8000
trusted library allocation
page read and write
1A854D68000
trusted library allocation
page read and write
1A862562000
trusted library allocation
page read and write
1A862C26000
heap
page read and write
1A8613E4000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
2190F38A000
heap
page read and write
46C000
unkown
page write copy
1A84E264000
heap
page read and write
1A858B36000
trusted library allocation
page read and write
1A859AF6000
trusted library allocation
page read and write
1A858724000
trusted library allocation
page read and write
20D1A412000
trusted library allocation
page read and write
1A85F2CA000
trusted library allocation
page read and write
1A85F6A0000
trusted library allocation
page read and write
1A856E7A000
trusted library allocation
page read and write
1A8628F6000
trusted library allocation
page read and write
1A85AD75000
trusted library allocation
page read and write
2190F38D000
heap
page read and write
1A85453D000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A858942000
trusted library allocation
page read and write
1A85AEC9000
trusted library allocation
page read and write
1A854D4B000
trusted library allocation
page read and write
1A8597AD000
trusted library allocation
page read and write
1A858ED1000
trusted library allocation
page read and write
1A8599FB000
trusted library allocation
page read and write
1A85AEF0000
trusted library allocation
page read and write
1A8587D7000
trusted library allocation
page read and write
1A85815A000
trusted library allocation
page read and write
1A857EC6000
trusted library allocation
page read and write
1A857FFA000
trusted library allocation
page read and write
1A8628B8000
trusted library allocation
page read and write
1A857E9E000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A84E2DC000
heap
page read and write
1A84E292000
heap
page read and write
1A857ACD000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A8533F0000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A862C13000
heap
page read and write
1A8575E7000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E28A000
heap
page read and write
B513CBE000
unkown
page readonly
1A858A42000
trusted library allocation
page read and write
1A85F66C000
trusted library allocation
page read and write
1A8599DB000
trusted library allocation
page read and write
1A85F589000
trusted library allocation
page read and write
1A85F4DC000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A853271000
trusted library allocation
page read and write
1A85F93A000
trusted library allocation
page read and write
1A8574F4000
trusted library allocation
page read and write
1A85ABFC000
trusted library allocation
page read and write
1A8545F3000
trusted library allocation
page read and write
3590000
heap
page read and write
1A85F6FC000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A85AE77000
trusted library allocation
page read and write
1A85A96C000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A858992000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E281000
heap
page read and write
1A85724C000
trusted library allocation
page read and write
2190F46C000
heap
page read and write
2190F3F1000
heap
page read and write
1A85875B000
trusted library allocation
page read and write
1A8589E2000
trusted library allocation
page read and write
1A85F6A2000
trusted library allocation
page read and write
1A857E79000
trusted library allocation
page read and write
1A857F94000
trusted library allocation
page read and write
F7B000
heap
page read and write
1A84E281000
heap
page read and write
1A858B3D000
trusted library allocation
page read and write
1A85F626000
trusted library allocation
page read and write
F85000
heap
page read and write
1A8589B8000
trusted library allocation
page read and write
1A84E305000
heap
page read and write
1A8589E2000
trusted library allocation
page read and write
1A858DC9000
trusted library allocation
page read and write
1A85ABE1000
trusted library allocation
page read and write
2190F429000
heap
page read and write
1A84E280000
heap
page read and write
1A84E2CF000
heap
page read and write
1A84E27A000
heap
page read and write
1A8597FC000
trusted library allocation
page read and write
1A8575FB000
trusted library allocation
page read and write
1A84E284000
heap
page read and write
20D1A60C000
trusted library allocation
page read and write
1A857297000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A85A7CD000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A85F643000
trusted library allocation
page read and write
1A857AEE000
trusted library allocation
page read and write
2190E85C000
trusted library allocation
page read and write
1A861314000
trusted library allocation
page read and write
1A85F640000
trusted library allocation
page read and write
1A857DCC000
trusted library allocation
page read and write
1A84E2B0000
heap
page read and write
1A85728E000
trusted library allocation
page read and write
1A859BF0000
trusted library allocation
page read and write
1A862574000
trusted library allocation
page read and write
2190F360000
heap
page read and write
1A85863B000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A859B8B000
trusted library allocation
page read and write
1A857E4F000
trusted library allocation
page read and write
1A857EEF000
trusted library allocation
page read and write
1A85A9CD000
trusted library allocation
page read and write
2159239C000
heap
page read and write
1A84E2CF000
heap
page read and write
2159238A000
heap
page read and write
1A8549A8000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2D8000
heap
page read and write
1A8575D2000
trusted library allocation
page read and write
1A854D9E000
trusted library allocation
page read and write
1A8542DE000
trusted library allocation
page read and write
1A85F33A000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
2359C7E0000
heap
page read and write
1A84E2DA000
heap
page read and write
1A862DB1000
heap
page read and write
1A84E280000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2A0000
heap
page read and write
1A8545EB000
trusted library allocation
page read and write
1A858A71000
trusted library allocation
page read and write
1A8575E3000
trusted library allocation
page read and write
B513D3E000
unkown
page readonly
1A857E2F000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85718A000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2DA000
heap
page read and write
1A8581ED000
trusted library allocation
page read and write
1A85455F000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E2A0000
heap
page read and write
1A84E264000
heap
page read and write
1A858113000
trusted library allocation
page read and write
1A85A7FE000
trusted library allocation
page read and write
2359CC76000
trusted library allocation
page read and write
1A8587A9000
trusted library allocation
page read and write
1A85F64A000
trusted library allocation
page read and write
1A857FE8000
trusted library allocation
page read and write
1A858766000
trusted library allocation
page read and write
1A854D55000
trusted library allocation
page read and write
1A858D57000
trusted library allocation
page read and write
1A8624AF000
trusted library allocation
page read and write
1A85ABD5000
trusted library allocation
page read and write
1A85F748000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A8589D3000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A8545F6000
trusted library allocation
page read and write
1A858FF1000
trusted library allocation
page read and write
1A85853C000
trusted library allocation
page read and write
1A85A7CD000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
1A858DAB000
trusted library allocation
page read and write
1A858EE4000
trusted library allocation
page read and write
1A85817B000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85FA00000
trusted library allocation
page read and write
1A858775000
trusted library allocation
page read and write
1A8589D3000
trusted library allocation
page read and write
1A858AA6000
trusted library allocation
page read and write
1A8613F8000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
1A8589E8000
trusted library allocation
page read and write
1A857835000
trusted library allocation
page read and write
1A857E5E000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E28F000
heap
page read and write
1A85FC7C000
trusted library allocation
page read and write
1A856E96000
trusted library allocation
page read and write
1A85FC7C000
trusted library allocation
page read and write
1A859933000
trusted library allocation
page read and write
1A84E275000
heap
page read and write
1A8587D7000
trusted library allocation
page read and write
1A84E284000
heap
page read and write
1A8588D9000
trusted library allocation
page read and write
1A8619E6000
trusted library allocation
page read and write
1A85A8D7000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A858528000
trusted library allocation
page read and write
1A85F555000
trusted library allocation
page read and write
1A862975000
trusted library allocation
page read and write
1A8575BE000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
2190E878000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
1A858A49000
trusted library allocation
page read and write
1A857831000
trusted library allocation
page read and write
20D1A2E0000
heap
page read and write
1A84E28F000
heap
page read and write
1A85AE34000
trusted library allocation
page read and write
1A8587D0000
trusted library allocation
page read and write
1A858173000
trusted library allocation
page read and write
1A8585E6000
trusted library allocation
page read and write
1A8544E4000
trusted library allocation
page read and write
3DE29FE000
stack
page read and write
1A85726C000
trusted library allocation
page read and write
1A85871A000
trusted library allocation
page read and write
1A85AE67000
trusted library allocation
page read and write
1A857E36000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A856E9D000
trusted library allocation
page read and write
1A85F626000
trusted library allocation
page read and write
1A8586DC000
trusted library allocation
page read and write
1A85F3CD000
trusted library allocation
page read and write
1A8575FB000
trusted library allocation
page read and write
1A8628F4000
trusted library allocation
page read and write
2190F36C000
heap
page read and write
1A84E299000
heap
page read and write
1A84E26A000
heap
page read and write
1A85F6FC000
trusted library allocation
page read and write
1A859A63000
trusted library allocation
page read and write
1A85A7D8000
trusted library allocation
page read and write
21592380000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A85815C000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
D74000
heap
page read and write
1A8613EE000
trusted library allocation
page read and write
1A858AFA000
trusted library allocation
page read and write
1A858BDD000
trusted library allocation
page read and write
1A84E264000
heap
page read and write
9053D7E000
unkown
page readonly
1A854DA5000
trusted library allocation
page read and write
1A85F37E000
trusted library allocation
page read and write
1A85A851000
trusted library allocation
page read and write
1A857EBE000
trusted library allocation
page read and write
1A8613E4000
trusted library allocation
page read and write
1A862C88000
heap
page read and write
3DE41FE000
stack
page read and write
1A84E27A000
heap
page read and write
1A857EAD000
trusted library allocation
page read and write
1A84E2E0000
heap
page read and write
D74000
heap
page read and write
1A857AC4000
trusted library allocation
page read and write
3DE49FF000
stack
page read and write
1A85F2BB000
trusted library allocation
page read and write
7C2BDFE000
stack
page read and write
1A858766000
trusted library allocation
page read and write
1A859DC7000
trusted library allocation
page read and write
1A85888B000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A84E29F000
heap
page read and write
1A84E264000
heap
page read and write
1A8572BB000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
2190F369000
heap
page read and write
1A84E27A000
heap
page read and write
1A8585A0000
trusted library allocation
page read and write
330000
heap
page read and write
1A858D60000
trusted library allocation
page read and write
1A8628C8000
trusted library allocation
page read and write
1A858173000
trusted library allocation
page read and write
1A859BF4000
trusted library allocation
page read and write
1A858DE6000
trusted library allocation
page read and write
2359CCB6000
trusted library allocation
page read and write
1A857A62000
trusted library allocation
page read and write
2190F46C000
heap
page read and write
1A857EC6000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
2359CC7B000
trusted library allocation
page read and write
1A85FC46000
trusted library allocation
page read and write
1A84E279000
heap
page read and write
1A8625A7000
trusted library allocation
page read and write
1A85982F000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A86136F000
trusted library allocation
page read and write
1A859AF5000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E289000
heap
page read and write
1A84E2DC000
heap
page read and write
1A85F2A3000
trusted library allocation
page read and write
1A8581AC000
trusted library allocation
page read and write
2159239A000
heap
page read and write
1A85893A000
trusted library allocation
page read and write
1A8544E8000
trusted library allocation
page read and write
1A858E55000
trusted library allocation
page read and write
1A8628E2000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A85F91F000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A857EBC000
trusted library allocation
page read and write
1A858A49000
trusted library allocation
page read and write
1A85FC56000
trusted library allocation
page read and write
2190E600000
trusted library allocation
page read and write
1A854D68000
trusted library allocation
page read and write
20D1A603000
trusted library allocation
page read and write
1A858536000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A85A7D8000
trusted library allocation
page read and write
1A854635000
trusted library allocation
page read and write
1A86255B000
trusted library allocation
page read and write
1A854531000
trusted library allocation
page read and write
1A860EF9000
trusted library allocation
page read and write
1A857E79000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A84E28A000
heap
page read and write
1A85F6AF000
trusted library allocation
page read and write
20D1A616000
trusted library allocation
page read and write
2359CC5D000
trusted library allocation
page read and write
1A86198C000
trusted library allocation
page read and write
1A85F591000
trusted library allocation
page read and write
1A86124E000
trusted library allocation
page read and write
1A8625A4000
trusted library allocation
page read and write
1A858D7F000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
D74000
heap
page read and write
1A8612DF000
trusted library allocation
page read and write
3591000
heap
page read and write
1A858A5E000
trusted library allocation
page read and write
2359C9A2000
unclassified section
page read and write
1A84E2D0000
heap
page read and write
1A8619E5000
trusted library allocation
page read and write
2190F3E0000
heap
page read and write
1A85726F000
trusted library allocation
page read and write
1A84E2AD000
heap
page read and write
1A84E2D8000
heap
page read and write
1A857F60000
trusted library allocation
page read and write
1A854493000
trusted library allocation
page read and write
1A858141000
trusted library allocation
page read and write
1A857EFA000
trusted library allocation
page read and write
1A857E87000
trusted library allocation
page read and write
1A862545000
trusted library allocation
page read and write
1A858BC3000
trusted library allocation
page read and write
20D1A542000
unclassified section
page read and write
1A84E260000
heap
page read and write
1A85864E000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E2AC000
heap
page read and write
1A84E2E5000
heap
page read and write
1A85F3CD000
trusted library allocation
page read and write
1A85ADF9000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A8544A9000
trusted library allocation
page read and write
20D1A300000
trusted library allocation
page read and write
1A858127000
trusted library allocation
page read and write
1A8589F0000
trusted library allocation
page read and write
1A85F7DD000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85878C000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A84E290000
heap
page read and write
1A858ADA000
trusted library allocation
page read and write
1A85AEA8000
trusted library allocation
page read and write
1A858742000
trusted library allocation
page read and write
D74000
heap
page read and write
1A857F87000
trusted library allocation
page read and write
1A862B3B000
trusted library allocation
page read and write
1A85724C000
trusted library allocation
page read and write
1A858626000
trusted library allocation
page read and write
1A858167000
trusted library allocation
page read and write
1A85F748000
trusted library allocation
page read and write
2359C810000
heap
page read and write
1A84E2D0000
heap
page read and write
1A85FC3F000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A84E2D0000
heap
page read and write
1A856E8E000
trusted library allocation
page read and write
1A852C90000
trusted library allocation
page read and write
2190F3FD000
heap
page read and write
1A8590DD000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A8576E9000
trusted library allocation
page read and write
2190F3EB000
heap
page read and write
1A85F2B5000
trusted library allocation
page read and write
1A8588D6000
trusted library allocation
page read and write
1A858B62000
trusted library allocation
page read and write
1A8545EB000
trusted library allocation
page read and write
1A85F54E000
trusted library allocation
page read and write
1A859B87000
trusted library allocation
page read and write
1A85725E000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A84E291000
heap
page read and write
1A84E264000
heap
page read and write
1A857686000
trusted library allocation
page read and write
1A84E285000
heap
page read and write
1A85F985000
trusted library allocation
page read and write
1A854CBB000
heap
page read and write
1A858A71000
trusted library allocation
page read and write
1A84E2A0000
heap
page read and write
1A85781E000
trusted library allocation
page read and write
2190F369000
heap
page read and write
1A84E299000
heap
page read and write
1A84E27C000
heap
page read and write
1A8532F6000
trusted library allocation
page read and write
1A858D64000
trusted library allocation
page read and write
1A85F4D2000
trusted library allocation
page read and write
1A84E291000
heap
page read and write
1A84E295000
heap
page read and write
1A8589CB000
trusted library allocation
page read and write
1A84E2AE000
heap
page read and write
1A858D64000
trusted library allocation
page read and write
2190F360000
heap
page read and write
F82000
heap
page read and write
B515FFE000
unkown
page readonly
1A8586AF000
trusted library allocation
page read and write
2190F43B000
heap
page read and write
7C2A3FE000
unkown
page readonly
1A84E281000
heap
page read and write
1A857DA0000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A862BF4000
trusted library allocation
page read and write
9052D7E000
unkown
page readonly
1A84E292000
heap
page read and write
1A85FCB0000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A84E28B000
heap
page read and write
1A857A7A000
trusted library allocation
page read and write
1A860DBA000
trusted library allocation
page read and write
1A84E2D2000
heap
page read and write
1A84E2D8000
heap
page read and write
1A858577000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A84E294000
heap
page read and write
2190EE60000
heap
page read and write
20D1A47B000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A8628E2000
trusted library allocation
page read and write
1A852CEF000
trusted library allocation
page read and write
1A84E2A6000
heap
page read and write
1A8572C4000
trusted library allocation
page read and write
1A861251000
trusted library allocation
page read and write
1A862CA0000
heap
page read and write
2359CBB6000
heap
page read and write
1A862885000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A857E81000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A85F7FB000
trusted library allocation
page read and write
2190F369000
heap
page read and write
299CFFF000
stack
page read and write
1A854CA4000
heap
page read and write
1A85AE5D000
trusted library allocation
page read and write
1A857843000
trusted library allocation
page read and write
1A85F645000
trusted library allocation
page read and write
1A8588EC000
trusted library allocation
page read and write
1A84E280000
heap
page read and write
1A853271000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
2190F42B000
heap
page read and write
1A85F55F000
trusted library allocation
page read and write
2190F1C1000
unkown
page execute read
1A859855000
trusted library allocation
page read and write
1A8572C4000
trusted library allocation
page read and write
1A84E29F000
heap
page read and write
1A85980C000
trusted library allocation
page read and write
1A859A83000
trusted library allocation
page read and write
1A858D6D000
trusted library allocation
page read and write
1A85F609000
trusted library allocation
page read and write
1A85F589000
trusted library allocation
page read and write
1A84E2A9000
heap
page read and write
1A85A8BB000
trusted library allocation
page read and write
1A858165000
trusted library allocation
page read and write
1A858A49000
trusted library allocation
page read and write
1A858DD6000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A861993000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A84E2DC000
heap
page read and write
1A858577000
trusted library allocation
page read and write
1A8612F7000
trusted library allocation
page read and write
1A857EA1000
trusted library allocation
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85331E000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
3A0000
unkown
page readonly
1A857F6B000
trusted library allocation
page read and write
1A84E2CF000
heap
page read and write
1A84E292000
heap
page read and write
1A858747000
trusted library allocation
page read and write
1A84E283000
heap
page read and write
1A84E289000
heap
page read and write
1A8585EE000
trusted library allocation
page read and write
1A862999000
trusted library allocation
page read and write
1A862499000
trusted library allocation
page read and write
1A857260000
trusted library allocation
page read and write
1A858742000
trusted library allocation
page read and write
1A858D8F000
trusted library allocation
page read and write
1A8598E8000
trusted library allocation
page read and write
1A8544F8000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
2359C950000
heap
page read and write
1A85F9C1000
trusted library allocation
page read and write
1A854293000
trusted library allocation
page read and write
1A858DEA000
trusted library allocation
page read and write
1A858569000
trusted library allocation
page read and write
1A86136F000
trusted library allocation
page read and write
1A859789000
trusted library allocation
page read and write
1A858ADA000
trusted library allocation
page read and write
1A84E27A000
heap
page read and write
1A862B98000
trusted library allocation
page read and write
1A858563000
trusted library allocation
page read and write
1A8585B6000
trusted library allocation
page read and write
1A8586F9000
trusted library allocation
page read and write
1A85AE93000
trusted library allocation
page read and write
1A84E2E8000
heap
page read and write
2190F3E0000
heap
page read and write
FA4000
heap
page read and write
1A854D9E000
trusted library allocation
page read and write
1A858191000
trusted library allocation
page read and write
1A85F718000
trusted library allocation
page read and write
1A860DC1000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A852CC7000
trusted library allocation
page read and write
2190F37D000
heap
page read and write
7C28BD8000
stack
page read and write
1A8588EC000
trusted library allocation
page read and write
BEF000
stack
page read and write
1A85AE51000
trusted library allocation
page read and write
1A854DCE000
trusted library allocation
page read and write
1A862BC4000
trusted library allocation
page read and write
1A85AD31000
trusted library allocation
page read and write
1A85F4D6000
trusted library allocation
page read and write
1A85AD36000
trusted library allocation
page read and write
1A84E262000
heap
page read and write
1A8572BB000
trusted library allocation
page read and write
1A858DB4000
trusted library allocation
page read and write
1A85AB19000
trusted library allocation
page read and write
2190F3A8000
heap
page read and write
1A858EEE000
trusted library allocation
page read and write
D74000
heap
page read and write
1A8628C8000
trusted library allocation
page read and write
1A84E299000
heap
page read and write
1A8544D6000
trusted library allocation
page read and write
1A857EB9000
trusted library allocation
page read and write
1A859B76000
trusted library allocation
page read and write
20D1A46E000
trusted library allocation
page read and write
1A86295E000
trusted library allocation
page read and write
1A86286B000
trusted library allocation
page read and write
1A858766000
trusted library allocation
page read and write
2359C9AF000
unclassified section
page read and write
1A862B61000
trusted library allocation
page read and write
1A85AB45000
trusted library allocation
page read and write
1A8629DA000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E2A6000
heap
page read and write
1A84E2D7000
heap
page read and write
1A858560000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
DCBB5A1000
trusted library allocation
page execute read
1A84E2D0000
heap
page read and write
1A84E292000
heap
page read and write
1A84E2A6000
heap
page read and write
1A857E93000
trusted library allocation
page read and write
1A858DA0000
trusted library allocation
page read and write
1A84E275000
heap
page read and write
1A8572CC000
trusted library allocation
page read and write
1A85873B000
trusted library allocation
page read and write
1A854D9E000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A85F4D4000
trusted library allocation
page read and write
1A8599EC000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A862436000
trusted library allocation
page read and write
1A84E292000
heap
page read and write
1A84E29F000
heap
page read and write
1A8588CB000
trusted library allocation
page read and write
1A84E298000
heap
page read and write
1A85864A000
trusted library allocation
page read and write
1A8549B8000
trusted library allocation
page read and write
1A84E2E5000
heap
page read and write
1A85F587000
trusted library allocation
page read and write
1A858D64000
trusted library allocation
page read and write
1A857163000
trusted library allocation
page read and write
1A858A55000
trusted library allocation
page read and write
1A85974C000
trusted library allocation
page read and write
1A84E2D8000
heap
page read and write
B513DBE000
unkown
page readonly
1A85783F000
trusted library allocation
page read and write
1A85F6EB000
trusted library allocation
page read and write
3A0000
unkown
page readonly
1A8589E8000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A85A945000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
20D1A2A0000
heap
page read and write
1A84E2D0000
heap
page read and write
1A8575D7000
trusted library allocation
page read and write
1A862949000
trusted library allocation
page read and write
1A8589F0000
trusted library allocation
page read and write
1A84E28A000
heap
page read and write
1A858520000
trusted library allocation
page read and write
1A857E98000
trusted library allocation
page read and write
1A85F547000
trusted library allocation
page read and write
1A84E2DF000
heap
page read and write
1A84E2D8000
heap
page read and write
1A85719C000
trusted library allocation
page read and write
1A84E290000
heap
page read and write
1A84E2E9000
heap
page read and write
1A85F732000
trusted library allocation
page read and write
2190E86F000
trusted library allocation
page read and write
1A858B51000
trusted library allocation
page read and write
1A858FEE000
trusted library allocation
page read and write
1A84E2DC000
heap
page read and write
1A858A59000
trusted library allocation
page read and write
1A8585F5000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A8619EE000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A857AAB000
trusted library allocation
page read and write
1A854CA0000
heap
page read and write
1A85F7E7000
trusted library allocation
page read and write
1A8533FB000
trusted library allocation
page read and write
1A854248000
trusted library allocation
page read and write
1A84E295000
heap
page read and write
1A84E28A000
heap
page read and write
1A858B69000
trusted library allocation
page read and write
1A8585A0000
trusted library allocation
page read and write
9052C3E000
stack
page read and write
1A85AEC9000
trusted library allocation
page read and write
1A862D94000
heap
page read and write
1A85ABDC000
trusted library allocation
page read and write
1A858B37000
trusted library allocation
page read and write
1A85AB5E000
trusted library allocation
page read and write
1A8544EB000
trusted library allocation
page read and write
1A85AD78000
trusted library allocation
page read and write
1A862539000
trusted library allocation
page read and write
1A85F550000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E2D2000
heap
page read and write
1A861348000
trusted library allocation
page read and write
1A857FE3000
trusted library allocation
page read and write
1A857E6A000
trusted library allocation
page read and write
1A854D61000
trusted library allocation
page read and write
1A85718E000
trusted library allocation
page read and write
1A84E2AD000
heap
page read and write
1A8533FB000
trusted library allocation
page read and write
1A85FC56000
trusted library allocation
page read and write
1A858EDA000
trusted library allocation
page read and write
1A8587A4000
trusted library allocation
page read and write
1A85FC0C000
trusted library allocation
page read and write
1A858BAC000
trusted library allocation
page read and write
1A858EF7000
trusted library allocation
page read and write
1A8590D0000
trusted library allocation
page read and write
1A85AB36000
trusted library allocation
page read and write
1A85331A000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
2190F477000
heap
page read and write
1A862A00000
trusted library allocation
page read and write
CD0000
heap
page read and write
1A862C5B000
heap
page read and write
1A858669000
trusted library allocation
page read and write
1A858A3F000
trusted library allocation
page read and write
1A84E2AC000
heap
page read and write
1A8544EA000
trusted library allocation
page read and write
1A85A896000
trusted library allocation
page read and write
38E5E211E000
trusted library allocation
page read and write
1A854981000
trusted library allocation
page read and write
1A85AE8C000
trusted library allocation
page read and write
D74000
heap
page read and write
1A857E79000
trusted library allocation
page read and write
1A85F35B000
trusted library allocation
page read and write
1A84E2AF000
heap
page read and write
1A84E295000
heap
page read and write
1A84E2ED000
heap
page read and write
1A857E98000
trusted library allocation
page read and write
2359CCD7000
trusted library allocation
page read and write
1A862C01000
heap
page read and write
1A84E299000
heap
page read and write
2190F3FD000
heap
page read and write
1A85AEF4000
trusted library allocation
page read and write
2190F34D000
heap
page read and write
1A85F547000
trusted library allocation
page read and write
1A84E2E9000
heap
page read and write
1A84E299000
heap
page read and write
1A85FC0C000
trusted library allocation
page read and write
1A862489000
trusted library allocation
page read and write
1A8549D6000
trusted library allocation
page read and write
1A857E9E000
trusted library allocation
page read and write
1A85AEC1000
trusted library allocation
page read and write
1A858EFB000
trusted library allocation
page read and write
2190E470000
unclassified section
page readonly
1A84E2AC000
heap
page read and write
1A8585E6000
trusted library allocation
page read and write
1A862D53000
heap
page read and write
1A857F63000
trusted library allocation
page read and write
1A858DC0000
trusted library allocation
page read and write
1A862CE3000
heap
page read and write
1A862C88000
heap
page read and write
1A84E284000
heap
page read and write
1A859B6A000
trusted library allocation
page read and write
1A861337000
trusted library allocation
page read and write
1A84E2D0000
heap
page read and write
1A858994000
trusted library allocation
page read and write
1A858EE6000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A85AD34000
trusted library allocation
page read and write
1A85F565000
trusted library allocation
page read and write
1A85729C000
trusted library allocation
page read and write
1A857E6D000
trusted library allocation
page read and write
1A84E289000
heap
page read and write
1A854DCE000
trusted library allocation
page read and write
1A84E2DA000
heap
page read and write
1A857194000
trusted library allocation
page read and write
1A84E26D000
heap
page read and write
1A84E2CF000
heap
page read and write
1A8586AF000
trusted library allocation
page read and write
1A84E2D3000
heap
page read and write
1A854D9E000
trusted library allocation
page read and write
1A8572B0000
trusted library allocation
page read and write
1A85F643000
trusted library allocation
page read and write
1A8572AA000
trusted library allocation
page read and write
1A84E281000
heap
page read and write
1A84E2E5000
heap
page read and write
1A84E295000
heap
page read and write
1A84E2EE000
heap
page read and write
1A858FD4000
trusted library allocation
page read and write
1A85F300000
trusted library allocation
page read and write
1A857F5E000
trusted library allocation
page read and write
1A8628B8000
trusted library allocation
page read and write
1A857F60000
trusted library allocation
page read and write
190CFB60000
heap
page read and write
1A84E2D7000
heap
page read and write
1A84E2A0000
heap
page read and write
1A85781A000
trusted library allocation
page read and write
1A858DC5000
trusted library allocation
page read and write
1A857EC6000
trusted library allocation
page read and write
1A85F33C000
trusted library allocation
page read and write
1A85F7D3000
trusted library allocation
page read and write
1A85F560000
trusted library allocation
page read and write
1A8572BE000
trusted library allocation
page read and write
1A859A23000
trusted library allocation
page read and write
1A85AE47000
trusted library allocation
page read and write
1A84E2E7000
heap
page read and write
1A85F6E6000
trusted library allocation
page read and write
1A857E93000
trusted library allocation
page read and write
1A85F563000
trusted library allocation
page read and write
1A858DED000
trusted library allocation
page read and write
7C2B4FE000
unkown
page readonly
1A84E26D000
heap
page read and write
1A84E27A000
heap
page read and write
1A858AFD000
trusted library allocation
page read and write
1A85F6DC000
trusted library allocation
page read and write
1A84E26A000
heap
page read and write
1A859B4B000
trusted library allocation
page read and write
1A856E75000
trusted library allocation
page read and write
1A857EB9000
trusted library allocation
page read and write
1A85AACA000
trusted library allocation
page read and write
D70000
heap
page read and write
1A85A972000
trusted library allocation
page read and write
1A85AB32000
trusted library allocation
page read and write
1A84E294000
heap
page read and write
1A84E295000
heap
page read and write
1A857DCA000
trusted library allocation
page read and write
1A85A9B2000
trusted library allocation
page read and write
7C2B5BE000
stack
page read and write
There are 3896 hidden memdumps, click here to show them.