IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_df742fd1-5d4b-461c-a35d-f7640dc3f772.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_df742fd1-5d4b-461c-a35d-f7640dc3f772.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\18CX51L3HYLNCBJ0DXHU.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\73UER8CAKXBLFX5X1DQF.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d4c19da-07e9-4e1a-9ce2-f4e466361ce6} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f18e16ef10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20230927232528 -prefsHandle 3880 -prefMapHandle 2888 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5f226f1-1a1c-41d2-bbb4-bf72ea27501c} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f18e182a10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2612 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5364 -prefMapHandle 5360 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dce7259-bfc2-44f9-b9ca-cb65ac3e711e} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f1a07c7510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
http://mozilla.org/0
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
http://mozilla.org/D
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
dualstack.reddit.map.fastly.net
151.101.1.140
youtube-ui.l.google.com
172.217.19.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1060000
heap
page read and write
malicious
1F194EC5000
heap
page read and write
1F1A14F8000
trusted library allocation
page read and write
1F19DD8A000
trusted library allocation
page read and write
1F19DE77000
trusted library allocation
page read and write
1F1A952F000
trusted library allocation
page read and write
614000
heap
page read and write
1F1A6190000
trusted library allocation
page read and write
27141FB9000
heap
page read and write
27141FE1000
heap
page read and write
2A2F5C8A000
heap
page read and write
1F194EE9000
heap
page read and write
1F194EFB000
heap
page read and write
1F194ED6000
heap
page read and write
1F1A267B000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194EA7000
heap
page read and write
1F1A90C4000
trusted library allocation
page read and write
1F1A05EB000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A9595000
trusted library allocation
page read and write
1F19DFC9000
trusted library allocation
page read and write
1F1998C8000
trusted library allocation
page read and write
27141FED000
heap
page read and write
1F1A1ED8000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19DA99000
trusted library allocation
page read and write
1F1A6255000
trusted library allocation
page read and write
1F1A05B3000
trusted library allocation
page read and write
1F1A68BB000
trusted library allocation
page read and write
614000
heap
page read and write
1F1AABE9000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F19EDB1000
trusted library allocation
page read and write
1F19F998000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E93000
heap
page read and write
1F19F36A000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194EE5000
heap
page read and write
1F19DFBB000
trusted library allocation
page read and write
1074000
heap
page read and write
1F194EC5000
heap
page read and write
1F194E96000
heap
page read and write
14DDB3B7000
heap
page read and write
1F19F56F000
trusted library allocation
page read and write
1F18FDD1000
heap
page read and write
1F194EE8000
heap
page read and write
2A2F5DA2000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A80BC000
trusted library allocation
page read and write
1F1A006A000
trusted library allocation
page read and write
1F1A60FC000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F19FF8D000
trusted library allocation
page read and write
1F19F5E7000
trusted library allocation
page read and write
1F1A61AD000
trusted library allocation
page read and write
1F19F01D000
trusted library allocation
page read and write
1F1A27A7000
trusted library allocation
page read and write
1F19FAF1000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19B222000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F19ED74000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194EFB000
heap
page read and write
1F1A619A000
trusted library allocation
page read and write
1F1A80B4000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194EFC000
heap
page read and write
1F1AA401000
heap
page read and write
1F194E82000
heap
page read and write
1F194F1B000
heap
page read and write
1F1A0085000
trusted library allocation
page read and write
1F19F9E0000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E9A000
heap
page read and write
1900DFF000
stack
page read and write
1F1A147B000
trusted library allocation
page read and write
1F19FF8D000
trusted library allocation
page read and write
1F1A05F9000
trusted library allocation
page read and write
1F1A1EC6000
trusted library allocation
page read and write
1F1A63C5000
trusted library allocation
page read and write
27141378000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F19F3F6000
trusted library allocation
page read and write
1071000
heap
page read and write
1F1A09BF000
trusted library allocation
page read and write
1F1A9965000
trusted library allocation
page read and write
1F19FF44000
trusted library allocation
page read and write
1F19FFE4000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19DF7A000
trusted library allocation
page read and write
1F19DD6A000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194EA0000
heap
page read and write
1F194E9F000
heap
page read and write
1F19DFA7000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
2E9DFBE000
stack
page read and write
1F1A08FE000
trusted library allocation
page read and write
1F1A68F3000
trusted library allocation
page read and write
27141FFD000
heap
page read and write
1074000
heap
page read and write
1F19F983000
trusted library allocation
page read and write
1F19FF93000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
980000
trusted library allocation
page read and write
1F19F705000
trusted library allocation
page read and write
1F19ED91000
trusted library allocation
page read and write
1F19DF93000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19B1F4000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19ECC4000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
27141E00000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194E82000
heap
page read and write
1F194EB3000
heap
page read and write
1F19DAF9000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
1F1A62BE000
trusted library allocation
page read and write
1F1A05EB000
trusted library allocation
page read and write
1F19FF8B000
trusted library allocation
page read and write
1F19F6E6000
trusted library allocation
page read and write
1F1A9085000
trusted library allocation
page read and write
1F19ED47000
trusted library allocation
page read and write
1F194EB6000
heap
page read and write
1F199FF0000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194F11000
heap
page read and write
1F1A9FCB000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194E88000
heap
page read and write
1E430F81000
heap
page read and write
1F194EC5000
heap
page read and write
1F19F006000
trusted library allocation
page read and write
1F19F611000
trusted library allocation
page read and write
27141F69000
heap
page read and write
1F19B8F0000
heap
page read and write
27142077000
heap
page read and write
6F275FF000
stack
page read and write
1F1A95F9000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EFB000
heap
page read and write
1F194EA5000
heap
page read and write
1F19F9EB000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1AA34D000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19FDF1000
trusted library allocation
page read and write
1F1A06D8000
trusted library allocation
page read and write
1F1A80AA000
trusted library allocation
page read and write
27141F5C000
heap
page read and write
1F194F24000
heap
page read and write
1F19FF68000
trusted library allocation
page read and write
1F19ED0F000
trusted library allocation
page read and write
1F1A6179000
trusted library allocation
page read and write
1F19DF3D000
trusted library allocation
page read and write
1F19FFD4000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194F19000
heap
page read and write
1F194E9A000
heap
page read and write
1F194E9D000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A9F23000
trusted library allocation
page read and write
1F1A9F42000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A9083000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F194E9A000
heap
page read and write
1F19B237000
trusted library allocation
page read and write
1F19FFA7000
trusted library allocation
page read and write
1F1A61E4000
trusted library allocation
page read and write
1F1AA0D1000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F194E6F000
heap
page read and write
1F1AA401000
heap
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F194F2D000
heap
page read and write
1F194EED000
heap
page read and write
1F194EE5000
heap
page read and write
1F194EB4000
heap
page read and write
1F1AABE9000
trusted library allocation
page read and write
1F1A186E000
trusted library allocation
page read and write
1F1A79A3000
trusted library allocation
page read and write
107D000
heap
page read and write
1F194EA4000
heap
page read and write
1F1AA2E5000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F19ECBF000
trusted library allocation
page read and write
27141FE6000
heap
page read and write
1F194EC0000
heap
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E9A000
heap
page read and write
1F19FF23000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1A1890000
trusted library allocation
page read and write
1F1AABFC000
trusted library allocation
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F1A80A5000
trusted library allocation
page read and write
1F19F031000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1AA2E5000
trusted library allocation
page read and write
1F1AABEE000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19FF67000
trusted library allocation
page read and write
B5CB39E000
unkown
page readonly
1F19B0F1000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F19DFB9000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
27141F69000
heap
page read and write
1F1A0036000
trusted library allocation
page read and write
1F19FFE5000
trusted library allocation
page read and write
1F19FDB0000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A9927000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A68F7000
trusted library allocation
page read and write
1F19ED54000
trusted library allocation
page read and write
1F194EB9000
heap
page read and write
1F194EEE000
heap
page read and write
2A2F61B6000
heap
page read and write
1F194E88000
heap
page read and write
1F19B155000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F194EB4000
heap
page read and write
1F199EF6000
trusted library allocation
page read and write
1F1A0AFC000
trusted library allocation
page read and write
1F19FFED000
trusted library allocation
page read and write
1F19F01D000
trusted library allocation
page read and write
1F1A05B5000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F194EA0000
heap
page read and write
1F194EC0000
heap
page read and write
27141FE3000
heap
page read and write
1F194E8F000
heap
page read and write
1F01A000000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1A68DB000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
27141890000
heap
page read and write
1F194EA5000
heap
page read and write
1F1A14DE000
trusted library allocation
page read and write
1F19B8A6000
heap
page read and write
1F19F9E8000
trusted library allocation
page read and write
1F1AA3BB000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19F00F000
trusted library allocation
page read and write
1F19FFC8000
trusted library allocation
page read and write
1F19F9A9000
trusted library allocation
page read and write
1F1AA03D000
trusted library allocation
page read and write
1F194E76000
heap
page read and write
1F19F58B000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A05B5000
trusted library allocation
page read and write
1F19F6E2000
trusted library allocation
page read and write
1F19F4EF000
trusted library allocation
page read and write
1F19F03F000
trusted library allocation
page read and write
1F1A0466000
trusted library allocation
page read and write
1F19EDA8000
trusted library allocation
page read and write
1F1A14C8000
trusted library allocation
page read and write
1F1AACC2000
trusted library allocation
page read and write
1F19E1FC000
trusted library allocation
page read and write
1F19FF73000
trusted library allocation
page read and write
1F194EFA000
heap
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F19DFD8000
trusted library allocation
page read and write
1F19DD7E000
trusted library allocation
page read and write
1F19EDB8000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194EEE000
heap
page read and write
1F194E8E000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A9F2B000
trusted library allocation
page read and write
1F1A60DD000
trusted library allocation
page read and write
1F194EFE000
heap
page read and write
1F194EC5000
heap
page read and write
1F19DF87000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F1A79C8000
trusted library allocation
page read and write
1F19FDE4000
trusted library allocation
page read and write
1F19DA9C000
trusted library allocation
page read and write
1F19DF52000
trusted library allocation
page read and write
1F19DE8A000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194E9F000
heap
page read and write
1F1A63DC000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
2E9CEFE000
stack
page read and write
1F1A60E4000
trusted library allocation
page read and write
1F19B848000
heap
page read and write
1F1A05CB000
trusted library allocation
page read and write
1F19FFED000
trusted library allocation
page read and write
1F19B6CB000
trusted library allocation
page read and write
1F1A7AA3000
trusted library allocation
page read and write
1F1A7A07000
trusted library allocation
page read and write
1F19EC46000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F1A6400000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A60FE000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F1A95BC000
trusted library allocation
page read and write
1F19B846000
heap
page read and write
1F194F1B000
heap
page read and write
1F194E9F000
heap
page read and write
2E9C5FE000
unkown
page readonly
1F19ED2C000
trusted library allocation
page read and write
1F1A6876000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1AAC5E000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
2E9C6FE000
unkown
page readonly
1F194E6F000
heap
page read and write
1F1A05B5000
trusted library allocation
page read and write
1F19ED6A000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19DD63000
trusted library allocation
page read and write
1F19FFC1000
trusted library allocation
page read and write
1F19F639000
trusted library allocation
page read and write
1F1A0445000
trusted library allocation
page read and write
1F19ED56000
trusted library allocation
page read and write
1F19ED6A000
trusted library allocation
page read and write
1F1A61F9000
trusted library allocation
page read and write
1F19FE2E000
trusted library allocation
page read and write
1F1A08E4000
trusted library allocation
page read and write
1F19B1F0000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
2714132F000
trusted library allocation
page read and write
1F1AA0DB000
trusted library allocation
page read and write
1F19F6BB000
trusted library allocation
page read and write
1F1AA347000
trusted library allocation
page read and write
1F19F5FC000
trusted library allocation
page read and write
1F19EC15000
trusted library allocation
page read and write
1F194EAE000
heap
page read and write
1F19F55D000
trusted library allocation
page read and write
27141FF1000
heap
page read and write
1F19DFBB000
trusted library allocation
page read and write
1F1A0032000
trusted library allocation
page read and write
1F194EFE000
heap
page read and write
1F1A2184000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194F04000
heap
page read and write
1F19EDBE000
trusted library allocation
page read and write
1F1A5FE5000
trusted library allocation
page read and write
1F1A05FC000
trusted library allocation
page read and write
1F19F4B3000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194E79000
heap
page read and write
1F019E00000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F194E8F000
heap
page read and write
1F194E95000
heap
page read and write
1F1A00BF000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A6099000
trusted library allocation
page read and write
1F1A9543000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1AA2F3000
trusted library allocation
page read and write
1F19ECC2000
trusted library allocation
page read and write
1F19B8D5000
heap
page read and write
1F1A9691000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F19DE8A000
trusted library allocation
page read and write
1F19B235000
trusted library allocation
page read and write
1F19EDC3000
trusted library allocation
page read and write
2714110F000
unclassified section
page read and write
1F19FDFE000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F19ECB5000
trusted library allocation
page read and write
1F1AAC47000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F19ECBB000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19FFAB000
trusted library allocation
page read and write
1F19FDFE000
trusted library allocation
page read and write
1F19DF53000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F019F94000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F019F47000
trusted library allocation
page read and write
1F1A00C6000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F1A5FB4000
trusted library allocation
page read and write
1F1AACAB000
trusted library allocation
page read and write
1F1A68CC000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
1F1A9CF7000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F19DD78000
trusted library allocation
page read and write
1F1A282C000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F1A95D8000
trusted library allocation
page read and write
1F1A7AE4000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19FDC8000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194F08000
heap
page read and write
1F194E8E000
heap
page read and write
1F19E682000
trusted library allocation
page read and write
1F1AABF3000
trusted library allocation
page read and write
1F19FFCB000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F19E1F6000
trusted library allocation
page read and write
1F1AA076000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
27141130000
heap
page read and write
27141FF1000
heap
page read and write
1F19F39C000
trusted library allocation
page read and write
1F19B869000
heap
page read and write
1F194EA7000
heap
page read and write
1F194EB4000
heap
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F19EC78000
trusted library allocation
page read and write
1F1A18CF000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F19B87A000
heap
page read and write
1F1A6874000
trusted library allocation
page read and write
1F19E6B7000
trusted library allocation
page read and write
1F19B1F6000
trusted library allocation
page read and write
1F19B1F4000
trusted library allocation
page read and write
1F1A9780000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1AA0AF000
trusted library allocation
page read and write
1F19F9B7000
trusted library allocation
page read and write
1F194F32000
heap
page read and write
27141FE8000
heap
page read and write
1F194EC5000
heap
page read and write
1F19DEA5000
trusted library allocation
page read and write
1092000
heap
page read and write
1F194ED6000
heap
page read and write
1F1A63DC000
trusted library allocation
page read and write
107A000
heap
page read and write
1F194EC5000
heap
page read and write
1F194E73000
heap
page read and write
1F194F04000
heap
page read and write
1F1A186B000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194EE5000
heap
page read and write
1F019AC0000
unclassified section
page readonly
1F1A5F24000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19DE68000
trusted library allocation
page read and write
1F19DD6A000
trusted library allocation
page read and write
1F19F9AD000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F194EA3000
heap
page read and write
1F19EDC1000
trusted library allocation
page read and write
1F1A14F0000
trusted library allocation
page read and write
1F1A007C000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
6F26DFE000
stack
page read and write
1F1AAC56000
trusted library allocation
page read and write
1F1AAC78000
trusted library allocation
page read and write
6F24DFF000
stack
page read and write
1F1A6212000
trusted library allocation
page read and write
1F19F9BE000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194EC0000
heap
page read and write
1F194EB4000
heap
page read and write
1F1A5F12000
trusted library allocation
page read and write
1F19E177000
trusted library allocation
page read and write
1F1A9524000
trusted library allocation
page read and write
1F1A63BD000
trusted library allocation
page read and write
2A2F6203000
trusted library allocation
page read and write
1F19DF8E000
trusted library allocation
page read and write
2A2F61B4000
heap
page read and write
1E432B29000
heap
page read and write
1F1A0074000
trusted library allocation
page read and write
1F1A14C5000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F19ED6E000
trusted library allocation
page read and write
1F1A14F0000
trusted library allocation
page read and write
295DA5F1000
trusted library allocation
page execute read
1F194EB6000
heap
page read and write
1F1A8079000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194EA4000
heap
page read and write
7BC000
unkown
page readonly
1F194EC5000
heap
page read and write
1F1A0BF3000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A61C2000
trusted library allocation
page read and write
1F19FE7F000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194E88000
heap
page read and write
27140EE0000
unclassified section
page readonly
1F1A9558000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F19F4AE000
trusted library allocation
page read and write
1F1A07C1000
trusted library allocation
page read and write
1F19E1CD000
trusted library allocation
page read and write
1F1A1478000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F19ED15000
trusted library allocation
page read and write
1F199F82000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F19DA33000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1A08E6000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19EC48000
trusted library allocation
page read and write
1F19F377000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19FCAC000
trusted library allocation
page read and write
1F19E684000
trusted library allocation
page read and write
1F19F4F1000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A06E4000
trusted library allocation
page read and write
1F199898000
trusted library allocation
page read and write
1F19FCF7000
trusted library allocation
page read and write
1F019F12000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
2E9A39E000
unkown
page readonly
2714206D000
heap
page read and write
1F019F96000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A06E4000
trusted library allocation
page read and write
1F1998A7000
trusted library allocation
page read and write
1F19DF9D000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19FDDE000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F1AA401000
heap
page read and write
1F19F38C000
trusted library allocation
page read and write
1F1A6221000
trusted library allocation
page read and write
1F19FF43000
trusted library allocation
page read and write
1F19F488000
trusted library allocation
page read and write
2A2F5D30000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194EA7000
heap
page read and write
1F1A0533000
trusted library allocation
page read and write
1F19B87A000
heap
page read and write
720000
unkown
page readonly
1F19FDDE000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194E8E000
heap
page read and write
1F1AAC87000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F19FDEE000
trusted library allocation
page read and write
1F19DFCD000
trusted library allocation
page read and write
1F19EC76000
trusted library allocation
page read and write
1F1A09EC000
trusted library allocation
page read and write
1F19DA62000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19ED2C000
trusted library allocation
page read and write
1F1A952F000
trusted library allocation
page read and write
1F1A00BB000
trusted library allocation
page read and write
1F1A07FD000
trusted library allocation
page read and write
1F1AABE5000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EA5000
heap
page read and write
27141400000
heap
page read and write
1F19FF67000
trusted library allocation
page read and write
1F1A00D2000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F19DFBE000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F1A14C8000
trusted library allocation
page read and write
1F1A9F64000
trusted library allocation
page read and write
1F1A042F000
trusted library allocation
page read and write
1F19DFB3000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F194EB4000
heap
page read and write
1F19ECB5000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F19FFBB000
trusted library allocation
page read and write
2714206D000
heap
page read and write
1F1A9518000
trusted library allocation
page read and write
1F1A68DB000
trusted library allocation
page read and write
1093000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F19FFE4000
trusted library allocation
page read and write
1F1A05A0000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19F647000
trusted library allocation
page read and write
1F1A0533000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194EA4000
heap
page read and write
1F1A058A000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F1A96DB000
trusted library allocation
page read and write
1F19B08E000
trusted library allocation
page read and write
1F1A14D6000
trusted library allocation
page read and write
27141FF1000
heap
page read and write
D31B2BE000
unkown
page readonly
1F194E94000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F019F0B000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19B1BE000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F19F045000
trusted library allocation
page read and write
271411DA000
unkown
page execute read
1F194EC0000
heap
page read and write
1F194EC0000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A0599000
trusted library allocation
page read and write
1F19EC36000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
27141FE8000
heap
page read and write
1F194E8D000
heap
page read and write
1F1A9523000
trusted library allocation
page read and write
1F1AA0CD000
trusted library allocation
page read and write
1F1A1526000
trusted library allocation
page read and write
1F19EDC3000
trusted library allocation
page read and write
1F1A95C7000
trusted library allocation
page read and write
1F19ED0D000
trusted library allocation
page read and write
1F19B8AB000
heap
page read and write
D31B23E000
unkown
page readonly
1F194EF3000
heap
page read and write
1F194F17000
heap
page read and write
1F1AABE5000
trusted library allocation
page read and write
1F1A07DC000
trusted library allocation
page read and write
1F19F5E0000
trusted library allocation
page read and write
1F19F360000
trusted library allocation
page read and write
6F265FE000
stack
page read and write
1F1AA31C000
trusted library allocation
page read and write
1F19FE77000
trusted library allocation
page read and write
1F1A14D3000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19ED80000
trusted library allocation
page read and write
1F19FDA1000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F1AABDD000
trusted library allocation
page read and write
1F19F993000
trusted library allocation
page read and write
1F1A9FF1000
trusted library allocation
page read and write
1F1A61C2000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194F0D000
heap
page read and write
1F194EA5000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A0074000
trusted library allocation
page read and write
1F1A68CC000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19ED25000
trusted library allocation
page read and write
1F1AA320000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194E9A000
heap
page read and write
1F1A18CC000
trusted library allocation
page read and write
1F19F9B5000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A05B8000
trusted library allocation
page read and write
1F1A1893000
trusted library allocation
page read and write
1F1A63B6000
trusted library allocation
page read and write
1F19DD9A000
trusted library allocation
page read and write
1F19F9B1000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194EA4000
heap
page read and write
1F1A08E8000
trusted library allocation
page read and write
1F19E675000
trusted library allocation
page read and write
1F019B90000
heap
page read and write
1F19EC25000
trusted library allocation
page read and write
1F19FF9B000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1AAB50000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F19B663000
trusted library allocation
page read and write
1F1A00A7000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194EF5000
heap
page read and write
1F194E79000
heap
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1AA2B7000
trusted library allocation
page read and write
1F194EA6000
heap
page read and write
1F1A5FE1000
trusted library allocation
page read and write
1F199E23000
trusted library allocation
page read and write
D31B27E000
stack
page read and write
1F1A0A79000
trusted library allocation
page read and write
1F1A95AD000
trusted library allocation
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F19B196000
trusted library allocation
page read and write
1F19DD90000
trusted library allocation
page read and write
1F1A06D8000
trusted library allocation
page read and write
271411D0000
unkown
page execute read
1F19DAE7000
trusted library allocation
page read and write
2A2F5D24000
trusted library allocation
page read and write
1F1A0644000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194F08000
heap
page read and write
1F1A1463000
trusted library allocation
page read and write
B5CCDFE000
stack
page read and write
1F194E99000
heap
page read and write
1E430F73000
heap
page read and write
1F1A1ED8000
trusted library allocation
page read and write
1F1A0B6C000
trusted library allocation
page read and write
27141F69000
heap
page read and write
1F19F01B000
trusted library allocation
page read and write
1F1AABED000
trusted library allocation
page read and write
1F194EA3000
heap
page read and write
271411F5000
unkown
page execute read
1F19F03D000
trusted library allocation
page read and write
2A2F5B6E000
remote allocation
page execute read
1F1A26C8000
trusted library allocation
page read and write
1F1A00C1000
trusted library allocation
page read and write
7E2000
unkown
page readonly
1F1A18CF000
trusted library allocation
page read and write
1F19DFCE000
trusted library allocation
page read and write
1F1A68F1000
trusted library allocation
page read and write
1F19DDAC000
trusted library allocation
page read and write
1F019F2E000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F1A95CB000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194F0D000
heap
page read and write
27141FE3000
heap
page read and write
1F19F4E7000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19F9B1000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F19FFC8000
trusted library allocation
page read and write
271411C0000
trusted library allocation
page read and write
1F19DF87000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F194E6E000
heap
page read and write
2714188E000
heap
page read and write
1F1A9531000
trusted library allocation
page read and write
27141F7F000
heap
page read and write
1F19EC06000
trusted library allocation
page read and write
1F1AAC99000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
1F19B0A5000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F1A0484000
trusted library allocation
page read and write
1F19F5C9000
trusted library allocation
page read and write
1F19DF58000
trusted library allocation
page read and write
1F1A6898000
trusted library allocation
page read and write
1F1A6826000
trusted library allocation
page read and write
1F1A9554000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
7E2000
unkown
page readonly
1F19F9AF000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F19ED84000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F19EDCC000
trusted library allocation
page read and write
1F19ED54000
trusted library allocation
page read and write
106E000
heap
page read and write
1F1A0BC0000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F194EC0000
heap
page read and write
1F194E82000
heap
page read and write
1F19B0AC000
trusted library allocation
page read and write
2714203B000
heap
page read and write
1F194EED000
heap
page read and write
1F194EEE000
heap
page read and write
1F194EE6000
heap
page read and write
1F194EE5000
heap
page read and write
1F1AA0A8000
trusted library allocation
page read and write
1F19ECC4000
trusted library allocation
page read and write
1F1AA4CE000
heap
page read and write
1F1A14DE000
trusted library allocation
page read and write
1F19B8B9000
heap
page read and write
1F194F04000
heap
page read and write
1F1A681F000
trusted library allocation
page read and write
1F1998BF000
trusted library allocation
page read and write
1F19FFAE000
trusted library allocation
page read and write
1F19F499000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19B091000
trusted library allocation
page read and write
1F19FE00000
trusted library allocation
page read and write
1F1A05E7000
trusted library allocation
page read and write
1F1A14C0000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F1A6898000
trusted library allocation
page read and write
1F1A0009000
trusted library allocation
page read and write
1F19F52E000
trusted library allocation
page read and write
1F1A5F32000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F1A14F8000
trusted library allocation
page read and write
1F1A07C1000
trusted library allocation
page read and write
1F19DD78000
trusted library allocation
page read and write
1F19FF5F000
trusted library allocation
page read and write
1F1A2833000
trusted library allocation
page read and write
1F19DD50000
trusted library allocation
page read and write
1F1A7A05000
trusted library allocation
page read and write
1F1A147B000
trusted library allocation
page read and write
1F1A1EE4000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1AA435000
heap
page read and write
1F1A0032000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19FF67000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A61B7000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F194EC5000
heap
page read and write
2A2F5D5F000
trusted library allocation
page read and write
1F19FDF9000
trusted library allocation
page read and write
1F019BB0000
heap
page read and write
1F1A6882000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A62D2000
trusted library allocation
page read and write
1F1A0883000
trusted library allocation
page read and write
2A2F5AE0000
unclassified section
page readonly
1F19DA7A000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F1A1473000
trusted library allocation
page read and write
27141FE8000
heap
page read and write
27140F80000
heap
page read and write
1F1A956F000
trusted library allocation
page read and write
1F19DFC4000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F194EBA000
heap
page read and write
1F19FFE1000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
271413BA000
trusted library allocation
page read and write
1F19FE56000
trusted library allocation
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
27141FF1000
heap
page read and write
1F19DFFC000
trusted library allocation
page read and write
1F1AACB4000
trusted library allocation
page read and write
2A2F5D15000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A07B9000
trusted library allocation
page read and write
3881000
heap
page read and write
1F19DFFC000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
2A2F5D69000
trusted library allocation
page read and write
1F1A80A5000
trusted library allocation
page read and write
1F1A6600000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
2A2F5DB2000
trusted library allocation
page read and write
1F19E63C000
trusted library allocation
page read and write
1F19DA72000
trusted library allocation
page read and write
1F19FD0E000
trusted library allocation
page read and write
1F19B0C0000
trusted library allocation
page read and write
1F1A60D5000
trusted library allocation
page read and write
1F1A14D6000
trusted library allocation
page read and write
1F1A000D000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F194EE8000
heap
page read and write
1F19ED52000
trusted library allocation
page read and write
1F19EC46000
trusted library allocation
page read and write
1F1A80F8000
trusted library allocation
page read and write
1F1A14EB000
trusted library allocation
page read and write
1F1AA471000
heap
page read and write
1F19F4BC000
trusted library allocation
page read and write
1F1A79E5000
trusted library allocation
page read and write
1F19F6FD000
trusted library allocation
page read and write
1F1A2705000
trusted library allocation
page read and write
1F1A21F1000
trusted library allocation
page read and write
1F194F18000
heap
page read and write
1F1A05F0000
trusted library allocation
page read and write
1F1998B3000
trusted library allocation
page read and write
1F19EC0D000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194E88000
heap
page read and write
1F1A06F3000
trusted library allocation
page read and write
1F01A104000
heap
page read and write
27141312000
trusted library allocation
page read and write
1F1A14EB000
trusted library allocation
page read and write
1F19ED29000
trusted library allocation
page read and write
1F1A8EA8000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F194EE5000
heap
page read and write
1F1AA3E7000
trusted library allocation
page read and write
1F1AABE9000
trusted library allocation
page read and write
1F1A0472000
trusted library allocation
page read and write
27141310000
trusted library allocation
page read and write
1F19DF6F000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194EED000
heap
page read and write
1F1A068E000
trusted library allocation
page read and write
1F1A06F3000
trusted library allocation
page read and write
1F1A148E000
trusted library allocation
page read and write
1F1A60CD000
trusted library allocation
page read and write
1F1A0A56000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1AA2F1000
trusted library allocation
page read and write
1F1A952F000
trusted library allocation
page read and write
1F19ED2C000
trusted library allocation
page read and write
1F1A80E8000
trusted library allocation
page read and write
7F4000
unkown
page readonly
1E30000
heap
page read and write
1F1A6188000
trusted library allocation
page read and write
1F194E92000
heap
page read and write
1F199E71000
trusted library allocation
page read and write
106B000
heap
page read and write
1F194EA3000
heap
page read and write
1F194EC5000
heap
page read and write
1F01A102000
heap
page read and write
1F19B09A000
trusted library allocation
page read and write
2A2F5D72000
trusted library allocation
page read and write
1F1A996B000
trusted library allocation
page read and write
1F19F053000
trusted library allocation
page read and write
1F019CB3000
heap
page read and write
1F19B848000
heap
page read and write
1F194EF5000
heap
page read and write
1F199F1A000
trusted library allocation
page read and write
1F1A00E8000
trusted library allocation
page read and write
1F19B1EB000
trusted library allocation
page read and write
1F19B6D5000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F194F05000
heap
page read and write
1F1A9521000
trusted library allocation
page read and write
12A63091E000
trusted library allocation
page read and write
1F19DAA9000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A064E000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194EF5000
heap
page read and write
1F194E94000
heap
page read and write
1F194E8F000
heap
page read and write
1F1AABA9000
trusted library allocation
page read and write
1F19ECC8000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1AAC78000
trusted library allocation
page read and write
1F1AA46A000
heap
page read and write
1F194EA5000
heap
page read and write
1F194E94000
heap
page read and write
1F1A9591000
trusted library allocation
page read and write
27142058000
heap
page read and write
1F19ECBF000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F194E9D000
heap
page read and write
1F1A05B3000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A95D2000
trusted library allocation
page read and write
1F1A9087000
trusted library allocation
page read and write
1F19FDEE000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A1888000
trusted library allocation
page read and write
1F19FD39000
trusted library allocation
page read and write
1F19F038000
trusted library allocation
page read and write
1F1A907F000
trusted library allocation
page read and write
1F1A95AD000
trusted library allocation
page read and write
1F19F98C000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F1A00EE000
trusted library allocation
page read and write
1F1A00D2000
trusted library allocation
page read and write
2714136F000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19F5E7000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F19F994000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194EEE000
heap
page read and write
1F19DD94000
trusted library allocation
page read and write
1F1A184F000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19DD71000
trusted library allocation
page read and write
1F1A07B7000
trusted library allocation
page read and write
1F19B6CF000
trusted library allocation
page read and write
1F1AA082000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19DE65000
trusted library allocation
page read and write
1F19F4D9000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19B881000
heap
page read and write
1F194F0D000
heap
page read and write
1F1A68C3000
trusted library allocation
page read and write
1F1A61B0000
trusted library allocation
page read and write
1F19E633000
trusted library allocation
page read and write
1F19E1F6000
trusted library allocation
page read and write
1F1A9F2B000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F1A27E4000
trusted library allocation
page read and write
1F1A9927000
trusted library allocation
page read and write
1F1A18CC000
trusted library allocation
page read and write
1F194F1B000
heap
page read and write
1F19FCE6000
trusted library allocation
page read and write
1F1A5F3C000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F19FF8B000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1089000
heap
page read and write
1F19F00D000
trusted library allocation
page read and write
2A2F5E52000
unclassified section
page read and write
1F194F02000
heap
page read and write
1F1A0597000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F19F548000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19F5D1000
trusted library allocation
page read and write
1F19F02C000
trusted library allocation
page read and write
1F1A0AFD000
trusted library allocation
page read and write
1F1AAC5C000
trusted library allocation
page read and write
1F19DF91000
trusted library allocation
page read and write
1F19DECE000
trusted library allocation
page read and write
1F19F9B1000
trusted library allocation
page read and write
1F1A6060000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
2A2F5B70000
unclassified section
page readonly
1F19FFCB000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A80B8000
trusted library allocation
page read and write
1F1A952F000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F194E90000
heap
page read and write
1F194EEE000
heap
page read and write
1F19B8D3000
heap
page read and write
1F1A7B06000
trusted library allocation
page read and write
1F19B84B000
heap
page read and write
27141F60000
heap
page read and write
1F1AACAB000
trusted library allocation
page read and write
1F199881000
trusted library allocation
page read and write
1F019B43000
remote allocation
page execute read
1F194ED6000
heap
page read and write
1F1AA366000
trusted library allocation
page read and write
1F194F10000
heap
page read and write
1F194EFB000
heap
page read and write
1F19ECFB000
trusted library allocation
page read and write
1F1AAC5E000
trusted library allocation
page read and write
1F1A276D000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A61F7000
trusted library allocation
page read and write
1F19F9DC000
trusted library allocation
page read and write
1F1A62CC000
trusted library allocation
page read and write
1F1AAC66000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EC0000
heap
page read and write
2A2F5AF0000
unclassified section
page readonly
1F194F1B000
heap
page read and write
1F19ED56000
trusted library allocation
page read and write
1F1A9582000
trusted library allocation
page read and write
1F19E64D000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
614000
heap
page read and write
1F194E88000
heap
page read and write
1F01A01B000
trusted library allocation
page read and write
1089000
heap
page read and write
27141F00000
heap
page read and write
1F1A63E0000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1A9595000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19DE68000
trusted library allocation
page read and write
1F19F9DC000
trusted library allocation
page read and write
1F19F9DC000
trusted library allocation
page read and write
1F1A609B000
trusted library allocation
page read and write
1F1A27AC000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F199F17000
trusted library allocation
page read and write
1F19F01B000
trusted library allocation
page read and write
1F19F03C000
trusted library allocation
page read and write
1F1AA401000
heap
page read and write
1F194ED6000
heap
page read and write
974000
heap
page read and write
1F1A9944000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EA5000
heap
page read and write
1F19F553000
trusted library allocation
page read and write
1F194EFA000
heap
page read and write
1074000
heap
page read and write
1F19F03C000
trusted library allocation
page read and write
1F194E99000
heap
page read and write
1F1A90E1000
trusted library allocation
page read and write
271411E0000
heap
page read and write
1F19FFD9000
trusted library allocation
page read and write
1F1A00EA000
trusted library allocation
page read and write
1F1AABE5000
trusted library allocation
page read and write
1F19F6EA000
trusted library allocation
page read and write
1F1A2741000
trusted library allocation
page read and write
1F19FDF1000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F19F9B3000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19B059000
trusted library allocation
page read and write
1F1A07AF000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F19EDA8000
trusted library allocation
page read and write
1F1A95BC000
trusted library allocation
page read and write
1F1AA05D000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F19F02E000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
2A2F5D82000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A055D000
trusted library allocation
page read and write
1F19DECE000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F194F25000
heap
page read and write
1F194EE8000
heap
page read and write
1F1A18BD000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1AA401000
heap
page read and write
1F194E8E000
heap
page read and write
1F194EFB000
heap
page read and write
1F194EE5000
heap
page read and write
1F1AA401000
heap
page read and write
1F194EEE000
heap
page read and write
1F1AA4BC000
heap
page read and write
1F1A994A000
trusted library allocation
page read and write
1F19AE2C000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F194EA7000
heap
page read and write
1F194E88000
heap
page read and write
1F1A63DC000
trusted library allocation
page read and write
1F19F050000
trusted library allocation
page read and write
1F19DE3C000
trusted library allocation
page read and write
1F19F38F000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A0828000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F19E653000
trusted library allocation
page read and write
1F19F5B1000
trusted library allocation
page read and write
1F19B8B5000
heap
page read and write
1F19ED91000
trusted library allocation
page read and write
1F1A62BE000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
27142044000
heap
page read and write
1F1A00C1000
trusted library allocation
page read and write
1F19E118000
trusted library allocation
page read and write
27141F60000
heap
page read and write
1F194ED6000
heap
page read and write
1F19F5C1000
trusted library allocation
page read and write
1F1A63BD000
trusted library allocation
page read and write
2A2F5D76000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194E9A000
heap
page read and write
1F194EB4000
heap
page read and write
1F194E88000
heap
page read and write
1F194E94000
heap
page read and write
1F194EC5000
heap
page read and write
1F1A066C000
trusted library allocation
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F1A96D7000
trusted library allocation
page read and write
27141300000
trusted library allocation
page read and write
1F1A952F000
trusted library allocation
page read and write
1F1A617B000
trusted library allocation
page read and write
1F194EAE000
heap
page read and write
1F19F707000
trusted library allocation
page read and write
1F1A7B2E000
trusted library allocation
page read and write
1F1A00EA000
trusted library allocation
page read and write
1F1A61B9000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194F17000
heap
page read and write
1F194EF5000
heap
page read and write
1F194E9F000
heap
page read and write
1F194E8E000
heap
page read and write
1F194E6F000
heap
page read and write
1F1A7B01000
trusted library allocation
page read and write
1F19DFBE000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F194EE5000
heap
page read and write
1F194E9D000
heap
page read and write
1F1AA324000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EC5000
heap
page read and write
1F194E8F000
heap
page read and write
1F19DF8A000
trusted library allocation
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F1A6835000
trusted library allocation
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F1A0059000
trusted library allocation
page read and write
1F1A1851000
trusted library allocation
page read and write
1F194F16000
heap
page read and write
1F1A685C000
trusted library allocation
page read and write
1F1A0961000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F1A1890000
trusted library allocation
page read and write
1F19F0D5000
trusted library allocation
page read and write
1F19FDB3000
trusted library allocation
page read and write
108D000
heap
page read and write
1F194EB4000
heap
page read and write
1F1A7A4D000
trusted library allocation
page read and write
1F19F5E4000
trusted library allocation
page read and write
1F019F10000
trusted library allocation
page read and write
1F19F02A000
trusted library allocation
page read and write
1F18FDEB000
heap
page read and write
1F1A14FA000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19FDEE000
trusted library allocation
page read and write
1F1A68AA000
trusted library allocation
page read and write
1F1A80B8000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19F4BD000
trusted library allocation
page read and write
1F1A1455000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19ED0A000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19F017000
trusted library allocation
page read and write
1F1AA2F3000
trusted library allocation
page read and write
1F19F4B5000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19FDF5000
trusted library allocation
page read and write
1F1A9100000
trusted library allocation
page read and write
1F1A9595000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E8E000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F1AACBD000
trusted library allocation
page read and write
1F1A0438000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
2A2F5CE0000
heap
page read and write
1F1A6876000
trusted library allocation
page read and write
1F1A0083000
trusted library allocation
page read and write
1F19B23A000
trusted library allocation
page read and write
1F19F4C0000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194E6E000
heap
page read and write
1F19FFA7000
trusted library allocation
page read and write
1F1A1EC6000
trusted library allocation
page read and write
1F1A0475000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F19B8AB000
heap
page read and write
1F194E94000
heap
page read and write
1F1A0B70000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F19F558000
trusted library allocation
page read and write
1F1A09C7000
trusted library allocation
page read and write
1F19ED29000
trusted library allocation
page read and write
1F19ECC8000
trusted library allocation
page read and write
1F1A9937000
trusted library allocation
page read and write
1F19FF9E000
trusted library allocation
page read and write
1F19E10F000
trusted library allocation
page read and write
1F19FDA1000
trusted library allocation
page read and write
1F1A0BEB000
trusted library allocation
page read and write
1F1A002C000
trusted library allocation
page read and write
2714135C000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F194E8F000
heap
page read and write
271413CC000
trusted library allocation
page read and write
1F19F6B7000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194E8E000
heap
page read and write
1F194EF3000
heap
page read and write
1F194E94000
heap
page read and write
1F19F02E000
trusted library allocation
page read and write
1F1A14D6000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F19B869000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
14DDB3B0000
heap
page read and write
1F194E9D000
heap
page read and write
1F194E8E000
heap
page read and write
1F194E95000
heap
page read and write
1F19DFC9000
trusted library allocation
page read and write
1F1A14C5000
trusted library allocation
page read and write
1F1A8098000
trusted library allocation
page read and write
1F19F4BC000
trusted library allocation
page read and write
27141F60000
heap
page read and write
1F1A686D000
trusted library allocation
page read and write
1F194EB6000
heap
page read and write
1F19B1F4000
trusted library allocation
page read and write
1F019FA4000
trusted library allocation
page read and write
1F194E97000
heap
page read and write
1F194EE5000
heap
page read and write
1F1AAC72000
trusted library allocation
page read and write
1F1A274D000
trusted library allocation
page read and write
1F1A689D000
trusted library allocation
page read and write
1F019FBA000
trusted library allocation
page read and write
1F19B8AF000
heap
page read and write
1F1A607E000
trusted library allocation
page read and write
1F19DF87000
trusted library allocation
page read and write
27142021000
heap
page read and write
1F194EEE000
heap
page read and write
1F19FE75000
trusted library allocation
page read and write
1F19F0D7000
trusted library allocation
page read and write
1F1A002C000
trusted library allocation
page read and write
1F19DE1F000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F194EEE000
heap
page read and write
1F19DF47000
trusted library allocation
page read and write
1F19DF8E000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F19FF9B000
trusted library allocation
page read and write
1F194EA3000
heap
page read and write
1F194EE8000
heap
page read and write
1F19DF5E000
trusted library allocation
page read and write
1F19B1DC000
trusted library allocation
page read and write
2A2F6300000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F194E71000
heap
page read and write
1F19DD61000
trusted library allocation
page read and write
1F1A2684000
trusted library allocation
page read and write
1F19FF67000
trusted library allocation
page read and write
B5CB3DE000
stack
page read and write
1F194E9F000
heap
page read and write
1F1A95D8000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F194EA5000
heap
page read and write
1F1A05F0000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19ED99000
trusted library allocation
page read and write
1F19B822000
heap
page read and write
1F194E8D000
heap
page read and write
1F194EA4000
heap
page read and write
1F19FDEE000
trusted library allocation
page read and write
1F19F5EF000
trusted library allocation
page read and write
1F1A0070000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A0533000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F199F26000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194F17000
heap
page read and write
1F19FD7C000
trusted library allocation
page read and write
1F1A60EA000
trusted library allocation
page read and write
1F1A0897000
trusted library allocation
page read and write
1F19F038000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F194EC0000
heap
page read and write
1F19B1F6000
trusted library allocation
page read and write
1F1A0654000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F194E73000
heap
page read and write
1F19DD9C000
trusted library allocation
page read and write
1F194E8D000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
1F19B882000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F19DF5E000
trusted library allocation
page read and write
1F19B1EB000
trusted library allocation
page read and write
614000
heap
page read and write
1F19F5E7000
trusted library allocation
page read and write
1F19DD7C000
trusted library allocation
page read and write
1F1A18CF000
trusted library allocation
page read and write
1F19F9C1000
trusted library allocation
page read and write
1F19B17D000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F18FDC9000
heap
page read and write
1F194EA4000
heap
page read and write
27141F60000
heap
page read and write
1F194E9A000
heap
page read and write
1F194EC5000
heap
page read and write
1E431370000
heap
page read and write
27140EF0000
unclassified section
page readonly
1F194F08000
heap
page read and write
1F194E88000
heap
page read and write
1F19FDFB000
trusted library allocation
page read and write
1F1A08E0000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194EC0000
heap
page read and write
1F19FFBB000
trusted library allocation
page read and write
1F19F5E4000
trusted library allocation
page read and write
1F1A90C4000
trusted library allocation
page read and write
27141F09000
heap
page read and write
1F19FF29000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F1A061B000
trusted library allocation
page read and write
1F1A04C7000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1AA3C3000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E9A000
heap
page read and write
1F194F17000
heap
page read and write
1F19F4F8000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194EB8000
heap
page read and write
1F1A0BEF000
trusted library allocation
page read and write
1F19ED35000
trusted library allocation
page read and write
1F1A188A000
trusted library allocation
page read and write
1F19B881000
heap
page read and write
1F194EA4000
heap
page read and write
1F19FF73000
trusted library allocation
page read and write
1F1A03FE000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
27141F01000
heap
page read and write
1F194E9F000
heap
page read and write
1F19ED51000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F194ED6000
heap
page read and write
1F194F0D000
heap
page read and write
1F194EFE000
heap
page read and write
1F194E88000
heap
page read and write
27142079000
heap
page read and write
1F19F591000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F194E6F000
heap
page read and write
1F19DE6A000
trusted library allocation
page read and write
27141E2A000
trusted library allocation
page read and write
1F19DD45000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F19FFD9000
trusted library allocation
page read and write
1F19E65A000
trusted library allocation
page read and write
1F1A63C5000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A212F000
trusted library allocation
page read and write
1F1AA406000
heap
page read and write
1F194EC5000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A0667000
trusted library allocation
page read and write
1F1A63B6000
trusted library allocation
page read and write
1F19FFA7000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194EFB000
heap
page read and write
1E430F6E000
heap
page read and write
1F19F04D000
trusted library allocation
page read and write
1F19ED44000
trusted library allocation
page read and write
1F1AA2E5000
trusted library allocation
page read and write
1E430EE0000
heap
page read and write
1F1A9543000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1AAC72000
trusted library allocation
page read and write
2A2F5B50000
remote allocation
page read and write
1F19E68F000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F194E88000
heap
page read and write
27141FAA000
heap
page read and write
1F194EF5000
heap
page read and write
1F19FDE4000
trusted library allocation
page read and write
1F1A63E0000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F194E94000
heap
page read and write
1F1A1877000
trusted library allocation
page read and write
1F1A09E8000
trusted library allocation
page read and write
1F19FFC1000
trusted library allocation
page read and write
1F19B1C7000
trusted library allocation
page read and write
1F19FDDA000
trusted library allocation
page read and write
1F1A63BA000
trusted library allocation
page read and write
1F1A0B95000
trusted library allocation
page read and write
1F019F5B000
trusted library allocation
page read and write
1F1A5FCF000
trusted library allocation
page read and write
1F1A96FC000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
27141F7D000
heap
page read and write
1F1AA446000
heap
page read and write
1F194E9F000
heap
page read and write
2E9BDFE000
stack
page read and write
1F1AABF8000
trusted library allocation
page read and write
1F1A0B67000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F1A68D8000
trusted library allocation
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F19E645000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1071000
heap
page read and write
1F19E65B000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194E82000
heap
page read and write
1F1A002A000
trusted library allocation
page read and write
1F19FDDA000
trusted library allocation
page read and write
1F19FDCF000
trusted library allocation
page read and write
1F1A80B0000
trusted library allocation
page read and write
1F1AABD5000
trusted library allocation
page read and write
1F1A8075000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A6188000
trusted library allocation
page read and write
27141F8A000
heap
page read and write
1F1A90DE000
trusted library allocation
page read and write
1F1A1879000
trusted library allocation
page read and write
1F194E93000
heap
page read and write
2714206D000
heap
page read and write
1F19F6EC000
trusted library allocation
page read and write
1F1A00EE000
trusted library allocation
page read and write
1F1A95D8000
trusted library allocation
page read and write
1F1A9F1A000
trusted library allocation
page read and write
1F19EC80000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19ED51000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F1AA0CF000
trusted library allocation
page read and write
1F19FDF5000
trusted library allocation
page read and write
1F1A5F20000
trusted library allocation
page read and write
1F19B8B7000
heap
page read and write
1F1AAC5C000
trusted library allocation
page read and write
1F1A0582000
trusted library allocation
page read and write
1F1A9085000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F1A188A000
trusted library allocation
page read and write
1F1A26A2000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
D31C2BE000
unkown
page readonly
2714135F000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EE9000
heap
page read and write
1F1A68F1000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
1F19EC72000
trusted library allocation
page read and write
1F1AA03D000
trusted library allocation
page read and write
1F19B8A6000
heap
page read and write
1F194E8E000
heap
page read and write
1F019AD0000
unclassified section
page readonly
1F194E79000
heap
page read and write
1F19F053000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
1F1AA3BB000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1AA076000
trusted library allocation
page read and write
1F19B87A000
heap
page read and write
1F194E73000
heap
page read and write
1F1A00BF000
trusted library allocation
page read and write
1F1A007C000
trusted library allocation
page read and write
1F194E9B000
heap
page read and write
1F19B8F0000
heap
page read and write
1F194EFC000
heap
page read and write
2714202C000
heap
page read and write
1F1A616A000
trusted library allocation
page read and write
1F1A681A000
trusted library allocation
page read and write
27141318000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19FFC8000
trusted library allocation
page read and write
1F1A05BF000
trusted library allocation
page read and write
1F19FFD4000
trusted library allocation
page read and write
27142077000
heap
page read and write
1F1A80B8000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F19DFB3000
trusted library allocation
page read and write
1F1A6383000
trusted library allocation
page read and write
1F19F702000
trusted library allocation
page read and write
1F19EDCC000
trusted library allocation
page read and write
1F1A18A9000
trusted library allocation
page read and write
1F1A09E4000
trusted library allocation
page read and write
2A2F5D11000
trusted library allocation
page read and write
27142058000
heap
page read and write
1F194E88000
heap
page read and write
1F19DE61000
trusted library allocation
page read and write
1F19E6B4000
trusted library allocation
page read and write
1F19F9C0000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F194E88000
heap
page read and write
1F19DD43000
trusted library allocation
page read and write
1F19F02F000
trusted library allocation
page read and write
1F19DFA7000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19F4C0000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F194E94000
heap
page read and write
1F194E73000
heap
page read and write
1F1A9F61000
trusted library allocation
page read and write
1F1A80C1000
trusted library allocation
page read and write
1F19B056000
trusted library allocation
page read and write
1F1A90AE000
trusted library allocation
page read and write
1F1A05A8000
trusted library allocation
page read and write
1F1A7A0C000
trusted library allocation
page read and write
2E9D7BE000
unkown
page readonly
B5CD63E000
unkown
page readonly
1F194EEE000
heap
page read and write
1F1A148E000
trusted library allocation
page read and write
1F19E661000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19FDCA000
trusted library allocation
page read and write
1F1A0036000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19E67A000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EE6000
heap
page read and write
1F1A8600000
trusted library allocation
page read and write
1F19ED91000
trusted library allocation
page read and write
1F1AA4CE000
heap
page read and write
14DDB260000
heap
page read and write
1F19FD43000
trusted library allocation
page read and write
1F19FD20000
trusted library allocation
page read and write
1F1A5F7F000
trusted library allocation
page read and write
1F19FCEE000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194E95000
heap
page read and write
1F1A6882000
trusted library allocation
page read and write
1074000
heap
page read and write
1F1A62B9000
trusted library allocation
page read and write
1F19DF6C000
trusted library allocation
page read and write
1F1A07E8000
trusted library allocation
page read and write
1F19DA62000
trusted library allocation
page read and write
1F19ED11000
trusted library allocation
page read and write
1F19F4C4000
trusted library allocation
page read and write
1F19DC00000
trusted library allocation
page read and write
27141376000
trusted library allocation
page read and write
1063000
heap
page read and write
970000
heap
page read and write
1F194E8E000
heap
page read and write
1092000
heap
page read and write
1F194EA7000
heap
page read and write
1F194E6F000
heap
page read and write
1F19DE4B000
trusted library allocation
page read and write
1F19B097000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F1A2743000
trusted library allocation
page read and write
1F1A680B000
trusted library allocation
page read and write
1F1A0632000
trusted library allocation
page read and write
1F1A68BD000
trusted library allocation
page read and write
2A2F5DC4000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A6835000
trusted library allocation
page read and write
1F19DFDC000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194EB1000
heap
page read and write
1F194EFB000
heap
page read and write
1F19F57F000
trusted library allocation
page read and write
1F19ED6E000
trusted library allocation
page read and write
1F1A7AA7000
trusted library allocation
page read and write
1F1A18CC000
trusted library allocation
page read and write
27141F9C000
heap
page read and write
2A2F5D03000
trusted library allocation
page read and write
1F1A6180000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F194EB4000
heap
page read and write
1F194E9A000
heap
page read and write
1F1AAC60000
trusted library allocation
page read and write
1F1A188A000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F194E9A000
heap
page read and write
27141FED000
heap
page read and write
1F1A68D5000
trusted library allocation
page read and write
1093000
heap
page read and write
1F1AAC8D000
trusted library allocation
page read and write
1F1A14FA000
trusted library allocation
page read and write
1F199F7E000
trusted library allocation
page read and write
1F19B056000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19FAF3000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1AA0B8000
trusted library allocation
page read and write
1F1A80FD000
trusted library allocation
page read and write
1F19FF3B000
trusted library allocation
page read and write
27141FE9000
heap
page read and write
1F19F038000
trusted library allocation
page read and write
1F194E8D000
heap
page read and write
1F194E6F000
heap
page read and write
1F19F00A000
trusted library allocation
page read and write
1F19B869000
heap
page read and write
1F1A0584000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A5F2E000
trusted library allocation
page read and write
1F1A066C000
trusted library allocation
page read and write
1F1A06E4000
trusted library allocation
page read and write
1F1A9C1A000
trusted library allocation
page read and write
1F19F579000
trusted library allocation
page read and write
1F1A62CC000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19AE4F000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F1A7AC5000
trusted library allocation
page read and write
2714202B000
heap
page read and write
1F19F9CB000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F194EE8000
heap
page read and write
1F1AABC5000
trusted library allocation
page read and write
1F1A99E8000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19FE84000
trusted library allocation
page read and write
1F1A9F1A000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F019F03000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19FF1B000
trusted library allocation
page read and write
1F1AA0CD000
trusted library allocation
page read and write
1F19F9AD000
trusted library allocation
page read and write
1F19DE53000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F019F92000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19DFAA000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19DE68000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A1896000
trusted library allocation
page read and write
1F1AA435000
heap
page read and write
1F19F4C5000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
14DDB600000
trusted library allocation
page read and write
1F19DE49000
trusted library allocation
page read and write
1F19DF3B000
trusted library allocation
page read and write
1F1A6269000
trusted library allocation
page read and write
1F1A7A6D000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F1A1EB2000
trusted library allocation
page read and write
7F4000
unkown
page readonly
1F1AACC2000
trusted library allocation
page read and write
1F01A003000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F1A14CB000
trusted library allocation
page read and write
1F19DFB8000
trusted library allocation
page read and write
1F194EF6000
heap
page read and write
1F194ED6000
heap
page read and write
1F19AE49000
trusted library allocation
page read and write
1F019C70000
heap
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F194F0F000
heap
page read and write
27141110000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F19B848000
heap
page read and write
1F19F4DC000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F1A1890000
trusted library allocation
page read and write
1F019F7B000
trusted library allocation
page read and write
27141FE0000
heap
page read and write
1F19F031000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194EF3000
heap
page read and write
1F194EF5000
heap
page read and write
1F19F01D000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F19E63F000
trusted library allocation
page read and write
1F19EC58000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194F04000
heap
page read and write
1F1A0470000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19DFC4000
trusted library allocation
page read and write
1F19FDDE000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
27141F6C000
heap
page read and write
1F1AA427000
heap
page read and write
1F19FD05000
trusted library allocation
page read and write
1F19F9BB000
trusted library allocation
page read and write
1F1A6182000
trusted library allocation
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A968D000
trusted library allocation
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F19E6C1000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19ED84000
trusted library allocation
page read and write
1F19F9CB000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A08DE000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A03F6000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19DA7C000
trusted library allocation
page read and write
27141970000
trusted library allocation
page read and write
27142077000
heap
page read and write
1F1AA0AF000
trusted library allocation
page read and write
1F19B669000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F19B17D000
trusted library allocation
page read and write
27142044000
heap
page read and write
1F19ED74000
trusted library allocation
page read and write
1F19FE30000
trusted library allocation
page read and write
1F19FF2E000
trusted library allocation
page read and write
1F1A057A000
trusted library allocation
page read and write
1F19B1BC000
trusted library allocation
page read and write
1F19B8B5000
heap
page read and write
1F19F9C0000
trusted library allocation
page read and write
1F19ED76000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A68BB000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
FEF000
stack
page read and write
1F194E71000
heap
page read and write
108B000
heap
page read and write
1F1A9596000
trusted library allocation
page read and write
1F19F4B3000
trusted library allocation
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19FDDE000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F194ED6000
heap
page read and write
1F194EF5000
heap
page read and write
1F19DDF3000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A084A000
trusted library allocation
page read and write
27141FE9000
heap
page read and write
1F1A18CC000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19F9B7000
trusted library allocation
page read and write
1F19DD71000
trusted library allocation
page read and write
1F19FF43000
trusted library allocation
page read and write
1F1A00E8000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1AA042000
trusted library allocation
page read and write
1F19F70A000
trusted library allocation
page read and write
1F019FB1000
trusted library allocation
page read and write
1F1AA0D1000
trusted library allocation
page read and write
1F19ED74000
trusted library allocation
page read and write
1F19FCAE000
trusted library allocation
page read and write
1F19F04B000
trusted library allocation
page read and write
1F1A18C2000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F19ECC8000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F194EE9000
heap
page read and write
1F19EDCC000
trusted library allocation
page read and write
1F19F00F000
trusted library allocation
page read and write
1F19F5CF000
trusted library allocation
page read and write
1F19F4B9000
trusted library allocation
page read and write
1F1A80FD000
trusted library allocation
page read and write
1F19F004000
trusted library allocation
page read and write
1F1A03FE000
trusted library allocation
page read and write
1F1A63C5000
trusted library allocation
page read and write
1F19ED84000
trusted library allocation
page read and write
1F19ECC4000
trusted library allocation
page read and write
FBE000
stack
page read and write
1F1A6835000
trusted library allocation
page read and write
1F19B8A6000
heap
page read and write
1F194EC5000
heap
page read and write
1F199F26000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19ED2C000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F1A95AD000
trusted library allocation
page read and write
1F1A1895000
trusted library allocation
page read and write
1F1A18E6000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A1E8E000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F019F70000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F194E9D000
heap
page read and write
1F194EF5000
heap
page read and write
1F194EF3000
heap
page read and write
1F1A9081000
trusted library allocation
page read and write
1F19B66B000
trusted library allocation
page read and write
27141374000
trusted library allocation
page read and write
1F19FDFB000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F1A14C0000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F19FF31000
trusted library allocation
page read and write
1E430F80000
heap
page read and write
1F19FFBB000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194EA5000
heap
page read and write
1F194F17000
heap
page read and write
1F19ED40000
trusted library allocation
page read and write
1F1A0B9F000
trusted library allocation
page read and write
1F19DFBE000
trusted library allocation
page read and write
614000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A9FAC000
trusted library allocation
page read and write
1F19DFC4000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1AA2DD000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A9946000
trusted library allocation
page read and write
1F1A05B3000
trusted library allocation
page read and write
1F1A18CC000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F1A099F000
trusted library allocation
page read and write
1F1AA401000
heap
page read and write
1F1A1891000
trusted library allocation
page read and write
1F1A61B2000
trusted library allocation
page read and write
1F19F482000
trusted library allocation
page read and write
1F1A6830000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F19F0E0000
trusted library allocation
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F1A0BD4000
trusted library allocation
page read and write
1F19DFD8000
trusted library allocation
page read and write
1F19B822000
heap
page read and write
1F194E87000
heap
page read and write
1F1A9583000
trusted library allocation
page read and write
1F1A05E1000
trusted library allocation
page read and write
1F1A1890000
trusted library allocation
page read and write
1F1A0653000
trusted library allocation
page read and write
1F19B076000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A9590000
trusted library allocation
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F1A0623000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194E94000
heap
page read and write
1F1A95C0000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194EF3000
heap
page read and write
1F1A00C8000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194E79000
heap
page read and write
1F194F0D000
heap
page read and write
1F1A07FB000
trusted library allocation
page read and write
1F19A000000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E94000
heap
page read and write
1F194ED6000
heap
page read and write
1F19F9F4000
trusted library allocation
page read and write
1F19F54A000
trusted library allocation
page read and write
1F194EB6000
heap
page read and write
1F194EE6000
heap
page read and write
1F1A5FB4000
trusted library allocation
page read and write
1F19F03C000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F19DE8C000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E83000
heap
page read and write
1F194EC5000
heap
page read and write
1F1A0475000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A00C1000
trusted library allocation
page read and write
1F19FD79000
trusted library allocation
page read and write
1F19B19A000
trusted library allocation
page read and write
1F19DAA2000
trusted library allocation
page read and write
1F19ED80000
trusted library allocation
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A1EF9000
trusted library allocation
page read and write
1F194E99000
heap
page read and write
1F1AA2B3000
trusted library allocation
page read and write
1F19B663000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A0B8E000
trusted library allocation
page read and write
1F1A60D7000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F1A689D000
trusted library allocation
page read and write
1F19DFFC000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A14C0000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F19FE09000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F19E15C000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1C3F000
stack
page read and write
7EC000
unkown
page write copy
1F194E9D000
heap
page read and write
1F194EA5000
heap
page read and write
1F194EA7000
heap
page read and write
1F19DA63000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19B8A6000
heap
page read and write
3881000
heap
page read and write
1F1A80C1000
trusted library allocation
page read and write
1F1A9543000
trusted library allocation
page read and write
1F19B1AA000
trusted library allocation
page read and write
107C000
heap
page read and write
1F1AAC64000
trusted library allocation
page read and write
1F194EBE000
heap
page read and write
1F19B8A3000
heap
page read and write
1F1AAB76000
trusted library allocation
page read and write
1F1AA366000
trusted library allocation
page read and write
1F1A616A000
trusted library allocation
page read and write
27141F8D000
heap
page read and write
1F1AA0CD000
trusted library allocation
page read and write
1F1A18C3000
trusted library allocation
page read and write
1F019C20000
heap
page read and write
27141348000
trusted library allocation
page read and write
1F1A7B2C000
trusted library allocation
page read and write
1F1A9523000
trusted library allocation
page read and write
1F1A1847000
trusted library allocation
page read and write
1F1A80F8000
trusted library allocation
page read and write
1F1A1461000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F1A61B7000
trusted library allocation
page read and write
614000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A63E0000
trusted library allocation
page read and write
1F19DA74000
trusted library allocation
page read and write
1F1AAC99000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194E8E000
heap
page read and write
1F194E9A000
heap
page read and write
1F1A8079000
trusted library allocation
page read and write
1F194EB0000
heap
page read and write
1F19DFBB000
trusted library allocation
page read and write
1F19DFCC000
trusted library allocation
page read and write
27141F60000
heap
page read and write
1F1AACC4000
trusted library allocation
page read and write
271413C6000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F19F6B3000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
1F19F67C000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F1A96B7000
trusted library allocation
page read and write
1F19FDC8000
trusted library allocation
page read and write
1F1A63A7000
trusted library allocation
page read and write
1F1A689D000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19B8AB000
heap
page read and write
1F194E71000
heap
page read and write
1F1AABC7000
trusted library allocation
page read and write
1F194F26000
heap
page read and write
1F194F10000
heap
page read and write
1F194E9A000
heap
page read and write
1F194EE6000
heap
page read and write
1F19B0A5000
trusted library allocation
page read and write
1F1A055D000
trusted library allocation
page read and write
1F1AA4D1000
heap
page read and write
1F194EEE000
heap
page read and write
1F1A148E000
trusted library allocation
page read and write
1F1AAB60000
trusted library allocation
page read and write
1F194E83000
heap
page read and write
1F19F038000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194EED000
heap
page read and write
1F19DE53000
trusted library allocation
page read and write
1F1A08AC000
trusted library allocation
page read and write
1F1AA0B8000
trusted library allocation
page read and write
1073000
heap
page read and write
1F194E82000
heap
page read and write
1F1AA0DF000
trusted library allocation
page read and write
106A000
heap
page read and write
1F19DD9A000
trusted library allocation
page read and write
1F1A6188000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F019F6E000
trusted library allocation
page read and write
7EC000
unkown
page read and write
27142058000
heap
page read and write
1F194F04000
heap
page read and write
1F19B89D000
heap
page read and write
1F1AA2F3000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F01A012000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194EC0000
heap
page read and write
1F194F17000
heap
page read and write
1F19ECC8000
trusted library allocation
page read and write
1F019FE7000
trusted library allocation
page read and write
1F19B19D000
trusted library allocation
page read and write
1F19F527000
trusted library allocation
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F19F98F000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F1A046B000
trusted library allocation
page read and write
1F1A6174000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A61C2000
trusted library allocation
page read and write
1F1AACB4000
trusted library allocation
page read and write
1F19F04A000
trusted library allocation
page read and write
1F1A1A02000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A0616000
trusted library allocation
page read and write
1F1A0BD0000
trusted library allocation
page read and write
2A2F5D00000
trusted library allocation
page read and write
1F19FD76000
trusted library allocation
page read and write
1F1A0B87000
trusted library allocation
page read and write
27141F4D000
heap
page read and write
1F19B8B6000
heap
page read and write
1F1A18A9000
trusted library allocation
page read and write
1F19DD5E000
trusted library allocation
page read and write
1F19F5D1000
trusted library allocation
page read and write
1F19DE65000
trusted library allocation
page read and write
27141090000
heap
page read and write
1F1A00AB000
trusted library allocation
page read and write
27141385000
trusted library allocation
page read and write
1F1A008E000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1AA0D7000
trusted library allocation
page read and write
1F19DECE000
trusted library allocation
page read and write
1F1A5F00000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A9087000
trusted library allocation
page read and write
1F1A6194000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A7B33000
trusted library allocation
page read and write
1F19B895000
heap
page read and write
1F19ECF9000
trusted library allocation
page read and write
1F19FCE2000
trusted library allocation
page read and write
27141980000
unkown
page execute read
1F19F9C5000
trusted library allocation
page read and write
1F19B84B000
heap
page read and write
1F1A0667000
trusted library allocation
page read and write
1F1A1864000
trusted library allocation
page read and write
1F1A5FD6000
trusted library allocation
page read and write
1077000
heap
page read and write
1F1A0484000
trusted library allocation
page read and write
1F1A68AA000
trusted library allocation
page read and write
1F1A5F7F000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E88000
heap
page read and write
1F1A0842000
trusted library allocation
page read and write
1F19EC78000
trusted library allocation
page read and write
1F1A7AAC000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
27141F63000
heap
page read and write
1F19FDEE000
trusted library allocation
page read and write
1F1998C5000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
27141323000
trusted library allocation
page read and write
1F1A18A9000
trusted library allocation
page read and write
1900DFC000
stack
page read and write
1F19FD5C000
trusted library allocation
page read and write
1F1A95C0000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A7A48000
trusted library allocation
page read and write
1F194EFA000
heap
page read and write
1F199F66000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1A148C000
trusted library allocation
page read and write
1F1A0BAF000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1A0564000
trusted library allocation
page read and write
1F1A05BA000
trusted library allocation
page read and write
1F1AA401000
heap
page read and write
1F199FE4000
trusted library allocation
page read and write
27141FF2000
heap
page read and write
1F19F984000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19E63A000
trusted library allocation
page read and write
1F19F9AF000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E77000
heap
page read and write
1F194EFB000
heap
page read and write
1F1A969B000
trusted library allocation
page read and write
1F19F560000
trusted library allocation
page read and write
1F19F0CA000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F19B882000
heap
page read and write
1F194ED6000
heap
page read and write
1F194E94000
heap
page read and write
1F194E9A000
heap
page read and write
1F194E90000
heap
page read and write
1F19B6CF000
trusted library allocation
page read and write
1F1A991F000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A0BCA000
trusted library allocation
page read and write
1F19DF87000
trusted library allocation
page read and write
1F19F5D4000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1079000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A18C2000
trusted library allocation
page read and write
1F19FF59000
trusted library allocation
page read and write
1F19DD7C000
trusted library allocation
page read and write
2E9E7BE000
unkown
page readonly
1F194E8D000
heap
page read and write
1F19FD3C000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19F017000
trusted library allocation
page read and write
1F19ED1D000
trusted library allocation
page read and write
1F1A09FC000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F1A9564000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F1A08CD000
trusted library allocation
page read and write
1F1A9555000
trusted library allocation
page read and write
1F19F4E2000
trusted library allocation
page read and write
1F19F053000
trusted library allocation
page read and write
1F19F59E000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19F4A4000
trusted library allocation
page read and write
1F19FDCB000
trusted library allocation
page read and write
1F1AA06B000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F19F58D000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194EFA000
heap
page read and write
1F194E94000
heap
page read and write
1F1A07A3000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EFB000
heap
page read and write
1F19B1DC000
trusted library allocation
page read and write
1F19F4C8000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F019CB0000
heap
page read and write
1F194E71000
heap
page read and write
1F194E94000
heap
page read and write
1F194EFE000
heap
page read and write
1F1A095F000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19DD97000
trusted library allocation
page read and write
1F19ED8F000
trusted library allocation
page read and write
1F19F9BE000
trusted library allocation
page read and write
1F19FF71000
trusted library allocation
page read and write
1F19ED99000
trusted library allocation
page read and write
1F19F46B000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1A05F7000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F1A07D6000
trusted library allocation
page read and write
1F194E71000
heap
page read and write
1F19DFBE000
trusted library allocation
page read and write
1F19FD23000
trusted library allocation
page read and write
1F1A80E8000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194F0D000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A18CF000
trusted library allocation
page read and write
6F25DFE000
stack
page read and write
1F1A14D3000
trusted library allocation
page read and write
1F19FE39000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F194EF5000
heap
page read and write
1F1A96C3000
trusted library allocation
page read and write
1F194E70000
heap
page read and write
1F1A0455000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194EED000
heap
page read and write
D3199D8000
stack
page read and write
1F194E8D000
heap
page read and write
1F019F00000
trusted library allocation
page read and write
1F1AA2AF000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F194EFA000
heap
page read and write
D318FDD000
stack
page read and write
1F19B8F0000
heap
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F19F48B000
trusted library allocation
page read and write
1F194EF6000
heap
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F19F54E000
trusted library allocation
page read and write
1F1A61C2000
trusted library allocation
page read and write
1E430EC0000
heap
page read and write
1F19B089000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19E1A8000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F194F05000
heap
page read and write
1F1AACBD000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194E9D000
heap
page read and write
1F1A68F9000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A06F3000
trusted library allocation
page read and write
1F19F3EB000
trusted library allocation
page read and write
1F19B097000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F1A05DC000
trusted library allocation
page read and write
1F1A6258000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194E88000
heap
page read and write
1F019B30000
remote allocation
page read and write
1F194E73000
heap
page read and write
5F0000
heap
page read and write
1F19DE65000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F194EE8000
heap
page read and write
1F194EF5000
heap
page read and write
14DDB590000
heap
page read and write
1F194E8F000
heap
page read and write
1F1A6830000
trusted library allocation
page read and write
610000
heap
page read and write
2A2F5D18000
trusted library allocation
page read and write
1F19F9FD000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
108E000
heap
page read and write
1F19B14E000
trusted library allocation
page read and write
1F1A06E4000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EA5000
heap
page read and write
1F1A0B7C000
trusted library allocation
page read and write
1F1A0425000
trusted library allocation
page read and write
1F19DE59000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F1A620D000
trusted library allocation
page read and write
1F194EFA000
heap
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F194E90000
heap
page read and write
1F19FDB3000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194EE5000
heap
page read and write
1F194EE8000
heap
page read and write
1F19EDB8000
trusted library allocation
page read and write
1F19E635000
trusted library allocation
page read and write
1F194F0F000
heap
page read and write
1F194E6F000
heap
page read and write
D318F9E000
unkown
page readonly
1F19EC58000
trusted library allocation
page read and write
2A2F630C000
trusted library allocation
page read and write
1F194F18000
heap
page read and write
1F194E88000
heap
page read and write
1F194E9A000
heap
page read and write
1F194F15000
heap
page read and write
1F1A68C5000
trusted library allocation
page read and write
2A2F5F00000
trusted library allocation
page read and write
1F1A63AE000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EA5000
heap
page read and write
1F194E94000
heap
page read and write
1F1A7A41000
trusted library allocation
page read and write
1F1A9F46000
trusted library allocation
page read and write
1F1A61BA000
trusted library allocation
page read and write
1F1AA4CE000
heap
page read and write
1F19F989000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1AA4CE000
heap
page read and write
614000
heap
page read and write
1F194E73000
heap
page read and write
1F1AA03D000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19EDB9000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1A0075000
trusted library allocation
page read and write
1F194EB0000
heap
page read and write
3881000
heap
page read and write
1F19E66F000
trusted library allocation
page read and write
1F19ED1F000
trusted library allocation
page read and write
1F19F3C4000
trusted library allocation
page read and write
271410E0000
heap
page readonly
1F1A0834000
trusted library allocation
page read and write
1F1A098F000
trusted library allocation
page read and write
1072000
heap
page read and write
1F1A6807000
trusted library allocation
page read and write
1F19DA1D000
trusted library allocation
page read and write
1F019F79000
trusted library allocation
page read and write
1F19FF68000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F1A0723000
trusted library allocation
page read and write
1F1A6898000
trusted library allocation
page read and write
1F1A9927000
trusted library allocation
page read and write
1F1A14CB000
trusted library allocation
page read and write
271419D0000
heap
page read and write
1F19E18D000
trusted library allocation
page read and write
1F19F5CF000
trusted library allocation
page read and write
1F1A0958000
trusted library allocation
page read and write
1F1A1896000
trusted library allocation
page read and write
1F19FF8D000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A5F9D000
trusted library allocation
page read and write
1F19DFBB000
trusted library allocation
page read and write
1F19B848000
heap
page read and write
1F1AAC8D000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19DE8E000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194F0D000
heap
page read and write
1F194EC0000
heap
page read and write
1F194EC5000
heap
page read and write
1F194E8E000
heap
page read and write
1F194EFB000
heap
page read and write
1F194EE8000
heap
page read and write
1F19FCD2000
trusted library allocation
page read and write
1F1A61CE000
trusted library allocation
page read and write
14DDB400000
trusted library allocation
page read and write
1F1A955E000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194EC0000
heap
page read and write
2A2F5DDB000
trusted library allocation
page read and write
1F194F1B000
heap
page read and write
1F194E94000
heap
page read and write
1F194E9A000
heap
page read and write
27142077000
heap
page read and write
1F194E8D000
heap
page read and write
1F01A00C000
trusted library allocation
page read and write
1F19F02A000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194E88000
heap
page read and write
1F19FDCA000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194E73000
heap
page read and write
1F1A1876000
trusted library allocation
page read and write
1F194F04000
heap
page read and write
1F194E94000
heap
page read and write
1F1A63BD000
trusted library allocation
page read and write
1F1A5F3B000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F1A80B4000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19F4FA000
trusted library allocation
page read and write
1F1A00AC000
trusted library allocation
page read and write
1F19B84B000
heap
page read and write
1F1A1855000
trusted library allocation
page read and write
D31A9FE000
stack
page read and write
1F194EE9000
heap
page read and write
1F194E6F000
heap
page read and write
1F194EAB000
heap
page read and write
FCE000
stack
page read and write
1F1A07AF000
trusted library allocation
page read and write
1F194F1C000
heap
page read and write
1F1A61C2000
trusted library allocation
page read and write
1F1A8079000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
2A2F5D70000
trusted library allocation
page read and write
1F19DF5E000
trusted library allocation
page read and write
27142058000
heap
page read and write
1F1A186E000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A0036000
trusted library allocation
page read and write
1F19F4AE000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F19FEFB000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
1F1A809D000
trusted library allocation
page read and write
1F1A9F23000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F194E9E000
heap
page read and write
1F19F0CD000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
3880000
heap
page read and write
1F194E9A000
heap
page read and write
1F19F9BE000
trusted library allocation
page read and write
1F1AA462000
heap
page read and write
1F194E88000
heap
page read and write
1F1A26E5000
trusted library allocation
page read and write
1F1A991F000
trusted library allocation
page read and write
1F194EA8000
heap
page read and write
1F1A05AD000
trusted library allocation
page read and write
1F1A1877000
trusted library allocation
page read and write
1F1A80F8000
trusted library allocation
page read and write
2A2F5D64000
trusted library allocation
page read and write
14DDB370000
heap
page read and write
1F1A0592000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EEE000
heap
page read and write
1F1AA401000
heap
page read and write
1F19FED9000
trusted library allocation
page read and write
1F19DF85000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A60C0000
trusted library allocation
page read and write
27141303000
trusted library allocation
page read and write
27141070000
heap
page read and write
1F1AAC47000
trusted library allocation
page read and write
1F194EFD000
heap
page read and write
1F194EF3000
heap
page read and write
1F1A003D000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F194EEE000
heap
page read and write
1F1A066C000
trusted library allocation
page read and write
1F19F5E4000
trusted library allocation
page read and write
1F19FD10000
trusted library allocation
page read and write
1F1A18A9000
trusted library allocation
page read and write
1F19DF4C000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1AACAB000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19989E000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F194E9D000
heap
page read and write
2A2F6207000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F1A21B3000
trusted library allocation
page read and write
1F1A907D000
trusted library allocation
page read and write
1F19F02E000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F19FDB6000
trusted library allocation
page read and write
1F19E62C000
trusted library allocation
page read and write
271411D5000
unkown
page execute read
1F1A68D1000
trusted library allocation
page read and write
1F194EFD000
heap
page read and write
1F1A68C3000
trusted library allocation
page read and write
1F194F1C000
heap
page read and write
1F19FF23000
trusted library allocation
page read and write
1F19F342000
trusted library allocation
page read and write
1F19ED91000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F19AE20000
trusted library allocation
page read and write
1F19EC34000
trusted library allocation
page read and write
1F199F13000
trusted library allocation
page read and write
1F1A6882000
trusted library allocation
page read and write
1F1A6830000
trusted library allocation
page read and write
2714202B000
heap
page read and write
1F19B14E000
trusted library allocation
page read and write
1F1A80C1000
trusted library allocation
page read and write
1F19ED33000
trusted library allocation
page read and write
1F194E8D000
heap
page read and write
1F194EFC000
heap
page read and write
1F1A956A000
trusted library allocation
page read and write
1F1A7E00000
trusted library allocation
page read and write
1F1A0632000
trusted library allocation
page read and write
1F19F4CD000
trusted library allocation
page read and write
1F19FDE4000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EB6000
heap
page read and write
1F1A05B8000
trusted library allocation
page read and write
1F19FF71000
trusted library allocation
page read and write
1F194F25000
heap
page read and write
1F194EA3000
heap
page read and write
1F1A0921000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
1F1AA39C000
trusted library allocation
page read and write
1F19FF68000
trusted library allocation
page read and write
1F1A068E000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F19EC20000
trusted library allocation
page read and write
1F19FDB0000
trusted library allocation
page read and write
1F19F9F7000
trusted library allocation
page read and write
614000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A098D000
trusted library allocation
page read and write
1F1A6179000
trusted library allocation
page read and write
1F1A907D000
trusted library allocation
page read and write
1F194E99000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A0666000
trusted library allocation
page read and write
1F1A68F1000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F1A95FC000
trusted library allocation
page read and write
1F19EDB8000
trusted library allocation
page read and write
1F1A8075000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F18FDDE000
heap
page read and write
1F19B0AC000
trusted library allocation
page read and write
1F1A689D000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1E430F50000
heap
page read and write
27141361000
trusted library allocation
page read and write
1F1A0021000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F1A14C8000
trusted library allocation
page read and write
1F19B1A1000
trusted library allocation
page read and write
1F1AABC5000
trusted library allocation
page read and write
1F19EDB3000
trusted library allocation
page read and write
1F1A0068000
trusted library allocation
page read and write
1F19DFFC000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19ED84000
trusted library allocation
page read and write
1F1AABB3000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F1A0613000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F194EFE000
heap
page read and write
1F1A68F3000
trusted library allocation
page read and write
1F1A63C5000
trusted library allocation
page read and write
1F1AA401000
heap
page read and write
1F194EB0000
heap
page read and write
1F1AA0DF000
trusted library allocation
page read and write
1F199E2F000
trusted library allocation
page read and write
1F1A616A000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F19ED17000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F19FE3C000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1AA0DF000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F19B885000
heap
page read and write
1F19FDC8000
trusted library allocation
page read and write
1F19F3F2000
trusted library allocation
page read and write
1F1A18CF000
trusted library allocation
page read and write
2A2F5E30000
heap
page read and write
2A2F5B90000
heap
page read and write
1F1A90DE000
trusted library allocation
page read and write
1F19FD39000
trusted library allocation
page read and write
1F19F4FE000
trusted library allocation
page read and write
1F1A68C5000
trusted library allocation
page read and write
1F1A95DA000
trusted library allocation
page read and write
7A8E9904000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
614000
heap
page read and write
1F1A05EB000
trusted library allocation
page read and write
1F01A100000
heap
page read and write
1F19F053000
trusted library allocation
page read and write
1F194EFE000
heap
page read and write
1F19B882000
heap
page read and write
1F1A9965000
trusted library allocation
page read and write
1F019C60000
unclassified section
page read and write
1F19DE53000
trusted library allocation
page read and write
1F19FC9E000
trusted library allocation
page read and write
1F1A14A1000
trusted library allocation
page read and write
1F1AA0B8000
trusted library allocation
page read and write
1E431207000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A682D000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A992F000
trusted library allocation
page read and write
1F194F16000
heap
page read and write
1F194E9D000
heap
page read and write
1F01A01F000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F19FDE4000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A9521000
trusted library allocation
page read and write
1F19FD96000
trusted library allocation
page read and write
1F1A008E000
trusted library allocation
page read and write
1F19B8E4000
heap
page read and write
1F1A07FD000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F19F9F4000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F1A07DC000
trusted library allocation
page read and write
1F1AA08D000
trusted library allocation
page read and write
1F19DE89000
trusted library allocation
page read and write
1F19F3E1000
trusted library allocation
page read and write
1F1A282E000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
1F19EC40000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1AAC56000
trusted library allocation
page read and write
1F1A055D000
trusted library allocation
page read and write
1F1A9558000
trusted library allocation
page read and write
1F19FC94000
trusted library allocation
page read and write
940000
heap
page read and write
1F1A9300000
trusted library allocation
page read and write
1F19B0CD000
trusted library allocation
page read and write
1F1A9C9C000
trusted library allocation
page read and write
1F194EFC000
heap
page read and write
1F194ED6000
heap
page read and write
1F194EC0000
heap
page read and write
1F19F9D4000
trusted library allocation
page read and write
1F1A5FE1000
trusted library allocation
page read and write
1F19FFC1000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
2A2F5E60000
heap
page read and write
1F1AA0DB000
trusted library allocation
page read and write
1F19DA80000
trusted library allocation
page read and write
1F1AA4E1000
heap
page read and write
1F1A6150000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F1A2801000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F1A216D000
trusted library allocation
page read and write
1F1AABB9000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A63E0000
trusted library allocation
page read and write
1F1AABB6000
trusted library allocation
page read and write
1F1A183A000
trusted library allocation
page read and write
1F19DFB5000
trusted library allocation
page read and write
1F1A809D000
trusted library allocation
page read and write
1F194F1E000
heap
page read and write
1F19E656000
trusted library allocation
page read and write
1F1A0ACE000
trusted library allocation
page read and write
1F19B869000
heap
page read and write
1F194E8E000
heap
page read and write
1F1A00CB000
trusted library allocation
page read and write
1F19E67A000
trusted library allocation
page read and write
27141F7D000
heap
page read and write
1F19DDCB000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F1A14F0000
trusted library allocation
page read and write
1F1AA082000
trusted library allocation
page read and write
1F19B6C8000
trusted library allocation
page read and write
1F19B6F4000
trusted library allocation
page read and write
1F019F72000
trusted library allocation
page read and write
1F1A18CF000
trusted library allocation
page read and write
1F019F81000
trusted library allocation
page read and write
1F194F15000
heap
page read and write
1F199FB9000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1AACB4000
trusted library allocation
page read and write
1E431200000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19FEE8000
trusted library allocation
page read and write
1F19EDB1000
trusted library allocation
page read and write
1F1AAC72000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19F3DB000
trusted library allocation
page read and write
1F19FD1D000
trusted library allocation
page read and write
1F1A9FE5000
trusted library allocation
page read and write
84D000
stack
page read and write
1F194ED6000
heap
page read and write
1F1AABE9000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F19FD1D000
trusted library allocation
page read and write
1F19F9B1000
trusted library allocation
page read and write
2A2F5E33000
heap
page read and write
1F1A0AC2000
trusted library allocation
page read and write
1F1AAC78000
trusted library allocation
page read and write
1E432B36000
heap
page read and write
1F1A68F3000
trusted library allocation
page read and write
1F194F2C000
heap
page read and write
1F19FFAB000
trusted library allocation
page read and write
1F1A80FD000
trusted library allocation
page read and write
1F1A8098000
trusted library allocation
page read and write
1F19F587000
trusted library allocation
page read and write
7F0000
unkown
page write copy
1F194EC0000
heap
page read and write
1F1A09AE000
trusted library allocation
page read and write
1F19B848000
heap
page read and write
1F194EE5000
heap
page read and write
1F19EC76000
trusted library allocation
page read and write
1F19F04D000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F1A06D8000
trusted library allocation
page read and write
1F19F04A000
trusted library allocation
page read and write
1F194E9B000
heap
page read and write
1F194F04000
heap
page read and write
1F19ED84000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1A80BC000
trusted library allocation
page read and write
1F19FDFE000
trusted library allocation
page read and write
1F1AA39C000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F01A032000
trusted library allocation
page read and write
1F19F018000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E9F000
heap
page read and write
1F1A07D6000
trusted library allocation
page read and write
1F19F01D000
trusted library allocation
page read and write
14DDB60A000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F1A07A3000
trusted library allocation
page read and write
1F1A05B8000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A61B9000
trusted library allocation
page read and write
1F19F4B9000
trusted library allocation
page read and write
1F19F9A9000
trusted library allocation
page read and write
1F1A0492000
trusted library allocation
page read and write
1F19F038000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A098A000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1AABC7000
trusted library allocation
page read and write
1F1A61B2000
trusted library allocation
page read and write
1F1A2857000
trusted library allocation
page read and write
1F19B869000
heap
page read and write
1F1A181F000
trusted library allocation
page read and write
88E000
stack
page read and write
1F1A9564000
trusted library allocation
page read and write
1F19B09A000
trusted library allocation
page read and write
2A2F5DF6000
trusted library allocation
page read and write
1F199FBB000
trusted library allocation
page read and write
1F1A68DB000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1A1896000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F19F6B5000
trusted library allocation
page read and write
1F1A089F000
trusted library allocation
page read and write
1F1A05F7000
trusted library allocation
page read and write
1F19FD96000
trusted library allocation
page read and write
1F194EB6000
heap
page read and write
1F1A14C5000
trusted library allocation
page read and write
1F1AA0C9000
trusted library allocation
page read and write
1F1A61AD000
trusted library allocation
page read and write
1F1AAC72000
trusted library allocation
page read and write
1F19F349000
trusted library allocation
page read and write
1F1A9558000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
27141FFD000
heap
page read and write
1F1AA0DB000
trusted library allocation
page read and write
1F19F5EB000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1AA2F3000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F194ED6000
heap
page read and write
1F1A06FE000
trusted library allocation
page read and write
1F1A07B1000
trusted library allocation
page read and write
1F1A1872000
trusted library allocation
page read and write
1F19FF23000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1A0470000
trusted library allocation
page read and write
1F19FDFB000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E94000
heap
page read and write
1F19DFBE000
trusted library allocation
page read and write
1F1A05F9000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194EC5000
heap
page read and write
1F19DDB3000
trusted library allocation
page read and write
1F1A60C4000
trusted library allocation
page read and write
B5CD5FE000
unkown
page readonly
1F1A62B9000
trusted library allocation
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F194EEE000
heap
page read and write
1F194EEE000
heap
page read and write
1F19ED56000
trusted library allocation
page read and write
1F1A95BC000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E82000
heap
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F19B1C7000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1089000
heap
page read and write
27142044000
heap
page read and write
1F194E95000
heap
page read and write
1F194EC5000
heap
page read and write
1F194EC5000
heap
page read and write
1F1A1877000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194EEE000
heap
page read and write
1F1A267F000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EAE000
heap
page read and write
1F19DF4C000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F19DACD000
trusted library allocation
page read and write
1F1A5F9D000
trusted library allocation
page read and write
1F19EC28000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F19F9C0000
trusted library allocation
page read and write
1F1A9F42000
trusted library allocation
page read and write
1F1A5FFC000
trusted library allocation
page read and write
1F019B50000
unclassified section
page readonly
1F194E88000
heap
page read and write
1F194EEE000
heap
page read and write
1F19B0D0000
trusted library allocation
page read and write
1F19B84B000
heap
page read and write
1F194E88000
heap
page read and write
1F19B1F8000
trusted library allocation
page read and write
1F1A614D000
trusted library allocation
page read and write
1F19FF8F000
trusted library allocation
page read and write
1F19FF8D000
trusted library allocation
page read and write
1F1A9C05000
trusted library allocation
page read and write
1F19E175000
trusted library allocation
page read and write
1F1A5F3B000
trusted library allocation
page read and write
1F19FF44000
trusted library allocation
page read and write
1F19DA33000
trusted library allocation
page read and write
1F1A06FE000
trusted library allocation
page read and write
B5CDE3E000
stack
page read and write
1F194EC0000
heap
page read and write
1F1A6188000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A95C7000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F1AAC99000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194E9A000
heap
page read and write
1F19ED91000
trusted library allocation
page read and write
1F19F00A000
trusted library allocation
page read and write
1F1A689D000
trusted library allocation
page read and write
1F1A0A74000
trusted library allocation
page read and write
6F27DFF000
stack
page read and write
1F19B681000
trusted library allocation
page read and write
1F19E1D9000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A0500000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194EF6000
heap
page read and write
1F19ED54000
trusted library allocation
page read and write
1F1A1895000
trusted library allocation
page read and write
1F19F5CB000
trusted library allocation
page read and write
1F19DE55000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19FDE4000
trusted library allocation
page read and write
1F19FDCA000
trusted library allocation
page read and write
1F1A6270000
trusted library allocation
page read and write
58A000
stack
page read and write
1F1A0052000
trusted library allocation
page read and write
1F19FFAE000
trusted library allocation
page read and write
1040000
heap
page read and write
1F19DA82000
trusted library allocation
page read and write
27141404000
heap
page read and write
1F194EE5000
heap
page read and write
271411DF000
unkown
page execute read
721000
unkown
page execute read
1F194EE6000
heap
page read and write
1F1A95C7000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F194E6F000
heap
page read and write
1F194EBD000
heap
page read and write
1F1A60FD000
trusted library allocation
page read and write
271413BE000
trusted library allocation
page read and write
1F19F5E0000
trusted library allocation
page read and write
1F19FDC5000
trusted library allocation
page read and write
107A000
heap
page read and write
1F194EEE000
heap
page read and write
2A2F5D8F000
trusted library allocation
page read and write
1F1A09C1000
trusted library allocation
page read and write
1F1A05C2000
trusted library allocation
page read and write
1F1A90EC000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19ED47000
trusted library allocation
page read and write
1F194F08000
heap
page read and write
1F194E79000
heap
page read and write
1F19EDCC000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19F9B3000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1A6188000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EA7000
heap
page read and write
27141FA8000
heap
page read and write
1F194E90000
heap
page read and write
1F194EA5000
heap
page read and write
1F194E82000
heap
page read and write
1F19FD20000
trusted library allocation
page read and write
1F1A1874000
trusted library allocation
page read and write
1F19F9B5000
trusted library allocation
page read and write
27141870000
heap
page read and write
1F1A6194000
trusted library allocation
page read and write
1F1AAC66000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194EB4000
heap
page read and write
1F194F08000
heap
page read and write
1F19B1DD000
trusted library allocation
page read and write
1F1A0723000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F19FD43000
trusted library allocation
page read and write
1F1A9F1A000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EE9000
heap
page read and write
27141FF1000
heap
page read and write
1F19E179000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
27141380000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194E94000
heap
page read and write
1F194EA3000
heap
page read and write
1F194F04000
heap
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F19F038000
trusted library allocation
page read and write
1F1A049B000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
2A2F5E80000
unclassified section
page readonly
27141FFD000
heap
page read and write
1F1A62D2000
trusted library allocation
page read and write
1E432B20000
heap
page read and write
1F19B1F6000
trusted library allocation
page read and write
1F19FF68000
trusted library allocation
page read and write
1F1A6807000
trusted library allocation
page read and write
1F1A219E000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19F01B000
trusted library allocation
page read and write
1074000
heap
page read and write
1F19EC23000
trusted library allocation
page read and write
1F194EB0000
heap
page read and write
1F19DFC4000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
27142058000
heap
page read and write
1F19ED6A000
trusted library allocation
page read and write
1F1A9582000
trusted library allocation
page read and write
1F194E8D000
heap
page read and write
B5CB31E000
unkown
page readonly
1F194E9A000
heap
page read and write
1F1A68C5000
trusted library allocation
page read and write
1F1A9543000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F1A049B000
trusted library allocation
page read and write
1F194F0F000
heap
page read and write
1F194EE6000
heap
page read and write
1F194EEE000
heap
page read and write
1F19DFC4000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194EA7000
heap
page read and write
1F194EBD000
heap
page read and write
1F194E8E000
heap
page read and write
FFE000
stack
page read and write
1F194E9A000
heap
page read and write
B5CB2DB000
stack
page read and write
1F194E8E000
heap
page read and write
1F194F0D000
heap
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F1A07D6000
trusted library allocation
page read and write
1F1A9582000
trusted library allocation
page read and write
1F1A05E2000
trusted library allocation
page read and write
1F19DADB000
trusted library allocation
page read and write
1F19DE8E000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
27142021000
heap
page read and write
1F194EB4000
heap
page read and write
1F199EFB000
trusted library allocation
page read and write
1F1A14D3000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F1A62BE000
trusted library allocation
page read and write
1F1AAC66000
trusted library allocation
page read and write
27142058000
heap
page read and write
1F1A1EBA000
trusted library allocation
page read and write
1F1A0BD2000
trusted library allocation
page read and write
1089000
heap
page read and write
1F19F03D000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1AA0C9000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F194ED6000
heap
page read and write
1F019B70000
heap
page read and write
1F194EFB000
heap
page read and write
1F1A60E4000
trusted library allocation
page read and write
1F1A68CC000
trusted library allocation
page read and write
1F1A065C000
trusted library allocation
page read and write
27141FE8000
heap
page read and write
1F19F3A8000
trusted library allocation
page read and write
1F19EC58000
trusted library allocation
page read and write
1F19DD59000
trusted library allocation
page read and write
1F1A61B7000
trusted library allocation
page read and write
1F19DFB8000
trusted library allocation
page read and write
1F1A68AA000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194F04000
heap
page read and write
1F194EB0000
heap
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F19F399000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A0095000
trusted library allocation
page read and write
1F1AA0DD000
trusted library allocation
page read and write
1F1A80B0000
trusted library allocation
page read and write
1F194F10000
heap
page read and write
1F1A68AA000
trusted library allocation
page read and write
1F19DFCC000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194EE8000
heap
page read and write
1F19F61A000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
1F1A9564000
trusted library allocation
page read and write
99803303000
trusted library allocation
page read and write
1F1AA0CF000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
2714113A000
heap
page read and write
1F1A05BA000
trusted library allocation
page read and write
1F1AA0C9000
trusted library allocation
page read and write
1F19DF9C000
trusted library allocation
page read and write
1F19F031000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F1A05B8000
trusted library allocation
page read and write
1F19FF87000
trusted library allocation
page read and write
1F1A1876000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
2E9C677000
stack
page read and write
1F194EE5000
heap
page read and write
1F1A0B4F000
trusted library allocation
page read and write
1F1AA44D000
heap
page read and write
1F194E6F000
heap
page read and write
1F1AA0D7000
trusted library allocation
page read and write
1F1A1895000
trusted library allocation
page read and write
1F1A90E1000
trusted library allocation
page read and write
27141FE0000
heap
page read and write
1F194EE8000
heap
page read and write
1F194EC5000
heap
page read and write
1F19ED6E000
trusted library allocation
page read and write
1F1A2707000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194F08000
heap
page read and write
1F1AABDD000
trusted library allocation
page read and write
2E9C67B000
stack
page read and write
1F194EFB000
heap
page read and write
1F194EF5000
heap
page read and write
1073000
heap
page read and write
1F1A05BA000
trusted library allocation
page read and write
1F1A6190000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F1A5F25000
trusted library allocation
page read and write
1F1A9FB5000
trusted library allocation
page read and write
1F1AA05D000
trusted library allocation
page read and write
1F1A064B000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1E431375000
heap
page read and write
1F1A6258000
trusted library allocation
page read and write
1F194E87000
heap
page read and write
1F194EB6000
heap
page read and write
1F19B8F0000
heap
page read and write
1F19F4CC000
trusted library allocation
page read and write
1F19B8E6000
heap
page read and write
1F1A188C000
trusted library allocation
page read and write
27141F60000
heap
page read and write
1F19F4DE000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
B5CE63E000
unkown
page readonly
1F194EE9000
heap
page read and write
1F1A0492000
trusted library allocation
page read and write
1F19DE85000
trusted library allocation
page read and write
1F19F9FD000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F1A6807000
trusted library allocation
page read and write
1F1A8640000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F194E73000
heap
page read and write
1F1A61E4000
trusted library allocation
page read and write
2A2F5D0C000
trusted library allocation
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F1AA042000
trusted library allocation
page read and write
183E000
stack
page read and write
27142044000
heap
page read and write
1F194E73000
heap
page read and write
1F1A9FF6000
trusted library allocation
page read and write
1F199FF0000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F1A27C5000
trusted library allocation
page read and write
1F19F375000
trusted library allocation
page read and write
1F1A00A6000
trusted library allocation
page read and write
1F1A7A43000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F199FE4000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194EE9000
heap
page read and write
1F194EA7000
heap
page read and write
1F19FFAE000
trusted library allocation
page read and write
1E432B33000
heap
page read and write
2A2F6200000
trusted library allocation
page read and write
1F194E77000
heap
page read and write
1F1A07B9000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F19B8F0000
heap
page read and write
1F1A14FA000
trusted library allocation
page read and write
1F19F0D5000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F194E9A000
heap
page read and write
1089000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A96BF000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194EF3000
heap
page read and write
1F19B1BE000
trusted library allocation
page read and write
1F194E90000
heap
page read and write
1F194EE6000
heap
page read and write
1F19DF8E000
trusted library allocation
page read and write
1F19E648000
trusted library allocation
page read and write
1F1AA2F1000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194F17000
heap
page read and write
1F194E88000
heap
page read and write
1F019C50000
heap
page readonly
1F19DE65000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
27142077000
heap
page read and write
1F19F48D000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E94000
heap
page read and write
1F1A1859000
trusted library allocation
page read and write
1F1A9516000
trusted library allocation
page read and write
1F1AABE9000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F19FD17000
trusted library allocation
page read and write
1F1A00F0000
trusted library allocation
page read and write
1F19B846000
heap
page read and write
1F194E9A000
heap
page read and write
1F19FFED000
trusted library allocation
page read and write
27141FED000
heap
page read and write
1F1AA33E000
trusted library allocation
page read and write
1F1A61AC000
trusted library allocation
page read and write
1F1A992F000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
19015FD000
stack
page read and write
1F194E94000
heap
page read and write
1F1A06D8000
trusted library allocation
page read and write
1F1A18CC000
trusted library allocation
page read and write
1F1A60FD000
trusted library allocation
page read and write
1F1A6269000
trusted library allocation
page read and write
1F1A80B4000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F1A619A000
trusted library allocation
page read and write
1F1A809D000
trusted library allocation
page read and write
1F19DAA9000
trusted library allocation
page read and write
1F19ECB3000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194EB1000
heap
page read and write
1F1A04C4000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194EF6000
heap
page read and write
1F194E95000
heap
page read and write
1F194EFB000
heap
page read and write
1F194E9A000
heap
page read and write
1F19F99B000
trusted library allocation
page read and write
1F1AACBD000
trusted library allocation
page read and write
1F1A046B000
trusted library allocation
page read and write
1F19FDFB000
trusted library allocation
page read and write
2A2F5DF2000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194EF5000
heap
page read and write
1F1A68C5000
trusted library allocation
page read and write
1F1A9F2B000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F19B22D000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F1A90B9000
trusted library allocation
page read and write
1F194E73000
heap
page read and write
1F194E8E000
heap
page read and write
1F194EEE000
heap
page read and write
1F19B8F0000
heap
page read and write
1F194F04000
heap
page read and write
1F194EA5000
heap
page read and write
1F194EA5000
heap
page read and write
1F1A9F3F000
trusted library allocation
page read and write
1F1A9F23000
trusted library allocation
page read and write
1F1AA0AF000
trusted library allocation
page read and write
1F1A63E7000
trusted library allocation
page read and write
1F19B144000
trusted library allocation
page read and write
1F19ED89000
trusted library allocation
page read and write
1F19E653000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1A9F95000
trusted library allocation
page read and write
1F19F4D5000
trusted library allocation
page read and write
1F19F0C3000
trusted library allocation
page read and write
27141F6C000
heap
page read and write
27142077000
heap
page read and write
1F194E9D000
heap
page read and write
1F194EFC000
heap
page read and write
1F194EE8000
heap
page read and write
1F19B698000
trusted library allocation
page read and write
1F1A03F4000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F194EC0000
heap
page read and write
1F19ED5A000
trusted library allocation
page read and write
1F19FE49000
trusted library allocation
page read and write
1F1A61B2000
trusted library allocation
page read and write
27141F8A000
heap
page read and write
1F19F01B000
trusted library allocation
page read and write
1F1A9F9E000
trusted library allocation
page read and write
D318F5E000
stack
page read and write
1F1A95CF000
trusted library allocation
page read and write
1F194F18000
heap
page read and write
1F194F14000
heap
page read and write
1F1A05F7000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19ED25000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F019F23000
trusted library allocation
page read and write
1F19B822000
heap
page read and write
1F19ED6E000
trusted library allocation
page read and write
1F1A80AA000
trusted library allocation
page read and write
1F194E85000
heap
page read and write
1F194EE5000
heap
page read and write
1F194E88000
heap
page read and write
1F194EFB000
heap
page read and write
1F1A68D8000
trusted library allocation
page read and write
1F1AA3E7000
trusted library allocation
page read and write
1F194E76000
heap
page read and write
1F1AABDD000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194E95000
heap
page read and write
27141F64000
heap
page read and write
1F194EA7000
heap
page read and write
1F1A1463000
trusted library allocation
page read and write
1F19DFFC000
trusted library allocation
page read and write
1F19DECE000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A9C9C000
trusted library allocation
page read and write
1F19F613000
trusted library allocation
page read and write
1F1A1827000
trusted library allocation
page read and write
1F19B68C000
trusted library allocation
page read and write
1F19F9BE000
trusted library allocation
page read and write
1F1AA379000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
271413F1000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F194EC5000
heap
page read and write
600000
heap
page read and write
1F19B6D5000
trusted library allocation
page read and write
1F1A18BD000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19DFBB000
trusted library allocation
page read and write
1F194E71000
heap
page read and write
1F19FD5A000
trusted library allocation
page read and write
1F19DAA9000
trusted library allocation
page read and write
614000
heap
page read and write
1F1A9F42000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19DF91000
trusted library allocation
page read and write
1F1A9554000
trusted library allocation
page read and write
1F19E6EB000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19ED84000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F194E88000
heap
page read and write
1F1A5F16000
trusted library allocation
page read and write
1F19F0E2000
trusted library allocation
page read and write
1F1A9F35000
trusted library allocation
page read and write
1F194E8F000
heap
page read and write
1F194E79000
heap
page read and write
1F194E9F000
heap
page read and write
1F19B822000
heap
page read and write
614000
heap
page read and write
1F1A68D5000
trusted library allocation
page read and write
1F1A60BD000
trusted library allocation
page read and write
2E9A3DE000
stack
page read and write
1F194EA5000
heap
page read and write
1F19ED04000
trusted library allocation
page read and write
1F19B1DD000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F1AAC87000
trusted library allocation
page read and write
1F1A08E2000
trusted library allocation
page read and write
1F1A907B000
trusted library allocation
page read and write
1F19F6C3000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19B883000
heap
page read and write
1F019D90000
unclassified section
page readonly
1F019F69000
trusted library allocation
page read and write
1F1A0665000
trusted library allocation
page read and write
721000
unkown
page execute read
1F1A68F3000
trusted library allocation
page read and write
1F19F9B5000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F194ED6000
heap
page read and write
1F19ED74000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194EE5000
heap
page read and write
1F194ED6000
heap
page read and write
1F19B87A000
heap
page read and write
1F19FDBF000
trusted library allocation
page read and write
1F1AA54E000
heap
page read and write
1F1A862D000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F1A8098000
trusted library allocation
page read and write
1F1A61B5000
trusted library allocation
page read and write
1F1A9543000
trusted library allocation
page read and write
1F194EE8000
heap
page read and write
1F194EED000
heap
page read and write
1F194EE5000
heap
page read and write
1063000
heap
page read and write
1F1A18A9000
trusted library allocation
page read and write
1F1AABE5000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19F9CB000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F1A6827000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194F02000
heap
page read and write
1F19B846000
heap
page read and write
1F1A0BA5000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1AA401000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A0466000
trusted library allocation
page read and write
1F19FFBB000
trusted library allocation
page read and write
1F1A907F000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F194E88000
heap
page read and write
1F19E6F1000
trusted library allocation
page read and write
1F1A8E02000
trusted library allocation
page read and write
1F1A2748000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F19ED6A000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194EF5000
heap
page read and write
1F1A63DC000
trusted library allocation
page read and write
1F19EDC3000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19B8A6000
heap
page read and write
1F1A80B0000
trusted library allocation
page read and write
1F1A066C000
trusted library allocation
page read and write
1F1A95C0000
trusted library allocation
page read and write
1089000
heap
page read and write
1F19DFD2000
trusted library allocation
page read and write
27141365000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F194EB4000
heap
page read and write
1F194EEE000
heap
page read and write
1F19DF8E000
trusted library allocation
page read and write
1F1A6835000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F1A0472000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A62D2000
trusted library allocation
page read and write
1F1A9516000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F1AA0A8000
trusted library allocation
page read and write
1F19FF1B000
trusted library allocation
page read and write
27141200000
trusted library allocation
page read and write
1F19DD8A000
trusted library allocation
page read and write
1F194EBF000
heap
page read and write
1F1A6827000
trusted library allocation
page read and write
1F194F1E000
heap
page read and write
27141170000
trusted library section
page readonly
1F1A1EFE000
trusted library allocation
page read and write
1F1A9F35000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E8F000
heap
page read and write
1F19F031000
trusted library allocation
page read and write
1F1A068E000
trusted library allocation
page read and write
1F19ED4E000
trusted library allocation
page read and write
1076000
heap
page read and write
1F19F5A6000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F1A6179000
trusted library allocation
page read and write
1F1A8656000
trusted library allocation
page read and write
1E430F00000
heap
page read and write
1F194EB4000
heap
page read and write
27140F56000
remote allocation
page execute read
1F1AA324000
trusted library allocation
page read and write
1F1A14F8000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E70000
heap
page read and write
271413B5000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F19F69D000
trusted library allocation
page read and write
1F194EA3000
heap
page read and write
1F19B8F0000
heap
page read and write
1F19B6D5000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A618F000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19FD3C000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19FDAE000
trusted library allocation
page read and write
1F1A6898000
trusted library allocation
page read and write
1F19F9DE000
trusted library allocation
page read and write
1F19ED91000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A0449000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F019C6F000
unclassified section
page read and write
1F194E9D000
heap
page read and write
1F194E8E000
heap
page read and write
1F194EE8000
heap
page read and write
1F194EC0000
heap
page read and write
1F194F17000
heap
page read and write
1F1A90EC000
trusted library allocation
page read and write
1F194F15000
heap
page read and write
1F194EE5000
heap
page read and write
27141FA1000
heap
page read and write
1F1A68F3000
trusted library allocation
page read and write
1F1A9083000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F1A62CC000
trusted library allocation
page read and write
1F1A21CE000
trusted library allocation
page read and write
1F194EA4000
heap
page read and write
1F194EB4000
heap
page read and write
27141100000
unclassified section
page read and write
1F1A2806000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F1A6883000
trusted library allocation
page read and write
1F1A9C15000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194EED000
heap
page read and write
1F194E88000
heap
page read and write
1F194F0D000
heap
page read and write
1F19DE5A000
trusted library allocation
page read and write
2A2F5C80000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A00AC000
trusted library allocation
page read and write
1F194EFA000
heap
page read and write
1F199F1E000
trusted library allocation
page read and write
1F1A186B000
trusted library allocation
page read and write
1F1A1ED8000
trusted library allocation
page read and write
1F1AA082000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A90B9000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
1F194F05000
heap
page read and write
1F194E9D000
heap
page read and write
1F194E95000
heap
page read and write
27141102000
unclassified section
page read and write
1F1A60EA000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A68BB000
trusted library allocation
page read and write
1F19EC28000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1AA06B000
trusted library allocation
page read and write
1F1AA48A000
heap
page read and write
1F194F2C000
heap
page read and write
1F194EC0000
heap
page read and write
6F255FE000
stack
page read and write
1F1A68F3000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1A14A1000
trusted library allocation
page read and write
1092000
heap
page read and write
2A2F5D5D000
trusted library allocation
page read and write
1F19FFC1000
trusted library allocation
page read and write
1F1A05BA000
trusted library allocation
page read and write
1F1A61B0000
trusted library allocation
page read and write
1F19F5FB000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A80BC000
trusted library allocation
page read and write
1E432C50000
heap
page read and write
1F194E73000
heap
page read and write
1F194E9D000
heap
page read and write
27141FE0000
heap
page read and write
1F1AA042000
trusted library allocation
page read and write
1F1A95C4000
trusted library allocation
page read and write
1F194E8C000
heap
page read and write
1F19FF1B000
trusted library allocation
page read and write
7BC000
unkown
page readonly
1F194EE8000
heap
page read and write
1F1A68F1000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EC5000
heap
page read and write
1F19F4F5000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1A68B1000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
27141F60000
heap
page read and write
1F19FDB6000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194E8E000
heap
page read and write
1F19F9BB000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194EE9000
heap
page read and write
1F1A96A1000
trusted library allocation
page read and write
1F194EA8000
heap
page read and write
1F19ED56000
trusted library allocation
page read and write
2714130A000
trusted library allocation
page read and write
1F1A0449000
trusted library allocation
page read and write
2A2F5E5F000
unclassified section
page read and write
1F1A07B7000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A1EF5000
trusted library allocation
page read and write
1F199EFE000
trusted library allocation
page read and write
1F1A60EE000
trusted library allocation
page read and write
1F19DE85000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194EBB000
heap
page read and write
1F01A108000
heap
page read and write
1F194E9B000
heap
page read and write
1F1AA446000
heap
page read and write
1F19ED89000
trusted library allocation
page read and write
1F019FB7000
trusted library allocation
page read and write
1F1A9521000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A5F2E000
trusted library allocation
page read and write
1048000
heap
page read and write
1F1AA49B000
heap
page read and write
1F1A63E0000
trusted library allocation
page read and write
1F19B689000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E9A000
heap
page read and write
1F194E8F000
heap
page read and write
1F19ED5D000
trusted library allocation
page read and write
1F19FF44000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F194EED000
heap
page read and write
1F1A80AA000
trusted library allocation
page read and write
1F1AAC87000
trusted library allocation
page read and write
1F19F3D2000
trusted library allocation
page read and write
1F19EC80000
trusted library allocation
page read and write
1F1A0438000
trusted library allocation
page read and write
1F019F66000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F1A9691000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A968D000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F19DF60000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194E9F000
heap
page read and write
1F19F00F000
trusted library allocation
page read and write
614000
heap
page read and write
27141F5C000
heap
page read and write
1F194E8F000
heap
page read and write
1F194EE8000
heap
page read and write
1F19FDF1000
trusted library allocation
page read and write
1F1A6835000
trusted library allocation
page read and write
1F19F9B5000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F194E88000
heap
page read and write
1F194EB4000
heap
page read and write
1F194EFB000
heap
page read and write
1F194F32000
heap
page read and write
2E9D73E000
unkown
page readonly
1F194EEE000
heap
page read and write
1E432B34000
heap
page read and write
1F1A68D5000
trusted library allocation
page read and write
1F194EA7000
heap
page read and write
1F194E79000
heap
page read and write
1F19F02A000
trusted library allocation
page read and write
1F1A081B000
trusted library allocation
page read and write
1F1A06DE000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A095C000
trusted library allocation
page read and write
3A2DA903000
trusted library allocation
page read and write
1F1AAC60000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1A9081000
trusted library allocation
page read and write
1F1A68D5000
trusted library allocation
page read and write
1F19F424000
trusted library allocation
page read and write
1F19FD5A000
trusted library allocation
page read and write
1F19EC40000
trusted library allocation
page read and write
1F1AABDD000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F194E9D000
heap
page read and write
1F1A00E4000
trusted library allocation
page read and write
1F1AA0CF000
trusted library allocation
page read and write
1F1A05EB000
trusted library allocation
page read and write
1F1AA47F000
heap
page read and write
1F194EA4000
heap
page read and write
1F19EDC8000
trusted library allocation
page read and write
1F1AA05D000
trusted library allocation
page read and write
1F1AAC78000
trusted library allocation
page read and write
1F19ED26000
trusted library allocation
page read and write
1F1A1EC6000
trusted library allocation
page read and write
27141FED000
heap
page read and write
1F19F9C5000
trusted library allocation
page read and write
1F194F28000
heap
page read and write
1E432B28000
heap
page read and write
1F194F24000
heap
page read and write
1F1A00BA000
trusted library allocation
page read and write
1F194E6F000
heap
page read and write
1F19FFA7000
trusted library allocation
page read and write
1F1A5FD6000
trusted library allocation
page read and write
1F194EF3000
heap
page read and write
1F19F6B1000
trusted library allocation
page read and write
1F1A0BCC000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19FFC8000
trusted library allocation
page read and write
1901DFE000
stack
page read and write
1F1AA2F1000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F194EE6000
heap
page read and write
1F1A0BF5000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
295DA541000
trusted library allocation
page execute read
1F1A0016000
trusted library allocation
page read and write
1F19F00F000
trusted library allocation
page read and write
1F1A078C000
trusted library allocation
page read and write
1F1A18A1000
trusted library allocation
page read and write
1F19EDC3000
trusted library allocation
page read and write
1F19F455000
trusted library allocation
page read and write
720000
unkown
page readonly
1F1A0060000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A60E5000
trusted library allocation
page read and write
1F1A06FE000
trusted library allocation
page read and write
1F1A68AA000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E8E000
heap
page read and write
1F1AA440000
heap
page read and write
1F01A015000
trusted library allocation
page read and write
1F1A0421000
trusted library allocation
page read and write
1F19DA62000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19B846000
heap
page read and write
1F1A0587000
trusted library allocation
page read and write
1F1A8636000
trusted library allocation
page read and write
1F1A9944000
trusted library allocation
page read and write
1F19DFCE000
trusted library allocation
page read and write
1F1A68E3000
trusted library allocation
page read and write
1F19FDCA000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1AAC60000
trusted library allocation
page read and write
1F194EE6000
heap
page read and write
1F19F9EB000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F19B884000
heap
page read and write
1F194E79000
heap
page read and write
1F1998EF000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194F1C000
heap
page read and write
1F194EE5000
heap
page read and write
1F194E8E000
heap
page read and write
1F19F5D4000
trusted library allocation
page read and write
1F1A8614000
trusted library allocation
page read and write
1F194EFD000
heap
page read and write
1F194E88000
heap
page read and write
1F194F11000
heap
page read and write
1F1AA4CE000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A6824000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F19EDCC000
trusted library allocation
page read and write
27142059000
heap
page read and write
1F194EB1000
heap
page read and write
1F1A096C000
trusted library allocation
page read and write
2E9D6FE000
unkown
page readonly
1F19FDC8000
trusted library allocation
page read and write
1F1A61B9000
trusted library allocation
page read and write
1F19DE61000
trusted library allocation
page read and write
2714203B000
heap
page read and write
1F19F615000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E94000
heap
page read and write
1F1AA347000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A685C000
trusted library allocation
page read and write
1F1A60CD000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F1A9937000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F1A056C000
trusted library allocation
page read and write
1F19B87A000
heap
page read and write
1F194EE5000
heap
page read and write
1F1A96E2000
trusted library allocation
page read and write
1F194F02000
heap
page read and write
1F194EC5000
heap
page read and write
1F19F9D4000
trusted library allocation
page read and write
1F1A68DB000
trusted library allocation
page read and write
1F1A63B6000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A05F5000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19F017000
trusted library allocation
page read and write
1069000
heap
page read and write
1F19FFE1000
trusted library allocation
page read and write
1F1A7B57000
trusted library allocation
page read and write
1F19FDFE000
trusted library allocation
page read and write
1F194EBF000
heap
page read and write
1F19F383000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F19F464000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F194ED6000
heap
page read and write
1F194EE5000
heap
page read and write
1F019BBA000
heap
page read and write
1F19F989000
trusted library allocation
page read and write
1F1A062B000
trusted library allocation
page read and write
1F1A9554000
trusted library allocation
page read and write
1F1A9079000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F19E1FC000
trusted library allocation
page read and write
2714136B000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
1F1A6174000
trusted library allocation
page read and write
1F19F63D000
trusted library allocation
page read and write
1F194E70000
heap
page read and write
1F194E9A000
heap
page read and write
27141F6C000
heap
page read and write
27141F5C000
heap
page read and write
1F194E94000
heap
page read and write
1F19B8AB000
heap
page read and write
1F19EC46000
trusted library allocation
page read and write
1F019C24000
heap
page read and write
1F1AAB5E000
trusted library allocation
page read and write
1F19DE4F000
trusted library allocation
page read and write
1F19E643000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A6830000
trusted library allocation
page read and write
1F194EFC000
heap
page read and write
614000
heap
page read and write
1F1A9CF7000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F19DECE000
trusted library allocation
page read and write
1F1A188A000
trusted library allocation
page read and write
1F19E65D000
trusted library allocation
page read and write
1F1A07DC000
trusted library allocation
page read and write
1F1A08EA000
trusted library allocation
page read and write
1F19FCF4000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F194E84000
heap
page read and write
1F19F6B9000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
27141FF1000
heap
page read and write
1F1A27A3000
trusted library allocation
page read and write
1F019F5D000
trusted library allocation
page read and write
1F194EFB000
heap
page read and write
1F19F3BE000
trusted library allocation
page read and write
1E430F5A000
heap
page read and write
1F194F10000
heap
page read and write
111244503000
trusted library allocation
page read and write
1F1A00E4000
trusted library allocation
page read and write
1F1A18C5000
trusted library allocation
page read and write
27141E05000
trusted library allocation
page read and write
1F19ED1F000
trusted library allocation
page read and write
2714202D000
heap
page read and write
1F1A05F3000
trusted library allocation
page read and write
1F1AAC8D000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194ED6000
heap
page read and write
1F194EE6000
heap
page read and write
1F194EEE000
heap
page read and write
1F194E82000
heap
page read and write
1F19B897000
heap
page read and write
1F19F4AF000
trusted library allocation
page read and write
1F19DE9E000
trusted library allocation
page read and write
1F1AABE5000
trusted library allocation
page read and write
1F1998EF000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F1A8075000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A907B000
trusted library allocation
page read and write
1F1A1876000
trusted library allocation
page read and write
1F1A996B000
trusted library allocation
page read and write
1F19FEE3000
trusted library allocation
page read and write
1F194F0D000
heap
page read and write
1F19FEFB000
trusted library allocation
page read and write
FDB000
stack
page read and write
1F1A05DC000
trusted library allocation
page read and write
1F194E90000
heap
page read and write
1F194E94000
heap
page read and write
1F194EEE000
heap
page read and write
1F1AAB6D000
trusted library allocation
page read and write
1F19E1D9000
trusted library allocation
page read and write
1F19B89D000
heap
page read and write
1F194F04000
heap
page read and write
1F1AA2F1000
trusted library allocation
page read and write
1F1A6076000
trusted library allocation
page read and write
1F19B846000
heap
page read and write
1F19F6FB000
trusted library allocation
page read and write
1F1A63EC000
trusted library allocation
page read and write
1F1A07FD000
trusted library allocation
page read and write
1F19B1F6000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194E9D000
heap
page read and write
1F1A05F3000
trusted library allocation
page read and write
1F1A9590000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F19B84B000
heap
page read and write
1F19B822000
heap
page read and write
1F19E689000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19ED0F000
trusted library allocation
page read and write
14DDB607000
trusted library allocation
page read and write
D31BABE000
stack
page read and write
1F1A6168000
trusted library allocation
page read and write
1F199F75000
trusted library allocation
page read and write
1F19F534000
trusted library allocation
page read and write
1F1A6898000
trusted library allocation
page read and write
1F19F628000
trusted library allocation
page read and write
1F19F02C000
trusted library allocation
page read and write
1F1A9F35000
trusted library allocation
page read and write
1F194E82000
heap
page read and write
1F1A96BF000
trusted library allocation
page read and write
1F1A63A7000
trusted library allocation
page read and write
1F194EFE000
heap
page read and write
1F1A63A9000
trusted library allocation
page read and write
1F1A80A5000
trusted library allocation
page read and write
1F1A68D8000
trusted library allocation
page read and write
1F194EA5000
heap
page read and write
2E9A35C000
stack
page read and write
1F19EDBE000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A188C000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F19FF38000
trusted library allocation
page read and write
14DDB340000
heap
page read and write
1F19E629000
trusted library allocation
page read and write
1F19DE8D000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
1F194EC0000
heap
page read and write
27142029000
heap
page read and write
1F19B1A5000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19FEF3000
trusted library allocation
page read and write
2714206D000
heap
page read and write
1F194EC5000
heap
page read and write
1F19ECB3000
trusted library allocation
page read and write
1F19E68F000
trusted library allocation
page read and write
1F19DAA5000
trusted library allocation
page read and write
1F19B882000
heap
page read and write
1F19F6E8000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F1A058D000
trusted library allocation
page read and write
1F19FD8F000
trusted library allocation
page read and write
1F1A14DE000
trusted library allocation
page read and write
B5CBDD8000
stack
page read and write
1F194E9F000
heap
page read and write
1F19ED91000
trusted library allocation
page read and write
1F19F574000
trusted library allocation
page read and write
1F1AA0A8000
trusted library allocation
page read and write
1F1A270C000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F1A0032000
trusted library allocation
page read and write
1F1A186D000
trusted library allocation
page read and write
1F194F05000
heap
page read and write
1F19F46B000
trusted library allocation
page read and write
1F19F009000
trusted library allocation
page read and write
1F1A0007000
trusted library allocation
page read and write
1F1A06D8000
trusted library allocation
page read and write
1F19FDC5000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
2A2F5CC0000
heap
page read and write
1F19FDFE000
trusted library allocation
page read and write
1F194E9F000
heap
page read and write
1F1A6822000
trusted library allocation
page read and write
1F1A1851000
trusted library allocation
page read and write
2E9D77E000
stack
page read and write
1F019C26000
heap
page read and write
1F194EB4000
heap
page read and write
1F19DE59000
trusted library allocation
page read and write
2E9ADD8000
stack
page read and write
1F1AA4BC000
heap
page read and write
1F019C62000
unclassified section
page read and write
1F1A9590000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F194E94000
heap
page read and write
1F1A95AD000
trusted library allocation
page read and write
2A2F61B0000
heap
page read and write
2A2F6000000
heap
page read and write
1F1A95C8000
trusted library allocation
page read and write
27142000000
heap
page read and write
1F1A68C3000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A1864000
trusted library allocation
page read and write
1F19F58F000
trusted library allocation
page read and write
1F1AA08D000
trusted library allocation
page read and write
1F1A06FE000
trusted library allocation
page read and write
1F194EE5000
heap
page read and write
1F1A0613000
trusted library allocation
page read and write
1F19B8AB000
heap
page read and write
1F194E8F000
heap
page read and write
1F1A607E000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194EA7000
heap
page read and write
1F194EEE000
heap
page read and write
1F1A188A000
trusted library allocation
page read and write
2A2F5E50000
unclassified section
page read and write
1F194EA5000
heap
page read and write
1F1A05A8000
trusted library allocation
page read and write
1F1A08EC000
trusted library allocation
page read and write
271413E7000
trusted library allocation
page read and write
1F199F6A000
trusted library allocation
page read and write
1F19F5CD000
trusted library allocation
page read and write
1F1A0533000
trusted library allocation
page read and write
1F19DDB3000
trusted library allocation
page read and write
27141FE6000
heap
page read and write
1F19FFAA000
trusted library allocation
page read and write
1F1A9C75000
trusted library allocation
page read and write
1F19FDE2000
trusted library allocation
page read and write
1F1A055D000
trusted library allocation
page read and write
1F194ED6000
heap
page read and write
1F19B897000
heap
page read and write
27141F5F000
heap
page read and write
1F194EBA000
heap
page read and write
1F19B1F0000
trusted library allocation
page read and write
1F1A042C000
trusted library allocation
page read and write
1F19DEA5000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F18FDE2000
heap
page read and write
1F194EA4000
heap
page read and write
1F19F03B000
trusted library allocation
page read and write
6F24DFA000
stack
page read and write
1F194EA4000
heap
page read and write
1F194E99000
heap
page read and write
1F194ED6000
heap
page read and write
27142029000
heap
page read and write
1F194EA5000
heap
page read and write
1F194EB1000
heap
page read and write
1F1A9F3F000
trusted library allocation
page read and write
1F1A90AD000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19F031000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1A62B9000
trusted library allocation
page read and write
1F1A1898000
trusted library allocation
page read and write
1F1A95D6000
trusted library allocation
page read and write
27141FED000
heap
page read and write
1F1A6892000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194E88000
heap
page read and write
1F194EA4000
heap
page read and write
1F1AA33E000
trusted library allocation
page read and write
1F1A1820000
trusted library allocation
page read and write
1F19B895000
heap
page read and write
1F1998DF000
trusted library allocation
page read and write
1F1A042F000
trusted library allocation
page read and write
2A2F5E40000
heap
page readonly
1F194EF3000
heap
page read and write
1F194E9F000
heap
page read and write
1F194E9A000
heap
page read and write
1F19FE92000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19AE4D000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F1A6255000
trusted library allocation
page read and write
1F1AA0D7000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F19F9CD000
trusted library allocation
page read and write
1F1AA06B000
trusted library allocation
page read and write
1F19E1BD000
trusted library allocation
page read and write
1F1A955C000
trusted library allocation
page read and write
1F1A14EB000
trusted library allocation
page read and write
1F1A0B75000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F19FF87000
trusted library allocation
page read and write
1F1A057C000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F1A9F3F000
trusted library allocation
page read and write
1F1A9FF3000
trusted library allocation
page read and write
1F1A5FE5000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F194EB6000
heap
page read and write
1F194EFE000
heap
page read and write
1F1A001B000
trusted library allocation
page read and write
B5CB35C000
stack
page read and write
1F1A9FE7000
trusted library allocation
page read and write
1F19DF49000
trusted library allocation
page read and write
1F19DFD2000
trusted library allocation
page read and write
1089000
heap
page read and write
1F19FCC5000
trusted library allocation
page read and write
1F199E76000
trusted library allocation
page read and write
1F1AA0DD000
trusted library allocation
page read and write
1F1A14A1000
trusted library allocation
page read and write
1F199890000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F1A05F5000
trusted library allocation
page read and write
1F1A952B000
trusted library allocation
page read and write
1F19F3F6000
trusted library allocation
page read and write
1F1A9938000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194EA7000
heap
page read and write
1F19F02C000
trusted library allocation
page read and write
1F19DD84000
trusted library allocation
page read and write
1F1A0090000
trusted library allocation
page read and write
1F1A6182000
trusted library allocation
page read and write
1F194EE9000
heap
page read and write
1F194F17000
heap
page read and write
1F1A05EB000
trusted library allocation
page read and write
2A2F5D13000
trusted library allocation
page read and write
1F019BF0000
heap
page read and write
1F1A63C5000
trusted library allocation
page read and write
27142029000
heap
page read and write
1F19FCD8000
trusted library allocation
page read and write
1F194E95000
heap
page read and write
1F19FD1A000
trusted library allocation
page read and write
1F1A68C3000
trusted library allocation
page read and write
27141FED000
heap
page read and write
1F19F6AF000
trusted library allocation
page read and write
1F1AAC47000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1E431100000
trusted library allocation
page read and write
1F19DADC000
trusted library allocation
page read and write
1F194EA0000
heap
page read and write
1F194ED6000
heap
page read and write
1F1AA0D1000
trusted library allocation
page read and write
1F1AA076000
trusted library allocation
page read and write
1F19FF8B000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F194EC0000
heap
page read and write
1F1A68F1000
trusted library allocation
page read and write
1F1A63F9000
trusted library allocation
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F19F565000
trusted library allocation
page read and write
1F19EC48000
trusted library allocation
page read and write
1069000
heap
page read and write
1F19B1F8000
trusted library allocation
page read and write
1F194F17000
heap
page read and write
1F19FD23000
trusted library allocation
page read and write
1F1AA08D000
trusted library allocation
page read and write
1F1A18B3000
trusted library allocation
page read and write
1F1A04C7000
trusted library allocation
page read and write
1F19EC3A000
trusted library allocation
page read and write
27140F60000
unclassified section
page readonly
1F194F08000
heap
page read and write
1F19B0D0000
trusted library allocation
page read and write
1F19F4BC000
trusted library allocation
page read and write
1F194E9A000
heap
page read and write
1F19F3DE000
trusted library allocation
page read and write
1F1A63AE000
trusted library allocation
page read and write
1F19F35E000
trusted library allocation
page read and write
1F19FDDE000
trusted library allocation
page read and write
2A2F5D78000
trusted library allocation
page read and write
1F19B8F0000
heap
page read and write
1F194EA3000
heap
page read and write
1F194E9F000
heap
page read and write
1F194ED6000
heap
page read and write
1F194E9D000
heap
page read and write
1F194ED6000
heap
page read and write
1F1A63F1000
trusted library allocation
page read and write
1F194E79000
heap
page read and write
D31B1FE000
unkown
page readonly
1F1A07E8000
trusted library allocation
page read and write
1F1A63DC000
trusted library allocation
page read and write
1F19E661000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F19E65D000
trusted library allocation
page read and write
1F194EFC000
heap
page read and write
1F19EDCC000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F19F56C000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F194F19000
heap
page read and write
1F194E8D000
heap
page read and write
1F1A0AC9000
trusted library allocation
page read and write
1F19B1EB000
trusted library allocation
page read and write
1F1A8C00000
trusted library allocation
page read and write
1F1A99E8000
trusted library allocation
page read and write
1F194EB1000
heap
page read and write
1F194EB0000
heap
page read and write
1F194ED6000
heap
page read and write
1F19DD84000
trusted library allocation
page read and write
1F1A14CB000
trusted library allocation
page read and write
1F19F366000
trusted library allocation
page read and write
1F19F6BD000
trusted library allocation
page read and write
1F194EB4000
heap
page read and write
1F1AA2E4000
trusted library allocation
page read and write
1F19B1EB000
trusted library allocation
page read and write
2714203B000
heap
page read and write
1F1A09E0000
trusted library allocation
page read and write
1F194E8E000
heap
page read and write
1F194E9D000
heap
page read and write
1F1A7987000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F19E663000
trusted library allocation
page read and write
1F194E88000
heap
page read and write
1F19FDF5000
trusted library allocation
page read and write
1F1A68CC000
trusted library allocation
page read and write
1F1AA0DD000
trusted library allocation
page read and write
1F1A06FE000
trusted library allocation
page read and write
1F194E9D000
heap
page read and write
1F1AAC56000
trusted library allocation
page read and write
1F19DECE000
trusted library allocation
page read and write
1F1A95EE000
trusted library allocation
page read and write
1F194EEE000
heap
page read and write
1F194EE5000
heap
page read and write
1F19DE65000
trusted library allocation
page read and write
1F194E94000
heap
page read and write
1F1A68D8000
trusted library allocation
page read and write
1F19B078000
trusted library allocation
page read and write
1F19DE59000
trusted library allocation
page read and write
1F19FF46000
trusted library allocation
page read and write
1F194F11000
heap
page read and write
1F194EC5000
heap
page read and write
1F19F4B5000
trusted library allocation
page read and write
1F1A7A86000
trusted library allocation
page read and write
1F19DFC7000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F194EA5000
heap
page read and write
1E43120A000
trusted library allocation
page read and write
1F019F64000
trusted library allocation
page read and write
1F19B8D9000
heap
page read and write
1F194EE6000
heap
page read and write
1F19F9BA000
trusted library allocation
page read and write
1F194F0F000
heap
page read and write
1F1A9F4C000
trusted library allocation
page read and write
1F1A2786000
trusted library allocation
page read and write
1F1A9079000
trusted library allocation
page read and write
1F19ED6A000
trusted library allocation
page read and write
1F1A6874000
trusted library allocation
page read and write
1F194EF5000
heap
page read and write
1F194EA4000
heap
page read and write
1F194EC0000
heap
page read and write
27141F69000
heap
page read and write
1F19DAEC000
trusted library allocation
page read and write
1F19F9BA000
trusted library allocation
page read and write
1F194EC5000
heap
page read and write
1F19E1CD000
trusted library allocation
page read and write
1E432B3A000
heap
page read and write
1F19DFA7000
trusted library allocation
page read and write
1F1A0BD6000
trusted library allocation
page read and write
1F194E7A000
heap
page read and write
1F1A05D3000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F1A6876000
trusted library allocation
page read and write
1F194EC0000
heap
page read and write
1F194E95000
heap
page read and write
1F194E77000
heap
page read and write
1F19F4B5000
trusted library allocation
page read and write
1F1998C0000
trusted library allocation
page read and write
1F194EED000
heap
page read and write
1F194ED6000
heap
page read and write
1F1A80E8000
trusted library allocation
page read and write
1F1A6097000
trusted library allocation
page read and write
1F194EFC000
heap
page read and write
1F1A9523000
trusted library allocation
page read and write
1F1A63E0000
trusted library allocation
page read and write
2714206D000
heap
page read and write
2A2F5D49000
trusted library allocation
page read and write
2714202B000
heap
page read and write
There are 4078 hidden memdumps, click here to show them.