IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3b636ac8-4ab4-4839-b2e3-b3220a7a0b96.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3b636ac8-4ab4-4839-b2e3-b3220a7a0b96.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {343c6f86-1b5f-473e-9dba-35b770c7833f} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd7576dd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3016 -parentBuildID 20230927232528 -prefsHandle 3060 -prefMapHandle 2996 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2796a079-c3f2-485a-9277-415ee10c3b63} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd05fc6e10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5132 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5180 -prefMapHandle 5176 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99b798a6-e00b-468f-8fbe-32fc4b2fef5c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd0f5fab10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://youtube.com/account?=ht~
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://exslt.org/dates-and-times
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
http://detectportal.firefox.comP
unknown
https://youtube.com/account?=
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://spocs.getpocket.com/CN=The
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://youtube.com/var(--focus-outline)
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mathiasbynens.be/
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
F5F000
heap
page read and write
malicious
F64000
heap
page read and write
malicious
1FD0DF9D000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1FD08EE8000
trusted library allocation
page read and write
1FD06A10000
trusted library allocation
page read and write
1FD0549D000
trusted library allocation
page read and write
1FD7FD78000
trusted library allocation
page read and write
1FD069D9000
trusted library allocation
page read and write
1FD05340000
trusted library allocation
page read and write
1FD7FE4F000
trusted library allocation
page read and write
1FD02DAA000
heap
page read and write
1B391917000
trusted library allocation
page read and write
1B3915C6000
heap
page read and write
1FD05AF6000
trusted library allocation
page read and write
1FD10887000
trusted library allocation
page read and write
1FD07168000
trusted library allocation
page read and write
1FD05471000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD07189000
trusted library allocation
page read and write
1FD7E66D000
trusted library allocation
page read and write
1FD08E77000
trusted library allocation
page read and write
1FD068B0000
trusted library allocation
page read and write
23A8AB26000
heap
page read and write
1FD08E5C000
trusted library allocation
page read and write
1FD06CB5000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD0E3DB000
trusted library allocation
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD0F2BB000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD0DB1C000
trusted library allocation
page read and write
482DE7E000
unkown
page readonly
1FD06C78000
trusted library allocation
page read and write
1ED5FDC0000
unclassified section
page readonly
A9C000
unkown
page readonly
1FD05AEF000
trusted library allocation
page read and write
72365FF000
stack
page read and write
1FD0E3E1000
trusted library allocation
page read and write
1FD0DBED000
trusted library allocation
page read and write
1FD069D7000
trusted library allocation
page read and write
1FD0686B000
trusted library allocation
page read and write
1FD06C59000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD070B0000
trusted library allocation
page read and write
1FD06C36000
trusted library allocation
page read and write
1FD0524E000
trusted library allocation
page read and write
1FD057C7000
trusted library allocation
page read and write
1ED60E23000
heap
page read and write
1FD07722000
trusted library allocation
page read and write
1FD7FD95000
trusted library allocation
page read and write
1FD7FD7E000
trusted library allocation
page read and write
1ED60E40000
heap
page read and write
1ED60110000
trusted library allocation
page read and write
1FD0544D000
trusted library allocation
page read and write
1FD08EAB000
trusted library allocation
page read and write
1FD02DA9000
heap
page read and write
1FD06C8D000
trusted library allocation
page read and write
1FD08B2A000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD0F3AD000
trusted library allocation
page read and write
1FD05BB6000
trusted library allocation
page read and write
1FD0DBD3000
trusted library allocation
page read and write
1FD08E8C000
trusted library allocation
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD7C4A0000
heap
page read and write
1FD0693B000
trusted library allocation
page read and write
1FD08BA3000
trusted library allocation
page read and write
1FD116CE000
trusted library allocation
page read and write
1FD7C41E000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD0F5B3000
trusted library allocation
page read and write
1FD0661A000
trusted library allocation
page read and write
972783E000
unkown
page readonly
1FD0695A000
trusted library allocation
page read and write
1FD106F5000
trusted library allocation
page read and write
1FD0573A000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD054C2000
trusted library allocation
page read and write
1FD07E12000
trusted library allocation
page read and write
1FD02BF6000
trusted library allocation
page read and write
1FD7FEA8000
trusted library allocation
page read and write
1FD08E73000
trusted library allocation
page read and write
1FD0686B000
trusted library allocation
page read and write
1FD0F5D5000
trusted library allocation
page read and write
1FD05AB5000
trusted library allocation
page read and write
1FD08BF6000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD054AD000
trusted library allocation
page read and write
1FD0F412000
trusted library allocation
page read and write
1ED60DAC000
heap
page read and write
1FD0F5C3000
trusted library allocation
page read and write
1FD10200000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD7C4AD000
heap
page read and write
1FD0F425000
trusted library allocation
page read and write
1FD07981000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD106FB000
trusted library allocation
page read and write
1FD06C47000
trusted library allocation
page read and write
1FD7C4AB000
heap
page read and write
1FD0D9A5000
trusted library allocation
page read and write
1FD7E686000
trusted library allocation
page read and write
1FD0D97D000
trusted library allocation
page read and write
1FD0DC49000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD04F88000
trusted library allocation
page read and write
1ED6012F000
trusted library allocation
page read and write
1FD0E1A3000
trusted library allocation
page read and write
1FD06CF9000
trusted library allocation
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD0693E000
trusted library allocation
page read and write
1FD0537F000
trusted library allocation
page read and write
1FD05AE1000
trusted library allocation
page read and write
1FD071DB000
trusted library allocation
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD0536F000
trusted library allocation
page read and write
972683E000
unkown
page readonly
1FD06AC9000
trusted library allocation
page read and write
1FD05100000
trusted library allocation
page read and write
1FD0DAB6000
trusted library allocation
page read and write
1FD08BF7000
trusted library allocation
page read and write
1FD0E3E6000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD7C4AD000
heap
page read and write
1FD092F9000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD7C41F000
heap
page read and write
1FD05B64000
trusted library allocation
page read and write
1FD0DC91000
trusted library allocation
page read and write
1FD066A5000
trusted library allocation
page read and write
1FD06A35000
trusted library allocation
page read and write
1FD0DFDA000
trusted library allocation
page read and write
1FD05B2E000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD0F5E7000
trusted library allocation
page read and write
1FD7FEA1000
trusted library allocation
page read and write
1FD0696F000
trusted library allocation
page read and write
1FD05ADD000
trusted library allocation
page read and write
1FD7C491000
heap
page read and write
1FD05ADC000
trusted library allocation
page read and write
1ED60E28000
heap
page read and write
1FD7C486000
heap
page read and write
23A8AB3F000
heap
page read and write
1FD069AE000
trusted library allocation
page read and write
1FD0E14D000
trusted library allocation
page read and write
1FD0DAB2000
trusted library allocation
page read and write
1FD0F395000
trusted library allocation
page read and write
1FD06CB5000
trusted library allocation
page read and write
1FD7C49F000
heap
page read and write
1FD06AE1000
trusted library allocation
page read and write
1FD052A0000
trusted library allocation
page read and write
1FD0E3FE000
trusted library allocation
page read and write
1FD0F484000
trusted library allocation
page read and write
1FD05467000
trusted library allocation
page read and write
1FD066EF000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD06612000
trusted library allocation
page read and write
1FD06AA2000
trusted library allocation
page read and write
F78000
heap
page read and write
1FD069DF000
trusted library allocation
page read and write
1FD08DFB000
trusted library allocation
page read and write
1FD7E5C0000
trusted library allocation
page read and write
1FD06676000
trusted library allocation
page read and write
1FD0716F000
trusted library allocation
page read and write
1FD079E9000
trusted library allocation
page read and write
1FD06C78000
trusted library allocation
page read and write
1FD116ED000
trusted library allocation
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD0F3A7000
trusted library allocation
page read and write
22569173000
trusted library allocation
page read and write
1FD7C475000
heap
page read and write
1FD02D73000
heap
page read and write
1ED60E31000
heap
page read and write
1FD06AB1000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD7FD4E000
trusted library allocation
page read and write
1FD0E016000
trusted library allocation
page read and write
1FD05ABC000
trusted library allocation
page read and write
1FD108CA000
trusted library allocation
page read and write
1FD0F386000
trusted library allocation
page read and write
1FD09258000
trusted library allocation
page read and write
1FD0DD84000
trusted library allocation
page read and write
1FD06C77000
trusted library allocation
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD06A72000
trusted library allocation
page read and write
1FD05AF8000
trusted library allocation
page read and write
1FD05B99000
trusted library allocation
page read and write
1FD06ACA000
trusted library allocation
page read and write
1FD0549D000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD06AD2000
trusted library allocation
page read and write
1FD054FE000
trusted library allocation
page read and write
1FD0F3FB000
trusted library allocation
page read and write
1FD0689C000
trusted library allocation
page read and write
1FD05BF5000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD054AB000
trusted library allocation
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD0E3C9000
trusted library allocation
page read and write
22568CA0000
unclassified section
page readonly
1FD05F3C000
trusted library allocation
page read and write
1FD02B55000
trusted library allocation
page read and write
1FD069F4000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD071A0000
trusted library allocation
page read and write
1FD069F4000
trusted library allocation
page read and write
1FD05BF3000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD06807000
trusted library allocation
page read and write
1FD06AB6000
trusted library allocation
page read and write
1FD08EB7000
trusted library allocation
page read and write
1ED60DA0000
heap
page read and write
1FD0F347000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD05357000
trusted library allocation
page read and write
1FD7C495000
heap
page read and write
1FD09304000
trusted library allocation
page read and write
1FD07D43000
trusted library allocation
page read and write
1FD0D9DD000
trusted library allocation
page read and write
1FD7FE6E000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD108F9000
trusted library allocation
page read and write
1FD0F591000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
23A8AB25000
heap
page read and write
1FD069E7000
trusted library allocation
page read and write
1FD7C41B000
heap
page read and write
1FD7C41F000
heap
page read and write
1FD06A72000
trusted library allocation
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD052D6000
trusted library allocation
page read and write
1FD054AF000
trusted library allocation
page read and write
1FD0F348000
trusted library allocation
page read and write
1FD07EA7000
trusted library allocation
page read and write
1FD05DD7000
trusted library allocation
page read and write
1FD06A45000
trusted library allocation
page read and write
1FD06A96000
trusted library allocation
page read and write
1ED6015F000
trusted library allocation
page read and write
1FD0F359000
trusted library allocation
page read and write
1FD08BAE000
trusted library allocation
page read and write
1FD104AA000
trusted library allocation
page read and write
1FD10B00000
trusted library allocation
page read and write
1FD7C49A000
heap
page read and write
1FD07047000
trusted library allocation
page read and write
1FD7EFED000
trusted library allocation
page read and write
1FD7FEA8000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD07E56000
trusted library allocation
page read and write
1FD07AB6000
trusted library allocation
page read and write
16DC9F803000
trusted library allocation
page read and write
1FD02B61000
trusted library allocation
page read and write
1FD104C0000
trusted library allocation
page read and write
1FD069CB000
trusted library allocation
page read and write
1FD07E3E000
trusted library allocation
page read and write
1B391712000
trusted library allocation
page read and write
1ED60E31000
heap
page read and write
1FD7FDCE000
trusted library allocation
page read and write
1FD08B96000
trusted library allocation
page read and write
1FD0526C000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD06CF6000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD068E8000
trusted library allocation
page read and write
1ED60E28000
heap
page read and write
1FD071C0000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
F59F6103000
trusted library allocation
page read and write
1FD0E1C0000
trusted library allocation
page read and write
1FD0EFCF000
trusted library allocation
page read and write
1B39176E000
trusted library allocation
page read and write
1FD08EA6000
trusted library allocation
page read and write
1FD0F474000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD08B33000
trusted library allocation
page read and write
1FD02D92000
heap
page read and write
1FD05BB6000
trusted library allocation
page read and write
1FD08B9B000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD0DAB2000
trusted library allocation
page read and write
1FD05BED000
trusted library allocation
page read and write
1FD0F4CB000
trusted library allocation
page read and write
1FD07131000
trusted library allocation
page read and write
1FD0DAF9000
trusted library allocation
page read and write
1FD0DBEF000
trusted library allocation
page read and write
1FD070FC000
trusted library allocation
page read and write
1FD7C422000
heap
page read and write
1FD7FBC5000
trusted library allocation
page read and write
1FD08B0B000
trusted library allocation
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1FD0E05B000
trusted library allocation
page read and write
1FD0E1E4000
trusted library allocation
page read and write
1FD0F599000
trusted library allocation
page read and write
1FD068E8000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7C46C000
heap
page read and write
1FD08EA9000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7C416000
heap
page read and write
1FD06898000
trusted library allocation
page read and write
1FD02BDB000
trusted library allocation
page read and write
1FD0DF0A000
trusted library allocation
page read and write
1ED60DCA000
heap
page read and write
1FD7C415000
heap
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD10DA8000
trusted library allocation
page read and write
1FD06CEE000
trusted library allocation
page read and write
1ED602C0000
heap
page read and write
1FD1069F000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD7FCE2000
trusted library allocation
page read and write
1FD0543F000
trusted library allocation
page read and write
1FD0545A000
trusted library allocation
page read and write
1FD0E1E6000
trusted library allocation
page read and write
1FD7EFB3000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD08BF6000
trusted library allocation
page read and write
1FD069DF000
trusted library allocation
page read and write
1FD06953000
trusted library allocation
page read and write
1FD06C78000
trusted library allocation
page read and write
1FD09289000
trusted library allocation
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD05220000
trusted library allocation
page read and write
1FD0DAE9000
trusted library allocation
page read and write
1FD0F331000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD08EAF000
trusted library allocation
page read and write
1FD10428000
trusted library allocation
page read and write
1FD06964000
trusted library allocation
page read and write
1FD0DB13000
trusted library allocation
page read and write
1FD0E1BE000
trusted library allocation
page read and write
1FD05453000
trusted library allocation
page read and write
482BBAE000
stack
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD0D98F000
trusted library allocation
page read and write
1FD07EB9000
trusted library allocation
page read and write
1FD0523D000
trusted library allocation
page read and write
1FD0E3D9000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD069A5000
trusted library allocation
page read and write
1FD0F3DD000
trusted library allocation
page read and write
1FD068D3000
trusted library allocation
page read and write
1FD06A92000
trusted library allocation
page read and write
1FD070FD000
trusted library allocation
page read and write
1FD1089C000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD7C4A0000
heap
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD0F37B000
trusted library allocation
page read and write
1FD0F591000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD7FE6C000
trusted library allocation
page read and write
1FD05244000
trusted library allocation
page read and write
1FD0549D000
trusted library allocation
page read and write
1FD08B37000
trusted library allocation
page read and write
1FD054C5000
trusted library allocation
page read and write
5E0000
heap
page read and write
1FD7EBFE000
trusted library allocation
page read and write
A777DFE000
unkown
page readonly
1FD0F381000
trusted library allocation
page read and write
1FD0F3FD000
trusted library allocation
page read and write
1FD0699B000
trusted library allocation
page read and write
1FD7FCF1000
trusted library allocation
page read and write
1FD0E3CB000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD07E56000
trusted library allocation
page read and write
1FD0695F000
trusted library allocation
page read and write
1FD7EFF0000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD054A6000
trusted library allocation
page read and write
1FD05BB9000
trusted library allocation
page read and write
F63000
heap
page read and write
1FD05292000
trusted library allocation
page read and write
1FD05366000
trusted library allocation
page read and write
1FD0681D000
trusted library allocation
page read and write
22569100000
trusted library allocation
page read and write
1FD06C57000
trusted library allocation
page read and write
1FD05BF0000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD7C49F000
heap
page read and write
1ED60D8D000
heap
page read and write
1FD05B6A000
trusted library allocation
page read and write
225691C4000
trusted library allocation
page read and write
1FD104A1000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD069A7000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD7C47E000
heap
page read and write
1FD0D9AB000
trusted library allocation
page read and write
1FD0F5B5000
trusted library allocation
page read and write
1FD06C86000
trusted library allocation
page read and write
1FD0DDCB000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD05BAC000
trusted library allocation
page read and write
1ED60E62000
heap
page read and write
1FD06A52000
trusted library allocation
page read and write
1FD7FB3A000
trusted library allocation
page read and write
1FD06A3B000
trusted library allocation
page read and write
1ED60112000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1ED60DF9000
heap
page read and write
1FD091F1000
heap
page read and write
1FD116D5000
trusted library allocation
page read and write
1FD7E5A1000
trusted library allocation
page read and write
1FD7EF08000
trusted library allocation
page read and write
1FD08EB1000
trusted library allocation
page read and write
1FD08E38000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD0F450000
trusted library allocation
page read and write
1FD0DC63000
trusted library allocation
page read and write
1FD0DBD1000
trusted library allocation
page read and write
1FD06AC3000
trusted library allocation
page read and write
1FD7C4AA000
heap
page read and write
1FD7C41D000
heap
page read and write
1FD7FDD5000
trusted library allocation
page read and write
1FD0685D000
trusted library allocation
page read and write
1FD0DB9F000
trusted library allocation
page read and write
1FD069E8000
trusted library allocation
page read and write
1FD06A5A000
trusted library allocation
page read and write
1FD1083D000
trusted library allocation
page read and write
9723FD8000
stack
page read and write
1FD0E0C0000
trusted library allocation
page read and write
1FD05471000
trusted library allocation
page read and write
23A8AB40000
heap
page read and write
1FD0DFA1000
trusted library allocation
page read and write
22569300000
trusted library allocation
page read and write
1FD071AC000
trusted library allocation
page read and write
1FD0EFE6000
trusted library allocation
page read and write
1FD06A24000
trusted library allocation
page read and write
1FD06A46000
trusted library allocation
page read and write
1FD08EE1000
trusted library allocation
page read and write
1FD0E3C5000
trusted library allocation
page read and write
1FD0DC47000
trusted library allocation
page read and write
97234FD000
stack
page read and write
1FD05FA4000
trusted library allocation
page read and write
1FD0DBF1000
trusted library allocation
page read and write
482DE3D000
stack
page read and write
1FD04F9F000
trusted library allocation
page read and write
1FD079D8000
trusted library allocation
page read and write
1FD7C420000
heap
page read and write
1FD06A5A000
trusted library allocation
page read and write
1FD069D7000
trusted library allocation
page read and write
1FD0547D000
trusted library allocation
page read and write
1FD0D951000
trusted library allocation
page read and write
1FD05467000
trusted library allocation
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD116D5000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD7FE79000
trusted library allocation
page read and write
1FD08EB1000
trusted library allocation
page read and write
1FD054D5000
trusted library allocation
page read and write
1FD06C8F000
trusted library allocation
page read and write
1FD05B29000
trusted library allocation
page read and write
1ED60186000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD0E319000
trusted library allocation
page read and write
1FD0F5BF000
trusted library allocation
page read and write
1ED602C6000
heap
page read and write
1FD0663B000
trusted library allocation
page read and write
22569000000
trusted library allocation
page read and write
1FD0DDE5000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
972603E000
stack
page read and write
1FD054FE000
trusted library allocation
page read and write
1FD0F58F000
trusted library allocation
page read and write
1FD0F383000
trusted library allocation
page read and write
1FD11658000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD0DCD3000
trusted library allocation
page read and write
1FD08E28000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
1FD06C9F000
trusted library allocation
page read and write
1FD7C492000
heap
page read and write
1FD07998000
trusted library allocation
page read and write
1B391600000
trusted library allocation
page read and write
1FD7EFBF000
trusted library allocation
page read and write
984000
heap
page read and write
1FD07AFA000
trusted library allocation
page read and write
1FD0E19F000
trusted library allocation
page read and write
1FD08BB3000
trusted library allocation
page read and write
1FD0DBB2000
trusted library allocation
page read and write
3821000
heap
page read and write
1FD0F5AC000
trusted library allocation
page read and write
1FD0DB80000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD07187000
trusted library allocation
page read and write
1FD0F414000
trusted library allocation
page read and write
1FD068D0000
trusted library allocation
page read and write
1FD054C0000
trusted library allocation
page read and write
1ED60DA3000
heap
page read and write
1FD05F3E000
trusted library allocation
page read and write
1FD05B62000
trusted library allocation
page read and write
1FD07DC5000
trusted library allocation
page read and write
1FD06957000
trusted library allocation
page read and write
1FD0DC27000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD0DB8F000
trusted library allocation
page read and write
F90000
heap
page read and write
1FD08EAB000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD7C438000
heap
page read and write
1FD106F1000
trusted library allocation
page read and write
1FD0F5ED000
trusted library allocation
page read and write
23A89370000
heap
page read and write
1FD0D97B000
trusted library allocation
page read and write
1FD05B3B000
trusted library allocation
page read and write
1FD08EA9000
trusted library allocation
page read and write
1FD7E6AE000
trusted library allocation
page read and write
1FD06C96000
trusted library allocation
page read and write
1FD0682F000
trusted library allocation
page read and write
F91000
heap
page read and write
1FD05B3F000
trusted library allocation
page read and write
482D5FE000
stack
page read and write
1FD05DC1000
trusted library allocation
page read and write
1FD1048F000
trusted library allocation
page read and write
1FD078FE000
trusted library allocation
page read and write
1FD06A92000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD0E3CB000
trusted library allocation
page read and write
1FD07954000
trusted library allocation
page read and write
1FD7FE93000
trusted library allocation
page read and write
A7775FE000
stack
page read and write
1FD02D70000
heap
page read and write
1FD1042D000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD0DB9B000
trusted library allocation
page read and write
1FD069B0000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD7C496000
heap
page read and write
1FD0693B000
trusted library allocation
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD0F45B000
trusted library allocation
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD07D20000
trusted library allocation
page read and write
1FD1048C000
trusted library allocation
page read and write
1FD0681D000
trusted library allocation
page read and write
1FD0689C000
trusted library allocation
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1FD06685000
trusted library allocation
page read and write
1FD0DC3B000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD08B80000
trusted library allocation
page read and write
1FD054BB000
trusted library allocation
page read and write
1FD0D9A1000
trusted library allocation
page read and write
1FD7FCCE000
trusted library allocation
page read and write
1FD106C4000
trusted library allocation
page read and write
1FD06853000
trusted library allocation
page read and write
1FD068B4000
trusted library allocation
page read and write
1FD10666000
trusted library allocation
page read and write
1FD06A98000
trusted library allocation
page read and write
1FD06993000
trusted library allocation
page read and write
1FD05AB9000
trusted library allocation
page read and write
1FD0770B000
trusted library allocation
page read and write
1FD06BB7000
trusted library allocation
page read and write
1FD05AB5000
trusted library allocation
page read and write
1ED6010A000
trusted library allocation
page read and write
1FD05266000
trusted library allocation
page read and write
1FD0F3C1000
trusted library allocation
page read and write
1FD057EE000
trusted library allocation
page read and write
1FD078D5000
trusted library allocation
page read and write
1FD116A6000
trusted library allocation
page read and write
1FD0E1FC000
trusted library allocation
page read and write
1FD10881000
trusted library allocation
page read and write
1FD08B96000
trusted library allocation
page read and write
2512A500000
trusted library allocation
page read and write
1FD0DA3E000
trusted library allocation
page read and write
1FD0710A000
trusted library allocation
page read and write
1FD06AA2000
trusted library allocation
page read and write
1FD07D5E000
trusted library allocation
page read and write
1FD0E199000
trusted library allocation
page read and write
1FD7C41E000
heap
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD08EAF000
trusted library allocation
page read and write
1FD06AB1000
trusted library allocation
page read and write
1FD04FFB000
trusted library allocation
page read and write
1FD7FF22000
trusted library allocation
page read and write
1B3917E4000
trusted library allocation
page read and write
2512A310000
heap
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD7C419000
heap
page read and write
1FD054AF000
trusted library allocation
page read and write
1FD07AFA000
trusted library allocation
page read and write
1FD0F5C7000
trusted library allocation
page read and write
1FD068D0000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD04F86000
trusted library allocation
page read and write
1FD7FDD5000
trusted library allocation
page read and write
1ED60E3D000
heap
page read and write
1FD06052000
trusted library allocation
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1ED601E9000
trusted library allocation
page read and write
1FD09156000
heap
page read and write
1FD06CD3000
trusted library allocation
page read and write
22569400000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD07DB6000
trusted library allocation
page read and write
1FD09361000
trusted library allocation
page read and write
1FD0F5DD000
trusted library allocation
page read and write
1FD7FBC5000
trusted library allocation
page read and write
1FD7FEA6000
trusted library allocation
page read and write
1FD7C418000
heap
page read and write
1FD7FE99000
trusted library allocation
page read and write
1FD06AB9000
trusted library allocation
page read and write
1FD068A1000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD09111000
heap
page read and write
1FD05DD7000
trusted library allocation
page read and write
1FD0F5C1000
trusted library allocation
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD05230000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD0DB88000
trusted library allocation
page read and write
1BC0000
heap
page read and write
1FD05F54000
trusted library allocation
page read and write
1FD0DD21000
trusted library allocation
page read and write
1FD04FFB000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD06964000
trusted library allocation
page read and write
1FD0DF91000
trusted library allocation
page read and write
1FD071F3000
trusted library allocation
page read and write
1FD066BD000
trusted library allocation
page read and write
1FD7FDC1000
trusted library allocation
page read and write
1FD0DBFD000
trusted library allocation
page read and write
1FD0F58D000
trusted library allocation
page read and write
1FD7C472000
heap
page read and write
1FD0695F000
trusted library allocation
page read and write
1FD0F58B000
trusted library allocation
page read and write
1FD0F4DD000
trusted library allocation
page read and write
1FD0EFA9000
trusted library allocation
page read and write
1FD7FEDD000
trusted library allocation
page read and write
1FD7EC26000
trusted library allocation
page read and write
EEE000
stack
page read and write
1FD06ADC000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD02D8D000
heap
page read and write
1FD0668A000
trusted library allocation
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1ED60DBF000
heap
page read and write
1FD070A5000
trusted library allocation
page read and write
1FD11DE9000
trusted library allocation
page read and write
1FD08EB7000
trusted library allocation
page read and write
1FD07120000
trusted library allocation
page read and write
1FD0F575000
trusted library allocation
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD0F45F000
trusted library allocation
page read and write
1FD069B0000
trusted library allocation
page read and write
23A8920A000
trusted library allocation
page read and write
1FD7FC6A000
trusted library allocation
page read and write
1FD104AA000
trusted library allocation
page read and write
1FD7FD72000
trusted library allocation
page read and write
1FD7FE79000
trusted library allocation
page read and write
1FD08BF3000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD7EC7D000
trusted library allocation
page read and write
1FD7FB53000
trusted library allocation
page read and write
1FD054DC000
trusted library allocation
page read and write
1FD0E31D000
trusted library allocation
page read and write
1FD0F3DD000
trusted library allocation
page read and write
1FD0F5C9000
trusted library allocation
page read and write
1FD0E334000
trusted library allocation
page read and write
A775BBC000
stack
page read and write
1FD7C438000
heap
page read and write
1FD05B43000
trusted library allocation
page read and write
1B391440000
heap
page read and write
1FD07854000
trusted library allocation
page read and write
1FD08B96000
trusted library allocation
page read and write
1FD0918C000
heap
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD073FB000
trusted library allocation
page read and write
1FD0DC20000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1FD069C7000
trusted library allocation
page read and write
1FD02BBA000
trusted library allocation
page read and write
1FD7FD92000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD06690000
trusted library allocation
page read and write
1FD1083F000
trusted library allocation
page read and write
1FD068B0000
trusted library allocation
page read and write
1FD06ADC000
trusted library allocation
page read and write
1FD05273000
trusted library allocation
page read and write
F73000
heap
page read and write
1FD092B1000
trusted library allocation
page read and write
1FD7FD72000
trusted library allocation
page read and write
1FD0E0E5000
trusted library allocation
page read and write
1FD054BD000
trusted library allocation
page read and write
1FD0F24F000
trusted library allocation
page read and write
1FD0E059000
trusted library allocation
page read and write
1FD0F410000
trusted library allocation
page read and write
1FD08800000
trusted library allocation
page read and write
1FD0799E000
trusted library allocation
page read and write
1FD0FBC8000
trusted library allocation
page read and write
1FD07054000
trusted library allocation
page read and write
1FD068AF000
trusted library allocation
page read and write
1FD06A35000
trusted library allocation
page read and write
1FD066EB000
trusted library allocation
page read and write
972353E000
unkown
page readonly
1FD7C424000
heap
page read and write
1FD06944000
trusted library allocation
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD7FE6E000
trusted library allocation
page read and write
1FD06A95000
trusted library allocation
page read and write
1FD052CD000
trusted library allocation
page read and write
1FD0706D000
trusted library allocation
page read and write
1FD08E1F000
trusted library allocation
page read and write
1FD092FC000
trusted library allocation
page read and write
1B391921000
trusted library allocation
page read and write
1FD0DCE4000
trusted library allocation
page read and write
1FD08ED4000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD7C42A000
heap
page read and write
1FD7FEBC000
trusted library allocation
page read and write
1FD07AE0000
trusted library allocation
page read and write
1FD0DBE9000
trusted library allocation
page read and write
1ED60E60000
heap
page read and write
1FD057F2000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD08ED4000
trusted library allocation
page read and write
1FD06A5F000
trusted library allocation
page read and write
1FD08B9B000
trusted library allocation
page read and write
1FD054A6000
trusted library allocation
page read and write
1FD0F373000
trusted library allocation
page read and write
1FD7C494000
heap
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD08EE1000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD054FE000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD054A6000
trusted library allocation
page read and write
1FD7C41F000
heap
page read and write
1FD06A3B000
trusted library allocation
page read and write
1FD07871000
trusted library allocation
page read and write
1FD7FB50000
trusted library allocation
page read and write
1FD0F45B000
trusted library allocation
page read and write
1FD0663B000
trusted library allocation
page read and write
1FD7FE6E000
trusted library allocation
page read and write
1FD7EFDE000
trusted library allocation
page read and write
22568EE0000
heap
page read and write
1FD0533E000
trusted library allocation
page read and write
1FD06A24000
trusted library allocation
page read and write
2512A507000
trusted library allocation
page read and write
1FD0D971000
trusted library allocation
page read and write
1FD7FDBA000
trusted library allocation
page read and write
1FD07120000
trusted library allocation
page read and write
1FD05294000
trusted library allocation
page read and write
1FD0F5ED000
trusted library allocation
page read and write
1FD0D9A1000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD0F4CE000
trusted library allocation
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD0695F000
trusted library allocation
page read and write
2512A630000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD0F000000
trusted library allocation
page read and write
1FD108E5000
trusted library allocation
page read and write
1FD108F7000
trusted library allocation
page read and write
1FD0DBD8000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0666F000
trusted library allocation
page read and write
1FD11DF5000
trusted library allocation
page read and write
1FD11DE9000
trusted library allocation
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD06AE3000
trusted library allocation
page read and write
1FD7FD18000
trusted library allocation
page read and write
1FD1048A000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
1FD08DBF000
trusted library allocation
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD7FD95000
trusted library allocation
page read and write
1FD06C33000
trusted library allocation
page read and write
1FD077B2000
trusted library allocation
page read and write
1FD07D56000
trusted library allocation
page read and write
1FD06C8F000
trusted library allocation
page read and write
1FD7C472000
heap
page read and write
1FD070F8000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD091FC000
trusted library allocation
page read and write
1FD02DAE000
heap
page read and write
1FD1167D000
trusted library allocation
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1ED60E3D000
heap
page read and write
1FD06AD8000
trusted library allocation
page read and write
1FD1067E000
trusted library allocation
page read and write
1FD0521F000
trusted library allocation
page read and write
1FD06863000
trusted library allocation
page read and write
1FD07180000
trusted library allocation
page read and write
F6D000
heap
page read and write
1FD7C40F000
heap
page read and write
1ED60E31000
heap
page read and write
1FD0DA32000
trusted library allocation
page read and write
1FD02B33000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD108BB000
trusted library allocation
page read and write
1FD05BF5000
trusted library allocation
page read and write
1FD0DBF5000
trusted library allocation
page read and write
1FD0DAF9000
trusted library allocation
page read and write
1FD0DC68000
trusted library allocation
page read and write
1FD7C455000
heap
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD07EAF000
trusted library allocation
page read and write
1FD070A5000
trusted library allocation
page read and write
1FD0E19D000
trusted library allocation
page read and write
1FD08B9B000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD7FD60000
trusted library allocation
page read and write
1ED60DE8000
heap
page read and write
1FD0DBFE000
trusted library allocation
page read and write
1FD7FE0D000
trusted library allocation
page read and write
1FD066BB000
trusted library allocation
page read and write
1FD08B31000
trusted library allocation
page read and write
1FD0DD81000
trusted library allocation
page read and write
23A89200000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD0E3E9000
trusted library allocation
page read and write
1FD08BAB000
trusted library allocation
page read and write
1FD0692F000
trusted library allocation
page read and write
1ED60DA0000
heap
page read and write
F76000
heap
page read and write
1FD0EF85000
trusted library allocation
page read and write
1FD0DB7E000
trusted library allocation
page read and write
1FD0E1C8000
trusted library allocation
page read and write
2256940C000
trusted library allocation
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD108F7000
trusted library allocation
page read and write
1FD0545F000
trusted library allocation
page read and write
1FD7FEF3000
trusted library allocation
page read and write
A4A5BFE000
stack
page read and write
1FD066E0000
trusted library allocation
page read and write
1FD066FB000
trusted library allocation
page read and write
1FD07179000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD0F26E000
trusted library allocation
page read and write
1FD05375000
trusted library allocation
page read and write
1FD07E40000
trusted library allocation
page read and write
1FD7E5BF000
trusted library allocation
page read and write
1FD7C41F000
heap
page read and write
1FD06AC7000
trusted library allocation
page read and write
482DDFE000
unkown
page readonly
1FD06C8F000
trusted library allocation
page read and write
1FD0E0EE000
trusted library allocation
page read and write
1FD069FC000
trusted library allocation
page read and write
1FD106F3000
trusted library allocation
page read and write
1FD7FDF4000
trusted library allocation
page read and write
A779FFE000
unkown
page readonly
1FD069E1000
trusted library allocation
page read and write
1FD06932000
trusted library allocation
page read and write
1FD7FDF4000
trusted library allocation
page read and write
1FD06844000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD057F3000
trusted library allocation
page read and write
1FD066E0000
trusted library allocation
page read and write
1FD0EFFB000
trusted library allocation
page read and write
1FD0DA84000
trusted library allocation
page read and write
1FD0547B000
trusted library allocation
page read and write
A4A4BFE000
stack
page read and write
22569124000
trusted library allocation
page read and write
1FD068E6000
trusted library allocation
page read and write
1FD066A0000
trusted library allocation
page read and write
1FD7FDBA000
trusted library allocation
page read and write
1FD06054000
trusted library allocation
page read and write
1FD0DFD2000
trusted library allocation
page read and write
1FD08EAF000
trusted library allocation
page read and write
1FD7FEA6000
trusted library allocation
page read and write
1B3F000
stack
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD069F4000
trusted library allocation
page read and write
1FD08BA3000
trusted library allocation
page read and write
1FD08B17000
trusted library allocation
page read and write
1FD078EA000
trusted library allocation
page read and write
1FD0DCDE000
trusted library allocation
page read and write
1FD02D8D000
heap
page read and write
1FD0DBE3000
trusted library allocation
page read and write
1ED60DCD000
heap
page read and write
1FD06C33000
trusted library allocation
page read and write
1FD02D92000
heap
page read and write
1FD7FC71000
trusted library allocation
page read and write
1B3917A5000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
2256911A000
trusted library allocation
page read and write
1FD05AB7000
trusted library allocation
page read and write
1FD06CBD000
trusted library allocation
page read and write
984000
heap
page read and write
1FD0F3D1000
trusted library allocation
page read and write
1FD06C36000
trusted library allocation
page read and write
1FD077F0000
trusted library allocation
page read and write
1FD0E3C5000
trusted library allocation
page read and write
1FD0E0C9000
trusted library allocation
page read and write
23A88F62000
heap
page read and write
1FD116CA000
trusted library allocation
page read and write
1FD06CB5000
trusted library allocation
page read and write
1FD05F38000
trusted library allocation
page read and write
1FD7E668000
trusted library allocation
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD0F484000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD060C1000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD07E18000
trusted library allocation
page read and write
1FD7FD7B000
trusted library allocation
page read and write
1FD08B93000
trusted library allocation
page read and write
482DEFE000
unkown
page readonly
1FD10479000
trusted library allocation
page read and write
1FD04F62000
trusted library allocation
page read and write
1FD0EFDA000
trusted library allocation
page read and write
1FD11685000
trusted library allocation
page read and write
1B391909000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD0781F000
trusted library allocation
page read and write
1FD0F5A1000
trusted library allocation
page read and write
1ED60D41000
heap
page read and write
1FD7C48C000
heap
page read and write
1FD0DB93000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD0DD19000
trusted library allocation
page read and write
1FD06A3B000
trusted library allocation
page read and write
1FD7EF89000
trusted library allocation
page read and write
1FD7FD9B000
trusted library allocation
page read and write
1FD06A89000
trusted library allocation
page read and write
1FD071A6000
trusted library allocation
page read and write
ACC000
unkown
page write copy
1FD7EB23000
trusted library allocation
page read and write
1FD0DBD9000
trusted library allocation
page read and write
1FD066BC000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD054D4000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD06948000
trusted library allocation
page read and write
1FD0D9E1000
trusted library allocation
page read and write
1FD05792000
trusted library allocation
page read and write
225691B7000
trusted library allocation
page read and write
1FD0DFD0000
trusted library allocation
page read and write
1FD06C69000
trusted library allocation
page read and write
1FD7C4AD000
heap
page read and write
1FD1048C000
trusted library allocation
page read and write
1FD060A3000
trusted library allocation
page read and write
1FD108A4000
trusted library allocation
page read and write
1FD7FDFA000
trusted library allocation
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD06966000
trusted library allocation
page read and write
1ED60E29000
heap
page read and write
70A8DB0000
trusted library allocation
page execute read
1FD04FD1000
trusted library allocation
page read and write
1FD7FE9D000
trusted library allocation
page read and write
1FD06C2F000
trusted library allocation
page read and write
1FD07095000
trusted library allocation
page read and write
1FD0F37A000
trusted library allocation
page read and write
EBE000
stack
page read and write
1FD7EFAD000
trusted library allocation
page read and write
1ED6010C000
trusted library allocation
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD0E195000
trusted library allocation
page read and write
1FD05DEF000
trusted library allocation
page read and write
1FD0DDD0000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD057BE000
trusted library allocation
page read and write
1FD7FE79000
trusted library allocation
page read and write
1FD0F5B9000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1FD11D73000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD071B2000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD077D3000
trusted library allocation
page read and write
1FD071AC000
trusted library allocation
page read and write
1FD0F48F000
trusted library allocation
page read and write
1FD0DBE4000
trusted library allocation
page read and write
1FD06CEE000
trusted library allocation
page read and write
1B391700000
trusted library allocation
page read and write
1FD06CF6000
trusted library allocation
page read and write
1FD02D92000
heap
page read and write
1FD06AEB000
trusted library allocation
page read and write
1FD0DA8A000
trusted library allocation
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD7FEBC000
trusted library allocation
page read and write
1FD05DF6000
trusted library allocation
page read and write
1FD0F3F9000
trusted library allocation
page read and write
F6B000
heap
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD06CBD000
trusted library allocation
page read and write
23A88F3F000
heap
page read and write
1B3915B0000
heap
page readonly
1FD066FE000
trusted library allocation
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD0668E000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD070B2000
trusted library allocation
page read and write
1FD07E45000
trusted library allocation
page read and write
1FD068F3000
trusted library allocation
page read and write
1FD02D97000
heap
page read and write
1FD08EB1000
trusted library allocation
page read and write
1FD02BD1000
trusted library allocation
page read and write
1FD0DD25000
trusted library allocation
page read and write
1FD071B6000
trusted library allocation
page read and write
1FD071C0000
trusted library allocation
page read and write
984000
heap
page read and write
1FD7C47D000
heap
page read and write
1FD7FDCE000
trusted library allocation
page read and write
1FD0F33F000
trusted library allocation
page read and write
1FD116B9000
trusted library allocation
page read and write
1ED60E31000
heap
page read and write
1FD7C477000
heap
page read and write
1FD08B83000
trusted library allocation
page read and write
1FD0F581000
trusted library allocation
page read and write
1FD057A3000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1ED60917000
trusted library allocation
page read and write
1FD0E0F9000
trusted library allocation
page read and write
1FD0669C000
trusted library allocation
page read and write
1ED5FE28000
remote allocation
page execute read
1FD7FCAE000
trusted library allocation
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD0546D000
trusted library allocation
page read and write
1FD08BA7000
trusted library allocation
page read and write
1FD0DDDB000
trusted library allocation
page read and write
1FD08BB3000
trusted library allocation
page read and write
1FD116E7000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD08ED9000
trusted library allocation
page read and write
1FD066A3000
trusted library allocation
page read and write
1FD0DBBE000
trusted library allocation
page read and write
F94000
heap
page read and write
1FD05BB6000
trusted library allocation
page read and write
1FD0F5B9000
trusted library allocation
page read and write
1FD08EE8000
trusted library allocation
page read and write
1FD7C418000
heap
page read and write
1FD07E68000
trusted library allocation
page read and write
F62000
heap
page read and write
1FD7C438000
heap
page read and write
1FD06C2F000
trusted library allocation
page read and write
1FD05AE1000
trusted library allocation
page read and write
1FD0F5C7000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD0689C000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD06C47000
trusted library allocation
page read and write
1FD05471000
trusted library allocation
page read and write
1FD0F29A000
trusted library allocation
page read and write
1FD05B94000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD0704B000
trusted library allocation
page read and write
1FD0F5D7000
trusted library allocation
page read and write
1FD0DC61000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD05AFA000
trusted library allocation
page read and write
1FD06C0F000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD7FDAB000
trusted library allocation
page read and write
1FD066A3000
trusted library allocation
page read and write
1FD0546B000
trusted library allocation
page read and write
1FD0DDF9000
trusted library allocation
page read and write
1FD7FD58000
trusted library allocation
page read and write
1FD0D9DD000
trusted library allocation
page read and write
1FD0DC39000
trusted library allocation
page read and write
1FD0693B000
trusted library allocation
page read and write
1FD116FB000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1FD0695F000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD7C461000
heap
page read and write
1FD106F3000
trusted library allocation
page read and write
1FD7FEAC000
trusted library allocation
page read and write
1FD05AB0000
trusted library allocation
page read and write
1FD07180000
trusted library allocation
page read and write
1ED60E26000
heap
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD0DDFD000
trusted library allocation
page read and write
1FD0E3CB000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD06A58000
trusted library allocation
page read and write
1FD108E5000
trusted library allocation
page read and write
1FD05BF2000
trusted library allocation
page read and write
1FD06A95000
trusted library allocation
page read and write
1FD05BF7000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD0FBE0000
trusted library allocation
page read and write
1FD0E140000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD0521B000
trusted library allocation
page read and write
1FD07081000
trusted library allocation
page read and write
1FD106FD000
trusted library allocation
page read and write
1FD0DD7D000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD0E08B000
trusted library allocation
page read and write
1FD05AB0000
trusted library allocation
page read and write
1FD0D985000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD066E3000
trusted library allocation
page read and write
1FD068B6000
trusted library allocation
page read and write
1FD0F381000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD0DB95000
trusted library allocation
page read and write
1FD0680A000
trusted library allocation
page read and write
1FD06AC9000
trusted library allocation
page read and write
1FD08EAB000
trusted library allocation
page read and write
1FD0F5A1000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD069B6000
trusted library allocation
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD104DA000
trusted library allocation
page read and write
1FD071A6000
trusted library allocation
page read and write
1FD07185000
trusted library allocation
page read and write
1FD066BF000
trusted library allocation
page read and write
1FD0DBF9000
trusted library allocation
page read and write
1FD06A5F000
trusted library allocation
page read and write
1FD7FE24000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD0F484000
trusted library allocation
page read and write
1FD08EF1000
trusted library allocation
page read and write
1FD06AF8000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
23A88F4D000
heap
page read and write
1FD0DB3D000
trusted library allocation
page read and write
1FD0E0E2000
trusted library allocation
page read and write
1B3913DB000
remote allocation
page execute read
1FD7FDDD000
trusted library allocation
page read and write
1FD06A87000
trusted library allocation
page read and write
1FD7C434000
heap
page read and write
1FD7EFF0000
trusted library allocation
page read and write
1FD060D3000
trusted library allocation
page read and write
1FD0DD1F000
trusted library allocation
page read and write
1FD0F5B1000
trusted library allocation
page read and write
1FD07E4D000
trusted library allocation
page read and write
1FD11656000
trusted library allocation
page read and write
1FD0F571000
trusted library allocation
page read and write
1FD11DF9000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD0E3E1000
trusted library allocation
page read and write
1FD7C419000
heap
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD0782E000
trusted library allocation
page read and write
F72000
heap
page read and write
1FD08BAB000
trusted library allocation
page read and write
1FD0F5B1000
trusted library allocation
page read and write
1FD069AE000
trusted library allocation
page read and write
1FD07871000
trusted library allocation
page read and write
1FD06897000
trusted library allocation
page read and write
1ED60D9C000
heap
page read and write
1FD06C77000
trusted library allocation
page read and write
1FD0795D000
trusted library allocation
page read and write
1FD7ECE5000
trusted library allocation
page read and write
1FD07004000
trusted library allocation
page read and write
1FD7EBF6000
trusted library allocation
page read and write
1FD0DBD8000
trusted library allocation
page read and write
1FD0E1A3000
trusted library allocation
page read and write
1FD7FD72000
trusted library allocation
page read and write
1FD0DD61000
trusted library allocation
page read and write
1FD0F3D1000
trusted library allocation
page read and write
1FD106A7000
trusted library allocation
page read and write
1FD06C8D000
trusted library allocation
page read and write
1FD0685B000
trusted library allocation
page read and write
1FD7FDC7000
trusted library allocation
page read and write
1FD0E091000
trusted library allocation
page read and write
1FD7C4AD000
heap
page read and write
1FD08B7A000
trusted library allocation
page read and write
1ED60730000
heap
page read and write
1FD0DB9B000
trusted library allocation
page read and write
1FD07984000
trusted library allocation
page read and write
1FD7FD9B000
trusted library allocation
page read and write
1FD0D97B000
trusted library allocation
page read and write
1FD7C491000
heap
page read and write
1FD7C48C000
heap
page read and write
1FD0F378000
trusted library allocation
page read and write
1FD09285000
trusted library allocation
page read and write
1FD06940000
trusted library allocation
page read and write
1FD07AFA000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1ED60EB7000
heap
page read and write
1FD0DAB0000
trusted library allocation
page read and write
1ED6090D000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD7C415000
heap
page read and write
1FD06C5D000
trusted library allocation
page read and write
1FD07EAD000
trusted library allocation
page read and write
1FD079E9000
trusted library allocation
page read and write
1FD0DD7D000
trusted library allocation
page read and write
1FD06C2F000
trusted library allocation
page read and write
1FD07E74000
trusted library allocation
page read and write
F98000
heap
page read and write
1FD7C424000
heap
page read and write
980000
heap
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD05AD4000
trusted library allocation
page read and write
1FD07E4D000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD7FD7B000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD070C1000
trusted library allocation
page read and write
1FD0936A000
trusted library allocation
page read and write
1FD7FD98000
trusted library allocation
page read and write
1FD7FD58000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD10887000
trusted library allocation
page read and write
1FD7C477000
heap
page read and write
1FD06AD6000
trusted library allocation
page read and write
1FD0F4A3000
trusted library allocation
page read and write
1FD069A7000
trusted library allocation
page read and write
1FD0F3FD000
trusted library allocation
page read and write
1FD0F429000
trusted library allocation
page read and write
1FD0DA95000
trusted library allocation
page read and write
1FD057D7000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD06AD6000
trusted library allocation
page read and write
A9C000
unkown
page readonly
984000
heap
page read and write
1FD08EE8000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD0F474000
trusted library allocation
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD0F5C3000
trusted library allocation
page read and write
1FD07032000
trusted library allocation
page read and write
1FD0DAEC000
trusted library allocation
page read and write
A00000
unkown
page readonly
F7D000
heap
page read and write
1FD0573C000
trusted library allocation
page read and write
F7D000
heap
page read and write
1FD7EF85000
trusted library allocation
page read and write
1FD7EF08000
trusted library allocation
page read and write
9724FFE000
stack
page read and write
1FD06A92000
trusted library allocation
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD0DB88000
trusted library allocation
page read and write
1FD0778F000
trusted library allocation
page read and write
1ED601EF000
trusted library allocation
page read and write
1FD06AF8000
trusted library allocation
page read and write
1FD069C3000
trusted library allocation
page read and write
1ED60E31000
heap
page read and write
1FD7C486000
heap
page read and write
1FD06957000
trusted library allocation
page read and write
A4A63FF000
stack
page read and write
1FD7FEF2000
trusted library allocation
page read and write
1FD05257000
trusted library allocation
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD0F433000
trusted library allocation
page read and write
1FD0DD77000
trusted library allocation
page read and write
1FD02B61000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD0DD1F000
trusted library allocation
page read and write
1FD06AF0000
trusted library allocation
page read and write
1FD0F5CB000
trusted library allocation
page read and write
1FD070D7000
trusted library allocation
page read and write
1FD7EB71000
trusted library allocation
page read and write
1FD06A5A000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD0E05D000
trusted library allocation
page read and write
1FD1167D000
trusted library allocation
page read and write
1FD0DA00000
trusted library allocation
page read and write
1FD05BAE000
trusted library allocation
page read and write
1FD05B43000
trusted library allocation
page read and write
1FD0D993000
trusted library allocation
page read and write
1FD7FB62000
trusted library allocation
page read and write
1FD7E639000
trusted library allocation
page read and write
1FD052D6000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD08E73000
trusted library allocation
page read and write
1FD7C4AD000
heap
page read and write
1FD0DB0E000
trusted library allocation
page read and write
1FD0EFE6000
trusted library allocation
page read and write
1FD0DC47000
trusted library allocation
page read and write
1FD0F46C000
trusted library allocation
page read and write
22568EE4000
heap
page read and write
1FD0F3FD000
trusted library allocation
page read and write
1FD7EC13000
trusted library allocation
page read and write
1FD0E336000
trusted library allocation
page read and write
1FD7FCF1000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD077BD000
trusted library allocation
page read and write
1ED60DCA000
heap
page read and write
1FD0DB95000
trusted library allocation
page read and write
1FD08B7A000
trusted library allocation
page read and write
1FD106A6000
trusted library allocation
page read and write
1FD0575A000
trusted library allocation
page read and write
1FD7C498000
heap
page read and write
1FD05F73000
trusted library allocation
page read and write
1FD06A1C000
trusted library allocation
page read and write
1FD08EA6000
trusted library allocation
page read and write
1FD0F352000
trusted library allocation
page read and write
1FD0DFD2000
trusted library allocation
page read and write
1ED60181000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD7FE33000
trusted library allocation
page read and write
F71000
heap
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD0F5C5000
trusted library allocation
page read and write
1FD054AA000
trusted library allocation
page read and write
1FD07E45000
trusted library allocation
page read and write
1FD054C2000
trusted library allocation
page read and write
1FD0F5CB000
trusted library allocation
page read and write
1FD06CF5000
trusted library allocation
page read and write
1FD0F478000
trusted library allocation
page read and write
1FD0782E000
trusted library allocation
page read and write
1FD10479000
trusted library allocation
page read and write
1FD7FEDD000
trusted library allocation
page read and write
22568E7F000
unclassified section
page read and write
F9A000
heap
page read and write
1FD02D92000
heap
page read and write
1FD08B80000
trusted library allocation
page read and write
1ED60177000
trusted library allocation
page read and write
1FD05473000
trusted library allocation
page read and write
1FD05BC1000
trusted library allocation
page read and write
1FD7FC82000
trusted library allocation
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD09296000
trusted library allocation
page read and write
22569103000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1ED60DAC000
heap
page read and write
1FD05BC1000
trusted library allocation
page read and write
1FD06952000
trusted library allocation
page read and write
1FD068DB000
trusted library allocation
page read and write
1B3917B4000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD06690000
trusted library allocation
page read and write
1FD070B8000
trusted library allocation
page read and write
1FD7C455000
heap
page read and write
1FD7C415000
heap
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD07E0D000
trusted library allocation
page read and write
1FD068E6000
trusted library allocation
page read and write
1FD0E0AE000
trusted library allocation
page read and write
70A8DF0000
trusted library allocation
page execute read
1FD108CA000
trusted library allocation
page read and write
1FD06CF0000
trusted library allocation
page read and write
1FD7FE69000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
A4A3BFB000
stack
page read and write
1FD0DBAF000
trusted library allocation
page read and write
1FD05471000
trusted library allocation
page read and write
1FD7ECE5000
trusted library allocation
page read and write
1FD06AB1000
trusted library allocation
page read and write
1FD05385000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD09154000
heap
page read and write
1FD09261000
trusted library allocation
page read and write
1FD0F2DF000
trusted library allocation
page read and write
1FD0D9AB000
trusted library allocation
page read and write
1FD08B33000
trusted library allocation
page read and write
1FD0EFFB000
trusted library allocation
page read and write
1FD7C497000
heap
page read and write
1FD02B55000
trusted library allocation
page read and write
1FD0F57D000
trusted library allocation
page read and write
1FD07AE0000
trusted library allocation
page read and write
1FD06853000
trusted library allocation
page read and write
1B3917E7000
trusted library allocation
page read and write
1ED60E3D000
heap
page read and write
3820000
heap
page read and write
1FD08BF3000
trusted library allocation
page read and write
1FD0DBF1000
trusted library allocation
page read and write
1FD07ED2000
trusted library allocation
page read and write
1FD7C49E000
heap
page read and write
23A8AB3D000
heap
page read and write
1FD0EFA9000
trusted library allocation
page read and write
1FD0DC79000
trusted library allocation
page read and write
1FD057C4000
trusted library allocation
page read and write
1FD06BE5000
trusted library allocation
page read and write
1FD08E8C000
trusted library allocation
page read and write
1FD11661000
trusted library allocation
page read and write
1FD06940000
trusted library allocation
page read and write
1FD0925C000
trusted library allocation
page read and write
1FD0F5BF000
trusted library allocation
page read and write
1FD06C36000
trusted library allocation
page read and write
1FD10492000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
1B391747000
trusted library allocation
page read and write
1FD0F5C5000
trusted library allocation
page read and write
1FD06802000
trusted library allocation
page read and write
1FD06964000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD7FB67000
trusted library allocation
page read and write
1FD1048F000
trusted library allocation
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD1167D000
trusted library allocation
page read and write
1FD09301000
trusted library allocation
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD052D0000
trusted library allocation
page read and write
1FD11A6A000
trusted library allocation
page read and write
1FD0F33E000
trusted library allocation
page read and write
2512A200000
heap
page read and write
1FD05363000
trusted library allocation
page read and write
1FD05493000
trusted library allocation
page read and write
1FD068C1000
trusted library allocation
page read and write
1FD0DC39000
trusted library allocation
page read and write
1FD0547B000
trusted library allocation
page read and write
1FD07489000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD7C42A000
heap
page read and write
1FD07943000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD06A80000
trusted library allocation
page read and write
1ED60103000
trusted library allocation
page read and write
F74000
heap
page read and write
1FD0F5AA000
trusted library allocation
page read and write
1FD0DFD8000
trusted library allocation
page read and write
1FD07AF2000
trusted library allocation
page read and write
1FD116CE000
trusted library allocation
page read and write
1FD7EFED000
trusted library allocation
page read and write
1FD0F5A1000
trusted library allocation
page read and write
1FD0D971000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD7FD98000
trusted library allocation
page read and write
1FD7EC7F000
trusted library allocation
page read and write
1FD0E1D9000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD0F5C3000
trusted library allocation
page read and write
1ED60DA4000
heap
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD07182000
trusted library allocation
page read and write
482F6FE000
stack
page read and write
1FD7C415000
heap
page read and write
1FD06C36000
trusted library allocation
page read and write
1FD0E1F6000
trusted library allocation
page read and write
1FD0D971000
trusted library allocation
page read and write
1FD0E1C0000
trusted library allocation
page read and write
1FD108BF000
trusted library allocation
page read and write
F8F000
heap
page read and write
1FD06860000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD057F7000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
1FD06A30000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD7C41A000
heap
page read and write
1FD068A1000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD7C42A000
heap
page read and write
1FD06AC9000
trusted library allocation
page read and write
1FD0D951000
trusted library allocation
page read and write
1FD7FDFD000
trusted library allocation
page read and write
1FD06CFC000
trusted library allocation
page read and write
1ED60844000
unkown
page execute read
1FD10675000
trusted library allocation
page read and write
1FD06C60000
trusted library allocation
page read and write
1FD057F5000
trusted library allocation
page read and write
1FD0E1BE000
trusted library allocation
page read and write
1FD07136000
trusted library allocation
page read and write
1FD068F9000
trusted library allocation
page read and write
1ED60DBD000
heap
page read and write
1FD7FEDC000
trusted library allocation
page read and write
1FD0706D000
trusted library allocation
page read and write
1FD07E40000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1FD7C455000
heap
page read and write
1FD0E0C7000
trusted library allocation
page read and write
1FD0D9A1000
trusted library allocation
page read and write
1FD06AE9000
trusted library allocation
page read and write
1FD05496000
trusted library allocation
page read and write
1FD08E1B000
trusted library allocation
page read and write
1FD08E14000
trusted library allocation
page read and write
1FD0EFA7000
trusted library allocation
page read and write
1FD7EFDE000
trusted library allocation
page read and write
1FD7FE6C000
trusted library allocation
page read and write
1B39191C000
trusted library allocation
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD06A78000
trusted library allocation
page read and write
1FD0703A000
trusted library allocation
page read and write
1FD0665A000
trusted library allocation
page read and write
1FD7FEDD000
trusted library allocation
page read and write
1FD7FC55000
trusted library allocation
page read and write
1FD06BD9000
trusted library allocation
page read and write
1FD7FB62000
trusted library allocation
page read and write
1B39156A000
heap
page read and write
1FD7FD11000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD0DF64000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD11DF9000
trusted library allocation
page read and write
1FD0EFBF000
trusted library allocation
page read and write
1FD06853000
trusted library allocation
page read and write
1FD05AFC000
trusted library allocation
page read and write
1FD08E73000
trusted library allocation
page read and write
A77A7FE000
stack
page read and write
1FD057CD000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD08EAF000
trusted library allocation
page read and write
1FD0DBA6000
trusted library allocation
page read and write
1FD057F7000
trusted library allocation
page read and write
1FD0DABC000
trusted library allocation
page read and write
1FD07AB6000
trusted library allocation
page read and write
1FD05476000
trusted library allocation
page read and write
1FD0DD66000
trusted library allocation
page read and write
1ED60220000
trusted library section
page readonly
1FD0EFCB000
trusted library allocation
page read and write
1FD0543D000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD08BEB000
trusted library allocation
page read and write
1FD08BA6000
trusted library allocation
page read and write
1FD7C414000
heap
page read and write
F93000
heap
page read and write
1FD0DBFD000
trusted library allocation
page read and write
1FD0F435000
trusted library allocation
page read and write
1FD0E027000
trusted library allocation
page read and write
1FD0681D000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD0EFCF000
trusted library allocation
page read and write
22568D00000
heap
page read and write
1FD7FD98000
trusted library allocation
page read and write
1FD07981000
trusted library allocation
page read and write
1FD0F5AC000
trusted library allocation
page read and write
1ED60169000
trusted library allocation
page read and write
1FD0DFA1000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD0E061000
trusted library allocation
page read and write
1FD108BF000
trusted library allocation
page read and write
1ED60E84000
heap
page read and write
1FD066C2000
trusted library allocation
page read and write
1FD0DBC8000
trusted library allocation
page read and write
1FD7FB36000
trusted library allocation
page read and write
1FD04F8D000
trusted library allocation
page read and write
1FD0DC47000
trusted library allocation
page read and write
1FD07AE7000
trusted library allocation
page read and write
1FD060C4000
trusted library allocation
page read and write
1FD07E4B000
trusted library allocation
page read and write
1FD08EFA000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD05ABD000
trusted library allocation
page read and write
1FD0F478000
trusted library allocation
page read and write
1FD7C434000
heap
page read and write
1FD071FC000
trusted library allocation
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD0578F000
trusted library allocation
page read and write
1FD1043A000
trusted library allocation
page read and write
1FD0DD90000
trusted library allocation
page read and write
1FD08BAB000
trusted library allocation
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD06AF8000
trusted library allocation
page read and write
1B391703000
trusted library allocation
page read and write
1FD7C472000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD0F37A000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7C41E000
heap
page read and write
1FD08E77000
trusted library allocation
page read and write
1FD116E5000
trusted library allocation
page read and write
1FD05B94000
trusted library allocation
page read and write
1FD08EB7000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0DBD9000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD06940000
trusted library allocation
page read and write
1FD0DDC8000
trusted library allocation
page read and write
1FD0DCD7000
trusted library allocation
page read and write
1FD7FD6D000
trusted library allocation
page read and write
1FD078FE000
trusted library allocation
page read and write
1FD0DDBC000
trusted library allocation
page read and write
1FD0521F000
trusted library allocation
page read and write
1FD0E3E6000
trusted library allocation
page read and write
F48000
heap
page read and write
1ED60E99000
heap
page read and write
1FD0E341000
trusted library allocation
page read and write
1FD7EF89000
trusted library allocation
page read and write
1FD0E325000
trusted library allocation
page read and write
22568C20000
unclassified section
page readonly
1FD0E1A6000
trusted library allocation
page read and write
1FD02D72000
heap
page read and write
22568C10000
unclassified section
page readonly
1FD7FD20000
trusted library allocation
page read and write
1FD052D1000
trusted library allocation
page read and write
1FD7EBFB000
trusted library allocation
page read and write
1FD06BF9000
trusted library allocation
page read and write
AD4000
unkown
page readonly
1FD0F4FE000
trusted library allocation
page read and write
1FD7FD92000
trusted library allocation
page read and write
9B0000
heap
page read and write
1FD7C41C000
heap
page read and write
1FD0DD5E000
trusted library allocation
page read and write
1FD0E1DB000
trusted library allocation
page read and write
1FD06CF1000
trusted library allocation
page read and write
1FD11DE9000
trusted library allocation
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD0917A000
heap
page read and write
1FD0DADA000
trusted library allocation
page read and write
23A8AB2B000
heap
page read and write
1FD7C416000
heap
page read and write
22568C96000
remote allocation
page execute read
1FD7C436000
heap
page read and write
1FD0DC49000
trusted library allocation
page read and write
1FD06863000
trusted library allocation
page read and write
1FD054A6000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD7FDB2000
trusted library allocation
page read and write
1FD07076000
trusted library allocation
page read and write
22568F73000
heap
page read and write
1FD06646000
trusted library allocation
page read and write
1FD05F38000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD071B6000
trusted library allocation
page read and write
1FD0F586000
trusted library allocation
page read and write
1FD06AD2000
trusted library allocation
page read and write
1FD0F33E000
trusted library allocation
page read and write
1FD0F5E7000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD0683D000
trusted library allocation
page read and write
1FD05449000
trusted library allocation
page read and write
1B3915D2000
unclassified section
page read and write
1FD7C438000
heap
page read and write
1FD11DEF000
trusted library allocation
page read and write
A778F7E000
unkown
page readonly
1FD05AC3000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
482FEFE000
unkown
page readonly
1FD7C486000
heap
page read and write
1FD0F5D7000
trusted library allocation
page read and write
1FD05385000
trusted library allocation
page read and write
1FD06AE1000
trusted library allocation
page read and write
1B39175D000
trusted library allocation
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD0F5A8000
trusted library allocation
page read and write
1FD07795000
trusted library allocation
page read and write
1FD0F3B4000
trusted library allocation
page read and write
1FD08B7D000
trusted library allocation
page read and write
1FD7FD20000
trusted library allocation
page read and write
1FD0EFCF000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0EFB4000
trusted library allocation
page read and write
23A89100000
trusted library allocation
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD057D7000
trusted library allocation
page read and write
1FD106F7000
trusted library allocation
page read and write
1FD0F382000
trusted library allocation
page read and write
1ED60DAC000
heap
page read and write
1FD7C425000
heap
page read and write
1B391710000
trusted library allocation
page read and write
F68000
heap
page read and write
1FD06AF0000
trusted library allocation
page read and write
1FD04F56000
trusted library allocation
page read and write
97234BE000
unkown
page readonly
1FD0E1E4000
trusted library allocation
page read and write
1FD05B98000
trusted library allocation
page read and write
1FD10881000
trusted library allocation
page read and write
1FD06642000
trusted library allocation
page read and write
1FD7FE2C000
trusted library allocation
page read and write
1FD0781F000
trusted library allocation
page read and write
1FD0527A000
trusted library allocation
page read and write
1FD11A27000
trusted library allocation
page read and write
1FD116ED000
trusted library allocation
page read and write
1FD05AC1000
trusted library allocation
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD06940000
trusted library allocation
page read and write
1FD06897000
trusted library allocation
page read and write
F8C000
heap
page read and write
70A8E10000
trusted library allocation
page execute read
1FD068CE000
trusted library allocation
page read and write
1FD0F5C5000
trusted library allocation
page read and write
1FD0705D000
trusted library allocation
page read and write
1FD0DCD7000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD116CE000
trusted library allocation
page read and write
1FD10874000
trusted library allocation
page read and write
1FD071A9000
trusted library allocation
page read and write
1ED60900000
trusted library allocation
page read and write
1FD0E3F5000
trusted library allocation
page read and write
1FD7EFAD000
trusted library allocation
page read and write
1ED60D9C000
heap
page read and write
1FD7E68A000
trusted library allocation
page read and write
1FD05AFC000
trusted library allocation
page read and write
1FD07D5E000
trusted library allocation
page read and write
1FD06953000
trusted library allocation
page read and write
1FD104A1000
trusted library allocation
page read and write
1FD0788D000
trusted library allocation
page read and write
1FD06C0F000
trusted library allocation
page read and write
22569303000
trusted library allocation
page read and write
1FD057F3000
trusted library allocation
page read and write
1FD0F408000
trusted library allocation
page read and write
1FD7C455000
heap
page read and write
1FD106FB000
trusted library allocation
page read and write
1FD0F5C9000
trusted library allocation
page read and write
22569200000
heap
page read and write
1FD07ECC000
trusted library allocation
page read and write
1FD077C4000
trusted library allocation
page read and write
1FD7FBB3000
trusted library allocation
page read and write
1FD071C0000
trusted library allocation
page read and write
1FD07E7D000
trusted library allocation
page read and write
1FD0F5D5000
trusted library allocation
page read and write
1FD7E598000
trusted library allocation
page read and write
1ED60E6D000
heap
page read and write
1FD07106000
trusted library allocation
page read and write
1FD0F581000
trusted library allocation
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD1169B000
trusted library allocation
page read and write
F93000
heap
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD05B3B000
trusted library allocation
page read and write
1FD077F6000
trusted library allocation
page read and write
F6C000
heap
page read and write
1FD7FE5E000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0E0F9000
trusted library allocation
page read and write
1FD06A56000
trusted library allocation
page read and write
1FD05244000
trusted library allocation
page read and write
1FD02B55000
trusted library allocation
page read and write
97235BE000
unkown
page readonly
1FD7C41E000
heap
page read and write
1FD0F593000
trusted library allocation
page read and write
1FD104C0000
trusted library allocation
page read and write
1FD0E0F3000
trusted library allocation
page read and write
1FD0DC63000
trusted library allocation
page read and write
1FD05B2D000
trusted library allocation
page read and write
1FD7FDBA000
trusted library allocation
page read and write
1FD0D92B000
trusted library allocation
page read and write
1FD0DD3D000
trusted library allocation
page read and write
1FD069FC000
trusted library allocation
page read and write
1FD08B31000
trusted library allocation
page read and write
225691F6000
trusted library allocation
page read and write
1FD0F5C1000
trusted library allocation
page read and write
1FD092B4000
trusted library allocation
page read and write
1FD06849000
trusted library allocation
page read and write
1FD0E011000
trusted library allocation
page read and write
1FD0704B000
trusted library allocation
page read and write
1FD05AE3000
trusted library allocation
page read and write
1B3915E0000
heap
page read and write
1FD09111000
heap
page read and write
1FD066F5000
trusted library allocation
page read and write
1FD066CB000
trusted library allocation
page read and write
2256916B000
trusted library allocation
page read and write
1FD0E0F3000
trusted library allocation
page read and write
1FD0F478000
trusted library allocation
page read and write
1FD0669C000
trusted library allocation
page read and write
1FD07120000
trusted library allocation
page read and write
1FD05B92000
trusted library allocation
page read and write
1FD7C47D000
heap
page read and write
1FD08BAB000
trusted library allocation
page read and write
1FD054C8000
trusted library allocation
page read and write
1FD069CF000
trusted library allocation
page read and write
1FD0DA3C000
trusted library allocation
page read and write
1FD07185000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1B3915C4000
heap
page read and write
1FD0F4F2000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD108A3000
trusted library allocation
page read and write
1B3917C9000
trusted library allocation
page read and write
1FD08BA6000
trusted library allocation
page read and write
1FD0EFE4000
trusted library allocation
page read and write
1B391768000
trusted library allocation
page read and write
1FD06CFA000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD7FD92000
trusted library allocation
page read and write
1FD0DDCB000
trusted library allocation
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD08EF1000
trusted library allocation
page read and write
1FD08BAE000
trusted library allocation
page read and write
1FD0DDD2000
trusted library allocation
page read and write
1FD02D70000
heap
page read and write
1FD7FCF1000
trusted library allocation
page read and write
1FD108AA000
trusted library allocation
page read and write
1FD0F35B000
trusted library allocation
page read and write
1ED60D49000
heap
page read and write
1FD02B33000
trusted library allocation
page read and write
1FD7FDB2000
trusted library allocation
page read and write
1FD7FC81000
trusted library allocation
page read and write
1FD7EF54000
trusted library allocation
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD05B3F000
trusted library allocation
page read and write
1FD0547F000
trusted library allocation
page read and write
1FD06CF5000
trusted library allocation
page read and write
1FD06AC7000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD069F4000
trusted library allocation
page read and write
1FD068A1000
trusted library allocation
page read and write
1FD0547B000
trusted library allocation
page read and write
1FD0669E000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD07E8C000
trusted library allocation
page read and write
1FD08EE1000
trusted library allocation
page read and write
1FD05471000
trusted library allocation
page read and write
1FD7FCA8000
trusted library allocation
page read and write
1FD08BFB000
trusted library allocation
page read and write
1FD078FB000
trusted library allocation
page read and write
1FD0FBDE000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD07E6F000
trusted library allocation
page read and write
1FD07095000
trusted library allocation
page read and write
1FD05BF5000
trusted library allocation
page read and write
1FD7FBC5000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD7FE9D000
trusted library allocation
page read and write
1FD10431000
trusted library allocation
page read and write
1FD116A6000
trusted library allocation
page read and write
1FD05B7A000
trusted library allocation
page read and write
1FD11A61000
trusted library allocation
page read and write
2512A3CA000
heap
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD0683B000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD7FE97000
trusted library allocation
page read and write
1FD10877000
trusted library allocation
page read and write
1FD04FAB000
trusted library allocation
page read and write
1FD05BA8000
trusted library allocation
page read and write
1FD02DA4000
heap
page read and write
1FD070E0000
trusted library allocation
page read and write
1FD0DBD8000
trusted library allocation
page read and write
1FD7C451000
heap
page read and write
1FD0794F000
trusted library allocation
page read and write
1FD066E0000
trusted library allocation
page read and write
1FD7FDE5000
trusted library allocation
page read and write
1FD0DC8C000
trusted library allocation
page read and write
1FD06958000
trusted library allocation
page read and write
1FD066EF000
trusted library allocation
page read and write
1FD7FE69000
trusted library allocation
page read and write
1FD7C4A9000
heap
page read and write
1FD7C484000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD10492000
trusted library allocation
page read and write
1FD0E0C0000
trusted library allocation
page read and write
1FD05FC0000
trusted library allocation
page read and write
1FD08BA3000
trusted library allocation
page read and write
1FD0EFE9000
trusted library allocation
page read and write
1FD077D3000
trusted library allocation
page read and write
1FD068B0000
trusted library allocation
page read and write
1FD0F37C000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD104A1000
trusted library allocation
page read and write
1FD05B33000
trusted library allocation
page read and write
22569182000
trusted library allocation
page read and write
1FD06AB1000
trusted library allocation
page read and write
1FD10898000
trusted library allocation
page read and write
1FD06C57000
trusted library allocation
page read and write
1E7CC1C03000
trusted library allocation
page read and write
225691B1000
trusted library allocation
page read and write
1FD7FDC1000
trusted library allocation
page read and write
1FD0703A000
trusted library allocation
page read and write
1FD07168000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD09111000
heap
page read and write
1FD10874000
trusted library allocation
page read and write
1FD07E21000
trusted library allocation
page read and write
1FD02BF6000
trusted library allocation
page read and write
1FD06C9A000
trusted library allocation
page read and write
A7765D8000
stack
page read and write
1FD07D93000
trusted library allocation
page read and write
1FD0663B000
trusted library allocation
page read and write
1FD0F589000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
EF0000
trusted library allocation
page read and write
1FD06AA2000
trusted library allocation
page read and write
1ED60D9F000
heap
page read and write
1FD7C431000
heap
page read and write
1FD05273000
trusted library allocation
page read and write
1FD11685000
trusted library allocation
page read and write
569000
stack
page read and write
22569170000
trusted library allocation
page read and write
1FD0577D000
trusted library allocation
page read and write
1FD08EA6000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD07D5B000
trusted library allocation
page read and write
1FD057B1000
trusted library allocation
page read and write
1FD0686B000
trusted library allocation
page read and write
1FD05B43000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
2512A50A000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD08B37000
trusted library allocation
page read and write
1FD06C37000
trusted library allocation
page read and write
1FD0F3DD000
trusted library allocation
page read and write
1FD05230000
trusted library allocation
page read and write
1FD06C0B000
trusted library allocation
page read and write
1FD07EE8000
trusted library allocation
page read and write
1FD07136000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0F4E6000
trusted library allocation
page read and write
1FD06C99000
trusted library allocation
page read and write
1FD06AC3000
trusted library allocation
page read and write
1FD08E6C000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD06964000
trusted library allocation
page read and write
1FD08B83000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD05475000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD7FDF4000
trusted library allocation
page read and write
1FD06CB5000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD0F429000
trusted library allocation
page read and write
1FD116B9000
trusted library allocation
page read and write
1FD05711000
trusted library allocation
page read and write
A778FFE000
unkown
page readonly
1FD7C431000
heap
page read and write
1FD7C41D000
heap
page read and write
1FD7FDDD000
trusted library allocation
page read and write
1FD069F4000
trusted library allocation
page read and write
1FD0E0F1000
trusted library allocation
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD7FB50000
trusted library allocation
page read and write
1FD106DB000
trusted library allocation
page read and write
1FD06AEC000
trusted library allocation
page read and write
1FD068E8000
trusted library allocation
page read and write
1FD091F1000
heap
page read and write
1FD7C49E000
heap
page read and write
1FD0DC33000
trusted library allocation
page read and write
1FD7EC1E000
trusted library allocation
page read and write
1FD0E33C000
trusted library allocation
page read and write
1FD066CF000
trusted library allocation
page read and write
1FD7FD18000
trusted library allocation
page read and write
1FD0DC27000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD0719C000
trusted library allocation
page read and write
1FD0DF75000
trusted library allocation
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD06A52000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1FD06671000
trusted library allocation
page read and write
1B39172E000
trusted library allocation
page read and write
1FD0693E000
trusted library allocation
page read and write
1FD07E08000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD0EFD1000
trusted library allocation
page read and write
1ED602C4000
heap
page read and write
1FD0DC33000
trusted library allocation
page read and write
1FD0D933000
trusted library allocation
page read and write
1FD7FD7E000
trusted library allocation
page read and write
1FD08EA6000
trusted library allocation
page read and write
1FD02D72000
heap
page read and write
1FD08EA6000
trusted library allocation
page read and write
1FD0E0A8000
trusted library allocation
page read and write
1FD06AD6000
trusted library allocation
page read and write
23A8AB38000
heap
page read and write
1FD0DF08000
trusted library allocation
page read and write
1FD0E199000
trusted library allocation
page read and write
1FD06953000
trusted library allocation
page read and write
1FD104DA000
trusted library allocation
page read and write
1FD0661C000
trusted library allocation
page read and write
1FD07866000
trusted library allocation
page read and write
1B391560000
heap
page read and write
1FD7C461000
heap
page read and write
1FD7FEDC000
trusted library allocation
page read and write
1FD7C41E000
heap
page read and write
1FD07DB9000
trusted library allocation
page read and write
1FD0538B000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD071B8000
trusted library allocation
page read and write
1FD06A8B000
trusted library allocation
page read and write
1FD7C4A0000
heap
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1FD1081A000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD05AB7000
trusted library allocation
page read and write
A7797FE000
stack
page read and write
1FD7C431000
heap
page read and write
1FD11656000
trusted library allocation
page read and write
1FD08E3E000
trusted library allocation
page read and write
1FD05B3B000
trusted library allocation
page read and write
1FD06805000
trusted library allocation
page read and write
1FD08EB1000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD10833000
trusted library allocation
page read and write
1FD06860000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0FBE0000
trusted library allocation
page read and write
1FD7E5A8000
trusted library allocation
page read and write
1FD0DC63000
trusted library allocation
page read and write
1ED5FFF0000
heap
page readonly
1FD06E00000
trusted library allocation
page read and write
1FD0DBDE000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD0F5D3000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD06C78000
trusted library allocation
page read and write
1FD0DBD8000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD7C41C000
heap
page read and write
1FD116ED000
trusted library allocation
page read and write
1FD05D5B000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD0E0E2000
trusted library allocation
page read and write
1FD05B7A000
trusted library allocation
page read and write
1FD06BB3000
trusted library allocation
page read and write
1FD7C420000
heap
page read and write
1FD02B80000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1ED60DA0000
heap
page read and write
1FD7FCF5000
trusted library allocation
page read and write
1FD05DD1000
trusted library allocation
page read and write
1FD0E3E1000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1FD108B8000
trusted library allocation
page read and write
1FD057F3000
trusted library allocation
page read and write
1FD07AE7000
trusted library allocation
page read and write
1FD06A56000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD0DD23000
trusted library allocation
page read and write
1FD06696000
trusted library allocation
page read and write
1FD0F579000
trusted library allocation
page read and write
1FD06656000
trusted library allocation
page read and write
1FD057DE000
trusted library allocation
page read and write
1FD7FCC6000
trusted library allocation
page read and write
1B39175B000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD7C426000
heap
page read and write
1FD0E14A000
trusted library allocation
page read and write
1B39170D000
trusted library allocation
page read and write
1FD05AA1000
trusted library allocation
page read and write
1FD7C47D000
heap
page read and write
1FD0521B000
trusted library allocation
page read and write
2256915D000
trusted library allocation
page read and write
1FD08EAB000
trusted library allocation
page read and write
1FD06A87000
trusted library allocation
page read and write
1FD06A43000
trusted library allocation
page read and write
1FD05460000
trusted library allocation
page read and write
1FD02DF2000
heap
page read and write
1FD7C40F000
heap
page read and write
1FD0F5AA000
trusted library allocation
page read and write
1FD116FB000
trusted library allocation
page read and write
1FD069AA000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD0F4E6000
trusted library allocation
page read and write
1FD066E0000
trusted library allocation
page read and write
1FD0685B000
trusted library allocation
page read and write
1FD08EA9000
trusted library allocation
page read and write
1FD04F7F000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD057F5000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD05DC1000
trusted library allocation
page read and write
1FD0DAB6000
trusted library allocation
page read and write
1FD07AE0000
trusted library allocation
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD0D96E000
trusted library allocation
page read and write
1FD07E2B000
trusted library allocation
page read and write
1FD06843000
trusted library allocation
page read and write
22569166000
trusted library allocation
page read and write
1ED60E98000
heap
page read and write
1FD0665A000
trusted library allocation
page read and write
1FD07787000
trusted library allocation
page read and write
1FD071C0000
trusted library allocation
page read and write
1FD0DF90000
trusted library allocation
page read and write
A77AFFE000
unkown
page readonly
1FD0F36D000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD06AC3000
trusted library allocation
page read and write
1FD06CF5000
trusted library allocation
page read and write
1FD06CC1000
trusted library allocation
page read and write
1FD0FB99000
trusted library allocation
page read and write
1FD05BAA000
trusted library allocation
page read and write
1FD0DFAC000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD0DDE5000
trusted library allocation
page read and write
1ED60E6A000
heap
page read and write
1FD05BA8000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD06860000
trusted library allocation
page read and write
1FD0DFD0000
trusted library allocation
page read and write
1FD054C2000
trusted library allocation
page read and write
1B3915DF000
unclassified section
page read and write
1FD06C97000
trusted library allocation
page read and write
1FD0F36C000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
984000
heap
page read and write
1FD0DAB0000
trusted library allocation
page read and write
1FD0695F000
trusted library allocation
page read and write
1FD06A58000
trusted library allocation
page read and write
1B391420000
heap
page read and write
1FD08E53000
trusted library allocation
page read and write
1FD0DB3D000
trusted library allocation
page read and write
1FD0DC33000
trusted library allocation
page read and write
22568E70000
unclassified section
page read and write
1FD068A1000
trusted library allocation
page read and write
1FD0DC3B000
trusted library allocation
page read and write
1FD7FE81000
trusted library allocation
page read and write
1FD7E65B000
trusted library allocation
page read and write
22569130000
trusted library allocation
page read and write
1FD0DC81000
trusted library allocation
page read and write
1FD0DFC8000
trusted library allocation
page read and write
1FD07192000
trusted library allocation
page read and write
1FD07E45000
trusted library allocation
page read and write
1FD068DB000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD08B89000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
94D000
stack
page read and write
1FD0E0E5000
trusted library allocation
page read and write
1FD7ECC5000
trusted library allocation
page read and write
1FD7EC75000
trusted library allocation
page read and write
1FD0DBA8000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD7C452000
heap
page read and write
1FD0E3D9000
trusted library allocation
page read and write
1FD09259000
trusted library allocation
page read and write
1FD0788D000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD0FBE0000
trusted library allocation
page read and write
2256915F000
trusted library allocation
page read and write
1B391350000
unclassified section
page readonly
1FD0DF0C000
trusted library allocation
page read and write
EDF000
stack
page read and write
1ED60E98000
heap
page read and write
1ED60E28000
heap
page read and write
1FD0538F000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD05B92000
trusted library allocation
page read and write
1FD04F63000
trusted library allocation
page read and write
1FD0DB95000
trusted library allocation
page read and write
1FD0DDDF000
trusted library allocation
page read and write
1FD7E5EF000
trusted library allocation
page read and write
1FD0DB9B000
trusted library allocation
page read and write
1FD068C1000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD02BDB000
trusted library allocation
page read and write
1FD7FC46000
trusted library allocation
page read and write
1FD7E5A6000
trusted library allocation
page read and write
1FD7E5C7000
trusted library allocation
page read and write
1FD0DD3B000
trusted library allocation
page read and write
1FD0F3C0000
trusted library allocation
page read and write
1FD0FBD0000
trusted library allocation
page read and write
1FD08BF6000
trusted library allocation
page read and write
1FD06A3F000
trusted library allocation
page read and write
1FD0DADA000
trusted library allocation
page read and write
1FD0F59D000
trusted library allocation
page read and write
1FD10877000
trusted library allocation
page read and write
1ED60E6A000
heap
page read and write
1FD06A98000
trusted library allocation
page read and write
1FD06A30000
trusted library allocation
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD0DDB6000
trusted library allocation
page read and write
1FD08ED4000
trusted library allocation
page read and write
1FD108F9000
trusted library allocation
page read and write
1FD069AE000
trusted library allocation
page read and write
1FD06661000
trusted library allocation
page read and write
1FD05BED000
trusted library allocation
page read and write
1FD0EFFB000
trusted library allocation
page read and write
1FD0F5BB000
trusted library allocation
page read and write
1FD06CBD000
trusted library allocation
page read and write
1FD02BE1000
trusted library allocation
page read and write
1FD7FE6E000
trusted library allocation
page read and write
1FD116E7000
trusted library allocation
page read and write
1FD7C46D000
heap
page read and write
1FD0DC68000
trusted library allocation
page read and write
1FD7FD46000
trusted library allocation
page read and write
1FD0F5CD000
trusted library allocation
page read and write
1FD0EFFB000
trusted library allocation
page read and write
1FD04FFA000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD08B80000
trusted library allocation
page read and write
1FD0685D000
trusted library allocation
page read and write
1FD07767000
trusted library allocation
page read and write
1FD0537F000
trusted library allocation
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD0785D000
trusted library allocation
page read and write
1FD106F5000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD08EFA000
trusted library allocation
page read and write
1FD07131000
trusted library allocation
page read and write
1FD0F5CF000
trusted library allocation
page read and write
1FD0EFA3000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD0ED80000
trusted library allocation
page read and write
1FD06CF6000
trusted library allocation
page read and write
1FD05DEF000
trusted library allocation
page read and write
2256910C000
trusted library allocation
page read and write
1FD0E0C9000
trusted library allocation
page read and write
1FD0543D000
trusted library allocation
page read and write
1FD08EE8000
trusted library allocation
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD10661000
trusted library allocation
page read and write
1FD0538B000
trusted library allocation
page read and write
1FD08EE8000
trusted library allocation
page read and write
1FD06A82000
trusted library allocation
page read and write
1FD0F4CB000
trusted library allocation
page read and write
1FD068FB000
trusted library allocation
page read and write
1FD0933B000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD09111000
heap
page read and write
22568F70000
heap
page read and write
1ED6015C000
trusted library allocation
page read and write
1FD06CB0000
trusted library allocation
page read and write
1FD06AAE000
trusted library allocation
page read and write
1FD0F37B000
trusted library allocation
page read and write
1ED60EAA000
heap
page read and write
1FD0F45F000
trusted library allocation
page read and write
1FD069A4000
trusted library allocation
page read and write
1FD0711E000
trusted library allocation
page read and write
1ED60DA0000
heap
page read and write
1FD07727000
trusted library allocation
page read and write
1FD08B33000
trusted library allocation
page read and write
1FD06AFE000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1FD06CAD000
trusted library allocation
page read and write
1FD0DAEF000
trusted library allocation
page read and write
5D0000
heap
page read and write
1FD09146000
heap
page read and write
1FD108B8000
trusted library allocation
page read and write
1FD08BEB000
trusted library allocation
page read and write
1FD054CF000
trusted library allocation
page read and write
1FD0F5E2000
trusted library allocation
page read and write
1FD05BAA000
trusted library allocation
page read and write
1FD0DF91000
trusted library allocation
page read and write
1FD0E1E1000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD7FCE5000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD0F589000
trusted library allocation
page read and write
1FD0F5CF000
trusted library allocation
page read and write
1FD0F5BD000
trusted library allocation
page read and write
1FD054D7000
trusted library allocation
page read and write
1FD07959000
trusted library allocation
page read and write
1FD0DB7E000
trusted library allocation
page read and write
1FD0F3D1000
trusted library allocation
page read and write
1FD0537F000
trusted library allocation
page read and write
1FD05BB9000
trusted library allocation
page read and write
1FD7FD55000
trusted library allocation
page read and write
1FD06C33000
trusted library allocation
page read and write
1FD0E1BA000
trusted library allocation
page read and write
1FD06964000
trusted library allocation
page read and write
1FD06954000
trusted library allocation
page read and write
1ED60DEA000
heap
page read and write
1FD06CF0000
trusted library allocation
page read and write
1FD068A1000
trusted library allocation
page read and write
1FD052B5000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD08ED4000
trusted library allocation
page read and write
1FD0F5BF000
trusted library allocation
page read and write
1FD05492000
trusted library allocation
page read and write
1FD108FD000
trusted library allocation
page read and write
1FD116FB000
trusted library allocation
page read and write
1FD08ED9000
trusted library allocation
page read and write
1ED60E98000
heap
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1ED60E7B000
heap
page read and write
1FD10428000
trusted library allocation
page read and write
1FD08B17000
trusted library allocation
page read and write
1FD11100000
trusted library allocation
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD0526C000
trusted library allocation
page read and write
1FD068F6000
trusted library allocation
page read and write
1FD066E7000
trusted library allocation
page read and write
1FD05BAE000
trusted library allocation
page read and write
1FD0F5B7000
trusted library allocation
page read and write
984000
heap
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD057D7000
trusted library allocation
page read and write
1FD0F591000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD7FD38000
trusted library allocation
page read and write
A4A3BFF000
stack
page read and write
1FD0DAB5000
trusted library allocation
page read and write
1FD05B92000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
23A8AB20000
heap
page read and write
1FD0DBB1000
trusted library allocation
page read and write
1FD0E3DB000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD06A4C000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD07E08000
trusted library allocation
page read and write
1FD0545A000
trusted library allocation
page read and write
1FD0798F000
trusted library allocation
page read and write
1FD07098000
trusted library allocation
page read and write
1ED60DBD000
heap
page read and write
1FD06A77000
trusted library allocation
page read and write
1FD0DDB1000
trusted library allocation
page read and write
1FD0669E000
trusted library allocation
page read and write
1FD0F5DB000
trusted library allocation
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD06C92000
trusted library allocation
page read and write
1FD0E3D9000
trusted library allocation
page read and write
1FD0E3F5000
trusted library allocation
page read and write
1FD0E15B000
trusted library allocation
page read and write
1FD0549D000
trusted library allocation
page read and write
1FD7FD58000
trusted library allocation
page read and write
2E1DC11E000
trusted library allocation
page read and write
AC2000
unkown
page readonly
1FD066F5000
trusted library allocation
page read and write
1FD7C49F000
heap
page read and write
1FD1169B000
trusted library allocation
page read and write
1FD06A13000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD7C47E000
heap
page read and write
1ED6021F000
unclassified section
page read and write
1FD7C486000
heap
page read and write
1FD06C86000
trusted library allocation
page read and write
1FD05ADC000
trusted library allocation
page read and write
1FD071FC000
trusted library allocation
page read and write
1FD7FB64000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD0E0CD000
trusted library allocation
page read and write
1FD0549D000
trusted library allocation
page read and write
1FD7FE19000
trusted library allocation
page read and write
1FD06C26000
trusted library allocation
page read and write
1FD0F433000
trusted library allocation
page read and write
1FD07185000
trusted library allocation
page read and write
482E6FE000
stack
page read and write
1FD7FEC7000
trusted library allocation
page read and write
1FD0F59D000
trusted library allocation
page read and write
1FD0E14D000
trusted library allocation
page read and write
1ED60E31000
heap
page read and write
1FD08E59000
trusted library allocation
page read and write
1FD0E1E6000
trusted library allocation
page read and write
1FD02BF6000
trusted library allocation
page read and write
1FD7E5CA000
trusted library allocation
page read and write
1FD066F5000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0F5C5000
trusted library allocation
page read and write
1FD06C20000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD06986000
trusted library allocation
page read and write
1FD104A1000
trusted library allocation
page read and write
1FD068B0000
trusted library allocation
page read and write
1FD0DFD2000
trusted library allocation
page read and write
1FD7C499000
heap
page read and write
1FD7FDAB000
trusted library allocation
page read and write
1FD0F425000
trusted library allocation
page read and write
2512A400000
trusted library allocation
page read and write
1B391794000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD0DC79000
trusted library allocation
page read and write
984000
heap
page read and write
1FD05473000
trusted library allocation
page read and write
1FD06C9F000
trusted library allocation
page read and write
1FD068EB000
trusted library allocation
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD7C424000
heap
page read and write
1FD0F373000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1ED60E20000
heap
page read and write
1FD0665A000
trusted library allocation
page read and write
1FD05B9F000
trusted library allocation
page read and write
1FD08BFB000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD7C48C000
heap
page read and write
1FD0E3E6000
trusted library allocation
page read and write
1FD1043A000
trusted library allocation
page read and write
1FD0E14D000
trusted library allocation
page read and write
1FD0E1E0000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD06C47000
trusted library allocation
page read and write
1FD0E1E0000
trusted library allocation
page read and write
1FD07943000
trusted library allocation
page read and write
1B391763000
trusted library allocation
page read and write
1FD05B3A000
trusted library allocation
page read and write
1FD06C92000
trusted library allocation
page read and write
1FD057D7000
trusted library allocation
page read and write
1FD7C48E000
heap
page read and write
1FD054C2000
trusted library allocation
page read and write
1FD068A6000
trusted library allocation
page read and write
1FD06AEB000
trusted library allocation
page read and write
1FD7FD11000
trusted library allocation
page read and write
1FD0F575000
trusted library allocation
page read and write
1FD0D9CD000
trusted library allocation
page read and write
1FD7C41E000
heap
page read and write
1FD0DDDB000
trusted library allocation
page read and write
1FD06C57000
trusted library allocation
page read and write
1FD0F5D3000
trusted library allocation
page read and write
1FD7FE9D000
trusted library allocation
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD054BD000
trusted library allocation
page read and write
1FD08ED9000
trusted library allocation
page read and write
1FD0F4E6000
trusted library allocation
page read and write
1FD06932000
trusted library allocation
page read and write
1FD05375000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1FD0F29F000
trusted library allocation
page read and write
1FD06AEC000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1FD0DA16000
trusted library allocation
page read and write
A775BFE000
unkown
page readonly
1FD06A4F000
trusted library allocation
page read and write
2E1DC124000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1FD7E5B3000
trusted library allocation
page read and write
1B3917B8000
trusted library allocation
page read and write
1FD066A3000
trusted library allocation
page read and write
1FD06C27000
trusted library allocation
page read and write
1FD11D4C000
trusted library allocation
page read and write
1FD0F360000
trusted library allocation
page read and write
1ED6017A000
trusted library allocation
page read and write
1FD08B31000
trusted library allocation
page read and write
1FD07AE7000
trusted library allocation
page read and write
1FD06ABA000
trusted library allocation
page read and write
1FD06A78000
trusted library allocation
page read and write
1ED60DA9000
heap
page read and write
2256918F000
trusted library allocation
page read and write
1FD0EF83000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0D9DD000
trusted library allocation
page read and write
1FD7FDD5000
trusted library allocation
page read and write
984000
heap
page read and write
482EEFE000
unkown
page readonly
1FD0543F000
trusted library allocation
page read and write
972703E000
stack
page read and write
1FD7C486000
heap
page read and write
1FD0523D000
trusted library allocation
page read and write
A778FBE000
stack
page read and write
1FD0E1E6000
trusted library allocation
page read and write
1FD057F7000
trusted library allocation
page read and write
1FD06C74000
trusted library allocation
page read and write
1FD05B95000
trusted library allocation
page read and write
1FD08EAD000
trusted library allocation
page read and write
23A89207000
trusted library allocation
page read and write
1FD0F5D3000
trusted library allocation
page read and write
1FD0EFE6000
trusted library allocation
page read and write
1FD7FC91000
trusted library allocation
page read and write
1FD0E05F000
trusted library allocation
page read and write
1FD06C27000
trusted library allocation
page read and write
1FD0DF5E000
trusted library allocation
page read and write
1FD06AF6000
trusted library allocation
page read and write
1FD1088C000
trusted library allocation
page read and write
1FD079D1000
trusted library allocation
page read and write
22568E80000
heap
page read and write
1FD0D993000
trusted library allocation
page read and write
1FD0FBE0000
trusted library allocation
page read and write
1FD0DC63000
trusted library allocation
page read and write
1FD068AF000
trusted library allocation
page read and write
1FD06C26000
trusted library allocation
page read and write
1FD05BAE000
trusted library allocation
page read and write
1FD054B9000
trusted library allocation
page read and write
1FD7FD6B000
trusted library allocation
page read and write
1ED5FDB0000
unclassified section
page readonly
1FD0E0C7000
trusted library allocation
page read and write
1FD07EDC000
trusted library allocation
page read and write
1FD7C49F000
heap
page read and write
1FD108FB000
trusted library allocation
page read and write
1FD7FD2E000
trusted library allocation
page read and write
1FD7C477000
heap
page read and write
1FD7C425000
heap
page read and write
1B391800000
unclassified section
page readonly
1FD0F28F000
trusted library allocation
page read and write
1FD7FEAA000
trusted library allocation
page read and write
1FD08B7D000
trusted library allocation
page read and write
1FD05BAE000
trusted library allocation
page read and write
984000
heap
page read and write
1FD7E6E0000
trusted library allocation
page read and write
1FD08EF1000
trusted library allocation
page read and write
1FD10836000
trusted library allocation
page read and write
1FD116ED000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD091BA000
trusted library allocation
page read and write
90E000
stack
page read and write
1ED60E2C000
heap
page read and write
1FD0EFFC000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD074F8000
trusted library allocation
page read and write
1FD07180000
trusted library allocation
page read and write
1FD054AA000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1ED60DA0000
heap
page read and write
1FD0F581000
trusted library allocation
page read and write
1FD7FDFA000
trusted library allocation
page read and write
1FD11D73000
trusted library allocation
page read and write
1FD06A72000
trusted library allocation
page read and write
1FD7FF25000
trusted library allocation
page read and write
1ED60E29000
heap
page read and write
1FD7FCCA000
trusted library allocation
page read and write
1FD054B8000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD0F46C000
trusted library allocation
page read and write
1FD1048A000
trusted library allocation
page read and write
1FD7FDCE000
trusted library allocation
page read and write
1FD06C0B000
trusted library allocation
page read and write
1FD7FD6B000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD0667E000
trusted library allocation
page read and write
1FD05B94000
trusted library allocation
page read and write
1FD108AA000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1FD066F5000
trusted library allocation
page read and write
1FD068EB000
trusted library allocation
page read and write
1FD07E81000
trusted library allocation
page read and write
1FD0DD77000
trusted library allocation
page read and write
1FD7C420000
heap
page read and write
1FD066A5000
trusted library allocation
page read and write
1FD7FDA2000
trusted library allocation
page read and write
1FD05DE4000
trusted library allocation
page read and write
1FD0F589000
trusted library allocation
page read and write
1FD08B37000
trusted library allocation
page read and write
1FD7FE97000
trusted library allocation
page read and write
1FD1083D000
trusted library allocation
page read and write
23A89375000
heap
page read and write
1FD02D72000
heap
page read and write
1FD0F5B9000
trusted library allocation
page read and write
1ED60E2C000
heap
page read and write
1FD092E1000
trusted library allocation
page read and write
1FD06C9F000
trusted library allocation
page read and write
1FD068DB000
trusted library allocation
page read and write
1FD05B3F000
trusted library allocation
page read and write
1FD05B94000
trusted library allocation
page read and write
1FD7C41E000
heap
page read and write
1FD068D6000
trusted library allocation
page read and write
1FD0F352000
trusted library allocation
page read and write
1B391D40000
heap
page read and write
1FD068FB000
trusted library allocation
page read and write
1FD05280000
trusted library allocation
page read and write
1FD07E5F000
trusted library allocation
page read and write
1FD09181000
heap
page read and write
1FD06CF5000
trusted library allocation
page read and write
1FD0664B000
trusted library allocation
page read and write
1FD0E0E5000
trusted library allocation
page read and write
1FD06C99000
trusted library allocation
page read and write
1FD068B0000
trusted library allocation
page read and write
1FD11A04000
trusted library allocation
page read and write
1FD0DD51000
trusted library allocation
page read and write
1FD106EF000
trusted library allocation
page read and write
1FD0F46C000
trusted library allocation
page read and write
1FD05B92000
trusted library allocation
page read and write
1FD06863000
trusted library allocation
page read and write
1FD06AF8000
trusted library allocation
page read and write
1FD7FEAC000
trusted library allocation
page read and write
1FD7C41F000
heap
page read and write
1ED60DE1000
heap
page read and write
1FD7EFC6000
trusted library allocation
page read and write
1FD0E328000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD06AB5000
trusted library allocation
page read and write
1FD0F331000
trusted library allocation
page read and write
1FD108FD000
trusted library allocation
page read and write
1FD0F4FC000
trusted library allocation
page read and write
1FD066DF000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD06AD2000
trusted library allocation
page read and write
1FD07998000
trusted library allocation
page read and write
1FD7C495000
heap
page read and write
1ED60E28000
heap
page read and write
1FD7C42A000
heap
page read and write
1FD7ECE3000
trusted library allocation
page read and write
AC2000
unkown
page readonly
1FD0FB88000
trusted library allocation
page read and write
1B391463000
heap
page read and write
1FD05359000
trusted library allocation
page read and write
1FD02DA8000
heap
page read and write
1FD069D1000
trusted library allocation
page read and write
F96000
heap
page read and write
1FD0F5CD000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD05757000
trusted library allocation
page read and write
EAE000
stack
page read and write
1FD0E33A000
trusted library allocation
page read and write
1FD7C485000
heap
page read and write
1FD7C415000
heap
page read and write
1FD02DA6000
heap
page read and write
1FD0F4FC000
trusted library allocation
page read and write
1FD0DC33000
trusted library allocation
page read and write
1FD0F5ED000
trusted library allocation
page read and write
1FD05209000
trusted library allocation
page read and write
1ED60212000
unclassified section
page read and write
1FD7FE43000
trusted library allocation
page read and write
23A88F00000
heap
page read and write
1FD0FBE2000
trusted library allocation
page read and write
22569113000
trusted library allocation
page read and write
1FD08EB1000
trusted library allocation
page read and write
A777E78000
stack
page read and write
1ED60E2C000
heap
page read and write
1FD0705D000
trusted library allocation
page read and write
1FD108FB000
trusted library allocation
page read and write
1FD057C5000
trusted library allocation
page read and write
1FD7C41F000
heap
page read and write
1FD05AB7000
trusted library allocation
page read and write
1FD7FCCE000
trusted library allocation
page read and write
1FD05384000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0E032000
trusted library allocation
page read and write
225691DB000
trusted library allocation
page read and write
1FD7C42A000
heap
page read and write
1FD066EF000
trusted library allocation
page read and write
1FD06A98000
trusted library allocation
page read and write
1FD06CBD000
trusted library allocation
page read and write
1FD7C491000
heap
page read and write
1FD7C496000
heap
page read and write
1FD054CD000
trusted library allocation
page read and write
1FD05A23000
trusted library allocation
page read and write
1FD10890000
trusted library allocation
page read and write
1FD05488000
trusted library allocation
page read and write
1FD08BEB000
trusted library allocation
page read and write
1FD08E14000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD070D0000
trusted library allocation
page read and write
1FD0703C000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0EFF0000
trusted library allocation
page read and write
1B39190F000
trusted library allocation
page read and write
1FD07842000
trusted library allocation
page read and write
1FD069AE000
trusted library allocation
page read and write
1FD068B6000
trusted library allocation
page read and write
1FD0DF0C000
trusted library allocation
page read and write
1ED60D40000
heap
page read and write
1FD0F45B000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0F5CD000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1ED60100000
trusted library allocation
page read and write
1FD10818000
trusted library allocation
page read and write
1FD0DCB5000
trusted library allocation
page read and write
1FD05AE1000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD7FE79000
trusted library allocation
page read and write
1FD0DF9D000
trusted library allocation
page read and write
1FD08BA3000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD05298000
trusted library allocation
page read and write
1FD0F361000
trusted library allocation
page read and write
1FD0F5CD000
trusted library allocation
page read and write
1FD1169B000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1FD7FE10000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7FDC7000
trusted library allocation
page read and write
1FD0547F000
trusted library allocation
page read and write
1FD054AF000
trusted library allocation
page read and write
1FD06C2F000
trusted library allocation
page read and write
1FD7FDB2000
trusted library allocation
page read and write
2512A3C0000
heap
page read and write
1FD06C2B000
trusted library allocation
page read and write
1FD07968000
trusted library allocation
page read and write
1FD08BF3000
trusted library allocation
page read and write
1FD0916C000
heap
page read and write
1FD0E18C000
trusted library allocation
page read and write
1FD0F58F000
trusted library allocation
page read and write
1FD7FDAB000
trusted library allocation
page read and write
1FD066EF000
trusted library allocation
page read and write
1FD0DBD8000
trusted library allocation
page read and write
23A88F52000
heap
page read and write
1ED60E84000
heap
page read and write
1FD7C424000
heap
page read and write
1FD08B9B000
trusted library allocation
page read and write
1FD0DAEF000
trusted library allocation
page read and write
1FD7FE9D000
trusted library allocation
page read and write
1FD07E5B000
trusted library allocation
page read and write
1FD068CC000
trusted library allocation
page read and write
1FD0EFCB000
trusted library allocation
page read and write
1FD7FE2C000
trusted library allocation
page read and write
1FD02BF6000
trusted library allocation
page read and write
1FD054A6000
trusted library allocation
page read and write
1FD071C3000
trusted library allocation
page read and write
1FD0F348000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD1088C000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD08EE1000
trusted library allocation
page read and write
1FD10479000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD0711E000
trusted library allocation
page read and write
1FD07182000
trusted library allocation
page read and write
1FD05A83000
trusted library allocation
page read and write
1FD071B6000
trusted library allocation
page read and write
1FD0EFB4000
trusted library allocation
page read and write
1FD0DADF000
trusted library allocation
page read and write
1FD7C41F000
heap
page read and write
1B391781000
trusted library allocation
page read and write
1FD06ADA000
trusted library allocation
page read and write
1FD06BA3000
trusted library allocation
page read and write
1FD7EF54000
trusted library allocation
page read and write
1FD07D56000
trusted library allocation
page read and write
22568E60000
heap
page readonly
1FD053D6000
trusted library allocation
page read and write
1FD0DDCE000
trusted library allocation
page read and write
1ED602A0000
unkown
page execute read
1FD09266000
trusted library allocation
page read and write
1FD0DD20000
trusted library allocation
page read and write
1FD0538B000
trusted library allocation
page read and write
1FD7FD55000
trusted library allocation
page read and write
1FD052F5000
trusted library allocation
page read and write
1FD7FC5D000
trusted library allocation
page read and write
1FD05F54000
trusted library allocation
page read and write
1FD054C2000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD068BC000
trusted library allocation
page read and write
1FD7C495000
heap
page read and write
1FD06CDA000
trusted library allocation
page read and write
1FD0683B000
trusted library allocation
page read and write
1FD0E192000
trusted library allocation
page read and write
1FD7FC6A000
trusted library allocation
page read and write
1ED60210000
unclassified section
page read and write
1FD0693E000
trusted library allocation
page read and write
1FD0F393000
trusted library allocation
page read and write
1FD08B83000
trusted library allocation
page read and write
1FD05B36000
trusted library allocation
page read and write
1FD10900000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD0E3C5000
trusted library allocation
page read and write
A4A43FF000
stack
page read and write
1FD7C454000
heap
page read and write
1FD7C416000
heap
page read and write
1FD06A13000
trusted library allocation
page read and write
1FD7FB53000
trusted library allocation
page read and write
1FD0DC49000
trusted library allocation
page read and write
1FD7EF85000
trusted library allocation
page read and write
1FD0F24F000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD08B93000
trusted library allocation
page read and write
1FD06A82000
trusted library allocation
page read and write
1FD0DABC000
trusted library allocation
page read and write
1FD7FEDD000
trusted library allocation
page read and write
1FD0F279000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD07076000
trusted library allocation
page read and write
1FD08BA6000
trusted library allocation
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD1081E000
trusted library allocation
page read and write
1FD08E0F000
trusted library allocation
page read and write
1FD07DC1000
trusted library allocation
page read and write
1FD0DD6F000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD08E78000
trusted library allocation
page read and write
1FD0522C000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD1168D000
trusted library allocation
page read and write
1FD068F9000
trusted library allocation
page read and write
1FD0F36D000
trusted library allocation
page read and write
1FD07491000
trusted library allocation
page read and write
1FD06A4F000
trusted library allocation
page read and write
1FD0E311000
trusted library allocation
page read and write
1FD068C5000
trusted library allocation
page read and write
1FD06CF6000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD0579D000
trusted library allocation
page read and write
1FD0F5E2000
trusted library allocation
page read and write
1FD0E0EE000
trusted library allocation
page read and write
1FD06C57000
trusted library allocation
page read and write
1FD0F3A0000
trusted library allocation
page read and write
1FD07E3E000
trusted library allocation
page read and write
1FD0DA95000
trusted library allocation
page read and write
23A88F63000
heap
page read and write
1FD0F5BC000
trusted library allocation
page read and write
1FD06823000
trusted library allocation
page read and write
1FD08E28000
trusted library allocation
page read and write
22568EE6000
heap
page read and write
1FD08EAB000
trusted library allocation
page read and write
1FD0F5BF000
trusted library allocation
page read and write
1FD0F5C7000
trusted library allocation
page read and write
1FD0F4DD000
trusted library allocation
page read and write
1FD06C0F000
trusted library allocation
page read and write
1FD0546B000
trusted library allocation
page read and write
1FD7FE6C000
trusted library allocation
page read and write
1FD0EFA3000
trusted library allocation
page read and write
1FD054BD000
trusted library allocation
page read and write
2512A2F0000
heap
page read and write
1FD7C436000
heap
page read and write
1FD0DBB8000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD05263000
trusted library allocation
page read and write
1ED602A8000
unkown
page execute read
1FD0F3F5000
trusted library allocation
page read and write
1FD7FE63000
trusted library allocation
page read and write
A4A53FF000
stack
page read and write
1FD7FB3A000
trusted library allocation
page read and write
1FD05A9F000
trusted library allocation
page read and write
1B39176A000
trusted library allocation
page read and write
1FD06685000
trusted library allocation
page read and write
1FD06AEB000
trusted library allocation
page read and write
1FD06AB9000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD05DE4000
trusted library allocation
page read and write
1FD09304000
trusted library allocation
page read and write
1B391939000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0D98F000
trusted library allocation
page read and write
1FD05496000
trusted library allocation
page read and write
1FD0D929000
trusted library allocation
page read and write
1FD7FD46000
trusted library allocation
page read and write
1FD116D5000
trusted library allocation
page read and write
F7B000
heap
page read and write
1FD0F4F1000
trusted library allocation
page read and write
1FD0DABC000
trusted library allocation
page read and write
1FD7FC7E000
trusted library allocation
page read and write
1FD057AE000
trusted library allocation
page read and write
1FD0F38F000
trusted library allocation
page read and write
1FD06088000
trusted library allocation
page read and write
1FD06C47000
trusted library allocation
page read and write
1FD116E7000
trusted library allocation
page read and write
1FD08BFB000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD07BFC000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD08CD0000
trusted library allocation
page read and write
1FD0FBE4000
trusted library allocation
page read and write
1FD0914E000
heap
page read and write
1FD07D20000
trusted library allocation
page read and write
1FD0785D000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD0666F000
trusted library allocation
page read and write
1FD7FD60000
trusted library allocation
page read and write
1B39177D000
trusted library allocation
page read and write
1FD7FEC1000
trusted library allocation
page read and write
1FD0F57B000
trusted library allocation
page read and write
1ED602B0000
heap
page read and write
1FD0DD5E000
trusted library allocation
page read and write
1FD06A95000
trusted library allocation
page read and write
1FD07EBD000
trusted library allocation
page read and write
1FD06075000
trusted library allocation
page read and write
1FD06C26000
trusted library allocation
page read and write
1FD06696000
trusted library allocation
page read and write
1FD0DDDF000
trusted library allocation
page read and write
1FD116FB000
trusted library allocation
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD0E192000
trusted library allocation
page read and write
1FD07136000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1ED60260000
trusted library allocation
page read and write
1FD05286000
trusted library allocation
page read and write
1FD05BE6000
trusted library allocation
page read and write
1FD07ADB000
trusted library allocation
page read and write
1FD7EFBF000
trusted library allocation
page read and write
72355FC000
stack
page read and write
1FD7E6F1000
trusted library allocation
page read and write
1FD10492000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD0668E000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD05B5D000
trusted library allocation
page read and write
1ED601C1000
trusted library allocation
page read and write
1FD0F360000
trusted library allocation
page read and write
1FD05BF6000
trusted library allocation
page read and write
1FD06AFE000
trusted library allocation
page read and write
1FD05BFA000
trusted library allocation
page read and write
972347B000
stack
page read and write
1FD069AA000
trusted library allocation
page read and write
1FD06CB0000
trusted library allocation
page read and write
1FD10F00000
trusted library allocation
page read and write
2256910E000
trusted library allocation
page read and write
173E000
stack
page read and write
1FD07EC2000
trusted library allocation
page read and write
1FD0719A000
trusted library allocation
page read and write
1FD06A5F000
trusted library allocation
page read and write
1FD06C79000
trusted library allocation
page read and write
1FD0F48F000
trusted library allocation
page read and write
1FD7FDC7000
trusted library allocation
page read and write
1FD07DF5000
trusted library allocation
page read and write
1FD0E142000
trusted library allocation
page read and write
1FD1089B000
trusted library allocation
page read and write
1FD06A8B000
trusted library allocation
page read and write
1FD06AD6000
trusted library allocation
page read and write
1FD0661A000
trusted library allocation
page read and write
984000
heap
page read and write
1FD7FDDD000
trusted library allocation
page read and write
1FD0D97D000
trusted library allocation
page read and write
1ED60E2C000
heap
page read and write
1FD7C40E000
heap
page read and write
1FD7C424000
heap
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD071FC000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD7FDFD000
trusted library allocation
page read and write
A778EFE000
unkown
page readonly
1FD0E18C000
trusted library allocation
page read and write
1FD06962000
trusted library allocation
page read and write
1FD0E3F1000
trusted library allocation
page read and write
1FD7FCDC000
trusted library allocation
page read and write
1FD07AF2000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD0D9CD000
trusted library allocation
page read and write
1FD07D43000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD0F3D1000
trusted library allocation
page read and write
A01000
unkown
page execute read
1ED60830000
trusted library allocation
page read and write
1FD11DF5000
trusted library allocation
page read and write
1FD7C46D000
heap
page read and write
1FD0F3B4000
trusted library allocation
page read and write
1FD06913000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD0DF9D000
trusted library allocation
page read and write
1FD0718C000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD7C414000
heap
page read and write
1FD7E6F1000
trusted library allocation
page read and write
1FD0E0B8000
trusted library allocation
page read and write
1FD08EA9000
trusted library allocation
page read and write
1FD0EFCF000
trusted library allocation
page read and write
1FD054FE000
trusted library allocation
page read and write
1FD07179000
trusted library allocation
page read and write
1FD054FE000
trusted library allocation
page read and write
1FD0D9CD000
trusted library allocation
page read and write
1FD057C5000
trusted library allocation
page read and write
1FD07DCF000
trusted library allocation
page read and write
1FD07EA0000
trusted library allocation
page read and write
1FD0EFA7000
trusted library allocation
page read and write
1ED60909000
trusted library allocation
page read and write
1FD02B61000
trusted library allocation
page read and write
A777E7B000
stack
page read and write
1FD066CB000
trusted library allocation
page read and write
1FD11DF9000
trusted library allocation
page read and write
F7C000
heap
page read and write
1FD0525F000
trusted library allocation
page read and write
ACC000
unkown
page read and write
1FD0719A000
trusted library allocation
page read and write
1FD08EF7000
trusted library allocation
page read and write
1FD0E0E2000
trusted library allocation
page read and write
1FD7C425000
heap
page read and write
1FD0F3DD000
trusted library allocation
page read and write
1FD0DDFE000
trusted library allocation
page read and write
1FD0DB29000
trusted library allocation
page read and write
1FD08B96000
trusted library allocation
page read and write
1B391360000
unclassified section
page readonly
1FD7FD49000
trusted library allocation
page read and write
1FD07E56000
trusted library allocation
page read and write
1FD7FE41000
trusted library allocation
page read and write
1FD0527E000
trusted library allocation
page read and write
1FD7C486000
heap
page read and write
1FD06AF8000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD0686B000
trusted library allocation
page read and write
1FD10809000
trusted library allocation
page read and write
1FD7ED00000
trusted library allocation
page read and write
1ED5FE30000
unclassified section
page readonly
1FD7E58B000
trusted library allocation
page read and write
1FD0DD1B000
trusted library allocation
page read and write
1ED601C7000
trusted library allocation
page read and write
1FD7FB68000
trusted library allocation
page read and write
AD0000
unkown
page write copy
1FD06C8D000
trusted library allocation
page read and write
1FD0F5AA000
trusted library allocation
page read and write
1ED5FE50000
heap
page read and write
1FD7C458000
heap
page read and write
1FD0538D000
trusted library allocation
page read and write
1FD0F435000
trusted library allocation
page read and write
1FD04F51000
trusted library allocation
page read and write
1FD05B82000
trusted library allocation
page read and write
1FD0F587000
trusted library allocation
page read and write
1FD7FE93000
trusted library allocation
page read and write
1FD08E77000
trusted library allocation
page read and write
1FD0F5D3000
trusted library allocation
page read and write
1FD0DBD5000
trusted library allocation
page read and write
1FD09181000
heap
page read and write
1FD7E656000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD08EB7000
trusted library allocation
page read and write
1FD7FB53000
trusted library allocation
page read and write
1FD091C8000
heap
page read and write
1FD0E195000
trusted library allocation
page read and write
1FD0F5B7000
trusted library allocation
page read and write
1FD08EA9000
trusted library allocation
page read and write
1FD054BD000
trusted library allocation
page read and write
23A88F30000
heap
page read and write
1FD0547B000
trusted library allocation
page read and write
1FD0DDB4000
trusted library allocation
page read and write
1FD07DEB000
trusted library allocation
page read and write
1B3915D0000
unclassified section
page read and write
1FD7C490000
heap
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD7FD51000
trusted library allocation
page read and write
1FD0DB80000
trusted library allocation
page read and write
1FD057EE000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD116CA000
trusted library allocation
page read and write
1FD0F5CB000
trusted library allocation
page read and write
1ED60DA9000
heap
page read and write
1FD08EE1000
trusted library allocation
page read and write
1FD7FB31000
trusted library allocation
page read and write
1FD0DC47000
trusted library allocation
page read and write
1FD0F3F5000
trusted library allocation
page read and write
1FD09327000
trusted library allocation
page read and write
1FD068B6000
trusted library allocation
page read and write
1FD106F9000
trusted library allocation
page read and write
1FD7C4A9000
heap
page read and write
1FD0E320000
trusted library allocation
page read and write
1FD7FB62000
trusted library allocation
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD106F9000
trusted library allocation
page read and write
1FD0F450000
trusted library allocation
page read and write
1FD091C1000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD7FB50000
trusted library allocation
page read and write
1FD0DF6A000
trusted library allocation
page read and write
1FD08B13000
trusted library allocation
page read and write
F69000
heap
page read and write
1FD7C416000
heap
page read and write
1FD07054000
trusted library allocation
page read and write
1FD0574C000
trusted library allocation
page read and write
1FD7EB76000
trusted library allocation
page read and write
1FD05B64000
trusted library allocation
page read and write
1FD06CBD000
trusted library allocation
page read and write
1FD0DFAD000
trusted library allocation
page read and write
1FD06926000
trusted library allocation
page read and write
1FD7C498000
heap
page read and write
1FD7E656000
trusted library allocation
page read and write
1FD7C485000
heap
page read and write
1FD0E19F000
trusted library allocation
page read and write
1FD116CA000
trusted library allocation
page read and write
1FD0DBD3000
trusted library allocation
page read and write
A7786FE000
stack
page read and write
1FD0F562000
trusted library allocation
page read and write
1FD7FDFA000
trusted library allocation
page read and write
1FD0DD3B000
trusted library allocation
page read and write
1FD0DC7E000
trusted library allocation
page read and write
1FD0D9E1000
trusted library allocation
page read and write
1FD0D9A5000
trusted library allocation
page read and write
ECB000
stack
page read and write
1FD7C415000
heap
page read and write
1FD0DC63000
trusted library allocation
page read and write
1FD07035000
trusted library allocation
page read and write
1FD0529E000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD0F33C000
trusted library allocation
page read and write
7235DFE000
stack
page read and write
1ED60E21000
heap
page read and write
23A8AB2C000
heap
page read and write
984000
heap
page read and write
1FD06CB5000
trusted library allocation
page read and write
1FD071B8000
trusted library allocation
page read and write
1FD0DD1D000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
A777EFE000
unkown
page readonly
1FD05760000
trusted library allocation
page read and write
1FD069AA000
trusted library allocation
page read and write
F6F000
heap
page read and write
1FD0DF8D000
trusted library allocation
page read and write
1FD0E1FE000
trusted library allocation
page read and write
1FD7E59E000
trusted library allocation
page read and write
1ED60EB9000
heap
page read and write
1FD0F4E3000
trusted library allocation
page read and write
1FD05BAE000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD068D0000
trusted library allocation
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD7FDA2000
trusted library allocation
page read and write
1FD06AB9000
trusted library allocation
page read and write
1FD0E3E9000
trusted library allocation
page read and write
1FD0E1BE000
trusted library allocation
page read and write
1FD7FCAE000
trusted library allocation
page read and write
1FD06C17000
trusted library allocation
page read and write
1FD066FE000
trusted library allocation
page read and write
1FD06AC3000
trusted library allocation
page read and write
1FD7C496000
heap
page read and write
1FD7FB67000
trusted library allocation
page read and write
1FD05213000
trusted library allocation
page read and write
1FD7FEA6000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD02DA0000
heap
page read and write
1FD116B9000
trusted library allocation
page read and write
1FD0F377000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD7C425000
heap
page read and write
1FD0693E000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD02B21000
trusted library allocation
page read and write
1FD7E668000
trusted library allocation
page read and write
1FD07981000
trusted library allocation
page read and write
1FD0DDD2000
trusted library allocation
page read and write
1FD0DC49000
trusted library allocation
page read and write
1FD06AB1000
trusted library allocation
page read and write
1FD08E42000
trusted library allocation
page read and write
1FD0F3B4000
trusted library allocation
page read and write
1FD0EFA9000
trusted library allocation
page read and write
1FD0527A000
trusted library allocation
page read and write
1FD116E5000
trusted library allocation
page read and write
1FD0F37B000
trusted library allocation
page read and write
1FD0E065000
trusted library allocation
page read and write
1FD08EFA000
trusted library allocation
page read and write
1FD06C86000
trusted library allocation
page read and write
1FD06A9D000
trusted library allocation
page read and write
1FD11D42000
trusted library allocation
page read and write
1FD092CA000
trusted library allocation
page read and write
22568EA0000
unclassified section
page readonly
1FD07ABD000
trusted library allocation
page read and write
1FD7C4A9000
heap
page read and write
1FD0F23A000
trusted library allocation
page read and write
1FD7FCE5000
trusted library allocation
page read and write
984000
heap
page read and write
1FD7C455000
heap
page read and write
1FD0D9A5000
trusted library allocation
page read and write
1FD09145000
heap
page read and write
34D0000
heap
page read and write
1FD0DC3B000
trusted library allocation
page read and write
1FD104C0000
trusted library allocation
page read and write
1FD0F5B5000
trusted library allocation
page read and write
1ED5FF4A000
heap
page read and write
1FD0DFE9000
trusted library allocation
page read and write
1FD05BEA000
trusted library allocation
page read and write
1FD0F59D000
trusted library allocation
page read and write
1FD10814000
trusted library allocation
page read and write
1FD06AFC000
trusted library allocation
page read and write
1FD06964000
trusted library allocation
page read and write
1FD0F4A3000
trusted library allocation
page read and write
1FD02D96000
heap
page read and write
1FD7FDED000
trusted library allocation
page read and write
1FD066A0000
trusted library allocation
page read and write
1FD0F37F000
trusted library allocation
page read and write
1FD0F5BB000
trusted library allocation
page read and write
1FD07ADB000
trusted library allocation
page read and write
1FD0F571000
trusted library allocation
page read and write
1FD7C458000
heap
page read and write
1FD05AF8000
trusted library allocation
page read and write
1FD0DAB2000
trusted library allocation
page read and write
72355FF000
stack
page read and write
1FD0F581000
trusted library allocation
page read and write
1ED60E60000
heap
page read and write
1FD069E4000
trusted library allocation
page read and write
1FD7C413000
heap
page read and write
1FD7FC6F000
trusted library allocation
page read and write
1FD0578F000
trusted library allocation
page read and write
1FD06CD3000
trusted library allocation
page read and write
1FD0D985000
trusted library allocation
page read and write
1FD7FC71000
trusted library allocation
page read and write
1FD05378000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD05AD3000
trusted library allocation
page read and write
1FD10492000
trusted library allocation
page read and write
1FD06524000
trusted library allocation
page read and write
1FD0F4F2000
trusted library allocation
page read and write
1FD0E3DB000
trusted library allocation
page read and write
F99000
heap
page read and write
1FD0F332000
trusted library allocation
page read and write
1FD7E66D000
trusted library allocation
page read and write
1B391779000
trusted library allocation
page read and write
22569111000
trusted library allocation
page read and write
1FD0794A000
trusted library allocation
page read and write
1FD11D42000
trusted library allocation
page read and write
1FD06C57000
trusted library allocation
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1FD0E067000
trusted library allocation
page read and write
1ED60DA0000
heap
page read and write
1FD08EAD000
trusted library allocation
page read and write
22569149000
trusted library allocation
page read and write
1FD07ADB000
trusted library allocation
page read and write
1FD0774A000
trusted library allocation
page read and write
1ED60000000
trusted library allocation
page read and write
1FD7E6E0000
trusted library allocation
page read and write
1FD0F444000
trusted library allocation
page read and write
34D4000
heap
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD0DDD0000
trusted library allocation
page read and write
1FD0F5E2000
trusted library allocation
page read and write
1ED60E26000
heap
page read and write
1FD7C41C000
heap
page read and write
1FD06BE8000
trusted library allocation
page read and write
1FD0DAB0000
trusted library allocation
page read and write
1FD0F361000
trusted library allocation
page read and write
1FD08B89000
trusted library allocation
page read and write
1FD069A7000
trusted library allocation
page read and write
1FD0707B000
trusted library allocation
page read and write
1FD09383000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD0F45F000
trusted library allocation
page read and write
1FD06CAD000
trusted library allocation
page read and write
1FD068E8000
trusted library allocation
page read and write
1FD054A8000
trusted library allocation
page read and write
1FD0F57D000
trusted library allocation
page read and write
1FD0D98F000
trusted library allocation
page read and write
1FD09324000
trusted library allocation
page read and write
1FD05BEB000
trusted library allocation
page read and write
1FD069BE000
trusted library allocation
page read and write
1FD7C4A9000
heap
page read and write
F8C000
heap
page read and write
1FD068D6000
trusted library allocation
page read and write
1FD08B22000
trusted library allocation
page read and write
1ED60EB7000
heap
page read and write
1FD7C424000
heap
page read and write
1FD7FE95000
trusted library allocation
page read and write
1FD079EF000
trusted library allocation
page read and write
1FD057DE000
trusted library allocation
page read and write
1FD068C3000
trusted library allocation
page read and write
1FD0695F000
trusted library allocation
page read and write
1FD7FDED000
trusted library allocation
page read and write
1FD0E0F3000
trusted library allocation
page read and write
1FD7C420000
heap
page read and write
1FD7C40E000
heap
page read and write
1FD10D02000
trusted library allocation
page read and write
1FD08ED9000
trusted library allocation
page read and write
1FD068E8000
trusted library allocation
page read and write
1FD7C46C000
heap
page read and write
1FD7C46C000
heap
page read and write
A778F3E000
stack
page read and write
1FD06C86000
trusted library allocation
page read and write
1FD02BFE000
trusted library allocation
page read and write
1ED60E6A000
heap
page read and write
1FD7C425000
heap
page read and write
1FD0F425000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD7EC26000
trusted library allocation
page read and write
1FD06A92000
trusted library allocation
page read and write
1FD07E64000
trusted library allocation
page read and write
1FD0DB7E000
trusted library allocation
page read and write
1FD7C438000
heap
page read and write
1FD02BF6000
trusted library allocation
page read and write
1FD0DC79000
trusted library allocation
page read and write
1FD07E4B000
trusted library allocation
page read and write
1FD0703E000
trusted library allocation
page read and write
1FD10840000
trusted library allocation
page read and write
1FD0711E000
trusted library allocation
page read and write
1FD1043A000
trusted library allocation
page read and write
1FD07E21000
trusted library allocation
page read and write
1ED60DDC000
heap
page read and write
1FD0DAB6000
trusted library allocation
page read and write
1FD0DD1D000
trusted library allocation
page read and write
37B909704000
trusted library allocation
page read and write
1FD7E598000
trusted library allocation
page read and write
1FD07AE5000
trusted library allocation
page read and write
1FD0DD23000
trusted library allocation
page read and write
1FD7FEF6000
trusted library allocation
page read and write
1FD0E091000
trusted library allocation
page read and write
1FD06A4C000
trusted library allocation
page read and write
1FD053A7000
trusted library allocation
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD0F48F000
trusted library allocation
page read and write
1FD7FD95000
trusted library allocation
page read and write
1FD06C7D000
trusted library allocation
page read and write
1FD07E2B000
trusted library allocation
page read and write
1B391932000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
482C5D8000
stack
page read and write
1FD11D73000
trusted library allocation
page read and write
22568CC0000
heap
page read and write
1FD0F269000
trusted library allocation
page read and write
1FD0F5C1000
trusted library allocation
page read and write
1FD0DABC000
trusted library allocation
page read and write
1ED60D9C000
heap
page read and write
1B39177B000
trusted library allocation
page read and write
1FD05265000
trusted library allocation
page read and write
1FD116CE000
trusted library allocation
page read and write
1FD066F5000
trusted library allocation
page read and write
1FD0F373000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD06828000
trusted library allocation
page read and write
97257FE000
unkown
page readonly
1FD7C40F000
heap
page read and write
1FD7C47E000
heap
page read and write
1FD0E3F1000
trusted library allocation
page read and write
1FD07119000
trusted library allocation
page read and write
1FD07AE5000
trusted library allocation
page read and write
1FD08DE5000
trusted library allocation
page read and write
1FD0FBC8000
trusted library allocation
page read and write
1FD05AF6000
trusted library allocation
page read and write
1FD05D67000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD06C8F000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD7E65B000
trusted library allocation
page read and write
1FD05F88000
trusted library allocation
page read and write
1FD0D97D000
trusted library allocation
page read and write
1FD0DD86000
trusted library allocation
page read and write
1FD7FEBE000
trusted library allocation
page read and write
1FD0DC68000
trusted library allocation
page read and write
1FD0E1F6000
trusted library allocation
page read and write
1FD7FE93000
trusted library allocation
page read and write
1FD05BAC000
trusted library allocation
page read and write
1FD0DFAC000
trusted library allocation
page read and write
482BBEE000
unkown
page readonly
1FD7C41D000
heap
page read and write
1FD0F5E7000
trusted library allocation
page read and write
1FD05BC0000
trusted library allocation
page read and write
1FD07E4D000
trusted library allocation
page read and write
1FD06A8B000
trusted library allocation
page read and write
1FD05BE8000
trusted library allocation
page read and write
70A8DB1000
trusted library allocation
page execute read
1FD0DFC8000
trusted library allocation
page read and write
1ED60148000
trusted library allocation
page read and write
1FD06C78000
trusted library allocation
page read and write
1ED60E84000
heap
page read and write
1ED60118000
trusted library allocation
page read and write
1FD02D72000
heap
page read and write
1FD104DA000
trusted library allocation
page read and write
1FD7FDFD000
trusted library allocation
page read and write
70A8E61000
trusted library allocation
page execute read
1FD11685000
trusted library allocation
page read and write
1FD0F5A8000
trusted library allocation
page read and write
1B391772000
trusted library allocation
page read and write
1ED60E7B000
heap
page read and write
1B391900000
trusted library allocation
page read and write
1FD0DC79000
trusted library allocation
page read and write
1FD08DEB000
trusted library allocation
page read and write
1FD0DFE1000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD06611000
trusted library allocation
page read and write
1FD7FE97000
trusted library allocation
page read and write
1FD069EC000
trusted library allocation
page read and write
1ED60E98000
heap
page read and write
1FD0528C000
trusted library allocation
page read and write
1FD0F5B9000
trusted library allocation
page read and write
1FD06962000
trusted library allocation
page read and write
1FD06C36000
trusted library allocation
page read and write
1B3913C0000
remote allocation
page read and write
1FD0D9AB000
trusted library allocation
page read and write
1FD078FB000
trusted library allocation
page read and write
1FD07981000
trusted library allocation
page read and write
1FD7EC8C000
trusted library allocation
page read and write
1FD7E588000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
1FD7FEA8000
trusted library allocation
page read and write
1ED60E23000
heap
page read and write
1ED5FF40000
heap
page read and write
1FD7E5DF000
trusted library allocation
page read and write
1FD05B61000
trusted library allocation
page read and write
1FD0DAC8000
trusted library allocation
page read and write
1FD05DF6000
trusted library allocation
page read and write
1FD0EFBC000
trusted library allocation
page read and write
1FD071FC000
trusted library allocation
page read and write
1FD07E18000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD07E0D000
trusted library allocation
page read and write
1FD08B0B000
trusted library allocation
page read and write
482DEBE000
stack
page read and write
1FD0E3E9000
trusted library allocation
page read and write
1FD7FC6F000
trusted library allocation
page read and write
1ED60290000
trusted library allocation
page read and write
1FD08B13000
trusted library allocation
page read and write
1FD06ADA000
trusted library allocation
page read and write
1FD7FCF1000
trusted library allocation
page read and write
1FD7FDA2000
trusted library allocation
page read and write
1ED60DA9000
heap
page read and write
1FD0DC68000
trusted library allocation
page read and write
1FD05220000
trusted library allocation
page read and write
1FD05B61000
trusted library allocation
page read and write
1FD069CD000
trusted library allocation
page read and write
1FD0E1E4000
trusted library allocation
page read and write
1FD0DA70000
trusted library allocation
page read and write
1FD0E308000
trusted library allocation
page read and write
1FD0D933000
trusted library allocation
page read and write
1FD06A95000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD068F3000
trusted library allocation
page read and write
1FD0E0CF000
trusted library allocation
page read and write
1B391400000
heap
page read and write
1FD0915E000
heap
page read and write
1FD106DB000
trusted library allocation
page read and write
1FD7FCEE000
trusted library allocation
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD0F5C3000
trusted library allocation
page read and write
1FD08EF1000
trusted library allocation
page read and write
1FD0F437000
trusted library allocation
page read and write
1FD06C86000
trusted library allocation
page read and write
1FD0F437000
trusted library allocation
page read and write
1FD054DE000
trusted library allocation
page read and write
1FD08BB3000
trusted library allocation
page read and write
1FD07D93000
trusted library allocation
page read and write
1FD0EFCF000
trusted library allocation
page read and write
A01000
unkown
page execute read
1FD069E1000
trusted library allocation
page read and write
1FD0DC10000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
1FD0F4A3000
trusted library allocation
page read and write
1FD06C1B000
trusted library allocation
page read and write
1FD06AC9000
trusted library allocation
page read and write
1FD7C410000
heap
page read and write
1FD05AE3000
trusted library allocation
page read and write
1FD0F444000
trusted library allocation
page read and write
1FD0E336000
trusted library allocation
page read and write
1FD7C427000
heap
page read and write
1FD0F3FB000
trusted library allocation
page read and write
1FD066CB000
trusted library allocation
page read and write
1FD7C45C000
heap
page read and write
1FD08EF1000
trusted library allocation
page read and write
1FD06AC7000
trusted library allocation
page read and write
1FD0693B000
trusted library allocation
page read and write
1FD08ED9000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD1069F000
trusted library allocation
page read and write
1ED60DA9000
heap
page read and write
1FD7C416000
heap
page read and write
23A890C0000
heap
page read and write
1FD7C455000
heap
page read and write
1FD0693B000
trusted library allocation
page read and write
1FD0DFD0000
trusted library allocation
page read and write
1FD0EFE0000
trusted library allocation
page read and write
1FD077A3000
trusted library allocation
page read and write
1B3915C0000
heap
page read and write
1FD7FEA6000
trusted library allocation
page read and write
1FD02DA0000
heap
page read and write
1FD068F9000
trusted library allocation
page read and write
1FD06AA2000
trusted library allocation
page read and write
22569115000
trusted library allocation
page read and write
1FD06837000
trusted library allocation
page read and write
1FD7C495000
heap
page read and write
1FD7FE69000
trusted library allocation
page read and write
1FD0549A000
trusted library allocation
page read and write
1FD08E78000
trusted library allocation
page read and write
1FD08EB7000
trusted library allocation
page read and write
1FD08BEB000
trusted library allocation
page read and write
1FD0F429000
trusted library allocation
page read and write
1B391761000
trusted library allocation
page read and write
23A89040000
heap
page read and write
1FD06C7D000
trusted library allocation
page read and write
1ED60E98000
heap
page read and write
1FD7EFB3000
trusted library allocation
page read and write
1FD106C4000
trusted library allocation
page read and write
F69000
heap
page read and write
1FD0524E000
trusted library allocation
page read and write
1FD08B2A000
trusted library allocation
page read and write
1FD0DCE4000
trusted library allocation
page read and write
1FD05DD1000
trusted library allocation
page read and write
1FD06CC9000
trusted library allocation
page read and write
1FD7FDED000
trusted library allocation
page read and write
1FD0FB86000
trusted library allocation
page read and write
1FD053A0000
trusted library allocation
page read and write
1FD7FDC3000
trusted library allocation
page read and write
1FD05321000
trusted library allocation
page read and write
1FD7C40E000
heap
page read and write
1FD7C461000
heap
page read and write
1FD11DF0000
trusted library allocation
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD07131000
trusted library allocation
page read and write
1FD02D8C000
heap
page read and write
1FD7C41F000
heap
page read and write
1FD7EC66000
trusted library allocation
page read and write
1FD0F584000
trusted library allocation
page read and write
1FD0DC79000
trusted library allocation
page read and write
1FD05B43000
trusted library allocation
page read and write
1ED60E20000
heap
page read and write
1FD7C41D000
heap
page read and write
1FD0F3A7000
trusted library allocation
page read and write
1FD0EFC3000
trusted library allocation
page read and write
1FD068CD000
trusted library allocation
page read and write
1FD05360000
trusted library allocation
page read and write
1FD7FB3D000
trusted library allocation
page read and write
1FD0E314000
trusted library allocation
page read and write
1FD0576B000
trusted library allocation
page read and write
1FD0EFDB000
trusted library allocation
page read and write
1FD7FEBC000
trusted library allocation
page read and write
1FD069C7000
trusted library allocation
page read and write
1FD0DD5C000
trusted library allocation
page read and write
1FD06A8B000
trusted library allocation
page read and write
1FD069AA000
trusted library allocation
page read and write
1FD7FCAE000
trusted library allocation
page read and write
1FD0DD43000
trusted library allocation
page read and write
A4A6BFF000
stack
page read and write
F73000
heap
page read and write
1FD06696000
trusted library allocation
page read and write
1FD054A1000
trusted library allocation
page read and write
1FD071B3000
trusted library allocation
page read and write
1FD05B29000
trusted library allocation
page read and write
1FD0578B000
trusted library allocation
page read and write
1FD0F5CB000
trusted library allocation
page read and write
1FD06CF4000
trusted library allocation
page read and write
1FD7EB2F000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD7C416000
heap
page read and write
1B391460000
heap
page read and write
1FD7C455000
heap
page read and write
1FD07120000
trusted library allocation
page read and write
1FD0D9E1000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD069F8000
trusted library allocation
page read and write
1FD06A9B000
trusted library allocation
page read and write
1FD092AD000
trusted library allocation
page read and write
AD4000
unkown
page readonly
1FD07866000
trusted library allocation
page read and write
1FD116AF000
trusted library allocation
page read and write
1FD7C40F000
heap
page read and write
1FD0917A000
heap
page read and write
1FD0E0EE000
trusted library allocation
page read and write
1FD106F1000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD069EC000
trusted library allocation
page read and write
1FD066AB000
trusted library allocation
page read and write
1ED602A3000
unkown
page execute read
1FD0E3C9000
trusted library allocation
page read and write
1FD02DA9000
heap
page read and write
1FD08BFB000
trusted library allocation
page read and write
1FD7C48C000
heap
page read and write
1FD0E1BA000
trusted library allocation
page read and write
1FD06C2F000
trusted library allocation
page read and write
1FD069A7000
trusted library allocation
page read and write
1FD069E4000
trusted library allocation
page read and write
1FD0A702000
trusted library allocation
page read and write
1FD05F0B000
trusted library allocation
page read and write
1FD07ED7000
trusted library allocation
page read and write
1FD104AA000
trusted library allocation
page read and write
1FD0683D000
trusted library allocation
page read and write
1FD069A4000
trusted library allocation
page read and write
1FD05BEA000
trusted library allocation
page read and write
F96000
heap
page read and write
1FD069E7000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD106F7000
trusted library allocation
page read and write
1FD0F5CF000
trusted library allocation
page read and write
1FD0685B000
trusted library allocation
page read and write
1FD05775000
trusted library allocation
page read and write
1FD7FC75000
trusted library allocation
page read and write
1FD04F23000
trusted library allocation
page read and write
1FD05BE0000
trusted library allocation
page read and write
1FD0F39D000
trusted library allocation
page read and write
1FD071B8000
trusted library allocation
page read and write
1FD07854000
trusted library allocation
page read and write
1FD05B5E000
trusted library allocation
page read and write
22569178000
trusted library allocation
page read and write
1FD06CC5000
trusted library allocation
page read and write
1FD06A3F000
trusted library allocation
page read and write
F96000
heap
page read and write
1FD06AD7000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD05753000
trusted library allocation
page read and write
1FD08E5C000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7FCE5000
trusted library allocation
page read and write
1FD7C492000
heap
page read and write
F96000
heap
page read and write
1FD0F39D000
trusted library allocation
page read and write
1FD7FDE5000
trusted library allocation
page read and write
1FD068C1000
trusted library allocation
page read and write
1FD05257000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1FD0F4DD000
trusted library allocation
page read and write
1FD0664F000
trusted library allocation
page read and write
1FD0E0B8000
trusted library allocation
page read and write
1FD07D7D000
trusted library allocation
page read and write
1FD05778000
trusted library allocation
page read and write
22568D50000
heap
page read and write
1FD0F3B4000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD7EC82000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD06C9A000
trusted library allocation
page read and write
1FD0DA95000
trusted library allocation
page read and write
1FD08BF3000
trusted library allocation
page read and write
1FD070C0000
trusted library allocation
page read and write
1FD06C58000
trusted library allocation
page read and write
22568D5A000
heap
page read and write
1FD068C1000
trusted library allocation
page read and write
1FD7FEBC000
trusted library allocation
page read and write
1FD09111000
heap
page read and write
1FD07136000
trusted library allocation
page read and write
1B3913E0000
unclassified section
page readonly
1FD0F5D5000
trusted library allocation
page read and write
1FD0EFAE000
trusted library allocation
page read and write
1FD0F450000
trusted library allocation
page read and write
1FD0F5D7000
trusted library allocation
page read and write
1B39190C000
trusted library allocation
page read and write
1FD02D70000
heap
page read and write
1FD7C41D000
heap
page read and write
984000
heap
page read and write
1FD07E52000
trusted library allocation
page read and write
1FD05BC3000
trusted library allocation
page read and write
1FD07AF2000
trusted library allocation
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD0EFBF000
trusted library allocation
page read and write
1FD05AFE000
trusted library allocation
page read and write
1FD0F567000
trusted library allocation
page read and write
1FD02DAA000
heap
page read and write
1FD08B7D000
trusted library allocation
page read and write
1FD05D73000
trusted library allocation
page read and write
1FD0F444000
trusted library allocation
page read and write
1FD0F5C9000
trusted library allocation
page read and write
1B391766000
trusted library allocation
page read and write
1FD7FD20000
trusted library allocation
page read and write
1ED608D0000
heap
page read and write
22568CE0000
heap
page read and write
1FD7C486000
heap
page read and write
1FD0FBC8000
trusted library allocation
page read and write
1FD06C47000
trusted library allocation
page read and write
F8C000
heap
page read and write
1FD0F38A000
trusted library allocation
page read and write
1FD0E063000
trusted library allocation
page read and write
1FD0DF8D000
trusted library allocation
page read and write
1FD7C424000
heap
page read and write
1FD7C415000
heap
page read and write
F96000
heap
page read and write
1FD08BAE000
trusted library allocation
page read and write
1FD0F5C9000
trusted library allocation
page read and write
1ED60123000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
1ED5FF80000
heap
page read and write
1FD7FB1C000
trusted library allocation
page read and write
1FD116A6000
trusted library allocation
page read and write
1FD0F5CF000
trusted library allocation
page read and write
1FD0E0F9000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD7C484000
heap
page read and write
1FD7E6B6000
trusted library allocation
page read and write
1FD052B2000
trusted library allocation
page read and write
1ED5FFA0000
heap
page read and write
1FD7FDC3000
trusted library allocation
page read and write
1FD7FDC3000
trusted library allocation
page read and write
1FD06917000
trusted library allocation
page read and write
1FD0699A000
trusted library allocation
page read and write
1FD0D985000
trusted library allocation
page read and write
1FD7C47E000
heap
page read and write
3821000
heap
page read and write
1FD068CB000
trusted library allocation
page read and write
1FD0DF75000
trusted library allocation
page read and write
1FD116E5000
trusted library allocation
page read and write
1FD08ED4000
trusted library allocation
page read and write
1FD0DC3B000
trusted library allocation
page read and write
1FD0F2E7000
trusted library allocation
page read and write
1FD054BD000
trusted library allocation
page read and write
1FD07888000
trusted library allocation
page read and write
1FD06AC7000
trusted library allocation
page read and write
1FD06C26000
trusted library allocation
page read and write
22568C80000
remote allocation
page read and write
1ED60E32000
heap
page read and write
1ED60E84000
heap
page read and write
1FD7E590000
trusted library allocation
page read and write
1FD07784000
trusted library allocation
page read and write
22569176000
trusted library allocation
page read and write
1FD0D953000
trusted library allocation
page read and write
1FD0DB34000
trusted library allocation
page read and write
1FD7FDC1000
trusted library allocation
page read and write
1FD7C420000
heap
page read and write
1FD1048F000
trusted library allocation
page read and write
1FD0E192000
trusted library allocation
page read and write
1FD7C452000
heap
page read and write
1FD08B89000
trusted library allocation
page read and write
1FD06AFA000
trusted library allocation
page read and write
1FD08EAF000
trusted library allocation
page read and write
1FD11DF0000
trusted library allocation
page read and write
1FD02BF6000
trusted library allocation
page read and write
1ED60E98000
heap
page read and write
1FD05BC0000
trusted library allocation
page read and write
1FD0F3F9000
trusted library allocation
page read and write
1FD06AE3000
trusted library allocation
page read and write
1FD7C415000
heap
page read and write
1ED6016F000
trusted library allocation
page read and write
1FD0917A000
heap
page read and write
1FD05B92000
trusted library allocation
page read and write
1FD7EC19000
trusted library allocation
page read and write
1FD071B8000
trusted library allocation
page read and write
1FD07ABD000
trusted library allocation
page read and write
1FD0E1B0000
trusted library allocation
page read and write
1FD0E0A8000
trusted library allocation
page read and write
1FD104AA000
trusted library allocation
page read and write
1FD7C41D000
heap
page read and write
1FD7C499000
heap
page read and write
1FD7FCEE000
trusted library allocation
page read and write
1FD08E73000
trusted library allocation
page read and write
1FD10822000
trusted library allocation
page read and write
1FD054B9000
trusted library allocation
page read and write
1FD0DCA4000
trusted library allocation
page read and write
1FD0E3F1000
trusted library allocation
page read and write
1FD7C41B000
heap
page read and write
1FD10890000
trusted library allocation
page read and write
1FD07177000
trusted library allocation
page read and write
1FD11A3B000
trusted library allocation
page read and write
1FD06023000
trusted library allocation
page read and write
1FD07BFC000
trusted library allocation
page read and write
1FD052D6000
trusted library allocation
page read and write
1FD053D6000
trusted library allocation
page read and write
1FD0DDF9000
trusted library allocation
page read and write
1FD0E1FE000
trusted library allocation
page read and write
1FD0D97B000
trusted library allocation
page read and write
1FD7FD9B000
trusted library allocation
page read and write
1FD071B0000
trusted library allocation
page read and write
1FD05209000
trusted library allocation
page read and write
1FD06095000
trusted library allocation
page read and write
1FD068AB000
trusted library allocation
page read and write
1FD7C488000
heap
page read and write
1FD08E59000
trusted library allocation
page read and write
22568E72000
unclassified section
page read and write
1FD06A77000
trusted library allocation
page read and write
1FD07E4B000
trusted library allocation
page read and write
1FD106EF000
trusted library allocation
page read and write
1FD0667E000
trusted library allocation
page read and write
1FD0E3C9000
trusted library allocation
page read and write
1FD116B9000
trusted library allocation
page read and write
1FD0DCE4000
trusted library allocation
page read and write
1FD7FE69000
trusted library allocation
page read and write
1FD05F3C000
trusted library allocation
page read and write
1ED60E7B000
heap
page read and write
1FD08DF2000
trusted library allocation
page read and write
23A88F3A000
heap
page read and write
1ED6019F000
trusted library allocation
page read and write
1FD068E6000
trusted library allocation
page read and write
1FD078EA000
trusted library allocation
page read and write
1FD06CF5000
trusted library allocation
page read and write
1FD0DC68000
trusted library allocation
page read and write
1FD7FE6C000
trusted library allocation
page read and write
1FD0D993000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD0F39D000
trusted library allocation
page read and write
1FD08B2A000
trusted library allocation
page read and write
22569307000
trusted library allocation
page read and write
1FD0686B000
trusted library allocation
page read and write
1FD0F5DD000
trusted library allocation
page read and write
1FD7E581000
trusted library allocation
page read and write
1FD02D9F000
heap
page read and write
1FD0EFA7000
trusted library allocation
page read and write
1FD0F373000
trusted library allocation
page read and write
1FD7FB5F000
trusted library allocation
page read and write
1FD06AF8000
trusted library allocation
page read and write
1FD104C0000
trusted library allocation
page read and write
1FD0FB8D000
trusted library allocation
page read and write
1FD7FE3F000
trusted library allocation
page read and write
3821000
heap
page read and write
1FD0DC39000
trusted library allocation
page read and write
1FD07DB6000
trusted library allocation
page read and write
1FD0F5C7000
trusted library allocation
page read and write
1FD07D5B000
trusted library allocation
page read and write
1FD7FDE5000
trusted library allocation
page read and write
1FD0DD74000
trusted library allocation
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD7C431000
heap
page read and write
1FD05B3F000
trusted library allocation
page read and write
A00000
unkown
page readonly
1FD08B7A000
trusted library allocation
page read and write
23A88EE0000
heap
page read and write
1FD0E199000
trusted library allocation
page read and write
1FD052B5000
trusted library allocation
page read and write
1FD066A7000
trusted library allocation
page read and write
1FD08B22000
trusted library allocation
page read and write
1FD7C499000
heap
page read and write
1FD0EFEE000
trusted library allocation
page read and write
1FD7FC48000
trusted library allocation
page read and write
1FD05743000
trusted library allocation
page read and write
1FD07116000
trusted library allocation
page read and write
1FD0DFA1000
trusted library allocation
page read and write
1FD07085000
trusted library allocation
page read and write
1FD06A8B000
trusted library allocation
page read and write
1FD06897000
trusted library allocation
page read and write
1FD0546D000
trusted library allocation
page read and write
1ED60E20000
heap
page read and write
1FD11A83000
trusted library allocation
page read and write
1FD0F5C1000
trusted library allocation
page read and write
1FD07189000
trusted library allocation
page read and write
1FD7C41C000
heap
page read and write
1FD070D0000
trusted library allocation
page read and write
1FD0E0F1000
trusted library allocation
page read and write
1FD05F3E000
trusted library allocation
page read and write
1FD11DF5000
trusted library allocation
page read and write
1FD068D6000
trusted library allocation
page read and write
1FD0F5B3000
trusted library allocation
page read and write
1FD02D9F000
heap
page read and write
1FD07E86000
trusted library allocation
page read and write
1FD0F437000
trusted library allocation
page read and write
1FD057C5000
trusted library allocation
page read and write
1FD07E12000
trusted library allocation
page read and write
1FD0663B000
trusted library allocation
page read and write
1FD106FD000
trusted library allocation
page read and write
1FD0F4CB000
trusted library allocation
page read and write
1FD1048C000
trusted library allocation
page read and write
972357E000
stack
page read and write
1FD0523D000
trusted library allocation
page read and write
1FD060BD000
trusted library allocation
page read and write
1FD06AB6000
trusted library allocation
page read and write
1FD0F5D5000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1FD07E52000
trusted library allocation
page read and write
1FD0F474000
trusted library allocation
page read and write
1FD0E3F5000
trusted library allocation
page read and write
1FD05280000
trusted library allocation
page read and write
1FD05B31000
trusted library allocation
page read and write
1FD071AC000
trusted library allocation
page read and write
1FD7E643000
trusted library allocation
page read and write
1FD7C455000
heap
page read and write
1FD108BC000
trusted library allocation
page read and write
1ED60E2C000
heap
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD078D5000
trusted library allocation
page read and write
1FD7C461000
heap
page read and write
1FD05B61000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD7C472000
heap
page read and write
1FD116CA000
trusted library allocation
page read and write
1FD09218000
trusted library allocation
page read and write
1ED60E2C000
heap
page read and write
F40000
heap
page read and write
1FD05486000
trusted library allocation
page read and write
1FD7C416000
heap
page read and write
1FD05AEF000
trusted library allocation
page read and write
1FD7C484000
heap
page read and write
1FD06CEE000
trusted library allocation
page read and write
1FD06676000
trusted library allocation
page read and write
1FD104DA000
trusted library allocation
page read and write
1FD0DD25000
trusted library allocation
page read and write
1FD7C490000
heap
page read and write
1FD06A80000
trusted library allocation
page read and write
1FD06AEE000
trusted library allocation
page read and write
1FD069FC000
trusted library allocation
page read and write
1FD0F373000
trusted library allocation
page read and write
1FD0E1F6000
trusted library allocation
page read and write
1FD7C471000
heap
page read and write
1ED60DA0000
heap
page read and write
1FD08E6C000
trusted library allocation
page read and write
1FD7FC7D000
trusted library allocation
page read and write
1B391723000
trusted library allocation
page read and write
1FD07AE5000
trusted library allocation
page read and write
1FD1048F000
trusted library allocation
page read and write
There are 3781 hidden memdumps, click here to show them.